My bridge's log showed:
Feb 24 02:25:45.940 [Warning] Your Guard guard name and fp is
failing a very large amount of circuits. Most likely this means the Tor
network is overloaded, but it could also mean an attack against you or
potentially the guard itself. Success counts are 129/259. Use
Hi ZEROF,
I had fail2ban, harden (which includes tiger, tripwire, logcheck, plus
MANY others), all the fancy log checkers, rkhunter and clamav,
unattended-upgrades, and had all logs emailed to me on a daily basis. It
was tedious to go through, but I was trying to do my due diligence.
I disabled
After much research, I've found some interesting tidbits.
Out of the 88 blacklists mxtoolbox reports against,
6/7 relays reported 3 problems
- 1) Efnet blocks Tor exits and reported. No exceptions.
- 2) CBL detected a single trojan/malware/spam, etc, and reported
- 3) Spamhaus ZEN detected CBL's
So, you made a POST request to an online passwordchecker and they now
probably have your password.
On 02/26/2015 04:24 PM, Speak Freely wrote:
Hi ZEROF,
I had fail2ban, harden (which includes tiger, tripwire, logcheck, plus
MANY others), all the fancy log checkers, rkhunter and clamav,
You didn't include your fingerprint or IP's, so there isn't any way for
someone to check.
On 02/26/2015 02:31 PM, catchthemall wrote:
Hi all,
tl;dr:
Due to a config error my relay [1] was running on two different IPs at
the same time for about half a day. Now the traffic has dropped.
I just
You didn't include your fingerprint or IP's, so there isn't any way for
someone to check.
On 02/26/2015 02:31 PM, catchthemall wrote:
Hi all,
tl;dr:
Due to a config error my relay [1] was running on two different IPs at
the same time for about half a day. Now the traffic has dropped.
I
Am 26.02.2015 um 03:42 schrieb ZEROF:
4. Setup honey-pot on your server and play their game (10-15 job):
http://linuxdrops.com/how-to-set-up-a-honeypot-using-smart-and-simple-artillery-debian-6-0/
Sounds like a good strategy.
What I don't like is the _permanent_ ban of IP addresses. Being a