[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] abuse email for non-exit relay (masergy)



> On 23 Sep 2017, at 01:49, Iain R. Learmonth <irl@xxxxxxxxxxxxxx> wrote:
> 
> Hi teor,
> 
> On Fri, Sep 22, 2017 at 11:14:07PM +1000, teor wrote:
>> 
>>> On 22 Sep 2017, at 23:03, relay 000 <relay0@xxxxxxxxxxx> wrote:
>>> 
>>>> Someone is using the hidden service rendezvous protocol to ask non-exit
>>>> relays to scan non-tor IP addresses.
>>> 
>>> wow, people can misuse my *non*-exit relay to scan (aka send a TCP SYN
>>> packet) other systems on the internet?
>> 
>> Yes.
> 
> Can you clarify here that no feedback is given and that this is not a useful
> scan?
> 
> I assume the remote relay will return the same error whether there is
> something listening on the port or not, as it wasn't possible to extend the
> circuit.

Yes.

It's really much more reliable to use a Tor Exit for things like this.
They're faster, and they give more detailed error messages in response.

T

--
Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------



Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays