[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-relays] SWIPing IPs (Was Re: Final Warning Notice)
On 7/9/2013 9:03 PM, hack@xxxxxxxxxx wrote:
> A brief "whois" on the IP 216.243.58.198 reveals that the abuse address is
> listed as CondoInternet.
>
> Does anybody have experience getting an IP allocation so that the abuse
> address is listed differently?
>
> I have little experience, but perhaps this is a way out of this problem if
> condo's problem is the number of abuse complaints and the time it takes
> them.
It's my understanding that very few (and by very few I don't know or have ever heard of any) who will SWIP (change the abuse contact) an IP for anything under a /28 allocation. If one would SWIP a single IP, it'd probably require a very expensive bandwidth package.
I've thought quite a bit about pooling resources and getting a /28 from a provider, and then assigning those IPs as secondary IPs on cheap VPS providers, and then routing the traffic via encrypted IPSEC/GRE tunnels. But the /28 would have to be advertised in a single location, because people won't do BGP routes for single IPs (or maybe even /28s).
So if the /28 was registered in a datacenter in Chicago, all exit traffic would go to that datacenter (bad) then be shipped to the real Tor node in say Europe (slow), and then do the 3-hop Tor path. So I eventually gave up on that idea.
But my networking kung-fu is not as strong as others, so maybe via multicast or anycasts tricks this could work?
-tom
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays