I run a tor exit node (CulverCityChuck) using my home Internet (Time Warner). I
did used to get blacklisted by Yelp and occasionally Google. I started using an
anonymous VPN service for my exit node which gives it a different IP than the
rest of my home traffic and haven't had a problem since.
Chuck do you run Tor on a separate machine to do that? Or have you found
some way to pass only your Tor traffic through the VPN?
Cheers.
-
My full signature with lots of links
etc.https://bittit.info/publicDro/signature.html
On Mon, Aug 26, 2013 at 10:01 AM, Chuck Bevitt t...@bevitt.ws
I am running an exit node under reduced exit policy on a VPS. My provider
requested that I block a specific IP address due to spam issues. I'm guessing I
should add a line in the torrc file. Can anyone tell me the exact line I have
to add to the torrc file to block the address?
Something like:
Hi,
I have been discovering simple and secure way of protecting the Tor key
files recently, in order to achieve the safety of the keys on VPS.
So I created a folder on Linux called /tor and it is stored in the RAM file
system. I put my key file into that folder and link it back to the data
On 13-08-26 04:57 PM, Piotrkowska wrote:
I am running an exit node under reduced exit policy on a VPS. My
provider requested that I block a specific IP address due to spam
issues. I'm guessing I should add a line in the torrc file. Can
anyone tell me the exact line I have to add to the torrc
IMO cut and paste in the situation you're describing is not the
perfect way. Better way would be:
Have a secure linux machine running an sshd at your home (or another
physically-controlled location?).
Close off iptables and ip6tables for inbound sshd except for your
vserver's IP
(hint: