Re: [tor-relays] Simplifying ExoneraTor

2015-07-05 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04/07/15 10:55, David Serrano wrote: On 2015-07-02 09:40:31 (+0200), Karsten Loesing wrote: Julius and I have been working on a design mockup for the ExoneraTor service for the past few months and would want to hear what you think about this:

Re: [tor-relays] Simplifying ExoneraTor

2015-07-05 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/07/15 14:20, teor wrote: On 5 Jul 2015, at 19:37 , Karsten Loesing kars...@torproject.org wrote: Results: do we really need the Exit: yes column? Seems pretty redundant to me. I think this is answered later in this thread. We should

Re: [tor-relays] Simplifying ExoneraTor

2015-07-05 Thread teor
On 5 Jul 2015, at 23:26 , Karsten Loesing kars...@torproject.org wrote: Also, there seems to be 24 rows with white background, then 24 with light grey bg. If the search returns eg. 30 results, then only the last 6 would be in grey, and users could potentially think there's something

Re: [tor-relays] Simplifying ExoneraTor

2015-07-05 Thread teor
On 5 Jul 2015, at 19:37 , Karsten Loesing kars...@torproject.org wrote: Results: do we really need the Exit: yes column? Seems pretty redundant to me. I think this is answered later in this thread. We should probably keep that column. Not sure if exiting to at least one of the two

[tor-relays] Question about responding to abuse request

2015-07-05 Thread Patrick ZAJDA
Hi all, I run a Tor exit node, and I received an abuse complain from Webiron. In this mail, I can read the following: If you run a VPN, anonymizer service (like a TOR exit or proxy node), or business intelligence not contracted with the site owner, then we request that the targeted range be

Re: [tor-relays] Question about responding to abuse request

2015-07-05 Thread Tim Semeijn
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I receive the Webiron abuse complaints too. You can opt-out of their e-mails as I personally also do not like restricting access to specific networks. For the relays I run which are in a SWIP-ed IP range redirecting the abuse to myself I just

Re: [tor-relays] Question about responding to abuse request

2015-07-05 Thread Tor Relays at brwyatt.net
To add to this, it might be worth noting that they will likely block (or attempt to block) your IP address from their network regardless of if you add their network to you exit policies. What this will mean is that anyone attempting to access their network through your exit node will be met

Re: [tor-relays] Question about responding to abuse request

2015-07-05 Thread Moritz Bartl
On 07/05/2015 07:21 PM, Patrick ZAJDA wrote: I know I can block this IP range by adding it to my exit policy, but I would like to know how others exit node operators manage these type of requests, because I ask myself if it is not against tor philosophy to block access to a specific network to

Re: [tor-relays] Simplifying ExoneraTor

2015-07-05 Thread Geoff Down
On Sun, Jul 5, 2015, at 02:26 PM, Karsten Loesing wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/07/15 14:20, teor wrote: On 5 Jul 2015, at 19:37 , Karsten Loesing kars...@torproject.org wrote: Actually, how about we use the same definition as for the Exit flag?

Re: [tor-relays] Question about responding to abuse request

2015-07-05 Thread s7r
Hi, Usually those are automated messages. I get them all the time as well. They are just relaying abuse messages. The text in their message is standard, and includes all cases so to say. If you scroll down the email, you will see the target IP and few logs. Usually this is the result of automated