Bitcoin Forum
April 24, 2024, 05:00:25 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: PMs and TOR - Dear mods, is it possible to whitelist me for TOR use?  (Read 1847 times)
passerby (OP)
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
June 16, 2011, 08:31:39 AM
 #1

Hello dear moderators!

I see people using TOR and I2P are banned from using PM functions.

However, I would rather like to use it for legitimate purposes. Protection offered by banning TOR against people who use to PM viruses and spam is meager at best.

Can you allow users to utilize TOR on a user-by-user basis and whitelist those who do not misbehave (specifically, whitelist me for TOR usage Smiley )?

Thank you for your kind understanding.
"In a nutshell, the network works like a distributed timestamp server, stamping the first transaction to spend a coin. It takes advantage of the nature of information being easy to spread but hard to stifle." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713934825
Hero Member
*
Offline Offline

Posts: 1713934825

View Profile Personal Message (Offline)

Ignore
1713934825
Reply with quote  #2

1713934825
Report to moderator
wumpus
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1022

No Maps for These Territories


View Profile
June 16, 2011, 08:36:18 AM
 #2

Yes please. I'm using TOR as well, found it pretty strange that as an established user I still get the restrictions.

Why not just disable signup of new accounts through TOR?


Bitcoin Core developer [PGP] Warning: For most, coin loss is a larger risk than coin theft. A disk can die any time. Regularly back up your wallet through FileBackup Wallet to an external storage or the (encrypted!) cloud. Use a separate offline wallet for storing larger amounts.
coinonymous
Newbie
*
Offline Offline

Activity: 32
Merit: 0



View Profile WWW
June 16, 2011, 09:03:42 AM
 #3

aol that, me too.
coinonymous
Newbie
*
Offline Offline

Activity: 32
Merit: 0



View Profile WWW
June 16, 2011, 09:06:05 AM
 #4

Yes please. I'm using TOR as well, found it pretty strange that as an established user I still get the restrictions.

Why not just disable signup of new accounts through TOR?

I hope this is intended as a reductio and not a serious suggestion?
wumpus
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1022

No Maps for These Territories


View Profile
June 16, 2011, 09:52:30 AM
Last edit: June 16, 2011, 10:27:09 AM by John Smith
 #5

I hope this is intended as a reductio and not a serious suggestion?
Freenode has the same policy, that's why I suggested that.

It basically boils down to: for creation of the user you need to connect outside of tor, or ask someone to do it for you (for a bitcoin payment of course Tongue). After that you can use tor to connect.

Bitcoin Core developer [PGP] Warning: For most, coin loss is a larger risk than coin theft. A disk can die any time. Regularly back up your wallet through FileBackup Wallet to an external storage or the (encrypted!) cloud. Use a separate offline wallet for storing larger amounts.
theymos
Administrator
Legendary
*
Offline Offline

Activity: 5180
Merit: 12880


View Profile
June 16, 2011, 01:19:47 PM
 #6

SMF doesn't support adding exceptions, unfortunately.

I only blocked one exit node (the largest one, blutmagie). It's funny how many people use that one exit node. People complain about Bitcoin being too centralized...

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
lemonginger
Full Member
***
Offline Offline

Activity: 210
Merit: 100


firstbits: 121vnq


View Profile
June 16, 2011, 02:37:56 PM
 #7

My hope is that BTC adoption will drive Tor use to make it less centralized.

And also educate people that using Tor can be a large security vulnerability in and of itself with exit node packet sniffers, MITM attacks, etc etc
passerby (OP)
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
June 16, 2011, 02:44:03 PM
 #8

SMF doesn't support adding exceptions, unfortunately.

I only blocked one exit node (the largest one, blutmagie). It's funny how many people use that one exit node. People complain about Bitcoin being too centralized...

Okay, will just make sure I'm not exiting through it when sending PMs...

P.S.:
From where I am, blutmagie is a fairly decent node, high performance and in a far away jurisdiction.
EhVedadoOAnonimato
Hero Member
*****
Offline Offline

Activity: 630
Merit: 500



View Profile
June 19, 2011, 07:09:03 PM
 #9

SMF doesn't support adding exceptions, unfortunately.

I only blocked one exit node (the largest one, blutmagie). It's funny how many people use that one exit node. People complain about Bitcoin being too centralized...

And apparently this restriction has just been extended to posts as well... I just got a red message blocking me from posting with an "open proxy", a few minutes after having done it successfully. (that made me lose a post that took me a few minutes to write, search for references and all. Sad )

I've removed blutmagie from my exit-nodes and it works. (btw, is it possible to remove it only when accessing forum.bitcoin.org?)

Now, I must ask: isn't it too harsh to block posts? I mean, the newbie restriction is already enough to protect other boards... I don't see a need to ban Tor, which is used by so many legitimate participants of the bitcoin forum.
theymos
Administrator
Legendary
*
Offline Offline

Activity: 5180
Merit: 12880


View Profile
June 19, 2011, 08:11:55 PM
 #10

It always applied to posts.

Tor changes your exit node every 10 minutes, so you just stumbled onto a banned one. Several are banned, and more will be added as they are abused.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
EhVedadoOAnonimato
Hero Member
*****
Offline Offline

Activity: 630
Merit: 500



View Profile
June 19, 2011, 08:49:14 PM
 #11

Why?

This is radical... can't such restriction be applied to newbies only? Filter by IP like this will inevitably block legitimate users.
theymos
Administrator
Legendary
*
Offline Offline

Activity: 5180
Merit: 12880


View Profile
June 19, 2011, 10:58:37 PM
 #12

This is radical... can't such restriction be applied to newbies only?

Like I said, SMF doesn't support this. If someone wants to contribute code that would exempt certain membergroups from certain bans, I will use it.

1NXYoJ5xU91Jp83XfVMHwwTUyZFK64BoAD
EhVedadoOAnonimato
Hero Member
*****
Offline Offline

Activity: 630
Merit: 500



View Profile
June 20, 2011, 08:45:27 PM
 #13

Theymos, what I meant is if the newbies restriction (5 posts + 4 hours) isn't already enough to at least contain the abuse to the Newbies boards? I suppose spammers won't pay the cost of 4 hours logged in just to post one spam... will they?

It would be a pitty if all Tor proxies get banned here...
wumpus
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1022

No Maps for These Territories


View Profile
June 22, 2011, 07:11:49 PM
 #14

And also educate people that using Tor can be a large security vulnerability in and of itself with exit node packet sniffers, MITM attacks, etc etc
Yes, if you use Tor you should really not be using any non-https sites, at least not those with user credentials. Luckily this forum supports https.

Bitcoin Core developer [PGP] Warning: For most, coin loss is a larger risk than coin theft. A disk can die any time. Regularly back up your wallet through FileBackup Wallet to an external storage or the (encrypted!) cloud. Use a separate offline wallet for storing larger amounts.
Quetzalcoatl_
Newbie
*
Offline Offline

Activity: 26
Merit: 0


View Profile
June 25, 2011, 05:45:08 AM
 #15

Yes please. I'm using TOR as well, found it pretty strange that as an established user I still get the restrictions.

Why not just disable signup of new accounts through TOR?



If they already have your real IP address, why bother with TOR?
wumpus
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1022

No Maps for These Territories


View Profile
June 25, 2011, 10:41:03 AM
 #16

Be a little more creative. As I said above, you could for example pay someone to make an account for you.

Bitcoin Core developer [PGP] Warning: For most, coin loss is a larger risk than coin theft. A disk can die any time. Regularly back up your wallet through FileBackup Wallet to an external storage or the (encrypted!) cloud. Use a separate offline wallet for storing larger amounts.
EhVedadoOAnonimato
Hero Member
*****
Offline Offline

Activity: 630
Merit: 500



View Profile
June 25, 2011, 01:58:54 PM
 #17

Theymos, what I meant is if the newbies restriction (5 posts + 4 hours) isn't already enough to at least contain the abuse to the Newbies boards? I suppose spammers won't pay the cost of 4 hours logged in just to post one spam... will they?

It would be a pitty if all Tor proxies get banned here...

No answer regarding this? It's getting harder and harder to post... Sad
coinonymous
Newbie
*
Offline Offline

Activity: 32
Merit: 0



View Profile WWW
June 27, 2011, 09:14:31 AM
 #18

I only blocked one exit node (the largest one, blutmagie).
I've removed blutmagie from my exit-nodes and it works.

I've also done this, but it does not always work.  Since I have no reason to suspect theymos is fibbing, I guess there must be a high enough correlation between IP's that have been banned due to actual abuse and IP's that are tor-exits or intermittent exits.

I can't really expect the forum not to block IP's that are repeat abusers so I don't have any brilliant ideas.

__
-?

...

lol, just kidding, whose post do you think you are reading?  Of course I have a brilliant idea Wink

If you have root, there is a fairly clean, surgical solution to this problem.  Instead of banning the IP's in the forum software, ban them in iptables (or in whatever network-level tcp filtering is available in the server's operating-system).

This way, tor will discover the blockage and route to an exit node that works*.  Even if this fails, at least the connection will appear to time out or fail.  This is vastly preferable to accepting the user's http request but allowing the forum software to do mean things to the user.  Note that the most annoying thing about being blocked in this way occurs when the user constructs an elaborate post, hits the "post" button, and then has their post rejected by the forum software.  Once the post is blocked, you can't just press the back button to get it back, it's gone.  Worse, even if you were smart enough to save your post to the clipboard, and try to repost, the forum software will still reject your post as a duplicate if you use the back button (presumably because it is using a hidden html form input element to keep track of posts and prevent dupes).

* note: I am making an assumption here.  I briefly tried to find confirmation that tor actually does include some support for learning not to route requests to an exit node whose exit policy permits exit to a certain <address,port> tuple, but which is in fact prevented from successfully connecting by something without tor (i.e.: packet filtering, great firewall of china, mis-configured routing table, etc).  Although I couldn't find a completely solid confirmation of this, I did find some evidence that I'm right.  Given the goals of the tor project I really hope my assumption is correct but I admit I'm not sure.

Better yet, just stop blocking blutmagie!  What is the point of blocking one tor exits and not all!?  You just make access easy for the bad guys and difficult for the good guys!!
error
Hero Member
*****
Offline Offline

Activity: 588
Merit: 500



View Profile
June 27, 2011, 04:46:15 PM
 #19

Tor recreates its circuits every 10 minutes or so. (Unless they're being held open by a long-running connection, of course.)

3KzNGwzRZ6SimWuFAgh4TnXzHpruHMZmV8
Xenland
Legendary
*
Offline Offline

Activity: 980
Merit: 1003


I'm not just any shaman, I'm a Sha256man


View Profile
August 20, 2011, 08:12:07 PM
 #20

Connect to "Hide my ass" through a tor node Tongue
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!