How to run an exit node and not getting raided by police?

Scott Bennett bennett at cs.niu.edu
Sat Jan 26 23:39:47 UTC 2008


     On Sat, 26 Jan 2008 17:37:37 -0500 Kraktus <kraktus at googlemail.com>
posted out of the blue with no context whatsoever:

>Well, if you're really worried, I suppose you could disallow exits to
>all but a whitelist of websites you trust not to contain content that
>is illegal to view in your country.  Which would probably not include
>user-contributed websites.
>
     Just keep in mind that it would have to be a very small list because
the ExitPolicy syntax, probably for good reason, does not allow something
like

	ExitPolicy accept *.edu:80

for example.  For one thing, this would require a name server query by the
exit server for every exit connection to port 80 because the IP address
would not be known prior to the exit connection attempt.  Would a tiny
whitelist get enough use to justify putting it into an exit policy?


                                  Scott Bennett, Comm. ASMELG, CFIAG
**********************************************************************
* Internet:       bennett at cs.niu.edu                              *
*--------------------------------------------------------------------*
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."                                               *
*    -- Gov. John Hancock, New York Journal, 28 January 1790         *
**********************************************************************



More information about the tor-talk mailing list