Delivery-Date: Wed, 01 Oct 2014 14:10:53 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id B923B1E0C07;
	Wed,  1 Oct 2014 14:10:51 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id E5DAB2CF7D;
	Wed,  1 Oct 2014 18:10:47 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id E21A62641D
 for <tor-talk@lists.torproject.org>; Wed,  1 Oct 2014 18:10:42 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id DbCBia1Ptsmj for <tor-talk@lists.torproject.org>;
 Wed,  1 Oct 2014 18:10:42 +0000 (UTC)
Received: from atl4mhob07.myregisteredsite.com
 (atl4mhob07.myregisteredsite.com [209.17.115.45])
 by eugeni.torproject.org (Postfix) with ESMTP id B88A025AB6
 for <tor-talk@lists.torproject.org>; Wed,  1 Oct 2014 18:10:42 +0000 (UTC)
Received: from mailpod.hostingplatform.com ([10.30.71.205])
 by atl4mhob07.myregisteredsite.com (8.14.4/8.14.4) with ESMTP id
 s91IAd1s014613
 for <tor-talk@lists.torproject.org>; Wed, 1 Oct 2014 14:10:39 -0400
Received: (qmail 31431 invoked by uid 0); 1 Oct 2014 18:10:39 -0000
X-TCPREMOTEIP: 162.17.205.153
X-Authenticated-UID: datzrott@alizeepathology.com
Received: from unknown (HELO ALPATH26)
 (datzrott@alizeepathology.com@162.17.205.153)
 by 0 with ESMTPA; 1 Oct 2014 18:10:39 -0000
From: "Derric Atzrott" <datzrott@alizeepathology.com>
To: <tor-talk@lists.torproject.org>
References: <006e01cfdd7f$9fa4b370$deee1a50$@alizeepathology.com>
 <542C2D15.2020101@riseup.net>
In-Reply-To: <542C2D15.2020101@riseup.net>
Date: Wed, 1 Oct 2014 14:10:39 -0400
Organization: Alizee Pathology LLC.
Message-ID: <012401cfdda3$01978a30$04c69e90$@alizeepathology.com>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQH3Ic0CFjPy8W89qtGxwDKfI6rplgJnxOh9m7nEPNA=
Content-Language: en-gb
Subject: Re: [tor-talk] Wikimedia and Tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> You can't reliably block by IP address. It's unfair, because numerous
> users behind a NAT router will have the same public IP address. And it's
> also trivial to evade using proxies, with or without Tor. Blocking Tor
> (or even all known proxies) only stops the clueless. Anyone serious
> about evading a block could just use a private proxy on AWS (via Tor).

We do not usually permanently block IP addresses, and blocking them
only prevents editing not reading.  The purpose of a block is not
punitive, but to prevent abuse long enough that the attacker gives
up and moves on with life.

Blocking an IP address for a week to a couple of months and working
to identify IP addresses that permanently belong to organisations
such as schools or libraries stops the vast majority of abuse.  We
also work with Sysadmins at schools and libraries to get them to
pass XFF headers through their proxies so that we can block
individuals on their networks rather than the entire network.

I agree that blocking Tor or proxies is a pointless exercise, but I
can't argue with the folks that say that most of what comes from Tor
is abuse.  This is why I want to try to find a better way to solve
the problem than just blocking Tor (or for that matter proxies in
general as any solution to this should work pretty well for them).

> Even imposing a nontrivial cost for creating accounts (say 10 BTC) would
> not help. Determined adversaries would pay it. And of course, that would
> exclude numerous innocents who wouldn't or couldn't pay.

Yeah, I was just listing off some items that we came up with brainstorming
over the past few years.  Clearly that item was cut fairly quickly.  Some
type of proof of work might work, so long as it was expensive enough to
deter attackers after the first few times while still cheap enough to
generate just once for well behaved actors.

> That would exclude numerous users living under repressive regimes. But
> then, Wikimedia is already doing that by blocking edits by Tor users.

Indeed.  In some parts of China and Iran Tor is one of the only ways to
even read Wikipedia.

> The bottom line is that blocking Tor harms numerous innocent users, and
> by no means excludes seriously malicious users.

I agree that it harms numerous innocent users, but it does stop those
wish to hurt Wikipedia's content or community who are savvy enough to
know how to evade a simple IP block, but not savvy enough to know
how to set up their own proxy server.  This is apparently a surprisingly
large set of people.

Just a note.  I've never had to stop abuse from Tor and the only evidence
I have for the abuse is ancedotal stories from those who have.  It is
those people though that I have to convince to allow Tor because without
their support I stand no chance of getting it unblocked.  I am working on
trying to get together an idea for a limited trial with Tor unblocked
to see what happens, but I will be able to convince folks to unblock
Tor for a few days to gather data.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFULEORRHoDdZBwKDgRAgGFAKCOrrCiNfs32ilAbjKgCJv1e2Q0xACeN5KS
BSnOaHjpbuXU0R/zw2ypH1o=
=81Ch
-----END PGP SIGNATURE-----

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

