[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: TOR on Academic networks (problem)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On May 16, 2006, at 8:14 PM, Peter Palfrader wrote:

On Tue, 16 May 2006, Michael Holstein wrote:

For the short-term, I wrote a script that wgets the library's list of
subscriptions, and munges that to get the unique domain links, and puts
those into /etc/hosts with bogus addresses that are denied by the exit
policy (eg: 127.0.0.2 some.domain). Yes, I realize this doesn't prevent
access by IP, but if I can keep out 95% of the miscreants, that's fine
by me.

You are hurting the Tor network more than you realize. You are lying to
clients and clients cache that answer. Don't do this.


--
                           |  .''`.  ** Debian GNU/Linux **
      Peter Palfrader      | : :' :      The  universal
 http://www.palfrader.org/ | `. `'      Operating System
                           |   `-    http://www.debian.org/
The correct way is to put the IP's in a deny list in the config file.

Sincerely,
Watson Ladd
- ---
"Those who would give up Essential Liberty to purchase a little Temporary Safety deserve neither Liberty nor Safety."
- -- Benjamin Franklin



-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.3 (Darwin)

iD4DBQFEanEVGV+aWVfIlEMRAr66AJ94vhJj9ntfEK2r5H8d9OEcIDckhQCVERR5
3HUO7jkS7042hGaYwTKWJg==
=ELvN
-----END PGP SIGNATURE-----