Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ...
Seems like a bad idea. Among other issues, I kinda doubt Digital Ocean is gonna be any happier. They'll still get abuse emails half the month, right? Do you think that's gonna make them like... half mad? ;-) Just run a good guard there full time and find a better home for the exit.
I looked 8 hours for a better home and after 8 hours I was exhausted from laughing of offers like "VPS 25 gigz traffic and $120 price tag in panama". I simply have not the money to host on expensive datacenters and most of the offers out there are max 1 terrabyte... thats a joke for any of my tor nodes ...
Markus
PS: half mad sound not soooo bad, right? RIGHT?
2016-07-26 23:54 GMT+02:00 Green Dream greendream848@gmail.com:
Seems like a bad idea. Among other issues, I kinda doubt Digital Ocean is gonna be any happier. They'll still get abuse emails half the month, right? Do you think that's gonna make them like... half mad? ;-) Just run a good guard there full time and find a better home for the exit.
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Have you taken a look at Solar VPS? I found it on the TOR wiki and then subsequently found https://gist.github.com/foozmeat/a073a07a4aff40aecdc8 - they seem to be exit node friendly, I just got mine online yesterday.
On Tue, Jul 26, 2016 at 5:43 PM Tristan supersluether@gmail.com wrote:
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
My problem with Solar VPS is: 2 TB Traffic, I will burn 2 TB in 3-4 days and I am not willing to pay for a 8 core 8 gigz ram and 120 gigz ssd for $80 I do not need. My tor exit nodes run with 512 mb ram and a shitty cpu and lots and lots of traffic.
Markus
2016-07-27 4:00 GMT+02:00 Jacob Gillespie jacobwgillespie@gmail.com:
Have you taken a look at Solar VPS? I found it on the TOR wiki and then subsequently found https://gist.github.com/foozmeat/a073a07a4aff40aecdc8 - they seem to be exit node friendly, I just got mine online yesterday.
On Tue, Jul 26, 2016 at 5:43 PM Tristan supersluether@gmail.com wrote:
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I do not think they will kick you or change policy now, I am just out of luck with one of my exit nodes. Lots and lots of script kiddies trying to hack banks and other websites over my exit node ... I have no clue why one exit node attract them and others dont ... bad luck perhaps ...
2016-07-27 0:43 GMT+02:00 Tristan supersluether@gmail.com:
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I have turned off all exits after worried ISP was forwarding too many abuse notices. This is pending a solution which, if possible would send all exiting port data off to a local anonymous proxy or VPN server.
Anonymous proxies and VPN servers seem more impervious or tolerant to abuse notices than the ISPs.
A mod I would like to see is to have a facility to send the all the data on ports that are set to exit off to an external anonymous proxy server; https and/or socks. Currently the httpproxy command in torrc does not do that.
I have tried to get my VPS, which has a second IP, to connect to a VPN server on that second IP for Tor to use for exit. This is beyond my networking skills and attempts cuts off the branch I am sitting on, with mucked up routing for everything.
Anonymous VPNs and http proxies I have used are very cheap with no data caps and very fast.
Gerry
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Markus Koch Sent: 27 July 2016 07:25 To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] switching between exit and guard
I do not think they will kick you or change policy now, I am just out of luck with one of my exit nodes. Lots and lots of script kiddies trying to hack banks and other websites over my exit node ... I have no clue why one exit node attract them and others dont ... bad luck perhaps ...
2016-07-27 0:43 GMT+02:00 Tristan supersluether@gmail.com:
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I am all in for a "hide the exit node with a VPN" solution. But pls make it dummy proof for people like me :)
Markus
2016-07-27 9:16 GMT+02:00 Dr Gerard Bulger gerard@bulger.co.uk:
I have turned off all exits after worried ISP was forwarding too many abuse notices. This is pending a solution which, if possible would send all exiting port data off to a local anonymous proxy or VPN server.
Anonymous proxies and VPN servers seem more impervious or tolerant to abuse notices than the ISPs.
A mod I would like to see is to have a facility to send the all the data on ports that are set to exit off to an external anonymous proxy server; https and/or socks. Currently the httpproxy command in torrc does not do that.
I have tried to get my VPS, which has a second IP, to connect to a VPN server on that second IP for Tor to use for exit. This is beyond my networking skills and attempts cuts off the branch I am sitting on, with mucked up routing for everything.
Anonymous VPNs and http proxies I have used are very cheap with no data caps and very fast.
Gerry
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Markus Koch Sent: 27 July 2016 07:25 To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] switching between exit and guard
I do not think they will kick you or change policy now, I am just out of luck with one of my exit nodes. Lots and lots of script kiddies trying to hack banks and other websites over my exit node ... I have no clue why one exit node attract them and others dont ... bad luck perhaps ...
2016-07-27 0:43 GMT+02:00 Tristan supersluether@gmail.com:
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 07/27/2016 02:30 AM, Markus Koch wrote:
I am all in for a "hide the exit node with a VPN" solution. But pls make it dummy proof for people like me :)
It's not such a great solution. The VPN service will get complaints, instead of the VPS host. And so you'll lose the VPN account. Maybe that's easier to fix than configuring a new VPS. But I don't know how Tor network handles relays with changing IPs.
Markus
2016-07-27 9:16 GMT+02:00 Dr Gerard Bulger gerard@bulger.co.uk:
I have turned off all exits after worried ISP was forwarding too many abuse notices. This is pending a solution which, if possible would send all exiting port data off to a local anonymous proxy or VPN server.
Anonymous proxies and VPN servers seem more impervious or tolerant to abuse notices than the ISPs.
A mod I would like to see is to have a facility to send the all the data on ports that are set to exit off to an external anonymous proxy server; https and/or socks. Currently the httpproxy command in torrc does not do that.
I have tried to get my VPS, which has a second IP, to connect to a VPN server on that second IP for Tor to use for exit. This is beyond my networking skills and attempts cuts off the branch I am sitting on, with mucked up routing for everything.
I'm not entirely sure what's happening for you. But it may be that you need to add a route exception to the config file for the VPN client:
route w.x.y.z 255.255.255.255 net_gateway
Where w.x.y.z is the the public IP address of the device that you're connecting to the VPS from. That's because VPN services typically configure clients to route everything through the VPN.
If you SSH through Tor, you'll need to set a specific exit. Or instead, create an SSH onion service in the VPS.
Anonymous VPNs and http proxies I have used are very cheap with no data caps and very fast.
Gerry
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Markus Koch Sent: 27 July 2016 07:25 To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] switching between exit and guard
I do not think they will kick you or change policy now, I am just out of luck with one of my exit nodes. Lots and lots of script kiddies trying to hack banks and other websites over my exit node ... I have no clue why one exit node attract them and others dont ... bad luck perhaps ...
2016-07-27 0:43 GMT+02:00 Tristan supersluether@gmail.com:
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Bad! I tried to run a relay with my german dsl isp (new ip every 24 hours) and tor didnt like it at all. I think vpn providers are more used to abuse than vps providers. I dont think digital ccean has many vps instances where people try to hack into banks ...
Markus
Sent from my iPad
On 27 Jul 2016, at 12:06, Mirimir mirimir@riseup.net wrote:
On 07/27/2016 02:30 AM, Markus Koch wrote: I am all in for a "hide the exit node with a VPN" solution. But pls make it dummy proof for people like me :)
It's not such a great solution. The VPN service will get complaints, instead of the VPS host. And so you'll lose the VPN account. Maybe that's easier to fix than configuring a new VPS. But I don't know how Tor network handles relays with changing IPs.
Markus
2016-07-27 9:16 GMT+02:00 Dr Gerard Bulger gerard@bulger.co.uk:
I have turned off all exits after worried ISP was forwarding too many abuse notices. This is pending a solution which, if possible would send all exiting port data off to a local anonymous proxy or VPN server.
Anonymous proxies and VPN servers seem more impervious or tolerant to abuse notices than the ISPs.
A mod I would like to see is to have a facility to send the all the data on ports that are set to exit off to an external anonymous proxy server; https and/or socks. Currently the httpproxy command in torrc does not do that.
I have tried to get my VPS, which has a second IP, to connect to a VPN server on that second IP for Tor to use for exit. This is beyond my networking skills and attempts cuts off the branch I am sitting on, with mucked up routing for everything.
I'm not entirely sure what's happening for you. But it may be that you need to add a route exception to the config file for the VPN client:
route w.x.y.z 255.255.255.255 net_gateway
Where w.x.y.z is the the public IP address of the device that you're connecting to the VPS from. That's because VPN services typically configure clients to route everything through the VPN.
If you SSH through Tor, you'll need to set a specific exit. Or instead, create an SSH onion service in the VPS.
Anonymous VPNs and http proxies I have used are very cheap with no data caps and very fast.
Gerry
-----Original Message----- From: tor-relays [mailto:tor-relays-bounces@lists.torproject.org] On Behalf Of Markus Koch Sent: 27 July 2016 07:25 To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] switching between exit and guard
I do not think they will kick you or change policy now, I am just out of luck with one of my exit nodes. Lots and lots of script kiddies trying to hack banks and other websites over my exit node ... I have no clue why one exit node attract them and others dont ... bad luck perhaps ...
2016-07-27 0:43 GMT+02:00 Tristan supersluether@gmail.com:
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago.
On Jul 26, 2016 4:48 PM, "Markus Koch" niftybunny@googlemail.com wrote:
Hi there,
now I am getting abuse mails nearly every day and digital ocean looks like getting pissed off. Is it technical possible to switch between exit and guard so I only run an exit for 14 days a months (less abuse mails per month if it is a exit only 14 days). Or is this a really bad idea?
Markus
PS: I am also getting my first bullet proof exit note tomorrow ... lets see how this works out ... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays@lists.torproject.org