I’ve used Tor and Tor Browser on a regular everyday basis for the last few years, and I know there is always natural fluctuating variance in the network’s performance at different times. But for the past several days or so, 90% of page-load attempts time out, and the 10% that succeed take the better part of a minute to finish, contrasted with fewer than ten seconds under normal circumstances.
Nothing has changed in my local configuration, and I don’t see anything mentioned at https://status.torproject.org/ , but something is definitely noticeably different at present in terms of network availability and/or load.
I’ve been experiencing overload on both my relays, which is not the usual. Running 2 relays on 4 cores and 8GB of RAM. RAM is not an issue but CPU load is usually at 60%. These last days it’s been over 80-85%, getting warnings from time to time about my computer not being able to hold that many circuits for long.
Over a span of 20 days uptime:
06:08:12 [NOTICE] Heartbeat: DoS mitigation since startup: 1.078 circuits killed with too many cells, 60.081.539 circuits rejected, 751 marked addresses, 6 marked addresses for max queue, 88 same address concurrent connections rejected, 0 connections rejected, 1.633 single hop clients refused, 479 INTRODUCE2 rejected.
06:08:16 [NOTICE] Heartbeat: DoS mitigation since startup: 1.151 circuits killed with too many cells, 40.438.538 circuits rejected, 727 marked addresses, 1 marked addresses for max queue, 883 same address concurrent connections rejected, 0 connections rejected, 1.244 single hop clients refused, 0 INTRODUCE2 rejected.
I’ve considered about further configuring my relays in order to handle a higher capacity, but I’m not sure it’s the right thing with just 4 cores.
I just started noticing it in the last 2-3 days. That’s why I came here today actually. I’m only getting 100-200KB/sec most of the time, where I usually get 1-2MB/sec, and a lot of connections are getting dropped prematurely.
Long-term DDoS’s like this have been happening once or twice a year for the past several years now it seems like. Tor Project has been implementing mitigations but attackers keep discovering new weaknesses. It’s a game of cat and mouse, I guess.
I signed up to this forum because I don’t know how to create a bug report in Tor repository and I also don’t have a Gitlab account. It seems like Tor Project team leader is here. Are we going to do something in order to stop this DDoS attack? May be we should initiate an another Tor Relay operators meetup and ask relay operators to set up firewall rules against DDoS? I would like to receive a feedback from Tor Project developers. Thank you.
Onion versions of websites have become completely unusable. They just time out or do not connect at all. It’s weird that the status page doesn’t mention any issues when such a critical part of Tor is broken.
I use Tor to evade my school censorship and currently i cant acess onion sites at all and google takes like 1m to load( it might be my school network too or my bridge)
Tor worked just perfect yesterday. Today it is a slowdown again but it’s still faster than it was 4-5 days ago.
It’s because a DoS attack is being performed against Tor intermediate relays first of all. It makes Onion v3 services completely unusable and causes a huge slowdown when Tor users are trying to connect to clearnet websites.
Most likely, attack reappeared weeks ago, but I wasn’t able to see it since for about 2 month my relay had no Guard flag and only week ago Guard flag was obtained again. So I think it may mean that attackers aim mainly at Guards.