Re: [tor-relays] Amazon abuse report

2013-11-02 Thread tor
I'm new to running a relay. There are lots of exit policies when I look at my atlas details: https://atlas.torproject.org/#details/DDB401F4CA108C6F6AF4E0DCE2DFC3407F577B21 Is this a pretty good exit policy list to prevent harassment from my ISP? Thanks! -Jamie M. > Putting the extensive exit

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread I
Putting the extensive exit restriction policy in the responses to take-down demands seems like a good idea. Robert > Publication of sample exit policies? Would that encourage exit node > operators > to run restricted exit policies, and save themselves loads of bandwidth > and > DMCA headache?

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread Paritesh Boyeyoko
On Friday 01 Nov 2013 14:39:28 Gordon Morehouse wrote: > Completely aside from the ethical and censorship-related buzzsaw you're > about to run into for posting this (perennial) question, I believe some > actual developers on Tor have written a paper about the problems with > Bittorrent et al (and

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread Paritesh Boyeyoko
On Saturday 02 Nov 2013 17:10:50 Moritz Bartl wrote: > As one of the large operators that indeed allows exiting on all ports > except 25: This is on purpose. I don't consider applications that choose > random ports as bad, I don't consider file sharing per se as bad. I > don't want to interfere wi

Re: [tor-relays] dynamically adjusting bandwidth

2013-11-02 Thread starlight . 2013q4
>The question is, should I put in an adjustment for >'MaxAdvertisedBandwidth' during the backup window >or make any other change to advise remote relays to >de-prioritize the node for the duration? Another unanswered question now understood: As a consequence of a simple parameter tweak, Vidalia b

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread Gordon Morehouse
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Paritesh Boyeyoko: > On Friday 01 Nov 2013 20:02:29 Gordon Morehouse wrote: > >> >> What if someone inside a totalitarian state is attempting to >> upload evidence of a massacre to a service which runs on port >> 80? > > Yeah, I did think of this

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread Moritz Bartl
On 11/02/2013 02:46 PM, Paritesh Boyeyoko wrote: > I'm just finding it difficult to accept that there's little to be done. As > far > as I can see, the only way BitTorrent content distibution can work across Tor > is because exits are allowing accept *:* as their exit policy - torrent > client

Re: [tor-relays] connecting to obfsproxy bridge from OSX10.9 and TorBrowser-Pluggable-Transports-2.4.17-beta-2-pt3-osx-i386

2013-11-02 Thread Gordon Morehouse
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Paul Garrett Hugel: > Please steer me to the correct list if off topic here > > Remote machine is Ubuntu obfsproxy bridge on amazon ec2 using ARM > > My local machine running 10.9 Mavericks with > TorBrowser-Pluggable-Transports-2.4.17-beta-2-pt3-o

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread Paritesh Boyeyoko
On Saturday 02 Nov 2013 13:21:39 Moritz Bartl wrote: > On 11/02/2013 01:15 PM, Paritesh Boyeyoko wrote: > > Publication of sample exit policies? Would that encourage exit node > > operators to run restricted exit policies, and save themselves loads of > > bandwidth and DMCA headache? > > Is there

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread Moritz Bartl
On 11/02/2013 01:15 PM, Paritesh Boyeyoko wrote: > Publication of sample exit policies? Would that encourage exit node > operators > to run restricted exit policies, and save themselves loads of bandwidth and > DMCA headache? > Is there a forum where one can put up a sticky post with sample exi

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread Paritesh Boyeyoko
On Friday 01 Nov 2013 20:02:29 Gordon Morehouse wrote: > > What if someone inside a totalitarian state is attempting to upload > evidence of a massacre to a service which runs on port 80? Yeah, I did think of this but I thought I'd put it out there anyway. Unfortunately, too many sites/services

[tor-relays] Blocking filesharing traffic (was: Re: Amazon abuse report)

2013-11-02 Thread Moritz Bartl
On 11/01/2013 07:22 PM, Nelson wrote: > Please excuse my ignorance operating Tor relays, but if I run an exit > node on Windows 7 and use something like Peerblock and correspoding > block lists of P2P sites, wouldn't this be somewhat effective in > stopping this sort of undesired traffic on Tor? P

[tor-relays] connecting to obfsproxy bridge from OSX10.9 and TorBrowser-Pluggable-Transports-2.4.17-beta-2-pt3-osx-i386

2013-11-02 Thread Paul Garrett Hugel
Please steer me to the correct list if off topic hereRemote machine is Ubuntu obfsproxy bridge on amazon ec2 using ARMMy local machine running 10.9 Mavericks with TorBrowser-Pluggable-Transports-2.4.17-beta-2-pt3-osx-i386I read the  trouble ticket #10030https://trac.torproject.org/projects/tor/tick

Re: [tor-relays] Amazon abuse report

2013-11-02 Thread Lunar
Paritesh Boyeyoko: > > On the other hand, i had a reduced exit policy and still got DMCA > > complaints just for the .torrent file being downloaded via HTTP through > > my exit. > > Let me run a couple ideas past you: > > 1. Configure Squid as a forward proxy with Squidguard and configure > Squ