Add CGNAT 100.64.0.0/10 to Default Exit Relay Reject Policy
 
            
            
            
            
                6 Jul
                
                    2025
                
            
            
                6 Jul
                
                '25
                
            
            
            
        
    
                7:13 p.m.
            
        Hello, I've noticed that the non-publicly routable CGNAT subnet of 100.64.0.0/10 is not in the default exit policy reject list like 192.168/16 and 10/8 are. This range is not publicly routed, and should never need to be accessed from a Tor exit. Tailscale and other ISPs use this block. How many exit relays connected to a Tailscale network are unknowingly exposing all of their other Tailscale devices to the Tor network? ISPs may be less willing to allow exit relays if there are bots using Tor to toy with the ISPs 100.64/10 range. Maybe there is something I am missing for it to not be included? Thanks, Likogan.Dev
        117
        
      
          Age (days ago)
        
      
        117
        
    
          Last active (days ago)
        
        
        
        0 comments
    
    
        
        1 participants
    
    
    
    
    
    
    
    
    participants (1)
- 
                 admin@likogan.dev admin@likogan.dev