[90948] in North American Network Operators' Group
Re: Tor and network security/administration
daemon@ATHENA.MIT.EDU (Todd Vierling)
Wed Jun 21 17:09:12 2006
Date: Wed, 21 Jun 2006 17:08:43 -0400
From: "Todd Vierling" <tv@pobox.com>
To: "Kevin Day" <toasty@dragondata.com>
Cc: "Lionel Elie Mamane" <lionel@mamane.lu>,
"North American Noise and Off-topic Gripes" <nanog@merit.edu>
In-Reply-To: <CDE6A5EC-A6F7-4E07-8502-C4036248447B@dragondata.com>
Errors-To: owner-nanog@merit.edu
On 6/21/06, Kevin Day <toasty@dragondata.com> wrote:
>
> Failing that, having an exit node look at HTTP headers back from the
> server that contained a "X-No-Anonymous" header to say that the host
> at that IP shouldn't allow Tor to use it would work.
What's to stop one or more exit node operators from hacking such a
check right back out of the code?
This is a better idea, but still has a bit of defeats-the-whole-point
to it, as it would depend on people obeying that header voluntarily.
Social vs. technological divide, again.
--
-- Todd Vierling <tv@duh.org> <tv@pobox.com> <todd@vierling.name>