[tor-relays] Dealing with OVH Abuse Complaints
Артём
asmer at asmer.com.ua
Wed Oct 5 08:23:33 UTC 2016
I am running an exit relay on OVH VPS for almost a year:
5CA2D60F30F6A2FE61F66CAB248C5484AC3F13B1
During that time I received about 5 abuse reports, most of them were about
SYN flood. Also, I expirienced some strange bandwidth limitation during
February 2016, but in March this limitation silently disappeared. No other
problems for half a year now.
5 Окт 2016 г. 10:56 AM пользователь "teor" <teor2345 at gmail.com> написал:
> Hi,
>
> Does anyone have experience running a long-lived Exit on OVH / So You
> Start?
>
> We've just received a threat to shut down our OVH Exit due to abuse
> complaints.
> We were responding to these automated reports (mainly SSH brute force)
> with template responses, offering to block the destination IP and port if
> the remote site wanted us to. We never received a reply.
>
> What does OVH expect its Exit operators to do with complaints?
> Should we have blocked each complaining IP address as soon as we received
> a complaint?
>
> Tim
>
> T
>
> --
> Tim Wilson-Brown (teor)
>
> teor2345 at gmail dot com
> PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
> ricochet:ekmygaiu4rzgsk6n
> xmpp: teor at torproject dot org
>
>
>
>
>
>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161005/4efa7dde/attachment.html>
More information about the tor-relays
mailing list