[tor-relays] Network Scan through Tor Exit Node (Port 80)

Arjan ynn1jx5pppp6 at list.nospam.xutrox.com
Wed Mar 9 21:48:36 UTC 2011


On 2011-03-09 21:45, Chris Palmer wrote:
> On 03/09/2011 08:17 AM, mick wrote:
> 
>> And as Scott said, I don't see why EFF should place the operators
>> of Tor nodes at risk by using Tor as a scanning tool. 
> 
> Again, do you understand what it is we are doing?
> 
> We are not doing a scan with Nmap set to "aggressive" or "stealthy" on
> all ports.
> 
> We are saying hello on port 443, and then saying goodbye. Once. Using
> normal TCP and TLS handshaking, no tricks. For the good of the internet.

That would be enough to get me in trouble with my ISP for performing
portscans (if I were running an exit node).

Instead of abusing the Tor exit nodes, you could rent some cheap
dedicated servers or VPSes to perform your scans from.


More information about the tor-relays mailing list