[tor-relays] Tor exit nodes attacking SSH?

teor teor2345 at gmail.com
Wed Aug 9 02:56:10 UTC 2017


> On 9 Aug 2017, at 10:48, Steven Chamberlain <steven at pyro.eu.org> wrote:
> 
> Hi,
> 
> ...
> 
> I could be wrong, but I think this "dropbear" service is most likely
> something malicious, running on one or more Tor exit nodes, attempting
> to collect passwords of people logging in this way.

If you can find the exit fingerprints or IP addresses, please email
them to bad-relays at lists.torproject.org. They will BadExit them.

T

--
Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20170809/998d90bc/attachment-0001.sig>


More information about the tor-relays mailing list