First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 1) <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
abuse.html 2) "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
abuse.html 3)
abuse.html 4) <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
abuse.html 5) <head>
|
Updated faq-abuse.html to m...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 6) <title>Abuse FAQ for Tor Server Operators</title>
faq-abuse.html 7) <meta name="Author" content="Roger Dingledine" />
|
Renamed to faq-abuse, set i...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 8) <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
|
Updated faq-abuse.html to m...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 9) <link rel="stylesheet" type="text/css" href="stylesheet.css" />
|
Renamed to faq-abuse, set i...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 10) <link rel="shortcut icon" type="image/x-icon" href="/favicon.ico" />
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 11) </head>
abuse.html 12) <body>
abuse.html 13)
abuse.html 14) <!-- TITLE BAR & NAVIGATION -->
abuse.html 15)
abuse.html 16) <table class="banner" border="0" cellpadding="0" cellspacing="0">
abuse.html 17) <tr>
abuse.html 18) <td class="banner-left"></td>
abuse.html 19) <td class="banner-middle">
|
Updated faq-abuse.html to m...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 20) <a href="index.html">Home</a>
faq-abuse.html 21) | <a href="howitworks.html">How It Works</a>
faq-abuse.html 22) | <a href="download.html">Download</a>
faq-abuse.html 23) | <a href="documentation.html">Docs</a>
faq-abuse.html 24) | <a href="users.html">Users</a>
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 25) | <a href="faq.html">FAQs</a>
|
call it Volunteer in the na...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 26) | <a href="volunteer.html">Volunteer</a>
|
Updated faq-abuse.html to m...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 27) | <a href="developers.html">Developers</a>
faq-abuse.html 28) | <a href="research.html">Research</a>
faq-abuse.html 29) | <a href="people.html">People</a>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 30) </td>
abuse.html 31) <td class="banner-right"></td>
abuse.html 32) </tr>
abuse.html 33) </table>
abuse.html 34)
abuse.html 35) <!-- END TITLE BAR & NAVIGATION -->
abuse.html 36)
|
Removed all invalid classes...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 37) <div class="center">
faq-abuse.html 38)
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 39) <div class="main-column">
abuse.html 40)
|
Renamed to faq-abuse, set i...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 41) <!-- PUT CONTENT AFTER THIS TAG -->
faq-abuse.html 42)
faq-abuse.html 43) <h2>Abuse FAQ for Tor Server Operators</h2>
faq-abuse.html 44) <hr />
faq-abuse.html 45)
|
try out something thomas su...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 46) <a id="WhatAboutCriminals"></a>
faq-abuse.html 47) <h3><a class="anchor" href="#WhatAboutCriminals">Doesn't Tor enable criminals to do bad things?</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 48)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 49) <p>Criminals can already do bad things. Since they're willing to
faq-abuse.html 50) break laws, they already have lots of options available that provide
faq-abuse.html 51) <em>better</em> privacy than Tor provides. They can steal cell phones,
faq-abuse.html 52) use them, and throw them in a ditch; they can crack into computers
faq-abuse.html 53) in Korea or Brazil and use them to launch abusive activities; they
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 54) can use spyware, viruses, and other techniques to take control of
faq-abuse.html 55) literally millions of Windows machines around the world. </p>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 56)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 57) <p>Tor aims to provide protection for ordinary people who want to follow
faq-abuse.html 58) the law. Only criminals have privacy right now; we need to fix that. </p>
faq-abuse.html 59)
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 60) <p>Some advocates of anonymity explain that it's just a tradeoff ---
faq-abuse.html 61) accepting the bad uses for the good ones --- but we don't think that's
|
a bit more cleanup
Roger Dingledine authored 19 years ago
|
faq-abuse.html 62) how it works in the case of Tor.
faq-abuse.html 63) Criminals and other bad people have the motivation to learn how to
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 64) get good anonymity, and many have the motivation to pay well to achieve
faq-abuse.html 65) it. Being able to steal and reuse the identities of innocent victims
faq-abuse.html 66) (identify theft) makes it even easier. Normal people, on the other hand,
faq-abuse.html 67) don't typically have the time or money to spend figuring out how to get
faq-abuse.html 68) privacy online. This is the worst of all possible worlds. </p>
faq-abuse.html 69)
faq-abuse.html 70) <p>So yes, criminals could in theory use Tor, but they already have
faq-abuse.html 71) better options, and it seems unlikely that taking Tor away from the
faq-abuse.html 72) world will stop them from doing their bad things. At the same time, Tor
faq-abuse.html 73) and other privacy measures can <em>fight</em> identity theft, physical
faq-abuse.html 74) crimes like stalking, and so on. </p>
faq-abuse.html 75)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 76) <a id="DDoS"></a>
faq-abuse.html 77) <h3><a class="anchor" href="#DDoS">What about distributed denial of service attacks?</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 78)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 79) <p>Distributed denial of service attacks typically rely on having a group
faq-abuse.html 80) of thousands of computers all sending floods of traffic to a victim. Since
faq-abuse.html 81) the goal is to overpower the bandwidth of the victim, they typically send
faq-abuse.html 82) UDP packets since those don't require handshakes or coordination. </p>
faq-abuse.html 83)
faq-abuse.html 84) <p>But because Tor only transports correctly-formed TCP streams, not
faq-abuse.html 85) all IP packets, you cannot send UDP packets over Tor. (You can't do
faq-abuse.html 86) specialized forms of this attack like SYN flooding either.) So ordinary
faq-abuse.html 87) DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth
faq-abuse.html 88) amplification attacks against external sites: you need to send in a byte
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 89) for every byte that the Tor network will send to your destination. So
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 90) in general, attackers who control enough bandwidth to launch an effective
faq-abuse.html 91) DDoS attack can do it just fine without Tor. </p>
faq-abuse.html 92)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 93) <a id="WhatAboutSpammers"></a>
faq-abuse.html 94) <h3><a class="anchor" href="#WhatAboutSpammers">What about spammers?</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 95)
|
clean up the spammer section
Roger Dingledine authored 19 years ago
|
faq-abuse.html 96) <p>The simple answer: The default Tor exit policy rejects all outgoing
faq-abuse.html 97) port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 98) work by default. It's possible that some server operators will enable
faq-abuse.html 99) port 25 on their particular exit node, in which case that computer will
faq-abuse.html 100) allow outgoing mails; but that individual could just set up an open mail
faq-abuse.html 101) relay too, independent of Tor. In short, Tor isn't useful for spammers,
faq-abuse.html 102) because nearly all Tor servers refuse to deliver their mail. </p>
faq-abuse.html 103)
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 104) <p>Of course, it's not all about delivering the mail. Spammers can use
faq-abuse.html 105) Tor to connect to open HTTP proxies (and from there to SMTP servers),
faq-abuse.html 106) to connect to badly written mail-sending CGI scripts, and to control
faq-abuse.html 107) their botnets.
faq-abuse.html 108) </p>
faq-abuse.html 109)
faq-abuse.html 110) <p>The better answer: Spammers are already doing great without Tor. They
|
clean up the spammer section
Roger Dingledine authored 19 years ago
|
faq-abuse.html 111) have armies of compromised computers that do their spamming. The added
faq-abuse.html 112) complexity of getting new software installed and configured, and doing
faq-abuse.html 113) Tor's public key operations, etc, makes it not economically worthwhile
faq-abuse.html 114) for them to use Tor. </p>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 115)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 116) <a id="ExitPolicies"></a>
faq-abuse.html 117) <h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 118)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 119) <p>Each Tor server has an exit policy that specifies what sort of
faq-abuse.html 120) outbound connections are allowed or refused from that server. The exit
faq-abuse.html 121) policies are propagated to the client via the directory, so clients
faq-abuse.html 122) will automatically avoid picking exit nodes that would refuse to exit
faq-abuse.html 123) to their intended destination. </p>
faq-abuse.html 124)
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 125) <p>This way each server can decide the services, hosts, and networks
faq-abuse.html 126) he wants to allow connections to, based on abuse potential and his own
faq-abuse.html 127) situation. </p>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 128)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 129) <a id="HowMuchAbuse"></a>
faq-abuse.html 130) <h3><a class="anchor" href="#HowMuchAbuse">Does Tor get much abuse?</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 131)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 132) <p>Not much, in the grand scheme of things. We've been running the network
faq-abuse.html 133) since October 2003, and it's only generated a handful of complaints. Of
faq-abuse.html 134) course, like all privacy-oriented networks on the net, we attract our
faq-abuse.html 135) share of jerks. Tor's exit policies help separate the role of "willing
faq-abuse.html 136) to donate resources to the network" from the role of "willing to deal
faq-abuse.html 137) with exit abuse complaints", so we hope our network is more sustainable
faq-abuse.html 138) than past attempts at anonymity networks. </p>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 139)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 140) <p>Since Tor has <a
faq-abuse.html 141) href="http://tor.eff.org/cvs/tor/doc/tor-doc.html">many good uses as
faq-abuse.html 142) well</a>, we feel that we're doing pretty well at striking a balance
faq-abuse.html 143) currently. </p>
faq-abuse.html 144)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 145) <a id="TypicalAbuses"></a>
faq-abuse.html 146) <h3><a class="anchor" href="#TypicalAbuses">So what should I expect if I run a server?</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 147)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 148) <p>If you run a Tor server that allows exit connections (such as the
faq-abuse.html 149) default exit policy), it's probably safe to say that you will eventually
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 150) hear from somebody. Abuse complaints can come in a variety of forms. Abuse
faq-abuse.html 151) complaints may come in a variety of forms. For example: </p>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 152) <ul>
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 153) <li>Somebody connects to hotmail, and sends a ransom note to a
faq-abuse.html 154) company. The
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 155) FBI sends you a polite email, you explain that you run a Tor server,
faq-abuse.html 156) and they say 'oh well' and leave you alone. [Port 80]</li>
faq-abuse.html 157) <li>Somebody tries to get you shut down by using Tor to connect to google
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 158) groups and post spam to usenet, and then sending an angry mail to
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 159) your ISP about how you're destroying the world. [Port 80]</li>
faq-abuse.html 160) <li>Somebody connects to an irc network and makes a nuisance of
faq-abuse.html 161) himself. Your ISP gets polite mail about how your computer has been
faq-abuse.html 162) compromised; and/or your computer gets ddosed. [Port 6667]</li>
faq-abuse.html 163) <li>Somebody uses Tor to download a Vin Diesel movie, and
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 164) your ISP gets a DMCA takedown notice. See EFF's <a
faq-abuse.html 165) href="http://tor.eff.org/eff/tor-dmca-response.html">Tor DMCA Response
faq-abuse.html 166) Template</a>, which explains to your ISP why they can probably ignore
faq-abuse.html 167) the notice without any liability. [Arbitrary ports]</li>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 168) </ul>
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 169)
faq-abuse.html 170) <p>You might also find that your Tor server's IP is blocked from accessing
faq-abuse.html 171) some Internet sites/services. This might happen regardless of your exit
faq-abuse.html 172) policy, because some groups don't seem to know or care that Tor has
faq-abuse.html 173) exit policies. (If you have a spare IP not used for other activities,
faq-abuse.html 174) you might consider running your Tor server on it.) For example, </p>
faq-abuse.html 175)
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 176) <ul>
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 177) <li>Because of a few cases of anonymous jerks messing with its web
faq-abuse.html 178) pages, Wikipedia is currently blocking many Tor server IPs from writing
faq-abuse.html 179) (reading still works). We're talking to Wikipedia about how they might
faq-abuse.html 180) control abuse while still providing access to anonymous contributors,
faq-abuse.html 181) who often have hot news or inside info on a topic but don't want to risk
faq-abuse.html 182) revealing their identities when publishing it (or don't want to reveal
faq-abuse.html 183) to local observers that they're accessing Wikipedia). Slashdot is also
faq-abuse.html 184) in the same boat.</li>
faq-abuse.html 185) <li>SORBS is putting some Tor server IPs on their email
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 186) blacklist as well. They do this because they passively detect whether your
faq-abuse.html 187) server connects to certain IRC networks, and they conclude from this that
faq-abuse.html 188) your server is capable of spamming. We're working with them to teach them
faq-abuse.html 189) that not all software works this way. Until then, we recommend you avoid
faq-abuse.html 190) them, and teach your friends (if they use them) to avoid them too.</li>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 191) </ul>
abuse.html 192)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 193) <a id="IrcBans"></a>
faq-abuse.html 194) <h3><a class="anchor" href="#IrcBans">Tor is banned from the IRC network I want to use.</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 195)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 196) <p>Sometimes jerks make use of Tor to troll IRC channels. This abuse
faq-abuse.html 197) results in IP-specific temporary bans ("klines" in IRC lingo), as the
faq-abuse.html 198) network operators try to keep the troll off of their network. </p>
faq-abuse.html 199)
faq-abuse.html 200) <p>This response underscores a fundamental flaw in IRC's security model:
faq-abuse.html 201) they assume that IP addresses equate to humans, and by banning the
faq-abuse.html 202) IP address they can ban the human. In reality this is not the case --
faq-abuse.html 203) many such trolls routinely make use of the literally millions of open
faq-abuse.html 204) proxies and compromised computers around the Internet. The IRC networks
faq-abuse.html 205) are fighting a losing battle of trying to block all these nodes,
faq-abuse.html 206) and an entire cottage industry of blacklists and counter-trolls has
faq-abuse.html 207) sprung up based on this flawed security model (not unlike the antivirus
faq-abuse.html 208) industry). The Tor network is just a drop in the bucket here. </p>
faq-abuse.html 209)
faq-abuse.html 210) <p>On the other hand, from the viewpoint of IRC server operators, security
faq-abuse.html 211) is not an all-or-nothing thing. By responding quickly to trolls or
faq-abuse.html 212) any other social attack, it may be possible to make the attack scenario
faq-abuse.html 213) less attractive to the attacker. And most individual IP addresses do
faq-abuse.html 214) equate to individual humans, on any given IRC network at any given time.
faq-abuse.html 215) The exceptions include NAT gateways which may be allocated access as
faq-abuse.html 216) special cases. While it's a losing battle to try to stop the use of open
faq-abuse.html 217) proxies, it's not generally a losing battle to keep klining a single
faq-abuse.html 218) ill-behaved IRC user until that user gets bored and goes away. </p>
faq-abuse.html 219)
faq-abuse.html 220) <p>But the real answer is to implement application-level auth systems,
faq-abuse.html 221) to let in well-behaving users and keep out badly-behaving users. This
faq-abuse.html 222) needs to be based on some property of the human (such as a password he
faq-abuse.html 223) knows), not some property of the way his packets are transported. </p>
faq-abuse.html 224)
faq-abuse.html 225) <p>Of course, not all IRC networks are trying to ban Tor nodes. After
faq-abuse.html 226) all, quite a few people use Tor to IRC in privacy in order to carry
faq-abuse.html 227) on legitimate communications without tying them to their real-world
faq-abuse.html 228) identity. Each IRC network needs to decide for itself if blocking a few
faq-abuse.html 229) more of the millions of IPs that bad people can use is worth losing the
faq-abuse.html 230) contributions from the well-behaved Tor users. </p>
faq-abuse.html 231)
faq-abuse.html 232) <p>If you're being blocked, have a discussion with the network operators
faq-abuse.html 233) and explain the issues to them. They may not be aware of the existence of
faq-abuse.html 234) Tor at all, or they may not be aware that the hostnames they're klining
faq-abuse.html 235) are Tor exit nodes. If you explain the problem, and they conclude that
faq-abuse.html 236) Tor ought to be blocked, you may want to consider moving to a network that
faq-abuse.html 237) is more open to free speech. Maybe inviting them to #tor on irc.oftc.net
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 238) will help show them that we are not all evil people. </p>
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 239)
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 240) <p>Finally, if you become aware of an IRC network that seems to be
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 241) blocking Tor, or a single Tor exit node, please put that information on <a
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 242) href="http://wiki.noreply.org/wiki/TheOnionRouter/BlockingIrc">The Tor
faq-abuse.html 243) IRC block tracker</a>
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 244) so that others can share. At least one IRC network consults that page
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 245) to unblock exit nodes that have been blocked inadvertently. </p>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 246)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 247) <a id="SMTPBans"></a>
faq-abuse.html 248) <h3><a class="anchor" href="#SMTPBans">Your nodes are banned from the mail server I want to use.</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 249)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 250) <p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for
faq-abuse.html 251) spamming</a>, some over-zealous blacklisters seem to think that all
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 252) open networks like Tor are evil --- they attempt to strong-arm network
faq-abuse.html 253) administrators on policy, service and routing issues, and then extract
faq-abuse.html 254) ransoms from victims. </p>
faq-abuse.html 255)
faq-abuse.html 256) <p>If your server administrators decide to make use of these
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 257) blacklists to refuse incoming mail, you should have a conversation with
|
revise the abuse faq based...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 258) them and explain about Tor and Tor's exit policies. </p>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 259)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 260) <a id="Bans"></a>
faq-abuse.html 261) <h3><a class="anchor" href="#Bans">I want to ban the Tor network from my service.</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 262)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 263) <p>First, ask yourself if there's a way to do application-level decisions
faq-abuse.html 264) to separate the legitimate users from the jerks. For example, you might
faq-abuse.html 265) have certain areas of the site, or certain privileges like posting,
faq-abuse.html 266) available only to people who are registered. You could set up this
faq-abuse.html 267) distinction only for certain IP addresses such as Tor exit nodes. This
faq-abuse.html 268) way you can have multi-tiered access and not have to ban everything. </p>
faq-abuse.html 269)
faq-abuse.html 270) <p>Second, consider that thousands of people use Tor every day to protect
faq-abuse.html 271) against data-gathering corporations like Doubleclick while going about
faq-abuse.html 272) their normal activities. Some Tor users may be legitimately connecting
faq-abuse.html 273) to your service right now to carry on normal activities. You need to
faq-abuse.html 274) decide whether banning the Tor network is worth losing the contributions
faq-abuse.html 275) of these users, as well as potential future such users. </p>
faq-abuse.html 276)
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 277) <p>At this point, you should also ask yourself what you do about other
faq-abuse.html 278) services that aggregate many users behind a few IP addresses. Tor is
faq-abuse.html 279) not so different from AOL in this respect.</p>
faq-abuse.html 280)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 281) <p>Lastly, please remember that Tor servers have individual exit
faq-abuse.html 282) policies. Many Tor servers do not allow exiting connections at
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 283) all. Many of those that do allow some exit connections probably already
faq-abuse.html 284) disallow connections to
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 285) your service. When you go about banning nodes, you should parse the
faq-abuse.html 286) exit policies and only block the ones that allow these connections;
faq-abuse.html 287) and you should keep in mind that exit policies can change (as well as
faq-abuse.html 288) the overall list of nodes in the network). </p>
faq-abuse.html 289)
faq-abuse.html 290) <p>If you really want to do this, there is a
faq-abuse.html 291) python script to parse the Tor directory <a
faq-abuse.html 292) href="http://tor.eff.org/cvs/tor/contrib/exitlist">here</a>. </p>
faq-abuse.html 293)
|
added the rest of the ancho...
Thomas Sjögren authored 19 years ago
|
faq-abuse.html 294) <a id="LegalQuestions"></a>
faq-abuse.html 295) <h3><a class="anchor" href="#LegalQuestions">I have legal questions about Tor abuse.</a></h3>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 296)
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 297) <p>We're only the developers. We can answer technical questions, but
faq-abuse.html 298) we're not the ones to talk to about legal questions or concerns. </p>
faq-abuse.html 299)
faq-abuse.html 300) <p>Please take a look at the <a
faq-abuse.html 301) href="http://tor.eff.org//eff/tor-legal-faq.html">Tor Legal FAQ</a>,
|
clean up more abuse faq ans...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 302) and contact EFF directly if you have any further legal questions. </p>
|
First draft of an abuse page.
Andrew Lewman authored 19 years ago
|
abuse.html 303)
|
Updated faq-abuse.html to m...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 304) </div><!-- #main -->
faq-abuse.html 305) </div>
faq-abuse.html 306) <div class="bottom" id="bottom">
|
clean up faq-abuse page; ad...
Roger Dingledine authored 19 years ago
|
faq-abuse.html 307) <i><a href="mailto:tor-webmaster@freehaven.net" class="smalllink">Webmaster</a></i> - $Id$
|
Updated faq-abuse.html to m...
Andrew Lewman authored 19 years ago
|
faq-abuse.html 308) </div>
|