[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[Political/Legal] Passing ideas on German Tor nodes
- To: or-talk@xxxxxxxxxxxxx
- Subject: [Political/Legal] Passing ideas on German Tor nodes
- From: "F. Fox" <kitsune.or@xxxxxxxxx>
- Date: Sun, 02 Dec 2007 13:39:57 -0800
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Sun, 02 Dec 2007 16:40:13 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:x-enigmail-version:content-type:content-transfer-encoding; bh=vjAnrApU07uAa4bou0u9dFjRoITdQl+NmWOLdbV/bYM=; b=XTvKGr7GZH+ve14qkVLGAI8Tn6ejjqB2/65jAAFu4WtyIj83chp6DcEnph0g73JntMZcTvG8U3QJ49hKEcUbStd8u8hWgLfZO/ZroOMz5MGc3oR1Si2l4WI+l41CLUabeEGW1b3ZY2wrBmcd/Hb6uJsjhpYpx3CUsFWbSvi6o88=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=received:message-id:date:from:user-agent:mime-version:to:subject:x-enigmail-version:content-type:content-transfer-encoding; b=QJnNxnaPVdW1zpGLdvRisQSTyxficUwh2stc2OBVOhnBjXukg2dtHBZaq/od4OgHwmDMIXCJ9kshJx1/UZl+FMYtvpYX9xF7wGLNQqvINBhAiPN1iPeMq3VuwyM1dK3L0ccVXz68oMbDo6l8RMa8hY3++moOy4+TN/F2nneuAuY=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.9 (X11/20071115)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Just a couple ideas I had, regarding the issue of German Tor nodes and
the upcoming data retention policies; keep in mind that my own knowledge
regarding the Tor network isn't all that deep, so these may be flawed.
However, let's suppose that we're in a time when German Tor nodes are
now actively keeping logs of all connections. What would be the best way to:
1.) Protect the anonymity of Tor users as much as possible, while
2.) Attempting to allow some way for German Tor nodes to contribute to
the overall capacity of the network.
If I read things right, there are two things - barring client
misconfigurations or other SNAFUs - that are likely to reveal the
identity of a client:
* An adversary owning all three Tor nodes in a circuit, in which case
the client is *definitely* screwed;
* An adversary owning the entry guard and exit node in a circuit, which
may allow an end-to-end attack.
So, what if a maximum of one German Tor node were allowed in a circuit?
Would that achieve both numbered goals?
Given the logging, it might be wise to not allow the German node to be
the exit node; I'm not sure about the entry guard.
I would think that a German middleman node would be safe, though, right?
- --
F. Fox
CompTIA A+, Net+, Security+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
iD8DBQFHUyYtbgkxCAzYBCMRAq+hAJ4rDJLsXT+L6EYDK+jms+skZhotrwCdExnx
3zO/PlzAaT+4+uJu4GWAWks=
=wJKO
-----END PGP SIGNATURE-----