Roger Dingledine commited on 2005-08-06 03:20:08
Zeige 1 geänderte Dateien mit 23 Einfügungen und 20 Löschungen.
| ... | ... |
@@ -57,8 +57,8 @@ literally millions of Windows machines around the world. </p> |
| 57 | 57 |
<p>Tor aims to provide protection for ordinary people who want to follow |
| 58 | 58 |
the law. Only criminals have privacy right now; we need to fix that. </p> |
| 59 | 59 |
|
| 60 |
-<p>Some advocates of anonymity explain that it's just a tradeoff --- |
|
| 61 |
-accepting the bad uses for the good ones --- but we don't think that's |
|
| 60 |
+<p>Some advocates of anonymity explain that it's just a tradeoff — |
|
| 61 |
+accepting the bad uses for the good ones — but we don't think that's |
|
| 62 | 62 |
how it works in the case of Tor. |
| 63 | 63 |
Criminals and other bad people have the motivation to learn how to |
| 64 | 64 |
get good anonymity, and many have the motivation to pay well to achieve |
| ... | ... |
@@ -93,25 +93,27 @@ DDoS attack can do it just fine without Tor. </p> |
| 93 | 93 |
<a id="WhatAboutSpammers"></a> |
| 94 | 94 |
<h3><a class="anchor" href="#WhatAboutSpammers">What about spammers?</a></h3> |
| 95 | 95 |
|
| 96 |
-<p>The simple answer: The default Tor exit policy rejects all outgoing |
|
| 96 |
+<p>First of all, the default Tor exit policy rejects all outgoing |
|
| 97 | 97 |
port 25 (SMTP) traffic. So sending spam mail through Tor isn't going to |
| 98 | 98 |
work by default. It's possible that some server operators will enable |
| 99 | 99 |
port 25 on their particular exit node, in which case that computer will |
| 100 | 100 |
allow outgoing mails; but that individual could just set up an open mail |
| 101 |
-relay too, independent of Tor. In short, Tor isn't useful for spammers, |
|
| 102 |
-because nearly all Tor servers refuse to deliver their mail. </p> |
|
| 101 |
+relay too, independent of Tor. In short, Tor isn't useful for spamming, |
|
| 102 |
+because nearly all Tor servers refuse to deliver the mail. </p> |
|
| 103 | 103 |
|
| 104 | 104 |
<p>Of course, it's not all about delivering the mail. Spammers can use |
| 105 |
-Tor to connect to open HTTP proxies (and from there to SMTP servers), |
|
| 106 |
-to connect to badly written mail-sending CGI scripts, and to control |
|
| 107 |
-their botnets. |
|
| 105 |
+Tor to connect to open HTTP proxies (and from there to SMTP servers); to |
|
| 106 |
+connect to badly written mail-sending CGI scripts; and to control their |
|
| 107 |
+botnets — that is, to covertly communicate with armies of |
|
| 108 |
+compromised computers that deliver the spam. |
|
| 108 | 109 |
</p> |
| 109 | 110 |
|
| 110 |
-<p>The better answer: Spammers are already doing great without Tor. They |
|
| 111 |
-have armies of compromised computers that do their spamming. The added |
|
| 112 |
-complexity of getting new software installed and configured, and doing |
|
| 113 |
-Tor's public key operations, etc, makes it not economically worthwhile |
|
| 114 |
-for them to use Tor. </p> |
|
| 111 |
+<p> |
|
| 112 |
+This is a shame, but notice that spammers are already doing great |
|
| 113 |
+without Tor. Also, remember that many of their more subtle communication |
|
| 114 |
+mechanisms (like spoofed UDP packets) can't be used over Tor, because |
|
| 115 |
+it only transports correctly-formed TCP connections. |
|
| 116 |
+</p> |
|
| 115 | 117 |
|
| 116 | 118 |
<a id="ExitPolicies"></a> |
| 117 | 119 |
<h3><a class="anchor" href="#ExitPolicies">How do Tor exit policies work?</a></h3> |
| ... | ... |
@@ -199,7 +201,7 @@ network operators try to keep the troll off of their network. </p> |
| 199 | 201 |
|
| 200 | 202 |
<p>This response underscores a fundamental flaw in IRC's security model: |
| 201 | 203 |
they assume that IP addresses equate to humans, and by banning the |
| 202 |
-IP address they can ban the human. In reality this is not the case -- |
|
| 204 |
+IP address they can ban the human. In reality this is not the case — |
|
| 203 | 205 |
many such trolls routinely make use of the literally millions of open |
| 204 | 206 |
proxies and compromised computers around the Internet. The IRC networks |
| 205 | 207 |
are fighting a losing battle of trying to block all these nodes, |
| ... | ... |
@@ -249,7 +251,7 @@ to unblock exit nodes that have been blocked inadvertently. </p> |
| 249 | 251 |
|
| 250 | 252 |
<p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for |
| 251 | 253 |
spamming</a>, some over-zealous blacklisters seem to think that all |
| 252 |
-open networks like Tor are evil --- they attempt to strong-arm network |
|
| 254 |
+open networks like Tor are evil — they attempt to strong-arm network |
|
| 253 | 255 |
administrators on policy, service, and routing issues, and then extract |
| 254 | 256 |
ransoms from victims. </p> |
| 255 | 257 |
|
| ... | ... |
@@ -272,7 +274,7 @@ against data-gathering corporations like Doubleclick while going about |
| 272 | 274 |
their normal activities. Some Tor users may be legitimately connecting |
| 273 | 275 |
to your service right now to carry on normal activities. You need to |
| 274 | 276 |
decide whether banning the Tor network is worth losing the contributions |
| 275 |
-of these users, as well as potential future such users. </p> |
|
| 277 |
+of these users, as well as potential future legitimate users. </p> |
|
| 276 | 278 |
|
| 277 | 279 |
<p>At this point, you should also ask yourself what you do about other |
| 278 | 280 |
services that aggregate many users behind a few IP addresses. Tor is |
| ... | ... |
@@ -280,16 +282,17 @@ not so different from AOL in this respect.</p> |
| 280 | 282 |
|
| 281 | 283 |
<p>Lastly, please remember that Tor servers have individual exit |
| 282 | 284 |
policies. Many Tor servers do not allow exiting connections at |
| 283 |
-all. Many of those that do allow some exit connections probably already |
|
| 285 |
+all. Many of those that do allow some exit connections might already |
|
| 284 | 286 |
disallow connections to |
| 285 | 287 |
your service. When you go about banning nodes, you should parse the |
| 286 | 288 |
exit policies and only block the ones that allow these connections; |
| 287 | 289 |
and you should keep in mind that exit policies can change (as well as |
| 288 | 290 |
the overall list of nodes in the network). </p> |
| 289 | 291 |
|
| 290 |
-<p>If you really want to do this, there is a |
|
| 291 |
-python script to parse the Tor directory <a |
|
| 292 |
-href="/cvs/tor/contrib/exitlist">here</a>. </p> |
|
| 292 |
+<p>If you really want to do this, we provide a |
|
| 293 |
+<a href="/cvs/tor/contrib/exitlist">Python script to parse the Tor |
|
| 294 |
+directory</a>. |
|
| 295 |
+</p> |
|
| 293 | 296 |
|
| 294 | 297 |
<a id="TracingUsers"></a> |
| 295 | 298 |
<h3><a class="anchor" href="#TracingUsers">I have a compelling reason to trace a Tor user. Can you help?</a></h3> |
| 296 | 299 |