Personally, I run my tor node as transport only (non-exit).  I can't
risk opening myself up to illegal activities by running an exit node,
but I figure the least I can do is provide decent transport as the
middle-man, and let the people running exit nodes concern themselves
with the legality of the activity.

On Wed, Oct 29, 2008 at 3:52 PM, slush <[EMAIL PROTECTED]> wrote:
> Hi guys,
>
> Im talking with teachers about running tor node on my university. There is
> plenty of unused bandwidth, especially at night :-). But there are some
> arguments against tor, so Im trying to find some solutions.
>
> One of arguments was, that tor is used for downloading porn and p2p networks
> and university won't support that. Although I partially agree with that, I
> know that freedom of speak is main motivation for me and I will fight for
> Tor in university. So I found blacklists of pornsites and other stuff (for
> example http://urlblacklist.com/) and think, how I can implement blacklist
> to tor exit node.
>
> First solution is to use ExitPolicy. But there is probably limit of listed
> IP. I dont know any exact limitation, but because list of restricted IP is
> uploaded to directory servers, it cannot be a much. In blacklist are
> hundreds of restricted IPs.
>
> Second solution I found is to use transparent proxy and apply filters
> inside. In this solution, directory servers and tor users dont know, that
> there are some sites filtered and they can be confused. It is also not good
> idea, because any good tor scanner (soat or my one) will mark my exit node
> as bad exit.
>
> Is there any other solution of my problem? Any proposal? I know that
> filtering is not good idea at all, but I have only two possibility. No tor
> or filtered one. I vote for tor server with high bandwidth and some
> restrictions.
>
> Thanks,
> Marek
>

Reply via email to