-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
I'm currently in the middle of a somewhat heated e-mail debate with their vice-president. Pasting the e-mails below would be indelicate, but their position is that the Tor network is responsible for the abuse it generates and should take measures to prevent/block malicious traffic. They also state that according to their measurements, 99% of the traffic coming out of Tor is hostile, and they're going to release a report on the matter soon.
On my side, I've been arguing that 99% of bad traffic absolutely doesn't imply 99% of bad users, since brute-force attacks generate a massive amount of requests (i.e. that 99% of bad traffic may be generated by 1% of the users for all we know) - and therefore I'm unwilling to punish all of them because of an unruly few. Besides, blocking whole /24 subnets seems overkill to me, and they have yet to prove that they have the authority to speak for all the IPs they are requesting.
I suggested that site owners who wish to block Tor traffic do so using the DNSRBL, to which they replied that "hundreds of millions of site owners who barely know how to do e-mail" shouldn't be asked to configure their servers - or indeed do anything to protect themselves because that's victim blaming. They add that "what we have coming next in tackling abuses will make your heads spin :)" and conclude that I'm an arrogant bastard (mildly paraphrasing here).
So as far as I'm concerned, I'll just discard anything I receive from them in the future. I've told my hosting provider that their automated e-mails should be disregarded, and they are okay with that.
- -- JusticeRage
On 16/11/2015 13:52, Cristian Consonni wrote:
2015-11-16 13:21 GMT+01:00 Eran Sandler eran@sandler.co.il:
My hosting provider also go these requests. Their terms of service requires that I will answer something to acknowledge I got that.
I just answer "ok, I'll handle it" and that's it.
The reverse lookup of my nodes points to a hostname that shows the Tor text. The host name is tor4thepeople1.torexitnode.net so I'm quite sure they know that.
Same here.
I don't do anything beyond that and agree with AMuse that they can easily handle that without bugging the operators.
I understand this and it would also be my first line of reaction. However, I am a new exit node operator (my node as been active as an exit only for 5 and half now) and I have to understand how my ISP reacts to this kind of things.
For instance, after the report (which clearly says " Automated Message" on top of it, btw) they have sent me an email *and* called me on the phone (I just spoke with their customer tech support, they keep reminding me that everything that happens on that machine is my responsibility). They told me that they offer SWIP reassigment at an additional cost and only if buy dedicated servers and dedicated IP. I will speak with their commercial help desk to understand the costs.
For the moment I will keep a low profile and I will block the mentioned IP range for a month. Then let's see if I can talk to my ISP and get the SWIP reassignment.
C _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays