They will not just ask you for the logfiles. YOU will have to find out which ip-address was routed on your server on a more-or-less specific timewindow in the last 6 month and with which ip-address the data was forwarded to the next router.
If you can not provide this information you will be charged by law. In my opinion, as an tor-operator you will not be punished for the maximum years of inprisonment or the highest money fee possible ... but it could be hard enough if you have a previous conviction in your police file stating you to be "involved in computer crime and a possible terrorist" :-( And yes, they of cource put some terms into the TKG to whom the information is available: "Zur Erfüllung ihrer gesetzlichen Aufgaben haben eine Vielzahl von Stellen Zugriff auf diese Bestandsdaten (§§ 112, 113 TKG): Gerichte, Strafverfolgungsbehörden, Polizeivollzugsbehörden des Bundes und der Länder für Zwecke der Gefahrenabwehr, Zollkriminalamt und Zollfahndungsämter für Zwecke eines Strafverfahrens, Zollkriminalamt zur Vorbereitung und Durchführung von Maßnahmen nach § 39 des Außenwirtschaftsgesetzes, Verfassungsschutzbehörden des Bundes und der Länder, Militärischer Abschirmdienst, Bundesnachrichtendienst, Notrufabfragestellen, Bundesanstalt für Finanzdienstleistungsaufsicht, Zollverwaltung zur Schwarzarbeitsbekämpfung."(found at http://www.vorratsdatenspeicherung.de/content/view/78/86/lang,de/#Umsetzung_ in_Deutschland) Sorry for not translating the german text, but perhaps you can see that it is not only one institution and not only courts ... There are really bad times coming up in Germany ... regards, Alexander Bernhard -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jan Danielsson Sent: Saturday, November 10, 2007 12:59 PM To: or-talk@freehaven.net Subject: Re: 20090101 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Max Berger wrote: [---] > As far as I see in the new §113a TKG [*] we don't have to log the whole > circuit data. We just have to log, which nodes connect to our node and > which IP-address we give this connection (that's the IP-address of our > own node, so we have to log this only once). The IP-address of the next > node is not required. I assume that they made sure to put one, or more, "make available to the state" cause in there? If not, I'm just wondering how they'd react if I do log (as required), and if they want the logs, I send them a tor.20080101-20100101.logs.tar.bz.gpg.good_luck. - -- Kind regards, Jan Danielsson -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (NetBSD) iD8DBQFHNZ0UuPlHKFfKXTYRCi17AKCJH5hLNUoQWfWaamuWtaCWRUR//ACeK6ii 8wipwCF4HDrIiutt6nJOOkw= =i3p7 -----END PGP SIGNATURE-----