[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #15501 [- Select a component]: Routing to a small number of, most probably 'malicious, ' servers - how to block?



#15501: Routing to a small number of, most probably 'malicious,' servers - how to
block?
----------------------------------+---------------------
 Reporter:  cypherpunks           |          Owner:
     Type:  task                  |         Status:  new
 Priority:  critical              |      Milestone:
Component:  - Select a component  |        Version:
 Keywords:                        |  Actual Points:
Parent ID:                        |         Points:
----------------------------------+---------------------
 I am a professor and environmental activist with ongoing security issues
 with my communication devices. It appears that my TOR Browser is being
 routed to the same IPs over and over again. And, these IPs are included in
 a list of spamming/hijacking IPs that was posted on the Internet. I'd say
 that my computer regularly connects to about 2/3 of the addresses on this
 list of smamming hijackers. My range of server nodes that my computer uses
 to connect to the TOR network seems to be quite small. The following list
 should also include some server called 'dreamatorium' and another called
 'badexample.'

 109.163.233.205 - - [30/Apr/2012:03:28:55 +0200] gorz.torservers.net
 66.7.205.164 - - [30/Apr/2012:03:29:01 +0200] torsrvh.snydernet.net
 87.225.253.174 - - [30/Apr/2012:03:29:05 +0200] torproject.org.all.de
 199.48.147.35 - - [30/Apr/2012:03:29:09 +0200] tor-exit-
 router35-readme.formlessnetworking.net
 93.182.132.100 - - [30/Apr/2012:03:29:13 +0200] exit1.ipredator.se
 85.24.188.63 - - [30/Apr/2012:03:29:16 +0200]
 h-188-63.a189.priv.bahnhof.se
 77.247.181.162 - - [30/Apr/2012:03:29:18 +0200] chomsky.torservers.net
 84.55.117.251 - - [30/Apr/2012:03:29:19 +0200]
 84-55-117-251.customers.ownit.se
 46.165.196.182 - - [30/Apr/2012:03:29:37 +0200] ns2.kharlamov.co
 199.48.147.36 - - [30/Apr/2012:03:29:38 +0200] tor-exit-
 router36-readme.formlessnetworking.net
 62.113.219.4 - - [30/Apr/2012:03:29:40 +0200] tor11.anonymizer.ccc.de
 178.217.184.147 - - [30/Apr/2012:03:29:40 +0200] torexit.pl1.william.ir
 77.247.181.163 - - [30/Apr/2012:03:29:41 +0200] lumumba.torservers.net
 77.247.181.164 - - [30/Apr/2012:03:29:47 +0200]
 rainbowwarrior.torservers.net
 77.247.181.165 - - [30/Apr/2012:03:29:48 +0200]
 politkovskaja.torservers.net
 93.182.132.103 - - [30/Apr/2012:03:29:50 +0200] exit2.ipredator.se
 146.185.23.179 - - [30/Apr/2012:03:29:51 +0200]
 torland1-this.is.a.tor.exit.server.torland.me

 My university email browser posts the address for the server from which I
 connect to the university server to access my email. This is the reason I
 know which servers I am connecting to. How do I stop the browser from
 going through particular servers or allowing malicious IPS to connect? I
 am sure that I am not explaining this clearly, but I hope that you can
 decipher the problem. I am not a computer person, but I have a PhD and
 when looking at all of this, it appears that my connection is being routed
 to particular servers!!!

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15501>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs