Re: [tor-relays] Secret Google and Microsoft Blacklists affecting non tor IPs if on same server.

2018-05-08 Thread gustavo
On Wed, May 09, 2018 at 01:04:35AM +0100, ger...@bulger.co.uk wrote: I just seen that my abuse email address gets a shower of abuse reports when I send an email to this tor-relays@lists.torproject.org most mailing lists break spf, they send email on

Re: [tor-relays] Secret Google and Microsoft Blacklists affecting non tor IPs if on same server.

2018-05-08 Thread gerard
I just seen that my abuse email address gets a shower of abuse reports when I send an email to this tor-relays@lists.torproject.org The forwarded emails do not come from me so fails DKIM/DMARC Gerry From: tor-relays

Re: [tor-relays] Secret Google and Microsoft Blacklists affecting non tor IPs if on same server.

2018-05-08 Thread gerard
Thanks PAUL, assuring. Nobody else IS using out email server, which now really an archive, as we are pretty much retired now and no other users left on our old system. Logs show only our emails. SPF, reverse DNS. DKIM DMARC all 100% fail2ban, no relay, no proxy, few working email

Re: [tor-relays] Secret Google and Microsoft Blacklists affecting non tor IPs if on same server.

2018-05-08 Thread Paul Templeton
> Really annoying that my email server IP has never sent anything, no relay, no > spam, almost no traffic so what is stated is not true and even their own > tools reports nothing. > Is Google looking at MAC addresses to do this? How can we stop it? I really > do not want to run another

[tor-relays] Secret Google and Microsoft Blacklists affecting non tor IPs if on same server.

2018-05-08 Thread gerard
Secret Google and Microsoft Blacklists affecting non tor IPs if on same server. Just had to shut down my exit temporally while Google sorts out their secret blacklisting system on my innocent non-tor IP. My server has two IPs, not consecutive. One I use for my own email server and public

[tor-relays] TOR Relay Activity Reset

2018-05-08 Thread Keifer Bly
Hello, for some reason the read/write status of my relay at http://torstatus.blutmagie.de/router_detail.php?FP=db1af6477bb276b6ea5e72132684096eee779d30 has been reset to nothing (all flat lines) however the relay is still marked as “running” with it’s current uptime of 11 days 20 hours. I’d

Re: [tor-relays] what ip,port combinations do Tor clients need?

2018-05-08 Thread Jonathan Marquardt
On Tue, May 08, 2018 at 04:45:58PM +0200, Martin Kepplinger wrote: > How does a usable ipset (hash:ip,port) look like, so that it is a whitelist > for > in/out tcp connections? *Everything* else from/to the outside world is > assumed > to be dropped. (DNS too). > > * dir auths from

[tor-relays] what ip,port combinations do Tor clients need?

2018-05-08 Thread Martin Kepplinger
Hi, How does a usable ipset (hash:ip,port) look like, so that it is a whitelist for in/out tcp connections? *Everything* else from/to the outside world is assumed to be dropped. (DNS too). * dir auths from src/or/auth_dirs.inc * fallback dirs from scripts/maint/fallback.whitelist * current