[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Tor and NNTP



I'm the owner of a large *public* news server (see http://news.aioe.org/ )  
which allows a (restricted)  read and write access to USENET groups without 
requiring an authentication. I'm also a novice with Tor. An increasing number 
of tor users is choosing my server for reading and posting on USENET. 
In order to avoid SYN DDOS and floods, my server accepts only a determinate 
number of daily connections and bytes per IP. Trespassers are banned for a 
day. While a single (end) proxy serves a single client the total activity 
generated on my host by that tor router usually remains under this limit. 
When more than a client uses the same proxy, often that tor router exceeds 
those values because the barrier is calibrated assuming a single client per 
IP. Every IP can also post only 25 messages per day which is a reasonable 
limit for a single client but it isn't enough when multiple users share the 
same IP.
Therefore sometimes some tor proxy is banned from my server due an excessive 
number of connections, bytes or posts.
I need a (server side) way to separate the tor users from the other ones: is 
this possible?
I'm supposing to setup an "hidden service" which redirects all tor users to a 
non default *local* NNTP port in order to treat them differently from the 
other clients. In this way, when the tor users access the server from the 
main DNS system (as nntp.aioe.org) they're still subjected to the standard 
rules that are applied to all clients but when they use the .onion domain a 
different (less restrictive) policy can be applied to them.  Is this a right 
way? 
If so, does tor allow to be configured in order to handle only my "hidden 
service" without providing any other tor service (my ISP doesn't like proxy 
and i've not much bandwidth)?

greetings

Paolo Amoroso (Aioe)