I'm new to running a relay. There are lots of exit policies when I look at my
atlas details:
https://atlas.torproject.org/#details/DDB401F4CA108C6F6AF4E0DCE2DFC3407F577B21
Is this a pretty good exit policy list to prevent harassment from my ISP?
Thanks!
-Jamie M.
> Putting the extensive exit
Putting the extensive exit restriction policy in the responses to take-down
demands seems like a good idea.
Robert
> Publication of sample exit policies? Would that encourage exit node
> operators
> to run restricted exit policies, and save themselves loads of bandwidth
> and
> DMCA headache?
On Friday 01 Nov 2013 14:39:28 Gordon Morehouse wrote:
> Completely aside from the ethical and censorship-related buzzsaw you're
> about to run into for posting this (perennial) question, I believe some
> actual developers on Tor have written a paper about the problems with
> Bittorrent et al (and
On Saturday 02 Nov 2013 17:10:50 Moritz Bartl wrote:
> As one of the large operators that indeed allows exiting on all ports
> except 25: This is on purpose. I don't consider applications that choose
> random ports as bad, I don't consider file sharing per se as bad. I
> don't want to interfere wi
>The question is, should I put in an adjustment for
>'MaxAdvertisedBandwidth' during the backup window
>or make any other change to advise remote relays to
>de-prioritize the node for the duration?
Another unanswered question now understood:
As a consequence of a simple parameter tweak,
Vidalia b
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Paritesh Boyeyoko:
> On Friday 01 Nov 2013 20:02:29 Gordon Morehouse wrote:
>
>>
>> What if someone inside a totalitarian state is attempting to
>> upload evidence of a massacre to a service which runs on port
>> 80?
>
> Yeah, I did think of this
On 11/02/2013 02:46 PM, Paritesh Boyeyoko wrote:
> I'm just finding it difficult to accept that there's little to be done. As
> far
> as I can see, the only way BitTorrent content distibution can work across Tor
> is because exits are allowing accept *:* as their exit policy - torrent
> client
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Paul Garrett Hugel:
> Please steer me to the correct list if off topic here
>
> Remote machine is Ubuntu obfsproxy bridge on amazon ec2 using ARM
>
> My local machine running 10.9 Mavericks with
> TorBrowser-Pluggable-Transports-2.4.17-beta-2-pt3-o
On Saturday 02 Nov 2013 13:21:39 Moritz Bartl wrote:
> On 11/02/2013 01:15 PM, Paritesh Boyeyoko wrote:
> > Publication of sample exit policies? Would that encourage exit node
> > operators to run restricted exit policies, and save themselves loads of
> > bandwidth and DMCA headache?
> > Is there
On 11/02/2013 01:15 PM, Paritesh Boyeyoko wrote:
> Publication of sample exit policies? Would that encourage exit node
> operators
> to run restricted exit policies, and save themselves loads of bandwidth and
> DMCA headache?
> Is there a forum where one can put up a sticky post with sample exi
On Friday 01 Nov 2013 20:02:29 Gordon Morehouse wrote:
>
> What if someone inside a totalitarian state is attempting to upload
> evidence of a massacre to a service which runs on port 80?
Yeah, I did think of this but I thought I'd put it out there anyway.
Unfortunately, too many sites/services
On 11/01/2013 07:22 PM, Nelson wrote:
> Please excuse my ignorance operating Tor relays, but if I run an exit
> node on Windows 7 and use something like Peerblock and correspoding
> block lists of P2P sites, wouldn't this be somewhat effective in
> stopping this sort of undesired traffic on Tor?
P
Please steer me to the correct list if off topic hereRemote machine is Ubuntu obfsproxy bridge on amazon ec2 using ARMMy local machine running 10.9 Mavericks with TorBrowser-Pluggable-Transports-2.4.17-beta-2-pt3-osx-i386I read the trouble ticket #10030https://trac.torproject.org/projects/tor/tick
Paritesh Boyeyoko:
> > On the other hand, i had a reduced exit policy and still got DMCA
> > complaints just for the .torrent file being downloaded via HTTP through
> > my exit.
>
> Let me run a couple ideas past you:
>
> 1. Configure Squid as a forward proxy with Squidguard and configure
> Squ
14 matches
Mail list logo