nanog mailing list archives

Re: William was raided for running a Tor exit node. Please help if


From: Owen DeLong <owen () delong com>
Date: Wed, 5 Dec 2012 01:22:16 -0800


On Dec 5, 2012, at 12:38 AM, Jimmy Hess <mysidia () gmail com> wrote:

On 12/5/12, Jutta Zalud <ju () netzwerklabor at> wrote:
Technically you are right. But then: what is the difference to ISPs?
They offer routing- and DNS- and mail- and other services on
various infrastructure.

ISPs typically have a customer.    They know their customer, they
retain  sufficient information to identify  their customer,  such as
name, billing address, physical location,  telephone number,  and have
a signed agreement to provide the service.
They collect consideration from their customer; usually in the form of cash.


What if it's a free open wireless ISP where all you have to do is click
an assent to a basic TOS agreement?

What if it's a free open wireless ISP (such as any Apple store) where
all you have to do is get within range and connect? No contract or
click-thru at all?

The customer of an ISP is normally expected to adhere to some sort of
AUP or TOU,  providing terms of their use of the service.   Typically
including some provisions,  such as  'customer is responsible for
activities that are performed while dialed into their account', 'no
illegal activities',   '  no sending spam',  conducting other network
abuses.


In many cases, but not all. However I do have to wonder what makes you
think a civil contract would be a deterrent to someone willing to
commit a criminal act?

For consumer ISPs,  sometimes activities such as running internet
servers, reselling,  or  providing ISP access to 3rd parties,  might
be restricted
(restrictions incompatible with running a TOR exit node on that service).


But such restrictions are not all that common and aren't particularly
relevant to this discussion.

An end user operating a TOR exit node, or  wide open Wireless AP,
intentionally allows other people to connect  to their infrastructure
and the internet  whom  they have no relationship with or prior
dealings with, in spite of the possibility of network abuse or illegal
activities,    they choose to allow connectivity  without  first
gathering  information  required to hold the 3rd party responsible for
their activity.

I find it amusing that you feel the need to continuously repeat "an
end user operating a TOR exit node." Is there some reason that it makes
a difference whether the entity operating the TOR exit node or open
Wireless AP is an end user or an ISP? Of course, I would argue that
operating an open Wireless AP or a TOR node makes you a form of ISP
whether you recognize the fact or not.

An intentional "anonymizer" which is in contrast to what an ISP does.
The operator of an ordinary anonymizer service is subject to the
possibility of court-ordered intercept  upon future use.

So is the operator of a TOR node. The primary difference being that
TOR is specifically engineered to make such an intercept virtually
useless. So it seems your real criticism here is simply that TOR
is a more effective anonymizer.

If the operator of the Tor node believes that criminal intent is the
most likely use of the TOR exit node.    the degree of intentional
ignorance might be considered so severe,   that it becomes a situation
in which they are considered culpable.

This assumes a whole lot of facts not in evidence. If I were to put
up a TOR exit node, I would assume that the most likely intent would
be free speech which is not illegal in my jurisdiction. I don't
consider that I am responsible for the myriad jurisdictions that
may exist at the entry and/or transit points prior to reaching
said exit node.

Do you have any data to support your conclusion that criminal intent is
the most likely use of TOR exit nodes?

E.g.  the Tor exit node operator might possibly be considered an
accessory, to the activity occuring on their node,  that they are
harboring / allowing to occur anonymously.

Very hard to prove that intent beyond a reasonable doubt in my opinion.

Not to say  whether Tor node operators are possibly guilty of anything or not.
But they are definitely different from ISPs  in  a number of important ways.

You have yet to show one yet. You've shown how they're different from some
ISPs, but there are many ISPs operating today which don't fit your model
of what constitutes an ISP, so I remain unconvinced.

I'm further unconvinced that your proposed distinctions are actually
meaningful from a legal perspective. Perhaps the lawyer that chimed
in earlier will come back and address this question.

Any similarity between Open AP/Tor Exit node operator and ISP   are
highly superficial.

I guess this depends almost entirely on what properties it is that
you believe define an ISP.

Given the number of ISPs that don't have customers, don't collect
data on their customers, and operate free open public access networks,
I don't think that the properties you suggest above can be used in
said definition.

As I said, given that Apple Computer operates such networks quite
intentionally in all of their stores as well as within range of the
Apple campus in Cupertino, I think you'd be hard pressed to claim
that these are strictly some small fringe exceptions.

To me, an ISP is defined by the fact that they provide packet forwarding
service(s) to some group of external parties.

By that definition, I cannot make any legitimate claim that any of
the following are not ISPs:
        TOR Exit nodes
        Tunnel Brokers
        6to4 gateways/servers
        Teredo gateways/servers
        Access networks
        Datacenters
        Universities (in most cases)
        etc.

So… You claim that those similarities are superficial…What are the deeply
meaningful differences that apply across the board to all ISPs?

Owen



Current thread: