You could always drop all traffic that is destined for a tor node, the ip addresses of all the nodes are publicly available. And if you put together some tricky scripting skills you could makes rules for all of them. Since tor traffic is encrypted from the client to the nodes make it difficult to analyze the data of the packets.
Or you can drop all packets that are trying to receive the list of tor nodes from the directory servers. That may be easer.
You could always drop all traffic that is destined for a tor node, the ip addresses of all the nodes are publicly available. And if you put together some tricky scripting skills you could makes rules for all of them. Since tor traffic is encrypted from the client to the nodes make it difficult to analyze the data of the packets.
Or you can drop all packets that are trying to receive the list of tor nodes from the directory servers. That may be easer.