Re: Is gatereloaded a Bad Exit?

2011-02-15 Thread morphium
2011/2/14 Julie C ju...@h-ck.ca:
 If this BadExit policy is being
 made up ad-hoc, that's fine by me. If the offending Tor node operators want
 to stand up and defend themselves, or their choices, that's fine too.

So, I as a Tor Node Operator now have to defend myself, because it's a
priviledge to run a Tor node, not a service to the community?

Guys, whats up with you?

morphium
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-15 Thread Aplin, Justin M

On 2/15/2011 5:00 AM, morphium wrote:

2011/2/14 Julie Cju...@h-ck.ca:

If this BadExit policy is being
made up ad-hoc, that's fine by me. If the offending Tor node operators want
to stand up and defend themselves, or their choices, that's fine too.

So, I as a Tor Node Operator now have to defend myself, because it's a
priviledge to run a Tor node, not a service to the community?

Guys, whats up with you?


I hate to continue a clearly dead-end argument, but have you ever 
volunteered, well, *anywhere*? If I were, say, volunteering to build 
houses for the homeless, and I started going off on my own, ignoring all 
guidelines, and hammering around wherever the fuck I wanted, I'd expect 
to either be asked what the hell I was doing (and allowed to continue 
given good reasoning), or be booted off the project. I have my reasons 
for doing this, trust me is not good enough. The same logic applies to 
nearly any volunteer or community service situation you could get 
yourself into. You wouldn't be allowed to re-arrange books at a library 
without explaining yourself, just as you shouldn't expect to run a 
broken- or malicious-looking Tor node without a heads-up to the community.


Running a node is indeed a community service; however, all community 
service requires some degree of responsibility. If you're really in a 
position where such a responsibility would endanger you (or you're 
simply defiant to the point of rebelling against responsibility when 
you're told it's expected of you), then yes, I expect you to be limited 
to the safe zone of being a middle node until you explain yourself or 
grow the hell up.


~Justin Aplin

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-15 Thread cmeclax-sazri
On Monday 14 February 2011 18:11:42 Dave U. Random wrote:
 SHUT UP EELBASH!

I'm not eelbash, nor do I know who eelbash is (I've heard rumors that eelbash 
is wormcast, but I don't remember what that was about, it was years ago).
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread grarpamp
 I never made the claim this was safer.

Of course, not quoted as such. Plaintext anywhere is risky. Yet
this entire thread is about sniffing. How plaintext-only exits
somehow equate to sniffing. And how badexiting plaintext-only exits
somehow equates to reducing that risk. Both are weak premises. And
said exits were loosely defined as wolves whose only purpose was
to log traffic.

 I cited several engineering reasosn why this type of exit policy
 is a pain for us.

Perhaps after the nodes were waxed on the premise of sniffing and
the thread exploded. (Dethreading might show otherwise so no picking
is intended at all.) It shouldn't matter though as certainly folks
would better support decisions to solve anonymity engineering and/or
performance problems that are causing a non-trivial impact or holdup.

Is Tor really at the point where reducing the exit matrix provides
significant or greater win as opposed to updates in other areas?

Does (or will) Tor bundle 80+443 to the same destination via the
same exit? What about http[s], smtp[s], imap[s], pop[s], submission
grouping? If the user is using different functions or accounts with
different protocols, he likely doesn't want this. Better let him
do his own bundling with MAPADDRESS or some toggles or something
and enhance those tools instead.

 I've also made the claim that there is no rational reason to
 operate an exit in this fashion

People are encouraged to help out however they can. Therefore,
operator fiat and whim is, by definition, sufficient reason. If Joe
operator thinks 6667, 31337, 21, 23, 25, 80, 6969, 12345, 7, 53,
79, 2401, 19, 70, 110, 123 and so on are pretty uber cool, daresay
even silly motivation, and wants to support them, that's his right.
Just as he can disallow www.{un.int,aclu.org}:80. He doesn't have
to announce it with some 'no sniffing, pro rights' policy statement
to those that might believe the paper it's printed on, validate his
social ties, be contacted, or otherwise vetted.

If another example is needed, not that one is; Corporate, edu and
other LAN's sometimes think they can block 'ooo, encryption bad'
ports so they can watch their user's plaintext URL's with their
substandard vendor nanny watch tool of the day. All the while their
staff laughs at them as they happily tunnel whatever they want over
that (perhaps even the client or exit parts of Tor). Yes, this kind
of joke exists :)

And another; In some equally crazy backwards braindead jurisdiction,
being able to say 'hey, we're not hiding our traffic in crypto, we
forbid it, so look mr. authorized gov agent, you can sniff all that
traffic you're getting reports about, and we're not in it, therefore
we're off the hook'. Perhaps even in France, etc, with their strange
crypto laws.

There was also mention of exits to RFC1918 space. No ISP with brains
routes this, especially not for customer facing interfaces. Yet
they could simply be exits so that the operator and others can
access the 1918 space said operator has deployed internally. They
might not care to use a (hidden service OnionCat VPN) for this. Be
it due to config, speed, anonymity or otherwise. Nor might they
wish to overload routable address space as an exit to their local
designs. It's just as crazy. But they're all rational in someone's
mind.

[I haven't actually tried to map 1918 _in_ to Tor yet, just figured
what can be configured not to go out must be capable of going in.]

What about the users that want to reach their peer, via that only
exit in Siberia whose IP isn't blocked before their peer, that only
happens to only be offering port 80, to which their peer can listen.

It's not a question of whether *we* would do such things or see
them as rational. This is network space, any to any, hack to hack.
One man's widget is another man's stinky wicket. It's the tools
that matter. Tor is a network tool, with a nifty anonymity layer.


 We also detect throttling by virtue of our bw authorities measuring
 using 443.
 The same goes for exits that we detect ... throttling 443

Thanks, I yield this hack to be mooted by the project, cool.

 443 is the second-most trafficed port by byte on the Tor network,
 occupying only ~1% of the traffic.

Sniffing was needed to determine this :) And, assuming 80 was found
to be the first-most (which sounds right); then in the 80+443(+rest)
case, a sniffer's cost is only raised, say, sub 10%, not double.
So dropping said nodes truly does nothing useful costwise either.
(A days worth of netflow on a faster open exit would show the port
distribution breakdown, if anyone wants to.)


Node testing methodologies are cool. And what can't be proven
beyond that belongs to userland. Engineering is also cool (and
there are some potentially good reasons to normalize exits there,
beyond the crypto/non-crypto port groups to be sure). And all the
various use cases, examples and whims are cool. So why not start
a new thread exploring the engineering and, if valid and overriding
of same, let the 

Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread morphium
So, with everything said, could we now please Un-BadExit the nodes
that were affected?

Thanks!
morphium
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Mike Perry
Thus spake morphium (morph...@morphium.info):

 So, with everything said, could we now please Un-BadExit the nodes
 that were affected?

Sure, dude. Since you've read everything that was said, I take it
you're volunteering to contact the other node operators and ask them
to give reasons for why they chose their exit policy?

Let us know their preferred email addresses when you're done. But
they'll have to survive a challenge and response round proving they
can modify their contact info field ;).


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgprFx9XcJnz7.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Olaf Selke
Am 14.02.2011 14:41, schrieb morphium:
 So, with everything said, could we now please Un-BadExit the nodes
 that were affected?

the whole discussion didn't change my mind. I still support the idea of
flagging them as bad exit.

regards Olaf
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Damian Johnson
 the whole discussion didn't change my mind. I still support the idea of
 flagging them as bad exit.

Same. Mike gave some good reasons for flagging them weeks ago and I've
yet to see much else besides ranting that seems to ignore most of this
thread. -Damian
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread morphium
 Sure, dude. Since you've read everything that was said, I take it
 you're volunteering to contact the other node operators and ask them
 to give reasons for why they chose their exit policy?

So please BadExit all nodes without contact email, if they don't
explain why they chose the default exit policy, I think they should be
blacklisted!

Thanks!
morphium
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Ted Smith
On Mon, 2011-02-14 at 14:41 +0100, morphium wrote:
 So, with everything said, could we now please Un-BadExit the nodes
 that were affected?
 

Sorry, but this has been a long thread and I want to try to make sure I
understand something important.

Is it true or false that traffic was actually exiting through
gatereloaded et all?

I recall seeing that those nodes weren't marked as exits in the
consensus anyway. If that is the case, then all of John Case's arguments
related to super-secret movie-plot usages of Tor and servers running on
port 80 only accessible through gatereloaded et all seem to be
irrelevant.


signature.asc
Description: This is a digitally signed message part


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread John Case


On Mon, 14 Feb 2011, morphium wrote:


Sure, dude. Since you've read everything that was said, I take it
you're volunteering to contact the other node operators and ask them
to give reasons for why they chose their exit policy?


So please BadExit all nodes without contact email, if they don't
explain why they chose the default exit policy, I think they should be
blacklisted!



No, it goes further than that.  The real motion here is to BadExit all 
nodes that aren't being used and deployed exactly like I deploy mine.


When the dust settles, could we get the official threat model, and the 
official end user profile and the official use case documented ?  Again, 
for the lulz.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Julie C
I suppose the anarchist genes in me are not strong enough. I have to agree
with Mike Perry's arguments, given his credibility, and his clearer
perspective than most of the rest of us. If this BadExit policy is being
made up ad-hoc, that's fine by me. If the offending Tor node operators want
to stand up and defend themselves, or their choices, that's fine too.

--
Julie C.
ju...@h-ck.ca
GPG key FF4E2E70 available at http://keys.gnupg.net




On Mon, Feb 14, 2011 at 9:44 AM, John Case c...@sdf.lonestar.org wrote:


 On Mon, 14 Feb 2011, morphium wrote:

  Sure, dude. Since you've read everything that was said, I take it
 you're volunteering to contact the other node operators and ask them
 to give reasons for why they chose their exit policy?


 So please BadExit all nodes without contact email, if they don't
 explain why they chose the default exit policy, I think they should be
 blacklisted!



 No, it goes further than that.  The real motion here is to BadExit all
 nodes that aren't being used and deployed exactly like I deploy mine.

 When the dust settles, could we get the official threat model, and the
 official end user profile and the official use case documented ?  Again, for
 the lulz.

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/



Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Ted Smith
On Mon, 2011-02-14 at 17:41 +, John Case wrote:
 On Mon, 14 Feb 2011, Ted Smith wrote:
 
  Sorry, but this has been a long thread and I want to try to make
 sure I
  understand something important.
 
  Is it true or false that traffic was actually exiting through
  gatereloaded et all?
 
  I recall seeing that those nodes weren't marked as exits in the
  consensus anyway. If that is the case, then all of John Case's
 arguments
  related to super-secret movie-plot usages of Tor and servers running
 on
  port 80 only accessible through gatereloaded et all seem to be
  irrelevant.
 
 
 And therefore will always be irrelevant, never affecting a single ToR user 
 into the infinite future. 

Is there an or-parliament list I should be on if I want to be an
Official Tor Project Legislator, making these *important policy
decisions* that affect Tor into the *infinite future*?

I know it's easier to send emails about something incredibly unimportant
to inflate one's own ego than it is to actually get shit done, but this
is ridiculous.


signature.asc
Description: This is a digitally signed message part


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Aplin, Justin M

On 2/14/2011 7:48 AM, grarpamp wrote:
[snip]

If another example is needed, not that one is; Corporate, edu and
other LAN's sometimes think they can block 'ooo, encryption bad'
ports so they can watch their user's plaintext URL's with their
substandard vendor nanny watch tool of the day. All the while their
staff laughs at them as they happily tunnel whatever they want over
that (perhaps even the client or exit parts of Tor). Yes, this kind
of joke exists :)

[/snip]

Although I've been keeping out of this argument for the most part, and 
even though I'm leaning towards seeing things Mike's way, I just wanted 
to comment that I've actually been in an environment like this several 
times, once at my previous university, and once working for a local 
government organization. As asinine as such reasoning is on the part of 
the network administrator (or the person who signs their checks), I can 
see why the *ability* to run strange exit policies could be a good 
thing, and should be preserved in the software.


However, I see no reason why providing an anonymous contact email would 
be so hard. Certainly if you're going out of your way to avoid [insert 
conspiracy of choice] in order to run a node, you have the skills to use 
one of the hundreds of free email services out there? I don't think 
asking for a tiny bit of responsibility on the part of exit operators is 
too much to ask, and I'm amazed that allow them to continue to function 
as middle nodes until they explain why their node appears broken or 
malicious is continually being turned into some kind of human-rights 
violation.


~Justin Aplin

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread cmeclax-sazri
On Monday 14 February 2011 14:17:45 Aplin, Justin M wrote:
 However, I see no reason why providing an anonymous contact email would
 be so hard. Certainly if you're going out of your way to avoid [insert
 conspiracy of choice] in order to run a node, you have the skills to use
 one of the hundreds of free email services out there? I don't think
 asking for a tiny bit of responsibility on the part of exit operators is
 too much to ask, and I'm amazed that allow them to continue to function
 as middle nodes until they explain why their node appears broken or
 malicious is continually being turned into some kind of human-rights
 violation.

Or even better, create a nym using remailers. This does take some maintenance, 
as if one of the remailers goes down, you have to make a new chain of 
remailers for the nym to work, but it's more secure than a Yahoo/Hotmail/etc. 
account.

cmeclax
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread John Case


Hello Julie,

On Mon, 14 Feb 2011, Julie C wrote:


I suppose the anarchist genes in me are not strong enough. I have to agree
with Mike Perry's arguments, given his credibility, and his clearer
perspective than most of the rest of us. If this BadExit policy is being
made up ad-hoc, that's fine by me. If the offending Tor node operators want
to stand up and defend themselves, or their choices, that's fine too.



Great.  What's the acceptable companion port to 119 ?  How about 6667 ?

Since these ports, like 25, have no standard companion (like 80/443 
typically does) what collection of encrypted ports need to be maintained 
to balance out running 199/6667 ?


Come on people - I thought there would be quick answers to all of this...

RE: clearer perspective - it's easy to have a clear perspective when you 
discount all possible use cases that aren't what I do.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Ansgar Wiechers
On 2011-02-14 John Case wrote:
 Where's the answer to this ?  I chose edge-case scenarios above, for
 sure, but this is the real meat of the implementation of your plans,
 and I'd  like to know if you've given any thought to this whatsoever.

 What _is_ the proper corresponding open port for 25 ?  What _do_ you
 find an acceptable match for 53 ?  What system of weights will you
 give  ports that don't have an obvious correlary ?

 Oh, by the way - I used TCP port 80 this morning for something other
 than  cleartext HTTP.

You've already made perfectly clear that you don't get the point. Can we
now stop beating the dead horse? Thank you.

Regards
Ansgar Wiechers
-- 
All vulnerabilities deserve a public fear period prior to patches
becoming available.
--Jason Coombs on Bugtraq
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-14 Thread Gregory Maxwell
On Mon, Feb 14, 2011 at 4:32 PM, John Case c...@sdf.lonestar.org wrote:
 Hello Julie,
 On Mon, 14 Feb 2011, Julie C wrote:

 I suppose the anarchist genes in me are not strong enough. I have to agree
 with Mike Perry's arguments, given his credibility, and his clearer
 perspective than most of the rest of us. If this BadExit policy is being
 made up ad-hoc, that's fine by me. If the offending Tor node operators
 want
 to stand up and defend themselves, or their choices, that's fine too.
 Great.  What's the acceptable companion port to 119 ?  How about 6667 ?

 Since these ports, like 25, have no standard companion (like 80/443
 typically does) what collection of encrypted ports need to be maintained to
 balance out running 199/6667 ?

 Come on people - I thought there would be quick answers to all of this...

 RE: clearer perspective - it's easy to have a clear perspective when you
 discount all possible use cases that aren't what I do.


Here's an argument tip: When you think you've spotted some enormous
hole in the other side's argument, there is at least a small chance
that you're actually instead spotted a hole in your understanding of
their position. You should probably take a moment to reflect and make
sure you're confident that you know where the error is before hitting
send.  I refrained from answering this the first time you asked it
because I thought if I gave you more time you might realize that it
wasn't really a useful question.

No one has suggested every unencrypted port must be matched.  There
are some very clear matches which do exist (e.g. HTTP/HTTPS) and for
those matches action can be taken.  Nothing requires anything to be
done about all the other cases where such nice and popular parallels
are not obvious or where the protocols are unpopular enough to begin
with.  HTTP is an overwhelming popular port, and there really isn't
anything wrong with special casing _just_ that, if thats all that it
ever came to.

Your examples aren't the best though, SSL SMTP is on 465— and it's
probably common enough that a similar rule could be enforced if anyone
cared. IRC ports aren't all that consistent even without the
introduction of security, so there isn't much that can be said there.

[snip]
 and people that need this are in literally life or death (or at least free or 
 jail) situations

Then they need to not run an exit. If running an exit is probably
going to get you killed or put in jail you should not be running one.
If you're right and the decision to allow wacko exit policies
discourages people with their life on the line from running exits,
then I could imagine no better policy.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-12 Thread John Case


Hi Geoff,

On Sat, 12 Feb 2011, Geoff Down wrote:


There are a small number of easily identifiable cons to letting an exit
run like this, and there are an unlimited number of unknown pros to
letting an exit run like this.  You should know this.


Leaving aside the original question of whether to BadExit GateReloaded,
I'm afraid this argument is without merit.
A rational decision can only be made on the basis of that for which you
have evidence. There will always be an infinite number of things for
which you have no evidence, but which you can imagine. Your argument
appears to be equivalent to Pascal's argument for worshipping God -
which has always been open to the rejoinder which god, worshipped
how?.
Until you can quantify the pros, it is only rational to behave on the
basis of the quantifiable cons.



That's fair.

Instead of stressing the boundless set of pros, I will discuss a single, 
specific pro, and that is the idea that open, arbitrary systems provide 
a foundation upon which to build surprising and unexpected combinations.


I wouldn't think that a group of technical people, much less a group of 
technical people immersed in network architectures would need this 
explained to them.


Then again, I didn't think we woud be referring to /etc/services as hard, 
physical laws, either.  You live and learn, I guess.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-12 Thread John Case


On Mon, 31 Jan 2011, Andrew Lewman wrote:


In my opinion, judging a relay based on exit policy is a slippery slope
we don't want to go down.  We never claim to make using Tor alone safer
than using the Internet at large.  Whether the creep is at Starbucks
sniffing the wifi or running a relay is irrelevant to me.  Encouraging
people to use encrypted communications, the https everywhere firefox
extension, and learn to be more secure online are some of our goals.
The Tor Browser Bundle, while still a work in progress, is the best way
to protect novice users and get them safer than they are without Tor.



Yes, this is the obvious, sensible response.

Since this come from someb...@torproject.org, can I assume the adults have 
spoken and I can move on ?  Or are we still trying to convince people that 
they might not know what every possible use of ToR is, and looks like ?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-12 Thread Gregory Maxwell
On Sat, Feb 12, 2011 at 5:35 PM, John Case c...@sdf.lonestar.org wrote:
 That's fair.

 Instead of stressing the boundless set of pros, I will discuss a single,
 specific pro, and that is the idea that open, arbitrary systems provide a
 foundation upon which to build surprising and unexpected combinations.

 I wouldn't think that a group of technical people, much less a group of
 technical people immersed in network architectures would need this explained
 to them.

 Then again, I didn't think we woud be referring to /etc/services as hard,
 physical laws, either.  You live and learn, I guess.


This argument has fallen on deaf ears because in isolation it produces
nonsense results. That it is continually pressed while the substantive
arguments required to actually make a decision are ignored by the
people promoting this view makes them look like fanatics, at least in
my eyes. (And I was happily ignoring the thread until someone
commented that they had be swayed by the continued arguments, which
I'd not been bothering to refute)


If we were to take this argument openness/flexibility argument as hard
doctrine why would we not provide a facility for Tor to execute
arbitrary code shipped over from arbitrary users?  That would make tor
a truly open, arbitrary system.

Of course we don't do this because it's highly insecure and no one
would run a tor daemon which did that. So in practice we must weigh
the benefits of the speculative features mobile code many provide vs
the costs of turning tor into a opensource botnet, and in _this_
analysis the openness argument provides little input, because it's
the _specific_ consequences of the decision which determine the best
outcome.

The pro you're proposing is not useful as a _specific_ pro, because
it fails completely as a specific _pro_ as the absolute majority of
the infinite number of arguments I could make under it would actually
be really bad ideas: It doesn't really do much to accurately separate
the space of ideas into good and bad ones— especially in the domain of
security a lot of bad software is bad because it was too flexible for
the wrong users.

Flexibility is also sometimes mutually exclusive and what you exclude
(no buffer overflows!) can be as much of a feature as what you include
(run arbitrary code!).  As Geoff points out— this class of argument is
fundamentally a pascal's wager.  Which God? Worshiped how? Which
flexibility? Implemented at what cost?

I grant that flexibility is a useful general principle, but one so
general that it would never be useful in making a decision by itself.
Not a specific benefit.  For example, I'd use the flexibility to say
that this policy should not be implemented in every single client,
which take forever to upgrade, but instead should be signaled via
directories— so that the decision could be change quickly and easily.

So back to the case in question: We must look at the cost of excluding
an infinitesimal piece of flexibility (the conceivable uses of four
non-exit flagged exit nodes, is I believe what this policy would
impact today), vs a tiny piece of social policy (if you want to run an
exit node to :80, you're going to allow it to exit to :443 as well or
no one will use it, thus subsidizing port 443 capacity on the back of
port 80 capacity) and decreased incentive for tor users to run
personal exit filters (which would result in network partitioning and
reduced anonymity for everyone if widespread).

Like my botnet toy example, — the more flexible system would be
preferred all things equal, but all things are almost never equal and
so we fall to the simple balance of specific benefits. And it's very
difficult to argue for specific benefits resulting from permitting
nodes to exit to commonly non-encrypted ports while rejecting their
commonly encrypted counterparts, while the specific benefits of
rejecting these nodes are easily explained (if not all that
significant).


One of the side effects of the suggestion of this policy which I was
not expecting is that it caused some participants on this list to
expose their previously held mistaken belief that the Tor network's
technical inability to prevent exit sniffing was actually an explicit
approval of this unethical and probably unlawful activity. To the
extent that policy which is overtly sniffing hostile, if actually
ineffectual at preventing any sniffing, makes it more clear that this
activity is considered regrettable and not permitted then that can
only be a good thing as well.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-11 Thread John Case


Hello Gregory,

On Fri, 11 Feb 2011, Gregory Maxwell wrote:


As far as I can tell this is a completely spurious strawman argument.

Where is this person with a legitimate reason why they can allow :80
and not :443? What is their reason?



I am trying to suggest two things here:

1) We cannot know the answer to this (what is their reason, what is their 
scenario, what is their threat model)


2) There are uses of ToR, and roles that ToR plays, that are very, very 
different than the official, accepted use model.


So let me back up one step here and state some things that I am sorry are 
not obvious:


- you have no idea what kind of things run over ports like 21, 23, 80, and 
110.  I know what _I_ use them for, and you know what _you_ use them for, 
and we know what's in /etc/services, but you are forgetting that anything 
can run over a TCP port.


- you have no idea what particular network activity, or services provided, 
is considered suspicious in a particular setting.  _I_ can run services on 
arbitrary ports and so can you, and so can most anybody, but you are 
forgetting that there are threat models wherein this is not the case.


- you have no idea what type of overall architecture someone has fit their 
ToR use into.  _I_ use ToR in the typical, accepted fashion, and so does 
most everyone else, but perhaps ToR is used as simply one component, and 
maybe not even the most important component, of a larger network 
architecture.


- you have no idea what the overall goal of sending and receiving traffic 
on the ToR network is for a person or group.  _I_ use it like you do, to 
perform normal Internet functions anonymously - but others may have very 
different needs, ranging from simple traffic generation to plausible 
deniability.


What frustrates me so much about this whole conversation is that the above 
items (and we could all come up with many more) are true in general, but 
are never more true than they are related to ToR.  Further, since we're 
all technical people here, it should be second nature to us that the POWER 
of an open system are the arbitrary combinations that arise from a simple, 
unrestrictive ruleset.  There are a small number of easily identifiable 
cons to letting an exit run like this, and there are an unlimited number 
of unknown pros to letting an exit run like this.  You should know this.




If anyone was showing up expressing this as a serious constraint with
a legitimate cause, then it might be reasonable to reconsider.
Certainly if there were many of them.



I am suggesting fringe, and possibly temporary use cases that imply actors 
that probably aren't going to pop in to talk shop.  I'll say it again:


There are a small number of easily identifiable cons to letting an exit 
run like this, and there are an unlimited number of unknown pros to 
letting an exit run like this.  You should know this.




Tor already has a great many tweaks and heuristics. Why are you not
complaining about the exit load-balancing heuristic that denies the
exit flag to nodes which don't exit to at least a /8 of several
important ports?  It impacts a great many more nodes.  Or why not
complain about the countermeasures against one hop usage that make
nodes seizure targets and takes an unfair share of the bandwidth?



Forgive me, but this is a near-perfect example of a straw man logical 
fallacy.  My not protesting these other items (which I may or may not 
support) does not suggest that my above argument is faulty.




Will this contingent next be advocating not blacklisting exits known
to insert malware or advertisements in the traffic because without
this activity the exit operator can not afford to keep their exit
going?

If running an exit is somehow so imposing on someone that they feel
the need to impose bizarre (even inexplicable) restrictions on its
behaviour then they really should be helping the tor network in some
other way — by running a bridge or a regular middle node. Or finding
something else to do with their scarce resources.  Tor needs people's
help, sure, but it doesn't demand their blood. Why not let the rich
white people in the north that you seem to have so much disdain for
take a larger part of the exit burden?



Again, you are limiting your view to free people who are donating 
resources for the world.  Yes, that is how I am involved in ToR, and how 
you are involved in ToR, but you completely discount the people running 
ToR nodes on the other side of the sword, so to speak.  They're not in it 
for you and me, and they're not in it for the EFF - they have an immediate 
communications need that has both purpose and constraints that you and I 
cannot imagine.





I personally run a node with an oddball exit policy (well, it's down
at the moment due to a hardware failure). I wouldn't have any issue
explaining the exit policy to someone who asked. (basically I have a
node that exists to a collection of hand selected 'read only'
websites, plus tcp dns to some dns 

Re: Is gatereloaded a Bad Exit?

2011-02-11 Thread Geoff Down


On Fri, 11 Feb 2011 17:44 +, John Case c...@sdf.lonestar.org
wrote:
 
 There are a small number of easily identifiable cons to letting an exit 
 run like this, and there are an unlimited number of unknown pros to 
 letting an exit run like this.  You should know this.

 Leaving aside the original question of whether to BadExit GateReloaded,
 I'm afraid this argument is without merit.
A rational decision can only be made on the basis of that for which you
have evidence. There will always be an infinite number of things for
which you have no evidence, but which you can imagine. Your argument
appears to be equivalent to Pascal's argument for worshipping God -
which has always been open to the rejoinder which god, worshipped
how?.
 Until you can quantify the pros, it is only rational to behave on the
 basis of the quantifiable cons.
GD

-- 
http://www.fastmail.fm - Does exactly what it says on the tin

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-11 Thread Scott Bennett
 On Mon, 31 Jan 2011 11:30:20 -0500 Andrew Lewman and...@torproject.org
wrote:
In my opinion, judging a relay based on exit policy is a slippery slope
we don't want to go down.  We never claim to make using Tor alone safer
than using the Internet at large.  Whether the creep is at Starbucks
sniffing the wifi or running a relay is irrelevant to me.  Encouraging
people to use encrypted communications, the https everywhere firefox
extension, and learn to be more secure online are some of our goals.
The Tor Browser Bundle, while still a work in progress, is the best way
to protect novice users and get them safer than they are without Tor.

I personally run encrypted services on unencrypted ports, like 25, 80,
143, 110, etc.  It's just a port number and only convention says port
80 has to be for http only.  

If people start doing deep packet inspection to enforce 80 is really
http or running filters in some misguided attempt to block bad
things through Tor, then those are reasons to 'badexit' relays.  There
are some obvious ways we can detect traffic manipulation through Tor
relays.  Today, we do detect them and badexit those relays.

If we're going to start censoring Tor exits based on impressions, we
might as well start blocking Tor relays that are rumoured to be run by
national intelligence agencies, criminal organizations, martians, and
other people we might not like.  In fact, we might as well go back to
the original model of every Tor relay operator has met and gained
Roger's trust. 

I want a diverse set of Tor relays. If people don't want to trust
relays based on whatever heuristics they want to use, great, use
ExcludeNodes in your torrc.  Don't punish everyone based on rumors and
impressions.

 Hear, hear!  Thank you, Andrew, for putting it so clearly in accord
with previously posted policy statements by the tor development team,
both on the tor lists and on the tor project's web site.  I don't know
what triggered Mike's dictatorial moment, but I hope he comes to his
senses quickly (if he hasn't already; I confess I'm hundreds of messages
behind in my email at present).
 Your remark about the Roger trusts 'em model does still seem to
apply to the assignment of Authority flags.  Given the current directory
protocol(s) and distribution structure, I'm fine with that arrangement for
the time being for Authority flagging, but not for BadExit flagging for
the reasons you posted, as well as a few posted by others, including myself.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-10 Thread grarpamp
Been a fencesitter on this since posting the note about recording
traffic that helped send this thread over the top. For once, I'm
in agreement with Scott :) (and others)

Badexiting based on exit policy seems rather silly as it will prevent
nothing. And because of that, doing so is security theatre. Which
sends both the project into questionable practice and the user into
misplaced trust. If anything, the user should be educated instead.

Nothing keeps an operator from dropping a gig split between 80 and
443. And if you defend against their rate limiting of 443 down to
a meg, at best you've doubled their cost per eligible volume. No
big deal. And due to typical protocol distribution on the open
internet, if you force all operators to a fixed selection of 'ideal'
policies, the cost per volume doesn't really change beyond that.
It also seems the distribution of traffic around the nodes, operators,
and globe won't change either... a broadbase level up is more likely,
so there's no win there.

Further, take the top fifth of exits by bandwidth, even take them
all. No one can provably say whether or not any of them are recording
traffic. And only a fool would trust an operator's (or shill's)
statements to the contrary. The only way one can be sure is to stand
watch over the node itself, in person.

And lastly, some hat (or entity) packet groping their exit, or
handfull of same, is the least of your worries. They're just a
nuisance. It's the PA's and GPA's that one should be worried about.
Seems everyone forgot that. They will always follow bandwidth,
oppurtunity, interesting things and anomalies. Per the distribution
notes above, and the architecture of Tor, exit policy doesn't seem
likely to be interesting to a GPA.

Badexit should be reserved only for those exits that are physically
broken... modification of expected cleartext, corrupted ciphertext,
certificate games, packet mischief, dns issues, upstream path issues,
etc.

The right thing to do with unprovable consipiracy theories such as
exit sniffing, is to push it out to userland and provide tools for
the user to manage it as desired.

Some have suggested various node ranking metrics... Country,
'suspicious' strings in the nickname, 'suspicious' CIDR blocks,
PTR's, ISP's etc, the preselected metrics and exit set of the
'badtornodes' guy, Scott and others, node keysigning parties,
importable wiki [.onion] node config lists, and so on.

Exit policy is currently at the operator's pleasure, need and design.
If exit policy mandates will help solve some Tor scalability or
attack vector issues, in a substantive way, from an engineering
standpoint, fine. But please, don't claim it makes users any more
'safe' from sniffing.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-10 Thread Mike Perry
Thus spake grarpamp (grarp...@gmail.com):
 
 Exit policy is currently at the operator's pleasure, need and design.
 If exit policy mandates will help solve some Tor scalability or
 attack vector issues, in a substantive way, from an engineering
 standpoint, fine. But please, don't claim it makes users any more
 'safe' from sniffing.

I've already addressed the rest of your points.  For the record,
you're just strawmanning here. I never made the claim this was safer.

I cited several engineering reasosn why this type of exit policy
is a pain for us.

I've also made the claim that there is no rational reason to operate
an exit in this fashion, other than to log/monitor/censor traffic or
because of undesirable network conditions, and no one has disputed
that claim.

Morphium gave us a reason, even if it was rather petty and irrational,
so he won't be getting the badexit flag. But for my vote in the
process, any other relay that does not give a reason for this policy,
or that can not give us one because of no contact info, will be
getting the flag. The same goes for exits that we detect RSTing 443,
or censoring 443, or throttling 443, or doing anything else to TLS
connections.

But I only have one vote out of three. Roger and Peter are free to
change their minds. Perhaps we should bring more people on board in
this process, too.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpG9O9HmMzFj.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-02-10 Thread John Case


On Thu, 10 Feb 2011, Mike Perry wrote:


Exit policy is currently at the operator's pleasure, need and design.
If exit policy mandates will help solve some Tor scalability or
attack vector issues, in a substantive way, from an engineering
standpoint, fine. But please, don't claim it makes users any more
'safe' from sniffing.


I've already addressed the rest of your points.  For the record,
you're just strawmanning here. I never made the claim this was safer.

I cited several engineering reasosn why this type of exit policy
is a pain for us.



I think these reasons should be worked around or ignored.

I think you, and others on that side of this argument have a very, very 
myopic view of the constraints and non-technical decisions that go into 
running a particular node - exit or not.


Rich white people in the north can just trade some dollars for 
co-location, exercise their free speech, and argue back at the police, as 
their equals, when they come calling.


That's not the case for everyone - and even in those rich, white 
countries, there are political and economic ramifications for running a 
Tor node, exit or otherwise, that seem to have not occurred to you.




I've also made the claim that there is no rational reason to operate
an exit in this fashion, other than to log/monitor/censor traffic or
because of undesirable network conditions, and no one has disputed
that claim.



No, there is no _technical_ reason to operate an exit in this fashion. 
There is no reason, from a myopic, borderline autistic view of the 
externalities involved, to run an exit in this fashion.


However, I can think of many, many reasons to:

- run a node with no contact information
- run a node with an odd set of exits
- run a node with plain (unencrypted) exits
- run a node with odd (non standard port) exits

You have absolutely NO FUCKING IDEA what a node has been deployed for, who 
is using it, and how many layers of subterfuge are being employed between 
the external function and the true function underneath.


Further, the power of a platform such as ToR is in the arbitrary extension 
of the base set of capabilities, and many, many different models of 
subterfuge, trust, anonymity, etc., can then be built - at arbitrary 
levels of complexity - and you are chopping those off at the knees.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-10 Thread Anders Andersson
On Fri, Feb 11, 2011 at 6:58 AM, John Case c...@sdf.lonestar.org wrote:
 No, there is no _technical_ reason to operate an exit in this fashion. There
 is no reason, from a myopic, borderline autistic view of the externalities
 involved, to run an exit in this fashion.

 However, I can think of many, many reasons to:

 - run a node with no contact information
 - run a node with an odd set of exits
 - run a node with plain (unencrypted) exits
 - run a node with odd (non standard port) exits

Can you please list some of the reasons for doing all of this at the
same time? Since you reply here I assume you have read the posts in
this very long thread, and Mike have already countered the given
reasons, from a non-technical perspective. It would be nice if you
could give an example that have not already been brought up, since you
seem to know some.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-10 Thread Gregory Maxwell
On Fri, Feb 11, 2011 at 12:58 AM, John Case c...@sdf.lonestar.org wrote:

 I think these reasons should be worked around or ignored.

 I think you, and others on that side of this argument have a very, very
 myopic view of the constraints and non-technical decisions that go into
 running a particular node - exit or not.

 Rich white people in the north can just trade some dollars for co-location,
 exercise their free speech, and argue back at the police, as their equals,
 when they come calling.

 That's not the case for everyone - and even in those rich, white countries,
 there are political and economic ramifications for running a Tor node, exit
 or otherwise, that seem to have not occurred to you.


As far as I can tell this is a completely spurious strawman argument.

Where is this person with a legitimate reason why they can allow :80
and not :443? What is their reason?

If anyone was showing up expressing this as a serious constraint with
a legitimate cause, then it might be reasonable to reconsider.
Certainly if there were many of them.

If you want myopia, you need to look no further than this obsession
with some speculative hypothetical universe where someone is going to
be gravely injured by the tor network not choosing to use their :80
but not :443 exit. There are a great many ways to contribute to the
tor network, so it isn't even as though their contributions are being
turned away completely.

Tor already has a great many tweaks and heuristics. Why are you not
complaining about the exit load-balancing heuristic that denies the
exit flag to nodes which don't exit to at least a /8 of several
important ports?  It impacts a great many more nodes.  Or why not
complain about the countermeasures against one hop usage that make
nodes seizure targets and takes an unfair share of the bandwidth?

Why are you not outraged about the hundreds and hundreds of bridge
operators who are getting no use _at all_ because their identities are
being held in reserve in order to build up decent pools of bridges for
use with differentiated distribution?

Will this contingent next be advocating not blacklisting exits known
to insert malware or advertisements in the traffic because without
this activity the exit operator can not afford to keep their exit
going?

If running an exit is somehow so imposing on someone that they feel
the need to impose bizarre (even inexplicable) restrictions on its
behaviour then they really should be helping the tor network in some
other way — by running a bridge or a regular middle node. Or finding
something else to do with their scarce resources.  Tor needs people's
help, sure, but it doesn't demand their blood. Why not let the rich
white people in the north that you seem to have so much disdain for
take a larger part of the exit burden?

 No, there is no _technical_ reason to operate an exit in this fashion. There
 is no reason, from a myopic, borderline autistic view of the externalities
 involved, to run an exit in this fashion.

 However, I can think of many, many reasons to:

 - run a node with no contact information
 - run a node with an odd set of exits
 - run a node with plain (unencrypted) exits
 - run a node with odd (non standard port) exits

I personally run a node with an oddball exit policy (well, it's down
at the moment due to a hardware failure). I wouldn't have any issue
explaining the exit policy to someone who asked. (basically I have a
node that exists to a collection of hand selected 'read only'
websites, plus tcp dns to some dns servers, and a number of other
assorted things that I know should will be free of complaint
generating outcomes)

But I don't care that it barely gets used as an exit (due to various
technical details), nor would I care if tor changed in a way that
would prevent it from it ever being used as an exit.

Do you really think that someone who doesn't provide contact
information is more likely to care about this sort of thing than me?



 You have absolutely NO FUCKING IDEA what a node has been deployed for, who is 
 using it, and how many layers of subterfuge are  being employed between the 
 external function and the true function underneath.

You could employ that same argument against _every_ _single_ technical
or policy decision in the design and operation of the tor software and
network. It's an information free argument.

Ultimately the tor network is _not_ anyone's personal spy-business
playground. It provides a real anonymity service to a great many
people, and real censorship avoidance to a great many people.  If it's
also useful for things outside of this, then great, but you don't get
to argue in favour of these non-primary uses when you can't even
disclose what they are.

There are too many real constraints on Tor already for people to worry
about imaginary much less unimaginable ones!

at arbitrary levels of complexity - and you are chopping those off at the 
knees.

I am greatly disappointed by Tor's failure to steganographically 

Re: Is gatereloaded a Bad Exit?

2011-02-09 Thread Scott Bennett
 On Mon, 31 Jan 2011 11:09:51 +0100 Olaf Selke olaf.se...@blutmagie.de
wrote:
On 31.01.2011 10:52, morphium wrote:
 
 As I stated above, it's not a good idea to BadExit them, because it
 puts more load on the servers, that DO support https i.e. - and makes
 them slower.

I disagree Morphium's position mainly for the same reasons Mike and Jake
already pointed out. If the operators really care about their nodes
they'll certainly contact Tor admins. Damaging Tor's reputation in the
public due to exit sniffing imo is much more worse than loosing some
bandwidth.

 I think Mike's and Jake's implied claims of clairvoyance regarding
an exit node operator's intentions in writing the exit policy for his/her
node call for some supporting evidence.  Instead, one of them has already
admitted that they have no evidence because they have no way to detect any.

 And I don't see ANY point in BadExit'ing 5 random Nodes, suggesting
 that no one could capture your unencrypted traffic now.

those five high bandwidth nodes with suspicious exit policies haven't
been chosen randomly.

 Olaf, you run four high-capacity exit nodes, each of which allows
unencrypted exits.  You have a longstanding capacity record, so it wouldn't
be random at all to choose to flag your nodes as bad exits; rather, it would
simply be recognizing that you have the ability to sniff a significant portion
of all unencrypted exit traffic.  To avoid having your four nodes flagged as
bad exits, perhaps you should block port 80 and all the thousands of other
ports that are usually unencrypted.
 Now, you might point out that Mike's criterion for avoiding BadExit
flagging is that you can continue to do your sniffing of unencrypted exit
traffic, provided you also allow encrypted exits on a handful of ports.
 This is all silliness.  The tor project until very lately has always
promoted end user understanding and responsibility.  Now the project *appears*
to be undergoing a major philosophical change toward nannying the tor user
community, a direction I find very unappealing, to say the least.  Horrifying
might be a more appropriate word.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-09 Thread Scott Bennett
 On Mon, 31 Jan 2011 11:17:27 +0100 morphium morph...@morphium.info
wrote:
2011/1/31 Olaf Selke olaf.se...@blutmagie.de:
 I disagree Morphium's position mainly for the same reasons Mike and Jake
 already pointed out. If the operators really care about their nodes
 they'll certainly contact Tor admins. Damaging Tor's reputation in the
 public due to exit sniffing imo is much more worse than loosing some
 bandwidth.

Sniffing is worse than loosing bandwidth, right. But sniffing still
occurs, we just don't know where. And we can't tell wether they did.
I think concluding only 80: he is sniffing is wrong (and even would
be 80 and 443: he is a good guy).
And if those nodes really are ran by the bad guys, I don't think
it's a problem for them now to setup a new node on a new subnet that
allows their old ports + 443 and continue sniffing.

 Exactly, on all points.

I can not see the Tor project won _anything_ with this decision.

 Well, they've made clear that they know what's good for exit operators
better than those exit operators do.  Perhaps they should arrange ISP choices,
contracts, and bill payment methods for those exit operators next?


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-09 Thread Scott Bennett
 On Sat, 29 Jan 2011 23:23:55 -0800 Mike Perry mikepe...@fscked.org
wrote:
Thus spake Eddie Cornejo (corn...@gmail.com):

  I believe that allowing these nodes sends a message that we are OK
  with people monitoring plaintext traffic, because it is anonymized. We
  have never been OK with this.
=20
 Ok, I accept that this might send a message to 50ish nodes (if you ban
 all 50+) but if someone was so inclined they could still do this by
 allowing encrypted traffic and throttling it/blocking it outside of
 TOR (transparent proxy perhaps?) I predict this is worse as the user
 client will believe node A will honestly relay encrypted traffic and
 will select it on this basis, only to find their connection is slow or
 doesn't fully connect. Admitedly, this won't be a huge problem unless
 a good number of nodes started doing this.

We can detect nodes that fail encrypted connections. We currently scan
for failure of port 443. We also detect throttling by virtue of our bw
authorities measuring using 443.

443 is the second-most trafficed port by byte on the Tor network,
occupying only ~1% of the traffic. If stingy exit nodes really want to

 And port 80 is the highest-traffic port.  Exits to port 80 allow
unencrypted access to webmail sites with user ids and passwords transmitted
in the clear.  Using your argument, all nodes allowing exits to port 80
that do not eliminate all webmail sites by way of their exit policies should
be flagged as BadExit.  That would certainly be a strange way to put tor into
the dustbin of computer history, but it would indeed accomplish that.

waste hours to pinch pennies from their malicious exit policy, they

 gatereloaded is among the top 60 nodes in the network by traffic capacity
and is unlikely therefore to be pinching pennies on it.  It is a valuable
entry and middle node.  If the operator wishes to offer in addition some exit
services for a handful of ports that are unlikely to trigger problems from
the operator's ISP, that is merely added gravy for tor users.

can try crafting a throttling policy that we can't detect. Seems like
there are better ways to spend their time. Like reading other people's
email.

So no, I'm not terribly concerned about second-order effects of this.

  People use plaintext at their own risk, and yes, they should know
  better, but this does NOT mean that we are comfortable feeding them to
  the wolves.
=20
 My argument is that you're not identifying wolves. If you were serious
 about identifying wolves then could I suggest you create some dummy
 accounts, send your password through all exit nodes individually and
 see which of your accounts are accessed. This would positively
 identify wolves. All you're achieving by soley looking at exit
 policies is identifying things that may or may not be wolves and
 ignoring the larger body of exit nodes that may or may not include
 wolves. I submit your testing is flawed.

We're not trying to identify wolves. We are sending a message to the
community.
=20
  If said exits are really interested in helping, they should alter
  their exit policy to allow encryption and then rekey. They will be
  banned by identity key, not by IP. Rekeying without fixing the exit
  policy will just result in IP bans.
=20
 I'm not sure I'm comfortable with dictating how an exit nodes
 exitpolicy should be defined. Each policy should be up to the exit
 node owner to decide. Just my 2c

 I second that discomfort.  I further note that the tor project team
has repeatedly claimed that there is an ongoing shortage of exit nodes,
although it has not often noted for which ports there is a shortage.  One
of the selling points for potential exit operators is that the exit operator
can set an exit policy of his/her choice.  The ability to do that means the
operator can evaluate his/her own situation vis-a-vis his/her ISP, data rate
capacity, etc. and decide upon a policy that will not cause him/her a level
of grief unacceptable to him/her.

Not really. In reality, it's up to those who write the code to decide
what is available and how it works ;). Welcome to The Golden Path.

At some point, we intend to shrink exit policies further as Tor scales
to more decentralized schemes. Those exit policies will likely be
represented as bits representing subsets of ports. When that time
comes, we will very likely combine encrypted and unencrypted versions
of ports together, removing this option entirely.

 Here you threaten that the tor project would someday severely reduce
the control that an exit operator would have over his/her node.  How would
such a reduction help to entice more people to run exit nodes?  How would
such a reduction not cause at least some existing exit operators to stop
offering exit services because they could no longer set an exit policy that
they found acceptable in their circumstances?


  Scott Bennett, Comm. ASMELG, CFIAG

Re: Is gatereloaded a Bad Exit?

