Re: [tor-relays] What if my favorite online store websiteblacklists all Tor Relay IP addresses?

2013-08-26 Thread Chuck Bevitt
I run a tor exit node (CulverCityChuck) using my home Internet (Time Warner). I did used to get blacklisted by Yelp and occasionally Google. I started using an anonymous VPN service for my exit node which gives it a different IP than the rest of my home traffic and haven't had a problem since.

Re: [tor-relays] What if my favorite online store websiteblacklists all Tor Relay IP addresses?

2013-08-26 Thread Konstantinos Asimakis
Chuck do you run Tor on a separate machine to do that? Or have you found some way to pass only your Tor traffic through the VPN? Cheers. - My full signature with lots of links etc.https://bittit.info/publicDro/signature.html On Mon, Aug 26, 2013 at 10:01 AM, Chuck Bevitt t...@bevitt.ws

[tor-relays] How to block IP address on exit node relay

2013-08-26 Thread Piotrkowska
I am running an exit node under reduced exit policy on a VPS. My provider requested that I block a specific IP address due to spam issues. I'm guessing I should add a line in the torrc file. Can anyone tell me the exact line I have to add to the torrc file to block the address? Something like:

[tor-relays] Store key files in RAM

2013-08-26 Thread Tony Xue
Hi, I have been discovering simple and secure way of protecting the Tor key files recently, in order to achieve the safety of the keys on VPS. So I created a folder on Linux called /tor and it is stored in the RAM file system. I put my key file into that folder and link it back to the data

Re: [tor-relays] How to block IP address on exit node relay

2013-08-26 Thread krishna e bera
On 13-08-26 04:57 PM, Piotrkowska wrote: I am running an exit node under reduced exit policy on a VPS. My provider requested that I block a specific IP address due to spam issues. I'm guessing I should add a line in the torrc file. Can anyone tell me the exact line I have to add to the torrc

Re: [tor-relays] Store key files in RAM

2013-08-26 Thread tor
IMO cut and paste in the situation you're describing is not the perfect way. Better way would be: Have a secure linux machine running an sshd at your home (or another physically-controlled location?). Close off iptables and ip6tables for inbound sshd except for your vserver's IP (hint: