I see.
I guess I can simply ask the fingerprint of the node and try to verify with a reverse lookup (will take a while) that it points back to the domain (and subdomain) that was just allocated.
> On 26 Oct 2015, at 09:27, NOC <noc@xxxxxxxxxxxxxxx> wrote:
>
> Usually the Contact Info is obfuscated is some way. Tor Weather
> handles grabbing these just fine too so should not be a problem to
> automate the process.
Tor Weather requires users to opt-in by filling in a form with an unobfuscated email address and relay fingerprint.
It doesn't use the relay's ContactInfo at all, and anyone can sign up to watch any relay.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays