I said most not 100%. My exits were in a Datacenter yet they showed up at my home. Actually it depends who it is. The local police here was very friendly and send me a invitation to visit them in cases with computer fraud that were made over the exits, the BKA just gave zero fucks and showed up at 06:00 at my home. And took anything looking like tech.
The exits had this.is.a.tor.exit.node as reverse dns and displayed on port 80 what tor is, how it works and why i don't have any usefull data for them. So if they would have done any kind of more than asking the provider who pays for that IP they could have get a hint that they won't find anything useful for their case at my home or on the servers....
On 16.04.2020 20:18, Volker Mink wrote:
Not 100% accurate. I was running an exit at my home connection for close to one year. I removed it because normal internet usage became absolutely anoying. Capchas and DOS-Protections nearly everywhere. No streaming-portal was running. And lots of complaints from my provider. But no Cop action! And now i am running 2 exits hosted in datacenters, one in germany, one in malaysia. No problems by now. br, volker *Gesendet:* Donnerstag, 16. April 2020 um 13:32 Uhr *Von:* "NOC" tor@afo-tm.org *An:* tor-relays@lists.torproject.org *Betreff:* Re: [tor-relays] Got my first abuse They raid your home even if the Tor node is run in a datacenter. Sadly the police in germany is still stuck in the 90s and most of them don't know and/or care what Tor is and how it works.
On 16.04.2020 12:45, Mario Costa wrote:
Where you running an exit from home? It’s really discouraged because
of what happened to you.
-m
Il giorno 16 apr 2020, alle ore 04:50, Kolja Sagorski
hallo@koljasagorski.de ha scritto:
I had a police house search for my exit... I hate the stupid German police.
Am 15.04.2020 um 22:53 schrieb "lists@for-privacy.net"
Hi,
my Family¹ has had an exit for 2 weeks and today the first abuse
mail has arrived.
First of all, thanks for the templates:
https://www.torservers.net/wiki/abuse/templates
https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates
I linked these two from the Tor-project:
Common Boilerplate (Tor Intro)
SSH Bruteforce Attempts
and wrote the following myself:
Another good option that we use ourselves is: fail2ban And report to blacklists, which can then be loaded into the router
firewalls:
https://www.abuseipdb.com/user/33280
Hope this helps!
I actually wanted to add that the SSH login attempts can be
limited. (3-6)
Because the logs from the abuse mail showed 100 attempts pro IP. ;-)
_Are such notes useful or do such instructions cause even more
problems?_
¹https://metrics.torproject.org/rs.html#search/TorOrDie4privacyNET
-- ╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom! _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays