Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread Martin Kepplinger
Am 05.10.2017 19:08 schrieb AMuse: Hi all! I'm getting a number of ISP Abuse complaints around outbound ssh brute-forcing from our exit relay. I'm personally of the opinion that people should run fail2ban (or equiv) and get on with life and I generally ignore the complaints - but wondered,

Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread Toralf Förster
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10/05/2017 08:55 PM, tor-relay.d...@o.banes.ch wrote: > In the end we disabled port 22. After all - any sysadmin who wants > to have peace and ever looked a ssh config will have its listen > port somewhere else than 22. +1 disabled exit pot 22

Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread Sebastian Urbach
Good Evening, What Dirk just described is exactly what happened here. Timeframe matches and i disabled port 22 as well. Adjusting the port for your own system seems to be a good idea and it is working very well for me. -- Sincerely yours / M.f.G. / Sincères salutations Sebastian Urbach

Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread tor-relay . dirk
Hello AMuse, we faced the same about 1-2 month ago. Actuall people use fail2ban which creates abuse mails to you provider. Thats not new. But recently the abuse mails have risen to numbers which lead us to believe there are acutally more people abusing ssh via tor than people really using it. In

[tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread AMuse
Hi all! I'm getting a number of ISP Abuse complaints around outbound ssh brute-forcing from our exit relay. I'm personally of the opinion that people should run fail2ban (or equiv) and get on with life and I generally ignore the complaints - but wondered, what are other operators doing? Is