Ideally, the forums would work out some way to block connections based on behaviour, rather than source IP. But in the absence of such sensible measures, there are some things you can do. Can you block particular IP ranges / ports in your exit policy to avoid the complaints? For example, if the complaint is from a destination 1.2.3.4:80, add a rule at the *top* of your exit policy saying: ExitPolicy reject 1.2.3.4:80 You can add IPv6 addresses, port ranges and address masks too: ExitPolicy reject 1.2.3.4/24:443-445 ExitPolicy reject [2002::abcd]:8080 Tim Tim Wilson-Brown (teor) teor2345 at gmail dot com PGP 968F094B teor at blah dot im OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F |
Attachment:
signature.asc
Description: Message signed with OpenPGP using GPGMail
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays