Lists of VPN exit addresses?
Does anyone keep lists of the exit addresses of public VPN services? I presume there is no need to explain why this would be of interest. R's, John
On 10 Jun 2015, at 18:56, John Levine wrote:
I presume there is no need to explain why this would be of interest.
To keep consumers who've legitimately purchased/rented/subscribed to content from accessing same when they travel internationally? Because as a regular international traveler, that's what springs to mind when I see requests like this. Another thought is governmentally-driven censorship, something else I encounter a lot in my travels. ----------------------------------- Roland Dobbins <rdobbins@arbor.net>
On Jun 10, 2015, at 8:08 AM, Roland Dobbins <rdobbins@arbor.net> wrote:
On 10 Jun 2015, at 18:56, John Levine wrote:
I presume there is no need to explain why this would be of interest.
To keep consumers who've legitimately purchased/rented/subscribed to content from accessing same when they travel internationally?
Because as a regular international traveler, that's what springs to mind when I see requests like this.
Another thought is governmentally-driven censorship, something else I encounter a lot in my travels.
I’ll just simplify this and say that the Tor Project publishes a list of its exit nodes so you can block these if your abuse/fraud requirements necessitate this. https://check.torproject.org/cgi-bin/TorBulkExitList.py If it’s for geolocation blocking, I’m in favor of these political limitations to go away. It doesn’t take a genius to bypass these if that’s your intent. - Jared
Well if they are using Hola then EVERY person with it installed is an exit-node. http://adios-hola.org https://m.reddit.com/r/netsec/comments/37rit3/adios_hola_why_you_should_imme... On 10 Jun 2015 14:28, "Jared Mauch" <jared@puck.nether.net> wrote:
On Jun 10, 2015, at 8:08 AM, Roland Dobbins <rdobbins@arbor.net> wrote:
On 10 Jun 2015, at 18:56, John Levine wrote:
I presume there is no need to explain why this would be of interest.
To keep consumers who've legitimately purchased/rented/subscribed to content from accessing same when they travel internationally?
Because as a regular international traveler, that's what springs to mind when I see requests like this.
Another thought is governmentally-driven censorship, something else I encounter a lot in my travels.
I’ll just simplify this and say that the Tor Project publishes a list of its exit nodes so you can block these if your abuse/fraud requirements necessitate this.
https://check.torproject.org/cgi-bin/TorBulkExitList.py
If it’s for geolocation blocking, I’m in favor of these political limitations to go away. It doesn’t take a genius to bypass these if that’s your intent.
- Jared
I'd imagine it is quite easy for a lot of these providers to have a pre-configured virtual machine template or cd image that they can deploy across the board amongst a plethora of different VPS solutions as well. Being able to bring up exit points on the fly would be very helpful in bypassing censorship. On Wed, Jun 10, 2015 at 12:39 PM Bacon Zombie <baconzombie@gmail.com> wrote:
Well if they are using Hola then EVERY person with it installed is an exit-node.
https://m.reddit.com/r/netsec/comments/37rit3/adios_hola_why_you_should_imme... On 10 Jun 2015 14:28, "Jared Mauch" <jared@puck.nether.net> wrote:
On Jun 10, 2015, at 8:08 AM, Roland Dobbins <rdobbins@arbor.net>
On 10 Jun 2015, at 18:56, John Levine wrote:
I presume there is no need to explain why this would be of interest.
To keep consumers who've legitimately purchased/rented/subscribed to
content from accessing same when they travel internationally?
Because as a regular international traveler, that's what springs to
mind when I see requests like this.
Another thought is governmentally-driven censorship, something else I
encounter a lot in my travels.
I’ll just simplify this and say that the Tor Project publishes a list of its exit nodes so you can block these if your abuse/fraud requirements necessitate this.
https://check.torproject.org/cgi-bin/TorBulkExitList.py
If it’s for geolocation blocking, I’m in favor of these political limitations to go away. It doesn’t take a genius to bypass these if
wrote: that’s
your intent.
- Jared
On Jun 10, 2015, at 05:08, Roland Dobbins <rdobbins@arbor.net> wrote:
Another thought is governmentally-driven censorship, something else I encounter a lot in my travels.
I was talking a few weeks ago with a developer type from China who said something to the effect of “Hosted X is a problem because while developer types have experience getting around firewalls, [manager types] do not…”
On 11 Jun 2015, at 4:52, James Downs wrote:
I was talking a few weeks ago with a developer type from China who said something to the effect of “Hosted X is a problem because while developer types have experience getting around firewalls, [manager types] do not…”
Yes, we all know that technical people can generally get around these sorts of blocks, and non-technical people all too often can't. The majority of people aren't technical (using Facebook and Instagram all day <> technical). ----------------------------------- Roland Dobbins <rdobbins@arbor.net>
On Jun 10, 2015, at 17:25, Roland Dobbins <rdobbins@arbor.net> wrote:
Yes, we all know that technical people can generally get around these sorts of blocks, and non-technical people all too often can't.
The majority of people aren't technical (using Facebook and Instagram all day <> technical).
I thought your point was that you encounter governmentally-driven censorship frequently in your travels, and you were in favor of making it easier to get around it. The need for this was what my anecdote was meant to illustrate.
On 11 Jun 2015, at 10:16, James Downs wrote:
I thought your point was that you encounter governmentally-driven censorship frequently in your travels, and you were in favor of making it easier to get around it.
Yes, absolutely. We're in violent agreement. ;> ----------------------------------- Roland Dobbins <rdobbins@arbor.net>
In article <DDE4299E-9450-42A7-AA27-9DDA8BB70B24@arbor.net> you write:
On 10 Jun 2015, at 18:56, John Levine wrote:
I presume there is no need to explain why this would be of interest.
Gee, I appear to have presumed wrong. My concrete application is vetting updates to the abuse.net contact database, to recognize people who are trying to hide their actual location.
To keep consumers ...
R's, John
participants (7)
-
Bacon Zombie
-
James Downs
-
Jared Mauch
-
John Levine
-
Pete Mundy
-
Roland Dobbins
-
Tyler Mills