Re: [tor-relays] SSH scans from Tor exit

2014-04-29 Thread grarpamp
On Tue, Apr 29, 2014 at 5:26 PM, Nicolas Christin wrote: > The level of intelligence of the people that receive these complaints > is irrelevant. It is, in fact, entirely relevant. Clueless recipients (and their upstream) leads directly to improper kneejerk responses, such as "pull the project".

Re: [tor-relays] running Tor relay live with AddressSanitizer

2014-04-29 Thread starlight . 2014q2
>I'm sold on integrating AddressSanitizer into Tor >as a compile-time option. I've got a ticket for >doing so #11477 >(https://trac.torproject.org/projects/tor/ticket/11477). >I've uploaded your patch there, and am looking >into how to better integrate it. If you could >make sure that the code _I

Re: [tor-relays] can the old compromised keys be invalidated, "named" be recovered

2014-04-29 Thread Michael Wolf
On 4/29/2014 6:06 PM, starlight.201...@binnacle.cx wrote: > I just read that the relay can't get its > old name back for six months now that > the keys have been changed due to > Heartbleed. The "Named" flag is being done away with. Use your old nickname, or whichever nickname you want... it won'

[tor-relays] can the old compromised keys be invalidated, "named" be recovered

2014-04-29 Thread starlight . 2014q2
I just read that the relay can't get its old name back for six months now that the keys have been changed due to Heartbleed. Does any way exist to invalidate the old keys and transfer the name to the new relay? I realize that naming a relay is strictly an exercise in vanity, but hey, who is entir

Re: [tor-relays] SSH scans from Tor exit

2014-04-29 Thread Nicolas Christin
On Tue Apr 29, 2014, grarpamp wrote: > > On 4/28/2014 10:04 PM, Zack Weinberg wrote: > >> For what it's worth, after complaints from campus IT we also wound up > >> blocking SSH in the CMU Tor exit's policy. > > Sounds like IT is conflicted and sans balls... permits relay service, > but well, doe

Re: [tor-relays] SSH scans from Tor exit

2014-04-29 Thread Ed Carter
Robert, There is some good advice for exit relay operators on the Tor website that might be helpful. Included are templates you can use for responding to abuse complaints received by your ISP. https://trac.torproject.org/projects/tor/wiki//doc/TorExitGuidelines https://blog.torproject.org/runni

Re: [tor-relays] SSH scans from Tor exit

2014-04-29 Thread Andy Isaacson
On Mon, Apr 28, 2014 at 11:23:19PM -0400, Michael Wolf wrote: > Will they request that port 80 be blocked > because of the SQL injection and Wordpress vulnerability scans? Yes, in fact we do get requests for exactly that (mostly from misguided CERT type organizations). "We support anonymity, bu

Re: [tor-relays] SSH scans from Tor exit

2014-04-29 Thread Scott Bennett
I wrote: > What do you suggest I missed in the documentation? > Exit policies. I wrote that in my earlier message. Scott Bennett, Comm. ASMELG, CFIAG ** * Internet: bennett at sdf.org

Re: [tor-relays] SSH scans from Tor exit

2014-04-29 Thread grarpamp
On Mon, Apr 28, 2014 at 6:31 PM, I wrote: > Is this happening to anyone else? Yes. Many relay ops effectively ignore it, as they have often positioned themselves beforehand to do so. > Does anyone know what can be done to stop it? Block *:22 in your exit policy. Offer your vps that you will acc