[tor-relays] Reconfiguring a middle relay as a bridge

Corl3ss corl3ss at corl3ss.com
Tue Sep 29 19:27:32 UTC 2020


On Tue, Sep 29, 2020 at 02:47:30PM +0000, torix at protonmail.com wrote:
> Is there a security problem with turning a middle relay, whose ip address is known, into a bridge?
>

It depends on why you make this change.

I did it a few weeks ago because one of my nodes was on a server hosting several services (and being seen as a Tor node was painful for some of them). The node disappeared from node lists after a few days. This includes external lists (like dan tor) used to blacklist exit or all tor relays.
It was enough for me (but the contribution to the network is really lower now so I will find another way :).


If you need more I would suggest to modify/renew the node's name and fingerprint to avoid being simply found with the old ones with a simple relay search.

Then AFAIK it depends on what you want to protect your node from.

(I will be interested like you if any other advice on the subject)


Corl3ss
 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20200929/7a71cf55/attachment.sig>


More information about the tor-relays mailing list