Re: [tor-relays] How to prevent netscan usage?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/26/2015 04:50 AM, ZEROF wrote: > First rule is to use some firewall, No. At least for German exits you'll violate http://www.gesetze-im-internet.de/tmg/__8.html in that case. for more information go to https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines . - -- Toralf, pgp: C4EACDDE 0076E94E -BEGIN PGP SIGNATURE- Version: GnuPG v2 iF4EAREIAAYFAlZZdwgACgkQxOrN3gB26U706wEAjpDi9jDVr28BlRBS54N7TW4o /8vbgCQnlXQSfgW5/18A/AjE1aWbhCKFjRpZhtWl0g3oVOfz6wTOqzhd/LCERN+w =tT7g -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] How to prevent netscan usage?
> First rule is to use some firewall No it is not, do not do this. An exit needs to pass the traffic that its exitpolicy says it will pass. Otherwise bad things happen with circuit construction and your exit gets badmouthed by users possibly to the point of being banned. If you can't provide an exitpolicy that works as written, then don't provide it. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Any experience with Pulse Servers?
I've been running my exit node at Pulse Servers since February 2015 and the provider is very Tor-friendly indeed, but perhaps is not the most cost effective. I'm paying to the "Two" ($18/month) plan and have never been contacted w/r/t any traffic/bandwidth issues. On Fri, Nov 27, 2015 at 8:53 PM, Gregwrote: > I asked about running an exit there (though I currently only run a > non-exit), and he said that I should buy a "Two" ($18/mon) and limit it to > 100 Mbps (compared to the 1000 Mbps they advertise). I've run my non-exit > there on a "One", limited to 100 Mbps and had no issue. I haven't tried > running the non-exit at 1 Gbps. > hope that helps. > > On Fri, Nov 27, 2015 at 4:17 PM, nobody wrote: >> >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA512 >> >> >> >> On 11/27/2015 06:27 PM, Jesse V wrote: >> > Hi everyone, >> > >> > I've been looking around for a new host for my Tor infrastructure, >> > which includes exits, relays, and a bridge. >> > >> > I've been reviewing >> > https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs and >> > ran across Pulse Servers, which seems Tor friendly. They have VPSs >> > in Canada and the UK and have really low prices on VPSs, which I'm >> > trying to understand. I've been trying to learn more but I think >> > they have a pretty small setup (apparently the owner does tech >> > support) and documentation is limited. >> > >> > Does anyone have any experience or opinions on them? >> > >> >> They are very tor friendly, and I have had an exit there for a few >> months, but I would suggest that you look for an alternate host. The >> owner has expressed concern over the excessive bandwidth consumption >> versus cost of the relays and would probably not be particularly >> excited to have a new relay running. >> >> -BEGIN PGP SIGNATURE- >> Version: GnuPG v2 >> >> iQIcBAEBCgAGBQJWWPKbAAoJECVOC2Tp0QhTL1AP/0Y6VU2Ei2HS9i7eaNHrttxA >> I1+7u47rhACWi/6ZctRv9w+SWtvyrS8mTyRkB6EV0a/YWU5npLdIH5SCbRUsnHe0 >> g8slm/bzSgqWMAm1sqwG+6w0fVQB4XDy9wQp9RjAXe1A1cPVoocbr6jix3iorIFk >> FIR98T+H/mjICcr3fUgx6ORJRl4kXdGZ4NZWLBYcftfOg3Eyk0kd62DPXKPZKDga >> rGwYF6QzT9wD1mpjRIjCU89n+DkqZv39Z/gpgLbxDZvimQ56LNgBythLGoZgdBsk >> /4/NUBkE6PcRMFNrOTEsAIgdqfIxtilTOpx+ctXZKEWocY3UqWHiF3G6ENNqaK91 >> RIsIcu+ZRAYWdXOcKQ0Ruq4EHCEqTmDuC8Mu5Ykz1IUgVLu0NmpK7oVm3x6fe9Ox >> jZRXMTIs4vObJts4yNeBs1ID6j48C+9Faoyy3ugZUSZG9k/NpWarpdaKF5uKaZfT >> O9yLFbDOO/3MrUsSaSxmLUot/vYgUAh8I8TAZU1aXH74Tq+ljy3cd/6y9JoYLY+5 >> H3B3gfyEiXBfRV5UkIVwEsfskey7jfdIlPQLiVZEeBQT8r8/GcnK+LuDGUWRwU+9 >> bt5JRYGQW8NlaQpY7l63r5hDCyrB6JaYJ4VPnlLXJdYfutTOLJVf0WUDFyjHxgPK >> 1eB6ggaxFlIx/LfUjSZe >> =H/ts >> -END PGP SIGNATURE- >> ___ >> tor-relays mailing list >> tor-relays@lists.torproject.org >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] How to prevent netscan usage?
Am 28.11.2015 um 10:42 schrieb Toralf Förster: > At least for German exits you'll violate > http://www.gesetze-im-internet.de/tmg/__8.html in that case. (thats a rule for internet service providers; the rule sets them free from any accountability for the traffic they pass through in case they apply to some rules e.g. that they do not "select" the traffic...) nice try ;) If that would be true, limiting an exit to certain ports would also violate that? Vali signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] simple questions
hi folks, i got some questions. can i get problems as an german citizen with an non exit tor relay in germany with an italien ip? not realy or? i think of TMG § 8. and there are other stats pages, as globe, atlas and blutmagie.de? sorry for my bad english. --- Mit freundlichen Grüßen / Yours sincerely David Schulz ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] webiron requesting to block several /24 subnet
FYI Webiron ceased sending these for my relay sometime between 11/24 and today (no reports for 11/25-27). Possibly this is because I never look at or resolve the reports and their system eliminates non-responding addresses to avoid listing by spam honeypots. If you wish to continue receiving these I suggest marking them resolved--at least some of time. In my case the cessation on this path is desirable since the ISP has an automated system. Or possibly Webiron has decided to no longer send reports to the reverse-DNS abuse@ path, in which case this source of intelligence is lost. However one can view the Webiron abuse reporting history for an IP on their web site using the link https://www.webiron.com/abuse_feed/ and this would also serve as a way to establish if the abuse-desk has arrived at the optimal approach to Webiron, i.e. ignoring them. On Mon, Nov 16, 2015 at 11:36 PM, Dhalgren Torwrote: >>. . .I have to understand how my ISP reacts to this kind of things. > >>For the moment I will keep a low profile and I will block the >>mentioned IP range for a month. > > Webiron's system sends notifications to both the abusix.org contact > for the IP and to ab...@base-domain.tld for the reverse-DNS name of > the relay IP. So if you can configure abuse@ for the relay domain to > forward to you, you will see their notices at the same time as the ISP > abuse desk. Might be helpful to know about it before they contact you > and/or to see if they become familiar enough with the notices to > ignore them. Automated abuse complaints from other sources do not > always go to the domain-based address. > > http://multirbl.valli.org/ > > is a handy resource that shows the abuseix.org and abuse.net > information, as well as how many DNSBLs the relay has racked up. You > can change the abuse.net contact but Webiron appears to ignore this > source and simply construct the abuse@ from the rDNS domain name. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] simple questions
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, On 28.11.2015 17:43, David Schulz wrote: > can i get problems as an german citizen with an non exit tor relay > in germany with an italien ip? not realy or? i think of TMG § 8. As a non-exit relay operator, you are most certainly not going to get any legal trouble. - -RTNO -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (GNU/Linux) iQIcBAEBAgAGBQJWWeXGAAoJEJe61A/xrcOQgggP/iCemXOAMRUe1tuVMvTO5koL VFNBTELa3qztE2Oqt8yfB0TtMStrN3tq6/YvwzySiy0Z1jSDWq4/E0kvUFUSl1EU pZmjoww4K/imfxLqIL9BSiO2l+FV3GF9ZlfaWtDLA4AN5EK6oG883m6KyF73+tKR JMBC7AYHhGbVTSATaRT8GoxaO8ahFG9l9S9hS59qApbXB6/mzSHmFEGG/HRC9128 yLOdtkFZ3qPxULrcm4+CdssSWqjOGyyKgnymlhcPpMEwgDZjjl2G3B/nrTQtzfDS /AT/74IfGZWRDvrXAYwq2JbZ3VxCEbAwfWdquvPi8zvNlvsZ5vJwqtNv+/JxwjtR 4cp+m/Djts5zh2fg8F3QYPzvKi80aBZxpYZxQMUl9vJuWl9TxL+sS8eJcjBHsQAt FRSw5kxrIRGGKsB7bqyT81r2OgMIhZPitu1VNqacUNfTW5yb1Cyd8O4qKxG0MB/i sU6wBzVm0iK9dcU6cNthFGcR6Py8h0o2uIIuxWV6HujyDOW+iczBDPlRhAFl7s0Z Z3tMzoj4BV+SfTcH9YeQF/Ke97+Gbl+02LFlbLQtatfVVtwabt7FjgktCi+1+vv/ r8IXhXeC1GL31F1bmxMYtlJJRkB+TZNcY+llulc+h69yQWQqSMikv7w41qA+H7xl P+QFLGAgN4FlVnLYUz3E =Lm21 -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] PASSWORD
Can't for the life of me remember bud. I'm just sick of these emails cluttering up my inbox. Blocking them is a never ending task and I just want out bud !! : ) On 29 Nov 2015 02:09, "John favino"wrote: > I NEVER RECEIVED A PASSWORD. > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays