I only blocked one exit node (the largest one, blutmagie).
I've removed blutmagie from my exit-nodes and it works.
I've also done this, but it does not always work. Since I have no reason to suspect theymos is fibbing, I guess there must be a high enough correlation between IP's that have been banned due to actual abuse and IP's that are tor-exits or intermittent exits.
I can't really expect the forum not to block IP's that are repeat abusers so I don't have any brilliant ideas.
__
-?
...
lol, just kidding, whose post do you think you are reading? Of
course I have a brilliant idea
If you have root, there is a fairly clean, surgical solution to this problem. Instead of banning the IP's in the forum software,
ban them in iptables (or in whatever network-level tcp filtering is available in the server's operating-system).
This way, tor will discover the blockage and route to an exit node that works*. Even if this fails, at least the connection will appear to time out or fail. This is vastly preferable to accepting the user's http request but allowing the forum software to do mean things to the user. Note that the most annoying thing about being blocked in this way occurs when the user constructs an elaborate post, hits the "post" button, and then has their post rejected by the forum software. Once the post is blocked, you can't just press the back button to get it back, it's gone. Worse, even if you were smart enough to save your post to the clipboard, and try to repost, the forum software will
still reject your post as a duplicate if you use the back button (presumably because it is using a hidden html form input element to keep track of posts and prevent dupes).
* note: I am making an assumption here. I briefly tried to find confirmation that tor actually does include some support for learning not to route requests to an exit node whose exit policy permits exit to a certain
tuple, but which is in fact prevented from successfully connecting by something without tor (i.e.: packet filtering, great firewall of china, mis-configured routing table, etc). Although I couldn't find a completely solid confirmation of this, I did find some evidence that I'm right. Given the goals of the tor project I really hope my assumption is correct but I admit I'm not sure.
Better yet, just stop blocking blutmagie! What is the point of blocking one tor exits and not all!? You just make access easy for the bad guys and difficult for the good guys!!