[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Facebook brute forcing hidden services
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 31.10.2014 21:25, Derric Atzrott wrote:
>>> Honestly if I was running an exit node still. I'd just add
>>> facebook to nullroute right now.
>>
>> That would probably have gotten you the BadExit flag, though.
>
> He wouldn't get it if he advertised that Facebook was null routed
> though right? As in he rejects it in his exit policy.
Yes, if he puts all of Facebook's IP ranges in his ExitPolicy and
keeps that (probably time-dependent) list up to date all the time.
Using the method described in [1], I currently get 72 IP ranges for
Facebook.
[1]
http://stackoverflow.com/questions/11164672/list-of-ip-space-used-by-facebook
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=xD7V
-----END PGP SIGNATURE-----
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk