On Mon, 9 May 2016 16:28:33 +0200 Andreas Krey <a.krey@xxxxxx> wrote: > To me it looks like the tor exit is using a squid > proxy - is that an acceptable thing to do as a > relay operator? Squid itself is just a tool, sure it can cache, it can log all requests, but is it configured to do so? Not necessarily so. On the other hand it has very advanced filtering capabilities and ACLs by hostname/URL/destination IP/etc (including regexp support), and maybe that's why it's being used -- to block some of the simplest cases of malicious behavior? You could ask whether or not applying any filtering strips the exit node operator from their "common carrier" status (if there was any in the first place), but that's another question, and one that should be more troubling for the exit node operator, not for its users. As it stands, I'd say the mere presence of Squid does not equate "evil", it all depends on how it's set up and what it's being used for. -- With respect, Roman
Attachment:
pgpP3y1kVuCFM.pgp
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk