
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Heya List I currently run a VPS which hosts both my mailserver and my tor relay / exit. Recently I sent an email from this mailserver and had it bounce back. It seems the receiving mailserver subscribes to the spambot list CBL (http://cbl.abuseat.org) and denied it because my IP address was on that list. It's on that list since at some point a botnet talking through tor to its C&C server used my exit node to do so - The C&C server has since been replaced with a sinkhole. That was logged, my server was deemed infected and bam, I'm blacklisted. The site that did the blacklisting kindly has a good description of what happended (including the sinkhole IP address) and allowed an automatic delisting. I'm able to update my exit policy so it doesn't happen again, however I'd like a somewhat more proactive approach. So my question is - Does anyone know of a publicly available list of sinkholes created for botnets? If such a list exists I can dynamically update either my exit policy or firewall appropriately. Has anyone implemented such a system already? (obviosuly this only works for sinkholed botnets - but if anyone knows how to stop all botnets I'm all ears....) Cheers Ramo -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) iQEcBAEBAgAGBQJTNQpGAAoJEAXQWoW8lug/mdkH/jqK5ndFWbVrRnNV7a8IqgYl 4iiR6TUYLjGEdcz8VDZ+cOkW0uCQkOvD6RWl/kWHKmA4iy7alFgbKE4Lkcg4QgBB 7EgNYww3zBbj1NX5rtRN7POge2n4ns7Y7whw0qbvHXE0ur74iLyy5H3hHZeWoosU g6t9mCsMpEpGAvbkzkDxo+idAdxYe+JiB3iaAAEUDtzeStOG5RJ/qrg8JM+U7ofA bWPehBV8+V8E//4G/XLsePCciBN0071ylg+YoGcxDpM97WHvmQKbi5VU3KfQJFTB AFaQ+7ib1BNhe7KEC7V0Iha6Yu/BTNhDRA/0i1C3pad32HQsfGvep261yq+KBjc= =Wemh -----END PGP SIGNATURE-----

Hi Ramo, Thanks for running an exit! You will run into similar trouble again and again, unfortunately. My suggestion: Get a second IP, or even better, don't share the same VPS. -- Moritz Bartl https://www.torservers.net/

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Fri, Mar 28, 2014 at 06:48:21AM +0100, Moritz Bartl wrote:
Hi Ramo,
Thanks for running an exit!
Thanks. I've been running one for ages, but the appreciation is always nice.
You will run into similar trouble again and again, unfortunately.
This is the first time I've known this to happen, I've had this configuration for ... probably 2 years?
My suggestion: Get a second IP, or even better, don't share the same VPS.
Not sure why a second IP never occurred to me. Good idea. Cheers Damian -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.14 (GNU/Linux) iQEcBAEBAgAGBQJTNRudAAoJEAXQWoW8lug/hk0H/i+/azfb/CYn31v+UXoYc9NF zMqQUFTeJSiLrXU43QLPb/RLG5XyBWRZNZcoBwdU0x6m4MmoNHg4QpA+HTRWzzUo aQj+ieUcQ1EWm2NZ7Q/ovuYMYyYP38/Y3aUID5sRr0vEYupKNwsztf3VDFjyJziK jsP6BVug0jeBuac5q42t6dk8w4CUUNQRlamvhRFQBMWJJPaMd+MPKNwYcf8eNELO sH96/iTx/kvNBEgueHQyttXa2zcEg3ErhabqdMCSOHIUp7y09T+97Plx6qy9iNL/ eTXf75ZT/57ELzmhrWLXTAdLuGy52yNwwDParI2+w+Q1v61freEobFy5wCA3jZs= =Jjoz -----END PGP SIGNATURE-----

On Fri, Mar 28, 2014 at 08:36:06AM +0300, ramo@goodvikings.com wrote:
It's on that list since at some point a botnet talking through tor to its C&C server used my exit node to do so
Actually, it could easily have been a computer security researcher who used Tor to access that address, not realizing the collateral damage he was triggering. A growing number of malware researchers and antivirus companies use Tor to reach various parts of the Internet, because otherwise the bad guys recognize their IP address and special-case them. As Moritz says, this is alas not an easy game to win. Not long ago I learned that the .mil domain refuses to hear any packets from my computer, which runs one of the directory authorities (and it's not even an exit relay!). That meant my postfix became convinced that all mails to or from .mil addresses were spam, since their name doesn't resolve. Bad news for the Navy researchers who are signed up to, say, the petsymposium.org mailing lists. The real fun is going to start when these blacklists try to bully us by blacklisting the whole /24 nearby, in hopes that our neighbors will lean on us to cut it out. I still enjoy rereading http://paulgraham.com/spamhausblacklist.html as linked from https://www.torproject.org/docs/faq-abuse#TypicalAbuses --Roger
participants (3)
-
Moritz Bartl
-
ramo@goodvikings.com
-
Roger Dingledine