[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] exit ports to open in relay *without* issue...
Port numbers might “limit” traffic when a service is using default ports.
However I could configure SSH to run on port 80 without an issue.
Similarly, no matter what the port is, a malware author can use it to send
malware out.
Talk to your ISP about what Tor is and ask them to disable the virus filter
on your account.
Cordially,
Nathaniel
On Fri, Sep 7, 2018 at 3:09 AM Udo van den Heuvel <udovdh@xxxxxxxxx> wrote:
> Hello,
>
> In the past I opened up some 'innocent' exit ports and after a while my
> ISP detected a Windows virus of some sorts from my IP('s).
> So I went to relay only and that problem was fixed.
>
> Then I thought I was `smart` and opened just a few ports that (normally)
> carry SSL-protected connections.
> Same thing happened, the ISP detected some (other) virus activity after
> a while.
>
> As I do not run Windows at all, these virus detections must come via the
> tor exit ports.
>
> Is there a 'safe' choice in this that will not trigger virus activity?
> Of course the normal SSL-protected traffic does not mean the virus will
> do the same...
> So what can I do besides run non-exit?
>
> Udo
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk