[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Restrict relay to internet2
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Restrict relay to internet2
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Mon, 07 Jan 2008 18:42:08 -0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 07 Jan 2008 21:42:23 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; bh=8rF7Mh8oA1I2RJCic1bK7DoBycSnX262qEZ63Fdio6I=; b=O6Du8gYBFUI/EISVGdp2cCD9YSobI6GusOajsUUo3ckDCwLBEzMLtryb09LbOql90WISP9I3mDVok2qGWDZvCXmvIOnO9n5fgGqTeluPC4FxuwTS0CEOaYAffH394Wd0QZvMPsUPE6NXTXDYGvNlwB3K0m4sGkJsvUYSrmyr9yc=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:x-enigmail-version:content-type:content-transfer-encoding; b=WJ6Predj1EEmSMEIyIPrDHv74gE/tFATUNmZtrM9Zyces3HbD73JEqzJilRPgLAMaoAzGg0O3coOWl09ZNQ1+rt7WTzKldr9f5Hjo58ICoChVS3U6TNtSz98xCslSTVC/FjpiTJjpTgqboHyoxWapALDF5UejmQs23paOJGcdOM=
- In-reply-to: <4782A17A.8030200@xxxxxxx>
- References: <525056157@xxxxxx> <20080107211646.GE45623@tabulara> <47829AE8.5090204@xxxxxxxxxxxx> <4782A17A.8030200@xxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.9 (Windows/20071031)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Nathaniel Fairfield wrote:
| Folks,
|
| I run a tor relay node (no exits) on my school's network. Due to their
| bandwidth policy, I have to limit traffic to about 1 Gb per day. Weak,
| I know.
Weak? Not really. I'm sure home users don't contribute too much, either
- - and every little bit helps. :-)
|
| HOWEVER, my school is also connected to the Abilene/Internet2 backbone,
| and they DON'T limit bandwidth usage over Internet2!
(snip)
I'd check into whether Internet2 has policies relating to how it's used,
first... I get the impression it's a research network mainly at
universities. If that's the case, they may not want people fooling with
it casually. However, I could be wrong.
Another thing: How would the PKI work over Internet2? AFAIK, Tor needs
to be able to talk to an authoritative directory server; also, the
directory it gets would be full of Internet1 (as I'll refer to the
"normal" Internet here) nodes.
Clearly, an entirely new PKI would have to be set up, via forcing
options in copies of Tor (including, among other things, forcing a few
copies into authoritative directory mode). It would be an interesting
project, but it would take quite a bit of work.
One thing to remember is, even if Internet2 gets its own Tor PKI, Tor
needs a decent userbase in order to provide a respectable degree of
anonymity (and preferably a distributed geography, including as many
foreign jurisdictions as possible). Could you get enough Tor users on
Internet2?
Remember, anonymity loves company.
Interesting "pet project" idea, though... :-D
- --
F. Fox: A+, Network+, Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFHguMAbgkxCAzYBCMRCEI7AJ0UIkMGMlUeZfqo8jP2+F/mllQg0wCfU4lL
a7fSJpfeYwQFNgBtLczLmU4=
=Y/9Z
-----END PGP SIGNATURE-----