[tor-relays] Deploy relays using hidden exit IP's?

Julian Yon julian at yon.org.uk
Wed Nov 28 00:51:23 UTC 2012

On Tue, 27 Nov 2012 18:42:56 -0500
Bill Waggoner <ctgreybeard at gmail.com> wrote:

> I have the opposite problem in a way.  I use geocaching.org
> frequently.  But because they have had a problem in the past with Tor
> users they block Tor nodes.  As I run a Relay, not Exit, this means
> that I have to ask for an exception every time my IP changes  Happily
> that doesn't happen very often but it is surly a pain when it does.
> Is there a way for someone to distinguish real and exit IPs?  If so
> I'll try to educate them.

Yes. As per Moritz's contribution to this thread:
> People are always thankful when I can point them to the bulk exit
> list and torDNSel. I point out that Tor has a lot of users and not
> all of them are bad, and urge for a temporary block. Most admins seem
> to follow that advice.
> https://check.torproject.org/cgi-bin/TorBulkExitList.py
> https://www.torproject.org/projects/tordnsel.html.en

If they want to implement blocking of Tor exit relays, these tools can
help them to do that.


3072D/F3A66B3A Julian Yon (2012 General Use) <pgp.2012 at jry.me>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 230 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20121128/f8a75989/attachment.pgp>

More information about the tor-relays mailing list