German data rentention law
Sven Anderson
sven at anderson.de
Mon Oct 20 15:54:18 UTC 2008
Am 20.10.2008 um 00:06 schrieb Roger Dingledine:
>> So it will be very interesting how this will continue, since it
>> is assumed by many, that the data retention law violates the German
>> constitution.
>
> Quite so. Good thing all the German laws are so clear. :)
As long as the constitution has the higher priority, I'm fine with
it. ;-)
> And we do not want to see any Tor relays that log traffic
> information. So
> should Tor's role for now be to simply say "the only risk from the
> German
> data retention law is if its vague wording convinces Tor operators
> to install backdoors in their relays. If you think your new law is
> enforceable, and would like to backdoor your relay, please shut it
> down
> instead.", and then wait to see how the people fighting the law fare?
Shouldn't we differentiate what is being logged before making such a
statement? Regarding that a large amount of Tor bandwidth is provided
by German nodes, it is IMHO too hasty to generally claim that no Tor
node is better than a logging Tor node.
I claim, that even if a node follows the DR law it will almost not
impair the security of the Tor users, since Tor is somehow "DR proof".
The law-authors didn't have concepts like Tor in mind, when they wrote
the specific stuff for anonymization services. They were thinking of
simple one-hop anonymizers (if they were thinking at all).
So, what the law asks for, is that if you change any information,
which has to be logged by another party because of the DR law, you
have to log that change as well. Since Tor works on TCP level, the
_only_ DR relevant information it changes is the source IP address
(ports and destination are NOT DR relevant). So in order to fulfill
the DR law you only have to log at which time you had incoming
connections from which IP. Since the connections are persistent, these
are a lot. For my node that would be 4000-5000 at any time. I'm happy
to give the investigators a list of 5000 IP addresses for a given
time, since they will not have the slightest chance to get any useful
information out of this. Even if we assume perfect worldwide
cooperation and they are able to get this data from any Tor node, they
will end up with nothing more than a list of _all_ Guard nodes, and
there are far easier ways of getting it, and as a result of that _all_
Tor users at a given time. So even this unrealistic scenario would
just reveal very useless information.
So if the german courts and prosecutors don't realize this beforehand,
and really demand Tor logging, I'd just say: ok, do it. They will soon
realize that they will not get any useful information out of this and
drop the regulation for Tor again. It's "just" a cost issue for Tor
operators (because of necessary HD space), but not really an privacy
issue.
So even in the worst-case-scenario, please don't let the usability of
Tor decrease even more by switching off the German nodes, just for a
questionable and theoretical privacy improvement. But I still hope,
that somebody will tell them before, and we will never have to log at
all.
> Are there actually any design changes in Tor that are needed for now?
> Assuming ISPs don't suddenly start becoming logging stations, and
> assuming
> not very many Tor relays become compromised, there really aren't any
> new threats for Tor users.
Exactly.
Regards,
Sven
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 2415 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20081020/8e0b0903/attachment.bin>
More information about the tor-talk
mailing list