Re: [tor-relays] Blocking bittorrent

2021-01-19 Thread Amadeus Ramazotti
Not blocking torrenting at all would be nice. Free and open exchange of 
information is a vital part of the internet or it should be. 
Who are we to censor the web ? I will not. Somewhat the whole point of tor. 


> On 18 Jan 2021, at 2:37 PM, niftybunny 
>  wrote:
> 
> I never got any Bittorrent abuse with only 80 and 443 open.
> 
>> On 18. Jan 2021, at 09:52, kagaminesama  wrote:
>> 
>> Hi,
>> How do you block bittorrent nowadays?
>> I read this page:
>> https://gitlab.torproject.org/legacy/trac/-/wikis/BlockingBittorrent
>> but http://www.trackon.org/api/all doesn't work anymore because the domain 
>> is expired. 
>> Do you know any alternatives?
>> 
>> 
>> Sent with ProtonMail Secure Email.
>> 
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Info from my ISP about investigation of tor exits

2021-01-07 Thread Amadeus Ramazotti
you did the right thing: shutting down the exits as soon as any potential 
pressure comes up! Especially if someone mentiones 'police' its time to retreat 
and shut them all down.

> On 3 Jan 2021, at 4:07 PM, s7r  wrote:
> 
> Olaf Grimm wrote:
>> Here is the original of mail (in copy) from my provider
>> Mail copy:
>> "Hello,
>> Unfortunately your traffic type is full of unwanted events not
>> compatible with our company ethic.
>> Since the first date of activity we've received many abuse reports
>> regarding bruteforce, layer7 attacks, hacking and many others.
>> Currently there is a police investigation regarding one of the 2 servers
>> related to hacking activity against an european country security. The
>> access and content is in interpol custody and we have a restriction on
>> reactivation.
>> Kind regards,
>> George Oprea
>> 24/7 Technical Support
>> Zetservers.com /Romania"
>> -->
>> My answer:
>> Thank you for your information.
>> Good luck. I change my other servers to less trouble.  (Change Exits to
>> Relay)
>> Olaf
> 
> Is there anyone left in the interpol that doesn't know what Tor is and how it 
> works? Seriously, it's year 2021.
> 
> This Technical support person appears to have no clue that the traffic is 
> only blindly forwarded, there's nothing on the server itself that generates 
> the "abusive traffic". Nothing illegal can be found on them (if it's just Tor 
> installed and configured as an exit relay).
> 
> To be honest, I don't get these hosting providers that are so scared of brute 
> force and layer 7 attacks. These small hosting companies behave like back in 
> the 2000's when everything was so scary, when an IP address usually meant one 
> person or one physical address to bust the door.
> 
> Rather than changing from Exits to middles, try to explain to this small 
> hosting company what Tor is and how it works. There are plenty of Tor exits 
> in Romania, because it has very good internet, show them some AS number 
> examples from the same country so they will grow some courage that they are 
> not the only ones. Also tell them that there are many thousands of servers 
> worldwide, most of them within the European Union which RO is part of. And 
> leave the Exits to Exits ;)
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] attacks from problematic tor exit relays

2020-12-31 Thread Amadeus Ramazotti
hey,
there is a decent amount of academic research papers on this very question.

If I remember correctly the tor project homepage does offer some resources.

Some of these papers are quite technical, but even as a non infosec 
professional I was able to get the basic concept most of the times.


greets

> On 24 Dec 2020, at 11:10 PM, BRBfGWMz  wrote:
> 
> I am trying to guess what kind of target attacks are possible through 
> problematic relays.
> 
> Suppose the network relay is controlled by the enemy.
> 
> How do they determine the original IP address of the outbound traffic? 
> Correlation attacks are possible, but they seem very difficult and probably 
> require a lot of resources. Also, changing the route stops this.
> 
> If I assume that they determine what traffic flow is mine, and that I always 
> use the same route, what attacks are possible? Are there any good posts or 
> videos?
> 
> 
> 
> --
> Sent using MsgSafe.io's Free Plan
> Private, encrypted, online communication
> For everyone. www.msgsafe.io
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay operators meetup @ rC3

2020-12-28 Thread Amadeus Ramazotti
Hey,
I'm still in the process of setting up my first relay so technically no 
operator yet, but I'd love to attent to ask a few noobish questions and discuss 
some specifics. 

Of course I'm talking about an actual, real meeting. I am not interested in 
online-meetings, which aren't meetings in my opinion.

kind regards

> On 27 Dec 2020, at 10:54 PM, Stefan Leibfarth  wrote:
> 
> Hello Tor friends and relay operators,
> 
> I haven't heard of a relay operators meetup at the ongoing rC3.
> Are there any plans?
> If not, who of you is interested?
> 
> It would be my pleasure arrange a session.
> Please get back to me.
> 
> Cheers
> Leibi
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Question: RAM requirement for an exit relay

2020-12-15 Thread Amadeus Ramazotti
hey, 
partly related to original question: 
I'm planning to set up a new exit. My very first relay. I'm planning to use a 
small SoC with 2GB ram. Something running on ARM like a raspberry pi. 

Is this feasible or even a good idea?

Regards


On 14 Dec 2020, at 15:10, to...@protonmail.com wrote:

I have several 1 G RAM exits running unbound without a problem.  They never 
seem to hit swap, either.  On FreeBSD:
last pid: 83973;  load averages:  0.86,  0.71,  0.62
  up 130+15:44:28 16:02:04
23 processes:  2 running, 21 sleeping
CPU: 43.1% user,  0.0% nice,  2.7% system,  5.5% interrupt, 48.6% idle
Mem: 101M Active, 734M Inact, 444M Wired, 151M Buf, 210M Free
Swap: 512M Total, 512M Free

Go for it,

--Torix


‐‐‐ Original Message ‐‐‐
> On Monday, December 14, 2020 1:11 PM,  wrote:
> 
>> On 14.12.2020 13:58, li...@for-privacy.net wrote:
>> 
>> grep VmPeak/proc/$PID/status = 181836 kB
> 
> A non exit has less:
> grep VmPeak/proc/$PID/status = 57336 kB
> tor-proxy-02.for-privacy.net ^^
> 
> ---
> 
> ╰_╯ Ciao Marco!
> 
> Debian GNU/Linux
> 
> It's free software and it gives you freedom!
> 
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Exit node on Contabo

2020-12-09 Thread Amadeus Ramazotti
What a joke, their reply.

You could argue that an occasional abuse complaint is a normal and to be 
expected feature of any web service. 

Furthermore you could attack this particular section: "...has knowledge of 
abuse or fraudulent or unlawful use."

You could argue that this particular case hasn't been litigated yet, therefore 
it isn't acceptable to conclude now that a fraudulent or unlawful use has 
occurred at all. 
Maybe the person filing the abuse claim was a bit overzealous or even outright 
wrong. This needs to be investigated first.

There is a perfect term in German for this.
Their trying to shut you down "in vorauseilendem Gehorsam". You can throw that 
at them, it will hurt ;)

If they're stubborn I'd go offensive here and threat them with expensive civil 
rights litigation. 

greets 




On 9 Dec 2020, at 11:57, Nuno Rego  wrote:


Short experience at Contabo. After 10 days, and after the first abuse complaint 
of.

"
Dear Mr Rego,

Thank you for your reply.

Generally, it is not denied to use TOR nodes on our services. However, in case 
it cannot be ensured that those services will not be misused, we have to ask to 
remove the service from our network. We also included a rule in our terms of 
services, please see here:

§ 10 Limitation regarding content

(5) The Provider reserves the right to immediately suspend of any server or 
webspace package on which any kind of proxy service, such as VPN or TOR, is 
operated, for which the Provider has knowledge of abuse or fraudulent or 
unlawful use.

Please come back within given time frame (you still have 18 hours left) and 
confirm that you have removed the TOR node. After that we can close this abuse 
case.

Thank you for your cooperation.

If you have any questions or need help, please do not hesitate to contact us.

--
Best regards / Mit freundlichen Grüßen,

Anneli Ulfig
Kundenservice / Customer support

Contabo GmbH
Aschauer Straße 32a
81549 München
https://contabo.com;


Cumprimentos;

-- 
Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
https://tutanota.com
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] anyone else with this issue?

2020-08-26 Thread Amadeus Ramazotti

as far as I know many darknet markets are being targeted with massive ddos 
attacks. For example empire (biggest market as of recently) went down on August 
22. 

Not sure if those issues are connected since the DN market ddos racketeering is 
more or less a permanent feature.

greets



> On Aug 25, 2020, at 8:43 PM, niftybunny 
>  wrote:
> 
> Daily DDOS love the last 14 days …
> 
> https://imgur.com/a/rfu0OUA
> 
> even for my standards, thats a shit-ton of sockets … Tor DDOS protection is 
> configured but I get more connections than I can drop …
> 
> nifty
> 
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays