So, I had an idea on how to block Tor (or similar tools) from being used on your
ID: 657121 • Letter: S
Question
So, I had an idea on how to block Tor (or similar tools) from being used on your network (or ISP, which is perhaps more relevant, considering Tor's mission). I'm assuming it wouldn't work (based on the assumption that the US Navy is smarter than me), but I'm not sure why not. So, here's how I'm thinking it would work:
1. Tor is secured by SSL (or a similar scheme), but the AP can still see who you're sending information to (the entry node). So they look to see who you're "contacting."
2. Next, the AP tries to contact that IP. Unless the entry node doubles as a webserver (thinking that's not too likely), the node will block the connection.
3. If it does, block the traffic.
This would obviously halve (or come close to halving) broadband available to people using the network, but would it work? Or have the Tor people found some way around it?
Explanation / Answer
Tor is connection between normal end peers. Most of them give some revdns data, although it is not very informal and autogenerated (for example, 43.72.dyn.myprovider.com). Sometimes there is no revdns set up. But: it is totally independent if the end users are using tor, or not. It depends from the revdns settings of their network provider. Tor has nothing with them to do.
Although there are tor filters existing, they use a different method. They collect a list of the currently existing tor output gateways (there is not too many, and it can be easily asked), and check if the connection is coming from one of them.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.