Hello yl,
I also got some reports from WebIron. I also made some thoughts about blocking Tor from reaching some parts of the internet and if it's agains the ethics of tor. I think that blocking the destination for two weeks by an reject rule satisfies the "victim" and your hoster thus helps preventing the exit node from being shut down. For me, this is the best solution for this situation.
I also ask my hoster for the mail addresses of the abuse reporter and write a little statement why he got attacked and what tor is and why I running a relay. Mostly the abuse reports from WebIron reports about WordPress login bruteforce attacks. I then try to explain how the "victim" can prevent such attacks by setting up allow/deny rules in their webserver software and a pre-setted basic authentication. I mostly get positives responses.
~Josef
Am 20.10.2015 um 21:51 schrieb yl:
Hello, I received an abuse email today from my hoster (several emails from webiron in one email), typical automated abuse emails, not much information.
However, they request, if the origin IP is a Tor exit, to block the full /24 subnet. As they also state, they will not provide the full IP of there customer and request to block the exit to the /24.
Any thoughts on this? I don't like to block the whole /24, just because one idiot using one of the IPs is using some snake oil service like webiron, the collateral damage is to big in my eyes. All other IPs in the same range will be blocked as well.
Why should I even care about blocking such IPs given by webiron? In my opinion the blocking is useless from my side and in the worst case the users of webiron will block my exit node IP. Would it be better for the tor network if I'd block the IPs? Is there any bad consequences if I don't for the Tor network?
Let me know your thoughts. The services URL is https://www.webiron.com, don't need to go there, I didn't because such services are just useless. Better use fail2ban or something similar.
Greeting yl _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays