[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #18361 [Tor Browser]: Issues with corporate censorship and mass surveillance



#18361: Issues with corporate censorship and mass surveillance
------------------------------------------+--------------------------
 Reporter:  ioerror                       |          Owner:  tbb-team
     Type:  enhancement                   |         Status:  new
 Priority:  High                          |      Milestone:
Component:  Tor Browser                   |        Version:
 Severity:  Critical                      |     Resolution:
 Keywords:  security, privacy, anonymity  |  Actual Points:
Parent ID:                                |         Points:
 Reviewer:                                |        Sponsor:  None
------------------------------------------+--------------------------

Comment (by jgrahamc):

 Replying to [comment:222 tne]:
 > Exactly; it's "part of" your solution. In and of itself, it isn't
 sufficient. This means you'll continue to rely on IP rep. Nobody likes
 that, not even you I reckon, but it's the best you have right now.

 Every web property of significant size uses some sort of IP-based
 reputation. It's one way web sites deal with abuse (sometimes it's super-
 manual: web site admins look at logs and restrict certain IPs). No plan to
 ditch IP reputation, but CloudFlare likes to make continuous improvements
 and I think this is an area where we can do that.

 > Dealing with that reality, I think there are ways to reduce the pain in
 specific areas (e.g. sites that are not being "actively abused") and that
 are worth exploring. Would you comment on that?

 I need to think about it. I don't have a ready answer to whether that
 would work. Will do some internal investigation.

 > I know, I've been following the discussion. I probably should have
 thanked you and your team for that beforehand. As I said, I even benefit
 from some of those changes, and that's great.

 Good, I'm glad to hear the changes we are making are helping.

 > Assumption: By "''It's better to think at an individual request level
 and ask "Does this request indicate abuse?" and then decide what to do. Of
 course, we can take into account other things as well, but [...]''" you
 didn't really mean that you were aiming to do that exclusively, as that
 would prevent you from using an IP reputation system (which uses data
 besides the isolated request, i.e. reputation scores gathered via other
 customer sites). I interpreted it like that however, and we might have
 talked past each other. If that's correct, what I said will make more
 sense.

 It's more a question of how you mix this stuff. Suppose you have a bad IP
 reputation for some IP, plus you look at the request and it looks it might
 be SQLi then you impede that, but if you see a request and it's clean then
 you downplay the IP reputation and let the request through. Equally you
 have a good IP and it's certain it's a known exploit, you block that.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18361#comment:223>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs