[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: relay tidbits...
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: relay tidbits...
- From: luser <luser456@xxxxxxxxxxxxxx>
- Date: Mon, 02 Jun 2008 08:12:16 +0100
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 02 Jun 2008 03:12:26 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed;        d=googlemail.com; s=gamma;        h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:content-type:content-transfer-encoding;        bh=7qigGqGtG/0XDVAb/F5gWo9Vlg3BfmueCZCkBhjPU68=;        b=IPhvkWyUAn0x0nRoPhX1X3PmTGqVRZiD9ORApt6p435zCf5hwUwpPMuAAak4kC0qiWxOI1igtua0/Nx2A0UahdG6KLQOQPWyC0ISAW2U3ADg2oIOCH+GKBrRBmICvUEwpBOFLCodGYZ6lKHlgZFQP5S0YEiHXzP3Luo/SBdVgmc=
- Domainkey-signature: a=rsa-sha1; c=nofws;        d=googlemail.com; s=gamma;        h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:content-type:content-transfer-encoding;        b=qM7iMyxXRMIJ2rCXlYPVcKN88/+ueevNKKFWYmO7bL5dhDev+1cbYJhyrJamMix7/L1d7cmogEDnTacRL7SP8ysON6NAWfcqcvL0gLHlohkS2idPv+M4oX0dxjQcsWvL8n4cZ5vyHN0gKHEhO6levliHoFmZOYm7f0k4f7MpmME=
- In-reply-to: <20080601234433.GA9948@xxxxxxxxxxxxxxxx>
- References: <48432765.20301@xxxxxxxxxxxxxx> <20080601234433.GA9948@xxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.14 (Macintosh/20080421)
If in the United States,
https://www.torproject.org/eff/tor-legal-faq.html.en#ExitSnooping
pertains to you.
Nope, but I'm sure there is something similar where I am.
is there a case for maintaining a central repository of ip/username  
pairs from certain protocols (pop3, imap, ftp, whatever) emanating from  
exit nodes as a reference for admins in the case that access via tor to  
these accounts is prohibited/not advised.
No more than there is a case for the non-Tor Internet.  Tor transports
packets, what people use it for isn't up to you.  Interesting that
you're trying to assign morality to a protocol.
If I believe that the majority of POP3 traffic over tor is performed by 
unauthorised parties, and as an exit node admin I'm someway helping this 
access, then is there not a moral argument for exit node admins to 
detect the abuse of tor and alert the people affected? to go further, is 
there not a moral argument for this detection/alerting to be done by tor 
itself?  in POP3's case the mail server administrator/security people 
might benefit from a resource that would tell them whether any of their 
assets are being abused using tor. as long as only specific identifiers 
are captured, with absolutely no personal details, I'd think a 
repository of this kind would help out a few people, and I don't see the
harm in doing so.
I'd be interested if people did see the harm.
Again, if this is detrimental to the project I'll stop the relay.
Thanks