I just got this guy's spam too. It doesn't look like anything anyone said to him last month[0] stuck.
His intentions are now very suspicious to me too. I will definitely not be pointing anything at his servers.
Matt
[0]: https://lists.torproject.org/pipermail/tor-relays/2017-August/012735.html
-------- Forwarded Message -------- Subject: Your TOR node Date: Fri, 8 Sep 2017 21:36:14 -0400 From: Dennis Emory Hannon info@backplanedns.org To: Dennis Emory Hannon info@backplanedns.org
Hello,
I came across your TOR relay on atlas. I run a few relays myself along with a bunch of DNS resolvers which are a part of the Open Root Server network (ORSN.org) - aimed to fight internet censorship and circumvent government surveillance programs (ie. prism).
I hope you may be interested in using our anonymous open DNS resolvers on your relays.
Resolver - 172.98.193.42
Resolver - 162.248.241.94
------------------------------------------------------
Hostmaster@:
Mr. Dennis Emory Hannon
Phone:
+1 (716) 348-0064
E-Mail:
info@backplanedns.org
abuse@backplanedns.org
Linkedin:
On Fri, Sep 08, 2017 at 09:52:09PM -0400, Matt Traudt wrote:
His intentions are now very suspicious to me too. I will definitely not be pointing anything at his servers. https://lists.torproject.org/pipermail/tor-relays/2017-August/012735.html
Yes, I agree.
I wonder if there's a way to scan the exit relays to find out if any of them got suckered by this social engineering attack. Maybe based on the DNS discovery infrastructure that Philipp Winter et al used?
--Roger
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On 09/09/2017 03:52 AM, Matt Traudt wrote:
I just got this guy's spam too. It doesn't look like anything anyone said to him last month[0] stuck.
Just because never answer to a spam/troll/et al ? :-D
- -- Toralf PGP C4EACDDE 0076E94E
tor-relays@lists.torproject.org