[tor-relays] specifying your own entrance and exit nodes

usprey usprey at gmail.com
Wed Dec 10 23:52:39 UTC 2014


I run an exit node,
https://atlas.torproject.org/#details/F14B7BF44F9B170DFF628F237E0C7E8D631F957E,
and I'm also quite new on the list and learn new things about Tor everyday,
so please bear with me.

I do not have a full understanding of how the DirAuth works, but how about
an out of band verification process, to ensure the trustworthiness, for
exit nodes specifically. This would minimize the hazzle for people who
wishes to use trusted exit nodes, and maximize the number of explicitly
trusted exit nodes. Since relay maintainers are already publicly listed and
traceable I would not have any problem signing off on my own, and a few
other maintainers I know personally, exit nodes.

As per
https://compass.torproject.org/#?exit_filter=all_relays&links&sort=cw&sort_reverse&country=&exits_only&top=10
the
exit probability of the Top 10 exit relays with the highest consensus
weight is 12,2046%, and per
https://compass.torproject.org/#?exit_filter=fast_exits_only&links&sort=cw&sort_reverse&country=&exits_only&top=10
the
exit probability of the Top 10 fast exit relays is 11,2452%, so you
wouldn't need many maintainers joining a signing/verification scheme to
account for a lot of the bandwidth on the network.

On 10 December 2014 at 21:58, Seth <list at sysfu.com> wrote:

> Assuming there are certain Tor notes being run by parties hostile to my
> own interests, what are
> the pros and cons of specifying one's own list of trusted entrance and
> exit nodes?
>
> I run a Tor relay at home 24/7 and use that as my entrance point. I do
> this to provide cover traffic for my own Tor use as well as help out the
> network.
>
> I also try to use Tor for all my daily web browsing when possible. This
> has given be a lot of headaches.
>
> Besides the demoralizing barrage of Cloudfare captchas, I've had a lot of
> problems with dropped connections, timeouts, SSL cert warnings, fatal
> errors connecting to HTTPS sites. I started to get a gut feeling, warranted
> or not, that some exits nodes might be meddling with my traffic.
>
> To combat this I changed the configuration on my local Tor relay to use
> only exit nodes run by organizations or people that I felt I could trust. I
> didn't bother with specifying entrance nodes because I could not see what
> the gain would be.
>
> This seems to have curbed some of the problems, with the tradeoff that
> responsiveness is much more inconsistent.
>
> I'm just curious if restricting exit nodes to a few dozen that you trust
> effectively defeats most of the purpose of using Tor. What would be the
> bare minimum of Tor exit nodes a person would need to use in order to make
> life difficult for the Panopticon surveillor scum?
>
> If this post is more appropriate for Tor-talk, please let me know
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20141211/dfd07b5b/attachment.html>


More information about the tor-relays mailing list