[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] tor-relays Digest, Vol 3, Issue 11



My ISP also send me a message about abuse (virusses) ,and after I send them a reply that I'm running a tor node and that if they receive further abuse complaints they should just forward them to my mail for me to handle myself I didn't receive any abuse mail again :)
I think my ISP is actually running some IDS with sinkholethinghies (I don't know anything about IDS'es yet, will research into it) and I can access a page with info on my IP wich shows some activity:
2011-04-05 21:56:55,85.223.49.156,29272,20507,NL,UTRECHT,AMERSFOORT,,tcp,sinkhole,,,REMOVED,DE,,1,,,Windows,2000 SP2+, XP SP1+ (seldom 98)
2011-04-05 22:26:35,85.223.49.156,45924,20507,NL,UTRECHT,AMERSFOORT,,tcp,sinkhole,,,REMOVED,US,,1,,,Windows,2000 SP4, XP SP1+
2011-04-04 21:04:06,85.223.49.156,20507,NL,GET /search?q=0 HTTP/1.1,downadup,Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; InfoPath.2; .N...
2011-04-05 02:29:02,85.223.49.156,20507,NL,GET /?REMOVED HTTP/1.0,sality,KUKU v5.02c =REMOVED,,30184,Windows,2000 SP4, XP SP1+,,80,www.REMOVED.info,,,,REMOVED,8560,...
2011-04-05 22:02:01,85.223.49.156,20507,NL,GET /search?q=0 HTTP/1.1,downadup,Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; InfoPath.2; .N...
2011-04-06 01:13:53,85.223.49.156,20507,NL,.,downadup,,,21901,,,,80,,,,,REMOVED,US
2011-04-07 20:08:37,85.223.49.156,20507,NL,GET /tatoshko.biz?data=""> HTTP/1.0,machbot,MachBot,,10988,Windows,2000 SP4, XP SP1+,,80,853c9e57.biz,,,,87.10...
2011-04-11 16:46:41,85.223.49.156,47015,20507,NL,UTRECHT,AMERSFOORT,,tcp,sinkhole,,,REMOVED,US,,1,,,Linux,2.6 (newer, 2)
2011-04-11 15:31:23,85.223.49.156,20507,NL,GET /search?q=15 HTTP/1.0,downadup,Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322; .NET CLR 2.0.50727),,45931,Windows,2000 SP...
2011-04-12 04:08:30,85.223.49.156,44022,20507,NL,UTRECHT,AMERSFOORT,,tcp,sinkhole,,,REMOVED,DE,,1,,,Windows,XP/2000
REMOVED= ip adresses (destination), dns names or things that look like http session specific things.
I see one port number (destination) somewhat more (all cases of tcp,sinkhole except 1): 8560 might be a virus/trojan/worm specific port ? Might be a good idea to remove this port from your exit if you get a lot of complaints (and it's not used for anything usefull)


The idea of setting up a local smtp out server with spam detection and clamav seems like a very good idea, maybe together with some tarpitting (if possible and easy) it would help a lot of users in need of smtp access and deter spammers (as they would spend hours and hours in tarpits at random when using tor) anyone can provide some good advice on how to set it up properly (I'm running FreeBSD)?
Would also be _really_ nice to maybe somehow add some header that says it was send using a tor relay with admin details so my ISP (as I would probably need to set it to relay to their smtp) will not start bitching and moaning about that to me, is it possible ? Yes? How ? ;)

What are the dangers of running an IDS myself ? Privacy wise I mean, could it be set up so that it knows about bad stuff hapening and in no way log other stuff ?

2011/4/13 <tor-relays-request@xxxxxxxxxxxxxxxxxxxx>
Send tor-relays mailing list submissions to
       tor-relays@xxxxxxxxxxxxxxxxxxxx

To subscribe or unsubscribe via the World Wide Web, visit
       https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
or, via email, send a message with subject or body 'help' to
       tor-relays-request@xxxxxxxxxxxxxxxxxxxx

You can reach the person managing the list at
       tor-relays-owner@xxxxxxxxxxxxxxxxxxxx

When replying, please edit your Subject line so it is more specific
than "Re: Contents of tor-relays digest..."


Today's Topics:

  1. Tor and Viruses (Porcelain Mouse)
  2. Re: Tor and Viruses (grarpamp)


----------------------------------------------------------------------

Message: 1
Date: Tue, 12 Apr 2011 20:46:21 -0700 (PDT)
From: Porcelain Mouse <porcelain_mouse@xxxxx>
Subject: [tor-relays] Tor and Viruses
To: Tor-Relays <tor-relays@xxxxxxxxxxxxxxxxxxxx>
Message-ID: <alpine.LFD.2.02.1104122018100.5770@xxxxxxxxxxxxxxxxxxxxx>
Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII

Greetings All,

       I've been running an exit for about 5 months, but had to stop due
to virus abuses.  In the last two weeks, my ISP has partially blocked my
Internet access twice due to suspected virus infections.  I'll spare you
the long story, but I was able to get a copy of their "evidence" and I'm
fairly certain it was connections made through my Tor relay.

 1) How common is it that Tor is abused by viruses?  What is the trend?
 2) Is this just standard virus-kit material, these days?

I guess I was a little surprised.  Obviously, this is a great idea for
hiding the infection site, so I'm sure it's being done.  But still, I've
been fighting viruses for quite a while and I don't think I've read a
single virus description that mentioned Tor.  I'm sure it's happening, but
I've never heard a single statistic about it, so I thought I would ask.

Also, this type of abuse is *not* mentioned on the Tor wiki's Abuse FAQ
under "What should I expect if I run an exit relay?"  I read that section
carefully and was prepared for most of the things mentioned.  Again, I'm
not completely shocked.  I'm just saying it didn't seem likely, according
to the FAQ.  It would be nice to know how likely is this kind of abuse,
and what is the trend.  (And, maybe someone can add the results to the FAQ
when we have an answer.)

Thanks,
PMouse


------------------------------

Message: 2
Date: Wed, 13 Apr 2011 03:19:27 -0400
From: grarpamp <grarpamp@xxxxxxxxx>
Subject: Re: [tor-relays] Tor and Viruses
To: tor-relays@xxxxxxxxxxxxxxxxxxxx
Message-ID: <BANLkTikwPS6JDqKMvaxxWhgq2dUoGELKKA@xxxxxxxxxxxxxx>
Content-Type: text/plain; charset=UTF-8

> my ISP has partially blocked my Internet access twice
> due to suspected virus infections.

Virus is likely not the right word for things. Anyways...

There's really no reason an operator cannot run something
like bro-ids.org and sink known bad traffic in real time. Yeah,
sure, everyone will bitch at me. But it is operator fiat, and
they're not sinking specific users, so well within common
carrier exceptions on that aspect. No different than operators
who block 'torrent' ports, smtp, etc.

Speaking of smtp, one could even redirect that into their
system despam/clamav it and send it on its way. Better
than nothing. Especially for the legit senders.


------------------------------

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


End of tor-relays Digest, Vol 3, Issue 11
*****************************************

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays