On 10/6/21 22:50, Tor Relays wrote:

    On Tue, Jun 08, 2021 at 01:56:33PM +0200, Tor Relays wrote:
    And Tor exits are particularly susceptible to getting put on these
    kind
    of blocklists, because all it takes is one person trying to
    connect to the
    honey address, and bam the exit relay's IP address gets on the
    blocklist.

    --Roger

This would explain it when the relay in question would be an exit relay, but it is an ordinary relay.

Maybe it impacts your own trust level when you frequently connect to IPs with a bad reputation (e.g. exits).

Or maybe they flagged as suspicious the activity towards ports 9001? Maybe its worth the effort to debug this by only accepting tor circuits involving downstream relays over port 443 for some time so as to see if G-Core Labs whitelists you again? (No idea how to actually do this) This could mean an additional point to encourage people to deploy relays on port 443.

Also, maybe someone is running a relay on port 25/465/587/whatnot and that is what triggered G-Core Labs alarms? I don't know how to find this with relay search. Orport shows in the results but searches for orport:NNN will fail.

When they don't provide any information it's only speculation

That's it :(

Salut

_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to