-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hello!
Konrad, initially and completely unrelated to Tor, I was working on adding some blocklists to my firewall when I came upon and old program, Peerblock. Peerblock from what I remember can log all allowed and blocked traffic, and gives one the ability to use already made blocklists or create new ones. Peerblock has some interesting blocklists and I thought maybe I could use some of those blocklists or some of the listed IP's to filter warez, P2P and other undesirable sites.
Tor (middle) Relays don't have the filtering options like Exit Relays. With Exit Relays one can choose the type of traffic based on personal and legal reasons, then I thought why don't middle relays at least have some mechanism to block undesirable traffic?
So I installed Peerblock on one of my Windows PC's that has a Tor Relay (HelloChilli). Initially Peerblock was set to allow all traffic and to my surprise I could see what seemed to be Tor traffic being logged. Then I activated some blocklists and sure enough I was apparently able to block traffic from undesirable sources. Further, I can right click, copy to clipboard the ip addresses of the blocked ip's, do an NSLOOKUP and generally discern whether the ip address is from a listed Tor relay, a VPN service, from Anti-P2P, Gov or other sources.
My initial curiosity about viewing real-time Tor traffic and the ability to block specific traffic on my middle-node seemed to be achieved.
- --Nelson