Get the latest tech news
Mitigating IP spoofing against Tor
Over the last few weeks, the Tor Project and relay operators received abuse complaints regarding alleged port scanning activity from their servers. Thanks to a collaborative effort, the source of the spoofed packets has been identified and shut down.
Thanks to a joint effort from the Tor community, InterSecLab, and the support of Andrew Morris and the team at GreyNoise, the origin of these spoofed packets was identified and shut down on November 7th, 2024. Reply to your hosting company: If you got contacted by your provider due to the abuse complaints, share this blog post to help them understand the incident and clarify that your Tor relay was targeted by a spoofing attack, and is NOT originating any suspicious traffic. While we received support from many individuals and organizations during this incident, we also experienced instances of unprofessional conduct, where a the refusal to investigate and lack of diligence inadvertently amplified the impact of this attack.
Or read this on Hacker News