On May 13, 2013, at 7:15 PM, David Fifield david@bamsoftware.com wrote:
Thank you for taking a look.
On Mon, May 13, 2013 at 08:58:27AM +0200, Karsten Loesing wrote:
I'm not sure, but Tor2web might do something similar. From Onionoo's project page: "Tor2web is a web proxy to Tor Hidden Services. It uses Onionoo to get the list of currently running Tor Exits to detect if the client is a Tor user and if so redirect them to the .onion address."
If I read this right, Tor2web is doing it not only for exits, but for all relays:
https://github.com/globaleaks/Tor2web-3.0/blob/c6e26b35e83fd897f9c4f9cb6787e...
Yeah we are doing this because downloading all the exit lists is too much. If there was a better way to do this we would be very useful to us.
We only need the exit list, but we consider any relay as a possible exit. This means that stuff like a relay that exits through a different address will not be detected as coming from Tor (this is something torbel accounts for).
These are the relevant tickets on the topic:
https://trac.torproject.org/projects/tor/ticket/6488
https://github.com/globaleaks/Tor2web-3.0/issues/10
https://github.com/globaleaks/Tor2web-3.0/issues/85
~ Art.