[115512] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: tor

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Wed Jun 24 23:51:01 2009

In-Reply-To: <m2k531l8oc.wl%randy@psg.com>
Date: Thu, 25 Jun 2009 09:20:11 +0530
From: Suresh Ramasubramanian <ops.lists@gmail.com>
To: Randy Bush <randy@psg.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Running what's effectively an anonymous open proxy is not a bright
idea, even if there's security bundled on..

John Gilmore found that out after Verio disconnected his perpetual
open relay for example ..  and TOR is just as nutty a concept.

Nothing less that I'd expect from the EFF, frankly speaking - but
clued people (and you are clued, for sure) shouldnt be running it.

There was that other fun when that swedish researcher was running a
fake tor exit node and turned up lots of embassy passwords etc -
mostly because embassy staffers found TOR a fun way to browse for
porn, bypassing firewalls from their offices

Uninstall it and forget about it, I'd say.

--srs

On Thu, Jun 25, 2009 at 1:13 AM, Randy Bush<randy@psg.com> wrote:
> sadly, naively turning up tor to help folk who wish to be anonymous in
> hard times gets one a lot of assertive email from self-important people
> who wear formal clothes.
>
> folk who learn this the hard way may find a pointer passed to me by smb
> helpful, <http://www.chrisbrunner.com/?p=119>.
>
> randy
>
>



-- 
Suresh Ramasubramanian (ops.lists@gmail.com)


home help back first fref pref prev next nref lref last post