North American Network Operators Group|
Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical
Re: Tor and network security/administration
On Jun 21, 2006, at 2:53 PM, Jeremy Chadwick wrote:
Why bother?On Wed, Jun 21, 2006 at 05:02:47PM -0400, Todd Vierling wrote:If the point of the technology is to add a degree of anonymity, you can be pretty sure that a marker expressly designed to state the message "Hi, I'm anonymous!" will never be a standard feature of said technology. That's a pretty obvious non-starter.Which begs the original question of this thread which I started: with that said, how exactly does one filter this technology?
If the traffic is abusive, why do you care it comes from Tor? If there's
a pattern of abusive traffic from a few hundred IP addresses, block
those addresses. If you're particularly prone to idiots from Tor (IRC,
say) then preemptively blocking them might be nice, but I doubt the
number of new Tor nodes increases at a fast enough rate for it to be
If you want to take legal action you know exactly who is responsible
for the traffic, so whether it's coming from a Tor exit node or not isn't
terribly interesting in that case either.
If you still do want to then there are some very obvious ways to do
so, combining a Tor client and a server you run.
(And this is from the perspective of someone who does not believe
there is any legitimate use for Tor at all.)