<div dir="ltr">Hey all, esteemed members of this Nginx mailing list.<br><div dir="ltr"><div class="gmail_quote"><br><div dir="ltr"><span></span><div><span><div><br></div>I'm
a freelance reporter (former Onion headline writer and former chemical
engineer) trying to gather some kind of technical consensus on a part of
the Silk Road pretrial that seems to
have become mired in needless ambiguity. Specifically, the prosecution's
explanation for how they were able to locate the Silk Road's Icelandic
server IP address.<br><div><br></div></span><div>You may have seen Australian hacker Nik Cubrilovic's <a href="https://www.nikcub.com/posts/analyzing-fbi-explanation-silk-road/" target="_blank">long piece</a>
on how it, at least, appears that the government has submitted a deeply
implausible scenario for how they came to locate the Silk Road server. Or <a href="https://www.schneier.com/blog/archives/2014/10/how_did_the_fed.html" target="_blank">Bruce Scheiener's comments</a>. Or someone else's.
(The court records are hyperlinked in the article, but they can be found
<a href="http://www.scribd.com/doc/238796613/Silk-Road-Prosecution-4th-Amendment-Rebuttall" target="_blank">here</a> and <a href="http://ia700603.us.archive.org/21/items/gov.uscourts.nysd.422824/gov.uscourts.nysd.422824.57.0.pdf" target="_blank">here</a>, if you'd rather peruse them without Nik's logic prejudicing your own opinion. In addition, <a href="http://cdn.arstechnica.net/wp-content/uploads/2014/10/horowitzdec.pdf" target="_blank">here</a>'s
the opinion of defendant Ross Ulbricht's lawyer Josh Horowitz, himself a
technical expert in this field, wherein he echoes Nik Cubrilovic's
critical interpretation of the state's discovery disclosures.)<div><div><img src="https://ssl.gstatic.com/ui/v1/icons/mail/images/cleardot.gif"><span><br>I'm
hoping that your collective area of expertise in Nginx might allow some of you to comment on this
portion of the case, ideally on the record, for an article I'm working
on.<br><div><br></div><div>My goal is to amass many expert
opinions on this. It seems like a very open and shut case that beat
reporters covering it last October gave a little too much "He said. She
said."-style false equivalency. <br></div><span><div><br></div>I know this is a cold call. PLEASED TO MEET YOU! <br><br></span></span></div></div></div></div><span><div><b>Here, below, is the main question, I believe:</b><br></div><div><br></div></span><span><div>This portion of <a href="http://cdn.arstechnica.net/wp-content/uploads/2014/10/horowitzdec.pdf" target="_blank">the defense's expert criticism</a> of <a href="http://ia700603.us.archive.org/21/items/gov.uscourts.nysd.422824/gov.uscourts.nysd.422824.57.0.pdf" target="_blank">the prosecution's testimony from former SA Chris Tarbell</a> (at least) appears the most clear cut and definitive:<br></div><div><br><div style="margin-left:40px"><span style="color:rgb(255,0,0)">¶
7. Without identification by the Government, it was impossible to
pinpoint the 19 lines in the access logs showing the date and time of
law enforcement access to the .49 server.<br><br>23. The “live-ssl”
configuration controls access to the market data contained on the .49
server. This is evident from the configuration line:<br> <span style="background-color:rgb(241,194,50)">root /var/www/market/public</span><br>which tells the Nginx web server that the folder “public” contains the website content to load when visitors access the site.<br><br>24. The critical configuration lines from the live-ssl file are:<br><span style="background-color:rgb(241,194,50)"> allow 127.0.0.1;<br> allow 62.75.246.20;<br> deny all;</span><br>These
lines tell the web server to allow access from IP addresses 127.0.0.1
and 65.75.246.20, and to deny all other IP addresses from connecting to
the web server. IP address 127.0.0.1 is commonly referred to in computer
networking as “localhost” i.e., the machine itself, which would allow
the server to connect to itself. 65.75.246.20, as discussed ante, is the
IP address for the front-end server, which must be permitted to access
the back-end server. The “deny all” line tells the web server to deny
connections from any IP address for which there is no specific exception
provided.<br><br>25. Based on this configuration, it would have been
impossible for Special Agent Tarbell to access the portion of the .49
server containing the Silk Road market data, including a portion of the
login page, simply by entering the IP address of the server in his
browser. <br></span></div><br></div><div>Does it seem like the defense
is making a reasonably sound argument here? Are there any glaring holes
in their reasoning to you? Etc.? (I would gladly rather have an answer
to this that is filled with qualifiers and hedges than no answer at all,
and as such, hereby promise that I will felicitously include all those
qualifiers and hedges when quoting.)<br></div><div><br></div><div>Any other observations on this pre-trail debate would also be welcome. <br></div><div><br><div>Thanks for your time, very, very, sincerely.<br></div><div><br>Best Regards,<br>Matthew<span class="HOEnZb"><font color="#888888"><br>--</font></span></div></div></span><span class="HOEnZb"><font color="#888888"><div><div><div dir="ltr"><div><div><div><div><div><span style="color:rgb(102,102,102)"><b>Matthew D. Phelan<br></b></span></div><div><span style="color:rgb(153,153,153)"><span style="color:rgb(102,102,102)">"editorial contractor"</span><br></span></div><b><a href="http://blackbag.gawker.com" target="_blank">Black Bag <span>▴</span> Gawker</a><br></b><br></div><span style="color:rgb(102,102,102)"><a href="https://twitter.com/CBMDP" target="_blank">@CBMDP</a> // twitter<br></span><div><div><div><span style="color:rgb(102,102,102)"><a href="tel:917.859.1266" value="+19178591266" target="_blank">917.859.1266</a> // cellular telephone <br></span></div></div></div></div><span style="color:rgb(102,102,102)"><a href="mailto:matthew.phelan@gawker.com" target="_blank">matthew.phelan@gawker.com</a> // </span><span style="color:rgb(102,102,102)"><a href="http://pgp.mit.edu/pks/lookup?op=get&search=0x11E842642C4B4E99" target="_blank">PGP Public Key</a> // email<br></span></div> </div></div></div></div>
</font></span></div></div></div></div>