Hi All,
FP! :)
I just setup my relay node today, and am keeping a hawkish(ish) eye on
traffic.... And noticed a flurry of activity from SSH port (22) at
5.104.224.5 - which is listed as an exit.
But it's also listed on http://cbl.abuseat.org/lookup.cgi?ip=5.104.224.5
as infected (or NATting for a computer that is infected) with the
Conficker botnet.
I've black-holed it in the meantime, but am wondering if I'm being
overly cautious...
Any advice/response/input appreciated.
TIA
Jeff.
> But it's also listed on http://cbl.abuseat.org/lookup.cgi?ip=5.104.224.5 as
If you find exits on blacklists, you could try to
contact the operator via their descriptor contact,
exit http banner, etc so that they can try to have
it removed. Usually a few clicks on an assertion
of ownership/cleanliness and an email ack is
all that's needed for removal. Since ownership
of IP's is always in flux from perspective of BL's
such that any 'real' owner could always do it too,
absent exit contact info, many users could
probably submit removal for them without issues.
There's a project covering this on the wiki:
https://trac.torproject.org/projects/tor/wiki/org/projects/DontBlockMe
I've signed up to AWS with Tor's instructions for bridges. I've intalled
Tor on my PC. Wondering how to proceed. Am obviously an illiterate newbie,
so any links for a basic knowledge-base would be greatly appreciated.
Thanks in advance.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Thanks. I saw the OpenSSL update, but thanks for explaining what it was about.
Is it necessary to restart Tor to apply the update?
Jesse V.
On 06/06/2014 04:00 AM, tor-relays-request(a)lists.torproject.org wrote:
> Message: 1
> Date: Thu, 05 Jun 2014 16:36:06 +0200
> From: Jeroen Massar <jeroen(a)massar.ch>
> To: tor-relays(a)lists.torproject.org
> Subject: [tor-relays] Update your OpenSSL, several high-risk CVEs
> Message-ID: <53908056.50209(a)massar.ch>
> Content-Type: text/plain; charset=ISO-8859-1
>
> See for the details:
>
> https://www.openssl.org/news/secadv_20140605.txt
>
> Debian etc all have packages available.
>
> Greets,
> Jeroen
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQF8BAEBCgBmBQJTkdiSXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQxMjgyMjhENjEyODQ1OTU1NzBCMjgwRkFB
RDk3MzY0RkMyMEJFQzgwAAoJEK2XNk/CC+yABpUIAJ9ZSohmGuH3r4UEg//FrYRF
3IJc6UPJx22FU0pdplN09I5L0LRzH7SehJly62niid6XNS/8bKByzjkvrnik0qRP
Hjo8Rq4C/2wbRJU0w8MHvpCRLFhTRdCHdGI2+HkUaYbp7abwIZVWbTMdXB0T5lGx
KvSgMeQfmlWzkwEb3WqDUqcc2NJG5D3K5WFV4WOsAi+KerBUiNyJKUqwGRd21PgS
VV6S4JLQy0PVKdCAIbeEeOy2xclRfwKjBfe8RVD9b8fOmBY6ty7v1k6Org54PceA
hLtJXDQXg9XQfe1u2T+peEYxf1bYIZMu+DI/7DJ0xFDr6naxJ4ttQabE2WmN6lE=
=FOEn
-----END PGP SIGNATURE-----
What is the best way to run a relay on OS X currently?
Now that the Vidalia bundles are deprecated and hard to find, I believe
we have no packages or bundles for OS X other than TBB 3.x?
So either "install from source, write your own init script, hope you
know what ulimit -n is, good luck with that" or "install tbb3 and edit
the torrc, still hope you know what ulimit -n is" are the current options?
Compare with https://www.torproject.org/docs/tor-relay-debian
for the Debian/Ubuntu users, where our deb takes care of a lot of these
things for them.
Assuming my summary is accurate, what are some good ways to move
forward here?
Thanks!
--Roger
Dear exit node operators,
Could you please recommend vps providers allowing to run tor exit nodes?
I checked many vps operators but most of them allow relays but not exit nodes according to AUP or ToS.
thanks.
Hi,
I'll happily block BitTorrent it before any offenses start. Just tell me
how.
Regards,
=-John-=
<snip snip>
Spencer Neitzke <spencer(a)neitzke.me> spake thusly:
> as well as block BitTorrent after repeated offenses
--
Using Opera's mail client: http://www.opera.com/mail/
I have an exit with exigent here in Australia. They advised by email that they don't have an issue with Tor.
M.
On 4 Jun 2014 08:56, I <beatthebastards(a)inbox.com> wrote:
>
> > So can you post some provider names?
>
> Comsitec.de is one which is ok with exits but I have a lot of trouble getting their attention when it stops.
> It is in Germany which is much better than being in USA because the mentality is better.
> Two I have which now say exits are not accepted are Lunanode and Bluevm. One which was expensive but good is DrServer/AbusiveCores. The guy set up Tor when I had a problem with Linux!.
>
> Since some have said yes to exits when I paid but a week later 'introduced a new policy' I wonder if it is worth being open. If you know what can be done with fifteen VPSs for the next nine months which can't have Tor please tell me.
>
> Lowendbox.com is good for scavenging addresses and sudden bargains but it may be better in the long run to pay a little more and get more cooperation.
>
> It may be more useful to Tor at the moment to provide bridges and for that, I believe, the very cheapest VPSs would do the job e.g. $AUD15/year.
>
> Robert
>
> > So can you post some provider names?
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays(a)lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays