[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Reconfiguring a middle relay as a bridge



On Tue, Sep 29, 2020 at 02:47:30PM +0000, torix@xxxxxxxxxxxxxx wrote:
> Is there a security problem with turning a middle relay, whose ip address is known, into a bridge?
>

It depends on why you make this change.

I did it a few weeks ago because one of my nodes was on a server hosting several services (and being seen as a Tor node was painful for some of them). The node disappeared from node lists after a few days. This includes external lists (like dan tor) used to blacklist exit or all tor relays.
It was enough for me (but the contribution to the network is really lower now so I will find another way :).


If you need more I would suggest to modify/renew the node's name and fingerprint to avoid being simply found with the old ones with a simple relay search.

Then AFAIK it depends on what you want to protect your node from.

(I will be interested like you if any other advice on the subject)


Corl3ss
 

Attachment: signature.asc
Description: PGP signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays