Joakim Aronius wrote:
Lets assume that some child pr0n dealer used this Tor exit node, is it not reasonable if the police wants to see if
there are
logs that make it possible to catch the sleazebag? Should LE ignore crime if it originates from a network which operates
a Tor
exit node?
I am all
- Forwarded message from Asad Haider -
From: Asad Haider
Date: Thu, 29 Nov 2012 19:37:24 +
To: tor-t...@lists.torproject.org
Subject: Re: [tor-talk] William was raided for running a Tor exit node.
Please help if you can.
Reply-To: tor-t...@lists.torproject.org
William will b
* Patrick W. Gilmore (patr...@ianai.net) wrote:
> On Nov 29, 2012, at 12:58 , Barry Shein wrote:
> > It would seem like they'd have to confiscate the equipment at every
> > Starbucks in their jurisdiction, which could be every one in the US
> > for example.
>
> They didn't confiscate every Tor ex
On Fri, Nov 30, 2012 at 12:52 AM, Robert E. Seastrom wrote:
> Note that the Ciscos didn't exhibit any untoward behavior, and there
> were "passwords" on the VRRP sessions too.
case of the same situation all[1] 'software md5 tcp' implementations have?
sign but never verify...
-chris
[1]: solaris
I can't seem to recall anyone griping about this here on our august
little list but google finds that I'm by no means the first to have
been burned by an unholy interaction between VRRP and CARP.
Let's skip the protocol discussions (same protocol number and uses
multicast) [*] and go straight to
Yes, but if you are operating a TOR node, it's not entirely clear to me that
you are not actually an ISP (whether you
realize that or not).
You are, after all, providing a form of internet access to non-paying customers.
Owen
On Nov 29, 2012, at 11:58 , Tom Beecher wrote:
> Not really compara
On Thu, Nov 29, 2012 at 2:00 PM, Jim Mercer wrote:
> On Thu, Nov 29, 2012 at 01:19:19PM -0600, Naslund, Steve wrote:
>> I think the best analogy I would use in defense is something like the
>> pre-paid cellular phones that are sold. That is about the only
>> anonymous communications service I can
On 29 Nov 2012, at 20:53, George Herbert wrote:
> The assertion being made here, that it's somehow illegal (or immoral,
> or scary) for there to be not-completely-traceable internet access in
> the US, is absurd.
The real issue here is *not* the legality of the act of providing a Tor exit
node
Greetings Nanog,
I apologize in advance if this should be directed towards a server/systems
discussion list, but I've noticed some (what I think are) issues with the way
windows 2008/2012 handles arp. I started noticing some high arp processes on
some of our 6500s running sup720s, and after per
On Thu, 29 Nov 2012, Naslund, Steve wrote:
[...]
When it comes to running an open access point, I think the legal issue
would be negligence. Is it negligence for the 90 year old grandma to
have an open AP (probably not, just didn't know better)? Is it
negligence for me to have an open AP (pro
Comments deep below.
On Thu, 29 Nov 2012, Miles Fidelman wrote:
Michael Froomkin - U.Miami School of Law wrote:
> 2. If I provide access to four or five friends, I am not an ISP and in
> fact I am responsible if they use my connection to do something illegal
> since I am the customer of re
You are correct about most people not falling under CALEA. That also
means that they do not have the "safe harbor" provisions provided to
facilities based providers (however an open wireless hotspot MIGHT just
make you a wireless facilities based provider). You are not under an
obligation to prov
Naslund, Steve wrote:
1. Running open access wireless does not make you legally an ISP and if
your open wireless is used to commit a crime you could be criminally
negligent if you did not take "reasonable care" in the eyes of the
court.
Related:
https://www.eff.org/deeplinks/2012/07/judge-copy
Michael Froomkin - U.Miami School of Law wrote:
2. If I provide access to four or five friends, I am not an ISP and in
fact I am responsible if they use my connection to do something illegal
since I am the customer of record. If you loan your car to an
unlicensed driver and he kills someone, y
On Thu, 29 Nov 2012, Naslund, Steve wrote:
1. Running open access wireless does not make you legally an ISP and if
OK.
your open wireless is used to commit a crime you could be criminally
negligent if you did not take "reasonable care" in the eyes of the
court.
I believe this is incorrect un
47 U.S.C. 230 doesn't do much for child porn, no. However, PROTECT does.
PROTECT spells out reporting, but also contains safe harbor provisions such
that an ISP who didn't know that child porn was being transmitted across their
network cannot be prosecuted for not knowing, only for not taking t
> Date: Thu, 29 Nov 2012 15:26:57 -0500
> From: Tom Beecher
> Subject: Re: William was raided for running a Tor exit node. Please help if
> you can.
>
> Communications Decency Act, 47 U.S.C. 230 is the US law that has been
> interpreted to provide immunity to ISP for the actions of their users
On Thu, Nov 29, 2012 at 01:19:19PM -0600, Naslund, Steve wrote:
> I think the best analogy I would use in defense is something like the
> pre-paid cellular phones that are sold. That is about the only
> anonymous communications service I can think of off the top of my head.
> Problem is that most
On 2012-11-29, Jeff Wheeler wrote:
> I had two downstream BGP customers experience problem with an OpenBGPd bug
> tonight. Before diving into detail, I would like to link this mailing list
> thread, because this is not a new issue and a patch is available:
> http://www.mail-archive.com/misc@openb
I have read a little of this BS thread.
1) I have been maintaining a network for 12 years.
2) I am and have been since Feb 1965 a programmer.
Anyone who bashes either group has a problem.
First, at one time programmers knew bits, bytes, opcodes, machine codes
etc. I have written close to thir
If you hear anything more, I'd be interesting in knowing about it. I had a
an upstream going up and down last night; reportedly their BGP process was
core dumping due to a BGP attribute issue. I never found out what vendor
it was though.
Paul
On Thu, Nov 29, 2012 at 12:33 PM, Michael Sinatra <
The entire question here is whether CALEA's covered entities
definition and ISP "common carrier" (not exactly, but the commonly
used term for CDA protections available, see earlier discussion)
definitions overlap.
The answer is no. It always has been no. Plenty of publishers and
access providers
Why would I want to do that instead of store it as a single 128 bit integer or
bit-field?
Owen
Sent from my iPad
On Nov 29, 2012, at 6:01 AM, Ray Soucy wrote:
> You should store IPv6 as a pair of 64-bit integers. While PHP lacks
> the function set to do this on its own, it's not very diffic
1. Running open access wireless does not make you legally an ISP and if
your open wireless is used to commit a crime you could be criminally
negligent if you did not take "reasonable care" in the eyes of the
court.
2. If I provide access to four or five friends, I am not an ISP and in
fact I am re
On Thu, Nov 29, 2012 at 12:42 PM, Naslund, Steve wrote:
> The entire point of Tor is to be untraceable back to the source. Egress
> filters can prevent future abuse but do not provide for tracing back to
> the original source of offending conduct. They are not trying to stop
> the flow of the dat
In message
, Ray Soucy writes:
> You should store IPv6 as a pair of 64-bit integers. While PHP lacks
> the function set to do this on its own, it's not very difficult to do.
I did it as a array of 8, 16 bit integers with a old version of dhclient.
The had the advantage that you could just do "%
The entire point of Tor is to be untraceable back to the source. Egress
filters can prevent future abuse but do not provide for tracing back to
the original source of offending conduct. They are not trying to stop
the flow of the data in this case, they want the source in jail. If law
enforcement
Communications Decency Act, 47 U.S.C. §230 is the US law that has been
interpreted to provide immunity to ISP for the actions of their users.
Zeran v. America Online, Inc., 4th Circuit, 1997
Jane Doe v. America Online, Inc., 5th Circuit, 1997
Blumenthal v. Drudge, DC District, 1998
Green v. AOL,
On Thu, Nov 29, 2012 at 12:00 PM, Naslund, Steve wrote:
> ISPs also do not "allow strangers to do whatever they want" ISPs have
> responsibilities to act on DCMA notices and CALEA requests from law
> enforcement. These are things that Tor exit nodes are not capable of
> doing. If you were an IS
On Thu, Nov 29, 2012 at 11:58 AM, Tom Beecher wrote:
> Not really comparable.
>
> Speaking from a US point of view, ISPs has strong legal protections
> isolating them from culpability for the actions of their customers. I know
> internationally things are different, but here in the US the ISP does
I think service providers are afforded special protections because the
law recognizes their utility and the inability of the service provider
to be responsible for the actions of all of their customers. The major
problem is that not every individual has the same protections. A lot of
ISPs are act
Not really comparable.
Speaking from a US point of view, ISPs has strong legal protections
isolating them from culpability for the actions of their customers. I
know internationally things are different, but here in the US the ISP
doesn't get dinged, except in certain cases where they are lega
On Thu, Nov 29, 2012 at 11:18 AM, Tom Beecher wrote:
> Assuming it's true, it was bound to happen. Running anything , TOR or
> otherwise, that allows strangers to do whatever they want is just folly.
Such as, say, an Internet Service Provider business?
...
--
-george william herbert
george.her
- Original Message -
> From: "Patrick W. Gilmore"
> > I think if they took the cash registers too the Starbucks lawyer would
> > be in court an hour later with a motion to quash in one hand and an
> > offer of full cooperation in the other.
>
> And if the sky were orange
>
> Any oth
- Original Message -
> From: "Patrick W. Gilmore"
> "Mere conduit" defense. (Please do not anyone mention "common carrier
> status" or the like, ISPs are _not_ common carriers.)
> Do you think if the police found out child pr0n was being served from
> a starbux they wouldn't confiscate t
On Thu, Nov 29, 2012 at 2:06 PM, Patrick W. Gilmore wrote:
> On Nov 29, 2012, at 13:57 , William Herrin wrote:
>> On Thu, Nov 29, 2012 at 11:45 AM, Patrick W. Gilmore
>> wrote:
>>> Do you think if the police found out child pr0n was
>>> being served from a starbux they wouldn't
>>> confiscate
We had a guy (aka potential customer) inquire the other day about hosting a
Tor exit on our infrastructure the other day; he disappeared fairly
quickly when he figured out that we weren't just going to give him an
endless supply of unmetered 10G bandwidth. I was looking forward to
billing him. :
Not sure if there is a legal precedent for this, but logically the
difference is that there are no robots that I know of that can automatically
receive and parse postal mail, then re-address and forward it. For a human
to forward a letter takes a conscious manual action, even if they choose not
to
Jeff and NANOG:
We are currently dropping the bad attribute within our network (as293)
and are working with the customer to determine the origin of the
attribute (equipment, code rev, etc.). The bad attribute should not be
leaking beyond our AS at all. If you're filtering routes from AS68, you
s
On Fri, Nov 30, 2012 at 01:14:08AM +1100, Emily Ozols wrote:
> Hi,
>
> I gotta ask and I'm sure someone would if I didn't, but how do we know
> this guy is legit?
> He's jumped up on a forum saying, "Hey, police raided me, help. gib
> mone plz" and failed to provide and reason as to how he's real
I think the best analogy I would use in defense is something like the
pre-paid cellular phones that are sold. That is about the only
anonymous communications service I can think of off the top of my head.
Problem is that most people are not licensed carriers and may not be
able to hide behind that
Assuming it's true, it was bound to happen. Running anything , TOR or
otherwise, that allows strangers to do whatever they want is just folly.
People will spend time and money securing their home wireless so their
neighbor can't steal their internet, but willingly allow strangers from
anywhere
How would this be legally different than receiving the illegal content
in an envelope and anonymously forwarding the envelope via the post
office? I am pretty sure you are still liable since you were the
sender. I realize that there are special postal regulations but I think
that agreeing to forw
On Nov 29, 2012, at 13:57 , William Herrin wrote:
> On Thu, Nov 29, 2012 at 11:45 AM, Patrick W. Gilmore
> wrote:
>> Do you think if the police found out child pr0n was
>> being served from a starbux they wouldn't
>> confiscate the equipment from that store?
>
> I think if they took the cash r
It's difficult to compare a guy in Austria to a multi-billion dollar
corporation. Here in the US, the fed has charged 3 men with involuntary
manslaughter for their parts in the Gulf of Mexico Rig explosion. BP
received a slap on the wrist, and a decent (to us, not them) sized fine.
On 11/29/12 10:
On 11/29/2012 10:36 AM, Cameron Byrne wrote:
Got some bad data here. Let me help.
Sent from ipv6-only Android
On Nov 29, 2012 8:22 AM, "Michael Thomas" mailto:m...@mtcc.com>> wrote:
> Phone apps, by and large, are designed by people in homes or
> small companies. They do not have v6 connectiv
On Thu, Nov 29, 2012 at 11:45 AM, Patrick W. Gilmore wrote:
> Do you think if the police found out child pr0n was
> being served from a starbux they wouldn't
> confiscate the equipment from that store?
I think if they took the cash registers too the Starbucks lawyer would
be in court an hour late
Hi,
I gotta ask and I'm sure someone would if I didn't, but how do we know
this guy is legit?
He's jumped up on a forum saying, "Hey, police raided me, help. gib
mone plz" and failed to provide and reason as to how he's real and not
just making it up.
Maybe if there's a way to know this guy is le
On Nov 29, 2012, at 12:58 , Barry Shein wrote:
> On November 29, 2012 at 11:45 patr...@ianai.net (Patrick W. Gilmore) wrote:
>> On Nov 29, 2012, at 11:17 , Barry Shein wrote:
>>
>>> It's funny, it's all illusion like show business. It's not hard to set
>>> up anonymous service, crap, just drop i
Got some bad data here. Let me help.
Sent from ipv6-only Android
On Nov 29, 2012 8:22 AM, "Michael Thomas" wrote:
> Phone apps, by and large, are designed by people in homes or
> small companies. They do not have v6 connectivity. Full stop.
> They don't care about v6. Full stop. It's not their
On November 29, 2012 at 11:45 patr...@ianai.net (Patrick W. Gilmore) wrote:
> On Nov 29, 2012, at 11:17 , Barry Shein wrote:
>
> > It's funny, it's all illusion like show business. It's not hard to set
> > up anonymous service, crap, just drop in at any wi-fi hotspot, many
> > just ask you
Hi Jeff (and NANOG)
This is one of our customers, and we're going to get it fixed (or worked
around) ASAP.
michael
On 11/29/12 12:44 AM, Jeff Wheeler wrote:
> I had two downstream BGP customers experience problem with an OpenBGPd bug
> tonight. Before diving into detail, I would like to link th
Subject: Re: "Programmers can't get IPv6 thus that is why they do not have IPv6
in their applications" Date: Thu, Nov 29, 2012 at 09:55:19AM -0500 Quoting
William Herrin (b...@herrin.us):
> On Thu, Nov 29, 2012 at 9:01 AM, Ray Soucy wrote:
> > You should store IPv6 as a pair of 64-bit intege
The press is reporting on Renesys' report that Syria has finally dropped all
its internet connectivity earlier this morning:
http://www.renesys.com/blog/2012/11/syria-off-the-air.shtml
http://m.washingtonpost.com/blogs/worldviews/wp/2012/11/29/web-monitor-100-percent-of-syrias-internet-just-shu
On Nov 29, 2012, at 11:17 , Barry Shein wrote:
> Back in the early days of the public internet we didn't require any id
> to create an account, just that you found a way to pay us. We had
> anonymous accts some of whom dropped by personally to pay their bill,
> some said hello but I usually didn
On 11/28/2012 09:40 PM, Jeroen Massar wrote:
On 2012-11-28 18:26, Michael Thomas wrote:
It's very presumptuous for you to tell me what my development/test
priorities ought to be, and I can tell you for absolute certain that any
such badgering will be met with rolled eyes and quick dismissal.
Y
Back in the early days of the public internet we didn't require any id
to create an account, just that you found a way to pay us. We had
anonymous accts some of whom dropped by personally to pay their bill,
some said hello but I usually didn't know their names and that's how
they wanted it, I'd an
Hadn't thought about it that way before. This was a useful bit of info,
thanks.
-Blake
On Thu, Nov 29, 2012 at 8:55 AM, William Herrin wrote:
> On Thu, Nov 29, 2012 at 9:01 AM, Ray Soucy wrote:
> > You should store IPv6 as a pair of 64-bit integers. While PHP lacks
> > the function set to do
On Thu, Nov 29, 2012 at 9:01 AM, Ray Soucy wrote:
> You should store IPv6 as a pair of 64-bit integers. While PHP lacks
> the function set to do this on its own, it's not very difficult to do.
Hi Ray,
I have to disagree. In your SQL database you should store addresses as
a fixed length characte
On Wed, Nov 28, 2012 at 1:30 PM, david peahi wrote:
> Do today's programmers still use basic BSD socket programming? Is there an
> equivalent set of called procedures for IPv6 network application
> programming?
The IPv6 API is BSD sockets. However, unless you were a particularly
advanced sockets
You should store IPv6 as a pair of 64-bit integers. While PHP lacks
the function set to do this on its own, it's not very difficult to do.
Here are a set of functions I wrote a while back to do just that
(though I admit I should spend some time to try and make it more
elegant and I'm not sure it'
If you run Tor, then you should probably accept that it might be used
for activity that you don't approve of or even is in violation of the
law.
I'm not saying Tor is good or bad, just that if you're using it you
probably know what you're getting into.
In order to catch someone in a criminal case
On 2012-11-29 13:53 , . wrote:
> On 29 November 2012 12:48, Dobbins, Roland wrote:
>>
>> On Nov 29, 2012, at 6:47 PM, Bjørn Mork wrote:
>>
>>> What's the proper term for software which happens to access the network?
>>
>> Just about anything, these days.
>>
>> ;>
>>
>> 'Network-enabled' or 'netwo
I'm not William and a friend pasted a link on IRC to me. I'm going to
send him a few bucks because I know how it feels to get blindsided by
the police on one random day and your world is turned upside down.
Source:
http://www.lowendtalk.com/discussion/6283/raided-for-running-a-tor-exit-accepting-
On 29 November 2012 12:48, Dobbins, Roland wrote:
>
> On Nov 29, 2012, at 6:47 PM, Bjørn Mork wrote:
>
>> What's the proper term for software which happens to access the network?
>
> Just about anything, these days.
>
> ;>
>
> 'Network-enabled' or 'network-capable' software, maybe?
>
Connecting a
On Nov 29, 2012, at 6:47 PM, Bjørn Mork wrote:
> What's the proper term for software which happens to access the network?
Just about anything, these days.
;>
'Network-enabled' or 'network-capable' software, maybe?
---
Roland
"Dobbins, Roland" writes:
> On Nov 29, 2012, at 4:28 PM, Bjørn Mork wrote:
>
>> If it doesn't do IPv4 then I don't see the need for IPv6 support.
>
> To me, 'networking software' <> software which happens to access the
> network. Quagga is an example of 'networking software'.
OK, that makes sens
On Nov 29, 2012, at 4:28 PM, Bjørn Mork wrote:
> If it doesn't do IPv4 then I don't see the need for IPv6 support.
To me, 'networking software' <> software which happens to access the network.
Quagga is an example of 'networking software'.
-
"Dobbins, Roland" writes:
> On Nov 29, 2012, at 12:18 AM, Bjørn Mork wrote:
>
>> But I will absolutely refuse the idea that anyone incapable of
>> getting their application tested with IPv6 are able to create any
>> useful networking software.
>
> Who's talking about 'networking software'? 'Netw
I had two downstream BGP customers experience problem with an OpenBGPd bug
tonight. Before diving into detail, I would like to link this mailing list
thread, because this is not a new issue and a patch is available:
http://www.mail-archive.com/misc@openbsd.org/msg115071.html
For the following DFZ
70 matches
Mail list logo