Hi Conrad,
Thank you for running exit relays and helping diversify the Tor network. I’m sorry to hear you’re experiencing this issue with Irdeto / your colocation facility, I understand how frustrating these situations can be.
I’m going to reach out to you off list to discuss this issue further and offer some potential short-term / long-term solutions.
Thanks again, you should be receiving an email from me shortly.
On Aug 23, 2018, at 7:51 AM, Conrad Rockenhaus conrad@rockenhaus.com wrote:
Signed PGP part So, new equipment gets plugged into a colo…. I’m a dude that was looking to increase AS diversity on Tor and well, decided to add a new colo to the mix.
Two exit relays are brought online on properly SWIPed IP addresses. These exit relays have only been online for about 24 hours.
An organization, known as Irdeto Intelligence, ignores the fact that the IP addresses are SWIPed and sends abuse complaints to my upstream providers asking them to straighten me out, because I’m a pox on society because people are torrenting via Tor. They have sent over 40 emails in the last 12 hours.
Some dude-man, who calls himself a “Network Security Administrator” who asked me to explain what Tor is……….because he’s a Network Security Administrator……..has told me that due to the volume of complaints I need to block the offending applications from their network.
I told him that I spoke with them prior to bringing this stuff online, explained what Tor was, explained what a Tor exit was, explained that it will generate complaints, explained the DCMA liability, explained the whole thing…..and was told that they were okay with it.
I’m sorry for the bitching and moaning…it’s just another case of doing everything right and now I’m quite worried that they’ll not only pull the plug, that I’ll have to fight to get my Cisco UCS blade server back (and other assorted equipment) which is totally not going to be cool.
Conrad