[tor-talk] Exit node stats collection?

Bernard Tyers - ei8fdb ei8fdb at ei8fdb.org
Tue Sep 3 21:02:39 UTC 2013




On 3 Sep 2013, at 21:52, Moritz Bartl <moritz at torservers.net> wrote:

> On 09/03/2013 10:39 PM, Elrippo wrote:
>> I have to disagree with you on behalf of SPAM.
>> I opened Port 25 on one of my exits. In a week I got blacklisted by Google and some DNSBL's for sending spam.
>> It took me quite a time to erase my IP from these lists...
>> I can live with port 587 for submission, but I will never open port 25 again.
> 
> Seconded. While we try not to restrict anything and have an "everything
> goes" policy on most of our relays, port 25 is sadly not a good idea to
> keep open.


I have been running a reduced exit policy, a slight variation on the mentioned approach here. [1]

Up until this week I've had no major issues, apart from one notice from the ISP, which was dealt with reasonably effectively.

My issue my is keeping the exit node online.

To answer the OP: how can we tell "malicious users" from "valid users". I understand your POV, but surely we can't discriminate? Or can we?

regards,
Bernard

[1] https://blog.torproject.org/running-exit-node

--------------------------------------
Bernard / bluboxthief / ei8fdb

IO91XM / www.ei8fdb.org

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 495 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20130903/4f5feee6/attachment-0001.sig>


More information about the tor-talk mailing list