Re: [tor-relays] Amazon abuse report

2013-11-04 Thread tor-admin
On Thursday 31 October 2013 19:14:47 Andy Isaacson wrote: > On Thu, Oct 31, 2013 at 09:52:41PM -0400, Roger Dingledine wrote: > > On Thu, Oct 31, 2013 at 06:12:47PM -0700, Andy Isaacson wrote: > > > That's correct, it takes a deliberate action on the part of the > > > administrator to become a rela

[tor-relays] Is there any reason to keep the default exit policy?

2013-11-04 Thread Roger Dingledine
On Mon, Nov 04, 2013 at 08:53:11AM +0100, tor-admin wrote: > > Whoops, thanks for the correction Roger. I guess I've been configuring > > exit relays for so long that I forget what it's like to configure a > > non-exit. :) > > Same for me. I also thought that setting up a relay would still make i

Re: [tor-relays] Is there any reason to keep the default exit policy?

2013-11-04 Thread Paritesh Boyeyoko
On Monday 04 Nov 2013 04:10:55 Roger Dingledine wrote: > Today's interactions with ISPs influence Tor's future viability. So if > people are accidentally exit relays without knowing it, I worry as much > about the damage to the ISP's view of Tor as I do about the temporary > hassle for the operato

Re: [tor-relays] Is there any reason to keep the default exit policy?

2013-11-04 Thread Thomas Hand
This is something I raised a few months ago. I found that an reinstall of an old relay defaulted to exit, I only noticed after a few days... since the relay was on a residential address I immediately reconfigured it. I would assume that the majority of users who run relays on vps in the cloud will

Re: [tor-relays] Amazon abuse report

2013-11-04 Thread Gordon Morehouse
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Lukas Erlacher: >> your refusal to pay for content people create. > > That's a silly smear. If an endless tsunami of torrent traffic makes it so Tor users can't buy music off bandcamp - a site where the artist gets the lion's share, and where some

Re: [tor-relays] Amazon abuse report

2013-11-04 Thread Gordon Morehouse
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Lukas Erlacher: > Let me chime in here in regards to torrents to be perhaps not the > devil's, but the radical's advocate. A lot of the people wishing to handle bittorrent are aware of these arguments and may not wish to block it so much as throttl

Re: [tor-relays] Is there any reason to keep the default exit policy?

2013-11-04 Thread mick
On Mon, 4 Nov 2013 13:43:29 + Thomas Hand allegedly wrote: > Running as exit relay should be a consensual and informed decision of > the operator. > Agreed. I'll add my voice to those voting in favour of the default policy for a relay being non-exit. As Tom said, those competent enough to r

Re: [tor-relays] Is there any reason to keep the default exit policy?

2013-11-04 Thread I
All, "If Tor is made non-exit by default, it can be explained to the hosters that Tor out-of-the box will not bring any legal stress their way. It may even encourage them to run a few relays themselves. :) Parity.Boy" That's on the right track. If running a non-exit relay were clearly separa

Re: [tor-relays] Amazon abuse report

2013-11-04 Thread Paul Syverson
On Mon, Nov 04, 2013 at 08:18:29AM -0800, Gordon Morehouse wrote: [snip] > > > > That's just plain silly. > > Not as silly as you think, but the outright blocking vs finding ways > to throttle is more a discussion worth having. I suspect most of the > Silent Majority(tm), if polled, would rather

[tor-relays] Traffic in port 9050 in a relay (denial of service attack?)

2013-11-04 Thread jj tor
Hello all, I've set up a tor exit relay (0.2.4.17-rc, debian testing) on a VPS, and it's running well (about 20Gbs/day). But a lot of traffic (about 50%!) is using port 9050 for incoming connections. It's something more than random scans. Because I am worried, I've run tcpdump on this port and t

Re: [tor-relays] Amazon abuse report

2013-11-04 Thread Gordon Morehouse
On Mon, 4 Nov 2013 14:38:40 -0500, Paul Syverson wrote: > On Mon, Nov 04, 2013 at 08:18:29AM -0800, Gordon Morehouse wrote: > [snip] > > > > > > That's just plain silly. > > > > Not as silly as you think, but the outright blocking vs finding ways > > to throttle is more a discussion worth havi

Re: [tor-relays] Amazon abuse report

2013-11-04 Thread Gordon Morehouse
On Sat, 02 Nov 2013 21:58:57 +, Paritesh Boyeyoko wrote: > On Friday 01 Nov 2013 14:39:28 Gordon Morehouse wrote: > > > Completely aside from the ethical and censorship-related buzzsaw you're > > about to run into for posting this (perennial) question, I believe some > > actual developers o

Re: [tor-relays] Traffic in port 9050 in a relay (denial of service attack?)

2013-11-04 Thread Paritesh Boyeyoko
@jj tor If your torrc literally reads "SocksPort = 0" (no quotes) then the config parser will ignore this and fall back to the default internal setting which is port 9050 wide open. Your torrc needs to read "SocksPort 0" (no quotes) to disable SOCKS connectivity. Best, -- Parity parity@g

Re: [tor-relays] Traffic in port 9050 in a relay (denial of service attack?)

2013-11-04 Thread Paritesh Boyeyoko
@jj tor ...and before I forget, yes deploy IPtables anyway. :) Best, -- Parity parity@gmail.com___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Amazon abuse report

2013-11-04 Thread Nelson
My main concern, and the reason I asked about blocking specific traffic (ip's from blacklisted p2p sites), is mainly due to the problem the original poster faces with DMCA; abuse complaints and the possibility of being shutdown. No one wants to volunteer a service and then face legal issues. Who in

Re: [tor-relays] Amazon abuse report

2013-11-04 Thread Kevin C. Krinke
> On Nov 4, 2013, at 7:13 PM, Nelson wrote: > > I do believe there is a benefit to Torrents as many of us can attest to, > ex: fast downloads of different Linux distros; but if your use of > Torrents is in fact legit then why use Tor for downloading your legal > content in the first place? This

Re: [tor-relays] Amazon abuse report

2013-11-04 Thread Nelson
>From all that I have read in these lists not all exit nodes are configured exactly the same, so some level of traffic control is being rightly exercised by the operator(s). For any given reason be it moral, ethical or legal many well known ports are being blocked, as was previously discussed, as a