[tor-talk] Running an exit node which exits on a different IP than it listens to

Roman Mamedov rm at romanrm.net
Tue Jun 24 13:35:42 UTC 2014


On Tue, 24 Jun 2014 15:07:16 +0200
Anders Andersson <pipatron at gmail.com> wrote:

> The reason would be to minimize the chances of the exit IP ending up
> in some overzealous blacklist.

I think the long-time position of the Tor project was that if someone wants to
block all Tor exit relays, they should be able to do so.

> I'm pretty sure that a lot of the
> blacklist operators just scrape the public list of relays and then
> they end up in a lot of places where the customer is not even aware
> what is being blocked. This is painfully obvious to people running a
> non-exit relay from home, when trying to use IRC or other services.

And sorry but this is just a non-sequitur. "Clueless blocking of non-exit
relays is bad, therefore _EXIT_ relays should now start evading blocklists."

-- 
With respect,
Roman
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20140624/44a9a089/attachment.sig>


More information about the tor-talk mailing list