[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Filtering TOR Non-exit Relay - Just Curious



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

In addition, there's a host of possibilities (both good and bad) by
being able to control a Tor relays traffic. I could be wrong, my
previous findings may seem to indicate that anyone with the ability to
strategically place a good number of middle and exits nodes can shape
or at least control some of the Tor traffic.

ZW mentioned previously: "Tor is still using IP, so there is no way
around the fact that a relay operator can observe the IP addresses of
hosts in direct communication with their relay(s).", and this to me
presents a problem in maintaining complete anonymity.


On 10/28/2013 8:09 AM, Nelson wrote:
> Hello!
> 
> Konrad, initially and completely unrelated to Tor, I was working on
> adding some blocklists to my firewall when I came upon and old 
> program, Peerblock. Peerblock from what I remember can log all 
> allowed and blocked traffic, and gives one the ability to use 
> already made blocklists or create new ones. Peerblock has some 
> interesting blocklists and I thought maybe I could use some of 
> those blocklists or some of the listed IP's to filter warez, P2P 
> and other undesirable sites.
> 
> Tor (middle) Relays don't have the filtering options like Exit 
> Relays. With Exit Relays one can choose the type of traffic based 
> on personal and legal reasons, then I thought why don't middle 
> relays at least have some mechanism to block undesirable traffic?
> 
> So I installed Peerblock on one of my Windows PC's that has a Tor 
> Relay (HelloChilli). Initially Peerblock was set to allow all 
> traffic and to my surprise I could see what seemed to be Tor 
> traffic being logged. Then I activated some blocklists and sure 
> enough I was apparently able to block traffic from undesirable 
> sources. Further, I can right click, copy to clipboard the ip 
> addresses of the blocked ip's, do an NSLOOKUP  and generally 
> discern whether the ip address is from a listed Tor relay, a VPN 
> service, from Anti-P2P, Gov or other sources.
> 
> My initial curiosity about viewing real-time Tor traffic and the 
> ability to block specific traffic on my middle-node seemed to be 
> achieved.
> 
> --Nelson
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=oR1g
-----END PGP SIGNATURE-----
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays