[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Deploy relays using hidden exit IP's?



I have the opposite problem in a way.  I use geocaching.org
frequently.  But because they have had a problem in the past with Tor
users they block Tor nodes.  As I run a Relay, not Exit, this means
that I have to ask for an exception every time my IP changes  Happily
that doesn't happen very often but it is surly a pain when it does.

Is there a way for someone to distinguish real and exit IPs?  If so
I'll try to educate them.

Bill W

On Tue, Nov 27, 2012 at 1:15 PM, Daniel Case <danielcase10@xxxxxxxxx> wrote:
> I have a real world example of this. My forum was being abused by several
> users all originating from the Tor network, so the first thing I did (and
> any sane admin would do) was block Tor access (with a note) for a few hours
> while I figured out what to do. I ended up unbloacking the network and
> showing Tor users a low-fi version of the forum, and not letting them sign
> in without captcha (a simple qualitative question) - reducing load and spam.
>
> But something must be done temporally, I agree that Tor users shouldn't be
> blocked permanently but quiet is needed in order to implement a solution and
> to get that quiet you need to block at network level, then you can begin a
> more permanent mitigation plan.
>
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays