Re: [tor-relays] MY IP adress on blacklist and then in exit relay policy

2015-03-30 Thread Cmar433
My torrc not contain my ipadress as exit policy.
But I can see it in globe.
I read somewhere, that TOR is reading some blacklists and implement this 
blacklist to exit policy, like central management. Beacuse i was (my ip adress) 
in the blacklist ...
But i cannot find now where .. ..Maybe  was wrong.

Any other service not running on my relays (i am running 3, 2 in czech and 1 in 
kazakhstan).




30.03.2015, 18:39, "Zack Weinberg" :
> On Mon, Mar 30, 2015 at 11:45 AM, Cmar433  wrote:
>>  Thanks for answer. But main question was not about provider .. (is TOR 
>> friendly).
>>  I was surprised, that my IP is stored  in Exit policy as "reject".
>
> Oh! I'm sorry, I did not understand what you were asking at first.
>
> The only way your exit node's own IP address could be in the exit
> policy is if someone put it there.  Maybe you did that and you don't
> remember doing it?  If you didn't do it, then you might indeed have
> had your node broken into, and you should consider rebuilding it from
> scratch.
>
> (I can make a case for forbidding exit-to-self, particularly if the
> exit node runs any other services.  But running other services on an
> exit node is a bad idea in the first place.)
>
> zw
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] MY IP adress on blacklist and then in exit relay policy

2015-03-30 Thread Speak Freely
Hopefully I won't be adding too much confusion into the conversation...


When you see reject 37.157.192.208:*, it means not to accept anything
sourced from your IP. For example, if you were to run a Tor client on
your server that's running the relay, you would not be able to exit the
Tor network from your server... But why would you, right?

This appears to be standard, as all of my relays did the same thing
automagically. Nothing to worry about.

(I could be wrong.)

Oh, and if you're running 3 relays, use MyFamily field! :)



Matt
Speak Freely

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] MY IP adress on blacklist and then in exit relay policy

2015-03-30 Thread Cmar433
Thanks for answer. But main question was not about provider .. (is TOR 
friendly).
I was surprised, that my IP is stored  in Exit policy as "reject".
I was afraid .. that all trafic is droped, but now seems all is OK. (IP is 
still in exit policy, but chart showing traffic)

Thanks
cmar




30.03.2015, 17:02, "Zack Weinberg" :
> This *will* happen again.  You need to have a conversation with your
> provider and convince them to ignore reports of this form for your
> exit node, or else you need to get a new provider.  I would open the
> conversation with something like this:
>
> | This machine is a Tor exit node, which, as part of its normal operation,
> | proxies traffic for other hosts on the Internet.  By design, it is 
> impossible
> | for me to identify those other hosts or communicate with their operators.
> | It is one of those other hosts that was infected with s_downloaderbot-mxb.
> |
> | Because Tor users are very diverse, I can't guarantee that this will never
> | happen again.  You should expect ongoing false positives for this machine
> | on all checks for malware infection, outdated operating system, etc.
> |
> | I have the ability to disable proxying to specific IP address ranges and
> | specific TCP ports, but this should be considered a last resort tactic.  It
> | does not actually prevent anyone from using Tor to send spam or whatever;
> | the traffic will just move to some other exit node.  I also have the
> ability to
> | limit the total bandwidth consumed by Tor.
> |
> | I'm happy to work with you to minimize the impact of this service on your
> | network.  I hope you will consider allowing it to remain in operation, as it
> | is extremely valuable for people who need to conceal their official
> | identities online, especially in countries where access to the Internet
> | is restricted.  For more information please see
> | https://www.torproject.org/about/overview.html#overview
>
> zw
>
> On Mon, Mar 30, 2015 at 9:04 AM, Cmar433  wrote:
>>  
>> https://globe.torproject.org/#/relay/9DCF76179FCF47224D235ECD4A6165FED22ECE7B
>>
>>  So, i am running exit node. My provider send me an email .. "This IP is 
>> infected with, or is NATting for a machine infected with s_downloaderbot-mxb"
>>  Any idea what can i do with this problem ?
>>
>>  Now i can see my IP in my server exit policy ...
>>
>>  After my "delist action" is clean ..
>>
>>  http://www.senderbase.org/lookup/ip/?search_string=37.157.192.208
>>
>>  I need just wait ? And all outgoing packet from my server still droped ?
>>
>>  Thanks ..
>>  ___
>>  tor-relays mailing list
>>  tor-relays@lists.torproject.org
>>  https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] MY IP adress on blacklist and then in exit relay policy

2015-03-30 Thread Roger Dingledine
On Mon, Mar 30, 2015 at 12:23:21PM -0400, Zack Weinberg wrote:
> The only way your exit node's own IP address could be in the exit
> policy is if someone put it there.  Maybe you did that and you don't
> remember doing it?  If you didn't do it, then you might indeed have
> had your node broken into, and you should consider rebuilding it from
> scratch.
> 
> (I can make a case for forbidding exit-to-self, particularly if the
> exit node runs any other services.  But running other services on an
> exit node is a bad idea in the first place.)

No, this is fine and normal. Tor relays automatically add themselves to
their exit policy by default.

See the ExitPolicyRejectPrivate option in the man page.

https://lists.torproject.org/pipermail/tor-announce/2008-January/33.html

--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] MY IP adress on blacklist and then in exit relay policy

2015-03-30 Thread Zack Weinberg
On Mon, Mar 30, 2015 at 11:45 AM, Cmar433  wrote:
> Thanks for answer. But main question was not about provider .. (is TOR 
> friendly).
> I was surprised, that my IP is stored  in Exit policy as "reject".

Oh! I'm sorry, I did not understand what you were asking at first.

The only way your exit node's own IP address could be in the exit
policy is if someone put it there.  Maybe you did that and you don't
remember doing it?  If you didn't do it, then you might indeed have
had your node broken into, and you should consider rebuilding it from
scratch.

(I can make a case for forbidding exit-to-self, particularly if the
exit node runs any other services.  But running other services on an
exit node is a bad idea in the first place.)

zw
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] MY IP adress on blacklist and then in exit relay policy

2015-03-30 Thread yl
Am 30.03.2015 um 15:04 schrieb Cmar433:
> Now i can see my IP in my server exit policy ...

Well you probably added that in the beginning, "reject 37.157.192.208:*"
will cause that you exit relay will reject any connections to the IP
37.157.192.208, which is the IP Tor is running on. That means someone
running on a tor connection can't access your IP from your exit node.

This has nothing to do with the complaint you received, anyone using tor
and happening to exit via you tor relay will look as if he is using the
IP 37.157.192.208. So if there is a machine being infected with a virus
or bot it will look as if you server "37.157.192.208" is infected with
that malicious software. You can not change that if you run an exit node.

All you can do is politely inform anyone complaining, the message of
Zack is actually pretty well written. It is normal to receive such
complaints, but you might want to check with your hoster to ignore some
of them, they usually understand what tor is and also understand that
complaints are not caused by you.

yl
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] MY IP adress on blacklist and then in exit relay policy

2015-03-30 Thread Zack Weinberg
This *will* happen again.  You need to have a conversation with your
provider and convince them to ignore reports of this form for your
exit node, or else you need to get a new provider.  I would open the
conversation with something like this:

| This machine is a Tor exit node, which, as part of its normal operation,
| proxies traffic for other hosts on the Internet.  By design, it is impossible
| for me to identify those other hosts or communicate with their operators.
| It is one of those other hosts that was infected with s_downloaderbot-mxb.
|
| Because Tor users are very diverse, I can't guarantee that this will never
| happen again.  You should expect ongoing false positives for this machine
| on all checks for malware infection, outdated operating system, etc.
|
| I have the ability to disable proxying to specific IP address ranges and
| specific TCP ports, but this should be considered a last resort tactic.  It
| does not actually prevent anyone from using Tor to send spam or whatever;
| the traffic will just move to some other exit node.  I also have the
ability to
| limit the total bandwidth consumed by Tor.
|
| I'm happy to work with you to minimize the impact of this service on your
| network.  I hope you will consider allowing it to remain in operation, as it
| is extremely valuable for people who need to conceal their official
| identities online, especially in countries where access to the Internet
| is restricted.  For more information please see
| https://www.torproject.org/about/overview.html#overview

zw

On Mon, Mar 30, 2015 at 9:04 AM, Cmar433  wrote:
>
>
> https://globe.torproject.org/#/relay/9DCF76179FCF47224D235ECD4A6165FED22ECE7B
>
> So, i am running exit node. My provider send me an email .. "This IP is 
> infected with, or is NATting for a machine infected with s_downloaderbot-mxb"
> Any idea what can i do with this problem ?
>
>
>
> Now i can see my IP in my server exit policy ...
>
> After my "delist action" is clean ..
>
> http://www.senderbase.org/lookup/ip/?search_string=37.157.192.208
>
> I need just wait ? And all outgoing packet from my server still droped ?
>
> Thanks ..
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] MY IP adress on blacklist and then in exit relay policy

2015-03-30 Thread Cmar433


https://globe.torproject.org/#/relay/9DCF76179FCF47224D235ECD4A6165FED22ECE7B

So, i am running exit node. My provider send me an email .. "This IP is 
infected with, or is NATting for a machine infected with s_downloaderbot-mxb"
Any idea what can i do with this problem ?



Now i can see my IP in my server exit policy ...

After my "delist action" is clean ..

http://www.senderbase.org/lookup/ip/?search_string=37.157.192.208

I need just wait ? And all outgoing packet from my server still droped ?   

Thanks ..
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays