[tor-talk] Blocking Shadowserver honeypots

alex-tor at copton.net alex-tor at copton.net
Sat Mar 19 17:59:02 UTC 2011


Hi

FYI, I had a short discussion with some guys on the public shadowserver
mailing list.

Some of them are pretty fanatic indeed and say things like:
---8<---
TOR provides criminals with anonymous access to engage in criminal activity behind a cloak.
TOR makes it exponentially more difficult to fight internet abuse.
TOR operators are guilty by complicity.
TOR is evil.
--->8---
and
---8<---
TOR = abuse
Running an endpoint should be illegal in itself.
--->8---

In contrast, others are quite rational and explained that 
---8<---
Our standard policy is to report what we see without any filtering. It
is up to the receiving organization to determine what is the correct
response. We do not dictate nor require any specific response from our
reports.
--->8---

I do see their point so I will try to talk to my ISP (once again...)

Additionally, I will reject connections to the Shadowserver honeypots to
avoid further abuse reports. This does not solve the fundamental
conflict between Shadowserver and Tor, but it solves the problem for me
and keeps my exit node hopefully up and running.

best

Alex
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 198 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20110319/e3f45fd0/attachment.pgp>


More information about the tor-talk mailing list