[tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-05 Thread nusenu
Hi,

I'm currently writing a follow-up blog post to [1] about a large scale 
malicious tor exit relay operator
that did run more than 23% of the Tor network's exit capacity (May 2020) before 
(some) of it got reported to the bad-relays team and
subsequently removed from the network by the Tor directory authorities. 
After the initial removal the malicious actor quickly restored its activities 
and
was back at >20% of the Tor network's exit capacity within weeks (June 2020).

[1] 
https://medium.com/@nusenu/the-growing-problem-of-malicious-relays-on-the-tor-network-2f14198af548

To prevent this from happening over and over again
I'm proposing two simple but to some extend effective relay requirements 
to make malicious relay operations more expensive, time consuming,
less sustainable and more risky for such actors:

a) require a verified email address for the exit or guard relay flag.
(automated verification, many relays)

b) require a verified physical address for large operators (>=0.5% exit or 
guard probability)
(manual verification, low number of operators). 
It is not required that the address is public or stored after it got verified.
For details see bellow [2].

0.5% exit probability is currently about 500-600 Mbit/s of advertised bandwidth.


Q: How many operators would be affected by the physical address verification 
requirement if we use 0.5% as a threshold?
A: About 30 operators.

There are currently about 18 exit [3] and 12 guard operators that run >0.5% 
exit/guard capacity 
if we ignore the fresh exit groups from 2020.
Most exit operators (14 out of these 18) are organizations with public 
addresses or have their address published in WHOIS
anyway.

At the end of the upcoming blog post I'd like to give people some idea as to 
how much support this proposal has.

Please let me know if you find this idea to limit attackers useful, especially 
if you are a long term relay operator,
one of the 30 operators running >=0.5% exit/guard capacity, a Tor directory 
authority operator or part of The Torproject.


thanks for your support to fight malicious tor relays!
nusenu
-- 
https://mastodon.social/@nusenu


[2]
Physical address verification procedure could look like this:

The Torproject publishes a central registry of trusted entities that agreed to 
verify addresses of large scale operators.

The registry is broken down by area so no central entity needs to see all 
addresses or is in the position to block all submissions.
(even though the number of physical address verifications are expected be stay 
bellow 50 for the time being).

Examples could be:

Riseup.net:  US, ...
Chaos Computer Club (CCC) :  DE, ...
DFRI: SE, ...

(these organizations host Tor directory authorities)


- Relay operators that would like to run more than 0.5% guard/exit fraction 
select their respective area and contact the entity to
initiate verification.

- before sending an address verification request the operator verifies that 
they meet the following requirements:
  - the oldest relay is not younger than two months 
(https://community.torproject.org/relay/community-resources/swag/ )
  - all relays have a proper MyFamily configuration
  - relays include the verified email address and PGP key fingerprint in the 
relay's ContactInfo
  - at least one of their relays gained the exit or guard flag
  - they have a sustained bandwidth usage of at least 100 Mbit/s (accumulated)
  - intention to run the capacity for at least 4 months

- upon receiving a request the above requirements are verified by the 
verification entity in addition to:
  - relay(s) are currently running
  - the address is in the entity's area

- a random string is generated by the address verification entity and send with 
the welcome tshirt (if requested) to the operator

- after sending the token the address is deleted

- upon receiving the random string the operator sends it back via email to the 
verification entity 
while signing the email with the PGP key mentioned in the relays ContactInfo

- the verification entity compares the received string with the generated and 
mailed string

- if the string matches the entity sends the relay fingerprint to the directory 
authority list to unlock the cap for the operator

After this one-time procedure the operator can add more relays as long as they 
are in the same family as the approved relay (no new verification needed).


[3] 

exit operators running >=0.5% of exit probability 
without exit groups from 2020
(onionoo data as of 2020-07-03)

abuse-cont...@to-surf-and-protect.net   22.73   
Foundation for Applied Privacy  6.05
John L. Ricketts, PhD  5.6 
F3 Netze  5.47
https://www.torservers.net  3.89
Nicholas Merrill 2.48
https://www.digitale-gesellschaft.ch/abuse/ 1.74
Accessnow.org   1.71
Hart voor Internetvrijheid

Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale malicious actors

2020-07-05 Thread niftybunny
How many of us do not have our own IP space and can already be verified by this?

> On 5. Jul 2020, at 17:54, nusenu  wrote:
> 
> Hi,
> 
> I'm currently writing a follow-up blog post to [1] about a large scale 
> malicious tor exit relay operator
> that did run more than 23% of the Tor network's exit capacity (May 2020) 
> before (some) of it got reported to the bad-relays team and
> subsequently removed from the network by the Tor directory authorities.
> After the initial removal the malicious actor quickly restored its activities 
> and
> was back at >20% of the Tor network's exit capacity within weeks (June 2020).
> 
> [1] 
> https://medium.com/@nusenu/the-growing-problem-of-malicious-relays-on-the-tor-network-2f14198af548
> 
> To prevent this from happening over and over again
> I'm proposing two simple but to some extend effective relay requirements
> to make malicious relay operations more expensive, time consuming,
> less sustainable and more risky for such actors:
> 
> a) require a verified email address for the exit or guard relay flag.
> (automated verification, many relays)
> 
> b) require a verified physical address for large operators (>=0.5% exit or 
> guard probability)
> (manual verification, low number of operators).
> It is not required that the address is public or stored after it got verified.
> For details see bellow [2].
> 
> 0.5% exit probability is currently about 500-600 Mbit/s of advertised 
> bandwidth.
> 
> 
> Q: How many operators would be affected by the physical address verification 
> requirement if we use 0.5% as a threshold?
> A: About 30 operators.
> 
> There are currently about 18 exit [3] and 12 guard operators that run >0.5% 
> exit/guard capacity
> if we ignore the fresh exit groups from 2020.
> Most exit operators (14 out of these 18) are organizations with public 
> addresses or have their address published in WHOIS
> anyway.
> 
> At the end of the upcoming blog post I'd like to give people some idea as to 
> how much support this proposal has.
> 
> Please let me know if you find this idea to limit attackers useful, 
> especially if you are a long term relay operator,
> one of the 30 operators running >=0.5% exit/guard capacity, a Tor directory 
> authority operator or part of The Torproject.
> 
> 
> thanks for your support to fight malicious tor relays!
> nusenu
> --
> https://mastodon.social/@nusenu
> 
> 
> [2]
> Physical address verification procedure could look like this:
> 
> The Torproject publishes a central registry of trusted entities that agreed 
> to verify addresses of large scale operators.
> 
> The registry is broken down by area so no central entity needs to see all 
> addresses or is in the position to block all submissions.
> (even though the number of physical address verifications are expected be 
> stay bellow 50 for the time being).
> 
> Examples could be:
> 
> Riseup.net:  US, ...
> Chaos Computer Club (CCC) :  DE, ...
> DFRI: SE, ...
> 
> (these organizations host Tor directory authorities)
> 
> 
> - Relay operators that would like to run more than 0.5% guard/exit fraction 
> select their respective area and contact the entity to
> initiate verification.
> 
> - before sending an address verification request the operator verifies that 
> they meet the following requirements:
>  - the oldest relay is not younger than two months 
> (https://community.torproject.org/relay/community-resources/swag/ )
>  - all relays have a proper MyFamily configuration
>  - relays include the verified email address and PGP key fingerprint in the 
> relay's ContactInfo
>  - at least one of their relays gained the exit or guard flag
>  - they have a sustained bandwidth usage of at least 100 Mbit/s (accumulated)
>  - intention to run the capacity for at least 4 months
> 
> - upon receiving a request the above requirements are verified by the 
> verification entity in addition to:
>  - relay(s) are currently running
>  - the address is in the entity's area
> 
> - a random string is generated by the address verification entity and send 
> with the welcome tshirt (if requested) to the operator
> 
> - after sending the token the address is deleted
> 
> - upon receiving the random string the operator sends it back via email to 
> the verification entity
> while signing the email with the PGP key mentioned in the relays ContactInfo
> 
> - the verification entity compares the received string with the generated and 
> mailed string
> 
> - if the string matches the entity sends the relay fingerprint to the 
> directory authority list to unlock the cap for the operator
> 
> After this one-time procedure the operator can add more relays as long as 
> they are in the same family as the approved relay (no new verification 
> needed).
> 
> 
> [3]
> 
> exit operators running >=0.5% of exit probability
> without exit groups from 2020
> (onionoo data as of 2020-07-03)
> 
> abuse-cont...@to-surf-and-protect.net 22.73
> Foundation for Applied Privacy

Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale malicious actors

2020-07-05 Thread Tor-Abuse
Hi nusenu,

this sounds quite useful and I would like to support it.

I would be fine to do an email and physical address verifiation.


Cheers

Fabian

Am 05.07.20 um 17:54 schrieb nusenu:
> nick AT calyx dot com


0x2B791A2036D9D3AD.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-05 Thread nusenu
Thanks for all the positive off-list feedback so far!


>> a) require a verified email address for the exit or guard relay flag.
>> (automated verification, many relays)
> 
> Wouldn't that be a hurdle for a lot of relay operators? I can imagine
> that many operators (of smaller relays) don't publish contact
> information for privacy reasons.

I believe you can have a valid ContactInfo and privacy.

> Of course, in your proposal that
> information would only be shared with the directory authorities

That is not necessarily the case if the ContactInfo field is used without 
encryption,
basically it is not specified yet.

> but do
> we have any numbers on how many relay operators are okay with this?

I can only give you numbers based on the current tor network data
(but that is not an answer to your question since it does not reveal anything 
about the 
operator's intention)

~71% of tor's guard capacity has a non-empty ContactInfo. 
About 700 guard relays have no ContactInfo set and are older than 1 month.

~89% of tor's exit capacity has a non-empty ContactInfo. 
Only about 60 exit relays have no ContactInfo set and are older than 1 month.


>> b) require a verified physical address for large operators (>=0.5%
>> exit or guard probability)
>> (manual verification, low number of operators). 
>> It is not required that the address is public or stored after it got
>> verified.
>> For details see bellow [2].
>>
> 
> However, 0.5% seems like an arbitrary number to me. Can you provide
> some background information on how you got to this percentage? Is there
> maybe some way to calculate a malicious relay operator's
> deanonymisation success rate?

The reasoning behind the specific threshold will be covered
in more detail in the upcoming blog post.


>> Q: How many operators would be affected by the physical address
>> verification requirement if we use 0.5% as a threshold?
>> A: About 30 operators.
>>
>> There are currently about 18 exit [3] and 12 guard operators that run
>>> 0.5% exit/guard capacity 
>> if we ignore the fresh exit groups from 2020.
>> Most exit operators (14 out of these 18) are organizations with
>> public addresses or have their address published in WHOIS
>> anyway.
> 
> Please don't assume that all big relay operators are happy with sharing
> their physical address because most of them already do. Maybe we can
> poll the big relay operators to find out if they are okay with this? (I
> don't know if all of them are represented on this list)

In fact, my initial email went to many operators (after the mailing list was 
not happy with so many recipients
I did resend it to the list without the others in TO, so unfortunately you
no longer see the full list of recipients),
but yes, that is the point of this email - getting feedback from operators, 
especially from big ones.
I a few replied already.


> It is definitely an interesting idea, one that I have not thought of at
> least. But I'm not sure if it would be effective at preventing what it
> tries to prevent.

Yes, that is basically the key question and since there appears to be a lot of
money involved in running malicious relays, they certainly have enough money
to buy some office services in some random place and get a physical address
verified but one of the other factors of the proposal is also the additional 
time
required for an attacker to go trough the process and that it can no longer be 
automated completely.

kind regards,
nusenu




-- 
https://mastodon.social/@nusenu



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-05 Thread Pascal Terjan
On Sun, 5 Jul 2020 at 17:36, nusenu  wrote:
>
> Hi,
>
> I'm currently writing a follow-up blog post to [1] about a large scale 
> malicious tor exit relay operator
> that did run more than 23% of the Tor network's exit capacity (May 2020) 
> before (some) of it got reported to the bad-relays team and
> subsequently removed from the network by the Tor directory authorities.
> After the initial removal the malicious actor quickly restored its activities 
> and
> was back at >20% of the Tor network's exit capacity within weeks (June 2020).
>
> [1] 
> https://medium.com/@nusenu/the-growing-problem-of-malicious-relays-on-the-tor-network-2f14198af548
>
> To prevent this from happening over and over again
> I'm proposing two simple but to some extend effective relay requirements
> to make malicious relay operations more expensive, time consuming,
> less sustainable and more risky for such actors:
>
> a) require a verified email address for the exit or guard relay flag.
> (automated verification, many relays)

free email addresses are cheap, but I guess it would give another
correlation if they all use the same free email provider.

> b) require a verified physical address for large operators (>=0.5% exit or 
> guard probability)
> (manual verification, low number of operators).
> It is not required that the address is public or stored after it got verified.
> For details see bellow [2].
>
> 0.5% exit probability is currently about 500-600 Mbit/s of advertised 
> bandwidth.

I am not convinced it would help large scale attacks.
Running 50 relays is not much and it each was providing 0.49% of
capacity that would give them 24.5%...
I would expect that an attacker would create more relays than that and
unless there is a good way to find out this is a single entity, they
will all be well below 0.5%

> Q: How many operators would be affected by the physical address verification 
> requirement if we use 0.5% as a threshold?
> A: About 30 operators.
>
> There are currently about 18 exit [3] and 12 guard operators that run >0.5% 
> exit/guard capacity
> if we ignore the fresh exit groups from 2020.
> Most exit operators (14 out of these 18) are organizations with public 
> addresses or have their address published in WHOIS
> anyway.
>
> At the end of the upcoming blog post I'd like to give people some idea as to 
> how much support this proposal has.
>
> Please let me know if you find this idea to limit attackers useful, 
> especially if you are a long term relay operator,
> one of the 30 operators running >=0.5% exit/guard capacity, a Tor directory 
> authority operator or part of The Torproject.
>
>
> thanks for your support to fight malicious tor relays!
> nusenu
> --
> https://mastodon.social/@nusenu
>
>
> [2]
> Physical address verification procedure could look like this:
>
> The Torproject publishes a central registry of trusted entities that agreed 
> to verify addresses of large scale operators.
>
> The registry is broken down by area so no central entity needs to see all 
> addresses or is in the position to block all submissions.
> (even though the number of physical address verifications are expected be 
> stay bellow 50 for the time being).
>
> Examples could be:
>
> Riseup.net:  US, ...
> Chaos Computer Club (CCC) :  DE, ...
> DFRI: SE, ...
>
> (these organizations host Tor directory authorities)
>
>
> - Relay operators that would like to run more than 0.5% guard/exit fraction 
> select their respective area and contact the entity to
> initiate verification.
>
> - before sending an address verification request the operator verifies that 
> they meet the following requirements:
>   - the oldest relay is not younger than two months 
> (https://community.torproject.org/relay/community-resources/swag/ )
>   - all relays have a proper MyFamily configuration
>   - relays include the verified email address and PGP key fingerprint in the 
> relay's ContactInfo
>   - at least one of their relays gained the exit or guard flag
>   - they have a sustained bandwidth usage of at least 100 Mbit/s (accumulated)
>   - intention to run the capacity for at least 4 months
>
> - upon receiving a request the above requirements are verified by the 
> verification entity in addition to:
>   - relay(s) are currently running
>   - the address is in the entity's area
>
> - a random string is generated by the address verification entity and send 
> with the welcome tshirt (if requested) to the operator
>
> - after sending the token the address is deleted
>
> - upon receiving the random string the operator sends it back via email to 
> the verification entity
> while signing the email with the PGP key mentioned in the relays ContactInfo
>
> - the verification entity compares the received string with the generated and 
> mailed string
>
> - if the string matches the entity sends the relay fingerprint to the 
> directory authority list to unlock the cap for the operator
>
> After this one-time procedure the operator can add more relays as 

Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-05 Thread nusenu


Pascal Terjan:
> I am not convinced it would help large scale attacks.
> Running 50 relays is not much and it each was providing 0.49% of
> capacity that would give them 24.5%...
> I would expect that an attacker would create more relays than that and
> unless there is a good way to find out this is a single entity, they
> will all be well below 0.5%


Yes, they will try to circumvent thresholds by pretending to not be a group.
The good thing is that this requires additional resources and time on the 
attacker side to hide
the fact that they are adding many relays without triggering certain detections.

kind regards,
nusenu



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-05 Thread Felix

Hi nusenu

Thank's you for your encouraging efforts to keep things safe.

Am 05.07.2020 um 18:35 schrieb nusenu:

To prevent this from happening over and over again
I'm proposing two simple but to some extend effective relay requirements
to make malicious relay operations more expensive, time consuming,
less sustainable and more risky for such actors


Is an issue real or not? Any answer to that question does not contradict
a substantial method. Right, the proposed measure is not against
sneek-in attackers but it buys time to detect and tackle sudden issues.
Let's move forward. I hear you.

--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-05 Thread Imre Jonk
Hi nusenu,

On Sun, 2020-07-05 at 18:35 +0200, nusenu wrote:
> https://medium.com/@nusenu/the-growing-problem-of-malicious-relays-on-the-tor-network-2f14198af548

This was an interesting article, thanks for sharing. It's sad to read
that you and the anonymous Tor core member weren't heard on the bad-
relays list. Did you ever get a reply from a directory authority? I
would assume that the dir auths are very keen to discuss this subject.

> To prevent this from happening over and over again
> I'm proposing two simple but to some extend effective relay
> requirements 
> to make malicious relay operations more expensive, time consuming,
> less sustainable and more risky for such actors:
> 
> a) require a verified email address for the exit or guard relay flag.
> (automated verification, many relays)

Wouldn't that be a hurdle for a lot of relay operators? I can imagine
that many operators (of smaller relays) don't publish contact
information for privacy reasons. Of course, in your proposal that
information would only be shared with the directory authorities, but do
we have any numbers on how many relay operators are okay with this?

You mention that the current defenses are inadequate for protection
against slowly-added dispersed relays that are run by malicious actors.
Wouldn't introducing this requirement prevent some relay operators with
good intentions from serving exit or guard relays?

Furthermore, do we have any information on how much more difficult it
would become to perform a sybil attack if your proposal is implemented?
Assuming that this is something that can be somewhat accurately
measured.

> b) require a verified physical address for large operators (>=0.5%
> exit or guard probability)
> (manual verification, low number of operators). 
> It is not required that the address is public or stored after it got
> verified.
> For details see bellow [2].
> 
> 0.5% exit probability is currently about 500-600 Mbit/s of advertised
> bandwidth.

That seems reasonable. I currently co-run an exit relay that has just
under 0.1% probability and would be okay with sharing my physical
address with the directory authorities, especially if my probability
would be higher.

However, 0.5% seems like an arbitrary number to me. Can you provide
some background information on how you got to this percentage? Is there
maybe some way to calculate a malicious relay operator's
deanonymisation success rate?

> 
> Q: How many operators would be affected by the physical address
> verification requirement if we use 0.5% as a threshold?
> A: About 30 operators.
> 
> There are currently about 18 exit [3] and 12 guard operators that run
> >0.5% exit/guard capacity 
> if we ignore the fresh exit groups from 2020.
> Most exit operators (14 out of these 18) are organizations with
> public addresses or have their address published in WHOIS
> anyway.

Please don't assume that all big relay operators are happy with sharing
their physical address because most of them already do. Maybe we can
poll the big relay operators to find out if they are okay with this? (I
don't know if all of them are represented on this list)

Edit: looks like niftybunny is already on this.

> At the end of the upcoming blog post I'd like to give people some
> idea as to how much support this proposal has.

Great, I'm looking forward to this. It's a good thing to publicly
discuss proposals like these.

> Please let me know if you find this idea to limit attackers useful,
> especially if you are a long term relay operator,
> one of the 30 operators running >=0.5% exit/guard capacity, a Tor
> directory authority operator or part of The Torproject.

It is definitely an interesting idea, one that I have not thought of at
least. But I'm not sure if it would be effective at preventing what it
tries to prevent. Ultimately, the best solution for the sybil-attacks-
are-easy problem is simple: we need more bandwidth provided by relays
from operators with good intentions.

Imre


signature.asc
Description: This is a digitally signed message part
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-05 Thread Imre Jonk
Thanks for the detailed reply, nusenu. Looks like you thought this
through really well.

It would be nice if Tor core people would chip in on this as well!
@arma, @teor maybe?

See my further comments inline.

On Sun, 2020-07-05 at 22:50 +0200, nusenu wrote:
> I believe you can have a valid ContactInfo and privacy.

I do too, but I hope that prospective operators think so as well.

> > Of course, in your proposal that information would only be shared
> > with the directory authorities
> 
> That is not necessarily the case if the ContactInfo field is used
> without encryption, basically it is not specified yet.
> 
> > but do we have any numbers on how many relay operators are okay
> > with this?
> 
> I can only give you numbers based on the current tor network data
> (but that is not an answer to your question since it does not reveal
> anything about the operator's intention)
> 
> ~71% of tor's guard capacity has a non-empty ContactInfo. 
> About 700 guard relays have no ContactInfo set and are older than 1
> month.
> 
> ~89% of tor's exit capacity has a non-empty ContactInfo. 
> Only about 60 exit relays have no ContactInfo set and are older than
> 1 month.

Those numbers look encouraging to me. It's good to see that most
operators are doing things the right way, i.e. being reachable in case
something happens to their relay. Still not 100% though.

> The reasoning behind the specific threshold will be covered
> in more detail in the upcoming blog post.

Now you're making me really curious.

> In fact, my initial email went to many operators (after the mailing
> list was not happy with so many recipients
> I did resend it to the list without the others in TO, so
> unfortunately you no longer see the full list of recipients),
> but yes, that is the point of this email - getting feedback from
> operators, especially from big ones.
> I a few replied already.

That's great! Let's see what they think.

> > It is definitely an interesting idea, one that I have not thought
> > of at least. But I'm not sure if it would be effective at
> > preventing what it tries to prevent.
> 
> Yes, that is basically the key question and since there appears to be
> a lot of money involved in running malicious relays, they certainly
> have enough money to buy some office services in some random place
> and get a physical address verified but one of the other factors of
> the proposal is also the additional time required for an attacker to
> go trough the process and that it can no longer be automated
> completely.

It would be very interesting to know who pays for that. If we figure
that out, then maybe we can pursuade them to donate that money to the
Tor Project instead. \s

Imre


signature.asc
Description: This is a digitally signed message part
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-05 Thread Charly Ghislain
I have nothing against this proposal although im not sure it would be that
much efficient.
Especially, how does it make relay operations 'less sustainable' or 'more
risky'?

@Imre Jonk: why would you want - and why should you have - an higher
probability?
Sounds to me the ideal case is an infinite amount of independent exits with
an almost-zero probability.

C

On Mon, Jul 6, 2020 at 12:28 AM Felix  wrote:

> Hi nusenu
>
> Thank's you for your encouraging efforts to keep things safe.
>
> Am 05.07.2020 um 18:35 schrieb nusenu:
> > To prevent this from happening over and over again
> > I'm proposing two simple but to some extend effective relay requirements
> > to make malicious relay operations more expensive, time consuming,
> > less sustainable and more risky for such actors
>
> Is an issue real or not? Any answer to that question does not contradict
> a substantial method. Right, the proposed measure is not against
> sneek-in attackers but it buys time to detect and tackle sudden issues.
> Let's move forward. I hear you.
>
> --
> Cheers, Felix
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays