-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 I'd suggest the following:
Run an hourly job that gives you a list of tor relay IP addresses that actually allow exit traffic to *your* services. To achieve this you probably want to run a tor client to get an authoritative consensus. Then you can parse that data to produce the final IP address list for simple and fast offline lookups (simple IP address comparision). Exonerator is probably a good starting point that can be reused and modified to your needs without a lot of effort. https://gitweb.torproject.org/metrics-utils.git/tree/HEAD:/exonerator Example: https://metrics.torproject.org/exonerator.html?timestamp=2013-09-08&ip=50.7.161.218&targetaddr=74.125.136.108&targetport=587#exit -----BEGIN PGP SIGNATURE----- iF4EAREKAAYFAlIuBnsACgkQyM26BSNOM7Y3dwD/SAE5jOj/iTUBKklb9jplDMxU BC1Z6V2992L4vw2z5FUA/R34QNzHEuFJJTrdetyD01xgPDe7kAN6B+/Z3xXu3IaZ =gRbo -----END PGP SIGNATURE----- -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
