Brian Puccio wrote:
I run a Tor relay to use my spare bandwidth, but not as an exit node to avoid exactly these problems. I reccomend that you do the same. Linode's ToS and AUP are perfectly clear and not unfair in any way from my PoV. If you disagree, you should probably host elsewhere.
That's awesome. If you're not receiving complaints simply because you're lucky enough not to have "bad traffic" come out your end node, the gamble turned out well for you. On the other hand if you actually have some special way of managing your end-node that you believe is the key to avoiding complaints *please* share it on this thread so that other (customers that are still with linode) can continue to operate their nodes without harassment -- this has been my primary request from the VERY BEGINNING. If there are such operators out there on the linode network tell me what you're doing right and what I did wrong (other than obviously be an asshole, as some would discern), because I certainly didn't just throw a base install of an ubuntu VM up there with a stock torrc file and no iptables rules (please presume that I have real professional networking and systems administration knowledge and experience, and that I'm not a total retard, or 13 years old).
Until I see such technical proof of how a node can be managed as such it still appears to me it's simply a roulette wheel gamble if your end node will generate enough complaints to warrant linode to "take action," or not, regardless of any steps taken by the operator to mitigate the "evil" traffic. This has been my entire point from the beginning -- maybe that doesn't make linode out-right hypocrites, but it certainly doesn't make them up-front and helpful.
From the general consensus it seems people believe I was entirely in the wrong and should take the traffic that comes out of any Tor exit node I run very personally, as if I generated the traffic myself, as if I could in any way stop or stem the tide. But seriously, people, I'm not a retard, so tell me what magic iptable/snort/layer5 filtering rule that's going to stop some jackass from spamming a wordpress site. Then tell me how I'm any more responsible than any other Tor relay/bridge/exit node or even big ISP network operator, such traffic was "transmitted" through. Tell me what I really did wrong other than run a Tor node and do everything I could to stop / mitigate complaints, only to have the linode continually reply with blanket-statement non sequiturs. Otherwise I just assume those that seem so personally offended at my point (as if a few DMCA notices alone were going to shut down Linode's datacenters entirely) simply don't understand both the nature of the internet, let alone privatized proxies, nor the technical and political concepts at play in running and operating the Tor network. I certainly recognize if Linode doesn't posses the pair of balls to be progressive on these matters, and is too afraid of "big bad layers" with their empty threats and deep pockets, it's well within Linode's right to stop the operation of any given piece of software -- I'm just not going to give them my money if they act accordingly (but still welcome other happy customers to continue their service).
PS. my exit node has been running on rackspace cloud for about two weeks with nary a DMCA or malicious traffic complaint. Hell of a lot longer than the 72hrs I made it on the linode network. YMMV