Re: ietf.org unaccessible for Tor users

Alec Muffett <alecm@fb.com> Tue, 15 March 2016 18:07 UTC

Return-Path: <prvs=2882ba8273=alecm@fb.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B073912DCBC for <ietf@ietfa.amsl.com>; Tue, 15 Mar 2016 11:07:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level:
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fb.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7fMphXid2K4h for <ietf@ietfa.amsl.com>; Tue, 15 Mar 2016 11:07:39 -0700 (PDT)
Received: from mx0b-00082601.pphosted.com (mx0b-00082601.pphosted.com [67.231.153.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8A2212D676 for <ietf@ietf.org>; Tue, 15 Mar 2016 11:07:39 -0700 (PDT)
Received: from pps.filterd (m0089730.ppops.net [127.0.0.1]) by m0089730.ppops.net (8.16.0.11/8.16.0.11) with SMTP id u2FI6Pkt021615; Tue, 15 Mar 2016 11:07:36 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=fb.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=facebook; bh=FkrkS1Otj5Y/ZJqR7Fh+DXQsJ9QD12Rto9L33ifvn5g=; b=DvGQSkKLbyoege3hzQiuEpEQlG0yzSoTMPPHZBNlK07X/eZ5b6IywQYZND2rD4Wja/Pg lwciVHk50g0TAAapnTuCTZcu5P/a//twnq6bNcv1aKu29PcRxfr32PpToek8bllu9F/R ouhaIigVGPSNLo3xEJQYPIq2PZVp57vu/vY=
Received: from mail.thefacebook.com ([199.201.64.23]) by m0089730.ppops.net with ESMTP id 21pnq70myh-1 (version=TLSv1 cipher=AES128-SHA bits=128 verify=NOT); Tue, 15 Mar 2016 11:07:36 -0700
Received: from PRN-CHUB20.TheFacebook.com (192.168.16.74) by PRN-CHUB15.TheFacebook.com (192.168.16.65) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 15 Mar 2016 11:07:34 -0700
Received: from PRN-MBX02-4.TheFacebook.com ([169.254.2.215]) by PRN-CHUB20.TheFacebook.com ([fe80::3c2d:726b:17c6:f21c%13]) with mapi id 14.03.0248.002; Tue, 15 Mar 2016 11:07:33 -0700
From: Alec Muffett <alecm@fb.com>
To: Michel Py <michel@arneill-py.sacramento.ca.us>
Subject: Re: ietf.org unaccessible for Tor users
Thread-Topic: ietf.org unaccessible for Tor users
Thread-Index: AQHRfgLB+RUL/0piL0GFmq6KqbJrIZ9aCzuAgAAQnACAAD6HgIAAgtEAgABK1wCAAAyegIAADGWAgAADX4A=
Date: Tue, 15 Mar 2016 18:07:33 +0000
Message-ID: <80CF9C52-D43F-43AD-97CA-35FDB5451E66@fb.com>
References: <m2a8m0y72q.wl%randy@psg.com> <20160315002604.15726.qmail@ary.lan> <CACRMD1Gp_3xjanC+YXLrwo9FMcDay1JQ6YPtAS1tTqk+C_AUVg@mail.gmail.com> <alpine.OSX.2.11.1603150755160.47203@ary.lan> <F04ED1585899D842B482E7ADCA581B845754B682@newserver.arneill-py.local> <84804F38-6F04-4EFE-A735-81EB5AE0B35C@mnt.se> <F04ED1585899D842B482E7ADCA581B845754B70B@newserver.arneill-py.local>
In-Reply-To: <F04ED1585899D842B482E7ADCA581B845754B70B@newserver.arneill-py.local>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [192.168.52.123]
Content-Type: multipart/signed; boundary="Apple-Mail=_289DA958-64F1-413B-8860-59B9222CA26C"; protocol="application/pgp-signature"; micalg="pgp-sha512"
MIME-Version: 1.0
X-Proofpoint-Spam-Reason: safe
X-FB-Internal: Safe
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2016-03-15_06:, , signatures=0
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/UwxqTL0KK3axQK2GvO1_BYfJTfw>
Cc: John R Levine <johnl@taugh.com>, IETF <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Mar 2016 18:07:41 -0000

> On Mar 15, 2016, at 17:55, Michel Py <michel@arneill-py.sacramento.ca.us> wrote:
> 
> That is true to the extent that I counted myself several times and the last time I counted (this year) out of the known 1827 Tor exit nodes, 896 were marked as having "malicious" activities; it goes over the half mark on a regular basis. This data is not public (yet) but it will be soon, it's not based on Cloudflare data. I'm not the only one who has observed it either; there are reasons why both attack mitigation solution providers and end-networks filter and/or block Tor.

So, what percentage of the volume/outflow from those same proxies was "non-malicious"?

Surely you're making the mistake of categorizing the neighborhood, when you should be categorizing the people?

By comparison: what percentage of the world's SMTP is spam? What percentage of the world's HTTP is filesharing?

If you're not looking at the whole picture, you are making a "one bad apple" mistake - amplified, because Tor rotates their occasional bad apples around exit nodes just like everyone else.

    -a