-
Notifications
You must be signed in to change notification settings - Fork 425
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Another DoS? #2109
Comments
2.53.1 and 2.54.0, both on Debian 11 |
You are right, network is under attack.
|
I2PD 2.53.1 and 2.54.0, on relatively inexpensive VDS, http://flibusta.i2p/ is available, it seems the DoS is not fully effective yet. |
Tunnel creation success rate is too low, about 6-8%, compared to normal operation not under attack about 15-20% |
Attacker can do something else besides high traffic, but it is unclear what exactly. |
@Vort Can you just ban the new Chinese routers? |
It won't have much effect. |
What are these "new Chinese routers" doing illegal? Are there any formal reasons for ban? They are simply using the i2p network as it intended, i think. |
They malfunction. They declare themselves as floodfills, but don't serve as floodfiils. |
I2PD process killed by OOM-killer as a result of the attack. |
My node on version 2.54.0-61-g0086f8e2 uses 192 MB of RAM right now, despite high transit traffic of attack. |
May be uptime is too short. |
Over past time of constant load(~6-18 MiB/s), memory consumption on my node increased only by ~ 40 MiB. |
Are you a floodfill? |
Yep
|
Interestingly, yesterday it was possible to observe network state without attack:
Do you know that transit tunnel count depends on TCSR value? |
Yeah, bw had deceased on my node to 2-4 MiB, almost all day.
No, I didn't know that.
Very sad : / |
Failed transit tunnels are still tracked as alive, because transit node can't check if they are fine. |
fresh trunk i2pd version 2.54.0-64-g4432c5a2 (0.9.64) |
Good day
Just noticed an abnormally high transit traffic through my node: ~ 25 MiB/s / ~35k PPS
Usually transit is about 4-6 MiB/s, and occasionally reached up to 10 MiB/s (not counting other DoS).
Strangely, there is no abnormally large number of floodfills and/or increase in memory consumption (consumption frozen at devilish 666 MiB xD ), like in past DoS attacks.
Apparently, this has been going on for about half a day, so, in my opinion, it does not look like an episodic increase in transit.
Any thoughts ?
The text was updated successfully, but these errors were encountered: