The original point has drifted over the horizon.

I asked what could be done, in my case, to stop SSH attacks originating FROM my 
VPS which is running as an exit.
There was another VPS emanating SQL injection attacks.

The problem is that volunteering a cheap VPS to run as a Tor relay or exit is a 
very fickle process.
The VPS businesses don't waste time on anything to do with them. Their reaction 
is nearly always absolute.

It would be smart for the Tor society to approach that situation with guidance 
for ordinary people to successfully get another exit or relay running most of 
which would have to be on VPSs to get the speed and volume.  I know there are 
bits and piecs on this subject but they are not a coherent guide for ordinary 
people.

Robert




_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to