[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Action relays on 188.214.30.0/24 subnet



> Clients don't choose relays in the same /16 in the same circuit.
> So I don't think this is a danger to users.

Ok.

> We would like to write a polite email saying:
> "thanks for helping Tor, please add a family to your config".
>
> But since they haven't provided contact details, we can't do that.
>
> T
>
> --
> Tim / teor
>
> PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
> ricochet:ekmygaiu4rzgsk6n
> ------------------------------------------------------------------------


But as Aneesh pointed out in the other thread:

>---------------------------- Original Message ----------------------------
>Subject: Re: [tor-relays] DoS attacks on multiple relays
>From:    "Aneesh Dogra" <lionaneesh@xxxxxxxxx>
>Date:    Tue, December 5, 2017 9:37 am
>To:      tor-relays@xxxxxxxxxxxxxxxxxxxx
>--------------------------------------------------------------------------
>
>Looks scary. Interesting to see they all have high guard probabilities. :-?

My concerns are more about the HS harvesting/correlation capabilities
these relays have, than de-anonymisation of users.

I am not a Tor specialist, but would like to know if there are any kind of
safety measures against such persons/entities employing automated big
farms, high speed, stable guards, HSDir, without family set, or proposals
being discussed on the topic.

cheers.

x9p


_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays