On 5/13/13 7:21 PM, Arturo Filastò wrote:
On May 13, 2013, at 7:15 PM, David Fifield david@bamsoftware.com wrote:
Thank you for taking a look.
On Mon, May 13, 2013 at 08:58:27AM +0200, Karsten Loesing wrote:
I'm not sure, but Tor2web might do something similar. From Onionoo's project page: "Tor2web is a web proxy to Tor Hidden Services. It uses Onionoo to get the list of currently running Tor Exits to detect if the client is a Tor user and if so redirect them to the .onion address."
If I read this right, Tor2web is doing it not only for exits, but for all relays:
https://github.com/globaleaks/Tor2web-3.0/blob/c6e26b35e83fd897f9c4f9cb6787e...
Ah, you're right.
Yeah we are doing this because downloading all the exit lists is too much. If there was a better way to do this we would be very useful to us.
We only need the exit list, but we consider any relay as a possible exit. This means that stuff like a relay that exits through a different address will not be detected as coming from Tor (this is something torbel accounts for).
Hmm, can you be more specific? What feature are you missing, and would that be a feature in Onionoo or TorDNSEL/TorBEL?
Best, Karsten
These are the relevant tickets on the topic:
https://trac.torproject.org/projects/tor/ticket/6488
https://github.com/globaleaks/Tor2web-3.0/issues/10
https://github.com/globaleaks/Tor2web-3.0/issues/85
~ Art.
tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev