Re: [tor-relays] FW: Lots of spam on new tor exit node.

2019-09-10 Thread teor
Hi,

> On 10 Sep 2019, at 04:36, Kenneth Freeman  wrote:
> 
> Signed PGP part
> 
> 
> On 09/08/2019 06:28 PM, teor wrote:
> 
>> Here's our advice for exit relays:
>> * don't run them at home, if you're at risk from the police assuming the exit
>>  traffic is your traffic
> 
> Excellent & standard advice, but I wonder what legally constitutes a
> home or one's property. Can you (technically) set up a non-profit in
> another room on campus? Say you have a farm with several buildings,
> etc.  Curious as whether this has been tested!

We give this advice because most people don't want police coming to a
location they or their family/housemates you may be in danger from a
police raid, or where the police may seize all the devices in the house.

Some people don't realise that police do things like this.

It's not about the legal definition of a "home", which may vary between
jurisdictions.

T



signature.asc
Description: Message signed with OpenPGP
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] FW: Lots of spam on new tor exit node.

2019-09-10 Thread Kenneth Freeman


On 09/08/2019 06:28 PM, teor wrote:

> Here's our advice for exit relays:
> * don't run them at home, if you're at risk from the police assuming the exit
>   traffic is your traffic

Excellent & standard advice, but I wonder what legally constitutes a
home or one's property. Can you (technically) set up a non-profit in
another room on campus? Say you have a farm with several buildings,
etc.  Curious as whether this has been tested!


0xDD79757F.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] FW: Lots of spam on new tor exit node.

2019-09-08 Thread teor
Hi,

> On 7 Sep 2019, at 21:06,  
>  wrote:
> 
> I have recently setup a new tor exit node but since about an hour of setting 
> it up it has been almost maxed out with spam.
> https://metrics.torproject.org/rs.html#details/4AFECB973C2268D5074D8DEDAF0BDB604C89ED50
> 
> How can I combat it?
> 
> I turned the node off for about an hour from about 6.30am GMT but the user 
> reconnected. From the looks of it they are connecting through the tor 
> network. DNS logs are looking like it is targeting illicit Russian drug 
> forums almost all with .biz domains.

That's totally normal. People use anonymity for all sorts of reasons.

And it's hard to tell the difference between spam and anonymous sites with
weird names.

Here's our advice for exit relays:
* don't run them at home, if you're at risk from the police assuming the exit
  traffic is your traffic
* don't monitor the sites that are accessed via the exit, because that
  is illegal in some places, and changes your legal risk in others

T




signature.asc
Description: Message signed with OpenPGP
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] FW: Lots of spam on new tor exit node.

2019-09-08 Thread email-group
I have recently setup a new tor exit node but since about an hour of setting
it up it has been almost maxed out with spam. 

https://metrics.torproject.org/rs.html#details/4AFECB973C2268D5074D8DEDAF0BD
B604C89ED50

 

How can I combat it? 

 

I turned the node off for about an hour from about 6.30am GMT but the user
reconnected. From the looks of it they are connecting through the tor
network. DNS logs are looking like it is targeting illicit Russian drug
forums almost all with .biz domains.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays