Hacker News new | past | comments | ask | show | jobs | submit | bauruine's comments login

Sounds like XGS-PON which is limited to around 8Gbit/s and those are shared with up to 64 other customers. If you constantly use it at prime time they could get angry way sooner when the other customers on your PON tree start complaining.

Where do you get those 2 million IPs? The plaintext url list [0] only contains 90k entries and after filtering it to ips only and de duplication it's just 39k.

I've just added it to my firewall that does around 160Mbit/s right now using an ipset and the only increase in CPU I can see is a small blip from the ipset restore. And that's just an APU2 with a AMD GX-412TC (1GHz Quad core from 2014) and not a beefy box.

[0]: https://urlhaus.abuse.ch/downloads/text/


yea, it should not have any performance implications.

be aware that blocking stuff in your infrastructure will have hard to diagnose fallout and you're generally better of if you police content on the client (ad-blocker)


They seem to be partners of spamhaus. From the recent feed [0] it looks like it's often just IP addresses so you would need to add it to your firewall.

[0]: https://urlhaus-api.abuse.ch/v1/urls/recent/



Good article just one small clarification. The ContactInfo is public. It's displayed on the metrics site [0] for everyone.

[0] https://metrics.torproject.org/rs.html


Thanks for pointing this out! I made a correction.

Maybe I don't get it but if I search for my relays I only get the output of metrics.tpo and not the map. I hoped the filtered relays would be shown on the map.

The search is applied on all relays that are currently visible on the map with your current settings. Search results can be selected to view the details of relays.

Currently we do not have an option to display solely relays that you searched for back on to the map. But we could add something like this in the future :)


Yeah it's more than absurd. I have a rented server that does 230TB egress a month. That's 4710$ in AWS egress fees (0.02$ per GB). I pay 40 Euros or about 0.0002 per GB and that includes an AMD Ryzen 5 3600 with 64GB RAM.

May I ask who your provider is?

That's https://mevspace.com/ but hetzner, scaleway, ovh, psychz.net, reliablesite.net etc. have similar pricing. If you increase your budget to 100 there are many, many more in Europe and the US.

Thanks!

I don't have exactly what you want but you would be very disappointed by the result anyway. Tor isn't as nefarious as people tend to believe.

  [bauruine@tp:projects/misc]$ python check_ip_tor.py /tmp/malicious_ips.txt
  Got a total of 6303 malicious IPs
  Of which 15 are Tor relays
Edit: Small addendum here are the worst 5 ASNs.

  1607 TENCENT-NET-AP-CN
  738  DIGITALOCEAN-ASN
  483  KIXS-AS-KR 
  205  GOOGLE-CLOUD-PLATFORM
  115  OVH


Stats from my service: ~92% of fake / auto user registrations comes from tor exits. (Or would, without blocking)


There are no incentives. I'm pretty sure the vast majority does it for altruistic reasons. At least all those I've met. Many run relays with spare resources they pay for anyway. Others rent a cheap VPS to run a relay. $10 gives you a surprisingly large amount of bandwidth if you avoid the cloud like the plague.

Governments have other possibilities. Why should they run a relay if they can force the ISP to mirror the traffic of all relays to them?


Can you expand on that last bit? I don’t understand how this compromises the entire network or any individual user. The ISPs only have layer 3 data in plaintext. We can perform timing/throughput analysis attacks against individuals, but not the entire network. These operations are VERY expensive/difficult.


Not an expert at all but from my understanding a traffic correlation attack doesn't require someone to run the relay he just needs to see what traffic enters and leaves it. So the German BND for example can just go to Hetzner (15% Tor traffic) and ask them to mirror the traffic of all relays to them. They don't have to run any relays themselves.

Alt227 has a point but the Tor network is centered around a handful countries where traffic is cheap and there aren't that many huge IXs and Tier 1 ISPs where much of the traffic flows through.

I'm not saying that this is done but it's IMHO more likely than state actors running thousands of relays.


I think we have the same understanding. I read this as

“a state actor has the physical capabilities/resources to perform an attack that determines Alice was speaking to Bob.”

I totally agree. Im just pointing out that we still have layer 5 encryption to protect the contents of our messages. Also at that point, if you’re so important they would just grab a warrant and raid your home.


Governments dont have authority outside of their borders. They cannot force foreign ISP to give over the same information. Therefore they could only mirror nodes on IP addresses issued to companies in their country.


Governments will just get other governments to let them tap their fiber.


Right, like China and Russia are going to let USA tap their fibre?


Conveniently, tor nodes are blocked by the Chinese and Russian governments.


Your post was 'Governments will just get other governments to let them tap their fiber.'

You have, conveniently, moved your point back to tor when I pointed out the folly of your statement.


The discussion is about tor. If you look at the countries where tor nodes are hosted fiber tapping is a relevant attack vector.


And I was pointing out that governments need to be on particularly friendly terms to achieve this, which doesnt make it a universal attack vector.

Here, have an example:

https://www.telegraph.co.uk/news/worldnews/asia/japan/104090...


>IPv6 was the culprit in a lot of networking issues that just magically "go away" when disabled... so, they disable

Why do you think your IPv7 will magically just work? There will be problems with it and IT departements will still disable it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: