[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: eliminating bogus port 43 exits



Alexander Cherepanov wrote:
Hello, Anon!
You wrote to or-talk@xxxxxxxxxxxxx on Sun, 14 Jun 2009 16:44:12 +0100:

Of course, websites & organizations have the right to choose which ports they use for which services and open/close. Anyone trying to inflict that kind of system on any "internet" user community should STOP doing so immediately. Its called "port blocking" and its unacceptable.

Therefore ALL traffic, on ALL ports, are LEGITIMATE traffic, regardless of whether they comply with IANA's list or not.

I agree more or less. But there are some concentrations of troubling traffic on some ports such as 25. Blocking exit to these ports is a compromise. It is not ideal -- good traffic is also lost in the process and not all bad traffic is blocked. Tor exit node operators that feel balance should be different can change their exit policy accordingly.
Do you have better apporach?

Alexander Cherepanov


Of course. All relay operators have the right to protect themselves. From trojans etc or spam generators. This is why you can set up tor to provide its service on only certain ports.

But destination port blocking is a more difficult to approve of.

Obviously, if you block port 25 traffic completely then all (usual, but not always, as it can be set up to another port) smtp will be blocked.. spammers & the rest of us included.

Now I used smtp (secure - not port 25) to deliver this email. Should you block this?

If so what about port 80?

I hate spam... but I've learned to live with it and so I use a spam filter. Thats the best way..

At the end of the day its YOUR relay .. as long as tor clients can find a good few routes from amongst all the relays out there, thats all that is needed.