[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Deploy relays using hidden exit IP's?



On Sat, Nov 24, 2012 at 4:24 AM, Moritz Bartl <moritz@xxxxxxxxxxxxxx> wrote:
> On 24.11.2012 12:46, tagnaq wrote:
>>> Shouldn't some exit relays (funded or not) be deployed to use an
>>> exit IP that is different from it's advertised exit IP in order to
>>> prevent a simplistic form of blocking based on scraping the
>>> descriptor set?
>
> I don't think it's a good idea. People are always thankful when I can
> point them to the bulk exit list and torDNSel. I point out that Tor has
> a lot of users and not all of them are bad, and urge for a temporary
> block. Most admins seem to follow that advice.

But in the light of "an IP address is not identity"  -- is it
reasonable to block every user of an IP because one person (or bot) is
up to no good? Why do people insist on "stopping" problem behavior at
the network layer?

--Aaron

>
> https://check.torproject.org/cgi-bin/TorBulkExitList.py
> https://www.torproject.org/projects/tordnsel.html.en
>
> --
> Moritz Bartl
> https://www.torservers.net/
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays