Tor Project Pilots Exit Nodes In Libraries 37
An anonymous reader writes: The Tor Project has announced a new initiative to open exit relays in public libraries. "This is an idea whose time has come; libraries are our most democratic public spaces, protecting our intellectual freedom, privacy, and unfettered access to information, and Tor Project creates software that allows all people to have these rights on the internet." They point out that this is both an excellent way to educate people on the value of private internet browsing while also being a practical way to expand the Tor network. A test for this initiative is underway at the Kilton Library in Lebanon, New Hampshire, which already has a computing environment full of GNU/Linux machines.
Library Filters (Score:3)
Here in the US any library that deals with children must have mandatory filtering software installed. Given the typical puritanical attitude, quite a few public libraries also have filters.
https://en.wikipedia.org/wiki/... [wikipedia.org]
Re: (Score:2)
Re: (Score:1)
I found I couldn't download a component of the Android SDK in our local public library on their wifi. Not on a library machine, it was my laptop. The URL linked from within Eclipse raised a flag with something in the filter at the library. It was rather shocking.
Newsflash: Libraries get blacklisted (Score:4, Interesting)
Most admins block TOR exit nodes at the router and many other places because they are the source of many attacks. All this means is that libraries wind up on IP blacklists.
Re: (Score:1)
I think that is why the requirements seem to imply that the exit node needs to have its own IP address.
Re:Newsflash: Libraries get blacklisted (Score:5, Insightful)
Most admins
That's not true.
A few Admins, perhaps.
Not most.
Re: (Score:1)
Akamai optionally (optional to the Akamai customer) blocks Tor exit nodes AND relay nodes that have no exits whatsoever. I made it through several levels of support (up to executive support) to nothing but deaf ears.
I'm not even sure how they figure out relays without port-scanning clients (like open HTTP proxy scans from IRC servers of yore) but it essentially shut down my high-bandwidth Tor relay. I'd run an IPv6-only Tor relay because, well, if you have IPv6 you have plenty of addresses to burn, but Tor
Re: (Score:1)
I'm not even sure how they figure out relays without port-scanning clients
A full list of relays is available from any directory authority (except bridges -- which are not the same as non-exit nodes*)
From torrc:
Bridge relays (or "bridges") are Tor relays that aren't listed in the
main directory. Since there is no complete public list of them, even an
ISP that filters connections to all the known Tor relays probably
won't be able to block all the bridges. Also, websites won't treat you
differently because they won't know you're running Tor. If you can
be a real relay, please do; but if not, be a bridge!
most libraries are run by local government (Score:1)
Librarians (Score:5, Interesting)
Re: (Score:1)
Free/libre software != privacy. There are very different forces driving these two movements: there just happens to be a lot of overlap since most intelligent and educated people support both, and a lot of the privacy tools are opensource (they kinda need to be).
Re: (Score:2)
Because primarily, libraries and librarians are about free access to information for the public.
Besides, it's not hard to set it up so the exit node only gets to use otherwise unused bandwidth.
No-oooo! (Score:2)
Don't be giving the government yet another reason to cut funding to public libraries.
Balance TOR's costs against the benefits. (Score:5, Interesting)
There are definite costs to running TOR infrastructure. You have to be aware of them. Some of the costs can be mitigated, but some can't. At the end, you have to be able to show that the benefits outweigh the costs.
First we examined the benefit. We made a clear statement of the benefit. It is:
USU has many researchers and students who deal in sensitive subjects such as Climate Change, Reproductive Issues, Political Systems, Animal Research, etc.. These students and researchers frequently need privacy and security to advance the goals of USU.
Then we discussed the various costs and methods of mitigating the costs. Afterwards, we decided that the costs could be made acceptable, if we were careful.
Here is our standard response to an abuse report against USU's TOR infrastructure:
=BEGIN ABUSE RESPONSE=
The activity that you have reported is being emitted by a TOR exit node:
------------
$ host 129.123.7.6 6.7.123.129.in-addr.arpa domain name pointer tor-exit-node.cs.usu.edu.
$ host 129.123.7.7
7.7.123.129.in-addr.arpa domain name pointer tor-exit-node-2.cs.usu.edu.
------------
This TOR node is a project of USU's CS department. USU has many researchers and students who deal in sensitive subjects such as Climate Change, Reproductive Issues, Political Systems, Animal Research, etc.. These students and researchers frequently need privacy and security to advance the goals of USU.
Almost all TOR traffic is generated by innocent people who are attempting to escape the shadow of a totalitarian government. But, unfortunately, sometimes criminals attempt to use TOR to attack others.
We are in discussion with our TOR admins to try to find ways to limit the attack activity. Of course, this rapidly becomes a sticky issue. If we start inspecting and censoring some of the TOR activity, then we have less of a defense when we get pressure to inspect and block the rest. And, even starting down this path may make us legally liable for ALL the TOR traffic. Our best action may be to keep our hands off and observe strict network neutrality.
We are still pondering our options.
Please accept our apologies in the mean time.
USU IT Security
=END ABUSE RESPONSE=
Re: (Score:2)
this is an interesting, informative, and comprehensive post
mod +6
Re: (Score:2)
Our cost mitigation strategy had several parts
I would replace the work "cost" with "risk."
As in exposure to a hostile legal, political and social environment.
I don't see many public libraries having the resources to implement your plan.
=BEGIN ABUSE RESPONSE=
We are still pondering our options.
Please accept our apologies in the mean time.
=END ABUSE RESPONSE=
When the shit hits the fan, "thinking it over" and "hoping for the best" is no longer an option. In the end, you have to make a decision or one will be made for you.
Re: (Score:2)
I would replace the work "cost" with "risk."
As in exposure to a hostile legal, political and social environment.
We had risk in there earlier. But we later changed it to cost. USU is weird. I suspect all universities are weird. USU is a top tier research university. USU is not run by accountants and MBAs. It is run by researchers and teachers. We are shielded from most legal issues. We are constrained by funding. If we can fund it, we can invest in long term experiments. This is one of them.
I don't see many public libraries having the resources to implement your plan.
This is an extremely significant point. In order to understand the TOR issues and implement TOR properly, an ins
Re: (Score:1)
Did you consult with a lawyer? That does not seem like a good abuse response and could make you liable. The EFF has a better one you could use at eff.org .
Re: (Score:2)
4) We examined the TOR traffic and tried to minimize the abusive bits. In our case, we found that most of the TOR web browsing looked non-abusive. However, the majority of the SSH and RDP traffic looked abusive. So, we asked the TOR admin to limit those protocols.
I am interested to understand what level of inspection you could and did perform to decide "abusiveness". Especially for the secure traffic.
Rgds
Damon
Re: (Score:3)
I am interested to understand what level of inspection you could and did perform to decide "abusiveness". Especially for the secure traffic.
Rgds
Damon
We did traffic analysis using net flow information of a few days of traffic on a preliminary TOR exit node. In this situation, traffic analysis is very powerful. We did not try to determine who was talking. But, we have spent years deciphering the nature of connections using flow analysis. We are very successful in determining the nature of the various connections. Encryption does not change the underlying size, flow and pace of the connection. The TOR structure does little to obscure the ult
Re: (Score:2)
Thanks, very interesting. I imagined that it might be a little like that. Certainly I can see how scanning for vulnerabilities can stand out!
Rgds
Damon
Re: (Score:3)
TOR exit nodes are nothing but trouble.
I think this is an issue where some are more equal than others.
If an individual runs a TOR exit node, they can be easily intimidated and hassled. There is very little cost to law enforcement for engaging in the intimidation.
At the other end of the spectrum, a large public institution is not susceptible to this kind of intimidation. And, there is a very large cost if law enforcement attempts the intimidation. For example, at the institution I support, if the local cops or low level FBI attempted this kin