configurations
Configuration templates for common network security platforms. YMMV. (by 0xdea)
tor-ddos
iptables rules for Tor relay operators to mitigate ddos (by Enkidu-6)
configurations | tor-ddos | |
---|---|---|
1 | 5 | |
18 | 47 | |
- | - | |
4.4 | 5.5 | |
4 months ago | about 2 months ago | |
Shell | Shell | |
MIT License | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
configurations
Posts with mentions or reviews of configurations.
We have used some of these posts to build our list of alternatives
and similar projects.
-
BBC news explains how to get around Russian ban, including by using TOR
Add to your docker compose file the OBFS4V_RelayBandwidthRate. Search RelayBandwidthRate in the example.
tor-ddos
Posts with mentions or reviews of tor-ddos.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-03-09.
-
Which countries would be best for hosting a relay from?
Also use the custom firewall rules to prevent ongoing Ddos https://github.com/Enkidu-6/tor-ddos
- [March 6th] Dread: We are back!
-
Someone said there are a lot of NSA-owned exit nodes for TOR? Is this true? & if so what are the ramifications of this? and what can be done to counterbalance this? -Thanks.
I am pretty sure of this. They are trying to de-anonymize users by running their own nodes and at the same time dos-ing the real nodes (so that chances people are using the NSA nodes increases). The best way to counterbalance this is to run more real nodes and also protect those from their DoS. Issue about DoS https://gitlab.torproject.org/tpo/community/support/-/issues/40093 the firewall rules: https://github.com/Enkidu-6/tor-ddos (from the above issue)
-
Super slow tor connection
running https://github.com/Enkidu-6/tor-ddos on the relays helps too
- Tor relay high CPU usage
What are some alternatives?
When comparing configurations and tor-ddos you can also consider the following projects:
streisand - Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.
i2pdbrowser - i2pd browser bundle
jailbox - Torify the system with multiple tor exit nodes and load balance.
kalitorify - Transparent proxy through Tor for Kali Linux OS
onionX - A bash script to easily run TOR hidden service on termux and most linux distros