From eugen at leitl.org Mon Jan 2 12:36:11 2006
From: eugen at leitl.org (Eugen Leitl)
Date: Mon, 2 Jan 2006 13:36:11 +0100
Subject: benchmarking a node
Message-ID: <20060102123610.GK2235@leitl.org>
I would like to benchmark my node, to see whether the hoster
who sold me a 10 MBit/s flat rodent is defaulting on contract.
The stats on
http://www.noreply.org/tor-running-routers/current.html#3BB0DC6EA321256DDD1155197DBD3F1E48623549
do not seem to be very reliable.
How do I benchmark a node?
Another question: as Tor alpha seems to crash regularly,
will the keys/torrc be wiped if I do apt-get remove tor,
to downgrade to the stable branch?
--
Eugen* Leitl leitl http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From arma at mit.edu Tue Jan 3 09:40:27 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 3 Jan 2006 04:40:27 -0500
Subject: benchmarking a node
In-Reply-To: <20060102171301.GP2235@leitl.org>
References: <20060102123610.GK2235@leitl.org> <20060102151341.GO20671@eecs.harvard.edu> <20060102171301.GP2235@leitl.org>
Message-ID: <20060103094027.GB15157@localhost.localdomain>
On Mon, Jan 02, 2006 at 06:13:01PM +0100, Eugen Leitl wrote:
> Jan 02 18:11:26.745 [notice] Tor v0.1.0.15. This is experimental software. Do not rely on it for strong anonymity.
> Jan 02 18:11:26.746 [warn] config_assign_line(): Unknown option 'SocksListenAddress'. Failing.
> Jan 02 18:11:26.746 [err] tor_init(): Reading config failed--see warnings above. For usage, try -h.
The new 0.1.0.16, just released, handles this.
(We'll announce it more widely in a day or so -- on the or-announce
list, which all of you should be on -- once more packages are built.)
Thanks,
--Roger
From eugen at leitl.org Fri Jan 27 09:51:12 2006
From: eugen at leitl.org (Eugen Leitl)
Date: Fri, 27 Jan 2006 10:51:12 +0100
Subject: [declan@well.com: [Politech] In China, Google censors more than just politics: beer, dating, joke, gay sites too [fs]]
Message-ID: <20060127095112.GE2301@leitl.org>
----- Forwarded message from Declan McCullagh -----
From: Declan McCullagh
Date: Thu, 26 Jan 2006 14:25:45 -0800
To: politech at politechbot.com
Subject: [Politech] In China, Google censors more than just politics: beer,
dating, joke, gay sites too [fs]
User-Agent: Mozilla Thunderbird 1.0.6 (Macintosh/20050716)
http://news.com.com/What+Google+censors+in+China/2100-1030_3-6031727.html
What Google censors in China
January 26, 2006, 1:27 PM PST
Google's new China search engine not only censors many Web sites that
question the Chinese government, but it goes further than similar
services from Microsoft and Yahoo by targeting teen pregnancy,
homosexuality, dating, beer and jokes.
In addition, CNET News.com has found that contrary to Google founder
Sergey Brin's promise to inform users when their search results are
censored, the company frequently filters out sites without revealing it.
[...remainder snipped...]
--------
This chart is better seen on the Web page (URL above) because it'll be
poorly-formatted in email, but FYI...
Site / Category / Google.cn / Yahoo China/ MSN China
----------------------------------------------------
bacardi.com Alcohol Deleted OK OK
badpuppy.com Gay Deleted Deleted (1) OK
bignews.org News Deleted Deleted Deleted
beerlabels.com Alcohol Deleted OK OK
bombaysapphire.com Alcohol Deleted OK OK
budweiser.com Alcohol Deleted (5) OK OK
catholiclesbians.org Religious Deleted OK OK
chinesenewsweek.com News Deleted OK Deleted
collegehumor.com Humor Deleted OK OK
date.com Dating Deleted OK OK
ebaumsworld.com Humor Deleted OK OK
falunasia.info Advocacy Deleted OK Deleted
faluncanada.net Advocacy Deleted OK Deleted
funnyjokes.com Humor Deleted OK OK
gaycenter.org Gay Deleted OK OK
gaycrawler.com Gay Deleted OK OK
gaytimes.co.uk Gay OK Deleted OK
gio.gov.tw Government OK Deleted Deleted
guinness.com Alcohol Deleted OK OK
hightimes.com Drug use Deleted (6) OK OK
hrw.org Advocacy Deleted OK Deleted
jackdaniels.com Alcohol Deleted OK OK
jokesgallery.com Humor OK Deleted (1) OK
lesbian.com Gay Deleted OK OK
libertytimes.com.tw News Deleted OK OK
lingerie.com Sex Deleted OK OK
mm52.com Entertainment Deleted OK OK
netfirms.com Web hosting Deleted OK OK
network54.com Community Deleted OK Deleted
neworder.box.sk Security Deleted OK OK
news.bbc.co.uk News Deleted Deleted Deleted
omnitalk.com Community Deleted OK Deleted
penthouse.com Sex Deleted Deleted (1) Deleted
playboy.com Sex Deleted Deleted (1) OK
pressfreedom.com Advocacy Deleted OK Deleted
queernet.org Gay Deleted OK OK
resist.com Racist Deleted OK OK
rsf.org Advocacy OK Deleted (2) Deleted
savetibet.org Advocacy Deleted OK Deleted
search.msn.com Search Deleted OK OK
seas.upenn.edu Academic Deleted (5) OK Deleted
sonicnet.com Music (VH1) Deleted OK OK
sxetc.org Sex ed. Deleted OK Deleted (3)
teenpregnancy.org Sex ed. Deleted OK OK
theagitator.com Blog OK Deleted OK
thisisessex.co.uk Local Deleted OK OK
time.com News OK Deleted OK
voa.gov Government Deleted (1) Deleted Deleted
_______________________________________________
Politech mailing list
Archived at http://www.politechbot.com/
Moderated by Declan McCullagh (http://www.mccullagh.org/)
----- End forwarded message -----
--
Eugen* Leitl leitl http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From xsteadfastx at gmail.com Fri Jan 27 15:17:24 2006
From: xsteadfastx at gmail.com (Marvin Preuss)
Date: Fri, 27 Jan 2006 16:17:24 +0100
Subject: Question about the DirServer
Message-ID: <43DA3984.2020308@gmail.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
im new here so first a big Hi to everyone :)
Since two days i run a little tor server now and i just have some
question about the DirServer. What is when a Server dont exist no more?
is there a time out when the server gets deleted from the list? or they
just always stay in the list and just get marked as offline? thanks
already :)
Marvin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFD2jmEChE8w47F3oMRAuOvAJ9U11Mub7iarS5o1cWRIqLgLXC0pwCfYVUa
fZkuyYHZKAx653VJXHUEddM=
=IUIa
-----END PGP SIGNATURE-----
From arma at mit.edu Sat Jan 28 00:09:25 2006
From: arma at mit.edu (Roger Dingledine)
Date: Fri, 27 Jan 2006 19:09:25 -0500
Subject: (FWD) quick question on exit policy...
Message-ID: <20060128000925.GY7649@localhost.localdomain>
[Forwarding because Joe is not subscribed as this address.
The answer is yes, this will work fine, but the way you say
it is 128.32.0.0/255.255.0.0:* or 128.32.0.0/16:*
-RD]
----- Forwarded message from owner-or-talk at freehaven.net -----
Date: Fri, 27 Jan 2006 15:57:03 -0800
From: Joseph Lorenzo Hall
Reply-To: joehall at pobox.com
To: or-talk at seul.org
Subject: quick question on exit policy...
Hi,
In order to get a TOR server up and running on the Berkeley campus,
I'd like to know if it's possible to specify an exit policy that
effectively said, "don't allow any exit connections that would connect
to the UC Berkeley network." Would this be sufficient:
reject 128.32.*.*:*
To, say, block all exits to any ports to IPs in the range
128.32.0.0-128.32.255.255?
best, Joe
--
Joseph Lorenzo Hall
----- End forwarded message -----
From joehall at gmail.com Sat Jan 28 00:19:38 2006
From: joehall at gmail.com (Joseph Lorenzo Hall)
Date: Fri, 27 Jan 2006 16:19:38 -0800
Subject: (FWD) quick question on exit policy...
In-Reply-To: <20060128000925.GY7649@localhost.localdomain>
References: <20060128000925.GY7649@localhost.localdomain>
Message-ID: <928946aa0601271619h2c36dac9v6288c556029744be@mail.gmail.com>
On 1/27/06, Roger Dingledine wrote:
> [Forwarding because Joe is not subscribed as this address.
>
> The answer is yes, this will work fine, but the way you say
> it is 128.32.0.0/255.255.0.0:* or 128.32.0.0/16:*
> -RD]
Thanks and thanks again, Roger. Hopefully I can convince them that I
can write a set of exit policies that ensure no exit traffic to
Berkeley IP addresses... it would be too bad (and not nearly as useful
from a research/educational point of view) if we ended up with a
middleman node. best, Joe
> ----- Forwarded message from owner-or-talk at freehaven.net -----
>
> Date: Fri, 27 Jan 2006 15:57:03 -0800
> From: Joseph Lorenzo Hall
> Reply-To: joehall at pobox.com
> To: or-talk at seul.org
> Subject: quick question on exit policy...
