Alexander Cherepanov wrote:
Hello, Anon!
You wrote to [email protected] on Sun, 14 Jun 2009 16:44:12 +0100:
Of course, websites & organizations have the right to choose which ports
they use for which services and open/close. Anyone trying to inflict
that kind of system on any "internet" user community should STOP doing
so immediately. Its called "port blocking" and its unacceptable.
Therefore ALL traffic, on ALL ports, are LEGITIMATE traffic, regardless
of whether they comply with IANA's list or not.
I agree more or less. But there are some concentrations of troubling
traffic on some ports such as 25. Blocking exit to these ports is a
compromise. It is not ideal -- good traffic is also lost in the
process and not all bad traffic is blocked. Tor exit node operators
that feel balance should be different can change their exit policy
accordingly.
Do you have better apporach?
Alexander Cherepanov
Of course. All relay operators have the right to protect themselves.
From trojans etc or spam generators. This is why you can set up tor to
provide its service on only certain ports.
But destination port blocking is a more difficult to approve of.
Obviously, if you block port 25 traffic completely then all (usual, but
not always, as it can be set up to another port) smtp will be blocked..
spammers & the rest of us included.
Now I used smtp (secure - not port 25) to deliver this email. Should you
block this?
If so what about port 80?
I hate spam... but I've learned to live with it and so I use a spam
filter. Thats the best way..
At the end of the day its YOUR relay .. as long as tor clients can find
a good few routes from amongst all the relays out there, thats all that
is needed.