Hi
a big German provider "Deutsche Telekom" has started blocking access (at TCP layer) to their SIP servers in February 2026.
That means running a middle tor on this provider line results in a non-functional provider SIP service.
You have to choose between running a middle tor or a working provider SIP service.
···
_______________________________________________
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-leave@lists.torproject.org
So that means Deutsche Telekom monitors Internet traffic (or at least
the Tor directory, which contains all the nodes) and detects when a Tor
node is being operated. And if that is the case, TCP access to the SIP
servers is blocked? Or have I misunderstood something here?
···
On Sat, 14 Feb 2026 13:50:55 -0000 iji--- via tor-relays <tor-relays@lists.torproject.org> wrote:
Hi
a big German provider "Deutsche Telekom" has started blocking access (at TCP layer) to their SIP servers in February 2026.
That means running a middle tor on this provider line results in a non-functional provider SIP service.
You have to choose between running a middle tor or a working provider SIP service.
_______________________________________________
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-leave@lists.torproject.org
This means they don’t have to monitor internet traffic themselves.
···
Am 16.02.26 um 23:10 schrieb Marek Küthe via tor-relays:
So that means Deutsche Telekom monitors Internet traffic (or at least
the Tor directory, which contains all the nodes) and detects when a Tor
node is being operated. And if that is the case, TCP access to the SIP
servers is blocked? Or have I misunderstood something here?
On Sat, 14 Feb 2026 13:50:55 -0000
iji--- via tor-relays [<tor-relays@lists.torproject.org>](mailto:tor-relays@lists.torproject.org) wrote:
Hi
a big German provider "Deutsche Telekom" has started blocking access (at TCP layer) to their SIP servers in February 2026.
That means running a middle tor on this provider line results in a non-functional provider SIP service.
You have to choose between running a middle tor or a working provider SIP service.
_______________________________________________
tor-relays mailing list -- [tor-relays@lists.torproject.org](mailto:tor-relays@lists.torproject.org)
To unsubscribe send an email to [tor-relays-leave@lists.torproject.org](mailto:tor-relays-leave@lists.torproject.org)
_______________________________________________
tor-relays mailing list -- [tor-relays@lists.torproject.org](mailto:tor-relays@lists.torproject.org)
To unsubscribe send an email to [tor-relays-leave@lists.torproject.org](mailto:tor-relays-leave@lists.torproject.org)
They probably use this blocklist, as do many websites, especially
banks and email providers.
Has anyone in the industry tried contacting mxtoolbox and getting them
to stop using the DAN list? Obviously that Dan guy will never stop
listing non-exits because he personally hates Tor, but mxtoolbox could
use Tor Project's own blacklist.
Plenty of reputable blacklist providers, while not "Tor-friendly" per
se, do understand that exit operators are not responsible for the
traffic going through and, importantly, that non-exits are harmless (for
example, IPInfo does this).
I almost lost a relay because the hosting provider got spooked that I
suddenly got their IP on a "blacklist" and had a hard time understanding
that mxtoolbox including DAN's shit does not mean I was sending spam.
Regards,
forest
···
_______________________________________________
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-leave@lists.torproject.org
This means they don’t have to monitor internet traffic themselves.
Am 16.02.26 um 23:10 schrieb Marek Küthe via tor-relays:
So that means Deutsche Telekom monitors Internet traffic (or at least
the Tor directory, which contains all the nodes) and detects when a Tor
node is being operated. And if that is the case, TCP access to the SIP
servers is blocked? Or have I misunderstood something here?
On Sat, 14 Feb 2026 13:50:55 -0000
iji--- via tor-relays [<tor-relays@lists.torproject.org>](mailto:tor-relays@lists.torproject.org) wrote:
Hi
a big German provider "Deutsche Telekom" has started blocking access (at TCP layer) to their SIP servers in February 2026.
That means running a middle tor on this provider line results in a non-functional provider SIP service.
You have to choose between running a middle tor or a working provider SIP service.
_______________________________________________
tor-relays mailing list -- [tor-relays@lists.torproject.org](mailto:tor-relays@lists.torproject.org)
To unsubscribe send an email to [tor-relays-leave@lists.torproject.org](mailto:tor-relays-leave@lists.torproject.org)
_______________________________________________
tor-relays mailing list -- [tor-relays@lists.torproject.org](mailto:tor-relays@lists.torproject.org)
To unsubscribe send an email to [tor-relays-leave@lists.torproject.org](mailto:tor-relays-leave@lists.torproject.org)
--
PGP Key ID: 29D319F8
_______________________________________________
tor-relays mailing list -- [tor-relays@lists.torproject.org](mailto:tor-relays@lists.torproject.org)
To unsubscribe send an email to [tor-relays-leave@lists.torproject.org](mailto:tor-relays-leave@lists.torproject.org)
Someone much wiser than me once said something like this:
"When you are hit by arrows, nothing changes unless you deal with the archer."
So there you go, have a chat with that DAN list guy...
In essence, if theres a blocklist, folks will use it for convenience.
In case if you haven't already noticed, convenience tends to win when it comes to humans, by a large margin.
Hth,
Markus
···
* forest-relay-contact--- via tor-relays <tor-relays@lists.torproject.org> wrote:
Has anyone in the industry tried contacting mxtoolbox and getting them
to stop using the DAN list?
_______________________________________________
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-leave@lists.torproject.org
2月 28 17:53:24 localhost Tor[983069]: Managed proxy “/usr/bin/lyrebird” having PID 991291 terminated with status code 255
2月 28 17:53:25 localhost Tor[983069]: Server managed proxy encountered a method error. (webtunnel unimplemented)
2月 28 17:53:25 localhost Tor[983069]: Managed proxy ‘/usr/bin/lyrebird’ was spawned successfully, but it didn’t launch any pluggable transport listeners!
2月 28 17:53:25 localhost Tor[983069]: Managed proxy “/usr/bin/lyrebird” having PID 991298 terminated with status code 255
2月 28 17:53:26 localhost Tor[983069]: Server managed proxy encountered a method error. (webtunnel unimplemented)
2月 28 17:53:26 localhost Tor[983069]: Managed proxy ‘/usr/bin/lyrebird’ was spawned successfully, but it didn’t launch any pluggable transport listeners!
2月 28 17:53:26 localhost Tor[983069]: Managed proxy “/usr/bin/lyrebird” having PID 991306 terminated with status code 255
2月 28 17:53:27 localhost Tor[983069]: Server managed proxy encountered a method error. (webtunnel unimplemented)
2月 28 17:53:27 localhost Tor[983069]: Managed proxy ‘/usr/bin/lyrebird’ was spawned successfully, but it didn’t launch any pluggable transport listeners!
2月 28 17:53:27 localhost Tor[983069]: Managed proxy “/usr/bin/lyrebird” having PID 991314 terminated with status code 255
Auto-discovered IPv6 address [2a00:da00:f460:f800::1]:443 has not
been found reachable. However, IPv4 address is reachable
Yet is says
09:36:45 [NOTICE] Heartbeat: Tor’s uptime is 10:21 hours, with 14231
circuits open. I’ve sent 602.28 GB and received 594.50 GB. I’ve
received 64725 connections on IPv4 and 1021 on IPv6. I’ve made
2301709 connections with IPv4 and 437304 with IPv6. [1 duplicate
hidden]