|
[[TOC]]
|
|
|
|
|
|
|
|
= Reporting Bad Relays =
|
|
|
|
|
|
# Reporting Bad Relays
|
|
Ran into a misconfigured, malicious, or suspicious relay while using Tor? Please let us know by sending email to `bad-relays AT lists DOT torproject DOT org`! Many bad relays are caught thanks to our wider community, so many thanks for all your help and vigilance!
|
|
Ran into a misconfigured, malicious, or suspicious relay while using Tor? Please let us know by sending email to `bad-relays AT lists DOT torproject DOT org`! Many bad relays are caught thanks to our wider community, so many thanks for all your help and vigilance!
|
|
|
|
|
|
== What is a bad relay? ==
|
|
## What is a bad relay?
|
|
A bad relay is one that either doesn't work properly or tampers with our users' connections. This can be either through maliciousness or misconfiguration. Some common examples are...
|
|
A bad relay is one that either doesn't work properly or tampers with our users' connections. This can be either through maliciousness or misconfiguration. Some common examples are...
|
|
|
|
|
|
* Tampering with exit traffic in any way (including dropping accepted connections). This might be accidental (such as an anti-virus filter) or malicious (commonly SSLStrip, which replaces !https:// links with !http:// to snoop on traffic) or even intentional (such as layer 7 inspection for P2P traffic detection/mitigation).
|
|
* Tampering with exit traffic in any way (including dropping accepted connections). This might be accidental (such as an anti-virus filter) or malicious (commonly SSLStrip, which replaces !https:// links with !http:// to snoop on traffic) or even intentional (such as layer 7 inspection for P2P traffic detection/mitigation).
|
|
* running HSDirs that harvest and probe .onion addresses
|
|
* running HSDirs that harvest and probe .onion addresses
|
|
* Manipulating the DHT that is used for onion services, e.g., by positioning itself in the DHT.
|
|
* Manipulating the DHT that is used for onion services, e.g., by positioning itself in the DHT.
|
|
* Using a DNS provider that censors its results (such as some [http://www.opendns.com/ OpenDNS] or Quad9 (9.9.9.9) configurations).
|
|
* Using a DNS provider that censors its results (such as some [OpenDNS](http://www.opendns.com/) or Quad9 (9.9.9.9) configurations).
|
|
* Performing a [https://en.wikipedia.org/wiki/Sybil_attack Sybil attack], which means flooding the network with new relays in an effort to deanonymize users. If you want to run multiple relays then that's great! But please be sure to set the [https://www.torproject.org/docs/tor-manual.html.en#MyFamily MyFamily parameter].
|
|
* Performing a [Sybil attack](https://en.wikipedia.org/wiki/Sybil_attack), which means flooding the network with new relays in an effort to deanonymize users. If you want to run multiple relays then that's great! But please be sure to set the [MyFamily parameter](https://www.torproject.org/docs/tor-manual.html.en#MyFamily).
|
|
* exit relays routing their exit traffic back into the tor network (not actually exiting any traffic)
|
|
* exit relays routing their exit traffic back into the tor network (not actually exiting any traffic)
|
|
|
|
|
|
Also, if your relay is stolen or goes missing, please report it as well, so we can blacklist it in case whoever took it puts it back online.
|
|
Also, if your relay is stolen or goes missing, please report it as well, so we can blacklist it in case whoever took it puts it back online.
|
|
|
|
|
|
The following are currently permitted yet do have some discussion for prohibition (as such, they should not be reported at this time)...
|
|
The following are currently permitted yet do have some discussion for prohibition (as such, they should not be reported at this time)...
|
|
|
|
|
|
* Only allowing plain-text traffic (for instance, just port 80). There's no good reason to disallow its encrypted counterpart (like port 443), making these relays highly suspect for sniffing traffic. See [https://www.google.com/search?site:torproject.org+80+443+6667 context] and [https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n1969 spec].
|
|
* Only allowing plain-text traffic (for instance, just port 80). There's no good reason to disallow its encrypted counterpart (like port 443), making these relays highly suspect for sniffing traffic. See [context](https://www.google.com/search?site:torproject.org+80+443+6667) and [spec](https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n1969).
|
|
|
|
|
|
|
|
|
|
== How do I report a bad relay? ==
|
|
## How do I report a bad relay?
|
|
If you encounter a bad relay then please let us know and write to `bad-relays AT lists DOT torproject DOT org`.
|
|
If you encounter a bad relay then please let us know and write to `bad-relays AT lists DOT torproject DOT org`.
|
|
|
|
|
|
You can check which exit you are using at any time by visiting [https://check.torproject.org/ tor check]. Please include the following in your report:
|
|
You can check which exit you are using at any time by visiting [tor check](https://check.torproject.org/). Please include the following in your report:
|
|
|
|
|
|
1. The relay's IP address or fingerprint. The fingerprint is a forty-character hex string such as `203933ED4E55EF8A3C3518427D1A1ED6A4CC285E`.
|
|
1. The relay's IP address or fingerprint. The fingerprint is a forty-character hex string such as `203933ED4E55EF8A3C3518427D1A1ED6A4CC285E`.
|
|
1. What kind of behavior did you see?
|
|
1. What kind of behavior did you see?
|
|
1. Any additional information we'll need to reproduce the issue.
|
|
1. Any additional information we'll need to reproduce the issue.
|
|
|
|
|
|
However, if you need help with anything Tor-related, please contact the [https://www.torproject.org/about/contact.html.en help desk] instead.
|
|
However, if you need help with anything Tor-related, please contact the [help desk](https://www.torproject.org/about/contact.html.en) instead.
|
|
|
|
|
|
== What happens to bad relays? ==
|
|
## What happens to bad relays?
|
|
After a relay is reported and we've verified the behavior we'll attempt to contact the relay operator. Often we can sort things out but if not (or the relay lacks contact information) we'll flag it to prevent it from continuing to be used.
|
|
After a relay is reported and we've verified the behavior we'll attempt to contact the relay operator. Often we can sort things out but if not (or the relay lacks contact information) we'll flag it to prevent it from continuing to be used.
|
|
|
|
|
|
We have thee types of flags we can apply:
|
|
We have thee types of flags we can apply:
|
|
|
|
|
|
* !BadExit - Never used as an exit relay (for relays that appear to mess with exit traffic)
|
|
* BadExit - Never used as an exit relay (for relays that appear to mess with exit traffic)
|
|
* Invalid - Never used unless !AllowInvalidNodes is set (by default this only allows for middle and rendezvous usage)
|
|
* Invalid - Never used unless AllowInvalidNodes is set (by default this only allows for middle and rendezvous usage)
|
|
* Reject - Dropped from the consensus entirely
|
|
* Reject - Dropped from the consensus entirely
|
|
|
|
|
|
Which we use depends on the severity of the issue, and if it can still be safely used in certain situations.
|
|
Which we use depends on the severity of the issue, and if it can still be safely used in certain situations.
|
|
|
|
|
|
== My relays was given the BadExit flag. What's up? ==
|
|
## My relays was given the BadExit flag. What's up?
|
|
In just about all cases we're unable to contact the operator to resolve the issue, so if your relay has been flagged as a BadExit then please let us know (see above for contact info) so we can work together to fix the issue.
|
|
In just about all cases we're unable to contact the operator to resolve the issue, so if your relay has been flagged as a BadExit then please let us know (see above for contact info) so we can work together to fix the issue.
|
|
|
|
|
|
== Do you actively look for bad relays? ==
|
|
## Do you actively look for bad relays?
|
|
Yes. For our automated issue detection see [http://www.cs.kau.se/philwint/spoiled_onions/ exitmap] and [https://gitweb.torproject.org/user/phw/sybilhunter.git/ sybilhunter].
|
|
Yes. For our automated issue detection see [exitmap](http://www.cs.kau.se/philwint/spoiled_onions/) and [sybilhunter](https://gitweb.torproject.org/user/phw/sybilhunter.git/).
|
|
|
|
|
|
Other monitors include [http://www.thoughtcrime.org/software/tortunnel/ tortunnel], [https://gitweb.torproject.org/torflow.git/blob/HEAD:/NetworkScanners/ExitAuthority/README.ExitScanning SoaT], [https://code.google.com/p/torscanner/ torscanner], and [http://detector.io/DetecTor.html DetecTor]. |
|
Other monitors include [tortunnel](http://www.thoughtcrime.org/software/tortunnel/), [SoaT](https://gitweb.torproject.org/torflow.git/blob/HEAD:/NetworkScanners/ExitAuthority/README.ExitScanning), [torscanner](https://code.google.com/p/torscanner/), and [DetecTor](http://detector.io/DetecTor.html). |
|
\ No newline at end of file |
|
\ No newline at end of file |