Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Tor ExitPolicy for things that can't be illegal
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Tor ExitPolicy for things that can't be illegal

4n0nx4n0nx Member
edited December 2014 in Help

Hello,

I was wondering if it would make sense to run a Tor exit node that allows outgoing connections only to very few ports that are almost impossible to get you in trouble.

For example: If I ran an exit node with ExitPolicy accept :53 and ExitPolicy reject *:everything

  1. would a user that happens to use my exit node be able to access only DNS servers and opening websites causes a timeout or

  2. would DNS requests go through my server and HTTP requests through a different exit node at the same time or

  3. would my server simply never be chosen as exit node, because no one only uses DNS?

If the answer is 2. then I would consider allowing any harmless port <1000, say 53 for DNS or 43 for whois.

https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy

Thanks. :)

Comments

  • You don't have to any services on standard ports nor do standard ports always run the corresponding services. It's a "standard" but you can run a http server on port 53 if you wanted. With that in mind, allowing certain ports won't prevent you from getting in trouble.

  • That is true, but how many people upload child pornography to HTTP/FTP servers running on Port 53?

  • Every port can be abused for something regardless.

    Leaving Port 53 open? Some guy will query DNS servers and DNS Reflect to DDoS yourself.

    Leaving Port 80 and 443 open? People will submit terrorist threats.

    Leaving Port 25 open? The Warez Scene is still a thing.

  • Ah, right. :( Ok then only 43 ;D

  • perennateperennate Member, Host Rep
    edited December 2014

    If you restrict the ports, you may block some abuse but you also block most of the legitimate users (who would be using 80 and 443). So there's not much point of running exit node with only port 43 open, although you can do it anyway if you want to for some reason. I doubt you'll get any abuse complaints (especially since it's reserved port, probably no one uses it for torrenting), but I suppose it's possible.

    Also port 53 won't be used for DNS reflection through Tor, they'd just do the DNS reflection directly. You can't cause an exit node to spoof outgoing UDP packet, Tor doesn't support UDP.

  • Simple: Don't run an exit node :)

    Thanked by 1gestiondbi
  • rm_rm_ IPv6 Advocate, Veteran
    edited December 2014

    I remember considering to allow only a set of "known good" IP ranges, e.g. let people access 80 and 443 to IPs which belong to Wikipedia, CNN, ThePirateBay, etc.

    But then I read something from the Tor devs, along the lines of, "exit nodes with very limited or weird exit policies will get very little exit traffic", i.e. much much less than you would expect based on your open ports or destination IPs, so it's not worth the trouble.

    Just run a non-exit relay, those are in great demand as well (just may take weeks or a month to ramp up to full throughput).

  • Yes, you can do port 443 and 80 only.

  • MaouniqueMaounique Host Rep, Veteran
    edited December 2014

    port 443 can be used for carding (had a lot of complaints), port 80... Dont need to tell you what can that be used for.
    I allow encrypted mail retrieval, various streaming protocols, encrypted mail sending (including imap) and that is about it. Never on a hosted service since many years, just at home, hosted relays only and/or freenet (if the host is afraid I will use the traffic I pay for and does not allow even relays).

  • Ok I guess that was a dumb idea. Thanks for all the thoughts/comments. :)

Sign In or Register to comment.