[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Exit node seized



The hoster handled this case quiet professionally, I guess it's a
standardized process for most hosting operators. As far as I know the
police just seizes the disks and the hoster just adds new ones.

On 12.09.18 17:08, Roman Mamedov wrote:
> On Wed, 12 Sep 2018 16:34:48 +0200
> tor-relays@xxxxxxxx wrote:
> 
>> I'd guess it's ok to just set up a new exit node on the same IP and
>> everything should be fine but I'm not quite 100% sure on this.
> 
> I find it surprising that you are able to do that, is the provider not mad at
> you for having one of their servers seized? Or even if yours, for causing a
> commotion and ruckus in their datacenter.
> 
>> And another question about this topic: Would it be better to create a
>> new exit from scratch or is it ok to restore the latest backup with all
>> keys, etc. ?
> 
> It is certainly not okay to run a node keeping the same private key that the
> police now has. You should start from scratch, and I think the procedure is
> actually such that the Tor project will blacklist the affected fingerprint.
> 
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays