[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: getting more exit nodes
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: getting more exit nodes
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Sun, 27 Apr 2008 13:57:34 -0700
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sun, 27 Apr 2008 16:57:34 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; bh=38W0Tr4z41J54SZrBbFJimGpzT9Bu+8f1MCp8c85xw0=; b=hLPWHcsb8JaujB5jKnGccQl9vIdo7IrF3YNe97LrLAwlKAjCveBoqMBvHWAtmh0Syb0lmFrXYIGYmVHpc274DbiYdc48ECi1EYHOTkAMkG/nd8wgkgKFmxZ6BQ2tnzCiDdemq6b5ZdFkgmBbfij6Ahy9KORRgffCVvhw3bAWytQ=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; b=Vun+soVx4EiTLxe0TlaOoP1rNiDqAr6udZ+rf5VNt72UWE+hxBrA3mCzQsGsBUZ+NECWWtfCHGX20ZZjSu+D46TXM4dB8ZfNLvrZuiuwIX1t1AjylV3N0FfzukSqh4GtnU9Fnu1OsWVsCxBa/QZjxkLEEZvJjYBDfrqlVaiV1oM=
- In-reply-to: <20080425091550.GA6664@xxxxxxxxxx>
- References: <20080423133104.GA9504@xxxxxxxxxx> <226645.27942.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx> <20080425091550.GA6664@xxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Icedove 1.5.0.14pre (X11/20080208)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Alexander Bernauer wrote:
> On Wed, Apr 23, 2008 at 07:51:51AM -0700, Martin Fick wrote:
>> I really don't understand why pseudo-exit node
>> anonymity is so important?
>
> The short answer:
> Admins who run a Tor node which is for good reasons not an exit node
> should be able to run at least a pseudo-exit node without additional
> personal risk.
(snip)
This is why I've got reject *.* - I feel that the level of risk is just
too much for me, given the current state of things.
That being said... I just don't understand this pseudo-exit thing, and
could really use a clear set of documents (or better yet, something with
diagrams), so I can get my brain around it.
Basically:
1.) How can someone be an exit, without letting arbitrary users "take
on" the identity of their IP?
As soon as someone does that (as is with normal exits), they're open to
crapstorms from anything bad anyone does... and I just don't understand
how that can be avoided.
2.) If a pseudo-exit doesn't "loan out" its IP, it must be hiding it
somehow - most likely through another proxy. How on Earth can that be an
exit?
Sorry, but I've just been confused from the beginning.
- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org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=Z8Fc
-----END PGP SIGNATURE-----