Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Error 403 - Primitive Security Measures on the Forum

    Scheduled Pinned Locked Moved General pfSense Questions
    57 Posts 12 Posters 11.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      Quantum,  if your intention was to come here, shit all over everything and guarantee that none of the regular volunteers will ever help you, you may have succeeded.  Honestly, I have never understood why guys like you come in like this.  Are you expecting to wow us with your display of ego and hubris?  I'm sure that even a genius of your level can understand that people who make a firewall aren't also making their own web forum software, nor are they poring over every line of the forum's code.  I have yet to see any forum software that is perfect, immune from attacks etc.  As for blocking the Tor browser, I'm sure they have their reasons and the fact that you don't understand them doesn't make them stupid.  It just makes you look like an ass.  And beside, who really uses Tor browser for day to day stuff???  Are you a dissident afraid of your government?  Or are you some skiddie hacker ninja wannabe that thinks it's l33t to run Tor browser?  I run a high-speed Tor exit node btw, so I am a little familiar with it.

      1 Reply Last reply Reply Quote 0
      • J
        jonesr
        last edited by

        See, this is what I mean:  TOR isn't all about "naughty players doing naughty things".  What a naive point of view.  TOR is used by law enforcement, journalists, people in repressive countries, and so on.  Serious and professional security people know this.  Winduhs people, don't.

        …

        This blockage of TOR Browser is an indication to me that either the forum, or the forum and firewall are by innocents who fear anything mildly controversial, due to not understanding it.  Not a good sign.

        With TOR the whole point is that an enormous amount of traffic leaves a single exit node in order to hide anonymous single users. Most websites don't actively block TOR, TOR just happens to show the same properties as traffic coming from suspicious networks, or in this case the TOR traffic itself actually does include spam - click through the links presented to you when using the TOR browser and it will tell you what caught the honeypot's attention.

        Many websites challenge with a CAPTCHA when I use TOR. There is no clash of ideology or misunderstanding of the benefits of TOR, the server presumably neither knows nor cares about exit nodes. They do not block you because you use an anonymiser, they block you because they do not know you are using one. I am embarassed to say when I first started using TOR I made the same mistake as you have, leaping to the conclusion my "rights and freedoms" were being denied.

        I'm not sure at this point if I want to learn the firewall..

        I hope you will not give up on pfSense, it is an excellent firewall and I learn new things from it all the time. My study of networking often plateaus for a while, then something unexpected will open my eyes and I am suddenly enlightened to the next level of understanding of the subject. I would recommend you begin with some background to the issues you have been experiencing:

        https://www.torproject.org/docs/faq.html.en#GoogleCAPTCHA

        pfSense AMD64 VGA - Assume latest version.
        Suricata, pfBlockerNG, SquidGuard, squid3.

        1 Reply Last reply Reply Quote 0
        • K
          kejianshi
          last edited by

          Exactly - When a exit node has lots of people on it, some of them get up to no good and ruin it for everybody.

          So that IP gets associated with the malicious activities of a few people who are actually in fact not being nice.

          BTW - You can also get error 403 because something is broken somewhere along the line in the network totally unrelated to this site.

          1 Reply Last reply Reply Quote 0
          • D
            doktornotor Banned
            last edited by

            This thread is a nice example why tor's blocked…

            1 Reply Last reply Reply Quote 0
            • J
              jonesr
              last edited by

              TOR isn't all about "naughty players doing naughty things".  What a naive point of view.  TOR is used by law enforcement, journalists, people in repressive countries, and so on.

              When a exit node has lots of people on it, some of them get up to no good and ruin it for everybody.

              As an example, when I first got TOR working I google'd "how do I know TOR is working?", and I came across a thread that had some excellent advice on using TOR. After several useful posts, a member posted comments extremely derogatory towards black people. I was disappointed, but was sure a mod would warn or ban this user shortly and moved on, only to find the thread devolve from being a useful source of information on anonymity to one where dozens of members supported this individual and included their own terrible thoughts on gays, Jews and Asians.

              It was only then I realised I was on stormfront.com, a known white supremacist community. I was fortunate in two ways, one by not having my real IP associated with a hate group and two, as I am neither heterosexual or caucasian,  for not revealing my IP to said hate group (not that I stayed to register and comment of course).

              TOR is a tool and will be used in as many different ways as people can find to apply it. Reputation tools such as Project Honeypot exist to defend the resources they protect. Many tools used in security such as IPS, IP blocklists or even just a simple firewall simply perform as they are supposed to - they do not block by the human intent of the traffic, only the behavior of it. If your TOR exit nodes' IP was blocked, you could say so and request for it to be unblocked on those grounds:

              http://www.projecthoneypot.org/ip_77.247.181.163

              Honey Pot System commented…
              WHITELIST NOTICE: This IP has been whitelisted. Future bad activity will result in automatic removal.
              December 03 2013 02:50 AM
              Honey Pot System commented...
              WHITELIST NOTICE: This IP has been marked to be included on Project Honey Pot whitelists. The whitelist is scheduled with a delay of 00:10:25. Documented reason for whitelist: Mistaken Listing
              December 03 2013 02:35 AM
              A.ATLAS HILL commented...
              This is the IP of a Tor Exit Node. Blacklisting this IP causes a lot of false positives, preventing some Tor users from visiting Project HoneyPot-protected sites.
              November 13 2013 07:56 AM

              pfSense AMD64 VGA - Assume latest version.
              Suricata, pfBlockerNG, SquidGuard, squid3.

              1 Reply Last reply Reply Quote 0
              • Q
                Quantum 0
                last edited by

                KOM, I am voicing my concern about this.  If it's offensive to you, that's a shame.  I am trying to get feedback on the nature of the forum, versus the firewall, to determine whether it's worth investigating the firewall.  Of course I am not going to tell you which category of TOR user I am, nor why I use it.  And Yes, I use it for everything, including mail, IRC, and so on.  Feel free to underestimate me.

                jonesr, yours is the most reasoned and non-psychotic of the responses here.  Sure, alot of websites are shielded by CloudFront, which is a nuisance but sometimes it's worth it for me to answer their question.  Same on those few occasions when I use G**gle.  But I am completely excluded from this forum by "Project Honey Pot", and that is just senseless.  And in the case of "Project Honey Pot" (nice name…), they got one of the lists of TOR exit nodes and added to their blacklist, on General Principles, simply because it is TOR.  I did click through and it gives the "list as a source of spam or other malicious activity.  To resolve this problem, first clean your computer of viruses and other malware."  Fools.  They haven't even tried.  It's useless to try and whitelist IPs on "Project Honey Pot" because there are so many and they change all the time, and I wouldn't waste my time anyway as they are so primitive.

                jonesr, it is encouraging that someone like you endorses pfSense.  I do see alot of bad signs here though.

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  How do you know they didn't try it or that actual activity didn't get it added to the list?

                  1 Reply Last reply Reply Quote 0
                  • Q
                    Quantum 0
                    last edited by

                    Because no other forums make such a foolish move.

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      I am trying to get feedback on the nature of the forum, versus the firewall

                      pfSense shares no code with SMF, as far as I know.  It's kind of a silly question, dosed with a heavy helping of attitude.  Do you barge into parties and immediately insult the hosts at the top of your lungs everywhere you go?  Or is it only places where you think you're anonymous?

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • K
                        kejianshi
                        last edited by

                        My experience is that if you run a open proxy a big enough percentage of people abuse it such that the activity present on that IP lands it on block lists.

                        For every 10 people using that IP for legit purposes, there is one abusing it.  10% stacks up pretty fast when the bandwidth of the IP in question is high enough.

                        I'm not against proxy, I just understand how they end up getting banned.

                        1 Reply Last reply Reply Quote 0
                        • DerelictD
                          Derelict LAYER 8 Netgate
                          last edited by

                          I, too, run a high-speed node.  At the moment I don't feel like dealing with running an exit node so it's transit-only.

                          Chattanooga, Tennessee, USA
                          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                          Do Not Chat For Help! NO_WAN_EGRESS(TM)

                          1 Reply Last reply Reply Quote 0
                          • Q
                            Quantum 0
                            last edited by

                            So "Derelict", you think I think I'm anonymous…
                            And I keep seeing ESF and SMF here, with no explanation of what these symbols might be.  Not worth it to look up, coming from you.  So you run a "high-speed" node, heh?  lol

                            kejianshi, that is true, but no other forum, in fact no other website that I've found in the years I've run TOR, has found it necessary to summarily block a whole category of TOR users like this.  Any system can be abused.  Are there no moderators who can block usernames and email addresses?

                            1 Reply Last reply Reply Quote 0
                            • K
                              kejianshi
                              last edited by

                              Electric Sheep Fencing

                              Gotta keep the sheeples safe.

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                @Quantum`:

                                So "Derelict", you think I think I'm anonymous…
                                And I keep seeing ESF and SMF here, with no explanation of what these symbols might be.  Not worth it to look up, coming from you.  So you run a "high-speed" node, heh?  lol

                                Yeah.  In a datacenter on multiple-gigabit.  You?

                                ESF: They develop pfSense
                                SMF: Simple Machines Forum - see the bottom of this page.

                                If you want people to hold your hand when you cross the street, you might try not being such a childish prick.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • Q
                                  Quantum 0
                                  last edited by

                                  @Derelict:

                                  Yeah.  In a datacenter on multiple-gigabit.  You?

                                  Nice, but this has nothing to do with TOR.  I am trying to tell you that you have your terminology wrong, as you pretend to participate in TOR.

                                  1 Reply Last reply Reply Quote 0
                                  • DerelictD
                                    Derelict LAYER 8 Netgate
                                    last edited by

                                    Oh goodie.  My first smite.  I feel like I'm somebody now.

                                    Chattanooga, Tennessee, USA
                                    A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                    DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                    Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                    1 Reply Last reply Reply Quote 0
                                    • K
                                      kejianshi
                                      last edited by

                                      In defense of derelict

                                      TOR system elects nodes based on bandwidth.

                                      Side note:

                                      Probably the easiest way to subvert TOR is to establish a bunch of very high bandwidth nodes.

                                      But who has the money for that right?  I mean you would have to have deep pockets, alot of bandwidth, a big bunch of hardware…

                                      Who could or would do such a thing just to subvert an anonymity system?  Geeeeee....  I'm drawing a blank...

                                      Wanna see something funny?  Look at a map of tor nodes world wide.

                                      Now, look at your map and find the two highest concentrations of nodes and highest bandwidth.  Where are they?

                                      Tor is easily owned by who ever has the most money.

                                      1 Reply Last reply Reply Quote 0
                                      • Q
                                        Quantum 0
                                        last edited by

                                        Well "Derelict" doesn't know the first thing about TOR terminology.  His put-up is a Fail.

                                        So you know, a 'group' created a slew of exit nodes recently and were immediately recognized and busted by TOR devs.  Instantly excluded.

                                        And, I am not here to bicker, in any case.  NO MORE SOUP FOR fanboyz.

                                        1 Reply Last reply Reply Quote 0
                                        • K
                                          kejianshi
                                          last edited by

                                          TOR is cool and everything - It fills a need.

                                          However, if you want to run EVERYTHING through a proxy/vpn, I'd suggest buying a VPS or setting up a private machine somewhere in a place that values privacy and limiting its use to only you and a maybe a few you trust.  Then you probably won't run into very many roadblocks on the internet.  After lots and lots of headaches with public proxies and vpns, I slowly eventually realized if I want my stuff to work well, I had to make my own and limit the users on it.

                                          1 Reply Last reply Reply Quote 0
                                          • K
                                            kejianshi
                                            last edited by

                                            :'(  :'(  :'( I got smited  :'(  :'(  :'(

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.