I run a lot of forums and we use Stop Forum Spam to block spammers from posting comment spam. They are identified and reported according to three things: 1) Email address, 2) Username and 3) IP address.
The IP address is the most effective way to stop comment spam, and I only block people based on "Has spam been received from this IP according to StopForumSpam.com within the last few days?".
Understand that the vast majority of spam comes from several countries, and Tor.
I'm massively in favour of using Tor and having it as a privacy/anonymity tool. But... Tor is also heavily favoured by spammers and whilst the Tor exits are not explicitly blocked in the system I use, the mere fact that spammers use Tor heavily means that the IP addresses for Tor exit nodes are constantly being refreshed on StopForumSpam.com .
Anyone running any kind of IP reputation is going to have the same problem, and CloudFlare do run their own IP reputation.
It's nothing against Tor, but if an individual mixes their traffic in with a stream of spam, trolls, script kiddies, etc... and the behaviour of those users affects the reputation of the IP, then the innocent Tor users who merely want privacy/anonymity are going to be affected.
It's a difficult balance to strike, but any IP reputation system is going to score Tor badly given that it is used for so much abuse and bad stuff.
I'm curious if people would use exit nodes which specifically blocked comment submission on sites. I use Tor frequently, but never for posting comments.
It's an interesting proposal, that perhaps the things that degrade the reputation of Tor nodes could be blocked by Tor nodes.
Not just comment spam, but to have the equivalent of mod_security be run over an exit node and to deny traffic that triggers it.
This wouldn't reduce privacy/anonymity, but would avoid the IP address from having its reputation damaged (in turn enhancing privacy/anonymity as the exit nodes can be protected and thus prove more useful to good users).
Yeah, we already see this with exit nodes having "cautious" policies about not allowing ssh, smtp, etc.
Being able to advertise some kind of filtered outbound on specific higher-risk traffic types so you can offer those at all might be nice. I'd have no problem offering ssh to an opt-in whitelist of destinations.
Exactly... Tor nodes that don't just let anything through, but do let "safe" (to some agreed definition) web traffic through. Then a client could say "only exit via safe nodes" and you'd have this much better chance that the exit hadn't been used for the nefarious purposes that were likely to have resulted in an IP being blocked or challenged.
I get what you said in the earlier comment, but it sounds like CF would run a node and people would need to connect to it. I'm not sure of the implementation details, but either that's only a single hop through Tor (thus reducing the privacy/anonymity), or you're still making a single entry/exit point be the focus of all traffic from a given user (reducing privacy/anonymity by creating a single target for state attacks - likely court order based).
There's got to be a way to keep the multi-hop high-privacy and high-anonymity for those who need it, without having those users treated the same as those using Tor to hide various attacks (spam, the kind of attacks the CF WAF mitigates the risk of, etc).
I think this idea of Tor nodes that are trusted to have implemented various policies, and that only exit traffic that has filtered out attacks (and obvious spam), kinda works. By protecting the IP reputation of the exit node, we get a Tor that isn't being penalised and affecting the end user experience and that doesn't reduce the privacy/anonymity stuff that is important.
I didn't mean for CF to run a Tor node (I'd be in favor of that, but I wouldn't want to run a lot of them, although having all traffic destined for cf go through special Tor infrastructure on top of everything else in a normal Tor session would be fine).
I just meant for anyone running Tor exit nodes -- it would be cool if those people could configure some kind of filter on their exit node to do this filtering.
The security check captchas are in no way Tor-specific.
The shared Tor IP happens to have a threat score based on past traffic we've seen from that IP. This would be the same for any shared IP though -- like a VPN service IP address.
As other folks have mentioned, we're working on better handling for shared IPs in general, but to make this clear: this in no way has anything to do specifically with Tor users.
Most TOR IPs are flagged as abusive because of... abuse. SO, you wind up with extra CAPTCHAs to solve or outright blocking from being able to post content.
My guess: exit nodes are responsible for a number of attacks against CloudFlare-protected sites so it makes sense to question each visit from those IPs.