From BZFlagWiki
Revision as of 21:19, 4 January 2009 by Aol (Talk | contribs)

Jump to: navigation, search

The website listed in the readme of the plugin doesn't work. If you look in torblock.cpp, the plugin actually pulls data from so I changed the link to that. Mets 17:46, 20 May 2008 (EDT)

The current implementation blocks any IP-address mentioned in the above list. Looking at the list, you can find, that there are some nodes listed as 'Exit', and some are not. Perhaps the plug-in could be improved to make the choice to block some hosts more sensible. The plug-in could improve even more to only block nodes that actually have exit-policies that would allow to connect to the testing server. I prethee you to heed the information in the Tor abuse FAQ. Aol 18:28, 3 January 2009 (EST)

Our stance has been, there is no need to use a proxy, PERIOD. Information is not harvested,etc. If you can't play from your actual address and need to be anonymous, then that is really your paranoia and you have to deal with it. I think we like the TOR block just the way it is. DonnyBaker 04:57, 4 January 2009 (EST)

It would be no use to try to play bzflag via the tor network as the inherent lag would be to high. That there might be a tor-node running on the same IP-address as a game client does not mean that the client is using tor to connect to the game server. You could check this by the information from the tor directory server, which provides information to which ports the tor-node on a IP-adress is allowing traffic. I.e.: but tor-node a.b.c.d does not allow traffic to port 1234, so client a.b.c.d is not using tor to connect. If policy would allow tor-traffic to exit to port 1234, client should be blocked. Aol 16:17, 4 January 2009 (EST)