Re: [tor-relays] ORSN DNS servers vs OpenNic

2017-08-08 Thread Petrusko
So Unbound looks like nice for this features ;) Easy to set up in a Linux/Windows box as server, it can be used on localhost when connecting to unknown wifi... low memory/cpu usage. It's used everyday for home/work since on long time ago... surf, etc... teor : > Using a caching, recursive resol

[tor-relays] Distributing configuration data (Re: Tor 0.3.0.10 not listed as a recommended version)

2017-08-08 Thread Ralph Seichter
On 08.08.2017 05:36, teor wrote: > Distributing changes conveniently is different to deciding whether to > apply them. Machines are good at the first task, but the second task > needs multiple people. Our discussion made me reevaluate my own process of distributing config data. In particular, I'v

[tor-relays] IP Forwarding ON - on the host with tor relay - any risk ?

2017-08-08 Thread Muppet96
Hi, on the one of my servers where tor relay is running I would like to configure openvpn server. In that case IP Forwarding needs to be enabled (ubuntu). Is there any security risk if this feature will be enabled on the tor-relay host ? Thanks Muppet96 Sent with [ProtonMail](https://protonmail.

Re: [tor-relays] Fwd: Your TOR relay

2017-08-08 Thread Jesse V
On 08/07/2017 10:53 PM, Dennis Emory Hannon wrote: > No attitude or hurt feelings. What’s different from my servers compared > to others? Probably nothing at all….this is just a hobby of mine. One > would think if I wanted to collect information I would just run an exit > node myself since I have t

Re: [tor-relays] Fwd: Your TOR relay

2017-08-08 Thread Jonathan D. Proulx
As a general comment I try and assume the best of everyone on the mailing list and the worst of everyone in actual practice... When offering sensitive anonymization services it's best to take the opposite view of yourself. Operate with the best intentions but seriously think about what harm you

[tor-relays] Tor exit nodes attacking SSH?

2017-08-08 Thread Steven Chamberlain
Hi, I often run my SSH sessions via Tor using tsocks. But today I see: @@@ @WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@ IT IS POSSIBLE THAT SOMEONE I

[tor-relays] obfs4proxy for FreeBSD and OpenBSD

2017-08-08 Thread George
We just did a blog post on obfs4proxy for FreeBSD and OpenBSD on the TDP blog: https://torbsd.github.io/blog.html#welcome-obfs4 Feedback welcome, offline or via GitHub. In the near future, we'll submit to the respective ports systems. g -- 5F77 765E 40D6 5340 A0F5 3401 4997 FF11 A86F 44E2

Re: [tor-relays] Tor exit nodes attacking SSH?

2017-08-08 Thread teor
> On 9 Aug 2017, at 10:48, Steven Chamberlain wrote: > > Hi, > > ... > > I could be wrong, but I think this "dropbear" service is most likely > something malicious, running on one or more Tor exit nodes, attempting > to collect passwords of people logging in this way. If you can find the exit

Re: [tor-relays] Tor exit nodes attacking SSH?

2017-08-08 Thread Mirimir
On 08/08/2017 01:48 PM, Steven Chamberlain wrote: > Hi, > > I often run my SSH sessions via Tor using tsocks. But today I see: > > @@@ > @WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ > @

Re: [tor-relays] Tor exit nodes attacking SSH?

2017-08-08 Thread Roman Mamedov
On Tue, 8 Aug 2017 18:51:51 -1100 Mirimir wrote: > On 08/08/2017 01:48 PM, Steven Chamberlain wrote: > > Hi, > > > > I often run my SSH sessions via Tor using tsocks. But today I see: > > > > @@@ > > @WARNING: REMOTE HOST IDEN

Re: [tor-relays] Tor exit nodes attacking SSH?

2017-08-08 Thread Roger Dingledine
On Wed, Aug 09, 2017 at 10:58:01AM +0500, Roman Mamedov wrote: > > No, dropbear is an SSH server that 8.8.8.8 seems to be running. > > Did you try ssh'ing into 8.8.8.8 (outside of Tor)? It does not run a public > SSH server at all (obviously). > > The point was to demonstrate that the exit node i

Re: [tor-relays] Tor exit nodes attacking SSH?

2017-08-08 Thread me
On 08/08/2017 01:48 PM, Steven Chamberlain wrote: > Further investigation shows that this happens for any destination IP > address, even where there's no SSH service running: Make a "trap" ssh server (for example on virtualbox machine without any sensitive data) and log in into it through tsocks.

Re: [tor-relays] Tor exit nodes attacking SSH?

2017-08-08 Thread Mirimir
On 08/08/2017 06:58 PM, Roman Mamedov wrote: > On Tue, 8 Aug 2017 18:51:51 -1100 > Mirimir wrote: > >> On 08/08/2017 01:48 PM, Steven Chamberlain wrote: >>> Hi, >>> >>> I often run my SSH sessions via Tor using tsocks. But today I see: >>> >>>