How to get the whole planet to send abuse complaints to your best friends

Nature of the spoofing / Tor context

  • Attack uses spoofed SYN packets to make honeypots and scanners send abuse reports to unrelated Tor relay operators.
  • Some think targeting Tor specifically is plausible (e.g., to increase relative share of malicious relays), others see it as generic trolling or abuse of reporting systems.
  • Tor relay IPs are easy to enumerate via the public consensus; so are obvious targets.

Abuse reports and the “prove a negative” problem

  • Many report that the standard response “it’s spoofed; my host isn’t attacking you” sounds identical whether you’re innocent or guilty.
  • Providers often automate “respond or be suspended” workflows, sometimes taking servers offline on obviously impossible claims (e.g., traffic above physical link capacity).
  • Some suggest stronger real‑world identity attestation (notaries, video calls), but others push back that this is costly, privacy‑hostile, and especially problematic for Tor operators.

What constitutes abuse (SYNs, scans, DoS)

  • Strong disagreement on whether single SYNs or basic port scans are “abuse.”
    • One side: port scans and lone SYNs are standard background noise; only DoS‑level traffic should trigger action.
    • Other side: recon is the first step in attacks, so blocking or banning scanners is justified.
  • Several note that automatic “ban on first SYN to SSH” rules quickly break legitimate services because of spoofed traffic.

ISP responsibilities, BCP38, and logging

  • Thread repeatedly cites BCP38 (source address validation) as the real fix: last‑mile ISPs should block packets with spoofed source IPs.
  • Debate over feasibility and incentives: most agree it’s technically simple at the edge but hard to enforce globally, especially for large or foreign networks.
  • Some argue large providers could collectively refuse traffic from non‑compliant ASes; others doubt operators care enough.
  • Disagreement on how much traffic metadata (e.g., NetFlow) ISPs should log to verify abuse claims vs cost and privacy concerns.

Internet design, policy, and trade‑offs

  • One camp favors stronger liability and filtering responsibilities for ISPs; another warns this leads to a permissioned, tightly controlled internet.
  • Several note the net’s robustness comes from tolerating some “brokenness,” and over‑optimizing for security could centralize power and harm openness.