Roger Dingledine commited on 2005-08-06 03:20:08
Zeige 1 geänderte Dateien mit 23 Einfügungen und 20 Löschungen.
... | ... |
@@ -57,8 +57,8 @@ literally millions of Windows machines around the world. </p> |
57 | 57 |
<p>Tor aims to provide protection for ordinary people who want to follow |
58 | 58 |
the law. Only criminals have privacy right now; we need to fix that. </p> |
59 | 59 |
|
60 |
-<p>Some advocates of anonymity explain that it's just a tradeoff --- |
|
61 |
-accepting the bad uses for the good ones --- but we don't think that's |
|
60 |
+<p>Some advocates of anonymity explain that it's just a tradeoff — |
|
61 |
+accepting the bad uses for the good ones — but we don't think that's |
|
62 | 62 |
how it works in the case of Tor. |
63 | 63 |
Criminals and other bad people have the motivation to learn how to |
64 | 64 |
get good anonymity, and many have the motivation to pay well to achieve |
... | ... |
@@ -93,25 +93,27 @@ DDoS attack can do it just fine without Tor. </p> |
93 | 93 |
<a id="WhatAboutSpammers"></a> |
94 | 94 |
<h3><a class="anchor" href="#WhatAboutSpammers">What about spammers?</a></h3> |
95 | 95 |
|
96 |
-<p>The simple answer: The default Tor exit policy rejects all outgoing |
|
96 |
+<p>First of all, the default Tor exit policy rejects all outgoing |
|
97 | 97 |
port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to |
98 | 98 |
work by default. It's possible that some server operators will enable |
99 | 99 |
port 25 on their particular exit node, in which case that computer will |
100 | 100 |
allow outgoing mails; but that individual could just set up an open mail |
101 |
-relay too, independent of Tor. In short, Tor isn't useful for spammers, |
|
102 |
-because nearly all Tor servers refuse to deliver their mail. </p> |
|
101 |
+relay too, independent of Tor. In short, Tor isn't useful for spamming, |
|
102 |
+because nearly all Tor servers refuse to deliver the mail. </p> |
|
103 | 103 |
|
104 | 104 |
<p>Of course, it's not all about delivering the mail. Spammers can use |
105 |
-Tor to connect to open HTTP proxies (and from there to SMTP servers), |
|
106 |
-to connect to badly written mail-sending CGI scripts, and to control |
|
107 |
-their botnets. |
|
105 |
+Tor to connect to open HTTP proxies (and from there to SMTP servers); to |
|
106 |
+connect to badly written mail-sending CGI scripts; and to control their |
|
107 |
+botnets — that is, to covertly communicate with armies of |
|
108 |
+compromised computers that deliver the spam. |
|
108 | 109 |
</p> |
109 | 110 |
|
110 |
-<p>The better answer: Spammers are already doing great without Tor. They |
|
111 |
-have armies of compromised computers that do their spamming. The added |
|
112 |
-complexity of getting new software installed and configured, and doing |
|
113 |
-Tor's public key operations, etc, makes it not economically worthwhile |
|
114 |
-for them to use Tor. </p> |
|
111 |
+<p> |
|
112 |
+This is a shame, but notice that spammers are already doing great |
|
113 |
+without Tor. Also, remember that many of their more subtle communication |
|
114 |
+mechanisms (like spoofed UDP packets) can't be used over Tor, because |
|
115 |
+it only transports correctly-formed TCP connections. |
|
116 |
+</p> |
|
115 | 117 |
|
116 | 118 |
<a id="ExitPolicies"></a> |
117 | 119 |
<h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3> |
... | ... |
@@ -199,7 +201,7 @@ network operators try to keep the troll off of their network. </p> |
199 | 201 |
|
200 | 202 |
<p>This response underscores a fundamental flaw in IRC's security model: |
201 | 203 |
they assume that IP addresses equate to humans, and by banning the |
202 |
-IP address they can ban the human. In reality this is not the case -- |
|
204 |
+IP address they can ban the human. In reality this is not the case — |
|
203 | 205 |
many such trolls routinely make use of the literally millions of open |
204 | 206 |
proxies and compromised computers around the Internet. The IRC networks |
205 | 207 |
are fighting a losing battle of trying to block all these nodes, |
... | ... |
@@ -249,7 +251,7 @@ to unblock exit nodes that have been blocked inadvertently. </p> |
249 | 251 |
|
250 | 252 |
<p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for |
251 | 253 |
spamming</a>, some over-zealous blacklisters seem to think that all |
252 |
-open networks like Tor are evil --- they attempt to strong-arm network |
|
254 |
+open networks like Tor are evil — they attempt to strong-arm network |
|
253 | 255 |
administrators on policy, service, and routing issues, and then extract |
254 | 256 |
ransoms from victims. </p> |
255 | 257 |
|
... | ... |
@@ -272,7 +274,7 @@ against data-gathering corporations like Doubleclick while going about |
272 | 274 |
their normal activities. Some Tor users may be legitimately connecting |
273 | 275 |
to your service right now to carry on normal activities. You need to |
274 | 276 |
decide whether banning the Tor network is worth losing the contributions |
275 |
-of these users, as well as potential future such users. </p> |
|
277 |
+of these users, as well as potential future legitimate users. </p> |
|
276 | 278 |
|
277 | 279 |
<p>At this point, you should also ask yourself what you do about other |
278 | 280 |
services that aggregate many users behind a few IP addresses. Tor is |
... | ... |
@@ -280,16 +282,17 @@ not so different from AOL in this respect.</p> |
280 | 282 |
|
281 | 283 |
<p>Lastly, please remember that Tor servers have individual exit |
282 | 284 |
policies. Many Tor servers do not allow exiting connections at |
283 |
-all. Many of those that do allow some exit connections probably already |
|
285 |
+all. Many of those that do allow some exit connections might already |
|
284 | 286 |
disallow connections to |
285 | 287 |
your service. When you go about banning nodes, you should parse the |
286 | 288 |
exit policies and only block the ones that allow these connections; |
287 | 289 |
and you should keep in mind that exit policies can change (as well as |
288 | 290 |
the overall list of nodes in the network). </p> |
289 | 291 |
|
290 |
-<p>If you really want to do this, there is a |
|
291 |
-python script to parse the Tor directory <a |
|
292 |
-href="/cvs/tor/contrib/exitlist">here</a>. </p> |
|
292 |
+<p>If you really want to do this, we provide a |
|
293 |
+<a href="/cvs/tor/contrib/exitlist">Python script to parse the Tor |
|
294 |
+directory</a>. |
|
295 |
+</p> |
|
293 | 296 |
|
294 | 297 |
<a id="TracingUsers"></a> |
295 | 298 |
<h3><a class="anchor" href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></h3> |
296 | 299 |