[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Facebook brute forcing hidden services



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 31.10.2014 21:25, Derric Atzrott wrote:
>>> Honestly if I was running an exit node still. I'd just add
>>> facebook to nullroute right now.
>> 
>> That would probably have gotten you the BadExit flag, though.
> 
> He wouldn't get it if he advertised that Facebook was null routed
> though right?  As in he rejects it in his exit policy.

Yes, if he puts all of Facebook's IP ranges in his ExitPolicy and
keeps that (probably time-dependent) list up to date all the time.

Using the method described in [1], I currently get 72 IP ranges for
Facebook.


[1]
http://stackoverflow.com/questions/11164672/list-of-ip-space-used-by-facebook
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xD7V
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk