Re: Routing public traffic across county boundaries in Europe

2007-07-26 Thread Lionel Elie Mamane

On Thu, Jul 26, 2007 at 08:52:55AM +0100, Andy Loukes wrote:

 What (if any) are the legal implications of taking internet destined
 traffic in one country and egressing it in another (with an ip block
 correctly marked for the correct country).

 Somebody mentioned to me the other day that they thought the Dutch
 government didn't allow an ISP to take internet traffic from a Dutch
 citizen and egress in another country because it makes it easy for
 the local country to snoop.

I'm not in a position where I would know for sure, but I'd be
surprised if it were the case, in a atmosphere of European common
market and police cooperation and all European police-judiciary trust
all other European police-judiciary even more than the ones of US
states do (as in a Dutch judge can issue a arrest warrant and French /
German / ... police will execute it without intervention of a French /
German / ... judge, nor decision by any administration, ... Possibly,
it could be construed as a violation of the concept of European common
market, and thus it is forbidden to forbid.

What I would expect is that you still have to obey lawful intercept
legislation, so you need to interconnect with the government black
box rooms, and these are at the major IXs in the country. (And I've
repeatedly heard that in the Netherlands, for some time in the past at
least, the way the ISPs got rid of the lawful intercept obligation was
to have the AMS-IX send a copy of *all* the traffic to the government
black box. Not that they had to do that, but it was the easiest /
cheapest way.)


If there were any such obligation, I'd expect the real reason not to
be the egress country can snoop, but it is harder for the
originating country to snoop.


Also, I've heard that Canada had (maybe still has) this legislation
forbidding you to route intra-Canadian *telephone* traffic through
another country. Something about else nobody would build a
intercontinental coast-to-coast Canadian network, would just send
long-distance traffic to the USA, go to other coast and send it back
to Canada and being this dependent on a foreign country, that's bad.


-- 
Lionel


Re: Home media servers, AUPs, and upstream bandwidth utilization.

2006-12-24 Thread Lionel Elie Mamane

On Mon, Dec 25, 2006 at 12:44:37AM +, Jeroen Massar wrote:
 Roland Dobbins wrote:

 I recently purchased a Slingbox Pro
 What I'm wondering is, do broadband SPs believe that this kind of
 system will become common enough to make a signficant difference in
 traffic paterns, and if so, how do they believe it will affect
 their access infrastructures in terms of capacity...

 That said ISP's should simply have a package saying 50GiB/month
 costs XX euros, 100GiB/month costs double etc. As that covers what
 their transits are charging them, nothing more, nothing less.

I thought IP transit was mostly paid by 95% percentile highest speed
over 5 minutes or something like that these days? Meaning that ISP's
costs are maximised if everyone maxes our their line for the same 6%
of the time over the month (even if they don't do anything the rest of
the time), and minimised if the usage pattern were nicely spread out?

-- 
Lionel


Re: Tor and network security/administration

2006-06-22 Thread Lionel Elie Mamane

On Wed, Jun 21, 2006 at 02:53:06PM -0700, Jeremy Chadwick wrote:
 On Wed, Jun 21, 2006 at 05:02:47PM -0400, Todd Vierling wrote:

 If the point of the technology is to add a degree of anonymity, you
 can be pretty sure that a marker expressly designed to state the
 message Hi, I'm anonymous! will never be a standard feature of
 said technology.  That's a pretty obvious non-starter.

 Which begs the original question of this thread which I started:
 with that said, how exactly does one filter this technology?

The list of IP addresses of tor nodes is *public*. If tor users can
get it, you can, too. Some IRC networks already run a stripped-down
tor client to always tag connections from tor as such, and permit
channel operators to ban such connections from their channel should
they wish so.

-- 
Lionel


Re: Tor and network security/administration

2006-06-22 Thread Lionel Elie Mamane

On Thu, Jun 22, 2006 at 11:58:34AM +1000, Matthew Sullivan wrote:
 Jeremy Chadwick wrote:
 On Wed, Jun 21, 2006 at 05:02:47PM -0400, Todd Vierling wrote:

 If the point of the technology is to add a degree of anonymity,
 you can be pretty sure that a marker expressly designed to state
 the message Hi, I'm anonymous! will never be a standard feature
 of said technology.  That's a pretty obvious non-starter.

 Which begs the original question of this thread which I started:
 with that said, how exactly does one filter this technology?

 Of course SORBS' position is actually this - if you are allowing
 Trojan traffic over the Tor network you will get listed (regardless
 of whether the Trojans can talk to port 25 or not)

How an open proxy that will not connect to port 25 is relevant for an
*email* blacklist is beyond me.

 ...and for what it's worth, I have no problems with anonymous
 networks for idealistic reasons, however they are always abused,
 they will continue to be abused, Tor is being abused, and I should
 be able to allow or deny traffic into my networks as I see fit

 All of my discussions with Tor people have indicated [they] do not
 think I should have the right to deny traffic based on IP address,
 and that I should find other methods of authenticating traffic into
 my networks.

Isn't it rather that they think that filtering on the base of IP
address is broken in today's Internet, even if tor didn't exist? Open
proxies, trojans, multi-user computers, dynamic IPs, ... all this
makes that substituting IP address for people is very, very,
imprecise.

-- 
Lionel


Re: Tor and network security/administration

2006-06-22 Thread Lionel Elie Mamane

On Thu, Jun 22, 2006 at 05:37:25PM +1000, Matthew Sullivan wrote:
 Lionel Elie Mamane wrote:

 How an open proxy that will not connect to port 25 is relevant for
 an *email* blacklist is beyond me.

 Perhaps because SORBS is not just an email blacklist?

My bad. I must have misunderstood its tagline.

 Perhaps because it is also used for webmail and other things...

Someone running a webmail that doesn't ask for authentication before
accepting mail is asking for trouble. You know it, and I'm fairly sure
you would list him.

If the user has authenticated himself on the webmail, why care whether
the TCP connection came from an open TCP or HTTP proxy? The user has
identified himself, so you know who it is.

 All of my discussions with Tor people have indicated [they] do not
 think I should have the right to deny traffic based on IP address,
 and that I should find other methods of authenticating traffic
 into my networks.

 Isn't it rather that they think that filtering on the base of IP
 address is broken in today's Internet, even if tor didn't exist?
 Open proxies, trojans, multi-user computers, dynamic IPs, ... all
 this makes that substituting IP address for people is very, very,
 imprecise.

 and that is your opinion,

Actually, no. It is what I understand the tor people's opinion to be
from their public statements. As for my opinion, I think IP-based is
the best you've got when you are dealing with the world at large and
not just with a finite, known group of users. As with an MX. As with a
webshop. But IP-based authentication should be avoided if you can, and
does get over-used in contexts where it is worse than other
solutions. A prime example is the scientific journals publishers
blindly trusting the whole IP space of universities. We do give shell
accounts on some of our machines to externals: Other scientists from
abroad, high school students that can make good use of surplus
computing resources for a project, ...

-- 
Lionel


Re: Tor and network security/administration

2006-06-21 Thread Lionel Elie Mamane

On Wed, Jun 21, 2006 at 01:14:52PM -0400, Todd Vierling wrote:
 On 6/20/06, Lionel Elie Mamane [EMAIL PROTECTED] wrote:

 You don't do your financial transactions over HTTPS? If you do, by
 the very design of SSL, the tor exit node cannot add any HTTP
 header. That would be a man-in-the-middle attack on SSL.

 Which, for an anonymizing network, could be a deliberate situation.

 The user then loses end-to-end encryption with the final server he
 want to connect to.

 Depends on your definition of end-to-end -- if one end is an
 agent on the user's computer, it still fits.  But I think you
 misunderstand the reason for a filtering proxy in the context of
 anonymizing networks; read on:

 So suddenly this daemon needs an UI on every single user on
 the desktop of the user.

 Here's where your misunderstanding is evident.  The filtering proxy
 is not at the Tor exit node; it's at the *entry*.

If the proxy is not at the Tor exit node, how can the tor network
enforce the addition of the this connection went through tor HTTP
header that Kevin Day was asking for? Fundamentally, if you rely on a
program sitting on the user's computer adding that header, then
malevolent users can not add this header, so Kevin Day's purpose is
not served. And that is what is being discussed here.

 Let's suppose the tor exit node does this https-man-in-the-middle
 dance. It is not desirable for all connections, so you need some
 way for the user to say per connection what whether it should
 happen or not. SOCKS doesn't have such a thing in its protocol,
 so...

 With SOCKS, automated filter control based on IP address (and
 hostname, if using SOCKS4a or SOCKS5 with DOMAINNAME address type) is
 trivial.

What I was trying to say was: The SOCKS protocol has no mechanism for
the SOCKS proxy to tell the SOCKS client before I establish that
connection, please ask the user that question and report the answer
back to me.

-- 
Lionel


Re: Tor and network security/administration

2006-06-20 Thread Lionel Elie Mamane

On Mon, Jun 19, 2006 at 04:25:09PM -0400, Todd Vierling wrote:
 On 6/19/06, Lionel Elie Mamane [EMAIL PROTECTED] wrote:

 You don't do your financial transactions over HTTPS? If you do, by
 the very design of SSL, the tor exit node cannot add any HTTP
 header. That would be a man-in-the-middle attack on SSL.

 Which, for an anonymizing network, could be a deliberate situation.

 Tor users are already encouraged to filter through a localhost
 instance of a second-stage proxy such as Privoxy.  There are other
 projects underway to provide similar second-stage proxy services,
 possibly capable of functioning as HTTPS m-i-t-m on an intentional
 basis.  If a user desires to filter browser headers even if
 SSL-secured, certainly s/he would know why the forged SSL
 certificate warning was being presented by the browser.

The user then loses end-to-end encryption with the final server he
want to connect to. That is unacceptable for a whole range of uses. If
a _user_  wants to control browser headers, he can instruct the
_browser_ in what headers to send or not.

Let's suppose the tor exit node does this https-man-in-the-middle
dance. It is not desirable for all connections, so you need some way
for the user to say per connection what whether it should happen or
not. SOCKS doesn't have such a thing in its protocol, so... you use
another protocol and fix all programs on the face of earth to support
it? You do an UI call-back where the tor daemon on the user's machine
pops up a question should this HTTPS connection get the extra
headers? So suddenly this daemon needs an UI on every single user on
the desktop of the user. Text if that's what the user is using, X11 if
that's what he is using, ... And on every single desktop of every
logged in user on the system. Wow.

And how do you handle client certificates in there? By very design of
SSL (unless it is _broken_), the tor exit node won't be able to fake
that, too.

And how do you handle the verification of the server certificate? How
do you know which CA's the client trusts?

And even if you have solved all this for SSL, then there is the _next_
protocol that you have to man in the middle fiddle with. This way
lies madness.


And above all, it still does not solve your problem. Because the
malicious user can choose not to have the additional header added.

-- 
Lionel


Re: Tor and network security/administration

2006-06-19 Thread Lionel Elie Mamane

On Sat, Jun 17, 2006 at 08:49:43AM -0500, Kevin Day wrote:
 On Jun 17, 2006, at 8:29 AM, Jeremy Chadwick wrote:

 Being as I'm not a network administrator myself (although I do
 filter some stuff using pf and ipfw on my severs), I'm curious what
 NAs think of the following technology:

 We've had considerable problems with Tor.

 Idiots who like to use stolen credit cards to buy things online find
 Tor a nice haven of deniability and covering their tracks.

 Our IRC servers, and discussion sites also have had to ban all Tor
 IPs that we've seen because of troublemakers using them to evade
 bans.

 I don't find the anonymity a bad thing, but I would be a whole lot
 happier if the default configuration for people running Tor servers
 included an option to add HTTP headers saying that it's going
 through Tor, so we could decide if we wanted to conduct financial
 transactions with them or not.

You don't do your financial transactions over HTTPS? If you do, by the
very design of SSL, the tor exit node cannot add any HTTP header. That
would be a man-in-the-middle attack on SSL. (Unless you count that
users will click accept on any this could be a forged certificate
warning.)

More generally, tor is not an HTTP proxy, but a TCP proxy. Which
doesn't mean it cannot (as in there is a Turing machine that does
it) also go up from layer 4/5 to layer 7 for certain specific
application protocols; it would only be harder, ask for more
resources from the node, ...

-- 
Lionel


Re: Registrar and registry backend processes.

2005-01-18 Thread Lionel Elie Mamane

On Tue, Jan 18, 2005 at 10:03:31AM +0100, Elmar K. Bins wrote:
 [EMAIL PROTECTED] (Lionel Elie Mamane) wrote:

 A nonprofit firm in Frankfurt, Denic eG, which manages Germany's
 eight million registered .de domain names, has also indicated that
 it is planning to bid.

 For what it is worth, some consider the .de whois server broken;
 see below. Let's note that the new RFC (3912) doesn't mention the
 help methodology anymore.

 And some call this not broken but necessary. I can explain off-list,
 if you like.

 $ telnet whois.denic.de whois
 Trying 81.91.162.7...
 Connected to whois.denic.de.
 Escape character is '^]'.
 ?
 domain:  ?
 status:  invalid

 Which is defined in what RfC?

RFC 954, which has recently (September 2004) been obsoleted by RFC
3912, which doesn't mention it anymore.

-- 
Lionel


Re: Registrar and registry backend processes.

2005-01-17 Thread Lionel Elie Mamane

On Mon, Jan 17, 2005 at 06:16:25PM -0800, [EMAIL PROTECTED] wrote:
 P.S.

 can anyone comment on the reputations of the .net registry
 administration contenders (no need to comment on verisign)?

 A nonprofit firm in Frankfurt, Denic eG, which manages Germany's
 eight million registered .de domain names, has also indicated that
 it is planning to bid.

For what it is worth, some consider the .de whois server broken; see
below. Let's note that the new RFC (3912) doesn't mention the help
methodology anymore.

 Begin Quote 

The .DE whois server is broken. I should be able to telnet to the
WHOIS server on the whois port, send it a domain, and get results. If
I do that, I get:

$ telnet whois.denic.de whois
Trying 81.91.162.7...
Connected to whois.denic.de.
Escape character is '^]'.
denic.de
domain:  denic.de
status:  connect

Connection closed by foreign host.

The only way to get real data out of the .DE whois server is to use
cryptic options:

$ telnet whois.denic.de whois
Trying 81.91.162.7...
Connected to whois.denic.de.
Escape character is '^]'.
-T dn,ace -C US-ASCII denic.de 
% Copyright (c)2004 by DENIC
% Version: 1.00.0
%
% Restricted rights.
[ snip ]


Further, these options are not documented anywhere, because the usual
help methodology, as documented by the RFC, doesn't work:

$ telnet whois.denic.de whois
Trying 81.91.162.7...
Connected to whois.denic.de.
Escape character is '^]'.
?
domain:  ?
status:  invalid

Connection closed by foreign host.

--
Lionel Elie Mamane


Re: UUNET instability?

2002-04-25 Thread Lionel


On Fri, 26 Apr 2002 05:10:28 +1000, Lionel [EMAIL PROTECTED] wrote:


On Thu, 25 Apr 2002 14:02:19 -0500 (CDT), Robert A. Hayden
[EMAIL PROTECTED] wrote:

Sometimes it feels like the support departments just scan cnn.com to find
a catastrophe to blame an outtage on.

A butterfly in outter mongolia flapped its wings will probably be cited
before long...

telnet bofh.engr.wisc.edu 666

Folks, please don't try to connect to that service.
Posting it here seems to have Slashdotted it.

-- 
   W  
 . | ,. w ,   Some people are alive only because
  \|/  \|/ it is illegal to kill them.Perna condita delenda est
---^^---



Re: UUNET instability?

2002-04-25 Thread Lionel


On Thu, 25 Apr 2002 16:04:42 -0400, Richard A Steenbergen
[EMAIL PROTECTED] wrote:

On Fri, Apr 26, 2002 at 05:48:11AM +1000, Lionel wrote:
 
 Folks, please don't try to connect to that service.
 Posting it here seems to have Slashdotted it.

Generally something doesn't get Slashdotted unless it is fully of poorly
written dynamic code which should never have been put in production in the
first place, such as PHP doing 20 mysql queries per page view or something
else equally stupid and linux kiddie.

A BOFH quote generator, on the other hand, is very very simple. It boggles
the mind to imagine a server so weak or code so bad that it couldn't
handle a couple hundred connections from NANOG readers. If that is the 
case, I would strongly suggest you reevaluate the language or method in 
which it was written.

I beg your pardon? Where did you get the idea that I wrote or hosted it?

I was assuming it'd been Slashdotted because it was working fine before
I posted the link, then stopped working shortly afterwards. It's also
entirely possible the somebody at the site got annoyed at all the
requests  put a DENY ALL on it.

-- 
   W  
 . | ,. w ,   Some people are alive only because
  \|/  \|/ it is illegal to kill them.Perna condita delenda est
---^^---



Re: bulk email

2002-04-22 Thread Lionel


On Mon, 22 Apr 2002 11:53:58 +0100, James Cronin [EMAIL PROTECTED]
wrote:

[opt-in bulk email]
Has anyone ever actually come across such a contract in real life
or are they just urban myths?

Urban myth.
If you make damn sure that you clearly mark your bulk mail with the
website/organisation at which your user subscibed,  you record the
*way* they subscribed[0], you should be fine. It's also vitally
important that you respond promptly to email that arrives at your
domain's 'abuse@' address.

[0] Eg: IP address  time stamp from when they hit the 'subscribe me'
button on a web form, copy of the signed paper form they sent in, etc.

-- 
   W  
 . | ,. w ,   Some people are alive only because
  \|/  \|/ it is illegal to kill them.Perna condita delenda est
---^^---



Re: bulk email

2002-04-22 Thread Lionel


On Mon, 22 Apr 2002 09:32:04 -0400 (EDT), David Lesher [EMAIL PROTECTED]
wrote:

Save your hide by getting verification on every entry; i.e:
1) Get request.
2) Send email to alleged requester.
3) Do nothing unless/until you get back a confirming yes, I do want
   reply.

Yes, very good point. I should have included that too.

-- 
   W  
 . | ,. w ,   Some people are alive only because
  \|/  \|/ it is illegal to kill them.Perna condita delenda est
---^^---