Hey all, Got a question here, I'm running an exit node from a home network that uses play station network, Facebook and a few other service. So my issue/question is why are these service getting blocked on my end? I'm assuming that my ip is getting blocked but wouldn't that mean that people using my exit node would be blocked to those websites as well? what can i do to resolve this issue? maybe I'm missing some technical aspect? thanks!
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2
mQINBFh10ZkBEAC3QTfDVUmKlKl5JNvy7kHulRj7nXYeYEywyXo5zsYsvWeCRYit WqwOr8PgGVO+jmXSxkXxjnGvXF7Kr1qZRHy/1hJxwFztlsgzkYzJOQYqB5Wpgxgf tpkZmY/uOzg61ppvSF8OKteal+jZnPEwGtGr6MNEc4WZecE99NA3tQ9kiqr0wHJE UstgiFv1DV4ju/nqCoaplVCy2LVdTq/IPXXJPozUYYM4U5S6qNPWgg8NKUUAPkkZ kJrgd2PD0qayU5HxO9lIHlwt1f9dp0iwXafXF4DkivMmpipoKB7e6eS+LYYTHQVz rmn+Goco7m34TsBua0ltjY5KDz7Nlts5bOFOYgCLrnpJJggACPetCr1NFQVbkaLb qpZ8hRkuJl5fKR/55lhLMSC7Bh85b4UQioS83ChyyY3dgNuXzss41/gn7sp0VUuA oQg+YYia3vWmOaBSXlQmM8ukw9QcMiVje4qlUaZjsCcNKwRCEX6YvcY1X8Yzm6uv yycPvroTIiJE1YZOVRj2oGSqNftZWtTnebVEveIezF/tX7Tadf6xq6kaQdUZzbAv tX+O/jOTGfo/8XECXPrLiPXlwY3ZrloXMr1QSBJQxZoCkfuDsi9Lek3SvWmxrQuM 0q66bk4k7LrO7e0lNueLSmna4OZFih/FUFwAq+bH6SciF9eOxm6NOPrnXwARAQAB tC9mcmVkYSAoc3RyZW5ndGggaW4gbnVtYmVycykgPEZyZWRhQHNpZ2FpbnQub3Jn PokCNwQTAQgAIQUCWHXRmQIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDi hi2oPd1kcz6hEACyDgzf+L0OpB9Znsx7EEt8N1/zGyzGQoL/MQVsxMiJl/J3f7zV p7EJ3u4PGlETZAHFc2mVWc9FZndPgJIHS491g8sglJqPLhe7c+GjbACCGeb8XtQr kMTkFl2xcM0fv6XQTkRoGlQrnVMlB35DbFgjk7You3X1eAH3ZYe1NzsSaek9qeol OqKSa/J2mNiwKtaSW/NY5cD2cScuu4pqVwNb6Ya1OamvrCobRvi9rnnwGT148rpe I9hDrK2q5n5sz3rzWi7IT0Yv3ao0JkjAZHGuHeLvJLzv3R29RleTITd728LEWbxk xVTvcgl4u7lrZuqmhcaB2xDYvHDLx2PKyDxRSW3R/oahTCMVm1gjYnIB+L1aHPMZ ulxpKK0rylp2sNGgG8Kr/aasDENNgoxo76+qvVixIJWXovJruvlCMHeyySE9Tn14 rOoQICuOaEiMkUqpnEWqyOEJQs2Ky8AeRiQLAj+Il3Ed0fG0qHxosuWm/EAztKWH 329XAaaILDMeqp5Y4niBRq3at7QKb3LABpDI8/wqn9n4y7koaLQGpwGQRkbJszgh JqGJ3Bwh4B4Absze4gzvCYyh3mt7dwgo6zvG1PJ8x1I/D+TtUkUdQBojXf5YteUY OTN9IPjXaBlm9hbO2D0fXWdaz9QJEh3nSSqWd9/FU9w+6ACZz8ZeJivRtrkCDQRY ddGZARAA3o4NQV87nvPVbPp8NzPqQoRt+TdDVzcq10fHHAs2vIlgNPqQmMLiw/a6 Nsx4oFXuaCdyvQ6QsWKTOH33Ui0q+SrCdr5vVUQT6OJgMt4dqWv39zSXZeDFuy9U bmsd1ym7MGcRgDrvMHYdiz7AP3C1zmaCrjB8yV4oARVwKOafD5VznJOtX17c08M8 x+EQzypwgGer0vT3OzeTbHqWd491IOfdD0ejbapTLkOMPblPriOwtkh+lcC9QXD+ cb7Y+/79KjEXFTXr97R66AXmlkeWSnqWqZbTWrwp5nn5OpkgnpXqSVynIafAwePg KZCsVSCwMeo4aguj8znyUCd60lbc/WPhXnjmYXBHYXsUf4OMCa8P/yBkiC6jyYA/ zHKeJZgR2Nlu945flszQjc115tVo1dWqdxmB3cq9TBVu+6Npzgz28TD/I6NUekyE Gv/ESwbI3b7vbW/dBDiL6r8aGYFTvW+EmfCajOjZHT93hiz83JIpHOrIhibnGiMA bja8Lk6s3WZ5LmA03T2PhKj3Mo0Rx8FXl/+7GU8H3mYHJwpHSSoBuvswDOH6SQVB Yb+ckBzloiQ+cccIWuDItskc0Jeq1MB+FPgCfscT5B5545euT8Sq0aNHs4D5gRey 1e0X8eCAXZsyuuXpnOL8+8ty3WjwMmR8mgtjL4wXxP3CXPnvYFkAEQEAAYkCHwQY AQgACQUCWHXRmQIbDAAKCRDihi2oPd1kc22EEACwfwplUbvVtflOh2MiOUWnXGHO xTff7RjITk0NpK/a4bPTKOWdWKenTePSy8UCYIUK2u8dH6RrAq7L/OpoysltvJi3 ktKpkjr5mpXtywd0HKOEWoHrIj+Z2ZDubDVe9/cPYBuZdzaqxQ+P+Dc3NNh53RCf iXxbftk1D86jjfKoBj1aGPEPUSQHpW1Iw/Kh5E+dKN02oALjUudyjfv2byJ+niqO qbkHgIuUsOTWaWKwgMqgTbjW4NeMj+7DJcskM8NUnBLjiT+WG1wW8Teom/PakD32 ZFt5bIO7xVE4NP9wiFxH/dlXuxQLyg0TON2xUrBtN+/LRGJVQvl6iglmf1KxAkv9 maSGBFXtZY5tyA2UBwFJZ2D6XjeaVdFfIfa5rcUY3PTwt8kECivr5AHN3qrz3wuS QkHb/HQm7SeMZs3h02VEfHhmGxv98TwRF1rSCXRBORLDnY7Bh5WTdaR9CoDTU0aw Bvo4vHH8EODU7bJwfCuaCprzIP/Vbl+PYxU5W180pd/XaQXk9XERcn86b9n9q4Ea 9+CqXIRGal/DLBZRjmq8xN33dHfMnbP+N2ik09Zz0zdZHVsCQRK3xFFIwK9OpFdx Xa/drJTa58B7rogm4DBXgI63hjDZN+FZTpxRpKWHstfStVYQk8Kfu2hir1e6FF2s /Ijrx6DPmuYb/0e0Kg===Fv5C -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2
mQINBFh10ZkBEAC3QTfDVUmKlKl5JNvy7kHulRj7nXYeYEywyXo5zsYsvWeCRYit WqwOr8PgGVO+jmXSxkXxjnGvXF7Kr1qZRHy/1hJxwFztlsgzkYzJOQYqB5Wpgxgf tpkZmY/uOzg61ppvSF8OKteal+jZnPEwGtGr6MNEc4WZecE99NA3tQ9kiqr0wHJE UstgiFv1DV4ju/nqCoaplVCy2LVdTq/IPXXJPozUYYM4U5S6qNPWgg8NKUUAPkkZ kJrgd2PD0qayU5HxO9lIHlwt1f9dp0iwXafXF4DkivMmpipoKB7e6eS+LYYTHQVz rmn+Goco7m34TsBua0ltjY5KDz7Nlts5bOFOYgCLrnpJJggACPetCr1NFQVbkaLb qpZ8hRkuJl5fKR/55lhLMSC7Bh85b4UQioS83ChyyY3dgNuXzss41/gn7sp0VUuA oQg+YYia3vWmOaBSXlQmM8ukw9QcMiVje4qlUaZjsCcNKwRCEX6YvcY1X8Yzm6uv yycPvroTIiJE1YZOVRj2oGSqNftZWtTnebVEveIezF/tX7Tadf6xq6kaQdUZzbAv tX+O/jOTGfo/8XECXPrLiPXlwY3ZrloXMr1QSBJQxZoCkfuDsi9Lek3SvWmxrQuM 0q66bk4k7LrO7e0lNueLSmna4OZFih/FUFwAq+bH6SciF9eOxm6NOPrnXwARAQAB tC9mcmVkYSAoc3RyZW5ndGggaW4gbnVtYmVycykgPEZyZWRhQHNpZ2FpbnQub3Jn PokCNwQTAQgAIQUCWHXRmQIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDi hi2oPd1kcz6hEACyDgzf+L0OpB9Znsx7EEt8N1/zGyzGQoL/MQVsxMiJl/J3f7zV p7EJ3u4PGlETZAHFc2mVWc9FZndPgJIHS491g8sglJqPLhe7c+GjbACCGeb8XtQr kMTkFl2xcM0fv6XQTkRoGlQrnVMlB35DbFgjk7You3X1eAH3ZYe1NzsSaek9qeol OqKSa/J2mNiwKtaSW/NY5cD2cScuu4pqVwNb6Ya1OamvrCobRvi9rnnwGT148rpe I9hDrK2q5n5sz3rzWi7IT0Yv3ao0JkjAZHGuHeLvJLzv3R29RleTITd728LEWbxk xVTvcgl4u7lrZuqmhcaB2xDYvHDLx2PKyDxRSW3R/oahTCMVm1gjYnIB+L1aHPMZ ulxpKK0rylp2sNGgG8Kr/aasDENNgoxo76+qvVixIJWXovJruvlCMHeyySE9Tn14 rOoQICuOaEiMkUqpnEWqyOEJQs2Ky8AeRiQLAj+Il3Ed0fG0qHxosuWm/EAztKWH 329XAaaILDMeqp5Y4niBRq3at7QKb3LABpDI8/wqn9n4y7koaLQGpwGQRkbJszgh JqGJ3Bwh4B4Absze4gzvCYyh3mt7dwgo6zvG1PJ8x1I/D+TtUkUdQBojXf5YteUY OTN9IPjXaBlm9hbO2D0fXWdaz9QJEh3nSSqWd9/FU9w+6ACZz8ZeJivRtrkCDQRY ddGZARAA3o4NQV87nvPVbPp8NzPqQoRt+TdDVzcq10fHHAs2vIlgNPqQmMLiw/a6 Nsx4oFXuaCdyvQ6QsWKTOH33Ui0q+SrCdr5vVUQT6OJgMt4dqWv39zSXZeDFuy9U bmsd1ym7MGcRgDrvMHYdiz7AP3C1zmaCrjB8yV4oARVwKOafD5VznJOtX17c08M8 x+EQzypwgGer0vT3OzeTbHqWd491IOfdD0ejbapTLkOMPblPriOwtkh+lcC9QXD+ cb7Y+/79KjEXFTXr97R66AXmlkeWSnqWqZbTWrwp5nn5OpkgnpXqSVynIafAwePg KZCsVSCwMeo4aguj8znyUCd60lbc/WPhXnjmYXBHYXsUf4OMCa8P/yBkiC6jyYA/ zHKeJZgR2Nlu945flszQjc115tVo1dWqdxmB3cq9TBVu+6Npzgz28TD/I6NUekyE Gv/ESwbI3b7vbW/dBDiL6r8aGYFTvW+EmfCajOjZHT93hiz83JIpHOrIhibnGiMA bja8Lk6s3WZ5LmA03T2PhKj3Mo0Rx8FXl/+7GU8H3mYHJwpHSSoBuvswDOH6SQVB Yb+ckBzloiQ+cccIWuDItskc0Jeq1MB+FPgCfscT5B5545euT8Sq0aNHs4D5gRey 1e0X8eCAXZsyuuXpnOL8+8ty3WjwMmR8mgtjL4wXxP3CXPnvYFkAEQEAAYkCHwQY AQgACQUCWHXRmQIbDAAKCRDihi2oPd1kc22EEACwfwplUbvVtflOh2MiOUWnXGHO xTff7RjITk0NpK/a4bPTKOWdWKenTePSy8UCYIUK2u8dH6RrAq7L/OpoysltvJi3 ktKpkjr5mpXtywd0HKOEWoHrIj+Z2ZDubDVe9/cPYBuZdzaqxQ+P+Dc3NNh53RCf iXxbftk1D86jjfKoBj1aGPEPUSQHpW1Iw/Kh5E+dKN02oALjUudyjfv2byJ+niqO qbkHgIuUsOTWaWKwgMqgTbjW4NeMj+7DJcskM8NUnBLjiT+WG1wW8Teom/PakD32 ZFt5bIO7xVE4NP9wiFxH/dlXuxQLyg0TON2xUrBtN+/LRGJVQvl6iglmf1KxAkv9 maSGBFXtZY5tyA2UBwFJZ2D6XjeaVdFfIfa5rcUY3PTwt8kECivr5AHN3qrz3wuS QkHb/HQm7SeMZs3h02VEfHhmGxv98TwRF1rSCXRBORLDnY7Bh5WTdaR9CoDTU0aw Bvo4vHH8EODU7bJwfCuaCprzIP/Vbl+PYxU5W180pd/XaQXk9XERcn86b9n9q4Ea 9+CqXIRGal/DLBZRjmq8xN33dHfMnbP+N2ik09Zz0zdZHVsCQRK3xFFIwK9OpFdx Xa/drJTa58B7rogm4DBXgI63hjDZN+FZTpxRpKWHstfStVYQk8Kfu2hir1e6FF2s /Ijrx6DPmuYb/0e0Kg===Fv5C -----END PGP PUBLIC KEY BLOCK-----
See tips 1 and 2 here: https://blog.torproject.org/blog/tips-running-exit-node
"Get a separate IP for the node. Do not route your own traffic via this IP."
"In general, running an exit node from your home Internet connection is not recommended."
--
To answer your specific questions:
why are these service getting blocked on my end?
The IP addresses of all nodes on the Tor network are publicly available, and they tend to wind up in various blacklists.
wouldn't that mean that people using my exit node would be blocked to those websites as well?
Yes, unfortunately that's a real problem for Tor users. Sometimes we get captcha'd and other times we just get blocked.
An exit node at home is funny. Last year I've got visitors from law enforcement early in the morning. Now I have some new "friends" from the police department.
Be warned! They take a look on bad movies and assume you are the one...
Now I have my servers outside and at home a middle node only.
Olaf
On 16.01.2017 06:29, anondroid wrote:
See tips 1 and 2 here: https://blog.torproject.org/blog/tips-running-exit-node
"Get a separate IP for the node. Do not route your own traffic via this IP."
"In general, running an exit node from your home Internet connection is not recommended."
--
To answer your specific questions:
why are these service getting blocked on my end?
The IP addresses of all nodes on the Tor network are publicly available, and they tend to wind up in various blacklists.
wouldn't that mean that people using my exit node would be blocked to those websites as well?
Yes, unfortunately that's a real problem for Tor users. Sometimes we get captcha'd and other times we just get blocked.
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Olaf Grimm:
An exit node at home is funny. Last year I've got visitors from law enforcement early in the morning. Now I have some new "friends" from the police department.
Be warned! They take a look on bad movies and assume you are the one...
Now I have my servers outside and at home a middle node only.
:)
Yes... in the 'old days' marketing departments thought that Tor exit IPs appearing in their webalizer or awstats was just some exotic visitors.
Then more savvy admins at large firms realized they could block Tor exit IPs... then later all public Tor IPs. The delusion that blocking all Tor traffic somehow mitigates not patching software or maintaining a sane secure infrastructure seems to carry a lot of weight.
I'd give a +1 to the standard that you don't run a public Tor IP from a residence... in one case several years ago, a Tor advocacy-geared presentation I gave meant that a user or two lost access to their online banking account. Oh, details, details.
OTOH, running a bridge from home should be a principle if you have the bandwidth and hardware. To run a bridge from home should be strongly encouraged for anyone capable of doing so. And it doesn't take a lot of effort to run a few more bridges with trusted friends and families.
Residential bridges can play a critical role in diversifying the Tor network, and can mitigate much of the censorship we're seeing today.
g
On 01/16/2017 11:49 AM, Olaf Grimm wrote:
An exit node at home is funny. Last year I've got visitors from law enforcement early in the morning. Now I have some new "friends" from the police department.
Be warned! They take a look on bad movies and assume you are the one...
Now I have my servers outside and at home a middle node only.
This is best practice. And even under a proposed corporate aegis (LLC, nonprofit hackerspace, etc.) CP always comes up and the pearl clutching commences. FBI raids, PR, yadda-yadda-yadda... You have no ethical or criminal liability for criminal usage of the network, but that said you really need to be loaded for bear to run an exit node.
On 01/16/2017 11:08 PM, Kenneth Freeman wrote:
On 01/16/2017 11:49 AM, Olaf Grimm wrote:
An exit node at home is funny. Last year I've got visitors from law enforcement early in the morning. Now I have some new "friends" from the police department.
Be warned! They take a look on bad movies and assume you are the one...
Now I have my servers outside and at home a middle node only.
This is best practice. And even under a proposed corporate aegis (LLC, nonprofit hackerspace, etc.) CP always comes up and the pearl clutching commences. FBI raids, PR, yadda-yadda-yadda... You have no ethical or criminal liability for criminal usage of the network, but that said you really need to be loaded for bear to run an exit node.
Or you need adequate anonymity, and be willing to lose sunk cost.
On Mon, Jan 16, 2017 at 11:49:46PM -0700, Mirimir wrote:
Or you need adequate anonymity, and be willing to lose sunk cost.
I think trying to run exit relays with anonymity, and with plans to discard them as needed, is a poor plan long-term. In the struggle for what the Internet can become, we need to be public and clear about who we are and why privacy is important for everybody.
(Yes, that looks like a contradiction, but I claim it isn't: privacy is about giving people choices, and to win this conflict we need some people who will make the choice to step up and be public and build relationships.)
This "slash and burn agriculture" approach to running Tor relays, where you set up an exit relay, and if anybody gets angry you move on to another ISP, is really appealing since it's simple, but it assumes the Internet is infinite. If in fact we're destroying land without regard to sustainability, and we run out of land...
The Internet is smaller and more centralized than we think, and we need the people who run it to see us as a worthwhile positive and contributing community.
For previous versions of this thread, see https://lists.torproject.org/pipermail/tor-relays/2013-November/003240.html https://lists.torproject.org/pipermail/tor-talk/2015-May/037991.html
Thanks! --Roger
I agree with you here. This is a mission, a partnership amongst all perticipants, even negotiated and discovered as such, to good ends and via good means, amongst similar, or amenable participants, with backbone, and with high principles.
Yes toppost, shootme.
On Tue, Jan 17, 2017 at 2:00 AM, Roger Dingledine arma@mit.edu wrote:
On Mon, Jan 16, 2017 at 11:49:46PM -0700, Mirimir wrote:
Or you need adequate anonymity, and be willing to lose sunk cost.
I think trying to run exit relays with anonymity, and with plans to discard them as needed, is a poor plan long-term. In the struggle for what the Internet can become, we need to be public and clear about who we are and why privacy is important for everybody.
(Yes, that looks like a contradiction, but I claim it isn't: privacy is about giving people choices, and to win this conflict we need some people who will make the choice to step up and be public and build relationships.)
This "slash and burn agriculture" approach to running Tor relays, where you set up an exit relay, and if anybody gets angry you move on to another ISP, is really appealing since it's simple, but it assumes the Internet is infinite. If in fact we're destroying land without regard to sustainability, and we run out of land...
The Internet is smaller and more centralized than we think, and we need the people who run it to see us as a worthwhile positive and contributing community.
For previous versions of this thread, see https://lists.torproject.org/pipermail/tor-relays/2013-November/003240.html https://lists.torproject.org/pipermail/tor-talk/2015-May/037991.html
Thanks! --Roger
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 01/17/2017 12:00 AM, Roger Dingledine wrote:
On Mon, Jan 16, 2017 at 11:49:46PM -0700, Mirimir wrote:
Or you need adequate anonymity, and be willing to lose sunk cost.
I think trying to run exit relays with anonymity, and with plans to discard them as needed, is a poor plan long-term. In the struggle for what the Internet can become, we need to be public and clear about who we are and why privacy is important for everybody.
(Yes, that looks like a contradiction, but I claim it isn't: privacy is about giving people choices, and to win this conflict we need some people who will make the choice to step up and be public and build relationships.)
I'm happy to step up, and build relationships. To deal with complaints. But I do that anonymously.
This "slash and burn agriculture" approach to running Tor relays, where you set up an exit relay, and if anybody gets angry you move on to another ISP, is really appealing since it's simple, but it assumes the Internet is infinite. If in fact we're destroying land without regard to sustainability, and we run out of land...
Well, Tor is running out of land, based on my reading of this list, over the past few years. Fewer and fewer providers allow exits :(
But hey, I defer to your experience.
The Internet is smaller and more centralized than we think, and we need the people who run it to see us as a worthwhile positive and contributing community.
Maybe so. And yet, that's definitely not the approach taken re China etc. I don't deny the distinction between China etc and ISPs generally. But that could change. Time will tell.
For previous versions of this thread, see https://lists.torproject.org/pipermail/tor-relays/2013-November/003240.html https://lists.torproject.org/pipermail/tor-talk/2015-May/037991.html
Thanks! --Roger
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 01/17/2017 12:00 AM, Roger Dingledine wrote:
On Mon, Jan 16, 2017 at 11:49:46PM -0700, Mirimir wrote:
Or you need adequate anonymity, and be willing to lose sunk cost.
I think trying to run exit relays with anonymity, and with plans to discard them as needed, is a poor plan long-term. In the struggle for what the Internet can become, we need to be public and clear about who we are and why privacy is important for everybody.
I concur. Curiously, there has to be a public face and public venues for anonymity as a service.
(Yes, that looks like a contradiction, but I claim it isn't: privacy is about giving people choices, and to win this conflict we need some people who will make the choice to step up and be public and build relationships.)
A local makerspace was already planning on setting up a separate hackerspace as is own legal entity for purposes of compartmentalization when I introduced them to Tor.
This "slash and burn agriculture" approach to running Tor relays, where you set up an exit relay, and if anybody gets angry you move on to another ISP, is really appealing since it's simple, but it assumes the Internet is infinite. If in fact we're destroying land without regard to sustainability, and we run out of land...
The trick, as I understand it, is to preclude the ISP from any legal exposure or overhead whatsoever.
The Internet is smaller and more centralized than we think, and we need the people who run it to see us as a worthwhile positive and contributing community.
I couldn't agree more.
On Tue, Jan 17, 2017 at 1:08 AM, Kenneth Freeman kencf0618@riseup.net wrote:
On 01/16/2017 11:49 AM, Olaf Grimm wrote:
Now I have my servers outside and at home a middle node only.
This is best practice. And even under a proposed corporate aegis (LLC, you really need to be loaded for bear to run an exit node.
This is not so much a thing, as you really need to have the right message for that which is worth supporting. That freedom to make and support speech and debate ideas is paramount. And one should be educated and cognizant to dispel any such preposterous things that may be spoken. Without that you are doomed to the arbitrary and authoritarian concourse of history.
tor-relays@lists.torproject.org