Given the current state of the internet (ie, massive warrantless spying
by LEO's and packet inspection by ISP's) I cannot imagine how any TOR
operator would block encrypted services and not be what most reasonable
people consider a "Bad exit". 

On 2015-10-29 14:05, Mike Perry wrote: 

> Green Dream:
> 
>> Mirimir: aside from the nickname, do you have any reason to believe it was 
>> out of the ordinary? The exit policy mostly only seems to allow 
>> non-encrypted services (80 but not 443, 143
> 
> A while ago we were actively marking nodes that only allowed
> non-encrypted services as BadExit, since there were no satisfactory
> explanations given as to why nodes should need this policy.
> 
> Back then, the most common explanation people gave was "I need the
> ability to block traffic that looks evil." Unfortunately, all mechanisms
> available to do this will also end up blocking legitimate content at
> some rate. Nobody was using anything more advanced than snort-style
> regular expressions that matched things that happened to look like
> exploits.
> 
> FWIW, I am personally in favor of reinstating such a policy. I doubt the
> situation has changed.
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays [1]

 

Links:
------
[1] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to