[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Malicious or crappily configured exit node



Hello!

referring to
https://trac.torproject.org/projects/tor/wiki/doc/badRelays, i sent this
also to tor-assistances@tpo. Never got an answer though :(

Now and then, I use Icedove with TorBirdy under Debian.
While connecting to port 465 on my usual mailserver, using SSL, I
sometimes get an SSL certificate alert. The certificate presented is not
my usual certificate at all (which works without adding an exception),
but one for cab.cabinethardwareparts.com, pretending to be my
mailserver. [1]

I've searched a bit for information on that exit node and found:
http://torstatus.rueckgr.at/router_detail.php?FP=0cc9b8aa649881c39e948e70b662772d8695c2e9
This node has flags: fast, stable, guard...

I tried it several times and the behaviour was repeatedly the same.
Last time it happened was 10 days ago. Then again today.

I'm not quite sure where to report this (that is how this e-mail ends up
on tor-relays :) ), nor how to avoid this exit node. Is there a way to
do that?

Thanks,
u.

[1] http://pix.toile-libre.org/upload/original/1399232278.png screenshot
of the certificate
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays