[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Network Scan through Tor Exit Node (Port 80)



On 2011-03-09 21:45, Chris Palmer wrote:
> On 03/09/2011 08:17 AM, mick wrote:
> 
>> And as Scott said, I don't see why EFF should place the operators
>> of Tor nodes at risk by using Tor as a scanning tool. 
> 
> Again, do you understand what it is we are doing?
> 
> We are not doing a scan with Nmap set to "aggressive" or "stealthy" on
> all ports.
> 
> We are saying hello on port 443, and then saying goodbye. Once. Using
> normal TCP and TLS handshaking, no tricks. For the good of the internet.

That would be enough to get me in trouble with my ISP for performing
portscans (if I were running an exit node).

Instead of abusing the Tor exit nodes, you could rent some cheap
dedicated servers or VPSes to perform your scans from.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays