[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata
What if someone who doesnt like Tor project is deliberately accessing
honeypots in order to get exit nodes shut down?
We need to establish some sort of legal or political solidarity to tell
ISPs to be net neutral with us. It is not our problem if someone uses
the telecom network to read/write data to a vulnerable server - it is
the vulnerable server's problem to fix. The ISP (and Tor network) are
only responsible for delivering the packets and handling abuse of
*network* resources such as DDoS - content is irrelevant.
Tor publishes exit node ip addresses so that destinations that dont want
to deal with anonymous traffic can block it. Did you try these answers:
https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates
On 04/10/16 12:01 PM, pa011 wrote:
> Me too Markus -could fill a folder with that tax issue :-((
> Costing a lot of time to answer and restrict the IPs
>
> Plus my ISP moaning with good reason: "It's not just about you, but you're giving a bad reputation to one /21 and one /22 subnet. That's ~ 3000 IPs which are potentionaly endagered to be marked as source of malicious content / blacklisted / whatever ... so you see, this is quite critical for us."
>
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays