Jon, all others,

yes I understand what you say and obviously have to accept the ISP's
wishes (order).

But before giving up a 100Mbit/s exit I would like to understand more
about the ISP's reasons and burdens:

- is it just the more work for rather poor money handling(forwarding)
those abuses ?
- to whom else dose he have to report what he is doing with the gotten
abuses?
- must he answer to the origin of the abuse?
- who is getting a copy of them(if at all)?
- can he loose his license as a ISP (with to many or badly handled abuses)?
- are there any regulatory burdens for them - if so which ones?
- are ISP's treated different in different parts of the world?

Answers here might help me and others in bringing forward the discussion
with them.

Paul


Am 21.06.2016 um 15:38 schrieb BlinkTor:
> On Jun 20, 2016, at 4:19 AM, pa011 <pa...@web.de> wrote:
>>
>> Hi all,
>>
>> thanks again for your hints - in my case they obviously find Tor less
>> fancy - their response today is following:
>>
>> "Hello.
>> You need to take steps to ensure that the complaint would be no longer
>> received.
>> This software is only allowed if there are no complaints on the server."
>>
>> As I cant close Port 80 and the next attack would be a different target
>> I guess there is not much room for response :-(
>>
>> Rgds
>>
>> Paul
> 
> 
> Paul,
> 
> This is a recurring issue that will not go away, because protecting malicious 
> traffic is part of the foundational Tor philosophy. Tor very intentionally 
> has no ability (beyond rudimentary port/host blocking) to control the type of 
> traffic it carries, there are no plans to add any sort of IDS functionality, 
> and filtering exit relay traffic is frowned upon by the Tor community. This 
> is why abuse reports happen, and it's the primary reason that Tor relays are 
> blocked by so many services—typically not because folks are against personal 
> privacy, but because they simply take a very practical approach to network 
> security. So, if you (or your ISP) determine that the benefits of Tor aren’t 
> compelling enough to turn a blind eye to malicious Tor traffic and the abuse 
> reports it generates, then your only real options are to either not run an 
> exit, or not run Tor at all.
> 
> That’s just the way it is.
> 
> Jon
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to