[90962] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Tor and network security/administration

daemon@ATHENA.MIT.EDU (Lionel Elie Mamane)
Thu Jun 22 03:22:26 2006

Date: Thu, 22 Jun 2006 09:21:57 +0200
From: Lionel Elie Mamane <lionel@mamane.lu>
To: nanog@merit.edu
Mail-Followup-To: nanog@merit.edu
In-Reply-To: <20060621215306.GA23744@icarus.home.lan>
Errors-To: owner-nanog@merit.edu


On Wed, Jun 21, 2006 at 02:53:06PM -0700, Jeremy Chadwick wrote:
> On Wed, Jun 21, 2006 at 05:02:47PM -0400, Todd Vierling wrote:

>> If the point of the technology is to add a degree of anonymity, you
>> can be pretty sure that a marker expressly designed to state the
>> message "Hi, I'm anonymous!" will never be a standard feature of
>> said technology.  That's a pretty obvious non-starter.

> Which begs the original question of this thread which I started:
> with that said, how exactly does one filter this technology?

The list of IP addresses of tor nodes is *public*. If tor users can
get it, you can, too. Some IRC networks already run a stripped-down
tor client to always tag connections from tor as such, and permit
channel operators to ban such connections from their channel should
they wish so.

-- 
Lionel

home help back first fref pref prev next nref lref last post