>
> Hi,
>
> In order to get a TOR server up and running on the Berkeley campus,
> I'd like to know if it's possible to specify an exit policy that
> effectively said, "don't allow any exit connections that would connect
> to the UC Berkeley network." Would this be sufficient:
>
> reject 128.32.*.*:*
>
> To, say, block all exits to any ports to IPs in the range
> 128.32.0.0-128.32.255.255?
>
> best, Joe
>
> --
> Joseph Lorenzo Hall
>
>
>
> ----- End forwarded message -----
>
>
--
Joseph Lorenzo Hall
PhD Student
UC Berkeley, School of Information (SIMS)
blog:
This email is written in [markdown] - an easily-readable and parseable
text format.
[markdown]: http://daringfireball.net/projects/markdown/
From firefox-gen at walala.org Sat Jan 28 01:16:35 2006
From: firefox-gen at walala.org (ADB)
Date: Fri, 27 Jan 2006 17:16:35 -0800
Subject: Tor & SELinux/SuSE 10 (also AppArmor question)
In-Reply-To: <20060128000925.GY7649@localhost.localdomain>
References: <20060128000925.GY7649@localhost.localdomain>
Message-ID: <43DAC5F3.2020709@walala.org>
I have SuSE Linux 10, and the latest alpha of Tor. Due to SELinux, I
can't run tor as anything but root and have it work correctly. This
prompts me to ask the following two related questions:
1. How should I correctly configure SELinux on SuSE to be secure *and*
have tor have enough privelages to correctly download all the required
dir info, and
2. How can SELinux and/or Novell AppArmor be used to effectively lock
down and secure Tor and other potentially dangerous network programs?
Thanks,
Andrew
From firefox-gen at walala.org Sat Jan 28 01:34:31 2006
From: firefox-gen at walala.org (ADB)
Date: Fri, 27 Jan 2006 17:34:31 -0800
Subject: FW: EFFector 19.04: Action Alert - Stop Congress from Mandating Secret
Technology!]
Message-ID: <43DACA27.4060601@walala.org>
Many of you doubtlessly already get this mailing, but several probably
don't as well, so here it is.
~Andrew
-------------- next part --------------
An embedded message was scrubbed...
From: "wayne"
Subject: [sdlibchat] FW: EFFector 19.04: Action Alert - Stop Congress from
Mandating Secret Technology!
Date: Fri, 27 Jan 2006 17:19:24 -0800
Size: 19267
URL:
From phobos at rootme.org Sat Jan 28 02:08:56 2006
From: phobos at rootme.org (phobos at rootme.org)
Date: Fri, 27 Jan 2006 21:08:56 -0500
Subject: Tor & SELinux/SuSE 10 (also AppArmor question)
In-Reply-To: <43DAC5F3.2020709@walala.org>
References: <20060128000925.GY7649@localhost.localdomain> <43DAC5F3.2020709@walala.org>
Message-ID: <20060128020856.GA14058@deimos>
On Fri, Jan 27, 2006 at 05:16:35PM -0800, firefox-gen at walala.org wrote 0.5K bytes in 14 lines about:
: I have SuSE Linux 10, and the latest alpha of Tor. Due to SELinux, I
: can't run tor as anything but root and have it work correctly. This
: prompts me to ask the following two related questions:
:
: 1. How should I correctly configure SELinux on SuSE to be secure *and*
: have tor have enough privelages to correctly download all the required
: dir info, and
: 2. How can SELinux and/or Novell AppArmor be used to effectively lock
: down and secure Tor and other potentially dangerous network programs?
Two ways to do this:
1) check out step four of
http://tor.eff.org/cvs/tor/doc/tor-doc-unix.html
2) profile it and come up with a better policy than I did. :)
--
Andrew
From joehall at gmail.com Sat Jan 28 02:37:15 2006
From: joehall at gmail.com (Joseph Lorenzo Hall)
Date: Fri, 27 Jan 2006 18:37:15 -0800
Subject: Running a Tor exit node on an academic network?
Message-ID: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
Hi, If anyone out there is running a Tor exit node on an academic
network, could you contact me off-list?
I'm am trying to convince my university, UC Berkeley, to allow a Tor
exit node in our network but am running into significant difficulty
and would like to have a few of you comment over the weekend on a
proposal I wrote. best, Joe
--
Joseph Lorenzo Hall
PhD Student
UC Berkeley, School of Information (SIMS)
blog:
This email is written in [markdown] - an easily-readable and parseable
text format.
[markdown]: http://daringfireball.net/projects/markdown/
From arrakistor at gmail.com Sat Jan 28 03:13:53 2006
From: arrakistor at gmail.com (Arrakistor)
Date: Fri, 27 Jan 2006 21:13:53 -0600
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
Message-ID: <913086632.20060127211353@gmail.com>
I am trying to do the same thing. I would be interested in any help along these lines as well!
ST
Friday, January 27, 2006, 8:37:15 PM, you wrote:
> Hi, If anyone out there is running a Tor exit node on an academic
> network, could you contact me off-list?
> I'm am trying to convince my university, UC Berkeley, to allow a Tor
> exit node in our network but am running into significant difficulty
> and would like to have a few of you comment over the weekend on a
> proposal I wrote. best, Joe
> --
> Joseph Lorenzo Hall
> PhD Student
> UC Berkeley, School of Information (SIMS)
>
> blog:
> This email is written in [markdown] - an easily-readable and parseable
> text format.
> [markdown]: http://daringfireball.net/projects/markdown/
--
Best regards,
Arrakistor mailto:arrakistor at gmail.com
From chris at eff.org Sat Jan 28 03:53:08 2006
From: chris at eff.org (Chris Palmer)
Date: Fri, 27 Jan 2006 19:53:08 -0800
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <913086632.20060127211353@gmail.com>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com> <913086632.20060127211353@gmail.com>
Message-ID: <43DAEAA4.3090205@eff.org>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Arrakistor wrote:
> I am trying to do the same thing. I would be interested in any help along these lines as well!
Yes, maybe it's a conversation best had on-list rather than off-.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (Darwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFD2uqjsobNj2jkCc0RAsvdAKCCxh/a2chgeLJJ8n4jbEcRZTtZMQCg3bUw
fwKAYmOgMAczuxzQusKiGxw=
=TiNd
-----END PGP SIGNATURE-----
From arma at mit.edu Tue Jan 3 11:30:14 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 3 Jan 2006 06:30:14 -0500
Subject: benchmarking a node
In-Reply-To: <20060102123610.GK2235@leitl.org>
References: <20060102123610.GK2235@leitl.org>
Message-ID: <20060103113013.GC15157@localhost.localdomain>
On Mon, Jan 02, 2006 at 01:36:11PM +0100, Eugen Leitl wrote:
> I would like to benchmark my node, to see whether the hoster
> who sold me a 10 MBit/s flat rodent is defaulting on contract.
>
> How do I benchmark a node?
To get an idea of what your node is doing right now, you could look at
http://serifos.eecs.harvard.edu:8000/cgi-bin/exit.pl?sortbw=1&addr=1
which shows redgene with a max self-measured burst of 847kB/s, and an
average of 337 kB/s in and 339 kB/s out.
You can get the data itself from your descriptor:
http://serifos.eecs.harvard.edu:8000/cgi-bin/desc.pl?q=redgene and look
at the write-history and read-history (which are in 15 minute summaries,
oldest to most recent).
To push up these numbers, you need to start sending traffic through it.
One way is to listen on ports like 80 and 443 to attract more users
behind firewalls, and to open up your exit policy more to attract more
users in general. Another way is to run a Tor client on a link that's
faster than your server's, and start transferring a lot of data through
it, e.g. by specifying it as your entrynode. Do several in parallel if
you need to. If you want to get more precise, use a Tor controller like
Blossom to craft a path that uses only your node; and/or run your own
whole Tor network on the server (see FAQ entry).
> Another question: as Tor alpha seems to crash regularly,
If anybody can give us a useful backtrace from the crashes in Tor cvs,
that would be wonderful. There's a crash bug that happens for fast
servers and so far we have been unable to track it down.
--Roger
From numE at onionizer.de Sat Jan 28 10:29:46 2006
From: numE at onionizer.de (numE)
Date: Sat, 28 Jan 2006 11:29:46 +0100
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <43DAEAA4.3090205@eff.org>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com> <913086632.20060127211353@gmail.com> <43DAEAA4.3090205@eff.org>
Message-ID: <43DB479A.1030609@onionizer.de>
full ack.
would be interested, too :-)
Chris Palmer schrieb:
> Arrakistor wrote:
>
> >> I am trying to do the same thing. I would be interested in any help
> along these lines as well!
>
> Yes, maybe it's a conversation best had on-list rather than off-.
From eugen at leitl.org Sat Jan 28 10:46:34 2006
From: eugen at leitl.org (Eugen Leitl)
Date: Sat, 28 Jan 2006 11:46:34 +0100
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <43DB479A.1030609@onionizer.de>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com> <913086632.20060127211353@gmail.com> <43DAEAA4.3090205@eff.org> <43DB479A.1030609@onionizer.de>
Message-ID: <20060128104634.GY2301@leitl.org>
On Sat, Jan 28, 2006 at 11:29:46AM +0100, numE wrote:
> full ack.
