[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Exit node stats collection?

On 3 Sep 2013, at 21:52, Moritz Bartl <moritz@xxxxxxxxxxxxxx> wrote:

> On 09/03/2013 10:39 PM, Elrippo wrote:
>> I have to disagree with you on behalf of SPAM.
>> I opened Port 25 on one of my exits. In a week I got blacklisted by Google and some DNSBL's for sending spam.
>> It took me quite a time to erase my IP from these lists...
>> I can live with port 587 for submission, but I will never open port 25 again.
> Seconded. While we try not to restrict anything and have an "everything
> goes" policy on most of our relays, port 25 is sadly not a good idea to
> keep open.

I have been running a reduced exit policy, a slight variation on the mentioned approach here. [1]

Up until this week I've had no major issues, apart from one notice from the ISP, which was dealt with reasonably effectively.

My issue my is keeping the exit node online.

To answer the OP: how can we tell "malicious users" from "valid users". I understand your POV, but surely we can't discriminate? Or can we?


[1] https://blog.torproject.org/running-exit-node

Bernard / bluboxthief / ei8fdb

IO91XM / www.ei8fdb.org

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsusbscribe or change other settings go to