[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Traffic retention of TOR-Relays in Denmark



Thanks for your effords, but i think, we are talking about two 
different things. Of course, TOR does not want to hide that you use 
it.

My worrys concern the TOR-Relays in Denmark. For example, there are 
20-30 Relays running in Denmark, some at home, some in Datacenters. 
If danish ISPs have to log each 500. Packet, and you accidently use 
a circuit consisting only in danish Servers (thats not very likely, 
but it could happen I think), they can track everything you have 
done using TOR, i think.

Is there anything in TOR that does prevent this problem? Actually, 
I think, that danish law affects only home consumers, no hosting-
centers. Do you think there are many, who run TOR-Servers at home 
using normal customer dsl-connections?



On Fri, 15 Jul 2011 21:44:03 +0200 Andrew Lewman 
<andrew@xxxxxxxxxxxxxx> wrote:
>On Friday, July 15, 2011 10:05:36 AM bemoo129@xxxxxxxxxxxx wrote:
>> Hello,
>> recently I read about the danish law to log every 500. IP-
>Packet,
>> which is on wire between Customer and ISP. Allthough this Law
>> doesnt affect hostet Servers, i thin it is dangerous for Tor-
>Relays
>> which run on a normal PC at home.
>> 
>> What do you think abou this? If very much Packets from Tor-
>Servers
>> are logged due this law, are danish-Tor servers now very 
>unsecure?
>
>Let's take this apart into some easy to digest pieces.  
>
>First, I belive the law is to record IP packet header information, 
>not the 
>contents themselves.  While this is bad, it's the basis of traffic 
>analysis and 
>exactly one scenario in which Tor can defend the user. In part, 
>I'm basing my 
>understanding of this law from 
>https://secure.wikimedia.org/wikipedia/en/wiki/Telecommunications_d
>ata_retention#Denmark
>
>The logs of a connection running a non-exit relay or bridge are 
>going to only 
>see encrypted traffic to and from the home computer.  The logged 
>packets may 
>show someone using Tor, but the traffic contained within is still 
>encrypted. The 
>connections will between Tor user and Tor relay, and Tor relay to 
>Tor relay.  
>Currently, Tor does not try to hide that you are using Tor.  Tor 
>doesn't 
>scream 'I'm using Tor', but at the same time, if your adversary is 
>looking 
>really closely, they can deduce you are using Tor.  The good news 
>is that 
>we're working on pluggable transports and obfuscating proxies to 
>hide the fact 
>that you are using Tor.  
>
>The logs of a connection running an exit relay is going to see 
>encrypted traffic 
>from other relays and whatever traffic exited from itself to a 
>destination.  The 
>logs will record lots of traffic from people other than the ISP 
>subscriber.  
>Some small percentage of this data may be illicit, as defined by 
>local laws.  
>This is the same risk for exit relays now.  
>
>Other information about protections tor provides against an 
>adversary 
>recording your traffic can be found at 
>https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#Whatprotec
>tionsdoesTorprovide
>
>-- 
>Andrew
>pgp 0x74ED336B
>_______________________________________________
>tor-talk mailing list
>tor-talk@xxxxxxxxxxxxxxxxxxxx
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk