On Tuesday, June 21, 2016 09:52:43 AM Tristan wrote:
> But the point of Tor is to promote open access to the Internet. Once Tor
> starts filtering traffic, it's no better than the government censorship so
> many people use Tor to get around. They'd go from one filter to another.
This is not such
Exits are badly needed, but is it economically feasible to change to a
relay? Based on your cost, and the ISP attitude to a relay only, does it
make sense to be a relay instead - and still provide for the Tor community?
I would be curious also to know if many of the ISP's have a higher
level
If you know your ISP, the best thing to do is try to schedule a face-to-face
meeting with their management and security personnel. Be prepared to explain
Tor, its essential function, and both the pros and cons of running an exit.
Then listen to their concerns, and try to address them.
But the point of Tor is to promote open access to the Internet. Once Tor
starts filtering traffic, it's no better than the government censorship so
many people use Tor to get around. They'd go from one filter to another.
I understand your point, but I don't think we can accurately detect
If it is Tor philosophy to prevent criminal activity then should not tor
develop other tools apart from port and IP blocking? I am less certain that we
can ring our hands of this issue. We will have fewer and fewer exit nodes until
the gross attacks like multiple login attempts are restrained
Jon, all others,
yes I understand what you say and obviously have to accept the ISP's
wishes (order).
But before giving up a 100Mbit/s exit I would like to understand more
about the ISP's reasons and burdens:
- is it just the more work for rather poor money handling(forwarding)
those abuses ?
-
On Jun 20, 2016, at 4:19 AM, pa011 wrote:
>
> Hi all,
>
> thanks again for your hints - in my case they obviously find Tor less
> fancy - their response today is following:
>
> "Hello.
> You need to take steps to ensure that the complaint would be no longer
> received.
> This
On Sat, Jun 18, 2016 at 04:05:23AM +0300, s7r wrote:
:Hello,
:
:Thanks for running an exit relay.
:That is just an automated email message. You do not want to reply to
:every single automated message you receive, firstly because these
:replies go into a black hole and they are not read by any
I only got 1 abuse complaint, but I also only ran a Tor node for about a
month with a reduced exit policy. I explained that I was running a Tor
exit node, told them I blocked the offending address, and then linked to
the Tor Project website for more info. They thanked me for my time, and
On Fri, Jun 17, 2016, at 09:30 PM, Michael Armbruster wrote:
> Hi Paul,
>
> assuming the default HTTP port, it was an attack to the port 80.
> Furthermore, the cryptic looking signs (%XX, whereas X is 0-9 or A-F),
> are url escaped characters. Unescaping them leads to something like this:
>
>
Hello,
Thanks for running an exit relay.
That is just an automated email message. You do not want to reply to
every single automated message you receive, firstly because these
replies go into a black hole and they are not read by any humans, so
your effort may be useless.
Generally, you should
On 2016-06-17 at 22:12, pa011 wrote:
> Thank you Michael, solving that obviously easy question :-)
>
> So what was this "attac" then about, on which way, how can I see that ?
>
> Nice weekend to all
>
> Paul
>
>
> Am 17.06.2016 um 21:53 schrieb Michael Armbruster:
>> On 2016-06-17 at 21:51,
Thank you Michael, solving that obviously easy question :-)
So what was this "attac" then about, on which way, how can I see that ?
Nice weekend to all
Paul
Am 17.06.2016 um 21:53 schrieb Michael Armbruster:
> On 2016-06-17 at 21:51, pa011 wrote:
>> Thank you both !
>>
>> @ Michael: that’s
On 2016-06-17 at 21:51, pa011 wrote:
> Thank you both !
>
> @ Michael: that’s exactly what I did so far and in the past
> @ Moritz: I will try my best - yes it was an automated response with
> just an name in Germany and no IP given, that I could possibly block
>
> "HTTP/1.1 404 293..." are
Thank you both !
@ Michael: that’s exactly what I did so far and in the past
@ Moritz: I will try my best - yes it was an automated response with
just an name in Germany and no IP given, that I could possibly block
"HTTP/1.1 404 293..." are these the ports the traffic went trough ?
Am
On 06/17/2016 09:35 PM, pa011 wrote:
> As I am new to this business could somebody please give me a hint how to
> best handle such an abuse complain - possibly stop it?
You can explain Tor, offer to block that destination from your exit, and
offer your help so they can treat Tor users differently
Hello,
I generally respond using the templates on this page:
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorAbuseTemplates.
Generally the abuser has already stopped or is connected to a new exit node
by the time you get a message.
Hope that helps!-- Michael CanningPresident -
As I am new to this business could somebody please give me a hint how to
best handle such an abuse complain - possibly stop it?
Thanks, Regards and a nice weekend.
we have detected abuse from the IP address xxx.xxx.xxx,xxx, which
according to a
whois lookup is on your network. We would
18 matches
Mail list logo