[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Exit node re-writing PKI certificates?



On Wed, 19 Mar 2014 23:55:53 -0400
Iggy <iggy19@xxxxxxxxxx> allegedly wrote:

> I am assuming there is no way to tell this now, after the fact?
> 
> -iggy
> 
> On 03/19/2014 11:08 PM, Zack Weinberg wrote:
> > Really useful to know at this point would be the complete suspicious
> > certificate (which would e.g. tell us who signed it) and the exit
> > node in use.
> > 
> > On Wed, Mar 19, 2014 at 11:00 PM, Iggy <iggy19@xxxxxxxxxx> wrote:
> >> Hey all,
> >>
> >> I use an email account from riseup.net, which I usually access via
> >> Thunderbird, running on a linux machine.

According to torstatus.blutmagie.de, cab.cabinethardwareparts.com is on
192.254.168.26. (See
https://torstatus.blutmagie.de/router_detail.php?FP=0cc9b8aa649881c39e948e70b662772d8695c2e9

It has fast, exit, guard and stable flags set.

The node is apparently unnamed, but there is a whois record. See

https://torstatus.blutmagie.de/cgi-bin/whois.pl?ip=192.254.168.26

Mick
---------------------------------------------------------------------

 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
 http://baldric.net

---------------------------------------------------------------------

Attachment: signature.asc
Description: PGP signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays