I said most not 100%. My exits were in a Datacenter yet they showed up at my home. Actually it depends who it is. The local police here was very friendly and send me a invitation to visit them in cases with computer fraud that were made over the exits, the BKA just gave zero fucks and showed up at 06:00 at my home. And took anything looking like tech.
The exits had this.is.a.tor.exit.node as reverse dns and
displayed on port 80 what tor is, how it works and why i don't
have any usefull data for them. So if they would have done any
kind of more than asking the provider who pays for that IP they
could have get a hint that they won't find anything useful for
their case at my home or on the servers....
Not 100% accurate.I was running an exit at my home connection for close to one year. I removed it because normal internet usage became absolutely anoying. Capchas and DOS-Protections nearly everywhere. No streaming-portal was running. And lots of complaints from my provider.But no Cop action!And now i am running 2 exits hosted in datacenters, one in germany, one in malaysia. No problems by now.br,volkerGesendet: Donnerstag, 16. April 2020 um 13:32 Uhr
Von: "NOC" <tor@afo-tm.org>
An: tor-relays@lists.torproject.org
Betreff: Re: [tor-relays] Got my first abuseThey raid your home even if the Tor node is run in a datacenter. Sadly
the police in germany is still stuck in the 90s and most of them don't
know and/or care what Tor is and how it works.
On 16.04.2020 12:45, Mario Costa wrote:
> Where you running an exit from home? It’s really discouraged because of what happened to you.
>
> -m
>
>> Il giorno 16 apr 2020, alle ore 04:50, Kolja Sagorski <hallo@koljasagorski.de> ha scritto:
>>
>> I had a police house search for my exit...
>> I hate the stupid German police.
>>
>>> Am 15.04.2020 um 22:53 schrieb "lists@for-privacy.net" <lists@for-privacy.net>:
>>>
>>> Hi,
>>>
>>> my Family¹ has had an exit for 2 weeks and today the first abuse mail has arrived.
>>>
>>> First of all, thanks for the templates:
>>>
>>> https://www.torservers.net/wiki/abuse/templates
>>>
>>> https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates
>>>
>>>
>>> I linked these two from the Tor-project:
>>>
>>> - Common Boilerplate (Tor Intro)
>>>
>>> - SSH Bruteforce Attempts
>>>
>>> and wrote the following myself:
>>> --------------------------------------
>>> Another good option that we use ourselves is: fail2ban
>>> And report to blacklists, which can then be loaded into the router firewalls:
>>> https://www.abuseipdb.com/user/33280
>>>
>>> Hope this helps!
>>> --------------------------------------
>>>
>>> I actually wanted to add that the SSH login attempts can be limited. (3-6)
>>> Because the logs from the abuse mail showed 100 attempts pro IP. ;-)
>>>
>>> _Are such notes useful or do such instructions cause even more problems?_
>>>
>>>
>>>
>>> ¹https://metrics.torproject.org/rs.html#search/TorOrDie4privacyNET
>>>
>>> --
>>> ╰_╯ Ciao Marco!
>>>
>>> Debian GNU/Linux
>>>
>>> It's free software and it gives you freedom!
>>> _______________________________________________
>>> tor-relays mailing list
>>> tor-relays@lists.torproject.org
>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays