Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread Martin Kepplinger
Am 05.10.2017 19:08 schrieb AMuse: Hi all! I'm getting a number of ISP Abuse complaints around outbound ssh brute-forcing from our exit relay. I'm personally of the opinion that people should run fail2ban (or equiv) and get on with life and I generally ignore the complaints - but wondered, what

Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread Toralf Förster
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10/05/2017 08:55 PM, tor-relay.d...@o.banes.ch wrote: > In the end we disabled port 22. After all - any sysadmin who wants > to have peace and ever looked a ssh config will have its listen > port somewhere else than 22. +1 disabled exit pot 22 he

Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread Sebastian Urbach
Good Evening, What Dirk just described is exactly what happened here. Timeframe matches and i disabled port 22 as well. Adjusting the port for your own system seems to be a good idea and it is working very well for me. -- Sincerely yours / M.f.G. / Sincères salutations Sebastian Urbach -

[tor-relays] Quintex Exit Relays

2017-10-05 Thread John Ricketts
All, I am performing some operating system upgrades and my exit nodes may be down for a period of time. Just a heads up. John ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread tor-relay . dirk
Hello AMuse, we faced the same about 1-2 month ago. Actuall people use fail2ban which creates abuse mails to you provider. Thats not new. But recently the abuse mails have risen to numbers which lead us to believe there are acutally more people abusing ssh via tor than people really using it. In

[tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread AMuse
Hi all! I'm getting a number of ISP Abuse complaints around outbound ssh brute-forcing from our exit relay. I'm personally of the opinion that people should run fail2ban (or equiv) and get on with life and I generally ignore the complaints - but wondered, what are other operators doing? Is anyon

Re: [tor-relays] Feedback wanted: letter to my university's library

2017-10-05 Thread Scott Bennett
Kenneth Freeman wrote: > > > On 10/03/2017 11:31 PM, Scott Bennett wrote: > > > They have refused to let me speak with those making the decisions about > > what is provided on their public computers, much less to make an organized > > presentation to them. I was told that the decisions abou

Re: [tor-relays] AU Relays and data retention

2017-10-05 Thread I
> Paul wrote > I did speak to a lawyer and there is no requirement to retain any data if > you run a node. It's treated as a VPN. > > My question that I sent was more about whether a service (non commercial > service) was exempt. > They don't delineate. > Thank you for setting us straight. Robe

Re: [tor-relays] AU Relays and data retention

2017-10-05 Thread Scott Bennett
teor wrote: > > > On 4 Oct 2017, at 22:52, teor wrote: > > > > But I'm not a lawyer, so you should get your own lawyer. > > Or run a relay outside Australia. > > Or run an exit, because exits never know client IP addresses. > All they know is the destination. And internet destinations are > exc

Re: [tor-relays] Feedback wanted: letter to my university's library

2017-10-05 Thread Scott Bennett
William Denton wrote: > On 4 October 2017, Scott Bennett wrote: > > > Let me give an example. I have for at least ten years asked my local > > public library to provide a) a secure shell client, b) a secure web browser > > for ordinary use where anonymity is not a concern, c) a secure FTP cl