[tor-relays] Deploy relays using hidden exit IP's?
Julian Yon
julian at yon.org.uk
Wed Nov 28 00:51:23 UTC 2012
On Tue, 27 Nov 2012 18:42:56 -0500
Bill Waggoner <ctgreybeard at gmail.com> wrote:
> I have the opposite problem in a way. I use geocaching.org
> frequently. But because they have had a problem in the past with Tor
> users they block Tor nodes. As I run a Relay, not Exit, this means
> that I have to ask for an exception every time my IP changes Happily
> that doesn't happen very often but it is surly a pain when it does.
>
> Is there a way for someone to distinguish real and exit IPs? If so
> I'll try to educate them.
Yes. As per Moritz's contribution to this thread:
> People are always thankful when I can point them to the bulk exit
> list and torDNSel. I point out that Tor has a lot of users and not
> all of them are bad, and urge for a temporary block. Most admins seem
> to follow that advice.
>
> https://check.torproject.org/cgi-bin/TorBulkExitList.py
> https://www.torproject.org/projects/tordnsel.html.en
If they want to implement blocking of Tor exit relays, these tools can
help them to do that.
Julian
--
3072D/F3A66B3A Julian Yon (2012 General Use) <pgp.2012 at jry.me>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 230 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20121128/f8a75989/attachment.pgp>
More information about the tor-relays
mailing list