[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Add CGNAT 100.64.0.0/10 to Default Exit Relay Reject Policy



Hello,

I've noticed that the non-publicly routable CGNAT subnet of 100.64.0.0/10 is not in the default exit policy reject list like 192.168/16 and 10/8 are.
This range is not publicly routed, and should never need to be accessed from a Tor exit. 


Tailscale and other ISPs use this block. 

How many exit relays connected to a Tailscale network are unknowingly exposing all of their other Tailscale devices to the Tor network? 

ISPs may be less willing to allow exit relays if there are bots using Tor to toy with the ISPs 100.64/10 range.

Maybe there is something I am missing for it to not be included?

Thanks,
Likogan.Dev

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list -- tor-relays@xxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to tor-relays-leave@xxxxxxxxxxxxxxxxxxxx