> On 23 Sep 2017, at 01:49, Iain R. Learmonth <irl@xxxxxxxxxxxxxx> wrote: > > Hi teor, > > On Fri, Sep 22, 2017 at 11:14:07PM +1000, teor wrote: >> >>> On 22 Sep 2017, at 23:03, relay 000 <relay0@xxxxxxxxxxx> wrote: >>> >>>> Someone is using the hidden service rendezvous protocol to ask non-exit >>>> relays to scan non-tor IP addresses. >>> >>> wow, people can misuse my *non*-exit relay to scan (aka send a TCP SYN >>> packet) other systems on the internet? >> >> Yes. > > Can you clarify here that no feedback is given and that this is not a useful > scan? > > I assume the remote relay will return the same error whether there is > something listening on the port or not, as it wasn't possible to extend the > circuit. Yes. It's really much more reliable to use a Tor Exit for things like this. They're faster, and they give more detailed error messages in response. T -- Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B ricochet:ekmygaiu4rzgsk6n xmpp: teor at torproject dot org ------------------------------------------------------------------------
Attachment:
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays