improvements
This commit is contained in:
parent
7d601ea4c3
commit
96c453607f
5 changed files with 28 additions and 3 deletions
|
|
@ -16,7 +16,26 @@ The basic idea is to exclude Exit nodes that do not have ContactInfo:
|
|||
That can be extended to relays that do not have an email in the contact,
|
||||
or to relays that do not have ContactInfo that is verified to include them.
|
||||
|
||||
Pass the controller password if needed as an environment variable:
|
||||
You can see the status of tor relays at https://torstatus.rueckgr.at/
|
||||
The code for that site is at https://github.com/paulchen/torstatus
|
||||
You can get a list of exit relays that are marked bad with:
|
||||
wget --post-data='SR=FBadExit&SO=Asc&FBadExit=1' 'https://torstatus.rueckgr.at/'
|
||||
|
||||
It is assumed that you are running a tor that has its torrc configured with:
|
||||
|
||||
ControlPort 127.0.0.1:9051
|
||||
|
||||
and/or
|
||||
|
||||
ControlSocket /run/tor/control
|
||||
ControlSocketsGroupWritable 1
|
||||
|
||||
and
|
||||
|
||||
HashedControlPassword 16:B4155E403F37446360B30D0481C3BB03C083F0E3BB689883A3838E4692
|
||||
|
||||
so that you have some security on the Control connection.
|
||||
Pass the controller password to these scripts as an environment variable:
|
||||
|
||||
>>> import os
|
||||
>>> assert os.environ['TOR_CONTROLLER_PASSWORD']
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue