Running an Exit  node from home is asking for trouble. I can't imagine why
anyone would want to. Anyways, /etc/hosts.allow and /etc/hosts.deny can
also be used to limit SSH access. I highly recommend.

Best,
Jason

Sent from my Android device. Please excuse my brevity and any typos that
may occur.

On Thu, Apr 16, 2020, 3:32 PM Volker Mink <[email protected]> wrote:

> Not 100% accurate.
> I was running an exit at my home connection for close to one year. I
> removed it because normal internet usage became absolutely anoying. Capchas
> and DOS-Protections nearly everywhere. No streaming-portal was running. And
> lots of complaints from my provider.
> But no Cop action!
>
> And now i am running 2 exits hosted in datacenters, one in germany, one in
> malaysia. No problems by now.
>
>
> br,
> volker
>
>
> *Gesendet:* Donnerstag, 16. April 2020 um 13:32 Uhr
> *Von:* "NOC" <[email protected]>
> *An:* [email protected]
> *Betreff:* Re: [tor-relays] Got my first abuse
> They raid your home even if the Tor node is run in a datacenter. Sadly
> the police in germany is still stuck in the 90s and most of them don't
> know and/or care what Tor is and how it works.
>
> On 16.04.2020 12:45, Mario Costa wrote:
> > Where you running an exit from home? It’s really discouraged because of
> what happened to you.
> >
> > -m
> >
> >> Il giorno 16 apr 2020, alle ore 04:50, Kolja Sagorski <
> [email protected]> ha scritto:
> >>
> >> I had a police house search for my exit...
> >> I hate the stupid German police.
> >>
> >>> Am 15.04.2020 um 22:53 schrieb "[email protected]" <
> [email protected]>:
> >>>
> >>> Hi,
> >>>
> >>> my Family¹ has had an exit for 2 weeks and today the first abuse mail
> has arrived.
> >>>
> >>> First of all, thanks for the templates:
> >>>
> >>> https://www.torservers.net/wiki/abuse/templates
> >>>
> >>> https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates
> >>>
> >>>
> >>> I linked these two from the Tor-project:
> >>>
> >>> - Common Boilerplate (Tor Intro)
> >>>
> >>> - SSH Bruteforce Attempts
> >>>
> >>> and wrote the following myself:
> >>> --------------------------------------
> >>> Another good option that we use ourselves is: fail2ban
> >>> And report to blacklists, which can then be loaded into the router
> firewalls:
> >>> https://www.abuseipdb.com/user/33280
> >>>
> >>> Hope this helps!
> >>> --------------------------------------
> >>>
> >>> I actually wanted to add that the SSH login attempts can be limited.
> (3-6)
> >>> Because the logs from the abuse mail showed 100 attempts pro IP. ;-)
> >>>
> >>> _Are such notes useful or do such instructions cause even more
> problems?_
> >>>
> >>>
> >>>
> >>> ¹https://metrics.torproject.org/rs.html#search/TorOrDie4privacyNET
> >>>
> >>> --
> >>> ╰_╯ Ciao Marco!
> >>>
> >>> Debian GNU/Linux
> >>>
> >>> It's free software and it gives you freedom!
> >>> _______________________________________________
> >>> tor-relays mailing list
> >>> [email protected]
> >>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> >> _______________________________________________
> >> tor-relays mailing list
> >> [email protected]
> >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> > _______________________________________________
> > tor-relays mailing list
> > [email protected]
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> _______________________________________________
> tor-relays mailing list
> [email protected]
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> _______________________________________________
> tor-relays mailing list
> [email protected]
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to