[tor-relays] Thinking about deploying a new node

Lance Hathaway qhltx at yahoo.com
Thu May 15 02:23:00 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

So, every now and then, somebody asks what the best use of a node
would be--bridge, relay, or exit. And yes, this is one of those requests.

This would be a VPS from VPS Nodes. I checked the list of good and bad
ISPs, and they don't seem to be listed. So I asked them directly how
they felt about Tor, and this was the response:

"While we don't specifically disallow Tor by name, it does come under
the ToS as it is commonly used to launch large scale DDOS and SPAM
campaigns and is therefore not allowed on our network for that reason.
rDNS is provided as standard, you need to have a valid FQDN A record
associated with the IP address that is assigned to your container. As
far as SWIP, I would have to pass the request on to management as they
are the only ones with that access."

Seems pretty clear to me that they're not in favor of having an exit
on their network. (I brought up the reduced exit policy and asked
specifically about SWIP so that I could handle most of whatever abuse
complaints come in, but they wouldn't provide anything further than
this response.) That leaves bridge or standard relay. My question is,
given 3TB of monthly bandwidth and a 100Mbps (shared) uplink, would it
be better to run as an entry/middle node, or as an obfs3/scramblesuit
bridge?

(If there are other suggestions for trying to talk VPS Nodes into
allowing an exit node, I'm all ears--though it may be better left with
somebody with more experience talking to ISPs.)

Thanks in advance,

 -Lance
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)
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=PeIP
-----END PGP SIGNATURE-----


More information about the tor-relays mailing list