[tor-relays] exit policy to reflect country-wide ban
Pascal
Pascal666 at Users.SourceForge.Net
Thu Dec 4 18:16:49 UTC 2014
Microdescriptors (Tor >0.2.3.x) broke the inclusion of specific IPs in
exit policies (exit enclaving). Did they break the exclusion of
specific IPs in exit policies as well?
Russia is not the only country to implement this type of ban. Is there
a safe way to generalize and centralize this? E.g. if a directory
authority detects an exit relay is in a location known to block access
to/MITM specific IPs/ports it automatically updates the exit policy for
that node in the directory to exclude them.
-Pascal
On 12/4/2014 8:55 AM, Vladimir Ivanov wrote:
> hi.
>
> Recently, github was blocked in Russia (see discussion here: https://news.ycombinator.com/item?id=8692584). The ban is executed by all major ISPs (comply with this regulation is necessary to keep the telecom license so no ISP is risking to disobey), this means that if your exit node happens to be in Russia, you're out of luck when you try to connect to github.
>
> Some suggest marking exit nodes in Russia as bad exits because connecting via them leads to various problems (like node provider doing MitM on all github https connections). Here is an example: https://twitter.com/wiretapped/status/539934125293961216
>
> I think, if Russian exits operators implement reduced policy rejecting github, that would be better solution: they're still usefull for all other sites and a client would access github using a tor exit elsewhere.
>
> Do I miss something here? Are any disatvantages of this?
>
> More general, if a network, a particular exit node is connected to, blocks some IP addresses, is it wise to reflect those changes in the node's ExitPolicy?
>
> BR,
> Vladimir
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
More information about the tor-relays
mailing list