-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Michael,
First of all thank you for running an exit. I run a large series of
exits in the Netherlands
(https://globe.torproject.org/#/search/query=Chandler&filters[country]=nl)
and I am a UK citizen. Having experienced many troubles, including
server
"Moritz Bartl"
À: tor-relays@lists.torproject.org
Envoyé: Dimanche 6 Juillet 2014 14:41:23
Objet: Re: [tor-relays] UK Exit Node
On 07/06/2014 09:39 AM, Michael Banks wrote:
The block lists are very limited, i.e P2P, lists of known
blackhats/paedophiles, unallocated IP ranges and most
It's a relay node now, so it should be fine, we'll see what happens.
Google 'pglcmd debian' - I've removed most of the lists. It's
essentially now only blocking known paedophiles/child porn related IPs -
funnily enough, it's blocked quite a few connections to those known
addresses.
The broadban
e you can focus on your hobbies and use
your computer/desktop as before.
Best regards,
Julien ROBIN
- Mail original -
De: "Moritz Bartl"
À: tor-relays@lists.torproject.org
Envoyé: Dimanche 6 Juillet 2014 14:41:23
Objet: Re: [tor-relays] UK Exit Node
On 07/06/2014 09:39 AM, M
On 07/06/2014 09:39 AM, Michael Banks wrote:
> The block lists are very limited, i.e P2P, lists of known
> blackhats/paedophiles, unallocated IP ranges and most importantly:
> government-owned address and anti-tor addresses
Please do not run PeerGuardian or any other blacklist. These lists are
pa
On Sun, 06 Jul 2014 06:06:35 +0100
Michael Banks wrote:
> running PeerGuardian on the server in question (blocking
> P2P/kiddyporn/hacking related IPs)
Thanks for notifying everyone, I hope your BadExit flag is already on its way.
--
With respect,
Roman
signature.asc
Description: PGP signat
On 2014-07-06 09:14, Michael Banks wrote:
> Advice taken
> I was debating to switch over to relay-only or not. I must note, the Tor
> node is on it's own address, under a residential contract.
Does not matter. You cannot prove that you did not routed your
connection over it or that it was or was n
On Sun, Jul 6, 2014 at 3:39 PM, Michael Banks wrote:
> The block lists are very limited, i.e P2P, lists of known
> blackhats/paedophiles, unallocated IP ranges and most importantly:
> government-owned address and anti-tor addresses
True, and I agree with your definition of malicious.
My concer
The block lists are very limited, i.e P2P, lists of known blackhats/paedophiles, unallocated IP ranges and most importantly: government-owned address and anti-tor addresses Original Message
On Sun, Jul 6, 2014 at 3:14 PM, Michael Banks wrote:
>
> I was taking extra precaution by running PeerGuardian and specifically
> blocking malicious IPs, and will continue to do so while I have a relay
> node.
If you are using PeerGuardian to filter Tor traffic, that is sub-optimal.
The main re
Advice taken
I was debating to switch over to relay-only or not. I must note, the Tor
node is on it's own address, under a residential contract.
I was taking extra precaution by running PeerGuardian and specifically
blocking malicious IPs, and will continue to do so while I have a relay
node.
I
On 2014-07-06 07:06, Michael Banks wrote:
> Any tips for UK Exit Node operators on a Residential ISP (BT)?
I would be EXTREMELY careful in running an exit on a residential location.
There is no way for you to prove that it was not you causing that
connection but the Tor process causing that conne
Any tips for UK Exit Node operators on a Residential ISP (BT)?
Running a reduced exit policy, informed various teams at the ISP,
running PeerGuardian on the server in question (blocking
P2P/kiddyporn/hacking related IPs), have a hostname setup
tor-relay.itschip.com, planning to leave the thing
13 matches
Mail list logo