Re: [tor-relays] 7 relays gone because of spammers
This is unfortunate but we will not be deterred. I would also go chargeback if notice you now give them does not result in satisfied action by close Sunday. You paid for a year based on some assurance, and did not receive. Now in the future... You plan was long and two part, partly confusing. It must be made explicitly clear to hosters that you wish to run exit relay, include links to tor website, etc. Always try one month pay for a while first, then maybe the next levels after that succeeds for many months. You can still try to get the lower price from first day by saying that you will stay for those longer months so long as you don't get cutoff in the first month to months. ALL TOS allow them to cut you off for any reason. So if you want to survive as a special tor consideration, you cannot cannot take word of some sales droid in email. You have to contact officer of the company and get written agreement if you want something special above TOS. You need to consider SWIP and making clear the handling methods and scenarios with them. Otherwise, skip all that and play fast and dirty month to month host game, just don't disrespect them/tor in the process. Tor! ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
On 2015-02-25 11:35, Speak Freely wrote: The Abuse department's rationale is as follows: "Your account was suspended because 100% of your IPs are blacklisted on multiples lists for Spam and other malicious activities. This case is closed and this decision is final." Speaking as an abuse desk lead investigator who has had unfortunate experiences reporting issues to OVH, I can assure you that OVH's abuse department is institutionally incompetent. While they have some good staff, their system is set up to break those staff members and their outcomes in almost all ways possible. What you're encountering is apparently part of their data feed quality problem. Reading between their words, they're mistakenly using a list of Tor nodes (perhaps they bought a cheapo mislabeled list) in place of a competently maintained list of spam sources and malicious actors. On the flip side of data quality, what also occurs from and by OVH is massive email spam runs from their pet spammers like netmessage.com and oxemis.net. One competent list which tracks ovh.net spammers contains over 20,000 spam source IPs where spam was sent from French-speaking "high volume email deployers" to trap addresses. The list is huge because ovh.net seems to quickly give these spammers new IP ranges as the previous ones are firewalled for cause. Oddly for a provider that claims to want to stop spam, to the point they use that as an excuse to shut your servers, ovh.net doesn't do anything to disconnect the *actual* spammers they host, or even slow them down. I thus recommend you do a chargeback. Get your money back, on the grounds that ovh.net first lied to you to close the sale, and now they're probably lying to you about the real reason they're disconnecting. I think they've been dealing in very bad faith with you, and you shouldn't have to pay for that. Richard ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
On 02/25/2015 01:34 PM, ja...@icetor.is wrote: > This++ Indeed! And if you used PayPal, they may also help. > On 02/25/2015 07:32 PM, Pascal wrote: >> If you paid with a credit card, give them a choice: they can either >> refund your money or you will initiate a chargeback. Either way you get >> your money back, but with the chargeback you will probably get all of >> your money back instead of a prorated refund, they have to pay a fee, >> and may have their merchant account terminated if they get enough of them. >> >> -Pascal >> >> >> On 2/25/2015 12:35 PM, Speak Freely wrote: >>> This has cost me hundreds of dollars, as I foolishly decided to prepay >>> on an annual basis. None of the servers were older than 2 months. Some >>> were only a few weeks old. >> ___ >> tor-relays mailing list >> tor-relays@lists.torproject.org >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
Hi man, I will try to explain you how things got in wrong direction for you. OVH don't lie, but they don't have best support that you can find around. Anyway. Last 15-25 days a lot of attacks was made on French ISP's and attacker used Tor IP list to do one part of his sick idea. One of my nodes "in my home" was infected as well. As Linux devs need some time to patch packages that make us vulnerable, we are just attack objects to them. In my case they used exim4 security issue, and as this sh.. comes preinstalled with server ISO i didn't even look to it. Your are victim of same thing I guess. Classic server side infection from some bot net. Better question is what you can do to protect your servers in the future. 1. Allow logging to your server from one country or IP, for that i use geoip : http://www.axllent.org/docs/view/ssh-geoip/ 2. Add simple 2 min settings to fail2ban: https://www.digitalocean.com/community/tutorials/how-to-protect-ssh-with-fail2ban-on-centos-6 (this settings can be used on debian as well etc.) 3. Remove ssh password logins from your servers, use only keys 4. Setup honey-pot on your server and play their game (10-15 job): http://linuxdrops.com/how-to-set-up-a-honeypot-using-smart-and-simple-artillery-debian-6-0/ In the future I will write ansible play-book for this, or some bash or python script to do this on every server i use for Tor nodes. I run one exit node from 2014 with OVH cloud (runabove) and thanks to all security measures I made (using some firewall setting as well) i don't have issue with them, and they respect that i take care about my servers security. Try same and you will see. Block port 25 as well. On 26 February 2015 at 02:35, I wrote: > OVH says no to Tor exits openly doesn't it? > > > Quote: > > "Rest assure that, in case of an abuse, we will not terminate your > > account without notice. In fact we may not even terminate your VPS. You > > will receive a warning from our Abuse department giving you a choice to > > resolve the abuse case" > > > > Has OVH contacted you before because of an abuse complaint? > > > > > > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > -- http://www.backbox.org http://www.pentester.iz.rs ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
OVH says no to Tor exits openly doesn't it? > Quote: > "Rest assure that, in case of an abuse, we will not terminate your > account without notice. In fact we may not even terminate your VPS. You > will receive a warning from our Abuse department giving you a choice to > resolve the abuse case" > > Has OVH contacted you before because of an abuse complaint? > > ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
On Wed, Feb 25, 2015 at 1:35 PM, Speak Freely wrote: > Hello fellow relay runners, > > This morning OVH decided to kill 7 of my relays due to spamming, and > block all access to all services. I ran the Reduced Exit policy for > all of my relays. I run one relay with OVH and one with DigitalOcean. Both relays are non-exit. I also have another VPS with OVH unrelated to Tor. This makes me uneasy because I, too, paid one year in advance. DigitalOcean seemed more welcoming of Tor when I contacted them about it. Both have policies that do not prohibit Tor. If they shut down a non-exit node, I would contact my credit card company if they don't offer a refund. pgpfxABcat71V.pgp Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
On Wed, Feb 25, 2015 at 4:07 PM, Chris Patti wrote: > I'm having a similar situation. Linode issued a ToS violation because > my linode on which I run a relay was a source of spam. > > Very strange because I had reject *.* (no exit) set in my torrc. I have operated a non-exit relay on Linode for almost two years now with no trouble whatsoever. I'd wonder whether your vhost got hacked in some fashion, such that it *was* sending spam, but Tor had nothing to do with it. If that's what happened, you could probably turn your relay back on after confirming with their support that you'd found and fixed the problem. (Regenerate the relay's identity key, too.) (I would not attempt to run an exit relay on Linode, and I have made a point of not running *anything else* (except key-only SSH) on my vhost that is a relay, to limit attack surface.) zw ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
I'm having a similar situation. Linode issued a ToS violation because my linode on which I run a relay was a source of spam. Very strange because I had reject *.* (no exit) set in my torrc. Anyway I've had to give up and shut down FiatLux. Kind of a bummer, I really enjoyed contributing to Tor. -Chris On Wed, Feb 25, 2015 at 1:35 PM, Speak Freely wrote: > Hello fellow relay runners, > > This morning OVH decided to kill 7 of my relays due to spamming, and > block all access to all services. I ran the Reduced Exit policy for all > of my relays. > > Due to heightened concerns about this affecting other unrelated services > I have with OVH, I had to shut down the other 3 relays. They may > eventually re-appear as middle-relays. > > This has cost me hundreds of dollars, as I foolishly decided to prepay > on an annual basis. None of the servers were older than 2 months. Some > were only a few weeks old. > > The Abuse department's rationale is as follows: > "Your account was suspended because 100% of your IPs are blacklisted on > multiples lists for Spam and other malicious activities. > This case is closed and this decision is final." > > -- > When I first contacted OVH regarding running Tor relays, this was the > response that I received from them, which does not mesh with what just > happened. > > "Good morning Matt, > > I'm very glad to here from you. It is very flattering to hear that you > are very satisfied by our service at OVH! > > We do take our network speed and hardware performance very seriously > here. We are proud of our infrastructure that we have built over the years. > > I do understand your concerns about setting up a Tor relay on one of our > VPS. In a simple form, yes you can. > > We do let our customers use our VPS as Tor relays. We have no problem in > letting you this. > > However, your are allowed to use Tor but it will be at your own risk. > > Rest assure that, in case of an abuse, we will not terminate your > account without notice. In fact we may not even terminate your VPS. You > will receive a warning from our Abuse department giving you a choice to > resolve the abuse case. > > Like you said, we are in a world where free speech is constantly under > attack and we are committed to help as much as possible to protect this > fundamental right that we all have. We will absolutely not in any case > share our customers information or data to authorities without a warrant. > > For any other questions or concerns, feel free to contact us at any > time. We are available 24/7. > > Good luck with that privacy project of yours and keep on supporting the > cause of free speech! > > Thank you for contacting OVH and have a wonderful day! > > Colin K. > Customer Advocate" > > -- > > Not that it matters anymore, but each relay was dedicated to one of the > victims of the Charlie Hebdo attack. > https://atlas.torproject.org/#search/4charlie > > -- > > Eventually I will get back at this... But for now, my money is gone, and > all my hard work is lost. > > -- > > So... I know I'm new. And it's possible this has happened (many times) > before, but... You've been warned. > > > Speak Freely > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -- Christopher Patti - Geek At Large | GTalk: cpa...@gmail.com | AIM: chrisfeohpatti | P: (260) 54PATTI "Technology challenges art, art inspires technology." - John Lasseter, Pixar ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
This++ On 02/25/2015 07:32 PM, Pascal wrote: > If you paid with a credit card, give them a choice: they can either > refund your money or you will initiate a chargeback. Either way you get > your money back, but with the chargeback you will probably get all of > your money back instead of a prorated refund, they have to pay a fee, > and may have their merchant account terminated if they get enough of them. > > -Pascal > > > On 2/25/2015 12:35 PM, Speak Freely wrote: >> This has cost me hundreds of dollars, as I foolishly decided to prepay >> on an annual basis. None of the servers were older than 2 months. Some >> were only a few weeks old. > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
On February 25, 2015 8:21:32 PM Speak Freely wrote: Hi, Oh yes, my money is gone already. They have no interest in talking to me anymore, as the decision was final. The Abuse department won't talk to the Support department, and the abuse department won't talk to me. Thats really sad. Spam abuse reports are hitting me pretty much every day @ Online SAS (online.net, France). I fill out their abuse formular every time "This is an Tor Exit Node with a reduced Exit policy". It's a 72 hour deadline. Works fine, they never shut down anything. Every country and every ISP seems to be a completely different game :-( I'd be more inclined to think these spam assassin fellas/"evil doer finders" just parsed the exit-node files and decide WHOOPIDY-DO I did my job! Over-zealous punks trying to get their lists larger than their competitor. OVH appears to have based these accusations on what other websites have said about my IP addresses, and not a single actual complaint against the relays I run. But I could be wrong. Either way... It's unfortunate. OVH has never contacted me for anything, except to notify me of connections to the manager. For clarification from their email to me where they showed positive feelings toward Tor, here is my original email to them about me running those relays. The first paragraph butters them up, and the second last paragraph attempts to show that I wanted to run clean, safe relays. - "Greetings, I'm a current customer with two VPS servers with you, so far you've been awesome! I've never met anyone who has heard of you, that that is beyond shocking. Your prices are better than almost everyone, your service is superior, and I'm pretty sure your claims regarding hardware performance are the closest I've ever experienced to truth. Alright now to the fun stuff. Section 1) I have read online that you are accommodating to users setting up Tor *middle* relays on VPS accounts, and as such I recently set one up. However, that wasn't necessarily the brightest decision on my part. Can you confirm that you let customers run Tor *middle* relays? These are the none-exiting relays. Given the recent activities around the world, I'd like to set several more relays up. If you do let customers install Tor, can they be installed on VPS Classic accounts? Here is a description of the Tor platform, (https://www.torproject.org/eff/tor-dmca-response.html.en) ... Tor is network software that helps users to enhance their privacy, security, and safety online. It does not host any content. Rather, it is part of a network of nodes on the Internet that simply pass packets among themselves before sending them to their destinations, just as any Internet intermediary does. The difference is that Tor tunnels the connections such that no hop can learn both the source and destination of the packets, giving users protection from nefarious snooping on network traffic. The result is that, unlike most other Internet traffic, the final IP address that the recipient receives is not the IP address of the sender. Tor protects users against hazards such as harassment, spam, and identity theft. Initial development of Tor, including deployment of a public-use Tor network, was a project of the U.S. Naval Research Laboratory, with funding from ONR and DARPA. (For more on Tor, see https://www.torproject.org/.) I hope, as an organization committed to protecting the privacy of its customers, you'll agree that this is a valuable technology. ... Section 2) I've read online nothing but ambiguity regarding exit relays. My current understanding is that if we run them, we risk the account being terminated. Would you terminate the single VPS server, or my entire account with all of my VPSs? If this somewhat murky situation is the case, would you be willing to assist me with minor activities in locking down the server? If I run exit relays, I want to use rather extreme exit policies, locking out most ports, and only allowing certain traffic through. I don't want to create a conduit for illicit downloading of videos, software, games, etc. And child pornography. Surely there has to be something your SysAdmins can do to help stop that. Blacklists, I suspect. So locking out that type of traffic is important both for my sensibilities, your network, and our legal safety. I'm more than willing, and interesting in discussing this further with you. In a world where free speech is under attack, we need to protect those that speak up. Let me know. Kind regards, Matt" - I tried... I tried to be as helpful as possible in explaining what Tor is and does, and I tried to start a positive dialog and relationship with them. The numerous telephone conversations I've had with them were always quite positive and friendly. I was always assured they would contact me first, let me deal with the complaint, etc... But I
Re: [tor-relays] 7 relays gone because of spammers
On Wed, Feb 25, 2015 at 1:53 PM, Josef Stautner wrote: > He said that he ran an reduced exit policy relay. > Is portscanning even possible there? Yes. The CMU Tor exit started with the reduced exit policy, and we wound up additionally removing access to ports 22 and 23 (that is, ssh and telnet) due to continual portscanning attempts. And I mean *continual* - multiple scans an hour, 24x7x365 if we'd let it go on. Campus IT has also noticed a couple of attempts to scan port 3389 (Windows RDP) but that happens much less often. zw ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
If you paid with a credit card, give them a choice: they can either refund your money or you will initiate a chargeback. Either way you get your money back, but with the chargeback you will probably get all of your money back instead of a prorated refund, they have to pay a fee, and may have their merchant account terminated if they get enough of them. -Pascal On 2/25/2015 12:35 PM, Speak Freely wrote: This has cost me hundreds of dollars, as I foolishly decided to prepay on an annual basis. None of the servers were older than 2 months. Some were only a few weeks old. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
Oh yes, my money is gone already. They have no interest in talking to me anymore, as the decision was final. The Abuse department won't talk to the Support department, and the abuse department won't talk to me. I'd be more inclined to think these spam assassin fellas/"evil doer finders" just parsed the exit-node files and decide WHOOPIDY-DO I did my job! Over-zealous punks trying to get their lists larger than their competitor. OVH appears to have based these accusations on what other websites have said about my IP addresses, and not a single actual complaint against the relays I run. But I could be wrong. Either way... It's unfortunate. OVH has never contacted me for anything, except to notify me of connections to the manager. For clarification from their email to me where they showed positive feelings toward Tor, here is my original email to them about me running those relays. The first paragraph butters them up, and the second last paragraph attempts to show that I wanted to run clean, safe relays. - "Greetings, I'm a current customer with two VPS servers with you, so far you've been awesome! I've never met anyone who has heard of you, that that is beyond shocking. Your prices are better than almost everyone, your service is superior, and I'm pretty sure your claims regarding hardware performance are the closest I've ever experienced to truth. Alright now to the fun stuff. Section 1) I have read online that you are accommodating to users setting up Tor *middle* relays on VPS accounts, and as such I recently set one up. However, that wasn't necessarily the brightest decision on my part. Can you confirm that you let customers run Tor *middle* relays? These are the none-exiting relays. Given the recent activities around the world, I'd like to set several more relays up. If you do let customers install Tor, can they be installed on VPS Classic accounts? Here is a description of the Tor platform, (https://www.torproject.org/eff/tor-dmca-response.html.en) ... Tor is network software that helps users to enhance their privacy, security, and safety online. It does not host any content. Rather, it is part of a network of nodes on the Internet that simply pass packets among themselves before sending them to their destinations, just as any Internet intermediary does. The difference is that Tor tunnels the connections such that no hop can learn both the source and destination of the packets, giving users protection from nefarious snooping on network traffic. The result is that, unlike most other Internet traffic, the final IP address that the recipient receives is not the IP address of the sender. Tor protects users against hazards such as harassment, spam, and identity theft. Initial development of Tor, including deployment of a public-use Tor network, was a project of the U.S. Naval Research Laboratory, with funding from ONR and DARPA. (For more on Tor, see https://www.torproject.org/.) I hope, as an organization committed to protecting the privacy of its customers, you'll agree that this is a valuable technology. ... Section 2) I've read online nothing but ambiguity regarding exit relays. My current understanding is that if we run them, we risk the account being terminated. Would you terminate the single VPS server, or my entire account with all of my VPSs? If this somewhat murky situation is the case, would you be willing to assist me with minor activities in locking down the server? If I run exit relays, I want to use rather extreme exit policies, locking out most ports, and only allowing certain traffic through. I don't want to create a conduit for illicit downloading of videos, software, games, etc. And child pornography. Surely there has to be something your SysAdmins can do to help stop that. Blacklists, I suspect. So locking out that type of traffic is important both for my sensibilities, your network, and our legal safety. I'm more than willing, and interesting in discussing this further with you. In a world where free speech is under attack, we need to protect those that speak up. Let me know. Kind regards, Matt" - I tried... I tried to be as helpful as possible in explaining what Tor is and does, and I tried to start a positive dialog and relationship with them. The numerous telephone conversations I've had with them were always quite positive and friendly. I was always assured they would contact me first, let me deal with the complaint, etc... But I've come to realize this wasn't because of any complaint. Some "john" at OVH saw my IP addresses on a set of lists, most likely siphoned from the publicly available exit-relay lists, and decided I must be doing something bad. Because they're no longer talking, most of this is all a guessing game. How can you have any pudding if you don't eat your meat? How can you get your t-shirt if you don't run your relay?
Re: [tor-relays] 7 relays gone because of spammers
On 02/25/2015 07:53 PM, Josef Stautner wrote: > Is portscanning even possible there? Should better used "service discovering" or "address range scanning" ? I do observe at my exit relay since December last year, that few times per hour between 500 and 5000 different ip address are "contacted" over port 22, 80 or 443 per second over a certain time frame. (which BTW yielded into "being contacted by ISP" here too) -- Toralf pgp key: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 0076 E94E ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello, Sorry to hear this. I want to setup a big node at Voxility, which is a good provider to host Tor exits, maybe more of us can pool together financial resources and make a big cluster. I have some offers from them if interested. On 2/25/2015 8:35 PM, Speak Freely wrote: > Hello fellow relay runners, > > This morning OVH decided to kill 7 of my relays due to spamming, > and block all access to all services. I ran the Reduced Exit policy > for all of my relays. > > Due to heightened concerns about this affecting other unrelated > services I have with OVH, I had to shut down the other 3 relays. > They may eventually re-appear as middle-relays. > > This has cost me hundreds of dollars, as I foolishly decided to > prepay on an annual basis. None of the servers were older than 2 > months. Some were only a few weeks old. > > The Abuse department's rationale is as follows: "Your account was > suspended because 100% of your IPs are blacklisted on multiples > lists for Spam and other malicious activities. This case is closed > and this decision is final." > > -- > > When I first contacted OVH regarding running Tor relays, this was the > response that I received from them, which does not mesh with what > just happened. > > "Good morning Matt, > > I'm very glad to here from you. It is very flattering to hear that > you are very satisfied by our service at OVH! > > We do take our network speed and hardware performance very > seriously here. We are proud of our infrastructure that we have > built over the years. > > I do understand your concerns about setting up a Tor relay on one > of our VPS. In a simple form, yes you can. > > We do let our customers use our VPS as Tor relays. We have no > problem in letting you this. > > However, your are allowed to use Tor but it will be at your own > risk. > > Rest assure that, in case of an abuse, we will not terminate your > account without notice. In fact we may not even terminate your VPS. > You will receive a warning from our Abuse department giving you a > choice to resolve the abuse case. > > Like you said, we are in a world where free speech is constantly > under attack and we are committed to help as much as possible to > protect this fundamental right that we all have. We will absolutely > not in any case share our customers information or data to > authorities without a warrant. > > For any other questions or concerns, feel free to contact us at > any time. We are available 24/7. > > Good luck with that privacy project of yours and keep on supporting > the cause of free speech! > > Thank you for contacting OVH and have a wonderful day! > > Colin K. Customer Advocate" > > -- > > Not that it matters anymore, but each relay was dedicated to one > of the victims of the Charlie Hebdo attack. > https://atlas.torproject.org/#search/4charlie > > -- > > Eventually I will get back at this... But for now, my money is > gone, and all my hard work is lost. > > -- > > So... I know I'm new. And it's possible this has happened (many > times) before, but... You've been warned. > > > Speak Freely ___ > tor-relays mailing list tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (MingW32) iQEcBAEBCAAGBQJU7hu9AAoJEIN/pSyBJlsRD+UH/j78yJIPzCiKjeyDrJtQ2YIp 7W2aU/ESWPm8rQQQo1r8d6YYbaDSFJOyCVaaIHlNq1Iom5bn59DX4IigBhQzcINs N/ys6ysPy/RKU2E0YJssG9DIT8KrcKTDJ47mCe6WE5l7BqDCYUwp/Z03zuyxYUTy 7zBZH0KsqtQMepnTvPpSoQmG6CAJGHUuTng1+V1Fcd2WV8gpgu30P1yyBR9HigSa m0Nbo6rwDJ/DNYgFPgD4W2KC6COrZop6unSFHw5Xz6Du64ClwZidEfgYPRcm3SU6 3+rEEKvc3Zln4LirYALYaOpxPv/LyR1UAu1sqAJb0NBR4Dd2/wvyAbYxBFMhV/c= =fo3M -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
He said that he ran an reduced exit policy relay. Is portscanning even possible there? Am 25.02.2015 um 19:51 schrieb Toralf Förster: > On 02/25/2015 07:35 PM, Speak Freely wrote: >> "Your account was suspended > Does this really mean, that your money is lost already ? > Often ISPs just plugged off a server from the network till "you solved the > problem" > >> "your IPs are blacklisted on multiples lists for Spam and other malicious >> activities. > I bet, that your exit relays were used for massive port scan activities. > signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
Hello Speak Freely, that's not nice to hear. Quote: "Rest assure that, in case of an abuse, we will not terminate your account without notice. In fact we may not even terminate your VPS. You will receive a warning from our Abuse department giving you a choice to resolve the abuse case" Has OVH contacted you before because of an abuse complaint? ~Josef Am 25.02.2015 um 19:35 schrieb Speak Freely: > Hello fellow relay runners, > > This morning OVH decided to kill 7 of my relays due to spamming, and > block all access to all services. I ran the Reduced Exit policy for all > of my relays. > > Due to heightened concerns about this affecting other unrelated services > I have with OVH, I had to shut down the other 3 relays. They may > eventually re-appear as middle-relays. > > This has cost me hundreds of dollars, as I foolishly decided to prepay > on an annual basis. None of the servers were older than 2 months. Some > were only a few weeks old. > > The Abuse department's rationale is as follows: > "Your account was suspended because 100% of your IPs are blacklisted on > multiples lists for Spam and other malicious activities. > This case is closed and this decision is final." > > -- > When I first contacted OVH regarding running Tor relays, this was the > response that I received from them, which does not mesh with what just > happened. > > "Good morning Matt, > > I'm very glad to here from you. It is very flattering to hear that you > are very satisfied by our service at OVH! > > We do take our network speed and hardware performance very seriously > here. We are proud of our infrastructure that we have built over the years. > > I do understand your concerns about setting up a Tor relay on one of our > VPS. In a simple form, yes you can. > > We do let our customers use our VPS as Tor relays. We have no problem in > letting you this. > > However, your are allowed to use Tor but it will be at your own risk. > > Rest assure that, in case of an abuse, we will not terminate your > account without notice. In fact we may not even terminate your VPS. You > will receive a warning from our Abuse department giving you a choice to > resolve the abuse case. > > Like you said, we are in a world where free speech is constantly under > attack and we are committed to help as much as possible to protect this > fundamental right that we all have. We will absolutely not in any case > share our customers information or data to authorities without a warrant. > > For any other questions or concerns, feel free to contact us at any > time. We are available 24/7. > > Good luck with that privacy project of yours and keep on supporting the > cause of free speech! > > Thank you for contacting OVH and have a wonderful day! > > Colin K. > Customer Advocate" > > -- > > Not that it matters anymore, but each relay was dedicated to one of the > victims of the Charlie Hebdo attack. > https://atlas.torproject.org/#search/4charlie > > -- > > Eventually I will get back at this... But for now, my money is gone, and > all my hard work is lost. > > -- > > So... I know I'm new. And it's possible this has happened (many times) > before, but... You've been warned. > > > Speak Freely > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 7 relays gone because of spammers
On 02/25/2015 07:35 PM, Speak Freely wrote: > "Your account was suspended Does this really mean, that your money is lost already ? Often ISPs just plugged off a server from the network till "you solved the problem" > "your IPs are blacklisted on multiples lists for Spam and other malicious > activities. I bet, that your exit relays were used for massive port scan activities. -- Toralf pgp key: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 0076 E94E ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] 7 relays gone because of spammers
Hello fellow relay runners, This morning OVH decided to kill 7 of my relays due to spamming, and block all access to all services. I ran the Reduced Exit policy for all of my relays. Due to heightened concerns about this affecting other unrelated services I have with OVH, I had to shut down the other 3 relays. They may eventually re-appear as middle-relays. This has cost me hundreds of dollars, as I foolishly decided to prepay on an annual basis. None of the servers were older than 2 months. Some were only a few weeks old. The Abuse department's rationale is as follows: "Your account was suspended because 100% of your IPs are blacklisted on multiples lists for Spam and other malicious activities. This case is closed and this decision is final." -- When I first contacted OVH regarding running Tor relays, this was the response that I received from them, which does not mesh with what just happened. "Good morning Matt, I'm very glad to here from you. It is very flattering to hear that you are very satisfied by our service at OVH! We do take our network speed and hardware performance very seriously here. We are proud of our infrastructure that we have built over the years. I do understand your concerns about setting up a Tor relay on one of our VPS. In a simple form, yes you can. We do let our customers use our VPS as Tor relays. We have no problem in letting you this. However, your are allowed to use Tor but it will be at your own risk. Rest assure that, in case of an abuse, we will not terminate your account without notice. In fact we may not even terminate your VPS. You will receive a warning from our Abuse department giving you a choice to resolve the abuse case. Like you said, we are in a world where free speech is constantly under attack and we are committed to help as much as possible to protect this fundamental right that we all have. We will absolutely not in any case share our customers information or data to authorities without a warrant. For any other questions or concerns, feel free to contact us at any time. We are available 24/7. Good luck with that privacy project of yours and keep on supporting the cause of free speech! Thank you for contacting OVH and have a wonderful day! Colin K. Customer Advocate" -- Not that it matters anymore, but each relay was dedicated to one of the victims of the Charlie Hebdo attack. https://atlas.torproject.org/#search/4charlie -- Eventually I will get back at this... But for now, my money is gone, and all my hard work is lost. -- So... I know I'm new. And it's possible this has happened (many times) before, but... You've been warned. Speak Freely ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays