Hello,

I've noticed that the non-publicly routable CGNAT subnet of 100.64.0.0/10 is 
not in the default exit policy reject list like 192.168/16 and 10/8 are.
This range is not publicly routed, and should never need to be accessed from a 
Tor exit. 


Tailscale and other ISPs use this block. 

How many exit relays connected to a Tailscale network are unknowingly exposing 
all of their other Tailscale devices to the Tor network? 

ISPs may be less willing to allow exit relays if there are bots using Tor to 
toy with the ISPs 100.64/10 range.

Maybe there is something I am missing for it to not be included?

Thanks,
Likogan.Dev

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to