[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re[2]: Protecting exit-nodes by GeoIP based policy
- To: numE <or-talk@xxxxxxxxxxxxx>
- Subject: Re[2]: Protecting exit-nodes by GeoIP based policy
- From: Arrakistor <arrakistor@xxxxxxxxx>
- Date: Sun, 10 Sep 2006 17:21:58 -0500
- Delivered-to: archiver@seul.org
- Delivered-to: or-talk-outgoing@seul.org
- Delivered-to: or-talk@seul.org
- Delivery-date: Sun, 10 Sep 2006 18:19:58 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:date:from:x-mailer:reply-to:organization:x-priority:message-id:to:subject:in-reply-to:references:mime-version:content-type:content-transfer-encoding; b=jIImXa5UCswz8nAx+y1Zv6D6bhVrnxwVijWT1e0zdROodDZeLMTg9MiYvfvjgRDpTjN8ePrMNGVEHmWNyzR8R3Xpzp+YdPZUAuoqDlP9VKKkRnZ0SprkkZM/MNm9OMnGGfyuPFkctnzgGMm8DCEF7EpacBYSBL6++IL911jrrN8=
- In-reply-to: <45048BD7.2040800@onionizer.de>
- Organization: Torpark
- References: <87sliz2xl8.fsf@kosh.bigo.ensc.de> <45048BD7.2040800@onionizer.de>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
There is a flaw with this, which has been discussed before.
What keeps the chinese government from running a server in the US or
anywhere else? They are not limited by their borders.
Regards,
Arrakistor
Sunday, September 10, 2006, 5:04:07 PM, you wrote:
> This is a good idea.
> I had nearly the same.
> Maybe it could be solved even easier.
> The server-config just needs an option to set "mycountry".
> when establishing an onion-route the client should
> simply choose an exitnode where mycountry is not equal
> to the country of the server he wants to connect.
> so.. exitnodes of country a will connect to targets in country b and c
> and vice versa.
> basically what you suggested, but forced.
> Enrico Scholz schrieb:
>> Hello,
>>
>> I just had the idea which can help to protect exit-nodes against some
>> kinds of legal prosecution. Basically, it would be policy to Tor servers
>> which says "do not connect into country XY". Such a rule does not increase
>> anonymity but would require that legal actions (e.g. confiscations) must
>> be performed in another country than this where the crime happened. This
>> is a much higher hurdle, especially for lower delinquencies.
>>
>> I see two steps how this policy can be implemented:
>>
>> A. On client side
>>
>> 1. add a new option, e.g. 'Jurisdiction' with possible values of
>> * 'other' ... when set, do not use an exit-node when it is the same
>> jurisdiction as the target-ip; this should be the
>> default on new installations
>> * 'same' ... use an exit-node only, when it is in the same
>> jurisdiction (just for completeness...)
>> * 'ignore' ... ignore jurisdiction (same behavior as now)
>> * a country code ... use only exit-nodes within this country; a
>> negated format should exist too
>>
>> 2. when choosing path, use only exit-nodes which are following the
>> constraint above
>>
>>
>> B. On (exit-)node side
>>
>> 1. add a new option, e.g. 'JurisdictionPolicy' which accepts country
>> codes and perhaps special values like '%same'. Behavior is similar
>> to the client side option mentioned above
>>
>> 2. Tor protocol/meta data must be changed to transmit this option
>>
>> 3. node forbids connections which are violating the policy
>>
>>
>> The decision whether a node and a target are in the same jurisdiction can
>> be done e.g. by a GeoIP like service. A problem might be the license:
>> GeoIP is GPL, Tor is BSD. Dunno, whether the database can be used freely
>> and Tor has to implement own parsing routines. Perhaps, similar projects
>> exist.
>>
>>
>>
>> Enrico