Re: [tor-relays] Noticeable Increase in Abuse Traffic

2020-07-18 Thread John Ricketts
I have considered changing my abuse email at ARIN as well.  Thanks for letting 
me know that it is also happening to you. 

> On Jul 18, 2020, at 23:20, John Csuti  wrote:
> 
> I am as well constantly getting emails about it from my ISP. As well as a 
> few companies... not sure why there ramping up. For now I setup a mail rule 
> to forward them to a different mailbox inside my email.
> 
> Thanks,
> John Csuti
> 
>> On Jul 18, 2020, at 8:43 PM, John Ricketts  wrote:
>> 
>> All,
>> 
>> I'm getting about 4x the abuse traffic that I normally get from running 
>> exits.  Anyone else noticing this trend?  
>> 
>> John Ricketts
>> Quintex Alliance Consulting
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> 
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Noticeable Increase in Abuse Traffic

2020-07-18 Thread John Ricketts
See below.

> On Jul 18, 2020, at 23:19, William Kane  wrote:
> 
> How do you define abusive traffic?
Letters of abuse from companies and other ISPs demonstrating hacking attempts.  
I am not talking about or including DMCA requests.
> 
> Do analyze dumps of your network traffic?
No, that is not done on the subnet that I put my 100 exit routers on.
> 
> Is your ISP sending more abuse letters than usual?
I am the ISP.  I am getting about 4x more abuse complaints than normal.
> 
> If the latter, then it might just be a fluke - when I ran exits, the
> same thing happened - one month 17 abuse reports, the other month
> 193.. nothing you can do about it except to limit commonly abused
> ports but that's not a long term solution and I will refrain from
> doing so, even if the port is mostly abused - I am strictly against
> censorship, and all the exits I used to own ran under my own IP range
> and abuse contact, so abuse mails just went directly to spam unless it
> was actual GOVT requests.
I have received more subpoena than regular in the last two months.
> 
> 2020-07-19 0:36 GMT, John Ricketts :
>> All,
>> 
>> I'm getting about 4x the abuse traffic that I normally get from running
>> exits.  Anyone else noticing this trend?
>> 
>> John Ricketts
>> Quintex Alliance Consulting
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Heartbeat: It seems like we are not in the cached consensus.

2020-07-18 Thread Fran
Hello,

I'm taking care of a server of a friend who's on holiday. The server is up and 
running but not part of the consensus.

As beeing instructed I updated to the lastest OpenBSD snapshot when I saw that 
a new tor release is available  (Tor 0.4.3.5 on OpenBSD).

Excerpts from the log:

Jul 13 20:04:02.000 [notice] Self-testing indicates your DirPort is reachable 
from the outside. Excellent.
Jul 13 20:05:02.000 [notice] Self-testing indicates your ORPort is reachable 
from the outside. Excellent. Publishing server descriptor.
Jul 13 20:05:35.000 [notice] Performing bandwidth self-test...done.
Jul 14 02:04:01.000 [notice] Heartbeat: It seems like we are not in the cached 
consensus.
Jul 14 02:04:01.000 [notice] Heartbeat: Tor's uptime is 6:00 hours, with 0 
circuits open. I've sent 2.04 MB and received 6.25 MB.
Jul 14 02:04:01.000 [notice] Average packaged cell fullness: 12.450%. TLS write 
overhead: 33%
Jul 14 02:04:01.000 [notice] Circuit handshake stats since last time: 0/0 TAP, 
5/5 NTor.
Jul 14 02:04:01.000 [notice] Since startup we initiated 0 and received 157 v1 
connections; initiated 0 and received 0 v2 connections; initiated 0 and 
received 0 v3 connections; initiated 0 and
received 5 v4 connections; initiated 48 and received 124 v5 connections.
Jul 14 02:04:01.000 [notice] DoS mitigation since startup: 0 circuits killed 
with too many cells. 0 circuits rejected, 0 marked addresses. 0 connections 
closed. 0 single hop clients refused. 0
INTRODUCE2 rejected.
Jul 14 06:04:02.000 [notice] Your relay has a very large number of connections 
to other relays. Is your outbound address the same as your relay address? Found 
9 connections to 6 relays. Found 4
current canonical connections, in 0 of which we were a non-canonical peer. 3 
relays had more than 1 connection, 0 had more than 2, and 0 had more than 4 
connections.
Jul 14 08:04:01.000 [notice] Heartbeat: It seems like we are not in the cached 
consensus.
Jul 14 08:04:01.000 [notice] Heartbeat: Tor's uptime is 12:00 hours, with 1 
circuits open. I've sent 3.46 MB and received 11.22 MB.
Jul 14 08:04:01.000 [notice] Average packaged cell fullness: 12.450%. TLS write 
overhead: 47%
Jul 14 08:04:01.000 [notice] Circuit handshake stats since last time: 2/2 TAP, 
1/1 NTor.
Jul 14 08:04:01.000 [notice] Since startup we initiated 0 and received 340 v1 
connections; initiated 0 and received 0 v2 connections; initiated 0 and 
received 0 v3 connections; initiated 0 and
received 10 v4 connections; initiated 57 and received 246 v5 connections.
Jul 14 08:04:01.000 [notice] DoS mitigation since startup: 0 circuits killed 
with too many cells. 0 circuits rejected, 0 marked addresses. 0 connections 
closed. 0 single hop clients refused. 0
INTRODUCE2 rejected.
Jul 14 14:04:01.000 [notice] Heartbeat: It seems like we are not in the cached 
consensus.
Jul 14 14:04:01.000 [notice] Heartbeat: Tor's uptime is 18:00 hours, with 1 
circuits open. I've sent 4.89 MB and received 15.33 MB.
Jul 14 14:04:01.000 [notice] Average packaged cell fullness: 26.760%. TLS write 
overhead: 51%
Jul 14 14:04:01.000 [notice] Circuit handshake stats since last time: 2/2 TAP, 
6/6 NTor.
Jul 14 14:04:01.000 [notice] Since startup we initiated 0 and received 493 v1 
connections; initiated 0 and received 0 v2 connections; initiated 0 and 
received 0 v3 connections; initiated 0 and
received 18 v4 connections; initiated 64 and received 370 v5 connections.
Jul 14 14:04:01.000 [notice] DoS mitigation since startup: 0 circuits killed 
with too many cells. 0 circuits rejected, 0 marked addresses. 0 connections 
closed. 0 single hop clients refused. 0
INTRODUCE2 rejected.


Atlas show the server as down: 
https://metrics.torproject.org/rs.html#details/AC601DBDB7FBD53454045EDC08DAE3C381C8CF88

Accessing the status page on port 80 works.
No FW on the machine.

Any ideas?

Thanks and regards

Fran
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Become a Fallback Directory Mirror (deadline: July 23)

2020-07-18 Thread Sarah Harvey

D7082DB97E7F0481CBF4B88CA5F5683399E196A3
(https://metrics.torproject.org/rs.html#details/D7082DB97E7F0481CBF4B88CA5F5683399E196A3)

(Thanks for having 39F096961ED2576975C866D450373A9913AFDC92 back on the 
proposal list)


-Sarah

On 2020-07-08 10:36, gus wrote:

Dear Relay Operators,

Do you want your relay to be a Tor fallback directory mirror?
Will it have the same address and port for the next 2 years?

Just reply to this email with your relay's fingerprint.

Important: you have until July 23 2020 to reply to this message to get
in the fallback directory mirror list.

If your relay is on the current fallback list, you don't need to do
anything.

If you're asking:

Q: What's a fallback directory mirror?

Fallback directory mirrors help Tor clients connect to the network. For
more details, see [1].

Q: Is my relay on the current list?

Search [2] and [3] for your relay fingerprint or IP address and port.
[2] is the current list of fallbacks in Tor.
[3] is used to create the next list of fallbacks.

Q: What do I need to do if my relay is on the list?

Keep the same IP address, keys, and ports. Email tor-relays if the
relay's details change.

Q: Can my relay be on the list next time?

We need fast relays that will be on the same IP address and port for 2
years. Reply to this email to get on the list, or to update the details
of your relay.

Once or twice a year, we run a script to choose about 150-200 relays
from the potential list [3] for the list in Tor [2].

Q: Why didn't my relay get on the list last time?

We check a relay's uptime, flags, and speed [4]. Sometimes, a relay
might be down when we check. That's ok, we will check it again next
time.

It's good to have some new relays on the list every release. That helps
tor clients, because blocking a changing list is harder.

cheers,
Gus

[1]
https://gitlab.torproject.org/tpo/core/tor/-/wikis/NetworkTeam/FallbackDirectoryMirrors
[2]
https://gitweb.torproject.org/tor.git/tree/src/app/config/fallback_dirs.inc
[3]
https://gitweb.torproject.org/fallback-scripts.git/tree/fallback_offer_list
[4]
https://trac.torproject.org/projects/tor/attachment/ticket/21564/fallbacks_2017-05-16-0815-09cd78886.log
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Noticeable Increase in Abuse Traffic

2020-07-18 Thread i...@backplanedns.org
I noticed this too. I've gotten about 4-5 abuse complaints to my upstream 
provider alone in the last few days. A few more directly to my email. According 
to the abuse report logs they all appear to be a similar xss exploit attempt. 
DennisSent from my T-Mobile 4G LTE device-- Original message--From: 
John RickettsDate: Sat, Jul 18, 2020 8:42 PMTo: 
tor-relays@lists.torproject.org;Cc: Subject:[tor-relays] Noticeable Increase in 
Abuse TrafficAll,

I'm getting about 4x the abuse traffic that I normally get from running exits.  
Anyone else noticing this trend?  

John Ricketts
Quintex Alliance Consulting
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Noticeable Increase in Abuse Traffic

2020-07-18 Thread John Ricketts
All,

I'm getting about 4x the abuse traffic that I normally get from running exits.  
Anyone else noticing this trend?  

John Ricketts
Quintex Alliance Consulting
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays