2.5 How Exit Relays Actually Work
In the Tor network, the Exit Relay (sometimes simply called an “exit node”) is the final hop in a Tor circuit when a user accesses the normal internet (the “clearnet”).
Exit relays play a unique role because they are the only Tor nodes that interact directly with external websites.
This chapter explains, in depth, how exit relays function, what they can and cannot see, how traffic flows through them, and why they are essential despite being a common source of misunderstanding.
A. What Is an Exit Relay?
Section titled “A. What Is an Exit Relay?”An exit relay is the Tor relay responsible for:
-
removing the final layer of onion encryption
-
forwarding the decrypted request to the clearnet destination
-
receiving the response from the clearnet and re-encrypting it for the user
It is the only point in a Tor circuit where Tor traffic becomes ordinary internet traffic.
Exit relays do not know who the user is; they only see:
-
the destination site
-
plaintext data if the site does not use HTTPS
Even then, they only see the content, not the user’s identity.
B. Position of the Exit Relay in the Tor Circuit
Section titled “B. Position of the Exit Relay in the Tor Circuit”A Tor circuit consists of:
-
Entry Guard (first hop)
-
Middle Relay (second hop)
-
Exit Relay (third hop)
Data flow (simplified):
User → Entry Guard → Middle Relay → Exit Relay → Destination Website
The exit relay only sees decrypted outgoing traffic and the destination server.
It cannot see:
-
user IP
-
user identity
-
user location
-
user’s entry guard
This separation of knowledge is fundamental to Tor’s anonymity design.
C. What the Exit Relay Can See
Section titled “C. What the Exit Relay Can See”Exit relays have visibility over exactly two things:
1. The Final Unencrypted Layer of Data
Section titled “1. The Final Unencrypted Layer of Data”If a user visits:
-
HTTP websites → exit relay can read content
-
HTTPS websites → content is fully encrypted; exit relay sees nothing meaningful
Since most modern websites use HTTPS, exit relays cannot read the majority of traffic.
2. The Destination IP and Port
Section titled “2. The Destination IP and Port”Exit relays must know where to forward the traffic.
They see:
Destination server IP Requested port (e.g., port 80 for HTTP)
Nothing else.
D. What Exit Relays Cannot See
Section titled “D. What Exit Relays Cannot See”Despite popular myths, exit relays cannot:
-
See the user’s IP address
That information is hidden by the guard relay. -
Know the user’s identity
All Tor traffic is layered and encrypted. -
Decrypt HTTPS traffic
HTTPS encryption terminates at the destination server, not the exit node. -
See internal Tor circuits
Each hop removes only one encryption layer. -
Determine where the user is located
IP geolocation is impossible from the exit’s perspective. -
Trace the user back through the Tor network
No single relay has enough information.
E. Why Exit Relays Exist
Section titled “E. Why Exit Relays Exist”Many darknet systems (I2P, Freenet) do not allow clearnet access.
Tor intentionally supports clearnet access to create a practical anonymity system for:
-
researchers
-
journalists
-
everyday users seeking privacy
-
citizens in censored environments
Exit relays act as translation bridges between:
-
anonymous Tor circuits
-
the normal, public internet
Without exit relays, Tor would be an internal-only network like I2P.
F. Exit Relay Policies & Restrictions
Section titled “F. Exit Relay Policies & Restrictions”Exit relays operate under specific rules:
1. Exit Policies
Section titled “1. Exit Policies”Relay operators specify which ports/services they allow.
For example:
-
allow ports 80 and 443
-
deny SMTP ports to prevent spam
-
deny risky ports to reduce abuse
These policies shape how traffic routes through the network.
2. Abuse Management
Section titled “2. Abuse Management”Exit operators often receive:
-
DMCA notices
-
abuse complaints
-
legal inquiries
However, Tor Project provides guides explaining that operators cannot identify users.
Exit operators are not responsible for user actions, as they do not know who the user is.
G. Exit Relays & HTTPS: A Critical Distinction
Section titled “G. Exit Relays & HTTPS: A Critical Distinction”If the site uses HTTPS:
Section titled “If the site uses HTTPS:”-
exit relay sees only encrypted TLS packets
-
cannot read or manipulate content
-
cannot insert malware
-
cannot observe personal data
If the site uses HTTP:
Section titled “If the site uses HTTP:”-
exit relay can see content
-
but still cannot see the user’s identity
Modern browsers enforce HTTPS with:
-
HSTS
-
automatic HTTPS upgrades
-
certificate pinning
This greatly reduces exit relay visibility.
H. Exit Traffic Fingerprinting & Academic Findings
Section titled “H. Exit Traffic Fingerprinting & Academic Findings”Exit relay behavior has been studied extensively in academia.
Key findings include:
1. Exit Relays Are Often Underpowered
Section titled “1. Exit Relays Are Often Underpowered”Volunteer-run nodes have limited bandwidth.
2. Exit Relays Are Bottlenecks
Section titled “2. Exit Relays Are Bottlenecks”Clearnet-bound traffic flows through relatively few relays compared to entry or middle nodes.
3. Malicious Exit Relays Are Rare but Possible
Section titled “3. Malicious Exit Relays Are Rare but Possible”Some research uncovered misconfigured or malicious exits attempting:
-
TLS downgrades
-
traffic injection
-
DNS tampering
Tor mitigates these using:
-
Relay operator vetting
-
Exit scanning (Tor “exitmap” research)
-
Community reporting
-
Consensus weighting
No single malicious exit can deanonymize a user due to Tor’s architecture.
I. Why Exit Relays Cannot De-Anonymize Tor Users Alone
Section titled “I. Why Exit Relays Cannot De-Anonymize Tor Users Alone”To deanonymize a user, an adversary must control:
-
The entry guard (to see user IP)
-
The exit relay (to see destination)
Controlling both simultaneously is difficult due to:
-
guard rotation policies
-
consensus mechanisms
-
diverse volunteer relay operators
-
large network size
A malicious exit alone is insufficient for deanonymization.
J. Exit Relays for .onion Services
Section titled “J. Exit Relays for .onion Services”When a user accesses a .onion service:
-
exit relays are not used at all
-
the entire circuit remains internal to Tor
-
both sides use rendezvous points
-
traffic never touches the clearnet
This increases anonymity and security.