[tor-relays] HoneyPot?

AMuse tor-amuse at foofus.com
Thu Oct 29 22:59:38 UTC 2015


 

Given the current state of the internet (ie, massive warrantless spying
by LEO's and packet inspection by ISP's) I cannot imagine how any TOR
operator would block encrypted services and not be what most reasonable
people consider a "Bad exit". 

On 2015-10-29 14:05, Mike Perry wrote: 

> Green Dream:
> 
>> Mirimir: aside from the nickname, do you have any reason to believe it was out of the ordinary? The exit policy mostly only seems to allow non-encrypted services (80 but not 443, 143
> 
> A while ago we were actively marking nodes that only allowed
> non-encrypted services as BadExit, since there were no satisfactory
> explanations given as to why nodes should need this policy.
> 
> Back then, the most common explanation people gave was "I need the
> ability to block traffic that looks evil." Unfortunately, all mechanisms
> available to do this will also end up blocking legitimate content at
> some rate. Nobody was using anything more advanced than snort-style
> regular expressions that matched things that happened to look like
> exploits.
> 
> FWIW, I am personally in favor of reinstating such a policy. I doubt the
> situation has changed.
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays [1]

 

Links:
------
[1] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20151029/9329808c/attachment.html>


More information about the tor-relays mailing list