[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #2697 [Torflow]: Detect exit nodes running 'transparent' HTTP proxies
#2697: Detect exit nodes running 'transparent' HTTP proxies
-------------------------+--------------------------------------------------
Reporter: rransom | Owner: mikeperry
Type: enhancement | Status: new
Priority: critical | Milestone:
Component: Torflow | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by mikeperry):
Do we want to automatically BadExit all nodes running upstream
transproxies? They can also be used for caching to try to improve
performance, or may just be present at the upstream ISP. My old University
used to run an upstream caching proxy...
We already do detect censorship of exploit info by AV systems. We can try
to focus this by running an exit scanner specifically scraping computer
security and exploit related search queries. That would probably get
anyone running a dumb IDS censor like snort.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2697#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs