[tor-relays] #2667 [Core Tor/Tor]: Exits should block reentry into the tor network

nusenu nusenu-lists at riseup.net
Wed Jan 31 11:56:00 UTC 2018



Roger Dingledine:
> On Wed, Jan 31, 2018 at 11:41:00AM +0000, nusenu wrote:
>>> Comment (by arma):
>>>
>>>  I continue to think that teaching exit relays to avoid allowing exit
>>>  connections to known relays (IP:ORPort) is a good and useful step.
>>>
>>>  We keep running across messy situations where letting somebody connect to
>>>  a relay from an exit relay's IP address turns into a security surprise.
>>
>> Does that mean that exits will no longer be able to run tor clients (ie. to 
>> run apt updates via tor)?
> 
> No, they are unrelated. 

Great, thanks for the fast reply.

> (Also, if you want to reply to a trac ticket comment, the strategy of
> responding on the tor-relays list is a very odd approach. :)

If the answer was yes - that would be relevant to this list.

I'm looking forward to the day where you can reply to tickets via email :)

-- 
https://mastodon.social/@nusenu
twitter: @nusenu_

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20180131/0b032c12/attachment.sig>


More information about the tor-relays mailing list