I was wondering if these unfriendly tor clients are using tor's default path selection or something else. If they do tor exit relays would have much smaller values in their DoS stats, right? Would any tor exit operator (listed bellow) running 0.3.3.2-alpha be willing to share (obfuscated/not exact counters) of their DoS log entries? (only if you do not have any additional firewall rules filtering packets) | abuse@xxxxxxxxxxxxxxxxxxxxxxx | | replace k with c : kontakt @ zwiebeltoralf . de | | <rok AT sent dot com> | | florentin aatt rochet ddoott be; LTC: LhRqJZu6U87BJNSUbkACHzVQsK39hJ3sMB | | tor-relays@xxxxxxxxxx | | abuse@xxxxxxxxxxxxxxxxxxxxxx | | J. Random Hacker <anonymizer@xxxxxx> | | Exit by Reporters without Borders via https://www.torservers.net/ | | Neel Chauhan <neel AT neelc DOT org> | BTC: 1KogNvxdcXydDUNrPgqgtgV3AWktKPqXpS | | Random Person <tor AT cusse.org> | | OctaneZ-TOR <OctaneZ+toroperator@xxxxxxxxx> | | https://www.torservers.net/donate.html <support .AT. torservers .DOT. net> | | shallot protonmail com | | Random Person <killertor.abuse at gmail point com> | | Brandon Kuschel <kusch023 AT NOSPAM umn dot edu> | | <admin AT openbsd DOT se> | -- https://mastodon.social/@nusenu twitter: @nusenu_
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays