<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div dir="ltr">No, it was in a datacenter. Here the case </div><div dir="ltr"><br></div><div dir="ltr"><a href="https://www.lawblog.de/index.php/archives/2018/02/13/strafbare-beihilfe-durch-einen-tor-server/">https://www.lawblog.de/index.php/archives/2018/02/13/strafbare-beihilfe-durch-einen-tor-server/</a></div><div dir="ltr"><br></div><div dir="ltr">Sorry, only German.</div><div dir="ltr"><br><blockquote type="cite">Am 16.04.2020 um 12:45 schrieb Mario Costa <mario.costa@icloud.com>:<br><br></blockquote></div><blockquote type="cite"><div dir="ltr"><span>Where you running an exit from home? It’s really discouraged because of what happened to you. </span><br><span></span><br><span>-m</span><br><span></span><br><blockquote type="cite"><span>Il giorno 16 apr 2020, alle ore 04:50, Kolja Sagorski <hallo@koljasagorski.de> ha scritto:</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><span>I had a police house search for my exit...</span><br></blockquote><blockquote type="cite"><span>I hate the stupid German police.</span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><blockquote type="cite"><blockquote type="cite"><span>Am 15.04.2020 um 22:53 schrieb "lists@for-privacy.net" <lists@for-privacy.net>:</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Hi,</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>my Family¹ has had an exit for 2 weeks and today the first abuse mail has arrived.</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>First of all, thanks for the templates:</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>https://www.torservers.net/wiki/abuse/templates</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>I linked these two from the Tor-project:</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>- Common Boilerplate (Tor Intro)</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>- SSH Bruteforce Attempts</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>and wrote the following myself:</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>--------------------------------------</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Another good option that we use ourselves is: fail2ban</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>And report to blacklists, which can then be loaded into the router firewalls:</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>https://www.abuseipdb.com/user/33280</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Hope this helps!</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>--------------------------------------</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>I actually wanted to add that the SSH login attempts can be limited. (3-6)</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Because the logs from the abuse mail showed 100 attempts pro IP. ;-)</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>_Are such notes useful or do such instructions cause even more problems?_</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>¹https://metrics.torproject.org/rs.html#search/TorOrDie4privacyNET</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>-- </span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>╰_╯ Ciao Marco!</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>Debian GNU/Linux</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span></span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>It's free software and it gives you freedom!</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>_______________________________________________</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>tor-relays mailing list</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>tor-relays@lists.torproject.org</span><br></blockquote></blockquote><blockquote type="cite"><blockquote type="cite"><span>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</span><br></blockquote></blockquote><blockquote type="cite"><span>_______________________________________________</span><br></blockquote><blockquote type="cite"><span>tor-relays mailing list</span><br></blockquote><blockquote type="cite"><span>tor-relays@lists.torproject.org</span><br></blockquote><blockquote type="cite"><span>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</span><br></blockquote><span>_______________________________________________</span><br><span>tor-relays mailing list</span><br><span>tor-relays@lists.torproject.org</span><br><span>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</span><br></div></blockquote></body></html>