[tor-talk] Mulihomed flag for nodes (from Re: why are some exit IPs missing from Exit IP DB?)
coderman
coderman at gmail.com
Tue Oct 13 01:43:41 UTC 2015
On 10/12/15, sh-expires-12-2015 at quantentunnel.de
<sh-expires-12-2015 at quantentunnel.de> wrote:
> ...
> Tor users aren't entitled to special treatment,
at times it is desirable to avoid the usual "knee-jerk" responses, however.
there is a trick, which is to monitor the consensus. any new relay
identity, or new IP associated with an existing entity.
on event of a new relay or IP, attempt an exit check.
if the exit is not currently in the listed DNSRBL, use it as quickly
as possible as "new-not-yet-blacklisted"
note that there are plenty already using this technique, and you must
race the horde, depending. (the people reading this in some search
engine cache surely spammers looking to maximize their abuse of the
Tor network. ;)
>> the great side effect that such exits are usable to
>> circumvent similar braindead / hating censorship
>> directed at tor users.
>
> Have you ever considered, that people who
> operate hidden services for websites, like to redirect
> people to said hidden services instead of relying
> on exits?
you may like my theory of the whole world going hidden service, soon
enough. since the public internet is all DEF CON wireless, whether you
admit it to yourself or not. *grin*
> Sorry, if that sounds scary, but some relay operators
> I met the this year hat quite a negative relay experience.
i'd like you to tell us more about these negative relay experiences.
i don't doubt them. but i find your misguided understanding of and
pre-occupation with only Tor's detriments interesting.
> I am currently wrapping my head around this, trying
> to figure out if it makes correlation attacks easier
> or MITMing and inserting convert channels between
> arbitrary nodes harder.
this quantified risk analysis at your disposal sounds quite useful.
looking forward to details!
> While we are at it, I consider having the exit ip for
> multihomed nodes in the consensus beneficary. If
> you like to start including additional information into
> the consensus consider the AS too.
you don't understand why this isn't practical. but that's ok.
totally different from AS for OR endpoint.
> The data is available form the RIRs, I am using it with
> a Tor monitor, that isn't libre and I am not sure how the
> RIRs would like to have their services put under load.
you're a considerate and careful Internet citizen, thank you!
> Anyway, I am moving this to tor-talk with the intention
> to discuss, at least, a multihomed flag.
multi-homed flag must die in a fire. don't even consider it!
best regards,
More information about the tor-talk
mailing list