Getting IP reputation services to use ExoneraTor?
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hello. A discussion with a hosting provider led to them making a suggestion after I showed them https://metrics.torproject.org/exonerator.html, so I thought I'd explain his suggestion and post it here. Nowadays, a huge number of hosts are familiar with Tor and sympathize, but do not allow exits because it severely taints their IPs and makes them difficult to resell afterwards. With the rising costs of IPv4, it is a deal-breaker even if the host would otherwise be fine with exits. Obviously, convincing IP reputation services and blacklists to make an exception for Tor is impossible: It goes against their mission. But has anyone tried advocating to these reputation services that they remove exit IPs from blacklists once they are no longer exiting traffic? This would reduce the number of false positives in their database without increasing that of false negatives (which is all they care about). I imagine hosts would be much more amenable to hosting exits if the subsequently blacklisted IPs revert to being clean as soon as the exit operator leaves. After all, "if I'm your customer, the IP ranges I use will be tainted for a long time and potentially unsellable even after I leave" is not going to inspire as much confidence as "if I'm your customer, the IP ranges will only be dirty while I use them". Is there anything to this? Large exit operators can just register their own ASN and simply not care about blacklists, but most operators are not going to be able to do this, especially if they run just a couple relays anonymously and on a tight budget. Regards, forest -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEvLrj6cuOL+I/KdxYBh18rEKN1gsFAmkrjRgACgkQBh18rEKN 1gvHJQ/9FJBMMFJ86hCR1OE4n9ONwAsP7CxB4MBO58mUz+bN40Ngzv/N+Ih0BaQf 8qYEcHeEaYp7IB+/OFJS3hTOZDZYCdXU7nocxZgZ5l4k4e68JnyyNSio/zMu5tHk GUeQd10wZXxQnzBgdfDlj2tyCMUkWlzcvgxTaqk7scHuEk1kwfyixvcfbgMQL7T8 nWqik8BTzKYuS6zimks4MQsl8viE2dpOaWkz4xtm4EPUlQv1kh2N3c7JO0vFyC3s Q1ad/4VmlZQ3lgOO++0B3CSJ/6Fh2hYGYJm8B2Fe1nSdZ/SY1+mLYr0KupM53tEL FKsnXliqyIMVExBW5MlxoGlK4AQ3AkbrafkpUSPvNsvjmu94GHrg2Y1jcefSelFO zd34lfRmDaNE1yoxL1ehxYIEJGbwkMnxU4+FC5tnHxcWM8gtE499kFu4+5JCFiBu i2ldLycdIEaez2mb8VbXHXdwjAQy8dVlFaHVua26riirVoKmTgKEJ+wnVkCbAF8W 8ZUQVVRQIwJyo2dlcNGrwGwZ5BtzXFtYiJfmqE4yesc7MESQsqb02kWlPVEVTCyq UMDzVa+W08xhTr+c9iaFIC8scmZCoI0zOpFiqBUofIR9NWKszccXrJbOdF3vDkNJ ZGquAzEnrwwhB9Zj3QLoz05AUzlmLtWd0u30gqZ8zMMx5KSs9iY= =IVGe -----END PGP SIGNATURE-----
participants (1)
-
forest-relay-contact@cryptolab.net