[tor-relays] How to handle an abuse report

2014-05-14 Thread Ch'Gans
Hi all, Since 3 weeks, I'm running a TOR exit node [1] on a server I rent from Hetzner (A German hosting company), after reading about using Hetzner to run a TOR node, I decided to go for the restricted mode to avoid any stupid copywrong issue (That is, I allowed only a limited set of ports,

Re: [tor-relays] Remove From LIST

2014-05-14 Thread Sven Reissmann
Actually, there is a great description on How to unsubscribe from a mailman mailinglist available. Maybe link this in the footer section. http://article.gmane.org/gmane.network.opennms.general/7202 Regards, Sven. -- PGP Key: https://0x80.io/pub/files/key.asc PGP Key Fingerprint: 2DF2 79CD 48DD

Re: [tor-relays] How to handle an abuse report

2014-05-14 Thread Lunar
Jeroen Massar: Now, I have to report to Hetzner, I will tell them that I'm running a TOR exit node in restricted mode, but how can I defend myself, I am not sure that my restricted node and given the nature of the TOR network arguments will convinced them the Hetzner dudes. You cannot

Re: [tor-relays] How to handle an abuse report

2014-05-14 Thread Eugen Leitl
On Wed, May 14, 2014 at 10:08:47PM +1200, Ch'Gans wrote: Hi all, Since 3 weeks, I'm running a TOR exit node [1] on a server I rent from Hetzner (A German hosting company), after reading about using Hetzner to run a TOR node, I decided to go for the restricted mode Hetzner doesn't like

Re: [tor-relays] Malicious or crappily configured exit node

2014-05-14 Thread Ch'Gans
On 14/05/14 23:16, u wrote: Hello! referring to https://trac.torproject.org/projects/tor/wiki/doc/badRelays, i sent this also to tor-assistances@tpo. Never got an answer though :( One of the reason I've heard on other mailing lists, is that people sometimes get flagged as spam, and indeed

Re: [tor-relays] How to handle an abuse report

2014-05-14 Thread Ch'Gans
On 15/05/14 01:02, Ed Carter wrote: The abuse reply templates located at https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates contain some good ideas about how to reply to various complaints. Hi Ed, Thanks for the link, I still haven't decided yet how to handle this, but for

Re: [tor-relays] How to handle an abuse report

2014-05-14 Thread Moritz Bartl
On 05/14/2014 01:29 PM, Lunar wrote: about an exit. You are responsible what happens from that IP. Sorry but the last statement is wrong in many jurisdictions: https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines#Legal For Germany, see TMG §8 and §15. True, but the location of

Re: [tor-relays] How to handle an abuse report

2014-05-14 Thread Moritz Bartl
Hi, On 05/14/2014 01:09 PM, Ch'Gans wrote: Yes, I did. And it's neither all-white nor all-black, so I decided i would give it a go, in restricted mode w/ finger crossed. Update: OK, maybe... After reading again and again, it's more a deep-dark-grey than a white, Regardless, you should

[tor-relays] my orphan relay

2014-05-14 Thread eliaz
I'm running an ordinary bridge on what I think is a respectable duty cycle, but over the past three or so months it's not carried any traffic at all. With the advent of obfsproxy bridges, does the algorithm(?) that serves out bridge addresses no longer recognize ordinary bridges? Are ordinary

Re: [tor-relays] Malicious or crappily configured exit node

2014-05-14 Thread Lunar
Thomas Themel: Excerpts from u's message of Wed May 14 13:16:21 +0200 2014: I'm not quite sure where to report this (that is how this e-mail ends up on tor-relays :) ), nor how to avoid this exit node. Is there a way to do that? ExcludeNodes in torrc allows you to avoid this node, enjoy

Re: [tor-relays] Malicious or crappily configured exit node

2014-05-14 Thread u
Lunar: Thomas Themel: Excerpts from u's message of Wed May 14 13:16:21 +0200 2014: I'm not quite sure where to report this (that is how this e-mail ends up on tor-relays :) ), nor how to avoid this exit node. Is there a way to do that? ExcludeNodes in torrc allows you to avoid this node,

Re: [tor-relays] Ops request: Deploy OpenVPN terminators

2014-05-14 Thread grarpamp
On Tue, May 13, 2014 at 8:27 PM, Tom Ritter t...@ritter.vg wrote: This seems very similar to the idea of having private exit nodes: https://www.torproject.org/docs/faq#HideExits Tor daemon must of course know its exit OR ip's+ports via some mechanism (currently, distributed consensus), or Tor

[tor-relays] Thinking about deploying a new node

2014-05-14 Thread Lance Hathaway
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 So, every now and then, somebody asks what the best use of a node would be--bridge, relay, or exit. And yes, this is one of those requests. This would be a VPS from VPS Nodes. I checked the list of good and bad ISPs, and they don't seem to be

[tor-relays] Fwd: [tor-talk] Fwd: Ops request: Deploy OpenVPN terminators

2014-05-14 Thread grarpamp
to list, not me. -- Forwarded message -- From: Mirimir miri...@riseup.net Date: Wed, May 14, 2014 at 11:58 PM Subject: Re: [tor-talk] Fwd: [tor-relays] Ops request: Deploy OpenVPN terminators On 05/14/2014 09:07 PM, grarpamp wrote: On Tue, May 13, 2014 at 5:48 PM, Jeroen Massar