-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 > It'd be better to find out why nodes that are exiting traffic don't > get marked as exits. Looking at that relay, it seems it doesn't > allow web traffic, but some ports are allowed. Perhaps the > suspicious sign-in in question wasn't a web signin?
Correct, it wasn't a web-signin. > What would be really useful not just for Google but I suppose the > entire internet community, would be a simple runnable tool that > would take a set of host/port-range pairs and identify any node > with a compatible exit policy. Then we could find any node that > could potentially exit traffic towards our servers. I started a thread for it here: https://lists.torproject.org/pipermail/tor-talk/2013-September/029992.html -----BEGIN PGP SIGNATURE----- iF4EAREKAAYFAlIuISUACgkQyM26BSNOM7YRgwD/dFFyu//j26Kb8HBW2tiX5xAW lZDVx4bPwbQVisZNddsBAKJB7qicFoJzuyGLF1fNFvLQORXDQPcQ6u0btSTqRmd+ =PSCl -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk