[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: relay tidbits...
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: relay tidbits...
- From: luser <luser456@xxxxxxxxxxxxxx>
- Date: Mon, 02 Jun 2008 08:12:16 +0100
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Mon, 02 Jun 2008 03:12:26 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:content-type:content-transfer-encoding; bh=7qigGqGtG/0XDVAb/F5gWo9Vlg3BfmueCZCkBhjPU68=; b=IPhvkWyUAn0x0nRoPhX1X3PmTGqVRZiD9ORApt6p435zCf5hwUwpPMuAAak4kC0qiWxOI1igtua0/Nx2A0UahdG6KLQOQPWyC0ISAW2U3ADg2oIOCH+GKBrRBmICvUEwpBOFLCodGYZ6lKHlgZFQP5S0YEiHXzP3Luo/SBdVgmc=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:references:in-reply-to:content-type:content-transfer-encoding; b=qM7iMyxXRMIJ2rCXlYPVcKN88/+ueevNKKFWYmO7bL5dhDev+1cbYJhyrJamMix7/L1d7cmogEDnTacRL7SP8ysON6NAWfcqcvL0gLHlohkS2idPv+M4oX0dxjQcsWvL8n4cZ5vyHN0gKHEhO6levliHoFmZOYm7f0k4f7MpmME=
- In-reply-to: <20080601234433.GA9948@xxxxxxxxxxxxxxxx>
- References: <48432765.20301@xxxxxxxxxxxxxx> <20080601234433.GA9948@xxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.14 (Macintosh/20080421)
If in the United States,
https://www.torproject.org/eff/tor-legal-faq.html.en#ExitSnooping
pertains to you.
Nope, but I'm sure there is something similar where I am.
is there a case for maintaining a central repository of ip/username
pairs from certain protocols (pop3, imap, ftp, whatever) emanating from
exit nodes as a reference for admins in the case that access via tor to
these accounts is prohibited/not advised.
No more than there is a case for the non-Tor Internet. Tor transports
packets, what people use it for isn't up to you. Interesting that
you're trying to assign morality to a protocol.
If I believe that the majority of POP3 traffic over tor is performed by
unauthorised parties, and as an exit node admin I'm someway helping this
access, then is there not a moral argument for exit node admins to
detect the abuse of tor and alert the people affected? to go further, is
there not a moral argument for this detection/alerting to be done by tor
itself? in POP3's case the mail server administrator/security people
might benefit from a resource that would tell them whether any of their
assets are being abused using tor. as long as only specific identifiers
are captured, with absolutely no personal details, I'd think a
repository of this kind would help out a few people, and I don't see the
harm in doing so.
I'd be interested if people did see the harm.
Again, if this is detrimental to the project I'll stop the relay.
Thanks