Re: [liberationtech] Secure, inexpensive hosting of activist sites

2013-04-22 Thread Eugen Leitl
On Sun, Apr 21, 2013 at 09:26:05PM -0400, micah wrote:

 Can't rely on them to be there for what exactly? 

Just being there and responsive for the entire duration
you need them. 
 
 Where is the liberatory technological element to recommending commercial

The liberatory technological element is to use distributed services
not linkable to a certain specific server or location. You're welcome.

 services when they are more than happy when the shit hits it to bend
 over backwards for law enforcement without bothering even questioning if

Have you ever heard of bullet proof hosting? Do you think that snowshoe
spammer and carder and malware hosters care a damn thing about the content 
they host?

 the request is even legal because that would cut into their profits?  I

Very simple: they do not care whether it's legal. Their business model
is that they don't care, as long as the account gets paid.

 have to say I agree with ilf, this is pretty depressing for this list.

You'll get used to it. I did.
 
 How can anyone in good conscience recommend to activists commercial
 services whose primary goal is to optimize for the bottom line? You

How can anyone engage in strawmen of such appalling quality?

 realize that when the shit hits it you can rely on them to not waste
 any of their money fighting for you. Not that it matters, because they
 are already deupitized data collection points for the police, building
 into their money-making schemes keeping as much logs as they possibily
 can to maximize profits from various advertising and surveillance
 efforts.
 
 And really, Cloudflare? Comon. After their willingness to roll over on

What about Cloudflare? Can't recall mentioning them.

 the subpoena for Barret Brown and prentend that they were the internet's
 saviors by making up that whole thing about how they saved the internet
 from the biggest DDOS ever? 
  
 This is an amazing statement: free is distinctly unaffordable -- what
 meaning of free are you using here?  There are other things that I'd

Free, as in free beer. 

 pay *more* money for if it meant the kind of free that I'm thinking of
 was in play... But this is 'liberationtech', right? Is the only thing
 you are concerned about is being liberated from your money when doing
 tech things?
 
 The cognitive dissonance here is deafening.

How would you know?
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Secure, inexpensive hosting of activist sites

2013-04-22 Thread Travis McCrea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Either I missed it, or it wasn't posted: dod.net is a wonderful 501(c)3
which has a great distributed network of servers and is super big on
privacy protection and their clients data.

It's free to host with them, but they ask for donations.

Also BuyVM.net has also been a great host that even up until recently
let you run tor exit nodes. Francisco (the owner) has a liberal policy
towards linking, and allows torrent trackers (with the official line
that they can't track copyrighted material) which is great for
dissemination of large files like wikileaks archives.

dod.net is shared hosting, with a jailed SSH. buyvm.net is a VPS.

Eugen Leitl wrote:
 On Sun, Apr 21, 2013 at 09:26:05PM -0400, micah wrote:
 
 Can't rely on them to be there for what exactly?
 
 Just being there and responsive for the entire duration you need
 them.
 
 Where is the liberatory technological element to recommending
 commercial
 
 The liberatory technological element is to use distributed services 
 not linkable to a certain specific server or location. You're
 welcome.
 
 services when they are more than happy when the shit hits it to
 bend over backwards for law enforcement without bothering even
 questioning if
 
 Have you ever heard of bullet proof hosting? Do you think that
 snowshoe spammer and carder and malware hosters care a damn thing
 about the content they host?
 
 the request is even legal because that would cut into their
 profits?  I
 
 Very simple: they do not care whether it's legal. Their business
 model is that they don't care, as long as the account gets paid.
 
 have to say I agree with ilf, this is pretty depressing for this
 list.
 
 You'll get used to it. I did.
 
 How can anyone in good conscience recommend to activists
 commercial services whose primary goal is to optimize for the
 bottom line? You
 
 How can anyone engage in strawmen of such appalling quality?
 
 realize that when the shit hits it you can rely on them to not
 waste any of their money fighting for you. Not that it matters,
 because they are already deupitized data collection points for the
 police, building into their money-making schemes keeping as much
 logs as they possibily can to maximize profits from various
 advertising and surveillance efforts.
 
 And really, Cloudflare? Comon. After their willingness to roll over
 on
 
 What about Cloudflare? Can't recall mentioning them.
 
 the subpoena for Barret Brown and prentend that they were the
 internet's saviors by making up that whole thing about how they
 saved the internet from the biggest DDOS ever?
 
 This is an amazing statement: free is distinctly unaffordable --
 what meaning of free are you using here?  There are other things
 that I'd
 
 Free, as in free beer.
 
 pay *more* money for if it meant the kind of free that I'm thinking
 of was in play... But this is 'liberationtech', right? Is the only
 thing you are concerned about is being liberated from your money
 when doing tech things?
 
 The cognitive dissonance here is deafening.
 
 How would you know? -- Too many emails? Unsubscribe, change to
 digest, or change password by emailing moderator at
 compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCgAGBQJRdUWqAAoJEES9cOv0A0l0TlgIAMTcfmxdqmJmNtAjJxNmoXtV
hz7QZIRdJQ7uhfjcVXmeFrb8SYGujkNBy9QJGNhuiOfKWrYiDoj4lLNe++5eAB5g
av6DT7DegXF1Ep0iyXYY/cSTCVKFCl5n6NEObb+gyqrDavUiPNfD5xXHtuBm6Qw5
nWzOt1Rkj4G8C9jbUQI0ZxixCQO2fRi7p6TYGiRjoOmOnUBauMwByn2m9/NAjxJ+
D+xapIhsI16KNxwZ4a2DYraHdqXoXEPjXe3HSu6BmGQP0PCf4lRJnzJQ/ZZ1Po74
v1M7F0SZXQK/41rmTux4eyoM++VYIA8p+r7QAbIFihCFg8OXWGra/1o9y9wuSEA=
=xV4C
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Secure, inexpensive hosting of activist sites

2013-04-22 Thread Jon Camfield
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 04/18/2013 04:45 PM, Hisham wrote:
 Hi all,
 
 Activists whose sites come under attack struggle to find cheap
 solutions to keep their websites safely guarded. Many of them are
 looking for secure, inexpensive hosting. I've come across many such
 cases, from Senegal, to Zambia to Egypt to Morocco. Some of them
 ask for temporary hosting to be able to stay online until they can
 stand on their feet again.
 
 I'd be grateful if someone could help with this one. Are there
 secure and inexpensive solutions out there?
 
 Best,
 
 -- Hisham Almiraat

For the hosting side, you should also look at VirtualRoad; I've
recently been working with their team on a humanitarian site, and
they've been nothing but amazing.

For DDoS protection, there is also Deflect.ca - it's an open source
DDoS mitigation tool (any group can set a Deflect system up for a
family of sites using a collection of low-cost virtual servers), and
it is also providing this as a free service to qualifying sites
(independent media, human rights, and related).  The benefit of this
is that you can set it up before an attack; it adds a level of
security to your site, speeds it up, and you keep 100% control over
the site itself.

Jon

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=MaI7
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Cybersecurity Forum RESCHEDULED for May 15th, 2013

2013-04-22 Thread Yosem Companys
Michael wanted me to forward this message to the main list too:

From: Michael Snell mjjsn...@gmail.com

THIS FORUM HAS BEEN RESCHEDULED FOR WEDNESDAY, MAY 15TH, 2013.

Our featured speaker has been in DC working on the Cyber-Security
Information Protection Act (CISPA) all last week, and will be at a hearing
regarding location tracking and privacy this Thursday. While the
postponement may be inconvenient for some, he will have much more
information for us regarding the voting and potential impact of CISPA upon
individual rights in the United States.

The time for the event remains unchanged: 6:30 p.m. to 8:30 p.m. A light
meal will still be provided. Event location will be confirmed soon.

Best regards,

Mike Snell
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Secure, inexpensive hosting of activist sites

2013-04-22 Thread Alfredo Lopez
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 04/22/2013 03:08 PM, Jacob Appelbaum wrote:
 micah:
 Eugen Leitl eu...@leitl.org writes:
 
 On Sun, Apr 21, 2013 at 03:07:35PM +0200, ilf wrote:
 
 I can't believe this bullshit thread recommending *only* 
 commercial services.
 

This is a complicated issue and we at May First/People Link (as is the
case with Micah of Rise-Up) know that first-hand. In fact, since we
partner with Rise-Up on many activities the lessons we learn are
frequently shared.

The main lesson here isn't who is full-proof. Nobody is. It's who will
fight the longest and hardest and in fullest collaboration with you.
In short, who is (dare I say it?) a comrade. :-)

Just as background: as a membership organization (I mean
really...members vote and everything), we all pay dues, no one pays
for services and our entire organization commits itself to preserving
the integrity and activity of all member websites and email accounts.
Period. We're challenged all the time in that arena and we take them
on legally and politically and technologically.

But the issue is how you fight that fight and win it and that
depends on your definition of win. The biggest threat to our
members' sites isn't cyber-attacks and denial of service (which we
successfully fight off all the time) but legal attacks like Copyright
violation complaints which, in the United States, are almost
impossible to fight off, The complainant will, a day or two after you
tell it to get lost, go to your upstream provider and none of those
outfits is principled enough to take a stand for free speech when
threatened with costly legal action. Upstream connection goes,
hundreds of members lose their websites and email. This is serious
business.

So you're looking, in the U.S. anyway, for a service provider that
will move things around, weave and duck technologically, to keep you
on-line as long as possible until having to take you off. You're
searching for people who will spend as long as necessary to keep you
on-line when you're under DOS attack. And you're looking for a
provider which will, when pushed, make a fuss publicly and make an
issue of it when possible. Because you're looking for a provider that
wants to build a movement with you and denial of your right to
expression is an issue upon which we can continue building our movements.

I think those three are the criteria.

The Internet is a field of struggle -- it's not the plumbing in a
movement's house. Yes, you want efficient service. No, you can't pay a
lot of money. But you also want a provider that will treat this issue
as denial of a right and who is ready to organize around it and you
want to support that provider's continuous existence. No provider of
this type will deny a politically important website a home because of
lack of money; they will always work something out with you. There are
providers like that in most parts of the world; I think we all should
be seeking them out and working with them. :-)

Abrazos,

Alfredo


 Look, free is distinctly unaffordable. If you need a dedicated
 box somebody has got to pay for the hosting and remote hands.
 Activists donating own resources are quite nice and cool (heck,
 been there, done that) but ultimatively you can't rely on them
 to be there if the shit hits it.
 
 Can't rely on them to be there for what exactly?
 
 To be fair - some activist communities just aren't holding the
 five nines that other companies hold up as marketing material. ;-)
 
 
 Where is the liberatory technological element to recommending 
 commercial services when they are more than happy when the shit
 hits it to bend over backwards for law enforcement without
 bothering even questioning if the request is even legal because
 that would cut into their profits?  I have to say I agree with
 ilf, this is pretty depressing for this list.
 
 I thought about the sheer number of people trying to compromise
 some of my most public systems. The trade-off was one where I
 stopped worrying as much about buggy software and traded it for a
 legal attacks; I did so knowing that if I were to lose, I would
 still *win* in that I would learn something and set an undeniable
 example and if I were to win outright, I'd have defended my or
 access to such systems successfully. Thus I actually selected
 Google, Twitter and other service providers to test a theory about
 how companies might act when pressed. Each company has law budgets
 that greatly exceed the amount of money I could ever hope to raise
 or spend on my own. After all is said and done - their brands rely
 on people believing that they're good and will fight for their
 users.
 
 I actually told the FBI about this strategy during a QA in NYC -
 which if you haven't seen it is ... well, lets say, I wasn't the
 only one who thought it was funny:
 
 https://www.youtube.com/watch?v=dTuxoLDnmJU
 
 In short - there are companies that will go to court and even, if
 you're lucky, spend *millions* of dollars on 

[liberationtech] (advice sought) Public safety and configuration of list

2013-04-22 Thread Michael Allan
To the experts in Liberationtech, Air-L and Mailman lists,
(cc General Counsel of Stanford University)

Stanford University has configured the Liberationtech mailing list in
a manner that is potentially unsafe.  University staff are aware of
the problem and are evalutating the situation, but have yet to take
action.  I'm a subscriber to the list, and I ask your advice.


SITUATION

  The Liberationtech mailing list is run by Stanford University in
  connection with its Program on Liberation Technology.  That program
  investigates the use of IT to defend human rights, improve
  governance, empower the poor, promote economic development, and
  pursue a variety of other social goods. [1] Experts on the list
  advise and inform on matters such as encrypting communications,
  protecting infrastructure from cyber attack, and protecting onself
  from personal danger.  Often those seeking help are in vulnerable
  situations.  They include aid workers, reporters and activists who
  live and work in environments where human rights are not well
  respected, or where the government is too weak to protect people
  from organized criminals, rival militias, and so forth.

  The list software is GNU Mailman.  The administration interface
  includes the following configuration items: [2]

(a) Should any existing Reply-To: header found in the original
message be stripped?  If so, this will be done regardless of
whether an explict Reply-To: header is added by Mailman or
not.

 X  No
 -  Yes

(b) Where are replies to list messages directed?  Poster is
*strongly* recommended for most mailing lists.

  X  Poster
  -  This list
  -  Explicit address (c) _

  Shown above is the default, recommended setting of (1 No, 2 Poster).
  It leaves the sender's Reply-To headers (if any) unaltered during
  mail transfer.  Instead of this, the Liberationtech mailing list is
  configured as follows:

(b) Where are replies to list messages directed?  Poster is
*strongly* recommended for most mailing lists.

  -  Poster
  X  This list
  -  Explicit address (c) _

  With this setting, whenever a subscriber Q sends a message to the
  list, the software adds a Reply-To header pointing to L, which is
  the address of the list itself.  The message is then passed on to
  the subscribers.  The meaning of the added Reply-To header is, Q
  asks that you reply to her at L. [3]

  Note that this is false information; Q does not ask that.


EXAMPLE OF DANGER

  Matt Mackall has suggested that, here of all places, people might
  get hurt as a consequence of this configuration [4].  I agree.
  Here's a brief example of how people might get hurt:

1. Subscriber P is in a vulnerable situation.  P is distacted by
   the situation and is not getting a lot of sleep.

2. P asks the mailing list for advice on the situation, because
   that's the purpose of the list.

3. Subscriber Q replies with helpful information.

   The mailing list adds a Reply-To header to Q's message that
   points to address L.  Again, the mis-information is, Q asks
   that you reply to her at L. [3]

4. P replies with private information, including (as Matt puts it)
   a potentially life-endangering datum.  Tired and distracted,
   P replies by hitting the standard Reply button.  In the mail
   client, this means reply to Q.

   The reply goes instead to L, which is the public mailing list.

   Oh my god!  What have I done!

5. People get hurt.

  Isn't this a danger?


POSSIBLE EXPLOIT THAT INCREASES THE DANGER

  Suppose that P is actually a police operative in an authoritarian
  state, or a criminal operative in a failed state.  He only pretends
  to be a vulnerable activist (say).  His real aim is to hurt the
  activists and other opponents; damage the university's reputation;
  close down the mailing list; make democracy look foolish [5]; and
  finally make some money in the bargain [6].  The likelihood of his
  success is roughly proportional to the amount of harm suffered by
  the activists and other innocent people.

  If such an exploit were even *perceived* to be feasible, then the
  mis-configuration of the mailing list would not only be exposing the
  public to a haphazard danger, but also providing the means and
  incentive to orchestrate and amplify that danger.

  Might not this exploit be perceived as feasible?


INTERIM RECOMMENDATION

  While Stanford University is evaluating these safety concerns and
  has yet to make a decision, it should return the configuration to
  its default setting.  The default setting is known to be safe.

-- 
Michael Allan

Toronto, +1 416-699-9528
http://zelea.com/


NOTES

  [1] https://mailman.stanford.edu/mailman/listinfo/liberationtech
  http://liberationtechnology.stanford.edu/

  [2] The meaning of configuration variables (a,b,c) is defined 

Re: [liberationtech] [Air-L] (advice sought) Public safety and configuration of list

2013-04-22 Thread Sky Croeser
I'm glad to see this being addressed, particularly in light of the use of
targetted viruses sent specifically to activist mailing lists (which is, of
course, a slightly different issue). In the past this mostly seems to be
around Chinese/Tibetan issues, but it's probably useful to start thinking
about mailing list security more broadly.


On 23 April 2013 06:45, Michael Allan m...@zelea.com wrote:

 To the experts in Liberationtech, Air-L and Mailman lists,
 (cc General Counsel of Stanford University)

 Stanford University has configured the Liberationtech mailing list in
 a manner that is potentially unsafe.  University staff are aware of
 the problem and are evalutating the situation, but have yet to take
 action.  I'm a subscriber to the list, and I ask your advice.


 SITUATION

   The Liberationtech mailing list is run by Stanford University in
   connection with its Program on Liberation Technology.  That program
   investigates the use of IT to defend human rights, improve
   governance, empower the poor, promote economic development, and
   pursue a variety of other social goods. [1] Experts on the list
   advise and inform on matters such as encrypting communications,
   protecting infrastructure from cyber attack, and protecting onself
   from personal danger.  Often those seeking help are in vulnerable
   situations.  They include aid workers, reporters and activists who
   live and work in environments where human rights are not well
   respected, or where the government is too weak to protect people
   from organized criminals, rival militias, and so forth.

   The list software is GNU Mailman.  The administration interface
   includes the following configuration items: [2]

 (a) Should any existing Reply-To: header found in the original
 message be stripped?  If so, this will be done regardless of
 whether an explict Reply-To: header is added by Mailman or
 not.

  X  No
  -  Yes

 (b) Where are replies to list messages directed?  Poster is
 *strongly* recommended for most mailing lists.

   X  Poster
   -  This list
   -  Explicit address (c) _

   Shown above is the default, recommended setting of (1 No, 2 Poster).
   It leaves the sender's Reply-To headers (if any) unaltered during
   mail transfer.  Instead of this, the Liberationtech mailing list is
   configured as follows:

 (b) Where are replies to list messages directed?  Poster is
 *strongly* recommended for most mailing lists.

   -  Poster
   X  This list
   -  Explicit address (c) _

   With this setting, whenever a subscriber Q sends a message to the
   list, the software adds a Reply-To header pointing to L, which is
   the address of the list itself.  The message is then passed on to
   the subscribers.  The meaning of the added Reply-To header is, Q
   asks that you reply to her at L. [3]

   Note that this is false information; Q does not ask that.


 EXAMPLE OF DANGER

   Matt Mackall has suggested that, here of all places, people might
   get hurt as a consequence of this configuration [4].  I agree.
   Here's a brief example of how people might get hurt:

 1. Subscriber P is in a vulnerable situation.  P is distacted by
the situation and is not getting a lot of sleep.

 2. P asks the mailing list for advice on the situation, because
that's the purpose of the list.

 3. Subscriber Q replies with helpful information.

The mailing list adds a Reply-To header to Q's message that
points to address L.  Again, the mis-information is, Q asks
that you reply to her at L. [3]

 4. P replies with private information, including (as Matt puts it)
a potentially life-endangering datum.  Tired and distracted,
P replies by hitting the standard Reply button.  In the mail
client, this means reply to Q.

The reply goes instead to L, which is the public mailing list.

Oh my god!  What have I done!

 5. People get hurt.

   Isn't this a danger?


 POSSIBLE EXPLOIT THAT INCREASES THE DANGER

   Suppose that P is actually a police operative in an authoritarian
   state, or a criminal operative in a failed state.  He only pretends
   to be a vulnerable activist (say).  His real aim is to hurt the
   activists and other opponents; damage the university's reputation;
   close down the mailing list; make democracy look foolish [5]; and
   finally make some money in the bargain [6].  The likelihood of his
   success is roughly proportional to the amount of harm suffered by
   the activists and other innocent people.

   If such an exploit were even *perceived* to be feasible, then the
   mis-configuration of the mailing list would not only be exposing the
   public to a haphazard danger, but also providing the means and
   incentive to orchestrate and amplify that danger.

   Might not this exploit be perceived as