[tor-relays] Amazon abuse report
Paritesh Boyeyoko
parity.boy at gmail.com
Sat Nov 2 00:47:32 UTC 2013
On Friday 01 Nov 2013 19:36:11 krishna e bera wrote:
> Isnt that about the same percentage on the non-Tor internet?
Probably. :)
> It would help if most bittorrent trackers enforced sharing ratios of
> around 1:1 (since Tor clients cannot accept incoming connections, unless
> on a .onion HS).
Private trackers do this, while open ones like TBP don't care about ratio
enforcement. You also raise a good point about incoming connections, however
BitTorrent clients can still seed as long as *someone* in the swarm can accept
incoming connections, and not necessarily the original seeder. Not every
torrent user will be using Tor, obviously.
> Also helpful if they switched to UDP-only for data
> which would exclude Tor (until Tor suppports UDP).
Agreed, but most of the trackers use HTTP.
> On the other hand, i had a reduced exit policy and still got DMCA
> complaints just for the .torrent file being downloaded via HTTP through
> my exit.
Let me run a couple ideas past you:
1. Configure Squid as a forward proxy with Squidguard and configure Squidguard
to reject any URL with "announce" in it. Use IPTables to transparently
redirect anything destined for ports 80, 2710 and other well known tracker
ports to Squid.
2. Do not exit port 80. While security and anonymity are separate things,
they are tightly coupled, so why not exit only secure ports: HTTPS, POP3S,
IMAPS etc.
Obviously some protocols use TLS on the same port as the clear traffic, but how
detrimental do you think restricting to SSL/TLS enabled protocols (with a few
exceptions) would be?
--
Parity
parity.boy at gmail.com
More information about the tor-relays
mailing list