[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: TOR on Academic networks (problem)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On May 16, 2006, at 8:14 PM, Peter Palfrader wrote:
On Tue, 16 May 2006, Michael Holstein wrote:
For the short-term, I wrote a script that wgets the library's list of
subscriptions, and munges that to get the unique domain links, and
puts
those into /etc/hosts with bogus addresses that are denied by the
exit
policy (eg: 127.0.0.2 some.domain). Yes, I realize this doesn't
prevent
access by IP, but if I can keep out 95% of the miscreants, that's
fine
by me.
You are hurting the Tor network more than you realize. You are
lying to
clients and clients cache that answer. Don't do this.
--
| .''`. ** Debian GNU/Linux **
Peter Palfrader | : :' : The universal
http://www.palfrader.org/ | `. `' Operating System
| `- http://www.debian.org/
The correct way is to put the IP's in a deny list in the config file.
Sincerely,
Watson Ladd
- ---
"Those who would give up Essential Liberty to purchase a little
Temporary Safety deserve neither Liberty nor Safety."
- -- Benjamin Franklin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (Darwin)
iD4DBQFEanEVGV+aWVfIlEMRAr66AJ94vhJj9ntfEK2r5H8d9OEcIDckhQCVERR5
3HUO7jkS7042hGaYwTKWJg==
=ELvN
-----END PGP SIGNATURE-----