Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
The Internet Privacy Censorship Your Rights Online

EFF Promotes Freenet-like System Tor 379

An anonymous reader writes "The Electronic Frontier Foundation (EFF) just announced that it has become a financial sponsor of Tor, an open-source project to help people 'engage in anonymous communication online.' It sounds like a simpler version of Freenet, e.g. 'a network-within-a-network that protects communication from ... traffic analysis.' Like Freenet, the source-code is freely available and binaries exist for Windows, Linux, etc." Read on for more details.

The submitter continues "It also allows you to install Tor-aware apps, such as an HTTP proxy (for private browsing), or maybe private P2P? Unlike Freenet, it doesn't use massive encryption (as far as I can tell) and relies more on something called onion routing to randomly bounce requests between other Tor proxies, thus obfuscating the IP of the original client. So it allows you to browse regular Internet sites! Maybe it should be considered more of an 'open-source' Anonymizer? But I don't know if it's actually Open Source - you can download the source (and compile it yourself) but I don't know if the developers are letting anyone else touch their code. They are, however, looking for contributors and other forms of help. And, finally, they're hoping people will start running Tor servers!" It's open source, however contributions are handled.

This discussion has been archived. No new comments can be posted.

EFF Promotes Freenet-like System Tor

Comments Filter:
  • AT&T Crowds (Score:3, Informative)

    by grub ( 11606 ) <slashdot@grub.net> on Wednesday December 22, 2004 @05:05PM (#11162354) Homepage Journal
    If it's not encrypting and just passing packets around then it sounds like the AT&T research Crowds proxy they were distributing a while ago. (it used to live at this page [att.com] but I see it's gone now.)
  • by Gorny ( 622040 ) on Wednesday December 22, 2004 @05:06PM (#11162372) Homepage Journal
    There are some trusted nodes which serve as the starting point. You can also add your own trusted nodes if you're sure they're trustworthy.
  • by Anonymous Coward on Wednesday December 22, 2004 @05:12PM (#11162435)
    It's more than that; the entry nodes don't have to
    be trusted. Your communications with them are
    encrypted and they know only the next hop in the
    circuit -- they do not know the exit node and they
    do not know the content of your communication.
  • by Tackhead ( 54550 ) on Wednesday December 22, 2004 @05:15PM (#11162466)
    From the design documents [eff.org]:

    Based in part on our restrictive default exit policy (we reject SMTP requests) and our low profile, we have had no abuse issues since the network was deployed in October 2003. Our slow growth rate gives us time to add features, resolve bugs, and get a feel for what users actually want from an anonymity system. Even though having more users would bolster our anonymity sets, we are not eager to attract the Kazaa or warez communities-we feel that we must build a reputation for privacy, human rights, research, and other socially laudable activities.

    Well, so much for that. *badaboom*

  • by pclminion ( 145572 ) on Wednesday December 22, 2004 @05:21PM (#11162518)
    IANAL either. This doesn't work.

    The DMCA prohibits circumventing a protection on a copyrighted work. Encryption only qualifies as a "protection device" if the person doing the encryption is the holder of the copyright. You can't "protect" what you do not own.

    I don't know if the DMCA contains precisely this language, but it's certainly the way it would be interpretted in court.

    I'm more interested in the case of using encryption to protect a computer virus. Since the author of the virus actually is the owner of the copyright on the viral code, then the encryption should qualify as a copyright protection device under the DMCA. Law enforcement officials who decrypt the virus to reverse engineer it would be in violation of the DMCA.

  • by weaselp ( 32626 ) on Wednesday December 22, 2004 @05:25PM (#11162565) Homepage
    The first node knows your IP and the second node, but not the plain text. The last node knows the second-to-last node,the service you are connecting to, and the plain text unless you do some encryption on the application layer (like https).

    It's not entirely unlike Mixmaster, only low latency.
  • by innerFire ( 1016 ) on Wednesday December 22, 2004 @05:30PM (#11162598) Homepage
    Hi there! I'm Chris Palmer from EFF. I am working with the Tor developers, so I know a bit about it. I'll try to clear up some questions and misconceptions people seem to have.

    1. Spam? Well, spammers already have much better tools than Tor. Namely, botnets. The Tor network currently doesn't support the kind of bandwidth usage spammers can chew up. By their willingness to break the law, spammers and criminals already have good tools to hide their network origin. Tor doesn't really help them. Plus, the default Tor exit policy is to block port 25.

    2. Free/open source? Yes, three-clause BSD. EFF would not financially support a non-free/open source project!

    3. Do you have to trust the nodes? You have to trust the entry node and the exit node. The entry node can be on your own computer, which I highly advise people to do. It's easy to install on all platforms, so that shouldn't be a hurdle. As far as trusting the exit node: Yes, the exit node can see the plaintext of your communications. That is why you should always use end-to-end encryption, anyway! Remember, all normal Internet routers in your route can read your traffic; Tor is actually BETTER because traffic is strongly encrypted (AES, multiple times) while inside the Tor network.

    So, you actually have to trust Tor a bit less than regular Internet routes.

    Use encryption. :)

    4. Is it like Freenet/Crowds/Anonymizer? Yes, and no. It is like somewhat like those systems in goals, but the design is different. For example, unlike Freenet, Tor helps you talk to the real Internet. Unlike Anonymizer, Tor uses a whole network of proxies, not a single proxy; and the proxies are generic SOCKS proxies, not specifically HTTP.

    5. Version number is too low. Is this alpha software? Roger and Nick are very modest. :) Tor works. It is stable, many bugs have been fixed, and the protocol is moderately stable. Tor does not crash randomly or eat all your memory. What's in flux is bigger picture items, such as "How can we reduce our dependency on the central directory server" and "Wouldn't a GUI configuration tool be nifty?"

    6. Is there a backdoor? Well, you tell me. The source code is open. Is there a backdoor in other free software you like?

    7. Minimum bandwidth requirement? For exit and middleman nodes, yes, you should have a reasonable pipe and a stable machine. "Reasonable" pipe can mean a good DSL connection. Crappy nodes can degrade the network for those poor saps whose circuit goes through one. That is why the directory server operators won't list your server unless it meets basic stability and bandwidth requirements.
  • Re:Spammers (Score:5, Informative)

    by miope ( 727503 ) on Wednesday December 22, 2004 @05:32PM (#11162627) Homepage

    Look the documentation [eff.org]

    2. Decide what exit policy you want. By default your server allows access to many popular services, but we restrict some (such as port 25) due to abuse potential. You might want an exit policy that is either less restrictive or more restrictive; edit your torrc appropriately. If you choose a particularly open exit policy, you might want to make sure your upstream or ISP is ok with that choice.
    the faq responds your second question [noreply.org]
    6.1. Can exit nodes eavesdrop on communications? Isn't that bad? Yes, the guy running the exit node can read the bytes that come out there. Our first answer is "then use end-to-end encryption such as SSL", which is great but not always practical. (The corollary to this answer is that if you are worried about somebody intercepting your traffic and you're *not* using end-to-end encryption at the application layer, then something has already gone wrong and you shouldn't be thinking that Tor is the problem.) Our second answer is that in a future release, we plan to have Tor clients recognize when the destination is co-located with a Tor server, and exit from that Tor server. So for example, people using Tor to get to the EFF website would automatically exit from the EFF Tor server (assuming it's nearby in network geography), thus getting *better* encryption and authentication properties than just browsing there the normal way. But this has a variety of technical problems we need to overcome first (the main one being "how does the Tor client learn which servers are associated with which websites in a decentralized yet non-gamable way?"). Stay tuned.
  • Scalability (Score:3, Informative)

    by Sanity ( 1431 ) on Wednesday December 22, 2004 @05:33PM (#11162630) Homepage Journal
    I think the general problem with this kind of architecture is that it dodges the hard issue - which is how new peers get integrated into the network, and how do you ensure their reliability.

    In Tor's case there is a centralised global list of all peers which must be added to manually by Tor's developers. This is fine with a small number of users, for which Tor clearly works well, but isn't practical when dealing with large numbers of users.

    Freenet, for all its faults, is designed to deal with potentially millions of unreliable peers. It is its ability to do this that makes it such an ambitious project, and makes any comparision between it and Tor a situation of apples and oranges.

  • Re:Is is in Java? (Score:1, Informative)

    by Anonymous Coward on Wednesday December 22, 2004 @05:42PM (#11162720)
    It's written in C and you only have 120 files, very small program to read and study :)
  • by Ajmuller ( 88594 ) * <adam@gotlinux.us> on Wednesday December 22, 2004 @05:42PM (#11162721) Homepage
    Actually, Tor does have an internal network. They are called hidden service URLS, they are URLs that work only on the tor network, though they are not distributed content the way freenet is.
    A Hidden Service URL looks something like this:
    http://6sxoyfb3h2nvok2d.onion/
    And, obviously, only functions when the TOR daemon intercepts your web browsers requests...
    The very cool thing about TOR is that it not only can forward HTTP but also any other arbitrary protocol... You can even forward SSH traffic if you are among the uber paranoid elite.
  • by Kjella ( 173770 ) on Wednesday December 22, 2004 @05:56PM (#11162851) Homepage
    ...maybe I'll just dig up the link to what happened with the JAP proxy network, providing pretty much exactly the same service:

    Net anonymity service back-doored [theregister.co.uk]

    Basicly, they were given the choice of backdooring it or shutting it down. Yes, the whole network. They did install a backdoor (still with source), got found out but they didn't exactly have much trust left.

    Can someone explain to me why the exact same will not happen to this service? Any reason why TOR servers would have greater legal immunity? I don't see it, at least.

    Kjella
  • Re:Yay! Piracy! (Score:4, Informative)

    by discord5 ( 798235 ) on Wednesday December 22, 2004 @05:59PM (#11162891)
    I'm sure this network will be used to share protected speech and not copyrighted binaries.

    I don't think this system will be usable for piracy. Have you ever used <hat foil="tin">Freenet</hat>? Because of all the hopping though random nodes, "random" routes and encrypted traffic it's quite slow.

    Take the example of the average "anonymous proxy" on the internet. After someone finds the proxy, it usually takes about 5 to 10 hours before the proxie's bandwith is completely saturated making it unusable. Even if Tor is to loadbalance all it's nodes, it's still going to be SLOW with the added encryption etc. Remember kids, using proxies that are close to you isn't anonimity but asking for problems with the law (usually why people want to use anonymous proxies is to avoid problems their employer/government could create).

    Lastly, most anonymous networks are unreliable by nature. Freenet is unreliable because it drops "unpopular" keys and their content in favour of popular keys. Anonymous relays (eg mixmasters) are known to drop messages at random.

  • by adturner ( 6453 ) on Wednesday December 22, 2004 @06:06PM (#11162944) Homepage
    Tor already provides the means for people to run a tor node as only a router (add the line: reject *:* in your torrc), not an exit node. Hence, your IP will never download kiddie porn or anything like that.

  • Comments (Score:4, Informative)

    by ZorbaTHut ( 126196 ) on Wednesday December 22, 2004 @06:17PM (#11163059) Homepage
    Tor is great. I've been playing with it for a while - the sheer simplicity of setup makes it fantastic, and it's highly amusing to go to whatismyip.com half a dozen times and get different IPs.

    Once I get the firewall box I want set up I plan to make one port link directly into Tor, so that anything plugged into that port is shunted 100% into the Tor network. Right now you've sort of got to trust that your program really is punching everything through the SOCKS proxy - not all programs are really reliable about that, plus the program can still see your IP if you're not behind a firewall.
  • by Kjella ( 173770 ) on Wednesday December 22, 2004 @06:24PM (#11163120) Homepage
    ...but what exactly is the incentive to actually help the TOR network? Seems to me that you can just leech as much as you want, give nothing. And each byte I download gets multiplied by as many nodes as I route through. Right now, it would appear they have a small userbase and mostly volunteer providers. What would happen if it got exposed to say, the slashdot userbase? Or people in general?

    Kjella
  • Re:GNUNet (Score:1, Informative)

    by Anonymous Coward on Wednesday December 22, 2004 @06:29PM (#11163181)
    GNUnet is not really a freenet clone. The goals are similar, but the protocol is rather different (routing by key, not history, content migration possible, but it also stays at the peer that originally inserted it (better persistence), searchable, swarm distribution, tunnels over tcp/udp/http, and so on). So calling it a clone is definitively wrong.
  • by Anonymous Coward on Wednesday December 22, 2004 @06:38PM (#11163255)
    Try this thought experiment: Forget, for the moment, about child porn, because it's such an extreme, emotional and, simply disgusting example. We can't think clearly about something like that, so we look to an analogy.

    It is, essentially, a photo of a crime scene (assuming you don't mean hentai), distributed because some people like to see that kind of crime, so what if someone was using your computer to transmit photos of themselves robbing houses? Potentially, especially if they're not careful, there could be clues that law-enforcement could use. Also, if there was any money being made from the distribution, that might leave a trail for law-enforcement to follow.

    Even if it's no help catching the people, it's robbing the house that's the problem, far more than using your computer to help distribute information about the crime (whether footage or simply a written account).

    The more practical problems, in my opinion, are:
    - Any society where this can happen unnoticed by (the caring) relatives or the community.
    - Whether you know it's there or not, it's illegal to simply have child porn stored on your computer.

    I'm not denying it's a problem, that allowing these people a channel to distribute their filth is in some measure an unwitting encouragement, but if nobody could distribute evidence of it, children would still be abused, the only way to get rid of it is with the right legal and social structures in place in any given to community. The internet is not the primary problem.

    It is, however a new and strange environment. As a species we've got a long way to go to properly adapt.
  • by wildwood ( 153376 ) on Wednesday December 22, 2004 @06:40PM (#11163281)
    Basicly, they were given the choice of backdooring it or shutting it down. Yes, the whole network. They did install a backdoor (still with source), got found out but they didn't exactly have much trust left.

    Can someone explain to me why the exact same will not happen to this service? Any reason why TOR servers would have greater legal immunity? I don't see it, at least.

    One reason: the white-hat lawyers at the EFF.

    I didn't see any indication from your link whether the JAP team got any legal consultation. Did they fully understand their rights and options before they gave in to the authorities?

    I don't think the EFF is sponsoring this just to move the technology along. I'd bet that they also want to use Tor to advance their legal arguments for anonymity. They've probably already drawn up "battle plans" for likely legal challenges.

  • by bitspotter ( 455598 ) on Wednesday December 22, 2004 @07:32PM (#11163597) Journal
    To summarize:

    Freenet is a system which anonymizes content. Specifically, digital files.

    TOR is a system which anonymizes connections. Specifically TCP connections.

    While anonymizing client TCP connections has been around for awhile, TOR is the first major project (possibly second to i2p) that allows one to anonymize TCP *server* connections.

    In my experience, TOR has been vastly more reliable than Freenet. Whether this can be attributed to the youth and small size of the TOR network relative to Freenet remains to be seen...
  • by adturner ( 6453 ) on Wednesday December 22, 2004 @07:41PM (#11163674) Homepage
    Perhaps you should read "Should I run a client or a server?", which explains the benefits for running a server.

    http://tor.freehaven.net/cvs/tor/doc/tor-doc.htm l

    But basically, even just running a client is good since the more clients using tor (up to the capacity of the network) increases the anonymity of all users. Only time will tell if enough volunteers will run servers to keep up with demand.
  • by geminidomino ( 614729 ) * on Thursday December 23, 2004 @01:45AM (#11165880) Journal
    Erm... looks like you missed the point. It was tongue-in-cheek, an anti-anonymity rant posted by an AC.

    I'd call him brilliant for that one. :)
  • by westlake ( 615356 ) on Thursday December 23, 2004 @02:18AM (#11166003)
    b) If someone looks at child porn from Freenet, no child is harmed. Since it's on Freenet, not only has the producer not been paid, he has no way to know that anyone has even seen it. Obviously the act of producing porn can harm children, but I can't think of any reason that anonymously viewing it with Freenet would lead to any further harm. So it's pretty much a victimless crime.

    Free-as-in-beer does not make it legal. The creation, distribution, and possession of child pornography remains criminal even when no money changes hands.

    It doesn't matter if no one downloads your files, you have made the attempt to distribute through a plausible channel and that is enough to hang you.

    "Mere viewing" is not a victimless crime. This is lazy, inexcusable, sloppy, thinking.

    Put yourself in the place of the child, her guardians, her counselors, and ask if you would want still photos and videos of her rape to be broadcast over the net, to circulate for all eternity.

    You haven't considered the possibility that the child might be identifiable and still at risk. You view her anonymously but do nothing to help. Silence gives consent.

  • by Anonymous Coward on Thursday December 23, 2004 @09:19AM (#11167162)
    Learn chinese, then start here [freenet-china.org].

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...