[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
RE: Tor and NNTP
You could also use our Real-Time Tor Detection service at showmyip.com or
ippages.com. Non-subscribers get data that is at most 1 hour old:
subscribers get data that is at most 1 minute old.
Try http://www.ippages.com/xml/?ip=123.456.789.001&get=tor (or https:// if
you prefer) where 123.456.789.001 is the IP address of your visitor. We
will have a simple text and SOAP interface available soon. You can add
other &get= parameter values besides "tor" such as country, host, isp, org,
state, reverse_host, etc.
. . . . .
Wesley Kenzie
WebMaster
https://www.ippages.com/lookups/
http://www.showmyip.com/
http://www.privacy-ecosystem.com/
MSN: support@xxxxxxxxxxxxxxxxxxxxx
ICQ: 210115340
AIM: privacyeco
Blog: http://privacy-ecosystem.blogspot.com/
-----Original Message-----
From: owner-or-talk@xxxxxxxxxxxxx [mailto:owner-or-talk@xxxxxxxxxxxxx] On
Behalf Of Aioe
Sent: November 3, 2006 7:57 AM
To: or-talk@xxxxxxxx
Subject: Tor and NNTP
I'm the owner of a large *public* news server (see http://news.aioe.org/ )
which allows a (restricted) read and write access to USENET groups without
requiring an authentication. I'm also a novice with Tor. An increasing
number
of tor users is choosing my server for reading and posting on USENET.
In order to avoid SYN DDOS and floods, my server accepts only a determinate
number of daily connections and bytes per IP. Trespassers are banned for a
day. While a single (end) proxy serves a single client the total activity
generated on my host by that tor router usually remains under this limit.
When more than a client uses the same proxy, often that tor router exceeds
those values because the barrier is calibrated assuming a single client per
IP. Every IP can also post only 25 messages per day which is a reasonable
limit for a single client but it isn't enough when multiple users share the
same IP.
Therefore sometimes some tor proxy is banned from my server due an excessive
number of connections, bytes or posts.
I need a (server side) way to separate the tor users from the other ones: is
this possible?
I'm supposing to setup an "hidden service" which redirects all tor users to
a
non default *local* NNTP port in order to treat them differently from the
other clients. In this way, when the tor users access the server from the
main DNS system (as nntp.aioe.org) they're still subjected to the standard
rules that are applied to all clients but when they use the .onion domain a
different (less restrictive) policy can be applied to them. Is this a right
way?
If so, does tor allow to be configured in order to handle only my "hidden
service" without providing any other tor service (my ISP doesn't like proxy
and i've not much bandwidth)?
greetings
Paolo Amoroso (Aioe)