eliminating bogus port 43 exits

Anon Mus my.green.lantern at googlemail.com
Mon Jun 15 20:15:56 UTC 2009


Alexander Cherepanov wrote:
> Hello, Anon!
> You wrote to or-talk at freehaven.net on Sun, 14 Jun 2009 16:44:12 +0100:
>
>   
>> Of course, websites & organizations have the right to choose which ports 
>> they use for which services and open/close. Anyone trying to inflict 
>> that kind of system on any "internet" user community should STOP doing 
>> so immediately. Its called "port blocking" and its unacceptable.
>>
>> Therefore ALL traffic, on ALL ports, are LEGITIMATE traffic, regardless 
>> of whether they comply with IANA's list or not.
>>     
>
> I agree more or less. But there are some concentrations of troubling 
> traffic on some ports such as 25. Blocking exit to these ports is a 
> compromise. It is not ideal -- good traffic is also lost in the 
> process and not all bad traffic is blocked. Tor exit node operators 
> that feel balance should be different can change their exit policy 
> accordingly.
> Do you have better apporach?
>
> Alexander Cherepanov
>
>
>   
Of course. All relay operators have the right to protect themselves. 
 From trojans etc or spam generators.  This is why you can set up tor to 
provide its service on only certain ports.

But destination port blocking is a more difficult to approve of.

Obviously,  if you block port 25 traffic completely then all (usual, but 
not always, as it can be set up to another port) smtp will be blocked.. 
spammers & the rest of us included.

Now I used smtp (secure - not port 25) to deliver this email. Should you 
block this?

If so what about port 80?

I hate spam... but I've learned to live with it and so I use a spam 
filter. Thats the best way..

At the end of the day its YOUR relay .. as long as tor clients can find 
a good few routes from amongst all the relays out there, thats all that 
is needed.




More information about the tor-talk mailing list