Running an Exit node from home is asking for trouble. I can't imagine why anyone would want to. Anyways, /etc/hosts.allow and /etc/hosts.deny can also be used to limit SSH access. I highly recommend.
Best, Jason Sent from my Android device. Please excuse my brevity and any typos that may occur. On Thu, Apr 16, 2020, 3:32 PM Volker Mink <[email protected]> wrote: > Not 100% accurate. > I was running an exit at my home connection for close to one year. I > removed it because normal internet usage became absolutely anoying. Capchas > and DOS-Protections nearly everywhere. No streaming-portal was running. And > lots of complaints from my provider. > But no Cop action! > > And now i am running 2 exits hosted in datacenters, one in germany, one in > malaysia. No problems by now. > > > br, > volker > > > *Gesendet:* Donnerstag, 16. April 2020 um 13:32 Uhr > *Von:* "NOC" <[email protected]> > *An:* [email protected] > *Betreff:* Re: [tor-relays] Got my first abuse > They raid your home even if the Tor node is run in a datacenter. Sadly > the police in germany is still stuck in the 90s and most of them don't > know and/or care what Tor is and how it works. > > On 16.04.2020 12:45, Mario Costa wrote: > > Where you running an exit from home? It’s really discouraged because of > what happened to you. > > > > -m > > > >> Il giorno 16 apr 2020, alle ore 04:50, Kolja Sagorski < > [email protected]> ha scritto: > >> > >> I had a police house search for my exit... > >> I hate the stupid German police. > >> > >>> Am 15.04.2020 um 22:53 schrieb "[email protected]" < > [email protected]>: > >>> > >>> Hi, > >>> > >>> my Family¹ has had an exit for 2 weeks and today the first abuse mail > has arrived. > >>> > >>> First of all, thanks for the templates: > >>> > >>> https://www.torservers.net/wiki/abuse/templates > >>> > >>> https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates > >>> > >>> > >>> I linked these two from the Tor-project: > >>> > >>> - Common Boilerplate (Tor Intro) > >>> > >>> - SSH Bruteforce Attempts > >>> > >>> and wrote the following myself: > >>> -------------------------------------- > >>> Another good option that we use ourselves is: fail2ban > >>> And report to blacklists, which can then be loaded into the router > firewalls: > >>> https://www.abuseipdb.com/user/33280 > >>> > >>> Hope this helps! > >>> -------------------------------------- > >>> > >>> I actually wanted to add that the SSH login attempts can be limited. > (3-6) > >>> Because the logs from the abuse mail showed 100 attempts pro IP. ;-) > >>> > >>> _Are such notes useful or do such instructions cause even more > problems?_ > >>> > >>> > >>> > >>> ¹https://metrics.torproject.org/rs.html#search/TorOrDie4privacyNET > >>> > >>> -- > >>> ╰_╯ Ciao Marco! > >>> > >>> Debian GNU/Linux > >>> > >>> It's free software and it gives you freedom! > >>> _______________________________________________ > >>> tor-relays mailing list > >>> [email protected] > >>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > >> _______________________________________________ > >> tor-relays mailing list > >> [email protected] > >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > _______________________________________________ > > tor-relays mailing list > > [email protected] > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays >
_______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
