> I've had a "discussion" with a WebIron employee once, where I patiently
> explained about Tor. It ended with him making stupid threats, and since
> that day I blacklisted W.I. on our mail servers. .
>
> -Ralph
Would that be in USA?
___
tor-relays
On 30.08.18 22:07, Andrew Deason wrote:
> For what it's worth, webiron has actually responded to my replies to
> their reports before. I'm not saying it's a great use of time arguing
> with them, but the replies are actually read by a human (at least,
> sometimes).
I've had a "discussion" with a
On Wed, 29 Aug 2018 14:48:33 +0200
Ralph Seichter wrote:
> Automated complaints are a different matter. I don't feel the need to
> converse with Fail2ban or WebIron bots.
For what it's worth, webiron has actually responded to my replies to
their reports before. I'm not saying it's a great use of
What if we kept a (central) score of all complaints received, the type and the
responses to our sensible explanations?
If we were responding with that to the VPS business they might see that it is
rare for complaints to be serious.
Rob
___
tor-relay
> Is Irdeto harassing you with DMCAs or just the hacking / forum spam
> complaints?
>> I am thankful that I have my own AS and IP space. I would even think
>> about running mass relays like I do.
>> I am running the reduced exit policy on all 50 of my relays and still get
>> tons of automated stu
On Wed, Aug 29, 2018 at 9:32 AM Nathaniel Suchy wrote:
>
> Almost never if you use the reduced exit policy or the browser only policy
> (only allowing 80,443,53).
I only run one exit relay, but this is also my experience. I use the
reduced exit policy and also blacklist port 22 (SSH) and I have
Is Irdeto harassing you with DMCAs or just the hacking / forum spam
complaints?
On Wed, Aug 29, 2018 at 9:35 AM John Ricketts wrote:
> I am thankful that I have my own AS and IP space. I would even think
> about running mass relays like I do.
> I am running the reduced exit policy on all 50 of m
I am thankful that I have my own AS and IP space. I would even think about
running mass relays like I do.
I am running the reduced exit policy on all 50 of my relays and still get tons
of automated stuff like you spoke about.
On Aug 29, 2018, at 08:32, Nathaniel Suchy
mailto:m...@lunorian.is
Almost never if you use the reduced exit policy or the browser only policy
(only allowing 80,443,53).
Now, If you leave all ports open like Conrad and I do on most of our
relays, a copyright enforcement company called Irdeto USA (the same people
behind Denuvo Game DRM) will send you threats and ha
On 29.08.2018 12:48, John Ricketts wrote:
> For the non-automated emails I reply each time.
Same here. At one time I had written a generator script that fills in
details of the complaining party, like IP addresses, and adds general
descriptions about what Tor is, with links to facilitate further
Rob,
For the non-automated emails I reply each time.
John
> On Aug 29, 2018, at 05:47, I wrote:
>
> John
>
> Do you do anything in reply?
>
> Rob
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org
John
Do you do anything in reply?
Rob
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Paul,
On an average day I receive 50 or so automated complaints.
Once a week I will get a real human emailing me, even more rare do I get a
subpoena.
John
> On Aug 28, 2018, at 23:38, Paul Templeton wrote:
>
> Question: are exit operators seeing many abuse complaints now days? I have
> on
I have been running an exit at Linode.com for a month now - no
complaints yet
On 2018/08/29 06:38, Paul Templeton wrote:
Question: are exit operators seeing many abuse complaints now days? I have only
had one in the last two months from 5 exits. I used to see a lot now nothing
really.
I jus
Am 2012-01-02 12:23, schrieb cmeclax-sazri:
> On Sunday 01 January 2012 23:36:13 grarpamp wrote:
>> This 'attack' has been going on for YEARS. Nobody's really getting
>> shells (well some are), just dictionaried. The problem is that
>> OpenSSH logs this by default and people freak out when they
>>
On Sunday 01 January 2012 23:36:13 grarpamp wrote:
> This 'attack' has been going on for YEARS. Nobody's really getting
> shells (well some are), just dictionaried. The problem is that
> OpenSSH logs this by default and people freak out when they
> see it in their logs. It's just background noise.
This 'attack' has been going on for YEARS. Nobody's really getting
shells (well some are), just dictionaried. The problem is that
OpenSSH logs this by default and people freak out when they
see it in their logs. It's just background noise. Real admins
tune it out and use ssh keys instead.
_
> We haven't seen anything out of the ordinary. Here's the normal
> response we give for ssh bruit force complaints:
> https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates#SSHBruteforceAttempts
I take this back, just got one from a "Goran Matovinovic" this
morning. I'm a little temp
On Sat, Dec 31, 2011 at 07:59:31AM +0100, Klaus Layer wrote:
> within two days I received abuse complaints from my ISP that someone
> used my exit node to brute force ssh accounts of two different ISP.
> Unfortunately I am forced to block port 22 to avoid shutdown. Anyone
> else who suffered from s
Am 31.12.2011 07:59, schrieb Klaus Layer:
>
> within two days I received abuse complaints from my ISP that someone used my
> exit node to brute force ssh accounts of two different ISP. Unfortunately I
> am
> forced to block port 22 to avoid shutdown. Anyone else who suffered from such
> attack
> within two days I received abuse complaints from my ISP that someone used my
> exit node to brute force ssh accounts of two different ISP. Unfortunately I am
> forced to block port 22 to avoid shutdown. Anyone else who suffered from such
> attacks these days?
We haven't seen anything out of the
Just received another one. Is someone doing a widespread brute force?
Hope my ISP keeps cool.
Regards,
Klaus
signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://list
22 matches
Mail list logo