Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-29 Thread grarpamp
Also related, has anyone tried operating an exit behind a VPN/NAT/proxy service? As opposed to having secondary interfaces/routes on the local machine. ___ tor-relays mailing list tor-relays@lists.torproject.org

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-27 Thread Julian Yon
On Tue, 27 Nov 2012 01:58:40 + (UTC) Sven Olaf Kamphuis s...@cb3rob.net wrote: [Utopian fantasy] Meanwhile, back in the Real World, ancient protocols like SMTP dominate the Internet (oh look, you used it to post to this list) and people do what they have to in order to keep their services

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-27 Thread Daniel Case
I have a real world example of this. My forum was being abused by several users all originating from the Tor network, so the first thing I did (and any sane admin would do) was block Tor access (with a note) for a few hours while I figured out what to do. I ended up unbloacking the network and

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-27 Thread Bill Waggoner
I have the opposite problem in a way. I use geocaching.org frequently. But because they have had a problem in the past with Tor users they block Tor nodes. As I run a Relay, not Exit, this means that I have to ask for an exception every time my IP changes Happily that doesn't happen very often

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-27 Thread Julian Yon
On Tue, 27 Nov 2012 18:42:56 -0500 Bill Waggoner ctgreybe...@gmail.com wrote: I have the opposite problem in a way. I use geocaching.org frequently. But because they have had a problem in the past with Tor users they block Tor nodes. As I run a Relay, not Exit, this means that I have to

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-26 Thread Julian Yon
On Sat, 24 Nov 2012 07:44:48 -0800 Aaron aag...@extc.org wrote: On Sat, Nov 24, 2012 at 4:24 AM, Moritz Bartl mor...@torservers.net wrote: I don't think it's a good idea. People are always thankful when I can point them to the bulk exit list and torDNSel. I point out that Tor has a lot of

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-24 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Shouldn't some exit relays (funded or not) be deployed to use an exit IP that is different from it's advertised exit IP in order to prevent a simplistic form of blocking based on scraping the descriptor set? I think this can happen if the

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-24 Thread Moritz Bartl
On 24.11.2012 12:46, tagnaq wrote: Shouldn't some exit relays (funded or not) be deployed to use an exit IP that is different from it's advertised exit IP in order to prevent a simplistic form of blocking based on scraping the descriptor set? I don't think it's a good idea. People are always

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-24 Thread Aaron
On Sat, Nov 24, 2012 at 4:24 AM, Moritz Bartl mor...@torservers.net wrote: On 24.11.2012 12:46, tagnaq wrote: Shouldn't some exit relays (funded or not) be deployed to use an exit IP that is different from it's advertised exit IP in order to prevent a simplistic form of blocking based on

Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-10-30 Thread k e bera
On Tue, 30 Oct 2012 05:20:03 -0400 grarpamp grarp...@gmail.com wrote: Shouldn't some exit relays (funded or not) be deployed to use an exit IP that is different from it's advertised exit IP in order to prevent a simplistic form of blocking based on scraping the descriptor set? I think this