patches to the abuse faq as suggested by chris
Roger Dingledine

Roger Dingledine commited on 2005-08-06 03:20:08
Zeige 1 geänderte Dateien mit 23 Einfügungen und 20 Löschungen.

... ...
@@ -57,8 +57,8 @@ literally millions of Windows machines around the world. </p>
57 57
 <p>Tor aims to provide protection for ordinary people who want to follow
58 58
 the law. Only criminals have privacy right now; we need to fix that. </p>
59 59
 
60
-<p>Some advocates of anonymity explain that it's just a tradeoff ---
61
-accepting the bad uses for the good ones --- but we don't think that's
60
+<p>Some advocates of anonymity explain that it's just a tradeoff &mdash;
61
+accepting the bad uses for the good ones &mdash; but we don't think that's
62 62
 how it works in the case of Tor.
63 63
 Criminals and other bad people have the motivation to learn how to
64 64
 get good anonymity, and many have the motivation to pay well to achieve
... ...
@@ -93,25 +93,27 @@ DDoS attack can do it just fine without Tor. </p>
93 93
 <a id="WhatAboutSpammers"></a>
94 94
 <h3><a class="anchor" href="#WhatAboutSpammers">What about spammers?</a></h3>
95 95
 
96
-<p>The simple answer: The default Tor exit policy rejects all outgoing
96
+<p>First of all, the default Tor exit policy rejects all outgoing
97 97
 port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to
98 98
 work by default. It's possible that some server operators will enable
99 99
 port 25 on their particular exit node, in which case that computer will
100 100
 allow outgoing mails; but that individual could just set up an open mail
101
-relay too, independent of Tor. In short, Tor isn't useful for spammers,
102
-because nearly all Tor servers refuse to deliver their mail. </p>
101
+relay too, independent of Tor. In short, Tor isn't useful for spamming,
102
+because nearly all Tor servers refuse to deliver the mail. </p>
103 103
 
104 104
 <p>Of course, it's not all about delivering the mail. Spammers can use
105
-Tor to connect to open HTTP proxies (and from there to SMTP servers),
106
-to connect to badly written mail-sending CGI scripts, and to control
107
-their botnets.
105
+Tor to connect to open HTTP proxies (and from there to SMTP servers); to
106
+connect to badly written mail-sending CGI scripts; and to control their
107
+botnets &mdash; that is, to covertly communicate with armies of
108
+compromised computers that deliver the spam.
108 109
 </p>
109 110
 
110
-<p>The better answer: Spammers are already doing great without Tor. They
111
-have armies of compromised computers that do their spamming. The added
112
-complexity of getting new software installed and configured, and doing
113
-Tor's public key operations, etc, makes it not economically worthwhile
114
-for them to use Tor. </p>
111
+<p>
112
+This is a shame, but notice that spammers are already doing great
113
+without Tor. Also, remember that many of their more subtle communication
114
+mechanisms (like spoofed UDP packets) can't be used over Tor, because
115
+it only transports correctly-formed TCP connections.
116
+</p>
115 117
 
116 118
 <a id="ExitPolicies"></a>
117 119
 <h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3>
... ...
@@ -199,7 +201,7 @@ network operators try to keep the troll off of their network. </p>
199 201
 
200 202
 <p>This response underscores a fundamental flaw in IRC's security model:
201 203
 they assume that IP addresses equate to humans, and by banning the
202
-IP address they can ban the human. In reality this is not the case --
204
+IP address they can ban the human. In reality this is not the case &mdash;
203 205
 many such trolls routinely make use of the literally millions of open
204 206
 proxies and compromised computers around the Internet. The IRC networks
205 207
 are fighting a losing battle of trying to block all these nodes,
... ...
@@ -249,7 +251,7 @@ to unblock exit nodes that have been blocked inadvertently. </p>
249 251
 
250 252
 <p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for
251 253
 spamming</a>, some over-zealous blacklisters seem to think that all
252
-open networks like Tor are evil --- they attempt to strong-arm network
254
+open networks like Tor are evil &mdash; they attempt to strong-arm network
253 255
 administrators on policy, service, and routing issues, and then extract
254 256
 ransoms from victims. </p>
255 257
 
... ...
@@ -272,7 +274,7 @@ against data-gathering corporations like Doubleclick while going about
272 274
 their normal  activities. Some Tor users may be legitimately connecting
273 275
 to your service right now to carry on normal activities. You need to
274 276
 decide whether banning the Tor network is worth losing the contributions
275
-of these users, as well as potential future such users. </p>
277
+of these users, as well as potential future legitimate users. </p>
276 278
 
277 279
 <p>At this point, you should also ask yourself what you do about other
278 280
 services that aggregate many users behind a few IP addresses. Tor is
... ...
@@ -280,16 +282,17 @@ not so different from AOL in this respect.</p>
280 282
 
281 283
 <p>Lastly, please remember that Tor servers have individual exit
282 284
 policies. Many Tor servers do not allow exiting connections at
283
-all. Many of those that do allow some exit connections probably already
285
+all. Many of those that do allow some exit connections might already
284 286
 disallow connections to
285 287
 your service. When you go about banning nodes, you should parse the
286 288
 exit policies and only block the ones that allow these connections;
287 289
 and you should keep in mind that exit policies can change (as well as
288 290
 the overall list of nodes in the network). </p>
289 291
 
290
-<p>If you really want to do this, there is a
291
-python script to parse the Tor directory <a
292
-href="/cvs/tor/contrib/exitlist">here</a>. </p>
292
+<p>If you really want to do this, we provide a
293
+<a href="/cvs/tor/contrib/exitlist">Python script to parse the Tor
294
+directory</a>.
295
+</p>
293 296
 
294 297
 <a id="TracingUsers"></a>
295 298
 <h3><a class="anchor" href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></h3>
296 299