I wonder if TOR design should now be more supportive of variable IPs and a spread of IPs for TOR exits. I am not an IT guru. I gather it was thought to be good manners that the IP of Tor exits were known to the public. It would at least let recipients know that the originating IP could not be traced when they see that it came from a TOR exit. Alas many services simply trawl the TOR exit node list and block the IPs accordingly for no other reason than TOR must equal bad. BBC does this. This means the IP gets blocked for TOR and any other service using that IP. Now IPV6 is coming along a TOR exit node could have a veritable range of IPs and even distribute its outputs across them. Indeed is it not possible for a tor exit node (whose IP is published) exit connections via another variable IP other or range of IPs ? Gerry From: tor-relays [mailto:tor-relays-bounces@xxxxxxxxxxxxxxxxxxxx] On Behalf Of Andrew Smith OK, thanks for the clarification and raising the ticket. To answer the why - for starters I'm trying to run a local tor network for fun and to learn more about tor. Why am I trying to put a hostname in there? Because the system I'm setting up the network in may not have static IPs. As I understand it I need to maintain a DirAuthority line with a hard coded IP for each and every directory authority I run myself. If I can use a DNS name, this will mean I end up updating the torrc with DirAuthority lines a lot less. With IPs I am forced to change every torrc in my network every time an IP changes. There are certainly ways around this (I could have a script populate torrc based upon DNS, for example) but it would make my life easier if I didn't have to. Thanks On 6 February 2017 at 23:10, teor <teor2345@xxxxxxxxx> wrote:
-- Andy Smith http://andrewmichaelsmith.com | @bingleybeep |
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays