Re: ietf.org unaccessible for Tor users

Rich Kulawiec <rsk@gsp.org> Tue, 15 March 2016 11:08 UTC

Return-Path: <rsk@gsp.org>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B84B112D9AD for <ietf@ietfa.amsl.com>; Tue, 15 Mar 2016 04:08:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2wdDZ7sEUUZx for <ietf@ietfa.amsl.com>; Tue, 15 Mar 2016 04:08:25 -0700 (PDT)
Received: from taos.firemountain.net (taos.firemountain.net [207.114.3.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E81A312D530 for <ietf@ietf.org>; Tue, 15 Mar 2016 04:08:24 -0700 (PDT)
Received: from gsp.org (localhost [127.0.0.1]) by taos.firemountain.net (8.15.1/8.14.9) with SMTP id u2FB8NKc001922 for <ietf@ietf.org>; Tue, 15 Mar 2016 07:08:23 -0400 (EDT)
Date: Tue, 15 Mar 2016 07:08:22 -0400
From: Rich Kulawiec <rsk@gsp.org>
To: ietf@ietf.org
Subject: Re: ietf.org unaccessible for Tor users
Message-ID: <20160315110822.GA12471@gsp.org>
References: <m2a8m0y72q.wl%randy@psg.com> <20160315002604.15726.qmail@ary.lan>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <20160315002604.15726.qmail@ary.lan>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/OMgGNUq2oNzdAkap8nQ2SEN0isE>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2016 11:08:28 -0000

1. Captchas are worthless security theater.

If a given site is not a target, then of course they're not needed.

If a given site is a target, then they will be bypassed at will by
any modestly-talented, modestly-resourced attacker -- either
with automation, with humans, or with a combination of the two. [1]

In either case, they serve only to complicate site design/operation
and to make life more difficult for people who *already* are facing
difficulties.

2. If the goal (or one of the goals) here is to ensure that IETF
content is accessible to everyone and remains so in the face of
various attacks (and what *are* those, exactly?) then one simple
and robust approach is to set up static mirrors *and* to enable
rsync access so that anyone who wishes to can set up their own.

---rsk

[1] A few (of many) items discussing this, in no particular order:

	Stanford researchers outsmart captcha codes
	http://www.physorg.com/news/2011-11-stanford-outsmart-captcha-codes.html

	CIntruder: pentesting tool to bypass captchas
	http://cintruder.sourceforge.net/

	How a trio of hackers brought Google's reCAPTCHA to its knees
	http://arstechnica.com/security/2012/05/google-recaptcha-brought-to-its-knees/

	Snapchat Account Registration CAPTCHA Defeated
	http://it.slashdot.org/story/14/01/23/2037201/snapchat-account-registration-captcha-defeated

	Gone in 60 seconds: Spambot cracks Live Hotmail CAPTCHA
	http://arstechnica.com/news.ars/post/20080415-gone-in-60-seconds-spambot-cracks-livehotmail-captcha.html

	Troy Hunt: Breaking CAPTCHA with automated humans
	http://www.troyhunt.com/2012/01/breaking-captcha-with-automated-humans.html

	Now Even Photo CAPTCHAs Have Been Cracked
	http://it.slashdot.org/article.pl?sid=08/10/14/1442213

	Cheap CAPTCHA Solving Changes the Security Game
	https://freedom-to-tinker.com/blog/felten/cheap-captcha-solving-changes-security-game/