[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: How to ban many IPs?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: How to ban many IPs?
- From: "Matt LaPlante" <cyberdog3k@xxxxxxxxx>
- Date: Wed, 29 Oct 2008 15:57:02 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Wed, 29 Oct 2008 16:57:10 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:in-reply-to:mime-version:content-type :content-transfer-encoding:content-disposition:references; bh=zSy5olh+GfaEYX5UjGqYTV8fu3zYU97EreEuPrEcLwo=; b=egI1irWyAbUBduYwmvFj0HEqfgP0VF9+mR4IhmdnZ3Tzz9/J9yyA2jColmoNR2aywg 0+FcdSb+1WlwPlup51C0+Rjq3/1TXfkm/dT8Rt7DiHIHnGy7vkLukWhFeZ2EvU+yAAN7 81ZyocJgggRUy26OeCyxCv4NH6+aviie3QBwA=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:in-reply-to:mime-version :content-type:content-transfer-encoding:content-disposition :references; b=UVXg89Pc9fmqeFZRbXSgpyG/zVAPXz7sm3eYHxLgCNv4Y9BecSKfptP87AjN++LjSD MqJupxTg8dHHVJkXyNLOf4aKKqj5t6Han9y8blvobBJZA6W5v4gqyZ0keaDmyaSy0Ksh pbFIwDL/c6TCZ8mmd42GuCsSgsSgAtM+SSKLE=
- In-reply-to: <bd9056300810291352k8a0b9begfc49414f06fffb7e@xxxxxxxxxxxxxx>
- References: <bd9056300810291352k8a0b9begfc49414f06fffb7e@xxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
Personally, I run my tor node as transport only (non-exit). I can't
risk opening myself up to illegal activities by running an exit node,
but I figure the least I can do is provide decent transport as the
middle-man, and let the people running exit nodes concern themselves
with the legality of the activity.
On Wed, Oct 29, 2008 at 3:52 PM, slush <slush@xxxxxxxxxx> wrote:
> Hi guys,
>
> Im talking with teachers about running tor node on my university. There is
> plenty of unused bandwidth, especially at night :-). But there are some
> arguments against tor, so Im trying to find some solutions.
>
> One of arguments was, that tor is used for downloading porn and p2p networks
> and university won't support that. Although I partially agree with that, I
> know that freedom of speak is main motivation for me and I will fight for
> Tor in university. So I found blacklists of pornsites and other stuff (for
> example http://urlblacklist.com/) and think, how I can implement blacklist
> to tor exit node.
>
> First solution is to use ExitPolicy. But there is probably limit of listed
> IP. I dont know any exact limitation, but because list of restricted IP is
> uploaded to directory servers, it cannot be a much. In blacklist are
> hundreds of restricted IPs.
>
> Second solution I found is to use transparent proxy and apply filters
> inside. In this solution, directory servers and tor users dont know, that
> there are some sites filtered and they can be confused. It is also not good
> idea, because any good tor scanner (soat or my one) will mark my exit node
> as bad exit.
>
> Is there any other solution of my problem? Any proposal? I know that
> filtering is not good idea at all, but I have only two possibility. No tor
> or filtered one. I vote for tor server with high bandwidth and some
> restrictions.
>
> Thanks,
> Marek
>