Re: [tor-relays] rejected hit from China

2014-07-02 Thread Daniel Case
Sounds like fairly typical background noise to me. Null route the IP if you're concerned but it's probably a zombie in someone's botnet or a chinese user trying his luck. If your IP is listed publicly on tor, expect to be probed every now and then. On 3 July 2014 04:14, Larry Brandt wrote: >

Re: [tor-relays] Running an AWS bridge on eu-west-1?

2014-08-03 Thread Daniel Case
Hi, You can run the bridge wherever you like, you can change region like so: http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html There isn't any difference from that point on. When the documentation was first made, I believe US East 1 was the only location t

Re: [tor-relays] Jump in brute force complaints

2015-01-04 Thread Daniel Case
On 4 January 2015 at 11:00, wrote: > I should have specified that I was talking about brute force attempts against > http servers, not SSH servers. I don't get any complaints about SSH brute > force attempts. I have also had a spike these last few days, mainly against sysads running Wordpress.

Re: [tor-relays] What to do about icecat.biz abuse complaints?

2012-04-14 Thread Daniel Case
If I recall correctly, icecast is streaming software that runs on port 8000. I assume that someone through your node is trying to "rip" the content, which is what the "RIP Attempt" would be. (Not sure where you got the info that it is too many connections?) If you block port 8000, that could stop

Re: [tor-relays] What to do about icecat.biz abuse complaints?

2012-04-14 Thread Daniel Case
; catalog. > > Blocking the IP associated with icecat.biz is the first thing I did. > That didn't stop the abuse reports. It seems that they have servers > distributed all over the world, and the reports don't say what server > experienced the abuse. >

Re: [tor-relays] too many abuse reports

2012-05-22 Thread Daniel Case
I can also confirm same attack it must have been huge o.o On 22 May 2012 20:17, tor-admin wrote: > mick wrote on 22.05.2012: > > I assume you mean "IP address" rather than "port" here. > > > > Despite offering, I wasn't given the opportunity to do that. > > > > Interesting that you also see

Re: [tor-relays] case law on for exit nodes

2012-05-22 Thread Daniel Case
Hi Rejo, On 22 May 2012 22:12, Rejo Zenger wrote: > > > Who knows about cases where the owner of Tor exit node was prosecuted or > taken to court for information that was up- or downloaded using his/her Tor > node? Basically, I'm looking for case law on running Tor exit-nodes. >From the Legal F

Re: [tor-relays] Announcing the Walla Walla Project

2012-10-18 Thread Daniel Case
Email me offlist if you would like a dedicated IP and SSL cert on our European servers. Dan On 18 October 2012 12:29, admin wrote: > Hi Andreas, Jacob, > > On Thu, 18 Oct 2012 09:40:35 +0200 Andreas Krey wrote > > >On Thu, 18 Oct 2012 00:21:57 +, Jacob Appelbaum wrote: > >... > >

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-27 Thread Daniel Case
I have a real world example of this. My forum was being abused by several users all originating from the Tor network, so the first thing I did (and any sane admin would do) was block Tor access (with a note) for a few hours while I figured out what to do. I ended up unbloacking the network and show

Re: [tor-relays] Disappointing AUP - (was Re: DDOS?)

2012-12-31 Thread Daniel Case
This might be a bit of a shameless plug, but I used to use bitfolk ( bitfolk.com) - they have a generous allowance of bandwidth and allow tor as long as you set it up correctly. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.tor

Re: [tor-relays] TCP: Peer unexpectedly shrunk window

2013-07-15 Thread Daniel Case
> [422949.356062] TCP: Peer 79.22.114.39:60467/9001 unexpectedly shrunk > window 2565384113:2565389251 (repaired) Those errors appear in our dmesg at work and we're not a relay (port 80 instead which is where our web services run) - just thought I'd chime in and say it isn't TOR specific.

Re: [tor-relays] Tortilla

2013-07-18 Thread Daniel Case
http://lmgtfy.com/?q=What+is+Tortilla+Tor%3F ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] (no subject)

2013-08-27 Thread Daniel Case
Uhh, what? This is a mailing list. You signed up to it, and you will need to remove yourself by signing into here: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.

Re: [tor-relays] Being flooded.........

2013-08-27 Thread Daniel Case
>they are all being stretched to their capacity. 1: Anti virus and malware detection don't have a 'capacity' - no idea what you're talking about. Make it so no one can connect to Tor unless they are certified clean. > 2: Whether your an exit relay or not, viruses would not come from Tor. Your r

Re: [tor-relays] Tor exit notice

2013-08-29 Thread Daniel Case
> if a given IP address is actually a Tor exit server Should probably be "node" rather than router, that seems to fit better. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Watching the attacks on my relay

2013-11-08 Thread Daniel Case
You self signed your site certificate...? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] (no subject)

2014-01-18 Thread Daniel Case
Fabiano, You're aware this is a public mailing list, where everything posted here is already public right, and any police force who want to can already see it? And you're also aware that while you're subscribed to the mailing list, you will receive everything in said list? You can't tell the entir