[tor-relays] Deploy relays using hidden exit IP's?
ctgreybeard at gmail.com
Tue Nov 27 23:42:56 UTC 2012
I have the opposite problem in a way. I use geocaching.org
frequently. But because they have had a problem in the past with Tor
users they block Tor nodes. As I run a Relay, not Exit, this means
that I have to ask for an exception every time my IP changes Happily
that doesn't happen very often but it is surly a pain when it does.
Is there a way for someone to distinguish real and exit IPs? If so
I'll try to educate them.
On Tue, Nov 27, 2012 at 1:15 PM, Daniel Case <danielcase10 at gmail.com> wrote:
> I have a real world example of this. My forum was being abused by several
> users all originating from the Tor network, so the first thing I did (and
> any sane admin would do) was block Tor access (with a note) for a few hours
> while I figured out what to do. I ended up unbloacking the network and
> showing Tor users a low-fi version of the forum, and not letting them sign
> in without captcha (a simple qualitative question) - reducing load and spam.
> But something must be done temporally, I agree that Tor users shouldn't be
> blocked permanently but quiet is needed in order to implement a solution and
> to get that quiet you need to block at network level, then you can begin a
> more permanent mitigation plan.
> tor-relays mailing list
> tor-relays at lists.torproject.org
More information about the tor-relays