Am 28.11.2015 um 10:20 schrieb grarpamp:
>> First rule is to use some firewall
>
> No it is not, do not do this.
> An exit needs to pass the traffic that its exitpolicy says it will pass.
> Otherwise bad things happen with circuit construction and your exit
> gets badmouthed by users possibly to
Am 07.02.2016 um 21:47 schrieb Toralf Förster:
> On 02/07/2016 09:17 PM, Roland 'ValiDOM' Jungnickel wrote:
>> So to say... these rules work. But most probably somebody with more
>> iptables experience might adjust them to be even more effective AND less
>> &quo
Am 28.11.2015 um 10:42 schrieb Toralf Förster:
> At least for German exits you'll violate
> http://www.gesetze-im-internet.de/tmg/__8.html in that case.
(thats a rule for internet service providers; the rule sets them free
from any accountability for the traffic they pass through in case they
hi,
I'm operating a tor exit with a relatively high bandwith rate for more
than 3 years.
My ISP receives more and more abuse tickets about my server regarding
netscans. These netscans are executed with dest. port 80 so I'm not able
to block them easily.
Any idea how to prevent netscans using my