2011-02-01 Thread Orionjur Tor-admin
mi nt wrote:
 On Mon, Jan 31, 2011 at 08:39:29PM -0500, Gregory Maxwell wrote:

 The chances of having your traffic logged by malicious operators, known or 
 unknown, allowing traffic on 443 or not, can be minimized by not using 
 Tor.
 Just saying! :-)
 
  -- 
 m...@sdf.lonestar.org
 SDF Public Access UNIX System - http://sdf.lonestar.org
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 
The chances of having your traffic logged by anyone, known or
unknown, allowing traffic on 443 or not, can be minimized by not using
Internet! :)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-01 Thread Matthew

 Currently, 5 nodes exit to *only* plaintext ports for web and email.

There are about 50 others that exit to the plaintext versions for web
or email.

I don't see what the issue is here.  Not all e-mail services support 
HTTPS.  Or are you saying: if there is a HTTPS option as for Gmail the 50 
nodes choose the HTTP option instead?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-01 Thread Matthew

 We already filter exit nodes based on suspicion by defaulting

ExcludeSingleHopRelays to true (the reason for that being that single
hop exits are more likely to be passively monitoring data).
Can you please say a little more about this for all of us who are not au 
fait with all command options?

We also
invalidated the trotsky relays without proof of malicious intent (a
suspected sybil attack when over seven hundred identical relays
appeared out of the blue).

Could you please say a little more about this case and sybil attack[s]?


On Sun, Jan 30, 2011 at 10:58 AM, Orionjur Tor-admin
tor-ad...@orionjurinform.com  wrote:

Damian Johnson wrote:

The five relays Mike mentioned have been flagged as BadExits [1].
Adding them to your ExcludeExitNodes isn't necessary. -Damian

[1] https://trac.torproject.org/projects/tor/wiki/badRelays

On Sun, Jan 30, 2011 at 1:33 AM, Jan Weiherj...@buksy.de  wrote:

At some point, we intend to shrink exit policies further as Tor scales
to more decentralized schemes. Those exit policies will likely be
represented as bits representing subsets of ports. When that time
comes, we will very likely combine encrypted and unencrypted versions
of ports together, removing this option entirely.


Sounds good. But what to do for now? Just creating a list of nodes which
only allow unencrypted traffic and put them into the ExcludeExitNodes
list? Shouldnt these nodes be excluded by default?
I'm unsure. I want to stress again that I'm not saying any operator is
doing anything evil, but I think we should find some way to avoid nodes
which have such weird exitpolicies.

best regards,
Jan
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/



Is it possible to publish a list of bad-exits for copypasting it to
/etc/torrc in addition to the above-mentioned list?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-01 Thread Damian Johnson
 Can you please say a little more about this for all of us who are not au
 fait with all command options?

Relays have an option to allow single hop connections through them,
which is off by default. If relays *do* set this and allow single hop
circuits through themselves then Tor clients by default avoid them for
*any* usage in their circuits. Here's the description from the man
page [1]:

ExcludeSingleHopRelays 0|1

This option controls whether circuits built by Tor will include relays
with the AllowSingleHopExits flag set to true. If
ExcludeSingleHopRelays is set to 0, these relays will be included.
Note that these relays might be at higher risk of being seized or
observed, so they are not normally included. Also note that relatively
few clients turn off this option, so using these relays might make
your client stand out. (Default: 1)

In short, there's no proof that these relays are bad but we avoid them
because they're riskier (hopefully the parallels with the current
discussion are obvious).

 Could you please say a little more about this case and sybil attack[s]?

A sybil attack is where a huge number of relays operated by a single
entity appear with the goal of doing bad things (for instance
operating the first and last circuit hops to correlate traffic).
Again, during that incident we didn't have proof that the seven
hundred Trotsky relays appearing out of the blue were bad - we
invalidated them because they were highly suspicious, lacked contact
information, and had no family entry set.

In both of those cases we took harder measures based on suspicion of
malicious intent than we are with these plaintext-only relays. Despite
its name, the BadExit flag really isn't a big whoop - the relays are
still perfectly usable for guard and middle hop positions. They just
aren't seeing exit traffic any longer. -Damian

[1] https://www.torproject.org/docs/tor-manual.html
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-01 Thread Joseph Lorenzo Hall
On Tue, Feb 1, 2011 at 6:31 PM, Damian Johnson atag...@gmail.com wrote:

 In both of those cases we took harder measures based on suspicion of
 malicious intent than we are with these plaintext-only relays. Despite
 its name, the BadExit flag really isn't a big whoop - the relays are
 still perfectly usable for guard and middle hop positions. They just
 aren't seeing exit traffic any longer. -Damian

Slightly OT: Is there a place that explains what the various flags
mean?  I've wondered what they mean while looking at torstatus and
metrics.torproject.org... and the manuals don't go into that.

best, Joe

-- 
Joseph Lorenzo Hall
ACCURATE Postdoctoral Research Associate
UC Berkeley School of Information
Princeton Center for Information Technology Policy
http://josephhall.org/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-02-01 Thread Damian Johnson
https://gitweb.torproject.org/tor.git/blob/HEAD:/doc/spec/dir-spec.txt#l1285

On Tue, Feb 1, 2011 at 4:10 PM, Joseph Lorenzo Hall joeh...@gmail.com wrote:
 On Tue, Feb 1, 2011 at 6:31 PM, Damian Johnson atag...@gmail.com wrote:

 In both of those cases we took harder measures based on suspicion of
 malicious intent than we are with these plaintext-only relays. Despite
 its name, the BadExit flag really isn't a big whoop - the relays are
 still perfectly usable for guard and middle hop positions. They just
 aren't seeing exit traffic any longer. -Damian

 Slightly OT: Is there a place that explains what the various flags
 mean?  I've wondered what they mean while looking at torstatus and
 metrics.torproject.org... and the manuals don't go into that.

 best, Joe

 --
 Joseph Lorenzo Hall
 ACCURATE Postdoctoral Research Associate
 UC Berkeley School of Information
 Princeton Center for Information Technology Policy
 http://josephhall.org/
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread morphium
 Do you have a rational reason why we should allow people to carry the
 unencrypted version of a service but not the encrypted one, other than
 Well, they could be bad actors even with a good policy!

As I stated above, it's not a good idea to BadExit them, because it
puts more load on the servers, that DO support https i.e. - and makes
them slower.
Those weren't 10K/s Nodes you blacklisted there, they've been really
fast Exit Nodes.
And I don't see ANY point in BadExit'ing 5 random Nodes, suggesting
that no one could capture your unencrypted traffic now.

This is just further slowing down the whole Tor-Network.

morphium
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Olaf Selke
On 31.01.2011 10:52, morphium wrote:
 
 As I stated above, it's not a good idea to BadExit them, because it
 puts more load on the servers, that DO support https i.e. - and makes
 them slower.

I disagree Morphium's position mainly for the same reasons Mike and Jake
already pointed out. If the operators really care about their nodes
they'll certainly contact Tor admins. Damaging Tor's reputation in the
public due to exit sniffing imo is much more worse than loosing some
bandwidth.

 And I don't see ANY point in BadExit'ing 5 random Nodes, suggesting
 that no one could capture your unencrypted traffic now.

those five high bandwidth nodes with suspicious exit policies haven't
been chosen randomly.

Olaf
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread morphium
2011/1/31 Olaf Selke olaf.se...@blutmagie.de:
 I disagree Morphium's position mainly for the same reasons Mike and Jake
 already pointed out. If the operators really care about their nodes
 they'll certainly contact Tor admins. Damaging Tor's reputation in the
 public due to exit sniffing imo is much more worse than loosing some
 bandwidth.

Sniffing is worse than loosing bandwidth, right. But sniffing still
occurs, we just don't know where. And we can't tell wether they did.
I think concluding only 80: he is sniffing is wrong (and even would
be 80 and 443: he is a good guy).
And if those nodes really are ran by the bad guys, I don't think
it's a problem for them now to setup a new node on a new subnet that
allows their old ports + 443 and continue sniffing.

I can not see the Tor project won _anything_ with this decision.

morphium
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Eddie Cornejo
 I can not see the Tor project won _anything_ with this decision.

I agree 100%. By all means try to identify those that are trying to
misuse the privilege of running an exit node by other means - but
solely looking at exit policies is not sufficient. All you're stating
to the community is do it my way or the highway and honestly, aren't
we better than that?

Blacklist them, sure, after you have *good* reason.

WRT grouping 80 and 443 later on, I'm totally against that as it
doesn't give operators the freedom to select what goes through their
nodes. If I was still running a node I'd disconnect it after you
implemented this 'feature' - purely in protest.

-- 
Eddie Cornejo

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GIT d? s: a C+++ UL+++ P++ L++ E- W+ N- o K- w++
O M-- V PS+ PE Y PGP++ t 5 X+ R tv-- b+ DI D++
G e++ h r+++ y
--END GEEK CODE BLOCK--
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread morphium
2011/1/31 Mike Perry mikepe...@fscked.org:
 So when I said in my earlier post that we don't need exit capacity
 that bad, I meant it. Thanks, but no thanks. You are contributing
 negative productivity, and none of the non-bitorrenting exits really
 will notice your absence in terms of load. Please direct yourself
 towards the nearest forbidden lake.

So, to summarize that, you are saying to every operator that is not
your opinion: We (as the Tor project) don't need you.

Thats... pretty arrogant.

Or am I mis-understanding you?

Best regards,
morphium
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Aplin, Justin M

On 1/31/2011 6:05 AM, morphium wrote:

2011/1/31 Mike Perrymikepe...@fscked.org:

So when I said in my earlier post that we don't need exit capacity
that bad, I meant it. Thanks, but no thanks. You are contributing
negative productivity, and none of the non-bitorrenting exits really
will notice your absence in terms of load. Please direct yourself
towards the nearest forbidden lake.

So, to summarize that, you are saying to every operator that is not
your opinion: We (as the Tor project) don't need you.

Thats... pretty arrogant.


I'm not sure how that's arrogant at all. These nodes aren't 
exit-flagged, have suspicious (though maybe not damning) exit 
policies, and have no or fake contact information. They're either 
malicious or horribly configured, and in either case there's no way to 
get in touch with the operators. Strong odds are they're doing the 
network (and its goals) more harm than good, so they're removed from it 
(note that there was no IP ban, so the operators are free to return to 
the network if they so choose). Honestly, it seems to me that this is 
the Tor Project equivalent of a slap on the wrist; a much stronger, more 
irrational decision could certainly have been elicited.


I'm operating under the assumption that we run our nodes to further the 
goals of the Tor Project and help the community. I'm not sure why 
removing exits with idiotic or malicious configurations (until the 
operator either fixes them or explains themselves) is a bad thing.


~Justin Aplin

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Orionjur Tor-admin
morphium wrote:
 2011/1/31 Olaf Selke olaf.se...@blutmagie.de:
 I disagree Morphium's position mainly for the same reasons Mike and Jake
 already pointed out. If the operators really care about their nodes
 they'll certainly contact Tor admins. Damaging Tor's reputation in the
 public due to exit sniffing imo is much more worse than loosing some
 bandwidth.
 
 Sniffing is worse than loosing bandwidth, right. But sniffing still
 occurs, we just don't know where. And we can't tell wether they did.
 I think concluding only 80: he is sniffing is wrong (and even would
 be 80 and 443: he is a good guy).
 And if those nodes really are ran by the bad guys, I don't think
 it's a problem for them now to setup a new node on a new subnet that
 allows their old ports + 443 and continue sniffing.
 
 I can not see the Tor project won _anything_ with this decision.
 
 morphium
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 


And, then, it seems to me that it is no a big problem to exclude
packages with encrypted information from sniffing logs for people who
setting up nodes for that evil purposes.
But, in the other side, it seems to me that guys which set up so such
fast nodes are not full lamers. And they probably can read this mailing
list and are able to answer us, am I wrong?
As concern to me, if I read some bad about my nodes here I will write
something to answer, no?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Orionjur Tor-admin
Mike Perry wrote:
 Thus spake morphium (morph...@morphium.info):
 
 Do you have a rational reason why we should allow people to carry the
 unencrypted version of a service but not the encrypted one, other than
 Well, they could be bad actors even with a good policy!
 As I stated above, it's not a good idea to BadExit them, because it
 puts more load on the servers, that DO support https i.e. - and makes
 them slower.
 Those weren't 10K/s Nodes you blacklisted there, they've been really
 fast Exit Nodes.
 And I don't see ANY point in BadExit'ing 5 random Nodes, suggesting
 that no one could capture your unencrypted traffic now.

 This is just further slowing down the whole Tor-Network.
 
 This is not true. The exit nodes in question account for ~6% of the
 network Exit-flagged bandwidth. That is, *IF* they actually had the
 Exit flag (they did not), they would have provided 6% of that
 bandwidth. They do not have the Exit flag, however, so they provide
 0%.

How is it possible that they configured their nodes as exits and defined
their exit policies but those nodes didn't work as exits in practice?
Are those nodes misconfiured?  So, how those can sniffing exit-traffic?
But I can confirm that somedays ago I have used oompaloompa and
oompaloompa2 for connecting to the LiveJournal.
I know it becouse their ip (and an ip of Olaf's node too) was banned by
the LJ team as bots and I sent to the LJ team report for unblocking
that ips as belonging not to bots but to exit-nodes of the Tor.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread tor
On 31/01/2011 12:37, Orionjur Tor-admin wrote:

 But, in the other side, it seems to me that guys which set up so such
 fast nodes are not full lamers. And they probably can read this mailing
 list and are able to answer us, am I wrong?

They may or may not read this list. Has anyone taken pro-active steps to
try and contact the people running these exits? They may not publish
their contact details in the directory, but we have their IP
addresses... Which means we can probably figure out how to contact at
least some of them...

Assuming the worse, and disregarding volunteer exit bandwidth without
some proper investigation, doesn't sound like a good approach to me...

-- 
Mike Cardwell https://grepular.com/  https://twitter.com/mickeyc
Professional  http://cardwellit.com/ http://linkedin.com/in/mikecardwell
PGP.mit.edu   0018461F/35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F



signature.asc
Description: OpenPGP digital signature


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Jan Weiher

 Assuming the worse, and disregarding volunteer exit bandwidth without
 some proper investigation, doesn't sound like a good approach to me...


Nobody does that, but I think its fair to say that if you want that
somebody can contact you about your node, you publish your contact
details in the directory. And if you enter wrong contact infos, you made
clear that you dont want to be contacted. I think marking them as bad
and waiting for the admin to show up is the easiest way to go. Lets call
it a cry-test. Just wait until someone shows up and cries.

best regards,
Jan

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread tor
On 31/01/2011 13:11, Jan Weiher wrote:

 Assuming the worse, and disregarding volunteer exit bandwidth without
 some proper investigation, doesn't sound like a good approach to me...
 
 Nobody does that, but I think its fair to say that if you want that
 somebody can contact you about your node, you publish your contact
 details in the directory. And if you enter wrong contact infos, you made
 clear that you dont want to be contacted.

I don't think you can make that assumption. Maybe they just didn't want
their email address to be public for spam bots to harvest. Maybe they're
just used to not publishing their email address unless they really have
to. Safest course of action: Figure out how to contact them, and ask them.

 I think marking them as bad
 and waiting for the admin to show up is the easiest way to go. Lets call
 it a cry-test. Just wait until someone shows up and cries.

It's the easiest, but the least efficient route. Somebody mentioned 6%
of Exit bandwidth. How much effort would be spent trying to increase the
capacity of the network by 6% via coding and/or publicity? Probably a
lot more effort than would be required to try and contact these Exit
owners and maybe retain the bandwidth.

You make it sound as though running an Exit node is a privilege and that
people who run them somehow owe the Tor project? They're volunteering
bandwidth, for the benefit of the network. If you don't treat volunteers
well, they will go elsewhere, and the people who lose out are the people
who use the Tor network, not the people who previously ran Exit nodes.

Exit bandwidth is a scarce and valuable resource, and should be treated
as such.

-- 
Mike Cardwell https://grepular.com/  https://twitter.com/mickeyc
Professional  http://cardwellit.com/ http://linkedin.com/in/mikecardwell
PGP.mit.edu   0018461F/35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F



signature.asc
Description: OpenPGP digital signature


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Jan Weiher

 You make it sound as though running an Exit node is a privilege and that
 people who run them somehow owe the Tor project? They're volunteering
 bandwidth, for the benefit of the network. 

This was not my intention. But I think it should be possible to ask a
volunteer about what he is doing? And creating a freemail acc somewhere
isnt that hard I think? I'm not saying that they should put their real
name / email there. But at least some way to contact them would probably
make this whole discussion completely useless.

They are still working for the benefit of the network, but not as exit
at the moment.

best regards,
Jan
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Chuck Filson
I don't think that tor should be dictating what ports must or must not be 
open on an exit node. This is after all a voluntary operation. 

If people want to send unencrypted data, they will do so with or without these 
5 nodes. Shutting them or others down as exits will not make up for users that 
don't bother to secure their data.

I will do my little bit to show my disagreement with the actions that have been 
taken by taking 'goodeid' offline until such time as cooler heads resolve this 
situation without jumping to unfounded conclusions.

Chuck

On 2011-01-30, at 11:54 PM, Mike Perry wrote:

 Thus spake morphium (morph...@morphium.info):
 
 2011/1/30 Damian Johnson atag...@gmail.com:
 The five relays Mike mentioned have been flagged as BadExits [1].
 Adding them to your ExcludeExitNodes isn't necessary. -Damian
 
 That was really dumb, as it puts a lot more load on the Nodes that
 support encryption, and, as was mentioned before, _every_ operator
 could sniff.
 
 There is no rational reason to carry the unencrypted version of a
 service but not the encrypted version, except to log data. So unless
 these 5 nodes were all just playing their favorite lotto numbers in
 their exit policy, they were being jerks.
 
 I am aware that every operator can sniff regardless of policy. Every
 operator can do a lot of things. The fact that even good exit policies
 can do bad things is not a necessary condition for allowing bad exit
 policies.
 
 Frankly, this in-your-face selfishness of *only* accepting the
 unencrypted data because fuck it, that's the only data I want to log
 just rubs me the wrong way. Not one of those 5 had legit contact info.
 Two of them actually bothered to fill out the field, but filled it in
 with a fake email address. 
 
 All of them just wreak of disrespect for us, for the network, and for
 our users. Essentially, it's that disrespect that earned them the
 BadExit flag.
 
 If this means that sending the message to them means we take out a few
 irrational actors in the process, that's fine. I don't much want
 people playing lotto in their exit policies either. They can stick to
 middle node and put their lotto numbers in their contact info. I
 promise that it will work just as well.
 
 I will change my Exit Policy now to something like 80, 6667, 21 and if
 you BadExit it, you'll loose another fast node.
 
 *sigh*. And so the cat herding begins. Are you really protesting this
 policy decision with civil disobedience? Really? Fighting for Great
 Justice everywhere, eh?
 
 Do you have a rational reason why we should allow people to carry the
 unencrypted version of a service but not the encrypted one, other than
 Well, they could be bad actors even with a good policy!
 
 Or is it just because you feel that someone told to do something and
 you don't much like being told what to do, regardless of the
 reasoning?
 
 I forbid you from jumping in the nearest lake!
 
 I also forbid you from taking your freshly-gimped exit node in for a
 swim with you!
 
 
 -- 
 Mike Perry
 Mad Computer Scientist
 fscked.org evil labs

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Andrew Lewman
In my opinion, judging a relay based on exit policy is a slippery slope
we don't want to go down.  We never claim to make using Tor alone safer
than using the Internet at large.  Whether the creep is at Starbucks
sniffing the wifi or running a relay is irrelevant to me.  Encouraging
people to use encrypted communications, the https everywhere firefox
extension, and learn to be more secure online are some of our goals.
The Tor Browser Bundle, while still a work in progress, is the best way
to protect novice users and get them safer than they are without Tor.

I personally run encrypted services on unencrypted ports, like 25, 80,
143, 110, etc.  It's just a port number and only convention says port
80 has to be for http only.  

If people start doing deep packet inspection to enforce 80 is really
http or running filters in some misguided attempt to block bad
things through Tor, then those are reasons to 'badexit' relays.  There
are some obvious ways we can detect traffic manipulation through Tor
relays.  Today, we do detect them and badexit those relays.

If we're going to start censoring Tor exits based on impressions, we
might as well start blocking Tor relays that are rumoured to be run by
national intelligence agencies, criminal organizations, martians, and
other people we might not like.  In fact, we might as well go back to
the original model of every Tor relay operator has met and gained
Roger's trust. 

I want a diverse set of Tor relays. If people don't want to trust
relays based on whatever heuristics they want to use, great, use
ExcludeNodes in your torrc.  Don't punish everyone based on rumors and
impressions.

-- 
Andrew
pgp 0x74ED336B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Gregory Maxwell
On Mon, Jan 31, 2011 at 11:30 AM, Andrew Lewman and...@torproject.org wrote:
[snip]
 If we're going to start censoring Tor exits based on impressions, we
 might as well start blocking Tor relays that are rumoured to be run by
 national intelligence agencies, criminal organizations, martians, and
 other people we might not like.  In fact, we might as well go back to
 the original model of every Tor relay operator has met and gained
 Roger's trust.

I'd disappointed that you're not responding to the argument I initially posed.

We should do this not because the node looks suspicious but because we
want to shape the behaviour of exit operators.
There are legitimate reasons why tor supports an operator controlled
exit policy,  but no real suggestion has been made for a _legitimate_
reason to allow 80 and block 443.

So we make carrying 443 part of the price of being a port 80 exit.  So
this exclusion shouldn't be seen as something that will eliminate bad
guys,  — it clearly won't — but will instead force them to behave more
like we want them to, by adding 443 capacity and making tor faster for
https users— as part of the price of operating an exit.

The best argument against this would be that it makes it harder for
people to spot these probably-bad nodes based on the exit policy and
exclude them for themselves.  I think this downside is inconsequential
because almost no one is actually going to do this, and anyone that
sophisticated can be trusted to protect themselves in other ways.

Tor has a great many behaviour shaping incentives in the protocol and
implementation.  This would not stand out as too unusual.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Curious Kid
- Original Message 

 From: Gregory Maxwell gmaxw...@gmail.com
 To: or-talk@freehaven.net
 Sent: Mon, January 31, 2011 6:47:37 PM
 Subject: Re: Is gatereloaded a Bad Exit?
 
 There are legitimate reasons why tor supports an  operator controlled
 exit policy,  but no real suggestion has been made  for a _legitimate_
 reason to allow 80 and block 443.

Is it possible that some people operate in a port-restricted environment or 
that 
port 443 is throttled by some ISPs?

My real question concerns the scenario in which a user happens upon an exit 
that 
blocks HTTPS and uses that exit to access a website that uses a combination of 
HTTP and HTTPS. The HTTPS portion would be forced through a different exit, and 
the server may be programmed to notice the difference and break by design.

For example, say you want to login somewhere, and the server notes that you 
appear to be logging in from France. The HTTPS portion appears to come from the 
United States. That disparity triggers an I'm sorry... message.



  
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Mike Perry
Thus spake Curious Kid (letsshareinformat...@yahoo.com):

 - Original Message 
 
  From: Gregory Maxwell gmaxw...@gmail.com
  To: or-talk@freehaven.net
  Sent: Mon, January 31, 2011 6:47:37 PM
  Subject: Re: Is gatereloaded a Bad Exit?
  
  There are legitimate reasons why tor supports an  operator controlled
  exit policy,  but no real suggestion has been made  for a _legitimate_
  reason to allow 80 and block 443.
 
 Is it possible that some people operate in a port-restricted environment or 
 that 
 port 443 is throttled by some ISPs?

These people should not be Tor nodes. A good portion of the public
network is on port 443. If you can't reach that port, lots of circuits
clients try to build through you will fail. Failed circuits have a
negative impact on latency, esp if they were not pre-launched
predicted circuits. Byzantine circuit failures also make it difficult
to differentiate between overloaded, CPU-bound nodes, malicious nodes,
and just plain janky nodes - all of which we would like to
be able to take into account for future load balancing decisions.
Ex: https://trac.torproject.org/projects/tor/ticket/1984

 My real question concerns the scenario in which a user happens upon
 an exit that blocks HTTPS and uses that exit to access a website
 that uses a combination of HTTP and HTTPS. The HTTPS portion would
 be forced through a different exit, and the server may be programmed
 to notice the difference and break by design.

 For example, say you want to login somewhere, and the server notes
 that you appear to be logging in from France. The HTTPS portion
 appears to come from the United States. That disparity triggers an
 I'm sorry... message.

This is an excellent point, and yet another reason why we should not
allow asinine exit policies unless there is good reason for them. So
far there is still no rational reason posted why you should allow 80
and not 443 and still be considered a desirable Tor node to use. Just
a lot of handwaving about the freedom to be a jerk, and fears over
shunning volunteers who run fast exits to grab passwords. 

Moreover, I strongly believe that we should be working on converging
our choices of exit policy down to fewer options for many practical
engineering and usability reasons. Exit policies already take up an
absurd amount of capacity in terms of descriptor and even
networkstatus storage. If we can standardize on a group or groups of
ports (such as the Vidalia GUI attempts to do), we can describe sane
exit policies using much fewer bytes. And we can load balance more
intelligently among exits with standard policies, as I mentioned
before.

So to me, there are plenty of reasons to do this, and not a whole lot
of reasons not to do it, other than handwavy notions that it
shouldn't matter, when in fact as you have pointed out, it does
matter.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpAQeXL2YOCP.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Mike Perry
Thus spake t...@lists.grepular.com (t...@lists.grepular.com):

 On 31/01/2011 13:11, Jan Weiher wrote:
 
  Assuming the worse, and disregarding volunteer exit bandwidth without
  some proper investigation, doesn't sound like a good approach to me...
  
  Nobody does that, but I think its fair to say that if you want that
  somebody can contact you about your node, you publish your contact
  details in the directory. And if you enter wrong contact infos, you made
  clear that you dont want to be contacted.
 
 I don't think you can make that assumption. Maybe they just didn't want
 their email address to be public for spam bots to harvest. Maybe they're
 just used to not publishing their email address unless they really have
 to. Safest course of action: Figure out how to contact them, and ask them.

3/5 of the nodes provide contact info. 2/5 are run by Joe Blow, and
the other is run by nobody at example.com

Just for grins, I did in fact send an email to Mr. Blow's gmail
address. It of course bounced. Which means it is available on gmail if
he wanted it, but he didn't even bother to create it. He's obviously
real intent on being a member of the community.

But don't worry, at some point Mr. Blow et al will realize that their
packet captures stopped grabbing passwords and are only seeing
encrypted middle and guard node traffic. They'll probably show up
then, proclaiming their innocence from the rooftops, demanding they be
allowed to help the network.

But do feel free to spend your time going above and beyond, trying to
track our 4 heroes down before then. I'm sure they're well worth your
time and effort to outreach. Pick a nice Saturday afternoon and spend
it calling ISPs and NOCs trying frantically to get in touch with our
unjustly punished martyrs here... Heck, take a day off work!

  I think marking them as bad
  and waiting for the admin to show up is the easiest way to go. Lets call
  it a cry-test. Just wait until someone shows up and cries.
 
 It's the easiest, but the least efficient route. Somebody mentioned 6%
 of Exit bandwidth. How much effort would be spent trying to increase the
 capacity of the network by 6% via coding and/or publicity? Probably a
 lot more effort than would be required to try and contact these Exit
 owners and maybe retain the bandwidth.
 
 You make it sound as though running an Exit node is a privilege and that
 people who run them somehow owe the Tor project? They're volunteering
 bandwidth, for the benefit of the network. If you don't treat volunteers
 well, they will go elsewhere, and the people who lose out are the people
 who use the Tor network, not the people who previously ran Exit nodes.
 
 Exit bandwidth is a scarce and valuable resource, and should be treated
 as such.

It's not true exit bandwidth here. It's janky bandwidth with lots of
bad properties, such as the tendency to break mixed-mode websites as
Curious Kid pointed out, and the load balancing issues I mentioned. We
should do the same for all http-but-not-https exits for this reason.

Again, non-bittorrenting exits have a real hard time attracting enough
80+443 traffic. All of our metrics indicate they are not overloaded
the vast majority of the time, and tend to end up pushing half of the
bytes/sec as their bitorrent-supporting peers. There is plenty of
spare port 80 capacity. The network is bottlenecked in other ways
(probably actually in the queues of overloaded middle and guard nodes,
which these jerks would be more directly assisting).

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpV80CfRkECf.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread tor
On 01/02/2011 00:00, Mike Perry wrote:

 I don't think you can make that assumption. Maybe they just didn't want
 their email address to be public for spam bots to harvest. Maybe they're
 just used to not publishing their email address unless they really have
 to. Safest course of action: Figure out how to contact them, and ask them.
 
 3/5 of the nodes provide contact info. 2/5 are run by Joe Blow, and
 the other is run by nobody at example.com
 
 Just for grins, I did in fact send an email to Mr. Blow's gmail
 address. It of course bounced. Which means it is available on gmail if
 he wanted it, but he didn't even bother to create it. He's obviously
 real intent on being a member of the community.

If valid contact info is important/necessary, the Tor project should
enforce it, and perform periodic email address validation in order to
allow routers to be Exits. If it's not important/necessary than I see no
valid reason to complain about it not existing.

 But don't worry, at some point Mr. Blow et al will realize that their
 packet captures stopped grabbing passwords and are only seeing
 encrypted middle and guard node traffic. They'll probably show up
 then, proclaiming their innocence from the rooftops, demanding they be
 allowed to help the network.

The above may or may not be true. Would be nice to see some evidence. Or
at least some evidence of somebody trying to find the truth.

 But do feel free to spend your time going above and beyond, trying to
 track our 4 heroes down before then. I'm sure they're well worth your
 time and effort to outreach. Pick a nice Saturday afternoon and spend
 it calling ISPs and NOCs trying frantically to get in touch with our
 unjustly punished martyrs here... Heck, take a day off work!

Do you find that being condescending is a good way to get people to
agree with you? I tend to find it fosters disrespect.

 I think marking them as bad
 and waiting for the admin to show up is the easiest way to go. Lets call
 it a cry-test. Just wait until someone shows up and cries.

 It's the easiest, but the least efficient route. Somebody mentioned 6%
 of Exit bandwidth. How much effort would be spent trying to increase the
 capacity of the network by 6% via coding and/or publicity? Probably a
 lot more effort than would be required to try and contact these Exit
 owners and maybe retain the bandwidth.

 You make it sound as though running an Exit node is a privilege and that
 people who run them somehow owe the Tor project? They're volunteering
 bandwidth, for the benefit of the network. If you don't treat volunteers
 well, they will go elsewhere, and the people who lose out are the people
 who use the Tor network, not the people who previously ran Exit nodes.

 Exit bandwidth is a scarce and valuable resource, and should be treated
 as such.
 
 It's not true exit bandwidth here. It's janky bandwidth with lots of
 bad properties, such as the tendency to break mixed-mode websites as
 Curious Kid pointed out, and the load balancing issues I mentioned. We
 should do the same for all http-but-not-https exits for this reason.

If exiting port 80 but not port 443 causes problems for Tor, then Tor
should be updated so you can't offer one without the other. This is a
problem with Tor, not with Tor exit operators.

-- 
Mike Cardwell https://grepular.com/  https://twitter.com/mickeyc
Professional  http://cardwellit.com/ http://linkedin.com/in/mikecardwell
PGP.mit.edu   0018461F/35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F



signature.asc
Description: OpenPGP digital signature


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Mike Perry
Thus spake t...@lists.grepular.com (t...@lists.grepular.com):

  But don't worry, at some point Mr. Blow et al will realize that their
  packet captures stopped grabbing passwords and are only seeing
  encrypted middle and guard node traffic. They'll probably show up
  then, proclaiming their innocence from the rooftops, demanding they be
  allowed to help the network.
 
 The above may or may not be true. Would be nice to see some evidence. Or
 at least some evidence of somebody trying to find the truth.

The truth here is that these nodes are not behaving in a way that
encourages trust in their usage. All we ask is that they adjust their
exit policies to allow encryption, but there is no way to ask them
this, so they are badexited until such time as there is a way to
communicate with them. They will remain valid middle and guard nodes
until they rekey with policy supporting encryption (and the Exit
flag).

  But do feel free to spend your time going above and beyond, trying to
  track our 4 heroes down before then. I'm sure they're well worth your
  time and effort to outreach. Pick a nice Saturday afternoon and spend
  it calling ISPs and NOCs trying frantically to get in touch with our
  unjustly punished martyrs here... Heck, take a day off work!
 
 Do you find that being condescending is a good way to get people to
 agree with you? I tend to find it fosters disrespect.

You're right. I apologize for my tone to you. 

I am merely frustrated with the amount of mental energy devoted to
what so plainly appears to me as a simple policy: If you carry the
unencrypted version of the service, you should carry the encrypted
version. I am just getting frustrated with the length of this thread
and still the lack of any valid, rational reason why this policy
itself is an unjust one.

It seems pretty plain to me that we're actually worried about offending
the sensibilities of people who for some unknown (but rationally
obvious) reason refuse to carry encrypted exit traffic.

So the idea that we should devote yet more effort to catering to
people whose motivations are extremely suspect (and who seemingly have
no real interest in being members of our community) is causing me to
balk.

  Exit bandwidth is a scarce and valuable resource, and should be treated
  as such.
  
  It's not true exit bandwidth here. It's janky bandwidth with lots of
  bad properties, such as the tendency to break mixed-mode websites as
  Curious Kid pointed out, and the load balancing issues I mentioned. We
  should do the same for all http-but-not-https exits for this reason.
 
 If exiting port 80 but not port 443 causes problems for Tor, then Tor
 should be updated so you can't offer one without the other. This is a
 problem with Tor, not with Tor exit operators.

Sure. Perhaps we will include such a patch as part of
https://trac.torproject.org/projects/tor/ticket/2395. Or, perhaps it
will just be a second-order effect that means you're just not used as
often because you're not a true Exit (which is already the case for
these nodes to some extent).

But again, I think this is more of a long-term idea.

In the meantime, we can enforce this policy with code on the exit
scanning end, by emailing everyone with valid contact info who exits
to 80 but not 443, to start (as that is the most obviously broken
case).


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgp3Q4FGYxP93.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread mi nt
 These people should not be Tor nodes.

Mike, I respectfully disagree. Anyone willing to allow traffic should be 
node. The tor project homepage makes no 'rules' when it 
comes to running a node. If you're willing to allow any traffic you're a 
suitable candidate, apparently in the opinion of the creators of that site 
and in mine. The fact is that some people are going to do things they 
shouldn't over *any* node, not just these that APPEAR suspicious. We have 
no idea why they're restricting access to those ports, even if it's 
just for logging what others are doing - they're still providing access. 
I'll use those nodes to read news articles and such, who cares if they log 
that? Users should understand what makes them secure when it comes to 
things they're doing across the internet - tor project or anyone 
participating should have absolutely zero responsibility, or concern, over 
traffic leaving the network. You can't protect people from their own 
stupidity. If someone insists on using insecure methods they're simply 
going to do it. Let's say I was a malicious node operator and I wanted to log a 
bunch of 
traffic -- I'm going to set up a node to allow all traffic and log what I 
can to avoid suspicion and the very thing that is happening on this list!. 
This is simple logic and I'm sure it's not lost on our *supposed* malicious 
node owners that we're currently discussing. The 
point I'm trying to make here is that even if these guys are just saying 
'fuck it, I'll just allow 80 and telnet so I can grab accounts' that's no 
reason to ban them. Users should be responsible for their own security 
*outside* of the network (and internally when it relates to activities on 
hidden services for that matter) - we shouldn't assume people are too 
stupid to know not to login to their bank(for example) over tor using 
plaintext. I say keep them around and use the hell out of them. If 
they're logging my hentai pictures well then more power to them - I hope 
they enjoy!

I realize my opinion doesn't mean a lot as I'm fairly new to 
this list  but there it is. (I'm not one of these exit operators btw as I 
would certainly allow all traffic)

-- 
m...@sdf.lonestar.org
SDF Public Access UNIX System - http://sdf.lonestar.org
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread mi nt
Furthermore I would like to add that if I ran an exit I *might* just not 
put contact info on it. I don't see the issue unless it's rejecting 
traffic and I'm screwing up the network. Even if it was I'd figure it out 
eventually. I wouldn't want you weirdos emailing me anyway ;)

-- 
m...@sdf.lonestar.org
SDF Public Access UNIX System - http://sdf.lonestar.org
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Gregory Maxwell
On Mon, Jan 31, 2011 at 8:08 PM, mi nt m...@sdf.lonestar.org wrote:
 These people should not be Tor nodes.

 Mike, I respectfully disagree. Anyone willing to allow traffic should be
 node. The tor project homepage makes no 'rules' when it
 comes to running a node. If you're willing to allow any traffic you're a
 suitable candidate, apparently in the opinion of the creators of that site
 and in mine. The fact is that some people are going to do things they
[snip]


The website also advises that sniffing exit traffic is potentially a crime.

(http://www.torproject.org/eff/tor-legal-faq.html.en#ExitSnooping)

So I very much think you are mistaking the perspective of the website
operators. Please don't confuse the realistic position of We can't
prevent this from happening from the we approve of this activity.

Can you exactly point out places where the website seems to suggest
that anything goes is actually permitted?  Any such text should be
corrected, because it's not correct. It isn't permitted to do these
things, to the extent that the tor developers and community can stop
these activities they will (but the extent is very limited).


On Mon, Jan 31, 2011 at 8:10 PM, mi nt m...@sdf.lonestar.org wrote:
 Furthermore I would like to add that if I ran an exit I *might* just not
 put contact info on it. I don't see the issue unless it's rejecting
 traffic and I'm screwing up the network. Even if it was I'd figure it out
 eventually. I wouldn't want you weirdos emailing me anyway ;)


The chances of receiving email from the weirdos here can be minimized
by unsubscribing from this mailing list.
Just saying! :-)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread John Case


On Sun, 30 Jan 2011, Christopher A. Lindsey wrote:


Could it be that these nodes have set these policies to reduce the
possibility of being approached because of illegal activity passing
through them?  It could be they believe that they're helping with the
project and limiting their exposure as bad guys wouldn't use clear
text.



Sorry, Chris - the mob has spoken.

Further common sense - like suggesting that we have no idea what kind of 
traffic flows over an open port 21/23/etc., or proposing that these may be 
internal tools for specific populations that we know nothing about, will 
not be useful.


But here's a snarky thought for you - what if my exit policy is:

21
23
80
110
143
8999  (Brodos Crypto Trade Protocol)

Now what ?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Orionjur Tor-admin
Mike Perry wrote:
 Thus spake Eddie Cornejo (corn...@gmail.com):
 
 Forgive my ignorance but this seeks rather knee-jerk to me. Maybe I'm
 missing something.
 
 Yeah, I believe you're missing the fact that these ports also contain
 plaintext passwords than can be used to gain access to information on
 these and other accounts that may or may not have ever traveled over
 tor. That is the difference.
 

And what is a difference in using the Tor and not using the Tor when you
don't use SSL?
Only that in the last time your password etc. can see your ISP or
governmental systems like european Echelon, Russian SORM and etc.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Jan Weiher

 At some point, we intend to shrink exit policies further as Tor scales
 to more decentralized schemes. Those exit policies will likely be
 represented as bits representing subsets of ports. When that time
 comes, we will very likely combine encrypted and unencrypted versions
 of ports together, removing this option entirely.
 

Sounds good. But what to do for now? Just creating a list of nodes which
only allow unencrypted traffic and put them into the ExcludeExitNodes
list? Shouldnt these nodes be excluded by default?
I'm unsure. I want to stress again that I'm not saying any operator is
doing anything evil, but I think we should find some way to avoid nodes
which have such weird exitpolicies.

best regards,
Jan
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Damian Johnson
The five relays Mike mentioned have been flagged as BadExits [1].
Adding them to your ExcludeExitNodes isn't necessary. -Damian

[1] https://trac.torproject.org/projects/tor/wiki/badRelays

On Sun, Jan 30, 2011 at 1:33 AM, Jan Weiher j...@buksy.de wrote:

 At some point, we intend to shrink exit policies further as Tor scales
 to more decentralized schemes. Those exit policies will likely be
 represented as bits representing subsets of ports. When that time
 comes, we will very likely combine encrypted and unencrypted versions
 of ports together, removing this option entirely.


 Sounds good. But what to do for now? Just creating a list of nodes which
 only allow unencrypted traffic and put them into the ExcludeExitNodes
 list? Shouldnt these nodes be excluded by default?
 I'm unsure. I want to stress again that I'm not saying any operator is
 doing anything evil, but I think we should find some way to avoid nodes
 which have such weird exitpolicies.

 best regards,
 Jan
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Robert Ransom
On Sun, 30 Jan 2011 10:33:31 +0100
Jan Weiher j...@buksy.de wrote:

  At some point, we intend to shrink exit policies further as Tor scales
  to more decentralized schemes. Those exit policies will likely be
  represented as bits representing subsets of ports. When that time
  comes, we will very likely combine encrypted and unencrypted versions
  of ports together, removing this option entirely.

 Sounds good. But what to do for now? Just creating a list of nodes which
 only allow unencrypted traffic and put them into the ExcludeExitNodes
 list? Shouldnt these nodes be excluded by default?

They will be now.

The exit scanner detects such nodes, and Mike Perry has just made it
easier to mark nodes with suspicious policies with the BadExit flag in
the future:

https://gitweb.torproject.org/torflow.git/commitdiff/2320961a05e3277534887c7f76036c826a879230


Robert Ransom


signature.asc
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread morphium
2011/1/30 Damian Johnson atag...@gmail.com:
 The five relays Mike mentioned have been flagged as BadExits [1].
 Adding them to your ExcludeExitNodes isn't necessary. -Damian

That was really dumb, as it puts a lot more load on the Nodes that
support encryption, and, as was mentioned before, _every_ operator
could sniff.

I will change my Exit Policy now to something like 80, 6667, 21 and if
you BadExit it, you'll loose another fast node.

Bye!
morphium
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Jacob Appelbaum
On 01/30/2011 01:56 AM, morphium wrote:
 2011/1/30 Damian Johnson atag...@gmail.com:
 The five relays Mike mentioned have been flagged as BadExits [1].
 Adding them to your ExcludeExitNodes isn't necessary. -Damian
 
 That was really dumb, as it puts a lot more load on the Nodes that
 support encryption, and, as was mentioned before, _every_ operator
 could sniff.

Hardly.

An important difference is that some people specifically create exit
policies to attract traffic worth passively sniffing. In any case, it
hardly puts more load on nodes that support encryption unless they
also are supporting the unencrypted protocols in the first place.

 
 I will change my Exit Policy now to something like 80, 6667, 21 and if
 you BadExit it, you'll loose another fast node.

It sounds like there's now a known reason for your exit policy, I doubt
anyone would bad exit you.

All the best,
Jake
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Christopher A. Lindsey




On Sat, 2011-01-29 at 22:45 -0800, Mike Perry wrote: 
 Thus spake Eddie Cornejo (corn...@gmail.com):
 
  Forgive my ignorance but this seeks rather knee-jerk to me. Maybe I'm
  missing something.
 
 Yeah, I believe you're missing the fact that these ports also contain
 plaintext passwords than can be used to gain access to information on
 these and other accounts that may or may not have ever traveled over
 tor. That is the difference.
 
  Finally there is no way that an exit node can directly affect the mode
  choices by a client. Ie, apart from a particular node existing, there
  is no way that a node could force a user to use it.
 
 See above.
  
  Therefore I submit that having these nodes, whether they are overtly
  recording traffic or not, does not result in any harm to the TOR
  network. In fact, their presence lessens the burden on the TOR network
  as they are providing much needed bandwidth.
 
 We don't need bandwidth that bad.
  
  So, what's the threat? Why are you considering banning these nodes
  when, by all accounts, I cannot see them having a negative impact on
  the network as a whole (in fact, it's probably a positive influence)
 
 I believe that allowing these nodes sends a message that we are OK
 with people monitoring plaintext traffic, because it is anonymized. We
 have never been OK with this.
 
 People use plaintext at their own risk, and yes, they should know
 better, but this does NOT mean that we are comfortable feeding them to
 the wolves.
 
 If said exits are really interested in helping, they should alter
 their exit policy to allow encryption and then rekey. They will be
 banned by identity key, not by IP. Rekeying without fixing the exit
 policy will just result in IP bans.
 

Could it be that these nodes have set these policies to reduce the
possibility of being approached because of illegal activity passing
through them?  It could be they believe that they're helping with the
project and limiting their exposure as bad guys wouldn't use clear
text.

Take care,
Chris


signature.asc
Description: This is a digitally signed message part


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread mi nt
On Sat, Jan 29, 2011 at 07:46:20PM +0100, Jan Weiher wrote:
 Hi,
 
 while scrolling through the tor status page (torstatus.blutmagie.de), I
 stumpled upon the following node (the reason why it came to my eye was
 the long uptime):
 
 gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2 2A70 654D 3B92
 
 This node looks suspicious to me, because there is no contact info given
 and the exit policy allows only unencrypted traffic:
 
 reject 0.0.0.0/8:*
 reject 169.254.0.0/16:*
 reject 127.0.0.0/8:*
 reject 192.168.0.0/16:*
 reject 10.0.0.0/8:*
 reject 172.16.0.0/12:*
 reject 194.154.227.109:*
 accept *:21
 accept *:80
 accept *:110
 accept *:143
 reject *:*
 
 Am I missing something? I'm wondering why the status page lists this
 node as non-exit, because it clearly allows outgoing traffic on ports
 21,80,110 and 143?
 I'm aware of the fact that it is not recommended to use tor without
 additional encryption, but some users do. And I dont see any reason for
 only allowing unencrypted traffic than snooping?
 Can anyone clearify this? If the admin of this node is on the list,
 would he please explain this situation?
 
 best regards,
 Jan
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

I don't see why any of this really matters. Anyone running tor should have 
the good sense to realize that if you login to webmail.example.com over 
plaintext then the node operator could grab your details. It states this 
repeatedly on torproject IIRC. Furthermore anything really important like 
financial logins are typically done over SSL anyway. If some guy gets his 
facebook account hijacked because he didn't read the FAQ I don't see the 
issue. Just my measly two cents.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Orionjur Tor-admin
Damian Johnson wrote:
 The five relays Mike mentioned have been flagged as BadExits [1].
 Adding them to your ExcludeExitNodes isn't necessary. -Damian
 
 [1] https://trac.torproject.org/projects/tor/wiki/badRelays
 
 On Sun, Jan 30, 2011 at 1:33 AM, Jan Weiher j...@buksy.de wrote:
 At some point, we intend to shrink exit policies further as Tor scales
 to more decentralized schemes. Those exit policies will likely be
 represented as bits representing subsets of ports. When that time
 comes, we will very likely combine encrypted and unencrypted versions
 of ports together, removing this option entirely.

 Sounds good. But what to do for now? Just creating a list of nodes which
 only allow unencrypted traffic and put them into the ExcludeExitNodes
 list? Shouldnt these nodes be excluded by default?
 I'm unsure. I want to stress again that I'm not saying any operator is
 doing anything evil, but I think we should find some way to avoid nodes
 which have such weird exitpolicies.

 best regards,
 Jan
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 


Is it possible to publish a list of bad-exits for copypasting it to
/etc/torrc in addition to the above-mentioned list?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Damian Johnson
There's no point in putting relays flagged as BadExit into your torrc
since your client will already avoid them. However, if you want a
listing of the bad exits then it's available at:
https://trac.torproject.org/projects/tor/wiki/badRelays

As for the previous discussion of if plaintext-only exits warrant the
flag, here's my bit to add to the discussion:

We already filter exit nodes based on suspicion by defaulting
ExcludeSingleHopRelays to true (the reason for that being that single
hop exits are more likely to be passively monitoring data). We also
invalidated the trotsky relays without proof of malicious intent (a
suspected sybil attack when over seven hundred identical relays
appeared out of the blue). I'm a little in favor of flagging
plaintext-only exits, though I agree that it sucks when flagging
doesn't have a smoking gun.

Cheers! -Damian

On Sun, Jan 30, 2011 at 10:58 AM, Orionjur Tor-admin
tor-ad...@orionjurinform.com wrote:
 Damian Johnson wrote:
 The five relays Mike mentioned have been flagged as BadExits [1].
 Adding them to your ExcludeExitNodes isn't necessary. -Damian

 [1] https://trac.torproject.org/projects/tor/wiki/badRelays

 On Sun, Jan 30, 2011 at 1:33 AM, Jan Weiher j...@buksy.de wrote:
 At some point, we intend to shrink exit policies further as Tor scales
 to more decentralized schemes. Those exit policies will likely be
 represented as bits representing subsets of ports. When that time
 comes, we will very likely combine encrypted and unencrypted versions
 of ports together, removing this option entirely.

 Sounds good. But what to do for now? Just creating a list of nodes which
 only allow unencrypted traffic and put them into the ExcludeExitNodes
 list? Shouldnt these nodes be excluded by default?
 I'm unsure. I want to stress again that I'm not saying any operator is
 doing anything evil, but I think we should find some way to avoid nodes
 which have such weird exitpolicies.

 best regards,
 Jan
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



 Is it possible to publish a list of bad-exits for copypasting it to
 /etc/torrc in addition to the above-mentioned list?
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Jan Weiher

 I'm aware of the fact that it is not recommended to use tor without
 additional encryption, but some users do. And I dont see any reason for
 only allowing unencrypted traffic than snooping?

[...]

 I don't see why any of this really matters. Anyone running tor should have 
 the good sense to realize that if you login to webmail.example.com over 
 plaintext then the node operator could grab your details. It states this 
 repeatedly on torproject IIRC. Furthermore anything really important like 
 financial logins are typically done over SSL anyway.

Yes, we all know that, hopefully the average user knows that. But in my
opinion this has nothing to do with having an exitpolicy that attracts
unencrypted traffic. Just the fact that everyone (hopefully) knows that
the traffic can be recorded, it does not make it better if I do? I would
have asked the specific operator about his exitpolicy, but as I noted,
there is no contact info given, which makes it even more suspicious. Not
the fact that there is no contact info - there are many nodes without
contact infos - but I thought the combination is odd.

 If some guy gets his facebook account hijacked because he didn't read
 the FAQ I don't see the issue.

I totally disagree. Of course, you could argue that it's his fault and
so forth. I would agree to that, but on the other hand, should accept to
make this even easier? Additionally, if some guy gets his account
somewhere hacked after having used tor, it looks bad. And at that point,
the user does not really care about I told you so!!!. He is going to
tell his friends I used tor and my account got hacked..

These nodes are marked as BadExits for now, which does not hurt, because
if the operators of these nodes care about Tor, they are going to ask
why is my node marked as bad exit and you could have a discussion
about it. The operators can tell us why they choose these exitpolicy or
we can help to improve them. If those nodes - which have sometimes been
up for several months - silently disappear, I know what I'll think.

best regards,
Jan
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Mike Perry
Thus spake morphium (morph...@morphium.info):

 2011/1/30 Damian Johnson atag...@gmail.com:
  The five relays Mike mentioned have been flagged as BadExits [1].
  Adding them to your ExcludeExitNodes isn't necessary. -Damian
 
 That was really dumb, as it puts a lot more load on the Nodes that
 support encryption, and, as was mentioned before, _every_ operator
 could sniff.

There is no rational reason to carry the unencrypted version of a
service but not the encrypted version, except to log data. So unless
these 5 nodes were all just playing their favorite lotto numbers in
their exit policy, they were being jerks.

I am aware that every operator can sniff regardless of policy. Every
operator can do a lot of things. The fact that even good exit policies
can do bad things is not a necessary condition for allowing bad exit
policies.

Frankly, this in-your-face selfishness of *only* accepting the
unencrypted data because fuck it, that's the only data I want to log
just rubs me the wrong way. Not one of those 5 had legit contact info.
Two of them actually bothered to fill out the field, but filled it in
with a fake email address. 

All of them just wreak of disrespect for us, for the network, and for
our users. Essentially, it's that disrespect that earned them the
BadExit flag.

If this means that sending the message to them means we take out a few
irrational actors in the process, that's fine. I don't much want
people playing lotto in their exit policies either. They can stick to
middle node and put their lotto numbers in their contact info. I
promise that it will work just as well.

 I will change my Exit Policy now to something like 80, 6667, 21 and if
 you BadExit it, you'll loose another fast node.

*sigh*. And so the cat herding begins. Are you really protesting this
policy decision with civil disobedience? Really? Fighting for Great
Justice everywhere, eh?

Do you have a rational reason why we should allow people to carry the
unencrypted version of a service but not the encrypted one, other than
Well, they could be bad actors even with a good policy!

Or is it just because you feel that someone told to do something and
you don't much like being told what to do, regardless of the
reasoning?

I forbid you from jumping in the nearest lake!

I also forbid you from taking your freshly-gimped exit node in for a
swim with you!


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpmdWraSdf96.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Jon
On Sat, Jan 29, 2011 at 12:46 PM, Jan Weiher j...@buksy.de wrote:
 Hi,

 while scrolling through the tor status page (torstatus.blutmagie.de), I
 stumpled upon the following node (the reason why it came to my eye was
 the long uptime):

 gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2 2A70 654D 3B92

 This node looks suspicious to me, because there is no contact info given
 and the exit policy allows only unencrypted traffic:

 reject 0.0.0.0/8:*
 reject 169.254.0.0/16:*
 reject 127.0.0.0/8:*
 reject 192.168.0.0/16:*
 reject 10.0.0.0/8:*
 reject 172.16.0.0/12:*
 reject 194.154.227.109:*
 accept *:21
 accept *:80
 accept *:110
 accept *:143
 reject *:*

 Am I missing something? I'm wondering why the status page lists this
 node as non-exit, because it clearly allows outgoing traffic on ports
 21,80,110 and 143?
 I'm aware of the fact that it is not recommended to use tor without
 additional encryption, but some users do. And I dont see any reason for
 only allowing unencrypted traffic than snooping?
 Can anyone clearify this? If the admin of this node is on the list,
 would he please explain this situation?

 best regards,
 Jan


It may possible be a middle node instead of an exit node.

As for lack of contact info, can't answer that.  I know there have
been several other nodes in past without a contact info.

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Jan Weiher


Am 29.01.2011 20:13, schrieb Jon:
 On Sat, Jan 29, 2011 at 12:46 PM, Jan Weiher j...@buksy.de wrote:
 Hi,

 while scrolling through the tor status page (torstatus.blutmagie.de), I
 stumpled upon the following node (the reason why it came to my eye was
 the long uptime):

 gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2 2A70 654D 3B92

 This node looks suspicious to me, because there is no contact info given
 and the exit policy allows only unencrypted traffic:

 reject 0.0.0.0/8:*
 reject 169.254.0.0/16:*
 reject 127.0.0.0/8:*
 reject 192.168.0.0/16:*
 reject 10.0.0.0/8:*
 reject 172.16.0.0/12:*
 reject 194.154.227.109:*
 accept *:21
 accept *:80
 accept *:110
 accept *:143
 reject *:*

 Am I missing something? I'm wondering why the status page lists this
 node as non-exit, because it clearly allows outgoing traffic on ports
 21,80,110 and 143?
 I'm aware of the fact that it is not recommended to use tor without
 additional encryption, but some users do. And I dont see any reason for
 only allowing unencrypted traffic than snooping?
 Can anyone clearify this? If the admin of this node is on the list,
 would he please explain this situation?

 best regards,
 Jan
 
 
 It may possible be a middle node instead of an exit node.
 

As far as I understand the ExitPolicy, the first matching rule applies.
Which means, that this is an Exit Node, at least for ports 21,80,110 and
143 to IP adresses that do not match the reject rules above the
corresponding accept rules. Anyone is free to correct me if I'm wrong,
but a middle node has only _one_ ExitPolicy which is reject *:*.

best regards,
Jan
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Gitano
On 2011-01-29 19:46, Jan Weiher wrote:

 while scrolling through the tor status page (torstatus.blutmagie.de), I
 stumpled upon the following node (the reason why it came to my eye was
 the long uptime):
 
 gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2 2A70 654D 3B92
 
 This node looks suspicious to me, because there is no contact info given
 and the exit policy allows only unencrypted traffic:
 
 reject 0.0.0.0/8:*
 reject 169.254.0.0/16:*
 reject 127.0.0.0/8:*
 reject 192.168.0.0/16:*
 reject 10.0.0.0/8:*
 reject 172.16.0.0/12:*
 reject 194.154.227.109:*
 accept *:21
 accept *:80
 accept *:110
 accept *:143
 reject *:*
 
 Am I missing something? I'm wondering why the status page lists this
 node as non-exit, because it clearly allows outgoing traffic on ports
 21,80,110 and 143?

See:
'https://gitweb.torproject.org/arma/tor.git/blob_plain/03b9c2cb903cc59f83139039d963f1fdea99b83a:/doc/spec/dir-spec.txt'

   Exit -- A router is called an 'Exit' iff it allows exits to at
least two of the ports 80, 443, and 6667 and allows exits to at
least one /8 address space.

Also: http://www.mail-archive.com/or-talk@freehaven.net/msg10275.html
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Jan Weiher


Am 29.01.2011 21:27, schrieb Gitano:
 On 2011-01-29 19:46, Jan Weiher wrote:
 
 while scrolling through the tor status page (torstatus.blutmagie.de), I
 stumpled upon the following node (the reason why it came to my eye was
 the long uptime):

 gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2 2A70 654D 3B92

 This node looks suspicious to me, because there is no contact info given
 and the exit policy allows only unencrypted traffic:

 reject 0.0.0.0/8:*
 reject 169.254.0.0/16:*
 reject 127.0.0.0/8:*
 reject 192.168.0.0/16:*
 reject 10.0.0.0/8:*
 reject 172.16.0.0/12:*
 reject 194.154.227.109:*
 accept *:21
 accept *:80
 accept *:110
 accept *:143
 reject *:*

 Am I missing something? I'm wondering why the status page lists this
 node as non-exit, because it clearly allows outgoing traffic on ports
 21,80,110 and 143?
 
 See:
 'https://gitweb.torproject.org/arma/tor.git/blob_plain/03b9c2cb903cc59f83139039d963f1fdea99b83a:/doc/spec/dir-spec.txt'
 
Exit -- A router is called an 'Exit' iff it allows exits to at
 least two of the ports 80, 443, and 6667 and allows exits to at
 least one /8 address space.
 
 Also: http://www.mail-archive.com/or-talk@freehaven.net/msg10275.html

this explains why the status page does not list the node as an exit
node. thanks.
But as far as I understand, the node does not get the Exit-Flag, but
it is still used for outgoing traffic on the accepted ports? So the
main-question is still unanswered.

best regars,
Jan
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Andrew Lewman
On Sat, 29 Jan 2011 19:46:20 +0100
Jan Weiher j...@buksy.de wrote:
 This node looks suspicious to me, because there is no contact info
 given and the exit policy allows only unencrypted traffic:

It hasn't shown up in any of the exit scans as suspicious.  Lack of
contact info isn't a concern.  The exit policy is odd, yes.  However,
arguably those are also very popular ports as well.  

-- 
Andrew
pgp 0x74ED336B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Jan Weiher


Am 29.01.2011 21:44, schrieb Andrew Lewman:
 On Sat, 29 Jan 2011 19:46:20 +0100
 Jan Weiher j...@buksy.de wrote:
 This node looks suspicious to me, because there is no contact info
 given and the exit policy allows only unencrypted traffic:
 
 It hasn't shown up in any of the exit scans as suspicious. 

What kind of scans do you perform? I thought these scans do only check
for content manipulation? I dont see how to recognize if the traffic is
recorded?

 Lack of
 contact info isn't a concern.  

I think if you run one of the fastest nodes, it is at least very odd not
to have a contact info. If you are concerned about your privacy, just go
on and create a freemail account somewhere.

 The exit policy is odd, yes.  However,
 arguably those are also very popular ports as well.  

Yeah, I'm not saying this is evil, but want to bring it into
discussion, because I was unable to get any reasonable explanation for
this exitpolicy.

Of course these ports are popular, but 443 is popular as well? So for me
it looked like pick all the popular _unencrypted_ ports.

best regards,
Jan


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread andrew
On Sat, Jan 29, 2011 at 09:55:05PM +0100, j...@buksy.de wrote 1.3K bytes in 38 
lines about:
: What kind of scans do you perform? I thought these scans do only check
: for content manipulation? I dont see how to recognize if the traffic is
: recorded?

https://gitweb.torproject.org/torflow.git/tree/HEAD:/NetworkScanners/ExitAuthority
is the code.  You are correct in that we cannot detect recording of
traffic.

: Yeah, I'm not saying this is evil, but want to bring it into
: discussion, because I was unable to get any reasonable explanation for
: this exitpolicy.
: 
: Of course these ports are popular, but 443 is popular as well? So for me
: it looked like pick all the popular _unencrypted_ ports.

I agree, it does look that way.  People can set ExcludeExitNodes for
gatereloaded in their torrc.  

-- 
Andrew
pgp key: 0x74ED336B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread grarpamp
 I dont see how to recognize if the traffic is recorded?

I know people who record exit traffic, lots of it. And they
do all sorts of things with it too. Does that news trouble
you? If so, you need to readjust your thinking.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Andrew Lewis
One could argue that recording traffic goes against the spirit of the tor 
project and anonymity in general. But even if people do monitor the traffic as 
long as they don't control both nodes there is little chance that the end user 
can really be tracked. There is also an onus on the end user to still practice 
safe internet habits and be careful about still using SSL, when they are 
entering passwords,  or doing similar sensitive things. Tor was not designed to 
make internet browsing safe in a general sense, rather it is meant to provide 
away around firewalls and censorship so that people can access the open 
internet without a fear of getting tracked as easy.

-Andrew
On Jan 29, 2011, at 8:56 PM, grarpamp wrote:

 I dont see how to recognize if the traffic is recorded?
 
 I know people who record exit traffic, lots of it. And they
 do all sorts of things with it too. Does that news trouble
 you? If so, you need to readjust your thinking.
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Gregory Maxwell
On Sat, Jan 29, 2011 at 9:56 PM, grarpamp grarp...@gmail.com wrote:
 I dont see how to recognize if the traffic is recorded?

 I know people who record exit traffic, lots of it. And they
 do all sorts of things with it too. Does that news trouble
 you? If so, you need to readjust your thinking.


It's not realistic to think that people will maintain their own
excludelists— a few extremists will, but the bulk of the users won't.

Instead, I think that nodes which exit _only_ to the unencrypted
version of a service (e.g. 80 but not 443) should be excluded from
operating as exits entirely (except as enclaves).  In this way these
nodes would be force to pay their way.  We can't stop them from
sniffing, but at least we can make them carry traffic they can't sniff
as part of the cost of doing their evil business. They could do things
like severely throttle encrypted traffic, but that is activity that
testing could detect.

To some extent the exit flag criteria approximates this, but it's
mostly a load balancing criteria and it's actually really easy to
trick, even though this node has not successfully done so.  (E.g.
Accept 224/4:*)

As far as that exit policy goes, the RFC1918 blocks might be there in
an ignorant attempt to trigger the exit flag for completely benign
reasons, though sniffing sounds more likely.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Mike Perry
Thus spake Gregory Maxwell (gmaxw...@gmail.com):

 On Sat, Jan 29, 2011 at 9:56 PM, grarpamp grarp...@gmail.com wrote:
  I dont see how to recognize if the traffic is recorded?

Various research groups occasionally experiment with using side
channels for detecting recording exits. Their results are not usually
reproducible, though (no source code, poor design, poor quality
control, too easy to mitigate, etc). :/

They do occasionally find interesting stuff. But then they either
publish, or get rejected, and then shut down their code and forget
about it.

 Instead, I think that nodes which exit _only_ to the unencrypted
 version of a service (e.g. 80 but not 443) should be excluded from
 operating as exits entirely (except as enclaves).  In this way these
 nodes would be force to pay their way.  We can't stop them from
 sniffing, but at least we can make them carry traffic they can't sniff
 as part of the cost of doing their evil business. They could do things
 like severely throttle encrypted traffic, but that is activity that
 testing could detect.
 
 As far as that exit policy goes, the RFC1918 blocks might be there in
 an ignorant attempt to trigger the exit flag for completely benign
 reasons, though sniffing sounds more likely.

I agree. We already have scripts to detect this, we just have not yet
decided to actually use them yet. I believe we should.

Currently, 5 nodes exit to *only* plaintext ports for web and email.
There are about 50 others that exit to the plaintext versions for web
or email. 

I believe we hould ban these 5 immediately, and consider banning the
other 50 after issuing the appropriate announcements.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpE4kMVVEmo8.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Mike Perry
Thus spake Mike Perry (mikepe...@fscked.org):

 Thus spake Gregory Maxwell (gmaxw...@gmail.com):
  As far as that exit policy goes, the RFC1918 blocks might be there in
  an ignorant attempt to trigger the exit flag for completely benign
  reasons, though sniffing sounds more likely.
 
 I agree. We already have scripts to detect this, we just have not yet
 decided to actually use them yet. I believe we should.
 
 Currently, 5 nodes exit to *only* plaintext ports for web and email.
 There are about 50 others that exit to the plaintext versions for web
 or email. 
 
 I believe we hould ban these 5 immediately, and consider banning the
 other 50 after issuing the appropriate announcements.

Sorry, the 5 are:

NOTICE[Sat Jan 29 20:56:43 2011]:Nodes allowing plaintext but not secure:
ElzaTorServer=009E71AED2C5580E942AC1743D1C440C5B2C459E
QuantumSevero=4BF2F90E6E1905E2FB4F371E471422150D722A93
gatereloaded=550CC9724FA77C7F9260B93989D22A70654D3B92
oompaloompa=775DF6B8CF3FB0150A594F6E2B5CB1E0AC45D09B
oompaloompa2=BABBF0694251E5AFF7BF3A0A02EFDC12CB99B05F


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpCgx8xgRqZn.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Eddie Cornejo
Forgive my ignorance but this seeks rather knee-jerk to me. Maybe I'm
missing something.

Everyone that uses TOR should acknowlege that all data that doesn't
use encryption before entering the TOR network. It's even in the FAQ
(https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#CanexitnodeseavesdroponcommunicationsIsntthatbad)

That means if I go to http://www.somewebsite.com I already acknowedge
that someone out there could potentially be monitoring my traffic -
regardless of whether I use TOR or not. In other words TOR does not
claim to protect against this kind of attack.

Furthermore we all acknowledge that any exit node could potentially be
monitoring our unencrypted traffic (As Andrew stated earlier You are
correct in that we cannot detect recording of traffic.)

Finally there is no way that an exit node can directly affect the mode
choices by a client. Ie, apart from a particular node existing, there
is no way that a node could force a user to use it.

Therefore I submit that having these nodes, whether they are overtly
recording traffic or not, does not result in any harm to the TOR
network. In fact, their presence lessens the burden on the TOR network
as they are providing much needed bandwidth.

In addition, if a user was to attempt to use encryption then another
entirely separate exit node will be used instead (one that has a
policy that allows traffic on the specific port) So the user isn't
inconvenienced or forced to use an insecure protocol.

So, what's the threat? Why are you considering banning these nodes
when, by all accounts, I cannot see them having a negative impact on
the network as a whole (in fact, it's probably a positive influence)

FWIW, none of these nodes are mine. I used to run an exit node but I
don't any longer (with my new Internet connection speeds it's not
worth it)

Eddie

On Sun, Jan 30, 2011 at 15:57, Mike Perry mikepe...@fscked.org wrote:
 Thus spake Mike Perry (mikepe...@fscked.org):

 Thus spake Gregory Maxwell (gmaxw...@gmail.com):
  As far as that exit policy goes, the RFC1918 blocks might be there in
  an ignorant attempt to trigger the exit flag for completely benign
  reasons, though sniffing sounds more likely.

 I agree. We already have scripts to detect this, we just have not yet
 decided to actually use them yet. I believe we should.

 Currently, 5 nodes exit to *only* plaintext ports for web and email.
 There are about 50 others that exit to the plaintext versions for web
 or email.

 I believe we hould ban these 5 immediately, and consider banning the
 other 50 after issuing the appropriate announcements.

 Sorry, the 5 are:

 NOTICE[Sat Jan 29 20:56:43 2011]:Nodes allowing plaintext but not secure:
        ElzaTorServer=009E71AED2C5580E942AC1743D1C440C5B2C459E
        QuantumSevero=4BF2F90E6E1905E2FB4F371E471422150D722A93
        gatereloaded=550CC9724FA77C7F9260B93989D22A70654D3B92
        oompaloompa=775DF6B8CF3FB0150A594F6E2B5CB1E0AC45D09B
        oompaloompa2=BABBF0694251E5AFF7BF3A0A02EFDC12CB99B05F


 --
 Mike Perry
 Mad Computer Scientist
 fscked.org evil labs




-- 
Eddie Cornejo

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GIT d? s: a C+++ UL+++ P++ L++ E- W+ N- o K- w++
O M-- V PS+ PE Y PGP++ t 5 X+ R tv-- b+ DI D++
G e++ h r+++ y
--END GEEK CODE BLOCK--
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Mike Perry
Thus spake Eddie Cornejo (corn...@gmail.com):

 Forgive my ignorance but this seeks rather knee-jerk to me. Maybe I'm
 missing something.

Yeah, I believe you're missing the fact that these ports also contain
plaintext passwords than can be used to gain access to information on
these and other accounts that may or may not have ever traveled over
tor. That is the difference.

 Finally there is no way that an exit node can directly affect the mode
 choices by a client. Ie, apart from a particular node existing, there
 is no way that a node could force a user to use it.

See above.
 
 Therefore I submit that having these nodes, whether they are overtly
 recording traffic or not, does not result in any harm to the TOR
 network. In fact, their presence lessens the burden on the TOR network
 as they are providing much needed bandwidth.

We don't need bandwidth that bad.
 
 So, what's the threat? Why are you considering banning these nodes
 when, by all accounts, I cannot see them having a negative impact on
 the network as a whole (in fact, it's probably a positive influence)

I believe that allowing these nodes sends a message that we are OK
with people monitoring plaintext traffic, because it is anonymized. We
have never been OK with this.

People use plaintext at their own risk, and yes, they should know
better, but this does NOT mean that we are comfortable feeding them to
the wolves.

If said exits are really interested in helping, they should alter
their exit policy to allow encryption and then rekey. They will be
banned by identity key, not by IP. Rekeying without fixing the exit
policy will just result in IP bans.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpAhAbyOuyIb.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Eddie Cornejo
Howdy,

Thanks for replying.

 Yeah, I believe you're missing the fact that these ports also contain
 plaintext passwords than can be used to gain access to information on
 these and other accounts that may or may not have ever traveled over
 tor. That is the difference.

Actually, no I acknowledge that. I'm stating that this is a known
position. Regardless of whether you ban these nodes or not, ALL nodes
have the potential for reading unencrypted traffic. The FAQ I linked
clearly mentions this.

 Finally there is no way that an exit node can directly affect the mode
 choices by a client. Ie, apart from a particular node existing, there
 is no way that a node could force a user to use it.

 See above.

Above? I'm sorry but I don't think you've addressed this point. Exit
node A can't force user Z to use it.

 We don't need bandwidth that bad.

A matter of opinion, but I'll accept it.

 I believe that allowing these nodes sends a message that we are OK
 with people monitoring plaintext traffic, because it is anonymized. We
 have never been OK with this.

Ok, I accept that this might send a message to 50ish nodes (if you ban
all 50+) but if someone was so inclined they could still do this by
allowing encrypted traffic and throttling it/blocking it outside of
TOR (transparent proxy perhaps?) I predict this is worse as the user
client will believe node A will honestly relay encrypted traffic and
will select it on this basis, only to find their connection is slow or
doesn't fully connect. Admitedly, this won't be a huge problem unless
a good number of nodes started doing this.

 People use plaintext at their own risk, and yes, they should know
 better, but this does NOT mean that we are comfortable feeding them to
 the wolves.

My argument is that you're not identifying wolves. If you were serious
about identifying wolves then could I suggest you create some dummy
accounts, send your password through all exit nodes individually and
see which of your accounts are accessed. This would positively
identify wolves. All you're achieving by soley looking at exit
policies is identifying things that may or may not be wolves and
ignoring the larger body of exit nodes that may or may not include
wolves. I submit your testing is flawed.

 If said exits are really interested in helping, they should alter
 their exit policy to allow encryption and then rekey. They will be
 banned by identity key, not by IP. Rekeying without fixing the exit
 policy will just result in IP bans.

I'm not sure I'm comfortable with dictating how an exit nodes
exitpolicy should be defined. Each policy should be up to the exit
node owner to decide. Just my 2c

-- 
Eddie Cornejo

-BEGIN GEEK CODE BLOCK-
Version: 3.12
GIT d? s: a C+++ UL+++ P++ L++ E- W+ N- o K- w++
O M-- V PS+ PE Y PGP++ t 5 X+ R tv-- b+ DI D++
G e++ h r+++ y
--END GEEK CODE BLOCK--
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Mike Perry
Thus spake Eddie Cornejo (corn...@gmail.com):

  I believe that allowing these nodes sends a message that we are OK
  with people monitoring plaintext traffic, because it is anonymized. We
  have never been OK with this.
 
 Ok, I accept that this might send a message to 50ish nodes (if you ban
 all 50+) but if someone was so inclined they could still do this by
 allowing encrypted traffic and throttling it/blocking it outside of
 TOR (transparent proxy perhaps?) I predict this is worse as the user
 client will believe node A will honestly relay encrypted traffic and
 will select it on this basis, only to find their connection is slow or
 doesn't fully connect. Admitedly, this won't be a huge problem unless
 a good number of nodes started doing this.

We can detect nodes that fail encrypted connections. We currently scan
for failure of port 443. We also detect throttling by virtue of our bw
authorities measuring using 443.

443 is the second-most trafficed port by byte on the Tor network,
occupying only ~1% of the traffic. If stingy exit nodes really want to
waste hours to pinch pennies from their malicious exit policy, they
can try crafting a throttling policy that we can't detect. Seems like
there are better ways to spend their time. Like reading other people's
email.

So no, I'm not terribly concerned about second-order effects of this.

  People use plaintext at their own risk, and yes, they should know
  better, but this does NOT mean that we are comfortable feeding them to
  the wolves.
 
 My argument is that you're not identifying wolves. If you were serious
 about identifying wolves then could I suggest you create some dummy
 accounts, send your password through all exit nodes individually and
 see which of your accounts are accessed. This would positively
 identify wolves. All you're achieving by soley looking at exit
 policies is identifying things that may or may not be wolves and
 ignoring the larger body of exit nodes that may or may not include
 wolves. I submit your testing is flawed.

We're not trying to identify wolves. We are sending a message to the
community.
 
  If said exits are really interested in helping, they should alter
  their exit policy to allow encryption and then rekey. They will be
  banned by identity key, not by IP. Rekeying without fixing the exit
  policy will just result in IP bans.
 
 I'm not sure I'm comfortable with dictating how an exit nodes
 exitpolicy should be defined. Each policy should be up to the exit
 node owner to decide. Just my 2c

Not really. In reality, it's up to those who write the code to decide
what is available and how it works ;). Welcome to The Golden Path.

At some point, we intend to shrink exit policies further as Tor scales
to more decentralized schemes. Those exit policies will likely be
represented as bits representing subsets of ports. When that time
comes, we will very likely combine encrypted and unencrypted versions
of ports together, removing this option entirely.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpFPYPp83NMq.pgp
Description: PGP signature


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Orionjur Tor-admin
Jan Weiher wrote:
 
 
 Of course these ports are popular, but 443 is popular as well? So for me
 it looked like pick all the popular _unencrypted_ ports.
 
 best regards,
 Jan
 
 
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 


Maybe the owner of that node is just only a lamer?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Orionjur Tor-admin
grarpamp wrote:
 I dont see how to recognize if the traffic is recorded?
 
 I know people who record exit traffic, lots of it. And they
 do all sorts of things with it too. Does that news trouble
 you? If so, you need to readjust your thinking.
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 


Is it a serious problem if some of owners of tor-nodes record the exit
traffic?
It seems to me that the Govermental bodies can do it instead of them and
they probably do it in such countries as the US or Germany and etc.
If the first is serious problem, why the last is not one?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Orionjur Tor-admin
Gregory Maxwell wrote:
 On Sat, Jan 29, 2011 at 9:56 PM, grarpamp grarp...@gmail.com wrote:
 
 Instead, I think that nodes which exit _only_ to the unencrypted
 version of a service (e.g. 80 but not 443) should be excluded from
 operating as exits entirely (except as enclaves).  In this way these
 nodes would be force to pay their way.  We can't stop them from
 sniffing, but at least we can make them carry traffic they can't sniff
 as part of the cost of doing their evil business. They could do things
 like severely throttle encrypted traffic, but that is activity that
 testing could detect.
 

Where I can read what it means a bad exit? Earlier I thought that it
is and exit which works wrong in something. And I thought that them
excludes from routing.
But I pereodically can see that my client establish connections through
bad exits.
Have I to need do something from preventing it for protection of my
anonimity?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/