Re: [tor-relays] Dutch Relays

2023-12-19 Thread kantorkel

Dear nifty,

thank you for the valuable feedback. <3

Let's continue the discussion off-list.

###

Dear all,

I think ColoClue is a great place to run relays. It's self-organized 
infrastructure and not some Hetzner foo where everyone else is running relays. 
They run a reliable colo and they are great people. Only drawback is that we 
(Artikel10) were capped at 500Mbit/s. But there might be ways around this limit 
that we never tried.

Thank you @ all ColoClue people for housing our first colocated Artikel10 exit 
relay. Much appreciated :) -- please reach out to me if you are attending 37C3.

Best
kantorkel



Am 12/18/23 um 14:59 schrieb ab...@relayon.org 2023:

These are complete and utter shit.

avoid like the plague!

nifty



On 11. Dec 2023, at 09:06, Jordan Savoca via tor-relays 
 wrote:

On 12/10/23 2:41 PM, Christopher Sheats wrote:

Emerald Onion is looking for co-location and IP transit opportunities in the 
Netherlands for deploying new exit relays. We have our own ASN, v4 and v6 IP 
space.


Hi yawnbox,

You may want to check out ColoClue[1], they're a volunteer-based not-for-profit 
association operated by folks in the commercial ISP space who needed a way to 
host their own systems. Today they support ~200 engineering hobbyists with 
low-cost infrastructure.

They have cross-connects to AMS-IX and NL-IX[2] and diverse transit 
connectivity[3] in their racks. Job Snijders has given a couple talks at NLNOG 
and NANOG about operations-related things, like effective DDoS mitigation[4] 
with fastnetmon and automated peering solutions[5].

I'm not a member personally, but if I lived in the area I'd definitely include 
them in my list of potential options. ^^

[1]: https://coloclue.net/en/
[2]: https://github.com/coloclue/peering/blob/master/peers.yaml
[3]: https://bgp.tools/as/8283#connectivity
[4]: https://www.youtube.com/watch?v=0ahdxp_btHY
[5]: https://www.youtube.com/watch?v=C7pkab8n7ys

--
Jordan Savoca
https://jordan.im/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Exit relays abused to attack Google services

2022-02-02 Thread kantorkel

Am 2/2/22 um 01:19 schrieb UDN Tor via tor-relays:

Google is now sending abuse reports complaining of DDoS attacks against
their services. While they believe the IPs are participating in a
botnet, it is clear that they are Tor exit relays.

I don't know why they are sending us the report after the attacks have
ended. Besides, since Google services are unusable over Tor, this
should not have caused them much damage.

I suspect the attacker is trying to get relays shut down by triggering
Google reports that would scare off the ISPs.

If you are an ISP and you have received the same report, please let me
know. I'd like to know if this was global or if we've been "selected".


We received 2 DDoS reports in Oct 2021 and 3 automated scraping notices in Nov 
and Dec 2021.


We are seeing automated scraping of Google Web Search from a large
number of your IPs/VMs.  Automated scraping violates our /robots.txt
file and also our Terms of Service.  We request that you enforce your
Acceptable Use Policy against these customers.

Best
kantorkel, Artikel10




From: ddos-repo...@google.com
To: ab...@urdn.com.ua
Subject: [#zMto] DDoS from your IPs to Google from 2022-01-28 to
2022-01-31
Date: Tue, 01 Feb 2022 20:22:42 +

We observed IPs under your control participating in DDoS attacks
targeting Google services, including a prolonged DDoS attack from
January 28-31 against the Google Search Console.

The attacks were Layer 7 / HTTP request floods.  Your participating
IPs are listed below, along with the stop time in UTC and targeted
Google IPs.  We request that you enforce your Acceptable Use Policy
against these customers.

+-+-+--+-+
| Source  | Destination | DestPort | Time_UTC|
+-+-+--+-+
| 193.218.118.62  | 142.250.180.227 | 443  | 2022-01-31 15:55:01 |
| 193.218.118.90  | 142.250.180.195 | 443  | 2022-01-31 15:53:28 |
| 193.218.118.100 | 172.217.19.99   | 443  | 2022-01-31 14:43:09 |
| 193.218.118.101 | 142.250.180.227 | 443  | 2022-01-31 17:32:54 |
| 193.218.118.125 | 142.250.180.227 | 443  | 2022-01-31 15:55:28 |
| 193.218.118.145 | 142.250.180.195 | 443  | 2022-01-31 15:55:30 |
| 193.218.118.147 | 142.251.39.35   | 443  | 2022-01-31 15:41:36 |
| 193.218.118.155 | 142.250.180.195 | 443  | 2022-01-31 13:45:43 |
| 193.218.118.156 | 142.250.180.227 | 443  | 2022-01-31 15:57:52 |
| 193.218.118.158 | 142.250.180.227 | 443  | 2022-01-31 18:41:34 |
| 193.218.118.167 | 142.250.201.195 | 443  | 2022-01-31 15:56:53 |
| 193.218.118.182 | 142.251.39.3| 443  | 2022-01-31 17:31:57 |
| 193.218.118.183 | 142.250.180.227 | 443  | 2022-01-31 17:42:40 |
| 193.218.118.231 | 142.250.180.227 | 443  | 2022-01-31 17:43:08 |
+-+-+--+-+

Note we believe some of these IPs are part of the Meris or Dvinis
botnets.  If you are a residential Internet service provider, it is
possible that your customers' routers themselves have been
compromised.  You should research the Meris botnet and take
appropriate actions to have them secure their CPE (customer-premises
equipment).

--
Security Reliability Engineering :: Google :: AS15169

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running Tor exit nodes on university networks

2021-06-11 Thread kantorkel

Hey.

Am 6/9/21 um 9:51 PM schrieb Andreas Kempe:


We have this page with some tips:
https://community.torproject.org/relay/community-resources/tor-relay-universities/



I read through the page before mailing the list and I especially
appreciate the template letter from EFF. I am hoping that a system of
standardised response e-mails can be realised to lessen the burden of
handling complaints. Maybe with some degree of automation?


That is totally possible. At Artikel10 (https://artikel10.org/), we use Zammad 
to realize some degree of automation. We ignore some mails, some receive our 
standard reply.




Here's a project that other members of our community have used in
the past and that you could adapt for your university:
https://www.overleaf.com/project/541e42eddb749944790bd16d

And as Matthias said, you can find more relays outside .EDU, for
example, this non-exit node hosted by our friends in University of
Campinas, in Brazil:
https://metrics.torproject.org/rs.html#details/1E7BDE03151AAB779CB4AFEAEEA52536FFAA9400



Here you find our experiences from running Tor exits at two German universities:
https://arxiv.org/abs/2106.04277



I don't think running a non-exit node would be an issue since they
won't generate nearly as much abuse. I have considered looking at
running normal nodes or possibly bridges if we hit a wall regarding
exit nodes.



(My relay at university is a low-bandwidth relay but...) If abuse is an issue, 
you could allow fewer ports or even ports 80, 443 only. In the past months, 
most abuse mails that I received were about port 22.


Best,
kantorkel
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] I was banned from PayPal

2021-03-13 Thread kantorkel

Hello again,

did you talk to the hosting companies? Maybe they know about other customers 
facing the same issue.

Best
kantorkel

Am 3/13/21 um 4:33 AM schrieb potlatch:

Hello kantorkel and Tor ops,

To put a little meat on the bone of this situation, I did not receive an email 
from PayPal--I was informed that I was banned when I tried to make a payment 
for VPS hosting.  During the week before this ban, I had sent funds to both 
Flokinet for an exit relay in Finland and to ITLDC.com for VPS hosting in 
Poland--both exit relays.  I used the PayPal support email to ask for the 
reason I was banned and to ask for re-instatement.  I have heard nothing back.

I had surmised that someone was monitoring payments to off-shore hosting 
companies and maybe they assumed I was supporting a news agency--I don't know 
really.  If that is the case, why haven't the hosting sites been banned as well?

The message in my PayPal account referred to a violation of the user agreement. 
 Here is the full text of the message:

-We're unable to continue offering our services
-Thank you for using PayPal as your payment partner.

-Unfortunately, we are unable to continue offering our services -to you at this 
time due to the nature of your business and/or -activity in your account and 
the risk it poses to PayPal. This -decision can't be overturned.

-If you owe refunds to any of your buyers, you can use the money -in your 
PayPal account to refund them.

-Money in your PayPal account will be held for 180 days. After -180 days, we'll 
email you information on how to withdraw your -money.


The only transactions on this account over the past 3-months were VPS lease 
payments off-shore.  I looked up the user agreement to determine where I had 
violated the rules and found only a single reference to operating servers:

-Service Requiring Pre-Approval:
-Providing file sharing services or access to newsgroups; or -selling alcoholic 
beverages, non-cigarette tobacco products, --e-cigarettes or prescription 
drugs/devices.

I have a zoom meeting with two attorneys from EFF.org on March 18.  Stay 
tunedand maybe ban PayPal.

--potlatch


Sent with ProtonMail Secure Email.

‐‐‐ Original Message ‐‐‐
On Thursday, March 11, 2021 12:06 AM, Matthias Marx 
 wrote:


Hi Potlatch,

would you mind sharing PayPal's email / full message with me?

Regards from Hamburg
kantorkel

Am 3/11/21 um 12:42 AM schrieb potlatch:


Today I received a message from PayPal that paying for Tor relay server leases 
was a direct violation of my usage agreement.  I have been paying off-shore VPS 
hosts for my Tor server leases with PayPal for at least ten years.  Very 
interesting that they act now.
They specifically state the ban was for:
Providing file sharing services or access to newsgroups; or selling alcoholic 
beverages, non-cigarette tobacco products, e-cigarettes or prescription 
drugs/devices.
They further state that the ban is permanent and not reversible.
I liked using PayPal because it was a safe way to pay and didn't expose my 
credit card information.  Before PayPal I used a prepaid card which I will 
probably go back too.
--Potlatch
Sent with ProtonMail https://protonmail.com Secure Email.

tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay operators meetup @ rC3: today 22:00 UTC+1

2020-12-29 Thread kantorkel

To avoid confusion: We will meet today at 21:00 UTC, that is 22:00 CET

https://www.starts-at.com/event/2603308559



On 12/29/20 12:30 PM, kantorkel wrote:

Hi all,

the meetup will take place today, 2020-12-29, at 10pm UTC+1.

In rC3 world, we will meet in the bottom right corner of the Jena hackerspace 
"Krautspace" 
(https://rc3.world/rc3/room/5edc1329-f55c-46e1-a739-b0d642c2c80f/). Please use 
https://jitsi.rc3.world/torrelayops-724b5 to join from the outside world.

Thanks to qbi for organizing the room.

Best
kantorkel

On 12/27/20 10:54 PM, Stefan Leibfarth wrote:

Hello Tor friends and relay operators,

I haven't heard of a relay operators meetup at the ongoing rC3.
Are there any plans?
If not, who of you is interested?

It would be my pleasure arrange a session.
Please get back to me.

Cheers
Leibi

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay operators meetup @ rC3: today 22:00 UTC+1

2020-12-29 Thread kantorkel

Hi all,

the meetup will take place today, 2020-12-29, at 10pm UTC+1.

In rC3 world, we will meet in the bottom right corner of the Jena hackerspace 
"Krautspace" 
(https://rc3.world/rc3/room/5edc1329-f55c-46e1-a739-b0d642c2c80f/). Please use 
https://jitsi.rc3.world/torrelayops-724b5 to join from the outside world.

Thanks to qbi for organizing the room.

Best
kantorkel

On 12/27/20 10:54 PM, Stefan Leibfarth wrote:

Hello Tor friends and relay operators,

I haven't heard of a relay operators meetup at the ongoing rC3.
Are there any plans?
If not, who of you is interested?

It would be my pleasure arrange a session.
Please get back to me.

Cheers
Leibi

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 35C3 Tor Relay Operators Meetup

2018-12-18 Thread kantorkel
Hi all,

>
> If so, it would be great if we could get
> - a slightly bigger room than we had last year
> - a room with a beamer
>

since the number of rooms is very limited, I have reserved a slot for
the Relays Operators Meetup: 2018/12/27 16:30, 90 minutes, lecture room
M2. The room has 48 seats and a beamer.

Feel free to change any details:
https://events.ccc.de/congress/2018/wiki/index.php/Session:Tor_relays_operators_meetup


Best,
kantorkel
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays