[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: exit counts by port number over 61 days






--- On Fri, 4/17/09, Juliusz Chroboczek <Juliusz.Chroboczek@xxxxxxxxxxxxxx> wrote:

> From: Juliusz Chroboczek <Juliusz.Chroboczek@xxxxxxxxxxxxxx>
> Subject: Re: exit counts by port number over 61 days
> To: or-talk@xxxxxxxxxxxxx
> Date: Friday, April 17, 2009, 6:14 PM
> > A better [idea] would be, again IMHO, open a list of
> ports used by
> > "normal-use of the tor-network", and block
> the rest.  [...]
> 
> > Web (80,443), Pop3 (*), NNTP (*), DNS (53), Torrent
> (default 6881), FTP
> > (20/21).
> 
> Moon,
> 
> Please don't give this kind of advice.  Somebody might
> think you know what
> you're speaking about.
The beauty of internet is that everyone can write its own opinions (see my IMHO) and let the rest decide if the writer (you included) knows what (s)he is writing about...
> 
> Your list includes Bittorrent, which is a highly optimised
> protocol for sending massive amounts of data.
> Running BT over the tor network is considered as an abuse of the network.
ASFAIK, its up to the operator of relays and exit-points to decide what they label as abuse or not, and as a result choose to reject data on that port.
> 
> Your list doesn't include for example 22 (ssh), which
> is absolutely essential for many of us.
Well see...from my point of view SSH is abuse of the tor-network, namely aiding in hacking other systems. (see my other posts for my logic)
To use SSH you need an account thats under normal circumstances is known on the other side, thus eliminating the need to anonymize your connection.
So yea i will advice all that read this to reject that port whole heartly...

IMHO, the intentions of the tor-network are to provide anonymity for data connections where the other side does not _need_ to know who the originator is.
If i'm wrong there i'm sure it will be told so by many instead of one...