Re: [tor-relays] bridges for Lox

2024-02-29 Thread anon





9 left


And one more added, so 8 left.

+1 = 7 left


Added one. 6 left.


4 left.


+1, 3 left


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Botnet targeting Tor relays

2024-10-20 Thread anon

Hi DiffieHellman,


The solution is to disable password auth and use pubkeys only (so bruteforcing 
attacks won't succeed until after the universe burns out), too bad most of the 
bots are incompetently programmed and keep
retrying with a password even if the sshd returns that such auth method is not 
available.

You still get logspam, but you can stop that with sshguard or fail2ban, note 
that setting thresholds too low will end up with you blocking yourself.


don't worry, such measures have been implemented. Therefore, the attacks will 
not be successful.

I only notice that the other servers (which are also kind of well-known out 
there) only receive a few attacks per day, while the Tor nodes receive well 
over a hundred each (would be significantly more w/o fail2ban).

So I was wondering whether a botnet is currently targeting Tor nodes in 
particular.

Best,
 Kai.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Botnet targeting Tor relays

2024-10-17 Thread anon

Hello,

I run several Linux root servers, spread over several providers, some of which 
serve as Tor relays. For a few weeks now I have been observing massive brute 
force attempts via SSH from hundreds of sources around the world. However, only 
the Tor relays are affected, the rest of the servers are not.

Are other relay operators also observing something like this? Is there 
currently a botnet targeting Tor relays?

Best,
 Kai.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Re: Tor relays source IPs spoofed to mass-scan port 22?

2024-11-07 Thread anon

Hi,


And as further proof (if any were needed) that watchdogcyberdefense.com
is run by bozos one of their "abuse" reports to Hetzner reportedly shows
a “log entry” which reported attacks from my IP address to the RFC 1918
address 192.168.200.216. That address, like all such 192.168/16 prefix
addresses is not even routeable across the internet.


good catch. The abuse reports I received also have such 192.168/16 addresses 
listed.

Does that mean they attack themselves and then blame others?

Best,
 Kai.
___
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org


[tor-relays] Short Research Survey

2019-09-10 Thread Anon-research
Dear Tor relay operators,

We are a team of researchers at MIT, and we would like to ask Tor relay
operators to participate in a short and anonymous survey (no personal
information or IP address collected). This study is focused on the
importance of providing anonymity by volunteers in various contexts, and
will take no more than 5-10 minutes to finish.

You can learn more and take the survey at this link:
https://mit.co1.qualtrics.com/jfe/form/SV_6W3YXSCnqMVGPs1

Your input is very valuable to our study, and we look forward to your
feedback.

Please feel free to email us at anon-resea...@mit.edu if you have any
questions.

(Our survey platform unfortunately uses JavaScript. We apologize for being
unable to switch it off. We would be grateful for your participation if you
are comfortable taking the survey.)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] No exit at home !!!

2018-03-02 Thread for this post anon
Roger say it right: No exit relay at home!

I write this mail in anon because I had bad experience with that. I had
the experience to get visitors early in the morning from the police
department some months ago. After that I must by new computers...

Use ISP's only for exits. Or you want "fun".

xyz


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays