On May 13, 2013, at 7:15 PM, David Fifield <da...@bamsoftware.com> wrote:

> Thank you for taking a look.
> 
> On Mon, May 13, 2013 at 08:58:27AM +0200, Karsten Loesing wrote:
>> I'm not sure, but Tor2web might do something similar.  From Onionoo's
>> project page: "Tor2web is a web proxy to Tor Hidden Services. It uses
>> Onionoo to get the list of currently running Tor Exits to detect if the
>> client is a Tor user and if so redirect them to the .onion address."
> 
> If I read this right, Tor2web is doing it not only for exits, but for
> all relays:
> 
> https://github.com/globaleaks/Tor2web-3.0/blob/c6e26b35e83fd897f9c4f9cb6787eb0132d8a9d0/tor2web/utils/lists.py#L230
> 


Yeah we are doing this because downloading all the exit lists is too much. If 
there was a better way to do this we would be very useful to us.

We only need the exit list, but we consider any relay as a possible exit. This 
means that stuff like a relay that exits  through a different address will not 
be detected as coming from Tor (this is something torbel accounts for).

These are the relevant tickets on the topic:

https://trac.torproject.org/projects/tor/ticket/6488

https://github.com/globaleaks/Tor2web-3.0/issues/10

https://github.com/globaleaks/Tor2web-3.0/issues/85

~ Art.


_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to