> On Sep 9, 2022, at 10:54 AM, Viktor Dukhovni <postfix-us...@dukhovni.org> 
> wrote:
> 
> On Fri, Sep 09, 2022 at 11:23:18PM +1000, Simon Wilson wrote:
> 
>> I have no insight into why security firms, government departments,
>> etc. recommend to block what they do.
> 
> Note that the recommendations you quoted, suggest blocking Tor *exit*
> nodes.  While the service you're using seems to go above and beyond...
> 
> Still, if this becomes an issue for enough users, we may have to do
> something.  For now, just one report is not a cause for alarm IMHO.

Also it seems odd that the OP is running IDS/IPS on *outbound* traffic. That 
seems a bit odd.

If you accept the premise that tor exit nodes are exit points for all sorts of 
villainy and CP (I mean, they are, but there’s also legitimate traffic), the 
idea is that if you run some type of public-facing service, you may opt to 
restrict access if you find tor exit nodes are a regular source of abuse. But 
blocking *outbound* traffic to an IP (probably a full subnet) that may share 
other services seems unwise. But this is Ubiquiti we’re talking about, so it 
would not surprise me at all that they’re just grabbing some random list and 
doing silly things with it.

Charles

> 
> --
>    Viktor.

Attachment: signature.asc
Description: Message signed with OpenPGP

Reply via email to