For your info:

I am the operator of the "privshield" exit. I just got notice from my hoster 
(5gbps.com) that their backoffice admin panel was compromised. Indeed my 
firstname and password to the admin panel have been changed. Fortunately, I 
have SSH on my VPS configured to only accept public key-based logins, and see 
no signs of entry of the VPS. 

As the backoffice panel provides direct console access, there is a slight 
chance they logged in directly by a safe-mode boot, but my uptime is a month, 
and I see no dip in the tor bandwidth: 
https://atlas.torproject.org/#details/DA3F7BD5428F88C79C9C7006B791982DA0115411

However, as a precaution I have shut down my tor exit. I will request a clean 
Ubuntu image and reinstall my tor exit this weekend. I will generate new server 
keys just to be sure. My mail is hosted on the same system, I won't have access 
to this email address for a few days.

// Yoriz

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to