Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-30 Thread Andy Isaacson
On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote:
 On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote:
  Yes, there are cases of law enforcement seizing all computer gear from a
  house with a exit node -- not just the exit node computer.  Most
  recently in Austria in a child porn investigation.
 
 We did some operational planning for this risk, in conjunction with
 the university legal and IT departments, when we set up the CMU Tor
 exit.

Similarly for Noisebridge / Noisetor, we decided to host at a commercial
facility separate from our production servers both for
cost-per-bandwidth and separation-of-risk reasons.

I don't think it's very likely that cops would bust down a door at CMU
to sieze equipment under an ill-conceived investigation; having an
institution is quite helpful in getting the cops to actually do their
jobs and validate their suspicions.  (Unfortunately.)

 Also, the greater operational threat is having the plug pulled by
 one's connectivity provider.  I personally would not risk having an
 exit node in my house for that reason alone.

In my case (and, I suspect, most of us well paid techies), I would be
back online with new hardware and a 4G modem a few hours after the cops
finished their smash-and-grab, so while losing the higher bandwidth of
the fixed line and the use of my hardware would be quite inconvenient,
it wouldn't be the end of the world.  It's important to have a
contingency plan for this case, though.

-andy
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-30 Thread grarpamp
On Tue, Jul 30, 2013 at 6:50 AM, Andy Isaacson a...@hexapodia.org wrote:
 On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote:
 On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote:
  Yes, there are cases of law enforcement seizing all computer gear from a
  house with a exit node -- not just the exit node computer.  Most
  recently in Austria in a child porn investigation.

 We did some operational planning for this risk, in conjunction with
 the university legal and IT departments, when we set up the CMU Tor
 exit.

 Similarly for Noisebridge / Noisetor, we decided to host at a commercial
 facility separate from our production servers both for
 cost-per-bandwidth and separation-of-risk reasons.

Physical standoff distance and preparation is certainly best.
Similarly, has anyone ever put a Tor/EFF exit relay notice and
contact info on their door? Let their neighbors and/or flatmates
know? Consulted with agencies likely to service warrants?
Not to stop such legal process, but to lessen through education
some of the risks involved.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-30 Thread Andy Isaacson
On Tue, Jul 30, 2013 at 06:20:29PM -0400, grarpamp wrote:
 Similarly, has anyone ever put a Tor/EFF exit relay notice and
 contact info on their door? Let their neighbors and/or flatmates
 know? Consulted with agencies likely to service warrants?
 Not to stop such legal process, but to lessen through education
 some of the risks involved.

Noisebridge has a flier which is printed and available near the door.
Part of the material is aimed at the volunteer who answers the door to
the law enforcement official; part of the material is aimed at the
official.  The material is at

https://www.noisebridge.net/wiki/Noisebridge_Tor/FBI

Since the volunteer who opens the door probably hasn't been directly
trained to handle this situation, it's difficult to provide really good
management of the situation.

Also since the IP address is obviously not at the physical address of
the hackerspace, and the primary contact for LE is by phone, there
aren't very many visits.  We've gotten visits from the Secret Service
and the FBI and the volunteers report that it has been straightforward.
Haven't had a visit or a call in several months; I suspect the word has
gotten around the office that it's not a fruitful avenue of
investigation.

-andy
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-29 Thread Zack Weinberg
On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote:
 Yes, there are cases of law enforcement seizing all computer gear from a
 house with a exit node -- not just the exit node computer.  Most
 recently in Austria in a child porn investigation.
[...]

We did some operational planning for this risk, in conjunction with
the university legal and IT departments, when we set up the CMU Tor
exit.

The machine is in a cube farm filled with other equipment that people
need for their work; this is because we want to have immediate
physical access to it in an emergency, and anywhere else we could put
it would interfere with that.  However, it has its own dedicated IP
address, it runs absolutely no other services, it is clearly labeled
both in DNS and on the physical box, and there's nothing else on the
table it sits on.  The hope is that this will be sufficient to
persuade law enforcement to seize *only* that machine, if it comes to
it.

Of course, it helps as much or more to have the equipment under the
aegis of an organization with lawyers already briefed and on tap, and
that has trained all the staff to call legal *before doing anything
else* when the police show up.

Also, the greater operational threat is having the plug pulled by
one's connectivity provider.  I personally would not risk having an
exit node in my house for that reason alone.

zw
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays