I had garlic soup last night. My exit node is definitely malicious.
I got a similar behavior in Italy, but the story is so strange.
They directly accused me to do unlegal stuff and ask me to reach the police station.
When I go to they show me details of the unlegal stuff that my IP does butā¦ they talk about a specified date andā¦ I donāt have any DSL contract at that time o.O. I show to the policeman my DSL contract that start after the incriminated date and he left me without problem.
I think that all of my story is fake and is only a method used from italian police to scare exit-node operators.
If you want we can talk with more details about the story and I ask a legal if I can publish original documents.
BOINGBOING!
Cheers
I was just thinking, in a case where you did have to keep logs for some reason, it might be fun to save them in some really inconvenient format. Like where all numbers are written out long formā¦ So your web server logs might look like:
At seven twenty-three and fifteen seconds p.m., a computer at IP address one-hundred twenty-seven dot oh dot oh dot one made a GET request for /index.html - I returned a 200 status for a response of sixteen-thousand nine-hundred and fourteen bytes. The browser identified itself as Microsoft Internet Explorer [...etc...]
Have fun converting and poring over those, agents!
Do you pay your IRS bill in bags of pennies, by any chance?
I mean, how hard could a patch be? Starting an attempt now
(Based on the anecdotal evidence here, I donāt think that the FBI would care enough about the logs unless there was actually a large criminal case)
That page is provided by tor itself! See: https://gitweb.torproject.org/tor.git/tree/contrib/operator-tools/tor-exit-notice.html
They tracked the IP address back to us.
We have the reverse for that IP set to tor-exit.boingboing.net, which actually resolves to a page outlining the issues: http;//tor-exit.boingboing.net/
Additionally, Iām listed as a contact on that page, though interestingly, they didnāt bother to contact me, just used our registrant information in WHOIS.
Bleugh. Timestamps are incompatible, but Iāve remembered how to hate the english language. There also may or may not be a memory leak somewhere. This is what I get for only coding in HLLsā¦
six ten, forty-three seconds and seven hundred nine thousand five hundred twenty-three microseconds, post meridiem [notice] Tor v0.2.7.2-alpha-dev (git-887d86b76d0c1088) running on Linux with Libevent 2.0.22-stable, OpenSSL 1.0.2d and Zlib 1.2.8.
six ten, forty-three seconds and seven hundred nine thousand six hundred fourteen microseconds, post meridiem [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://www.torproject.org/download/download#warning
six ten, forty-three seconds and seven hundred nine thousand six hundred thirty-two microseconds, post meridiem [notice] This version is not a stable Tor release. Expect more bugs than usual.
six ten, forty-three seconds and seven hundred nine thousand six hundred sixty-four microseconds, post meridiem [notice] Configuration file "/usr/local/etc/tor/torrc" not present, using reasonable defaults.
six ten, forty-three seconds and seven hundred twelve thousand one hundred sixty-one microseconds, post meridiem [notice] Opening Socks listener on 127.0.0.1:9050
six ten, forty-three seconds and seven hundred twelve thousand two hundred eight microseconds, post meridiem [warn] Could not bind to 127.0.0.1:9050: Address already in use. Is Tor already running?
six ten, forty-three seconds and seven hundred twelve thousand two hundred sixty-two microseconds, post meridiem [warn] Failed to parse/validate config: Failed to bind one of the listener ports.
six ten, forty-three seconds and seven hundred twelve thousand two hundred ninety-eight microseconds, post meridiem [err] Reading config failed--see warnings above.
Donāt believe the headlines friend! Freedom fights, political parties in repressive regimes need this! Not just some sickos loners!
I know. I was joking. I very much agree.
Although itās true that they raided my house, confiscated my equippment and arrested me they did not bring up any charges. I was released the next morning and the police even drove me home; the investigator from the āStaatsschutzā (something like the DHS) released all confiscated material the next day. No judge was involved, just a stateās attorney - field of work child care. Infact, the police asked a judge for a seqarch warant, which was denied. So the police waited for the judge to knock off from work, just to scare the hell out of the stateās attorney, yelling about bomb scares and terrorism.
The lesson learned here was that the police simpy didnāt know a damn thing about Tor and lacked basic internet research skills. In fact, they sent out mails (on paper) to the datacenter where my server was housed and almost a week later decided that thereās time for action.
It was not a pleasant experience, granted - it was a major clusterfuck.
Alex.
This topic was automatically closed after 5 days. New replies are no longer allowed.