Re: [tor-relays] Blocking bittorrent
Not blocking torrenting at all would be nice. Free and open exchange of information is a vital part of the internet or it should be. Who are we to censor the web ? I will not. Somewhat the whole point of tor. > On 18 Jan 2021, at 2:37 PM, niftybunny > wrote: > > I never got any Bittorrent abuse with only 80 and 443 open. > >> On 18. Jan 2021, at 09:52, kagaminesama wrote: >> >> Hi, >> How do you block bittorrent nowadays? >> I read this page: >> https://gitlab.torproject.org/legacy/trac/-/wikis/BlockingBittorrent >> but http://www.trackon.org/api/all doesn't work anymore because the domain >> is expired. >> Do you know any alternatives? >> >> >> Sent with ProtonMail Secure Email. >> >> ___ >> tor-relays mailing list >> tor-relays@lists.torproject.org >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Info from my ISP about investigation of tor exits
you did the right thing: shutting down the exits as soon as any potential pressure comes up! Especially if someone mentiones 'police' its time to retreat and shut them all down. > On 3 Jan 2021, at 4:07 PM, s7r wrote: > > Olaf Grimm wrote: >> Here is the original of mail (in copy) from my provider >> Mail copy: >> "Hello, >> Unfortunately your traffic type is full of unwanted events not >> compatible with our company ethic. >> Since the first date of activity we've received many abuse reports >> regarding bruteforce, layer7 attacks, hacking and many others. >> Currently there is a police investigation regarding one of the 2 servers >> related to hacking activity against an european country security. The >> access and content is in interpol custody and we have a restriction on >> reactivation. >> Kind regards, >> George Oprea >> 24/7 Technical Support >> Zetservers.com /Romania" >> --> >> My answer: >> Thank you for your information. >> Good luck. I change my other servers to less trouble. (Change Exits to >> Relay) >> Olaf > > Is there anyone left in the interpol that doesn't know what Tor is and how it > works? Seriously, it's year 2021. > > This Technical support person appears to have no clue that the traffic is > only blindly forwarded, there's nothing on the server itself that generates > the "abusive traffic". Nothing illegal can be found on them (if it's just Tor > installed and configured as an exit relay). > > To be honest, I don't get these hosting providers that are so scared of brute > force and layer 7 attacks. These small hosting companies behave like back in > the 2000's when everything was so scary, when an IP address usually meant one > person or one physical address to bust the door. > > Rather than changing from Exits to middles, try to explain to this small > hosting company what Tor is and how it works. There are plenty of Tor exits > in Romania, because it has very good internet, show them some AS number > examples from the same country so they will grow some courage that they are > not the only ones. Also tell them that there are many thousands of servers > worldwide, most of them within the European Union which RO is part of. And > leave the Exits to Exits ;) > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] attacks from problematic tor exit relays
hey, there is a decent amount of academic research papers on this very question. If I remember correctly the tor project homepage does offer some resources. Some of these papers are quite technical, but even as a non infosec professional I was able to get the basic concept most of the times. greets > On 24 Dec 2020, at 11:10 PM, BRBfGWMz wrote: > > I am trying to guess what kind of target attacks are possible through > problematic relays. > > Suppose the network relay is controlled by the enemy. > > How do they determine the original IP address of the outbound traffic? > Correlation attacks are possible, but they seem very difficult and probably > require a lot of resources. Also, changing the route stops this. > > If I assume that they determine what traffic flow is mine, and that I always > use the same route, what attacks are possible? Are there any good posts or > videos? > > > > -- > Sent using MsgSafe.io's Free Plan > Private, encrypted, online communication > For everyone. www.msgsafe.io > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Relay operators meetup @ rC3
Hey, I'm still in the process of setting up my first relay so technically no operator yet, but I'd love to attent to ask a few noobish questions and discuss some specifics. Of course I'm talking about an actual, real meeting. I am not interested in online-meetings, which aren't meetings in my opinion. kind regards > On 27 Dec 2020, at 10:54 PM, Stefan Leibfarth wrote: > > Hello Tor friends and relay operators, > > I haven't heard of a relay operators meetup at the ongoing rC3. > Are there any plans? > If not, who of you is interested? > > It would be my pleasure arrange a session. > Please get back to me. > > Cheers > Leibi > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Question: RAM requirement for an exit relay
hey, partly related to original question: I'm planning to set up a new exit. My very first relay. I'm planning to use a small SoC with 2GB ram. Something running on ARM like a raspberry pi. Is this feasible or even a good idea? Regards On 14 Dec 2020, at 15:10, to...@protonmail.com wrote: I have several 1 G RAM exits running unbound without a problem. They never seem to hit swap, either. On FreeBSD: last pid: 83973; load averages: 0.86, 0.71, 0.62 up 130+15:44:28 16:02:04 23 processes: 2 running, 21 sleeping CPU: 43.1% user, 0.0% nice, 2.7% system, 5.5% interrupt, 48.6% idle Mem: 101M Active, 734M Inact, 444M Wired, 151M Buf, 210M Free Swap: 512M Total, 512M Free Go for it, --Torix ‐‐‐ Original Message ‐‐‐ > On Monday, December 14, 2020 1:11 PM, wrote: > >> On 14.12.2020 13:58, li...@for-privacy.net wrote: >> >> grep VmPeak/proc/$PID/status = 181836 kB > > A non exit has less: > grep VmPeak/proc/$PID/status = 57336 kB > tor-proxy-02.for-privacy.net ^^ > > --- > > ╰_╯ Ciao Marco! > > Debian GNU/Linux > > It's free software and it gives you freedom! > > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Exit node on Contabo
What a joke, their reply. You could argue that an occasional abuse complaint is a normal and to be expected feature of any web service. Furthermore you could attack this particular section: "...has knowledge of abuse or fraudulent or unlawful use." You could argue that this particular case hasn't been litigated yet, therefore it isn't acceptable to conclude now that a fraudulent or unlawful use has occurred at all. Maybe the person filing the abuse claim was a bit overzealous or even outright wrong. This needs to be investigated first. There is a perfect term in German for this. Their trying to shut you down "in vorauseilendem Gehorsam". You can throw that at them, it will hurt ;) If they're stubborn I'd go offensive here and threat them with expensive civil rights litigation. greets On 9 Dec 2020, at 11:57, Nuno Rego wrote: Short experience at Contabo. After 10 days, and after the first abuse complaint of. " Dear Mr Rego, Thank you for your reply. Generally, it is not denied to use TOR nodes on our services. However, in case it cannot be ensured that those services will not be misused, we have to ask to remove the service from our network. We also included a rule in our terms of services, please see here: § 10 Limitation regarding content (5) The Provider reserves the right to immediately suspend of any server or webspace package on which any kind of proxy service, such as VPN or TOR, is operated, for which the Provider has knowledge of abuse or fraudulent or unlawful use. Please come back within given time frame (you still have 18 hours left) and confirm that you have removed the TOR node. After that we can close this abuse case. Thank you for your cooperation. If you have any questions or need help, please do not hesitate to contact us. -- Best regards / Mit freundlichen Grüßen, Anneli Ulfig Kundenservice / Customer support Contabo GmbH Aschauer Straße 32a 81549 München https://contabo.com; Cumprimentos; -- Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: https://tutanota.com ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] anyone else with this issue?
as far as I know many darknet markets are being targeted with massive ddos attacks. For example empire (biggest market as of recently) went down on August 22. Not sure if those issues are connected since the DN market ddos racketeering is more or less a permanent feature. greets > On Aug 25, 2020, at 8:43 PM, niftybunny > wrote: > > Daily DDOS love the last 14 days … > > https://imgur.com/a/rfu0OUA > > even for my standards, thats a shit-ton of sockets … Tor DDOS protection is > configured but I get more connections than I can drop … > > nifty > > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays