[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Deploy relays using hidden exit IP's?



On Tue, 27 Nov 2012 18:42:56 -0500
Bill Waggoner <ctgreybeard@xxxxxxxxx> wrote:

> I have the opposite problem in a way.  I use geocaching.org
> frequently.  But because they have had a problem in the past with Tor
> users they block Tor nodes.  As I run a Relay, not Exit, this means
> that I have to ask for an exception every time my IP changes  Happily
> that doesn't happen very often but it is surly a pain when it does.
> 
> Is there a way for someone to distinguish real and exit IPs?  If so
> I'll try to educate them.

Yes. As per Moritz's contribution to this thread:
 
> People are always thankful when I can point them to the bulk exit
> list and torDNSel. I point out that Tor has a lot of users and not
> all of them are bad, and urge for a temporary block. Most admins seem
> to follow that advice.
> 
> https://check.torproject.org/cgi-bin/TorBulkExitList.py
> https://www.torproject.org/projects/tordnsel.html.en

If they want to implement blocking of Tor exit relays, these tools can
help them to do that.


Julian

-- 
3072D/F3A66B3A Julian Yon (2012 General Use) <pgp.2012@xxxxxx>

Attachment: signature.asc
Description: PGP signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays