Anonymous: > 11.11.2013 20:55, Anonymous kirjoitti: >> 11.11.2013 20:08, krishna e bera kirjoitti: >>> On 13-11-11 12:56 PM, Anonymous wrote: >>>> How may I create an Tor exit node with some ports and sites >>>> blacklisted? > >>> See the Reduced Exit Policy page referred to at >>> https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment > >>> >>> > > >>>> So the user trying to enter an blacklisted page will get an >>>> page saying that the maintainer has denied the access to that >>>> page/site. > >>> You could do such a thing but it makes the network much less >>> efficient because clients would have to build circuits several >>> times, and it also would get your node listed as a BadExit. >>> https://trac.torproject.org/projects/tor/wiki/doc/badRelays > >>> If you do it as recommended with the ExitPolicy, the user will >>> never exit via your node, and therefore will not need to see a >>> "censored notice" page. > >>>> I whould like to deny access to IRC and some forums so how is >>>> that posible if it is? > >>> See above link. > > >> Thanks for this. It helped me a lot. > > > If you are going to use your home connection (Differend IP, but the IP > traces back to you still.) to host the Exit. What's the best bet for > not being able to trace it back to you? (Using Finland ISP.) >
I'd say if you want to run an exit node you shouldn't try to hide. You should own a public IP and run it under your name and state that it is an exit node at as many levels as possible (whois, website on some ports (there is a template somewhere). In my opinion this is the only way (along with other preparations) to comfortably run an exit node. See https://blog.torproject.org/running-exit-node > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
