-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hello!
How may I create an Tor exit node with some ports and sites blacklisted?
So the user trying to enter an blacklisted page will get an page saying that the maintainer has denied the access to that page/site.
I whould like to deny access to IRC and some forums so how is that posible if it is?
- -- Best Regars, Anonymous - Supporter of Free Speech.
GPG: 0x78612223
On 13-11-11 12:56 PM, Anonymous wrote:
How may I create an Tor exit node with some ports and sites blacklisted?
See the Reduced Exit Policy page referred to at https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
So the user trying to enter an blacklisted page will get an page saying that the maintainer has denied the access to that page/site.
You could do such a thing but it makes the network much less efficient because clients would have to build circuits several times, and it also would get your node listed as a BadExit. https://trac.torproject.org/projects/tor/wiki/doc/badRelays
If you do it as recommended with the ExitPolicy, the user will never exit via your node, and therefore will not need to see a "censored notice" page.
I whould like to deny access to IRC and some forums so how is that posible if it is?
See above link.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
11.11.2013 20:08, krishna e bera kirjoitti:
On 13-11-11 12:56 PM, Anonymous wrote:
How may I create an Tor exit node with some ports and sites blacklisted?
See the Reduced Exit Policy page referred to at https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
So the user trying to enter an blacklisted page will get an page saying that the maintainer has denied the access to that page/site.
You could do such a thing but it makes the network much less efficient because clients would have to build circuits several times, and it also would get your node listed as a BadExit. https://trac.torproject.org/projects/tor/wiki/doc/badRelays
If you do it as recommended with the ExitPolicy, the user will never exit via your node, and therefore will not need to see a "censored notice" page.
I whould like to deny access to IRC and some forums so how is that posible if it is?
See above link.
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Thanks for this. It helped me a lot.
- -- Best Regars, Anonymous - Supporter of Free Speech.
GPG: 0x78612223
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
11.11.2013 20:55, Anonymous kirjoitti:
11.11.2013 20:08, krishna e bera kirjoitti:
On 13-11-11 12:56 PM, Anonymous wrote:
How may I create an Tor exit node with some ports and sites blacklisted?
See the Reduced Exit Policy page referred to at https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
So the user trying to enter an blacklisted page will get an page saying that the maintainer has denied the access to that page/site.
You could do such a thing but it makes the network much less efficient because clients would have to build circuits several times, and it also would get your node listed as a BadExit. https://trac.torproject.org/projects/tor/wiki/doc/badRelays
If you do it as recommended with the ExitPolicy, the user will never exit via your node, and therefore will not need to see a "censored notice" page.
I whould like to deny access to IRC and some forums so how is that posible if it is?
See above link.
Thanks for this. It helped me a lot.
If you are going to use your home connection (Differend IP, but the IP traces back to you still.) to host the Exit. What's the best bet for not being able to trace it back to you? (Using Finland ISP.)
- -- Best Regars, Anonymous - Supporter of Free Speech.
GPG: 0x78612223
Anonymous:
11.11.2013 20:55, Anonymous kirjoitti:
11.11.2013 20:08, krishna e bera kirjoitti:
On 13-11-11 12:56 PM, Anonymous wrote:
How may I create an Tor exit node with some ports and sites blacklisted?
See the Reduced Exit Policy page referred to at https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
So the user trying to enter an blacklisted page will get an page saying that the maintainer has denied the access to that page/site.
You could do such a thing but it makes the network much less efficient because clients would have to build circuits several times, and it also would get your node listed as a BadExit. https://trac.torproject.org/projects/tor/wiki/doc/badRelays
If you do it as recommended with the ExitPolicy, the user will never exit via your node, and therefore will not need to see a "censored notice" page.
I whould like to deny access to IRC and some forums so how is that posible if it is?
See above link.
Thanks for this. It helped me a lot.
If you are going to use your home connection (Differend IP, but the IP traces back to you still.) to host the Exit. What's the best bet for not being able to trace it back to you? (Using Finland ISP.)
I'd say if you want to run an exit node you shouldn't try to hide. You should own a public IP and run it under your name and state that it is an exit node at as many levels as possible (whois, website on some ports (there is a template somewhere).
In my opinion this is the only way (along with other preparations) to comfortably run an exit node. See https://blog.torproject.org/running-exit-node
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 14.11.2013 13:21, Martin Kepplinger wrote:
Anonymous:
11.11.2013 20:55, Anonymous kirjoitti:
11.11.2013 20:08, krishna e bera kirjoitti:
On 13-11-11 12:56 PM, Anonymous wrote:
How may I create an Tor exit node with some ports and sites blacklisted?
See the Reduced Exit Policy page referred to at https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
So the user trying to enter an blacklisted page will get an
page saying that the maintainer has denied the access to that page/site.
You could do such a thing but it makes the network much less efficient because clients would have to build circuits several times, and it also would get your node listed as a BadExit. https://trac.torproject.org/projects/tor/wiki/doc/badRelays
If you do it as recommended with the ExitPolicy, the user will never exit via your node, and therefore will not need to see a "censored notice" page.
I whould like to deny access to IRC and some forums so how is that posible if it is?
See above link.
Thanks for this. It helped me a lot.
If you are going to use your home connection (Differend IP, but the IP traces back to you still.) to host the Exit. What's the best bet for not being able to trace it back to you? (Using Finland ISP.)
I'd say if you want to run an exit node you shouldn't try to hide. You should own a public IP and run it under your name and state that it is an exit node at as many levels as possible (whois, website on some ports (there is a template somewhere).
In my opinion this is the only way (along with other preparations) to comfortably run an exit node. See https://blog.torproject.org/running-exit-node
That's that kind of answer that i were wanting to see. What whould be best way to tell the ISP that I'm running an exit node? Just say what ip is it at? If there are anybody who is hosting Tor exit in Finland please tell me what's the best way to tell the ISP about it? You may contact me privatly if you wish to speak Finnish it's okey to me.
- -- Best Regars, Anonymous - Supporter of Free Speech.
GPG: 0x78612223
I heartily agree
I'd say if you want to run an exit node you shouldn't try to hide. You should own a public IP and run it under your name and state that it is an exit node at as many levels as possible (whois, website on some ports (there is a template somewhere).
In my opinion this is the only way (along with other preparations) to comfortably run an exit node. See https://blog.torproject.org/running-exit-node
____________________________________________________________ GET FREE SMILEYS FOR YOUR IM & EMAIL - Learn more at http://www.inbox.com/smileys Works with AIM®, MSN® Messenger, Yahoo!® Messenger, ICQ®, Google Talk™ and most webmails
tor-relays@lists.torproject.org