> Bittorrent is indeed heavy on resource consumption and that's why it's on
> the default reject list, I think, but saying it will disrupt the network,
> come on, it's a bit hard to tell
Dear Marco,
The issue is somewhat controversial, and as far as I know it's not
discussed in detail anywhere.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Ok !
Gab
- --
http://www.gabrix.ath.cx
-
--
sec 1024D/80231A90 2008-07-01
Key fingerprint = 54AC C632 B35E FB9B 6D9F 108D DBE6 5425 8023 1A90
uid
On Sun, 2009-04-19 at 23:07 +0200, Gab wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> What about tor hidden free secure shells ?
>
If you mean over hidden services, that won't involve a Tor exit, so it
won't show up in these statistics.
signature.asc
Description: This is a dig
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
What about tor hidden free secure shells ?
Gab
- --
http://www.gabrix.ath.cx
-
--
sec 1024D/80231A90 2008-07-01
Key fingerprint = 54AC C632 B35E FB9B 6D9F 108D
On Sun, Apr 19, 2009 at 02:19:28PM +0200, Sebastian Hahn wrote:
>
> On Apr 19, 2009, at 10:21 AM, Tripple Moon wrote:
>>> Your list doesn't include for example 22 (ssh), which
>>> is absolutely essential for many of us.
>> Well see...from my point of view SSH is abuse of the tor-network, namely
>>
On Sun, April 19, 2009 14:19, Sebastian Hahn wrote:
> Go read the website first.
Please, could you give me a pointer about it?
I've just ran a "site:torproject.org bittorrent" through scroogle and the
only relevant results are (in order of appearence (to me)):
1) https://wiki.torproject.org/norepl
On Apr 19, 2009, at 10:21 AM, Tripple Moon wrote:
Your list doesn't include for example 22 (ssh), which
is absolutely essential for many of us.
Well see...from my point of view SSH is abuse of the tor-network,
namely aiding in hacking other systems. (see my other posts for my
logic)
To use S
--- On Fri, 4/17/09, Juliusz Chroboczek
wrote:
> From: Juliusz Chroboczek
> Subject: Re: exit counts by port number over 61 days
> To: or-talk@freehaven.net
> Date: Friday, April 17, 2009, 6:14 PM
> > A better [idea] would be, again IMHO, open a list of
> ports used
> A better [idea] would be, again IMHO, open a list of ports used by
> "normal-use of the tor-network", and block the rest. [...]
> Web (80,443), Pop3 (*), NNTP (*), DNS (53), Torrent (default 6881), FTP
> (20/21).
Moon,
Please don't give this kind of advice. Somebody might think you know what
--- On Thu, 4/16/09, Scott Bennett wrote:
> >There are plenty of other ports to do this on, though -
> >many of them far more common than 1080 (and SOCKS) nowadays.
> >
> Right. I think I'll hold off a bit longer to see
> what other comments
> people may make here before I close that port.
On Wed, 15 Apr 2009 15:00:55 -0700 "F. Fox"
wrote:
>Scott Bennett wrote:
>(snip)
2) Why are there so many exits to the standard socks port? It
seems kind of strange to go all the way through the tor network
fully encrypted, only to exit in the clear to a port somewher
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Scott Bennett wrote:
(snip)
>>> 2) Why are there so many exits to the standard socks port? It
>>> seems kind of strange to go all the way through the tor network
>>> fully encrypted, only to exit in the clear to a port somewhere
>>>
On Tue, 14 Apr 2009 15:06:22 +0200 Sven Anderson
wrote:
>Am 13.04.2009 um 19:00 schrieb Scott Bennett:
>>
>> 1) Why is the nicname/whois port the most heavily used? In fact,
>> why is it getting much use at all?
>
>My guess: spammers and profilers, scanning for email adresses and
Hi Scott,
Am 13.04.2009 um 19:00 schrieb Scott Bennett:
1) Why is the nicname/whois port the most heavily used? In fact,
why is it getting much use at all?
My guess: spammers and profilers, scanning for email adresses and
other personal data.
2) Why are there so
I thought I'd post the results of a 61-day period of running my exit
node in case they are of interest to others and because some that seem
anomalous to me might then turn up explanations. The first list is sorted
by port number, and the second is the same list resorted by exit count in
desce
15 matches
Mail list logo