[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #2697 [Torflow]: Detect exit nodes running 'transparent' HTTP proxies



#2697: Detect exit nodes running 'transparent' HTTP proxies
-------------------------+--------------------------------------------------
 Reporter:  rransom      |          Owner:  mikeperry
     Type:  enhancement  |         Status:  new      
 Priority:  critical     |      Milestone:           
Component:  Torflow      |        Version:           
 Keywords:               |         Parent:           
   Points:               |   Actualpoints:           
-------------------------+--------------------------------------------------

Comment(by mikeperry):

 Do we want to automatically BadExit all nodes running upstream
 transproxies? They can also be used for caching to try to improve
 performance, or may just be present at the upstream ISP. My old University
 used to run an upstream caching proxy...

 We already do detect censorship of exploit info by AV systems. We can try
 to focus this by running an exit scanner specifically scraping computer
 security and exploit related search queries. That would probably get
 anyone running a dumb IDS censor like snort.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2697#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs