On 07/27/2016 02:30 AM, Markus Koch wrote:
I am all in for a "hide the exit node with a VPN" solution. But pls make it dummy proof for people like me :)
It's not such a great solution. The VPN service will get complaints, instead of the VPS host. And so you'll lose the VPN account. Maybe that's easier to fix than configuring a new VPS. But I don't know how Tor network handles relays with changing IPs.
Markus
2016-07-27 9:16 GMT+02:00 Dr Gerard Bulger gerard@bulger.co.uk:
I have turned off all exits after worried ISP was forwarding too many abuse notices. This is pending a solution which, if possible would send all exiting port data off to a local anonymous proxy or VPN server.
Anonymous proxies and VPN servers seem more impervious or tolerant to abuse notices than the ISPs.
A mod I would like to see is to have a facility to send the all the data on ports that are set to exit off to an external anonymous proxy server; https and/or socks. Currently the httpproxy command in torrc does not do that.
I have tried to get my VPS, which has a second IP, to connect to a VPN server on that second IP for Tor to use for exit. This is beyond my networking skills and attempts cuts off the branch I am sitting on, with mucked up routing for everything.
I'm not entirely sure what's happening for you. But it may be that you need to add a route exception to the config file for the VPN client:
route w.x.y.z 255.255.255.255 net_gateway
Where w.x.y.z is the the public IP address of the device that you're connecting to the VPS from. That's because VPN services typically configure clients to route everything through the VPN.
If you SSH through Tor, you'll need to set a specific exit. Or instead, create an SSH onion service in the VPS.
Anonymous VPNs and http proxies I have used are very cheap with no data caps and very fast.
Gerry
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Markus Koch Sent: 27 July 2016 07:25 To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] switching between exit and guard
I do not think they will kick you or change policy now, I am just out of luck with one of my exit nodes. Lots and lots of script kiddies trying to hack banks and other websites over my exit node ... I have no clue why one exit node attract them and others dont ... bad luck perhaps ...
2016-07-27 0:43 GMT+02:00 Tristan supersluether@gmail.com:
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays