Port numbers might “limit” traffic when a service is using default ports. However I could configure SSH to run on port 80 without an issue.
Similarly, no matter what the port is, a malware author can use it to send malware out. Talk to your ISP about what Tor is and ask them to disable the virus filter on your account. Cordially, Nathaniel On Fri, Sep 7, 2018 at 3:09 AM Udo van den Heuvel <udo...@xs4all.nl> wrote: > Hello, > > In the past I opened up some 'innocent' exit ports and after a while my > ISP detected a Windows virus of some sorts from my IP('s). > So I went to relay only and that problem was fixed. > > Then I thought I was `smart` and opened just a few ports that (normally) > carry SSL-protected connections. > Same thing happened, the ISP detected some (other) virus activity after > a while. > > As I do not run Windows at all, these virus detections must come via the > tor exit ports. > > Is there a 'safe' choice in this that will not trigger virus activity? > Of course the normal SSL-protected traffic does not mean the virus will > do the same... > So what can I do besides run non-exit? > > Udo > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk