On 22 September 2017 at 16:49, Iain R. Learmonth irl@torproject.org wrote:
Hi teor,
On Fri, Sep 22, 2017 at 11:14:07PM +1000, teor wrote:
On 22 Sep 2017, at 23:03, relay 000 relay0@mailbox.org wrote:
Someone is using the hidden service rendezvous protocol to ask non-exit relays to scan non-tor IP addresses.
wow, people can misuse my *non*-exit relay to scan (aka send a TCP SYN packet) other systems on the internet?
Yes.
Can you clarify here that no feedback is given and that this is not a useful scan?
I assume the remote relay will return the same error whether there is something listening on the port or not, as it wasn't possible to extend the circuit.
There may be some timing difference, a faster response if the connection fails/is rejected vs if nothing is listening