
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
I run an exit node off of a residential Verizon connection and I haven't seen a single threat, legal or otherwise so far, I dunno why you're having so much trouble.
Thank you for the reply but I have not either. My comments come from reading many such issues on the mailing list and the many many experiences documented on the Good/bad ISP lists on the torproject websites. I've had zero trouble with the sigle relay I'm running but as I also try to encourage others to run relays I was curious as I don't want to put OTHERS in a bad situation. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJSILw8AAoJEGPr8mk3uIZEYiwQAJ9ARuz2DYx+sjDcri5s79et cOZBK1q+p63gmcv8rnaam3ROq3syzfU4ICW5FhOPwuEcVtmPXjcOFWFQsupK+9Db oUEIndKSLHz0JnAg6kKj7Wsd8EYAnYIiflMVJUfo+noVARMdvidTGdx14epjErhs H22FXkgQu+B5ac2yzC7bEaIZ27UXKt4X1BGFCvC5wXRAb0Kx6JR7RteLD7RWBYAs fxlOHwVopft4iG49y5L4gnjjqtrQUSwBJHyB4OcYyLQ/83mMtlziFaAnYAHB23iA T3NFr4wuohzH9cX0vKhg67JwyTk7vC8ALHtZJVs/mMA2Aa2Wq8Bb5ZdiKRJuNoPV QPWkXQSvL42iE7Xhww5Yasz2A/gWQE5GYzBTIGf3Wr2UBS0dxeXJLXUyxaeMtygM sFXWb3KMkw5wijpFzVHc4wBmqSlLFOzf1he9+FVFvO/9OFZ1Lh5IX+LXs8xZmOC+ CV2r9BqufCNWP8F4Ounbc8ogCHAI5I8SiVHjWMqDwn9qw/oX31rVFUPyLGXXw2yp kxANmPcHFO/WKz1IEQM3gNum89mp2eEEOVAIEZ0RsvzSBctp1BJXseazBKZFwsf7 LegCIe+P/AqUk5XiMi5VWhJXnvFE1a6i0lrAufW8KfRwa069VlioT8kJ+UYmhTtR l+tpY0bjM+NVyFzBD3Qh =PyZa -----END PGP SIGNATURE-----

On Fri, Aug 30, 2013 at 11:38:26AM -0400, That Guy wrote:
I run an exit node off of a residential Verizon connection and I haven't seen a single threat, legal or otherwise so far, I dunno why you're having so much trouble.
Thank you for the reply but I have not either. My comments come from reading many such issues on the mailing list and the many many experiences documented on the Good/bad ISP lists on the torproject websites. I've had zero trouble with the sigle relay I'm running but as I also try to encourage others to run relays I was curious as I don't want to put OTHERS in a bad situation.
I ran a non-exit relay at home for many years without hearing any complaints. (I moved away from that ISP at the end of 2012 so I no longer run that relay). I haven't seen a credible description of a non-exit relay being the cause of a complaint -- in most cases I have seen described, there were several possible causes for a complaint and the Tor relay was just one possible cause. So, I would have no problem encouraging others to run a non-exit relay on their home connection, since I don't believe that it is likely to put them in a bad situation. I would be clear with them that they should be aware of the technical issues when doing so, of course. -andy

On 8/30/2013 1:04 PM, Andy Isaacson wrote:
On Fri, Aug 30, 2013 at 11:38:26AM -0400, That Guy wrote:
I run an exit node off of a residential Verizon connection and I haven't seen a single threat, legal or otherwise so far, I dunno why you're having so much trouble. Thank you for the reply but I have not either. My comments come from reading many such issues on the mailing list and the many many experiences documented on the Good/bad ISP lists on the torproject websites. I've had zero trouble with the sigle relay I'm running but as I also try to encourage others to run relays I was curious as I don't want to put OTHERS in a bad situation. I ran a non-exit relay at home for many years without hearing any complaints. (I moved away from that ISP at the end of 2012 so I no longer run that relay). I haven't seen a credible description of a non-exit relay being the cause of a complaint -- in most cases I have seen described, there were several possible causes for a complaint and the Tor relay was just one possible cause.
So, I would have no problem encouraging others to run a non-exit relay on their home connection, since I don't believe that it is likely to put them in a bad situation. I would be clear with them that they should be aware of the technical issues when doing so, of course.
-andy _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I have recently seen several e-commerce websites blocking all traffic coming from IP addresses that are known to be used by Tor relays, including non-exit relays. That means _all_ traffic, including legitimate traffic. In my personal experience, Ancestry.com and justanswer.com are currently blocking my residential IP address because I am running a non-exit relay from home. Others are having similar experiences. If this is the beginning of a trend, the useability of Tor will drop dramatically unless a counter-measure is developed. David C

On 30.08.2013 22:26, David Carlson wrote:
I have recently seen several e-commerce websites blocking all traffic coming from IP addresses that are known to be used by Tor relays, including non-exit relays. That means _all_ traffic, including legitimate traffic. In my personal experience, Ancestry.com and justanswer.com are currently blocking my residential IP address because I am running a non-exit relay from home. Others are having similar experiences. If this is the beginning of a trend, the useability of Tor will drop dramatically unless a counter-measure is developed.
Please, start collecting such sites, maybe on a new page in the wiki. Even better, email them and teach them about Tor as well. -- Moritz Bartl https://www.torservers.net/
participants (4)
-
Andy Isaacson
-
David Carlson
-
Moritz Bartl
-
That Guy