Re: [tor-relays] bridges for Lox
9 left And one more added, so 8 left. +1 = 7 left Added one. 6 left. 4 left. +1, 3 left ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Botnet targeting Tor relays
Hi DiffieHellman, The solution is to disable password auth and use pubkeys only (so bruteforcing attacks won't succeed until after the universe burns out), too bad most of the bots are incompetently programmed and keep retrying with a password even if the sshd returns that such auth method is not available. You still get logspam, but you can stop that with sshguard or fail2ban, note that setting thresholds too low will end up with you blocking yourself. don't worry, such measures have been implemented. Therefore, the attacks will not be successful. I only notice that the other servers (which are also kind of well-known out there) only receive a few attacks per day, while the Tor nodes receive well over a hundred each (would be significantly more w/o fail2ban). So I was wondering whether a botnet is currently targeting Tor nodes in particular. Best, Kai. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Botnet targeting Tor relays
Hello, I run several Linux root servers, spread over several providers, some of which serve as Tor relays. For a few weeks now I have been observing massive brute force attempts via SSH from hundreds of sources around the world. However, only the Tor relays are affected, the rest of the servers are not. Are other relay operators also observing something like this? Is there currently a botnet targeting Tor relays? Best, Kai. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Re: Tor relays source IPs spoofed to mass-scan port 22?
Hi, And as further proof (if any were needed) that watchdogcyberdefense.com is run by bozos one of their "abuse" reports to Hetzner reportedly shows a “log entry” which reported attacks from my IP address to the RFC 1918 address 192.168.200.216. That address, like all such 192.168/16 prefix addresses is not even routeable across the internet. good catch. The abuse reports I received also have such 192.168/16 addresses listed. Does that mean they attack themselves and then blame others? Best, Kai. ___ tor-relays mailing list -- tor-relays@lists.torproject.org To unsubscribe send an email to tor-relays-le...@lists.torproject.org
[tor-relays] Short Research Survey
Dear Tor relay operators, We are a team of researchers at MIT, and we would like to ask Tor relay operators to participate in a short and anonymous survey (no personal information or IP address collected). This study is focused on the importance of providing anonymity by volunteers in various contexts, and will take no more than 5-10 minutes to finish. You can learn more and take the survey at this link: https://mit.co1.qualtrics.com/jfe/form/SV_6W3YXSCnqMVGPs1 Your input is very valuable to our study, and we look forward to your feedback. Please feel free to email us at anon-resea...@mit.edu if you have any questions. (Our survey platform unfortunately uses JavaScript. We apologize for being unable to switch it off. We would be grateful for your participation if you are comfortable taking the survey.) ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] No exit at home !!!
Roger say it right: No exit relay at home! I write this mail in anon because I had bad experience with that. I had the experience to get visitors early in the morning from the police department some months ago. After that I must by new computers... Use ISP's only for exits. Or you want "fun". xyz ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays