Any tips for UK Exit Node operators on a Residential ISP (BT)?
Running a reduced exit policy, informed various teams at the ISP,
running PeerGuardian on the server in question (blocking
P2P/kiddyporn/hacking related IPs), have a hostname setup
tor-relay.itschip.com, planning to leave the thing
On 2014-07-06 07:06, Michael Banks wrote:
Any tips for UK Exit Node operators on a Residential ISP (BT)?
I would be EXTREMELY careful in running an exit on a residential location.
There is no way for you to prove that it was not you causing that
connection but the Tor process causing that
Advice taken
I was debating to switch over to relay-only or not. I must note, the Tor
node is on it's own address, under a residential contract.
I was taking extra precaution by running PeerGuardian and specifically
blocking malicious IPs, and will continue to do so while I have a relay
node.
The block lists are very limited, i.e P2P, lists of known blackhats/paedophiles, unallocated IP ranges and most importantly: government-owned address and anti-tor addresses Original Message
On Sun, Jul 6, 2014 at 3:14 PM, Michael Banks c...@starbs.net wrote:
I was taking extra precaution by running PeerGuardian and specifically
blocking malicious IPs, and will continue to do so while I have a relay
node.
If you are using PeerGuardian to filter Tor traffic, that is sub-optimal.
On 2014-07-06 09:14, Michael Banks wrote:
Advice taken
I was debating to switch over to relay-only or not. I must note, the Tor
node is on it's own address, under a residential contract.
Does not matter. You cannot prove that you did not routed your
connection over it or that it was or was not
On Sun, 06 Jul 2014 06:06:35 +0100
Michael Banks c...@starbs.net wrote:
running PeerGuardian on the server in question (blocking
P2P/kiddyporn/hacking related IPs)
Thanks for notifying everyone, I hope your BadExit flag is already on its way.
--
With respect,
Roman
signature.asc
On 07/06/2014 09:39 AM, Michael Banks wrote:
The block lists are very limited, i.e P2P, lists of known
blackhats/paedophiles, unallocated IP ranges and most importantly:
government-owned address and anti-tor addresses
Please do not run PeerGuardian or any other blacklist. These lists are
part
computer/desktop as before.
Best regards,
Julien ROBIN
- Mail original -
De: Moritz Bartl mor...@torservers.net
À: tor-relays@lists.torproject.org
Envoyé: Dimanche 6 Juillet 2014 14:41:23
Objet: Re: [tor-relays] UK Exit Node
On 07/06/2014 09:39 AM, Michael Banks wrote:
The block lists
@lists.torproject.org
Envoyé: Dimanche 6 Juillet 2014 14:41:23
Objet: Re: [tor-relays] UK Exit Node
On 07/06/2014 09:39 AM, Michael Banks wrote:
The block lists are very limited, i.e P2P, lists of known
blackhats/paedophiles, unallocated IP ranges and most importantly:
government-owned address and anti-tor
It's a relay node now, so it should be fine, we'll see what happens.
Google 'pglcmd debian' - I've removed most of the lists. It's
essentially now only blocking known paedophiles/child porn related IPs -
funnily enough, it's blocked quite a few connections to those known
addresses.
The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Michael,
First of all thank you for running an exit. I run a large series of
exits in the Netherlands
(https://globe.torproject.org/#/search/query=Chandlerfilters[country]=nl)
and I am a UK citizen. Having experienced many troubles, including
server
12 matches
Mail list logo