Re: [tor-relays] Deploy relays using hidden exit IP's?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Shouldn't some exit relays (funded or not) be deployed to use an exit IP that is different from it's advertised exit IP in order to prevent a simplistic form of blocking based on scraping the descriptor set? I think this can happen if the default route is out another interface or secondary address. Something of that nature. Actually I think this is a great idea and allows Tor to be used when it wasn't possible or painful before. How does the Torproject and the major Tor network operators think about it? -BEGIN PGP SIGNATURE- iF4EAREKAAYFAlCws6QACgkQyM26BSNOM7YoUwEAtsrq4+zcKVDMM1mrAz1Up/rC YH6UhTVI3i2bWUQsRxYA/iMVMYJscqKlQgVVVdJcUkkg5T29yIQCD8CWoLHRlaAG =89ZU -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Akamai running Tor exit relays
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, I found out about it via Moritz's twitter feed [1] and I think it is great. Am quite curious about it. Does anyone have some insights on why Akamai decided to start 10 fast exit relays? (CC'ing the relays contact address here) Some compass stats [2]: bandwith: 2.75% of the Tor network exit probability: 6.97% [1] https://twitter.com/torservers/status/29861139255296 [2] https://compass.torproject.org/?family=C3D1F08204E2BF81C6A426F312AE3A2212C78929ases=country=exits=all_relaystop=-1 -BEGIN PGP SIGNATURE- iF4EAREKAAYFAlCws7EACgkQyM26BSNOM7YTnQD+L6D2fH6T5QmR0MUh4wJAnan2 Aag6ImaavJeFZS+jihwA/2roYnLDlocvfgoHe4cDk7vJvGctTGgylLi/FdH2tf9r =zf1i -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Deploy relays using hidden exit IP's?
On 24.11.2012 12:46, tagnaq wrote: Shouldn't some exit relays (funded or not) be deployed to use an exit IP that is different from it's advertised exit IP in order to prevent a simplistic form of blocking based on scraping the descriptor set? I don't think it's a good idea. People are always thankful when I can point them to the bulk exit list and torDNSel. I point out that Tor has a lot of users and not all of them are bad, and urge for a temporary block. Most admins seem to follow that advice. https://check.torproject.org/cgi-bin/TorBulkExitList.py https://www.torproject.org/projects/tordnsel.html.en -- Moritz Bartl https://www.torservers.net/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Deploy relays using hidden exit IP's?
On Sat, Nov 24, 2012 at 4:24 AM, Moritz Bartl mor...@torservers.net wrote: On 24.11.2012 12:46, tagnaq wrote: Shouldn't some exit relays (funded or not) be deployed to use an exit IP that is different from it's advertised exit IP in order to prevent a simplistic form of blocking based on scraping the descriptor set? I don't think it's a good idea. People are always thankful when I can point them to the bulk exit list and torDNSel. I point out that Tor has a lot of users and not all of them are bad, and urge for a temporary block. Most admins seem to follow that advice. But in the light of an IP address is not identity -- is it reasonable to block every user of an IP because one person (or bot) is up to no good? Why do people insist on stopping problem behavior at the network layer? --Aaron https://check.torproject.org/cgi-bin/TorBulkExitList.py https://www.torproject.org/projects/tordnsel.html.en -- Moritz Bartl https://www.torservers.net/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Setting up new Tor relay
On 23/11/2012 9:46 PM, Lance Hathaway wrote: Sorry to be a bother, but could anybody offer me some enlightenment on what I'm missing??? Never mind, I figured it out. Apparently I had an invalid character in my Nickname, which caused Tor to dump itself without writing any sort of info to the configured log file. Looks good now. -Lance ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] (no subject)
Sent from Samsung Mobile___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays