[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Running random web services on a bridge-server?



On Nov 16, 2013 1:01 PM, "Martin Kepplinger" <martink@xxxxxxxxx> wrote:
>
> Hi,
>
> Sorry for being lazy, I'm not sure if I can figure it enirely out
> myself: Is there _any_ implication on the status of a bridge in the Tor
> network when I run random web services like an open website, xmpp
> server, whatever, on the same device/IP? It'll somehow be more exposed
> that way but I'd be happy on any opinion. I guess probability that
> someone finds out that there is a bridge behind my IP is rising.

I really have nothing to back this up but I would *think* that additional services on the same IP might mask the bridge from / confuse some active/reactive probing based bridge disovery attacks. Then again, if active probing is usually only done on a particular (ip, port) pair (the one that someone in China is connecting to, for example), then there's probably no difference anyway.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays