Re: [tor-relays] Attacker IP database

2013-08-02 Thread Marina Brown
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/02/2013 05:44 PM, Andy Isaacson wrote: > On Fri, Aug 02, 2013 at 03:25:10PM -0600, Bryan Carey wrote: >> Thanks everyone for your input! I already had root access >> disabled via sshd config. I will look into fail2ban as it sounds >> like it reme

Re: [tor-relays] Attacker IP database

2013-08-02 Thread Andy Isaacson
On Fri, Aug 02, 2013 at 03:25:10PM -0600, Bryan Carey wrote: > Thanks everyone for your input! I already had root access disabled via sshd > config. I will look into fail2ban as it sounds like it remedies the problem > I'm having. I'm confused, what's the actual problem you're having? Is the prob

Re: [tor-relays] Attacker IP database

2013-08-02 Thread Peter Guhl
Hi Am 02.08.2013 21:18, schrieb Bryan Carey: > Here are some that I have seen recently trying to brute force common > user accounts and root password attempts: I remember this to be a common phenomena for at least 15 years now. Done by millions of (probably zombie) computers around the world. Do

Re: [tor-relays] Attacker IP database

2013-08-02 Thread Bryan Carey
Thanks everyone for your input! I already had root access disabled via sshd config. I will look into fail2ban as it sounds like it remedies the problem I'm having. @Nick - I'm talking about attacks directed at the node, not going through it. Thanks, Bryan On Fri, Aug 2, 2013 at 2:04 PM, Marina

Re: [tor-relays] Attacker IP database

2013-08-02 Thread Richard Budd
If you are just talking about regular server hacking attempts, and you are using debian, tben try demyhosts and have it query the demyhosts server every hour or so. It will download a list of known attacking ips On Aug 2, 2013 3:41 PM, "Bryan Carey" wrote: > Is there any kind of compiled list

Re: [tor-relays] Attacker IP database

2013-08-02 Thread Marina Brown
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/02/2013 03:18 PM, Bryan Carey wrote: > Is there any kind of compiled list of IPs that relay operators can > refer to that are known bad IPs (sources of brute force SSH > attempts, etc.)? Is there a reason to NOT block (drop) traffic from > these

Re: [tor-relays] Attacker IP database

2013-08-02 Thread Nick
Quoth Bryan Carey: > Is there any kind of compiled list of IPs that relay operators can refer to > that are known bad IPs (sources of brute force SSH attempts, etc.)? Is > there a reason to NOT block (drop) traffic from these IPs? Quite possibly I'm being stupid, but wouldn't these IPs just be ot

Re: [tor-relays] Attacker IP database

2013-08-02 Thread Tom McLoughlin
I wouldn't think such a database would exist because of the way Tor works. Regards, Tom McLoughlin On 02/08/2013 20:18, Bryan Carey wrote: > Is there any kind of compiled list of IPs that relay operators can > refer to that are known bad IPs (sources of brute force SSH > attempts, etc.)? Is there

[tor-relays] Attacker IP database

2013-08-02 Thread Bryan Carey
Is there any kind of compiled list of IPs that relay operators can refer to that are known bad IPs (sources of brute force SSH attempts, etc.)? Is there a reason to NOT block (drop) traffic from these IPs? Here are some that I have seen recently trying to brute force common user accounts and root

[tor-relays] Relay or Obfuscated Bridge?

2013-08-02 Thread Richard Budd
I have several Tor relays running on VPS providers around the world (the 7 bucks a month kind). Most have around 5 to 6 meg a second bandwidth available. Would it be more useful for the Tor system to change a few of them over to obfuscated bridges? ___

Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-02 Thread Andrew Lewman
On Fri, 02 Aug 2013 08:46:19 +0200 Karsten Loesing wrote: > > There's no way a bridge operator knows which bucket you're in. > > Actually, there is (finally) a way to find out: > > http://globe.rndm.de This tells me there isn't an official way to find out. It's a work a progress. great. -- An

Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-02 Thread Karsten Loesing
On 8/2/13 4:37 AM, Andrew Lewman wrote: > On Thu, 1 Aug 2013 14:11:38 -0700 > "Shawn A. Miller" wrote: > >> I've been running a Tor bridge on the Amazon EC2 cloud computing >> platform (per instructions at https://cloud.torproject.org/) since >> July 27, and while the bridge is up and running acc