[tor-relays] abuse email for non-exit relay (masergy)
teor
teor2345 at gmail.com
Fri Sep 22 22:50:21 UTC 2017
> On 23 Sep 2017, at 01:49, Iain R. Learmonth <irl at torproject.org> wrote:
>
> Hi teor,
>
> On Fri, Sep 22, 2017 at 11:14:07PM +1000, teor wrote:
>>
>>> On 22 Sep 2017, at 23:03, relay 000 <relay0 at mailbox.org> wrote:
>>>
>>>> Someone is using the hidden service rendezvous protocol to ask non-exit
>>>> relays to scan non-tor IP addresses.
>>>
>>> wow, people can misuse my *non*-exit relay to scan (aka send a TCP SYN
>>> packet) other systems on the internet?
>>
>> Yes.
>
> Can you clarify here that no feedback is given and that this is not a useful
> scan?
>
> I assume the remote relay will return the same error whether there is
> something listening on the port or not, as it wasn't possible to extend the
> circuit.
Yes.
It's really much more reliable to use a Tor Exit for things like this.
They're faster, and they give more detailed error messages in response.
T
--
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20170923/750e0dff/attachment.sig>
More information about the tor-relays
mailing list