Hi,
We've just received some feedback from a Tor relay operator who accidentally
made their relay an exit for a short time.
Apparently this places them on the CloudFlare Tor list, and it's not clear if this
will ever change.
If there is no expiry, then there is a denial of service risk.
Anything that behaves like this will fill the list with entries:
* Start an Exit with an IPv4 address and get it on the CloudFlare list
* Move to the next IPv4 address
It doesn't even have to be malicious: home broadband routers and cheap
VPSs tend to behave like this when configured as Exits, as the load sometimes
causes them to crash.
Tim
Begin forwarded message:
Subject: Re: [tor-relays] Remove IP from list of known Tor exit nodes
Date: 3 March 2017 at 04:45:37 AEDT
So it wouldn't surprise me if Cloudflare won't unlist your IP on request
You are right. I have written some mails to support@cloudflare.com.According tohttps://support.cloudflare.com/hc/en-us/articles/203306930-Does-Cloudflare-block-torCloudflare updates its list of Tor exit node IP addresses every 15 minutes.But the reply I got from their support was:it's not listed on honeypot it is not based on any maliscous activity
but rather was a special list of TOR endpoints curated by the request
of our customers to control access to their sites. As such your
endpoint won't be removed from that as it is a TOR endpoint this is
completely independent of the reputation.
They have not registered any malicious activity from the IP and it isnot figuring on https://check.torproject.org/exit-addresses, but stillthey won't remove it from their list.
T
--
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------