> would be interested, too :-)
How would deal with an occasional DDoS? These happen
each every few months. Not that large a problem if
you're behind reasonably good iron and have good
administration.
But the admins are going to notice, and they're not
going to like it.
> Chris Palmer schrieb:
> > Arrakistor wrote:
> >
> > >> I am trying to do the same thing. I would be interested in any help
> > along these lines as well!
> >
> > Yes, maybe it's a conversation best had on-list rather than off-.
>
--
Eugen* Leitl leitl http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From huber at paradoxical.net Sat Jan 28 14:45:32 2006
From: huber at paradoxical.net (Josh)
Date: Sat, 28 Jan 2006 09:45:32 -0500
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
(Joseph Lorenzo Hall's message of "Fri, 27 Jan 2006 18:37:15 -0800")
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
Message-ID: <87lkx0pg1f.fsf@callisto.paradoxical.net>
Joseph Lorenzo Hall writes:
> Hi, If anyone out there is running a Tor exit node on an
> academic network, could you contact me off-list?
Well, I'm not, but if you look at the network status page, you'll
see that there are quite a few nodes running on academic
networks. In fact, many of the top throughput nodes are in
.edu-land.
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl lists 24 .edu
domains, of which there are 9 live exit nodes:
bolanda pingwin.icm.edu.pl
cherubim sledgehammer.mit.edu
err err.cylab.cmu.edu
gnunet tripwire.cs.ucla.edu
golem golem.ph.utexas.edu
riceu sysrack07.cs.rice.edu
rodos rodos.eecs.harvard.edu
serifos serifos.eecs.harvard.edu
sipbtor1 alice-whacker.mit.edu
If you look at the by-bandwidth listings, there are many academic
nodes near the top of the list:
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl?sortbw=1
Perhaps you could use some of the contact information for one of
those nodes to find assistance?
Josh
From joehall at gmail.com Sat Jan 28 18:34:55 2006
From: joehall at gmail.com (Joseph Lorenzo Hall)
Date: Sat, 28 Jan 2006 10:34:55 -0800
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <43DAEAA4.3090205@eff.org>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
<913086632.20060127211353@gmail.com> <43DAEAA4.3090205@eff.org>
Message-ID: <928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
On 1/27/06, Chris Palmer wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Arrakistor wrote:
>
> > I am trying to do the same thing. I would be interested in any help along these lines as well!
>
> Yes, maybe it's a conversation best had on-list rather than off-.
The main reason I didn't want to send my justification document to the
list is that it might expose my strategy (and any deliberation about
it) to the networking people if they monitor this list. I suppose
that might be the plays-with-lawyers-well side of me.
I could send it if others think it would be helpful (and I guarantee
that I'll write up my struggle next week after they've passed
judgement on my proposal).
I guess I'll just paraphrase the issues and academic stuff:
* They want to make sure that my Tor server is not used to attack
services/computers on the campus network. Proposal: block all exit
traffic to campus IP addresses.
* The Library has electronic subscriptions to certain services that
are based on IP addresses only. Proposal: block exit connections to
those IP addresses given a list or build a list as needed. The
eventual list could be thousands of IP addresses long which would have
a undetermined impact on Tor's performance.
* They're not confident that Tor will obey its exit policies.
Proposal: include kernel-level software firewall and possibly a
hardware-based firewall device on the Tor box.
* They're concerned about bandwidth (although this one is not a
biggie). Proposal: limit to 5% of my departments bandwidth (5MBit/s)
and then explore burst settings and see how this impacts our
department.
As for academic justification, in addition to Dean, Sysadmin. and
multiple Faculty supporters I've noted that:
* We have a postdoc that works on reputation systems in anonymous routing.
* Journalism and Law students need a way to be able to communicate
with clients/sources and do competitive analyses in a private, secure
fashion.[1]
* Faculty need to be able to do research on student and faculty
candidates without exposing their institutional affiliation.[1]
* Students at our school have expressed interest in using our Tor node
to incorporate onion-routing concepts into client-side privacy
protection tools and research tools (like hidden surveys and such).
* Students in networking, privacy, security and cryptography classes
(such as myself) could tinker with our Tor node and get hands-on
experience with onion-routing, cryptography an anonymity tools.
[1] Neither of these require a Tor node (exit or middleman) on
campus... but I'd like to make a convincing case that we need to be
supporting the network if we're going to be using its services.
I would appreciate any comments on any of this... -Joe
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (Darwin)
> Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
>
> iD8DBQFD2uqjsobNj2jkCc0RAsvdAKCCxh/a2chgeLJJ8n4jbEcRZTtZMQCg3bUw
> fwKAYmOgMAczuxzQusKiGxw=
> =TiNd
> -----END PGP SIGNATURE-----
>
>
--
Joseph Lorenzo Hall
PhD Student
UC Berkeley, School of Information (SIMS)
blog:
This email is written in [markdown] - an easily-readable and parseable
text format.
[markdown]: http://daringfireball.net/projects/markdown/
From mfreed at cs.nyu.edu Sat Jan 28 19:36:16 2006
From: mfreed at cs.nyu.edu (Michael J Freedman)
Date: Sat, 28 Jan 2006 14:36:16 -0500 (EST)
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
<913086632.20060127211353@gmail.com> <43DAEAA4.3090205@eff.org>
<928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
Message-ID:
Hi Joe,
> * The Library has electronic subscriptions to certain services that
> are based on IP addresses only. Proposal: block exit connections to
> those IP addresses given a list or build a list as needed. The
> eventual list could be thousands of IP addresses long which would have
> a undetermined impact on Tor's performance.
I run CoralCDN (http://www.coralcdn.org/), although I also used to work
with Roger on the Free Haven Project. We have many of the same issues with
running CoralCDN, which is deployed at ~150 PlanetLab sites, most at
universities. We push out a bit over 2 TB per day in web traffic to > 1
million clients.
Part of our solution for handling some of these issues to to limit
bandwidth consumption, part is to enforce blacklists for websites that
send abuse complaints (although operating at the HTTP layer this is a bit
easier for us), and part is to make sure we add all the appropriate HTTP
headers.
HTTP headers like X-Forwarded-For, Via, and Proxy-Connection all
communicate to the third-party services performing address authentication
(such as the ACM or IEEE digital library) that the communication is from
elsewhere. While you certainly won't be able to / don't want to identify
the correct X-Forwarded-For address, you can at least synthesize some fake
one (perhaps just a 10.x.x.x address). But again, this operates at the
application layer.
> * They're not confident that Tor will obey its exit policies.
> Proposal: include kernel-level software firewall and possibly a
> hardware-based firewall device on the Tor box.
>
> * They're concerned about bandwidth (although this one is not a
> biggie). Proposal: limit to 5% of my departments bandwidth (5MBit/s)
> and then explore burst settings and see how this impacts our
> department.
Our experience is that universities don't care as much about peak
bandwidth as they do about steady-state traffic: 5 Mbit/s at steady state
translates to over 50 GB / day. We've found many universities get
uncomfortable around 15-20 GB / day. In CoralCDN, we employ
application-level bandwidth tracking that allows higher burst rates, but
ensure that steady-state consumption over the long period stays below this
high water mark.
Good luck,
--mike
-----
www.michaelfreedman.org www.coralcdn.org
From adam at homeport.org Sat Jan 28 21:22:26 2006
From: adam at homeport.org (Adam Shostack)
Date: Sat, 28 Jan 2006 16:22:26 -0500
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com> <913086632.20060127211353@gmail.com> <43DAEAA4.3090205@eff.org> <928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
Message-ID: <20060128212226.GB1234@homeport.org>
On Sat, Jan 28, 2006 at 10:34:55AM -0800, Joseph Lorenzo Hall wrote:
| On 1/27/06, Chris Palmer wrote:
| * The Library has electronic subscriptions to certain services that
| are based on IP addresses only. Proposal: block exit connections to
| those IP addresses given a list or build a list as needed. The
| eventual list could be thousands of IP addresses long which would have
| a undetermined impact on Tor's performance.
If you don't mind me asking, are you contractually obligated to do this, or are you
simply being nice?
Adam
From adam at homeport.org Sat Jan 28 21:22:26 2006
From: adam at homeport.org (Adam Shostack)
Date: Sat, 28 Jan 2006 16:22:26 -0500
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com> <913086632.20060127211353@gmail.com> <43DAEAA4.3090205@eff.org> <928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
Message-ID: <20060128212226.GB1234@homeport.org>
On Sat, Jan 28, 2006 at 10:34:55AM -0800, Joseph Lorenzo Hall wrote:
| On 1/27/06, Chris Palmer wrote:
| * The Library has electronic subscriptions to certain services that
| are based on IP addresses only. Proposal: block exit connections to
| those IP addresses given a list or build a list as needed. The
| eventual list could be thousands of IP addresses long which would have
| a undetermined impact on Tor's performance.
If you don't mind me asking, are you contractually obligated to do this, or are you
simply being nice?
Adam
From matt at snark.net Sun Jan 29 00:41:05 2006
From: matt at snark.net (Matt Ghali)
Date: Sat, 28 Jan 2006 16:41:05 -0800 (PST)
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <20060128212226.GB1234@homeport.org>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
<913086632.20060127211353@gmail.com> <43DAEAA4.3090205@eff.org>
<928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
<20060128212226.GB1234@homeport.org>
Message-ID:
On Sat, 28 Jan 2006, Adam Shostack wrote:
> On Sat, Jan 28, 2006 at 10:34:55AM -0800, Joseph Lorenzo Hall wrote:
> | * The Library has electronic subscriptions to certain services that
> | are based on IP addresses only. Proposal: block exit connections to
> | those IP addresses given a list or build a list as needed. The
> | eventual list could be thousands of IP addresses long which would have
> | a undetermined impact on Tor's performance.
>
> If you don't mind me asking, are you contractually obligated to
> do this, or are you simply being nice?
The funny thing is, more than a year ago, it became a violation of
UC policy to use weak authentication methods such as relying on IP
addresses. Like elsewhere in the UC, though, ineptitude and
ignorance are coddled, and so life goes on- until someone walks off
with a laptop containing personal information on thousands of
students and staff..
Suffice it to say that UCB is in the intersection of academic and
state beaurocracies. The effect seems to be multiplicative, instead
of additive.
--matt at snark.net------------------------------------------<
The only thing necessary for the triumph
of evil is for good men to do nothing. - Edmund Burke
From matt at snark.net Sun Jan 29 00:41:05 2006
From: matt at snark.net (Matt Ghali)
Date: Sat, 28 Jan 2006 16:41:05 -0800 (PST)
Subject: Running a Tor exit node on an academic network?
In-Reply-To: <20060128212226.GB1234@homeport.org>
References: <928946aa0601271837y51ba17faied9535531f97a723@mail.gmail.com>
<913086632.20060127211353@gmail.com> <43DAEAA4.3090205@eff.org>
<928946aa0601281034n578bc7efge502b06ef1c272@mail.gmail.com>
<20060128212226.GB1234@homeport.org>
Message-ID:
On Sat, 28 Jan 2006, Adam Shostack wrote:
> On Sat, Jan 28, 2006 at 10:34:55AM -0800, Joseph Lorenzo Hall wrote:
> | * The Library has electronic subscriptions to certain services that
> | are based on IP addresses only. Proposal: block exit connections to
> | those IP addresses given a list or build a list as needed. The
> | eventual list could be thousands of IP addresses long which would have
> | a undetermined impact on Tor's performance.
>
> If you don't mind me asking, are you contractually obligated to
> do this, or are you simply being nice?
The funny thing is, more than a year ago, it became a violation of
UC policy to use weak authentication methods such as relying on IP
addresses. Like elsewhere in the UC, though, ineptitude and
ignorance are coddled, and so life goes on- until someone walks off
with a laptop containing personal information on thousands of
students and staff..
Suffice it to say that UCB is in the intersection of academic and
state beaurocracies. The effect seems to be multiplicative, instead
of additive.
--matt at snark.net------------------------------------------<
The only thing necessary for the triumph
of evil is for good men to do nothing. - Edmund Burke
From circut at youtopia.homelinux.org Mon Jan 30 05:32:02 2006
From: circut at youtopia.homelinux.org (circut at youtopia.homelinux.org)
Date: Mon, 30 Jan 2006 00:32:02 -0500
Subject: Lots of errors in logs (>300mb)
Message-ID: <20060130053202.GA23872@youtopia.homelinux.org>
Hey guys, I'm running tor-0.1.0.16 on linux. I'm running an onion router
on my box, and I'm seeing alot of these errors in my tor.log:
Jan 30 00:25:30.735 [notice] onion_pending_add(): Already have 100
onions queued. Closing.
Jan 30 00:25:30.735 [warn] command_process_create_cell(): Failed to hand
off onionskin. Closing.
These were filling my logs up like crazy, so I just removed those log
lines from the code and recompiled.
Just wanted to know if there was a better facility for limiting those
logs. I can't imagine those log entries being anything serious right?
-circut
From jfranusic at gmail.com Tue Jan 3 18:40:53 2006
From: jfranusic at gmail.com (Joel Franusic)
Date: Tue, 3 Jan 2006 10:40:53 -0800
Subject: OSX - Manual Restart?
In-Reply-To: <43B65C2E.2040501@onionizer.de>
References:
<43B59C3B.6030109@onionizer.de>
<20051231081230.GB11514@totoro.wangafu.net>
<43B65A61.5000603@onionizer.de> <43B65C2E.2040501@onionizer.de>
Message-ID: <4f9bdc4c0601031040t1cbb2e06qe33160e1e4dc8779@mail.gmail.com>
I've seen the behavior that numE describes. However you do not need to
press ctrl-c to get a prompt back. I normally just hit the space bar
to get my prompt back.
On 12/31/05, numE wrote:
> hmm.
>
> obviously tor is running.. even though i had to brake it up with ctrl-c ?!
> the startup script seems to bring it in background on its own....
> perhaps there should be a slight change, so that the user dont has to
> press "ctrl-c"
> on its own to get his prompt back, because he could thing that he broke
> up the process :-)
>
>
> numE schrieb:
> > Hi Nick,
> >
> >
> >> >how may i manually restart tor & privoxy on osx?
> >>
> >> >i tried:
> >> >sudo /Library/StartupItems/Tor/Tor restart
> >>
> >> >this works, but then it is no background process....
> >>
> >>
> >
> > >>>Hm! There may be a bug here. I'll look into it. In the meantime, I'd
> > >>>suggest you do a separate "start" and "stop" step.
> >
> >
> >
> > srv-01:~ admin$ sudo /Library/StartupItems/Tor/Tor start
> > Starting Tor Service
> > srv-01:~ admin$ Dec 31 10:12:39.757 [notice] Tor v0.1.1.10-alpha. This
> > is experimental software. Do not rely on it for strong anonymity.
> > Dec 31 10:12:39.784 [notice] Initialized libevent version 1.1a using
> > method poll. Good.
> > Dec 31 10:12:39.785 [notice] connection_create_listener(): Opening Socks
> > listener on 127.0.0.1:9050
> > ---
> > CTRL-C
> > ---
> > srv-01:~ admin$
> >
> >
> > same problem :-)
> > process does not go into background.
> >
> > greetings,
> >
> > numE
> >
> > p.s. Wishing you all the best in 2006!
> >
>
>
From xsteadfastx at gmail.com Mon Jan 30 14:55:11 2006
From: xsteadfastx at gmail.com (Marvin Preuss)
Date: Mon, 30 Jan 2006 15:55:11 +0100
Subject: Question about HiddenServices and...
Message-ID: <43DE28CF.3080406@gmail.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
...Server configuration :) Hi,
so i have two questions. the first one is about hidden services. when i
set up a hidden service can it point to a other url except localhost? i
just saw the example with google but im still not sure about it. so i
need to have my webserver running somewhere and i need to have tor
running somewhere. on which port the tor needs to listen to that things
are working? 9050 from outside? cause i would have it running behind nat.
and the other question is about BandwidthBurst for my tor server. i dont
understand it exactly what this is doing. i would be really helpful for
every help :)
best wishes
marvin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFD3ijPChE8w47F3oMRAoaZAJ9mKciZKVfkpxs+h0vrL6F/ejJ5tgCcCwIs
DryZT2HEYANIymJKTykxJgY=
=5GMt
-----END PGP SIGNATURE-----
From numE at onionizer.de Mon Jan 30 19:44:02 2006
From: numE at onionizer.de (numE)
Date: Mon, 30 Jan 2006 20:44:02 +0100
Subject: whats up with tor?!
In-Reply-To: <43DE28CF.3080406@gmail.com>
References: <43DE28CF.3080406@gmail.com>
Message-ID: <43DE6C82.4020906@onionizer.de>
I know. most times tor is slow - thats no problem.
sometimes i have to restart it - then it works again,
but currently i always get privoxy 403 and 503 errors.
according to weasels list a lot of exitnodes are down...
whats up?
From arma at mit.edu Mon Jan 30 19:56:29 2006
From: arma at mit.edu (Roger Dingledine)
Date: Mon, 30 Jan 2006 14:56:29 -0500
Subject: whats up with tor?!
In-Reply-To: <43DE6C82.4020906@onionizer.de>
References: <43DE28CF.3080406@gmail.com> <43DE6C82.4020906@onionizer.de>
Message-ID: <20060130195629.GN15157@localhost.localdomain>
On Mon, Jan 30, 2006 at 08:44:02PM +0100, numE wrote:
> I know. most times tor is slow - thats no problem.
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#WhySlow
> sometimes i have to restart it - then it works again,
> but currently i always get privoxy 403 and 503 errors.
Try upgrading to 0.1.0.16 or later. Or try going to websites
that exist. :)
> according to weasels list a lot of exitnodes are down...
Really? They seem up to me.
http://www.noreply.org/tor-running-routers/
--Roger
From firefox-gen at walala.org Mon Jan 30 19:55:46 2006
From: firefox-gen at walala.org (ADB)
Date: Mon, 30 Jan 2006 11:55:46 -0800
Subject: whats up with tor?!
In-Reply-To: <43DE6C82.4020906@onionizer.de>
References: <43DE28CF.3080406@gmail.com> <43DE6C82.4020906@onionizer.de>
Message-ID: <43DE6F42.7010808@walala.org>
Is it when you're connecting to a hidden service via rendezvous? If so,
this has been happening to me too lately but it was never a problem
before. It happens during periods of high traffic mostly.
~A
numE wrote:
> I know. most times tor is slow - thats no problem.
> sometimes i have to restart it - then it works again,
> but currently i always get privoxy 403 and 503 errors.
>
> according to weasels list a lot of exitnodes are down...
>
> whats up?
>
>
>
>
>
From numE at onionizer.de Mon Jan 30 21:53:06 2006
From: numE at onionizer.de (numE)
Date: Mon, 30 Jan 2006 22:53:06 +0100
Subject: whats up with tor?!
In-Reply-To: <20060130195629.GN15157@localhost.localdomain>
References: <43DE28CF.3080406@gmail.com> <43DE6C82.4020906@onionizer.de> <20060130195629.GN15157@localhost.localdomain>
Message-ID: <43DE8AC2.2000506@onionizer.de>
Roger Dingledine schrieb:
> On Mon, Jan 30, 2006 at 08:44:02PM +0100, numE wrote:
>
>> I know. most times tor is slow - thats no problem.
>>
>
> http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#WhySlow
>
i said - i know that it is slow - and why it is slow :-)
i am running a >300gb/month tor server myself.
>
>> sometimes i have to restart it - then it works again,
>> but currently i always get privoxy 403 and 503 errors.
>>
>
> Try upgrading to 0.1.0.16 or later. Or try going to websites
> that exist. :)
>
i am using the latest alpha :-)
and regulary visiting the same site :-)
>
>> according to weasels list a lot of exitnodes are down...
>>
>
> Really? They seem up to me.
> http://www.noreply.org/tor-running-routers/
>
> --Roger
>
i mean the weasel list of exitnodes.
there are many hibbernating and unreachable nodes....
From peter at palfrader.org Mon Jan 30 23:10:31 2006
From: peter at palfrader.org (Peter Palfrader)
Date: Tue, 31 Jan 2006 00:10:31 +0100
Subject: whats up with tor?!
In-Reply-To: <43DE8AC2.2000506@onionizer.de>
References: <43DE28CF.3080406@gmail.com> <43DE6C82.4020906@onionizer.de> <20060130195629.GN15157@localhost.localdomain> <43DE8AC2.2000506@onionizer.de>
Message-ID: <20060130231031.GM9997@asteria.noreply.org>
On Mon, 30 Jan 2006, numE wrote:
> > Really? They seem up to me.
> > http://www.noreply.org/tor-running-routers/
>
> i mean the weasel list of exitnodes.
> there are many hibbernating and unreachable nodes....
Um, which weasel list of exitnodes then?
Regards,
weasel
From nickm at freehaven.net Tue Jan 31 05:55:18 2006
From: nickm at freehaven.net (Nick Mathewson)
Date: Tue, 31 Jan 2006 00:55:18 -0500
Subject: Tor talk in Boston this Thursday (MIT, Room 4-237, 7:30 pm)
Message-ID: <20060131055518.GJ6463@totoro.wangafu.net>
Hi! I'm giving a tor-related talk this Thursday at MIT. It's open to
the public. You should come if you're in the neighborhood.
============================================================
Anonymous Communications for Crypto Geeks, the U.S. Department of
Defense, and You
Nick Mathewson and Roger Dingledine
First half: Introduction to the theory and designs that make anonymity
networks work, and a discussion of the technical choices from the
earliest designs of the 1980s to today. Second half: Experiences
deploying anonymity, including backing, adoption, law enforcement
issues, abuse, anti-abuse measures, usability, co-existing with other
systems, censorious governments, and creating incentives for people to
help privacy.
Thu Feb 2, 07:30-09:30pm, 4-237
http://stuff.mit.edu/iap/
Contact: Sherri Davidoff, W20-557, x3-7788, sipb-iap-lectures at mit.edu
============================================================
--
Nick Mathewson
From xsteadfastx at gmail.com Tue Jan 31 06:25:37 2006
From: xsteadfastx at gmail.com (Marvin Preuss)
Date: Tue, 31 Jan 2006 07:25:37 +0100
Subject: Question about HiddenServies (sorry when twice)
Message-ID: <43DF02E1.8080700@gmail.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Sorry if i sent this twice but i think i was always sending this to the
wrong email adress. to or-talk at seul.org. but i think it should be
@freehaven.net. And if im wrong then im sorry for spamming this list :)
im just pretty new in here :)
Hi,
so i have two questions. the first one is about hidden services. when i
set up a hidden service can it point to a other url except localhost? i
just saw the example with google but im still not sure about it. so i
need to have my webserver running somewhere and i need to have tor
running somewhere. on which port the tor needs to listen to that things
are working? 9050 from outside? cause i would have it running behind nat.
and the other question is about BandwidthBurst for my tor server. i dont
understand it exactly what this is doing. i would be really helpful for
every help :)
best wishes
marvin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFD3wLhChE8w47F3oMRAo+4AKCOhwami2ek34tqODsHGl794bQj0QCfa+Pp
rmgyDsZEFi5zIMsBZIH9v2w=
=59xb
-----END PGP SIGNATURE-----
From force44 at Safe-mail.net Tue Jan 31 06:35:14 2006
From: force44 at Safe-mail.net (force44 at Safe-mail.net)
Date: Tue, 31 Jan 2006 01:35:14 -0500
Subject: TOR log question
Message-ID:
Hi everybody,
I receive regular error messages like these 2:
"Error writing router store to disk"
and
"Error replacing "[mypath]/cached-routers.new": File exists"
"Error replacing "[mypath]/cached-routers": File exists"
"Error replacing "[mypath]/cached-routers.new": Permission denied"
I am using WinXP...
Despite this, it seems that TOR is running well, using the last Alfa, the last TorCP interface and Privoxy.
Thanks for your comments :)
From force44 at Safe-mail.net Tue Jan 31 06:36:35 2006
From: force44 at Safe-mail.net (force44 at Safe-mail.net)
Date: Tue, 31 Jan 2006 01:36:35 -0500
Subject: Socks/TOR setup question
Message-ID:
Hello,
I use Tor, TorCP and Privoxy:
Privoxy listens on 8118
TOR requests are sent for http and https to 127.0.0.0 on 8118,
and to 127.0.0.1 on 9050 for the socks requests.
That works fine, but I am always receiving such message in the Log file:
"[Warn] Your application (using socks4 on port 49370) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead."
This message is created when any application uses the TOR server, no matter if I parameter it as a socks4 or socks5.
As I am already using Privoxy, what must I change in my config so that this message isn't generated? Moreover, must I setup my applications to use TOR as a socks4 or a socks5 server>
Thank you!
From cyphrpunk at gmail.com Wed Jan 4 04:03:38 2006
From: cyphrpunk at gmail.com (cyphrpunk)
Date: Tue, 3 Jan 2006 20:03:38 -0800
Subject: Voting for nym
In-Reply-To:
References:
<20051202010441.GM22994@localhost.localdomain>
Message-ID: <792ce4370601032003u2b6c2ff1qdf6cb569973c6b2d@mail.gmail.com>
On 12/20/05, Jason Holt wrote:
> There's no point in writing a proxy if it'll still require support on
> wikipedia's end. To be zero-barrier, the proxy would have to:
>
> * maintain a table of "nymuserXX" wikipedia logins
>
> * automatically login to wikipedia using the one corresponding to the
> connecting nym user
>
> * prevent the client from logging out or doing other things that would let
> them hide behind the nym proxy using anything other than their assigned
> pseudonym.
I would see a proxy as being, from Wikipedia's point of view, like an
ISP. It would be like aol.com or, more analogously, momandpopisp.com,
some ISP with a number of users. If one misbehaves at Wikipedia they
probably don't block the whole ISP. That would be an unfriendly action
that would give them a bad reputation. Instead they probably make an
effort to contact someone at the ISP responsible for abuse and tell
them about the user who caused trouble, letting the ISP block him.
Only if an ISP were persistently unresponsive to abuse complaints
would they be justified in blocking the entire ISP, and I imagine that
this is exactly what they do.
If so, the need is for the anonymous proxy to be able to provide the
same level of service. I have outlined in previous messages how it
could do so, using similar technology to Jason's nym server. It would
hand out usage tokens, one to a customer, and black list tokens which
commit abuse.
BTW Jimmy Wales himself suffered some embarrassment a few weeks ago
when it came out that he had edited his own Wikipedia entry (an action
that is frowned upon) to change it and make himself look better and
more important. If only he had been able to use Tor to create a nym
account he could have avoided all this trouble. Setting himself up as
the sole founder of Wikipedia and removing the name of that other
fellow who had been given credit could have been done without making
Jimmy look bad. So I think we definitely have a friend on the inside,
we just need to get him involved in pushing for this.
CP
From arma at mit.edu Tue Jan 31 07:55:50 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 31 Jan 2006 02:55:50 -0500
Subject: Socks/TOR setup question
In-Reply-To:
References:
Message-ID: <20060131075549.GO15157@localhost.localdomain>
On Tue, Jan 31, 2006 at 01:36:35AM -0500, force44 at Safe-mail.net wrote:
> I use Tor, TorCP and Privoxy:
>
> Privoxy listens on 8118
> TOR requests are sent for http and https to 127.0.0.0 on 8118,
> and to 127.0.0.1 on 9050 for the socks requests.
>
> That works fine, but I am always receiving such message in the Log file:
> "[Warn] Your application (using socks4 on port 49370) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead."
>
> This message is created when any application uses the TOR server, no matter if I parameter it as a socks4 or socks5.
>
> As I am already using Privoxy, what must I change in my config so that this message isn't generated? Moreover, must I setup my applications to use TOR as a socks4 or a socks5 server>
The port that your error message references (49370) doesn't look like
it's for web browsing.
Do you actually get this with every connection? If so, then you should
be seeing complaints about port 80 also.
Perhaps it is some other application that you are pointing through Tor? It
sounds like you're using Privoxy correctly for your web connections and
you are using other applications which you have failed to mention here
that leak DNS resolves.
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#CompatibleApplications
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS
--Roger
From arma at mit.edu Tue Jan 31 07:58:39 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 31 Jan 2006 02:58:39 -0500
Subject: TOR log question
In-Reply-To:
References:
Message-ID: <20060131075839.GP15157@localhost.localdomain>
On Tue, Jan 31, 2006 at 01:35:14AM -0500, force44 at Safe-mail.net wrote:
> I receive regular error messages like these 2:
>
> "Error writing router store to disk"
> and
> "Error replacing "[mypath]/cached-routers.new": File exists"
> "Error replacing "[mypath]/cached-routers": File exists"
> "Error replacing "[mypath]/cached-routers.new": Permission denied"
>
>
> I am using WinXP...
>
> Despite this, it seems that TOR is running well, using the last Alfa, the last TorCP interface and Privoxy.
Interesting. This sounds like a bug somewhere. Did you install
from the latest bundle from the Tor webpage? Are you running Windows XP
SP2, or something else?
1) do these errors happen often?
2) are they repeatable?
3) is the directory there?
4) are the files there?
5) if they're there, what size are they?
--Roger
From arma at mit.edu Tue Jan 31 08:04:39 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 31 Jan 2006 03:04:39 -0500
Subject: Question about HiddenServices and...
In-Reply-To: <43DE28CF.3080406@gmail.com>
References: <43DE28CF.3080406@gmail.com>
Message-ID: <20060131080438.GQ15157@localhost.localdomain>
On Mon, Jan 30, 2006 at 03:55:11PM +0100, Marvin Preuss wrote:
> ...Server configuration :) Hi,
> so i have two questions. the first one is about hidden services. when i
> set up a hidden service can it point to a other url except localhost?
Yes.
> i just saw the example with google but im still not sure about it. so i
> need to have my webserver running somewhere and i need to have tor
> running somewhere.
Precisely.
> on which port the tor needs to listen to that things
> are working? 9050 from outside? cause i would have it running behind nat.
To run a hidden service, your Tor connects *out*, and then the people
accessing your hidden service use those outbound connections to get
to your service.
This means you can run a hidden service from anywhere that can reach
the Tor network. It doesn't have to have a routable network address.
It's hidden, after all.
> and the other question is about BandwidthBurst for my tor server. i dont
> understand it exactly what this is doing. i would be really helpful for
> every help :)
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#LimitBandwidth
http://en.wikipedia.org/wiki/Token_bucket
Perhaps ask a more concrete question?
--Roger
From arma at mit.edu Tue Jan 31 08:21:33 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 31 Jan 2006 03:21:33 -0500
Subject: Lots of errors in logs (>300mb)
In-Reply-To: <20060130053202.GA23872@youtopia.homelinux.org>
References: <20060130053202.GA23872@youtopia.homelinux.org>
Message-ID: <20060131082133.GR15157@localhost.localdomain>
On Mon, Jan 30, 2006 at 12:32:02AM -0500, circut at youtopia.homelinux.org wrote:
> Hey guys, I'm running tor-0.1.0.16 on linux. I'm running an onion router
> on my box, and I'm seeing alot of these errors in my tor.log:
>
> Jan 30 00:25:30.735 [notice] onion_pending_add(): Already have 100
> onions queued. Closing.
> Jan 30 00:25:30.735 [warn] command_process_create_cell(): Failed to hand
> off onionskin. Closing.
>
> These were filling my logs up like crazy, so I just removed those log
> lines from the code and recompiled.
>
> Just wanted to know if there was a better facility for limiting those
> logs. I can't imagine those log entries being anything serious right?
These are very serious. They mean that your Tor server is overloaded
and can't keep up with the clients trying to use it. I've just changed
the log message to be more helpful:
"Your computer is too slow to handle this many circuit creation
requests! Please consider using the MaxAdvertisedBandwidth config
option or choosing a more restricted exit policy."
Does that help? My best guess is either that you're running on a 20mhz
processor, or you set your exit policy to accept *:*, or both.
--Roger
From arma at mit.edu Tue Jan 31 08:30:26 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 31 Jan 2006 03:30:26 -0500
Subject: dynamically changable options in torrc?
In-Reply-To: <87ek2uderj.fsf@callisto.paradoxical.net>
References: <87ek2uderj.fsf@callisto.paradoxical.net>
Message-ID: <20060131083026.GS15157@localhost.localdomain>
On Thu, Jan 26, 2006 at 01:29:20PM -0500, Josh wrote:
> Is there a list of what options may be changed without restarting
> the tor process? (i.e., change and kill -HUP )
See options_transition_allowed() in
http://tor.eff.org/cvs/tor/src/or/config.c
Currently everything is allowed to change except PidFile, RunAsDaemon,
DataDirectory, User, Group, and HardwareAccel.
Note that there's a bug in 0.1.1.12-alpha that makes your Tor crash
when you enable ORPort -- this is fixed in CVS.
> By experimentation, I've discoverd that the various bandwidth
> limiting options are changable. How about hidden services?
Sure. For lots more details, see section 3.1 and the end of 3.3 in
http://tor.eff.org/cvs/doc/control-spec.txt
and also
http://tor.eff.org/cvs/control/doc/howto.txt
--Roger
From arma at mit.edu Tue Jan 31 08:35:31 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 31 Jan 2006 03:35:31 -0500
Subject: Bandwidth shaping by time of day / week / month? Adding that info to Tor protocol?
In-Reply-To: <1138256865.28648.252795679@webmail.messagingengine.com>
References: <1138256865.28648.252795679@webmail.messagingengine.com>
Message-ID: <20060131083531.GT15157@localhost.localdomain>
On Wed, Jan 25, 2006 at 10:27:45PM -0800, Scarab wrote:
> I'm new to the list. Perhaps this has been covered already, but are
> there any plans to add cron-style bandwidth shaping options to Tor? I
> mean using the common crontab notation for specifying arbitrary time
> periods and bandwidth throttles within those periods. In my case, I want
> a 20KB limit from 8am to 5pm Mon-Fri, no limit outside those hours. With
> a cron-style implementation it'd be easy to do arbitrarily complex
> shaping, i.e. cap Tor at 30KB on a specific night if a remote backup was
> scheduled to occur, etc.
>
> I'd like to ramp the rate on my end-node up to the full 50KB capacity of
> the line when
> I'm done using my ADSL connection for the day, but can't now do this
> without stopping / restarting Tor, re-writing the config file, etc. Also
> I'd prefer to keep my server up all the time in service of the overall
> stability of the network.
Using one of the 0.1.1.x Tor releases, set "ControlPort 9051" in your
torrc before you start Tor, and then
telnet localhost 9051
authenticate
setconf bandwidthrate="50 KB"
quit
I'm sure you can automate this process via netcat or the like.
Once you've got your script working, can you publish it here
so others can use it and improve it?
Thanks!
--Roger
From force44 at Safe-mail.net Tue Jan 31 08:37:57 2006
From: force44 at Safe-mail.net (force44 at Safe-mail.net)
Date: Tue, 31 Jan 2006 03:37:57 -0500
Subject: Socks/TOR setup question
Message-ID:
Yes in fact I didn't explain correctly!
I use SocksCap that I point to TOR on 127.0.0.1:9050
Then, I "socksify" for example my email software, with SocksCap.
These messages always happen when I run also for example ICQ, or a FTP, SSH, email etc software also "socksified" by SocksCap.
But doing so, is there a way to remove these messages, using socksified applications through SocksCap ?
Thank you!
> On Tue, Jan 31, 2006 at 01:36:35AM -0500, force44 at Safe-mail.net wrote:
>> I use Tor, TorCP and Privoxy:
>>
>> Privoxy listens on 8118
>> TOR requests are sent for http and https to 127.0.0.0 on 8118,
>> and to 127.0.0.1 on 9050 for the socks requests.
>>
>> That works fine, but I am always receiving such message in the Log file:
>> "[Warn] Your application (using socks4 on port 49370) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead."
>>
>> This message is created when any application uses the TOR server, no matter if I parameter it as a socks4 or socks5.
>>
>> As I am already using Privoxy, what must I change in my config so that this message isn't generated? Moreover, must I setup my applications to use TOR as a socks4 or a socks5 server>
> The port that your error message references (49370) doesn't look like
> it's for web browsing.
> Do you actually get this with every connection? If so, then you should
> be seeing complaints about port 80 also.
> Perhaps it is some other application that you are pointing through Tor? It
> sounds like you're using Privoxy correctly for your web connections and
> you are using other applications which you have failed to mention here
> that leak DNS resolves.
> http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#CompatibleApplications
> http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#SOCKSAndDNS
> --Roger
From arma at mit.edu Tue Jan 31 08:42:23 2006
From: arma at mit.edu (Roger Dingledine)
Date: Tue, 31 Jan 2006 03:42:23 -0500
Subject: choosing a syslog facility other than 'daemon'
In-Reply-To:
References:
Message-ID: <20060131084223.GU15157@localhost.localdomain>
On Mon, Jan 23, 2006 at 09:02:05PM -0800, Matt Ghali wrote:
> Is there a user-friendly way to ask tor to log to a different
> facility than 'daemon'? IE, something that does not involve editing
> the source and recompiling :)
Hi Matt,
You're the only person who wants this, as far as I've heard. Did
you have another facility in mind, or did you want to handle all
of them?
I would be pleased to apply a patch. :)
--Roger
From force44 at Safe-mail.net Tue Jan 31 08:43:15 2006
From: force44 at Safe-mail.net (force44 at Safe-mail.net)
Date: Tue, 31 Jan 2006 03:43:15 -0500
Subject: TOR log question
Message-ID:
Yes I installed from the last available release (alpha)
I am running XP-SP2, updated,
These error happen now less often than with the previous releases, but
happen sometimes.
The DIR and the files ARE there!
Currently the cached-routers.new is 15 ko, from 10 minutes ago,
BUT I got an error message that this file couldn't be stored on the
disk, 40 minutes ago!
Same for cached-routers, size is about 1300 ko.
Thank you!
> On Tue, Jan 31, 2006 at 01:35:14AM -0500, force44 at Safe-mail.net wrote:
>> I receive regular error messages like these 2:
>>
>> "Error writing router store to disk"
>> and
>> "Error replacing "[mypath]/cached-routers.new": File exists"
>> "Error replacing "[mypath]/cached-routers": File exists"
>> "Error replacing "[mypath]/cached-routers.new": Permission denied"
>>
>>
>> I am using WinXP...
>>
>> Despite this, it seems that TOR is running well, using the last Alfa, the last TorCP interface and Privoxy.
> Interesting. This sounds like a bug somewhere. Did you install
> from the latest bundle from the Tor webpage? Are you running Windows XP
> SP2, or something else?
> 1) do these errors happen often?
> 2) are they repeatable?
> 3) is the directory there?
> 4) are the files there?
> 5) if they're there, what size are they?
> --Roger
From numE at onionizer.de Tue Jan 31 09:34:06 2006
From: numE at onionizer.de (numE)
Date: Tue, 31 Jan 2006 10:34:06 +0100
Subject: whats up with tor?!
In-Reply-To: <20060130231031.GM9997@asteria.noreply.org>
References: <43DE28CF.3080406@gmail.com> <43DE6C82.4020906@onionizer.de> <20060130195629.GN15157@localhost.localdomain> <43DE8AC2.2000506@onionizer.de> <20060130231031.GM9997@asteria.noreply.org>
Message-ID: <43DF2F0E.4010505@onionizer.de>
LoL
Peter Palfrader schrieb:
> On Mon, 30 Jan 2006, numE wrote:
>
>
>>> Really? They seem up to me.
>>> http://www.noreply.org/tor-running-routers/
>>>
>> i mean the weasel list of exitnodes.
>> there are many hibbernating and unreachable nodes....
>>
>
> Um, which weasel list of exitnodes then?
>
> Regards,
> weasel
>
args. sorry ;)
i meant geoff's :o)
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl
From jason at lunkwill.org Wed Jan 4 20:41:17 2006
From: jason at lunkwill.org (Jason Holt)
Date: Wed, 4 Jan 2006 20:41:17 +0000 (UTC)
Subject: Voting for nym
In-Reply-To: <792ce4370601032003u2b6c2ff1qdf6cb569973c6b2d@mail.gmail.com>
References:
<20051202010441.GM22994@localhost.localdomain>
<792ce4370601032003u2b6c2ff1qdf6cb569973c6b2d@mail.gmail.com>
Message-ID:
On Tue, 3 Jan 2006, cyphrpunk wrote:
> I would see a proxy as being, from Wikipedia's point of view, like an
> ISP. It would be like aol.com or, more analogously, momandpopisp.com,
> some ISP with a number of users. If one misbehaves at Wikipedia they
> probably don't block the whole ISP. That would be an unfriendly action
> that would give them a bad reputation. Instead they probably make an
> effort to contact someone at the ISP responsible for abuse and tell
> them about the user who caused trouble, letting the ISP block him.
> Only if an ISP were persistently unresponsive to abuse complaints
> would they be justified in blocking the entire ISP, and I imagine that
> this is exactly what they do.
Most ISPs don't use a single outgoing IP address, and I've never seen anyone
contact an external authority to have a user blocked; we just take care of it
on wikipedia itself.
I've been doing a lot of "RC Patrol" lately (watching the list of edits for
vandalism), and frequently high school students will try to turn the article
about their high school into a message board ("l33tdud3 wuz here, peace to all
my h0m13z"...). Standard practice for vandalism is to put increasingly dire
warning messages on their "user talk" page (which displays a "You have new
messages" message when they next view a page), then request one of the
wikipedia admins to block them if they continue. When their username is
blocked, their IP is also automatically blocked. High schools often come
through a proxy with a single IP, and there's a standard notice that
eventually gets added to the IP's talk page if both good and bad edits show up
over time. It puts admins in a more difficult position, because blocking the
IP also blocks the good users, and they'll try to be more lenient, but the
process is ultimately the same. I've seen individual users vandalize multiple
pages per minute, and by the time an admin gets around to blocking them, I've
spent 20 minutes cleaning up after them. Nobody's going to wait around for an
email response when something like that's happening. I can hit the "recent
changes" link all day long and stay continuously busy repairing vandalism (and
warning users) even without the prolific vandals that require continuous
watching.
I agree that Jimmy is an excellent advocate to have. Maybe somebody else can
get him interested again. I've emailed him several times without a response,
although for all I know his spam filter is eating my messages.
-J
From circut at youtopia.homelinux.org Tue Jan 31 15:35:51 2006
From: circut at youtopia.homelinux.org (circut at youtopia.homelinux.org)
Date: Tue, 31 Jan 2006 10:35:51 -0500
Subject: Lots of errors in logs (>300mb)
In-Reply-To: <20060131082133.GR15157@localhost.localdomain>
References: <20060130053202.GA23872@youtopia.homelinux.org> <20060131082133.GR15157@localhost.localdomain>
Message-ID: <20060131153551.GA29362@youtopia.homelinux.org>
Good guess. I'm running on a 2.8ghz Celeron, but my exit policy was
flawed I believe. I've since fixed it, I hope.
-circut
On Tue, Jan 31, 2006 at 03:21:33AM -0500, Roger Dingledine wrote:
> On Mon, Jan 30, 2006 at 12:32:02AM -0500, circut at youtopia.homelinux.org wrote:
> > Hey guys, I'm running tor-0.1.0.16 on linux. I'm running an onion router
> > on my box, and I'm seeing alot of these errors in my tor.log:
> >
> > Jan 30 00:25:30.735 [notice] onion_pending_add(): Already have 100
> > onions queued. Closing.
> > Jan 30 00:25:30.735 [warn] command_process_create_cell(): Failed to hand
> > off onionskin. Closing.
> >
> > These were filling my logs up like crazy, so I just removed those log
> > lines from the code and recompiled.
> >
> > Just wanted to know if there was a better facility for limiting those
> > logs. I can't imagine those log entries being anything serious right?
>
> These are very serious. They mean that your Tor server is overloaded
> and can't keep up with the clients trying to use it. I've just changed
> the log message to be more helpful:
>
> "Your computer is too slow to handle this many circuit creation
> requests! Please consider using the MaxAdvertisedBandwidth config
> option or choosing a more restricted exit policy."
>
> Does that help? My best guess is either that you're running on a 20mhz
> processor, or you set your exit policy to accept *:*, or both.
>
> --Roger
>
From chris at eff.org Tue Jan 31 16:19:29 2006
From: chris at eff.org (Chris Palmer)
Date: Tue, 31 Jan 2006 08:19:29 -0800
Subject: TOR log question
In-Reply-To: <20060131075839.GP15157@localhost.localdomain>
References: <20060131075839.GP15157@localhost.localdomain>
Message-ID: <43DF8E11.5070201@eff.org>
Roger Dingledine wrote:
>>"Error replacing "[mypath]/cached-routers.new": File exists"
>>"Error replacing "[mypath]/cached-routers": File exists"
>>"Error replacing "[mypath]/cached-routers.new": Permission denied"
> 1) do these errors happen often?
> 2) are they repeatable?
> 3) is the directory there?
> 4) are the files there?
> 5) if they're there, what size are they?
6) What are the ACLs on those files and the directory?
From chris at eff.org Tue Jan 31 16:27:38 2006
From: chris at eff.org (Chris Palmer)
Date: Tue, 31 Jan 2006 08:27:38 -0800
Subject: Tor bug?
In-Reply-To: <20060131153439.92236.qmail@web51305.mail.yahoo.com>
References: <20060131153439.92236.qmail@web51305.mail.yahoo.com>
Message-ID: <43DF8FFA.1050300@eff.org>
David Edwards wrote:
> I have my network connection setup to point to Tor on
> 127.0.0.1 and port 8118. I'm running several browsers:
> Safari, Camino 10.b1 and Firefox 1.5, with
> SwitchProxy.
I think I sense a problem already. It's Privoxy, an HTTP proxy, that
listens on 8118. Tor listens on port 9050 for SOCKS connections.
The Privoxy configuration that is installed by the Mac installer is set
to use Tor as a SOCKS proxy; thus, you have two ways of using Tor with
your web browser:
1. Tell your web browser to use Privoxy as an HTTP (and HTTPS) proxy;
Privoxy will then in turn use Tor.
2. Tell your browser to use Tor as a SOCKS proxy.
Normally, #1 is preferable. See Step Two in
.
Finally, please note that questions about using Tor should be sent to
or-talk@, not tor-webmaster at . You'll need to subscribe to or-talk@
before you can post. See Mailing List Information in
.
From patgus at stonewwwall.org Tue Jan 31 16:41:18 2006
From: patgus at stonewwwall.org (patgus)
Date: Tue, 31 Jan 2006 10:41:18 -0600
Subject: how to confirm that tor is working?
Message-ID: <20060131104118.63fd6312.patgus@stonewwwall.org>
Ok, I see a lot of connections with netstat and in the logs. But I also get a message in the logs every so often that I am unable to confirm that the DIR and OR port are available. After a few hours all I receive are log messages that my server cannot confirm that the ports are available and no more connection messages. I am also seeing a lot of "scrubbed" connections and "giving up" messages in the logs.
I am using the latest stable version, I am behind a NAT firewall, port forwarding has been setup per instructions on both the server and the NAT firewall.
From brianwc at ocf.berkeley.edu Tue Jan 31 17:03:58 2006
From: brianwc at ocf.berkeley.edu (Brian C)
Date: Tue, 31 Jan 2006 09:03:58 -0800
Subject: how to confirm that tor is working?
In-Reply-To: <20060131104118.63fd6312.patgus@stonewwwall.org>
References: <20060131104118.63fd6312.patgus@stonewwwall.org>
Message-ID: <43DF987E.1030900@ocf.berkeley.edu>
Do you see your tor server listed here:
http://moria.seul.org:9031/
or here:
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl
If not, something's probably wrong.
Brian
patgus wrote:
> Ok, I see a lot of connections with netstat and in the logs. But I also get a message in the logs every so often that I am unable to confirm that the DIR and OR port are available. After a few hours all I receive are log messages that my server cannot confirm that the ports are available and no more connection messages. I am also seeing a lot of "scrubbed" connections and "giving up" messages in the logs.
> I am using the latest stable version, I am behind a NAT firewall, port forwarding has been setup per instructions on both the server and the NAT firewall.
>
>
From patgus at stonewwwall.org Tue Jan 31 18:09:56 2006
From: patgus at stonewwwall.org (patgus)
Date: Tue, 31 Jan 2006 12:09:56 -0600
Subject: how to confirm that tor is working?
In-Reply-To: <43DF987E.1030900@ocf.berkeley.edu>
References: <20060131104118.63fd6312.patgus@stonewwwall.org>
<43DF987E.1030900@ocf.berkeley.edu>
Message-ID: <20060131120956.6f5c5206.patgus@stonewwwall.org>
Ok, it was not listed. It is now, what does the
reject *:25
on the listing on this webpage signify. I assume it has something to do with my firewall but what?
On Tue, 31 Jan 2006 09:03:58 -0800
Brian C wrote:
> Do you see your tor server listed here:
>
> http://moria.seul.org:9031/
>
> or here:
>
> http://serifos.eecs.harvard.edu/cgi-bin/exit.pl
>
> If not, something's probably wrong.
>
> Brian
>
> patgus wrote:
> > Ok, I see a lot of connections with netstat and in the logs. But I also get a message in the logs every so often that I am unable to confirm that the DIR and OR port are available. After a few hours all I receive are log messages that my server cannot confirm that the ports are available and no more connection messages. I am also seeing a lot of "scrubbed" connections and "giving up" messages in the logs.
> > I am using the latest stable version, I am behind a NAT firewall, port forwarding has been setup per instructions on both the server and the NAT firewall.
> >
> >
>
>
From xsteadfastx at gmail.com Tue Jan 31 18:27:33 2006
From: xsteadfastx at gmail.com (Marvin Preuss)
Date: Tue, 31 Jan 2006 19:27:33 +0100
Subject: how to confirm that tor is working?
In-Reply-To: <20060131120956.6f5c5206.patgus@stonewwwall.org>
References: <20060131104118.63fd6312.patgus@stonewwwall.org> <43DF987E.1030900@ocf.berkeley.edu> <20060131120956.6f5c5206.patgus@stonewwwall.org>
Message-ID: <43DFAC15.4040400@gmail.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
patgus wrote:
Hi,
> Ok, it was not listed. It is now, what does the
> reject *:25
> on the listing on this webpage signify. I assume it has something to do with my firewall but what?
that means that port 25 is not allowed as exit port on your server. this
is default (as i know) cause people could use tor to send spam emails.
thats why it should be rejected. and the * means.....from everyone. so
port 25 from everyone gets rejected as exit point.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFD36wVChE8w47F3oMRArBPAKCUg7mVrpY8L6ftcR4IjvTpyd99iACeL2cX
pG8YaQ+nn+0YmYs9WZaZ5Zw=
=vb4a
-----END PGP SIGNATURE-----
From patgus at stonewwwall.org Tue Jan 31 18:31:01 2006
From: patgus at stonewwwall.org (patgus)
Date: Tue, 31 Jan 2006 12:31:01 -0600
Subject: how to confirm that tor is working?
In-Reply-To: <43DFAC15.4040400@gmail.com>
References: <20060131104118.63fd6312.patgus@stonewwwall.org>
<43DF987E.1030900@ocf.berkeley.edu>
<20060131120956.6f5c5206.patgus@stonewwwall.org>
<43DFAC15.4040400@gmail.com>
Message-ID: <20060131123101.2fb6216f.patgus@stonewwwall.org>
Hmm, which is worse? spam or someone reading your emails? Hard decision there, I hate spam too.
On Tue, 31 Jan 2006 19:27:33 +0100
Marvin Preuss wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> patgus wrote:
>
> Hi,
>
> > Ok, it was not listed. It is now, what does the
> > reject *:25
> > on the listing on this webpage signify. I assume it has something to do with my firewall but what?
>
> that means that port 25 is not allowed as exit port on your server. this
> is default (as i know) cause people could use tor to send spam emails.
> thats why it should be rejected. and the * means.....from everyone. so
> port 25 from everyone gets rejected as exit point.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iD8DBQFD36wVChE8w47F3oMRArBPAKCUg7mVrpY8L6ftcR4IjvTpyd99iACeL2cX
> pG8YaQ+nn+0YmYs9WZaZ5Zw=
> =vb4a
> -----END PGP SIGNATURE-----
>
>
From zorba at pavlovian.net Tue Jan 31 18:36:12 2006
From: zorba at pavlovian.net (Ben Wilhelm)
Date: Tue, 31 Jan 2006 10:36:12 -0800
Subject: how to confirm that tor is working?
In-Reply-To: <43DFAC15.4040400@gmail.com>
References: <20060131104118.63fd6312.patgus@stonewwwall.org> <43DF987E.1030900@ocf.berkeley.edu> <20060131120956.6f5c5206.patgus@stonewwwall.org> <43DFAC15.4040400@gmail.com>
Message-ID: <43DFAE1C.1090505@pavlovian.net>
> and the * means.....from everyone. so
> port 25 from everyone gets rejected as exit point.
Backwards - the * means to everyone. Obviously, if we knew who was
sending us the packets, it would defeat the entire purpose of Tor. This
lets you set up certain IP ranges so packets can't be sent to them
(commonly, localhost and other LAN IP blocks - occasionally,
Tor-disliking sites like Slashdot or Wikipedia.)
-Ben
From xsteadfastx at gmail.com Tue Jan 31 19:33:11 2006
From: xsteadfastx at gmail.com (Marvin Preuss)
Date: Tue, 31 Jan 2006 20:33:11 +0100
Subject: Question about HiddenServices and...
In-Reply-To: <20060131080438.GQ15157@localhost.localdomain>
References: <43DE28CF.3080406@gmail.com> <20060131080438.GQ15157@localhost.localdomain>
Message-ID: <43DFBB77.7030609@gmail.com>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Roger Dingledine wrote:
Hi Roger,
> To run a hidden service, your Tor connects *out*, and then the people
> accessing your hidden service use those outbound connections to get
> to your service.
>
> This means you can run a hidden service from anywhere that can reach
> the Tor network. It doesn't have to have a routable network address.
> It's hidden, after all.
that was exactly what i like to hear :) and i just tried it and it
works. My own hidden service :) but thank you for your answer and
everything. Thanks,
Marvin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFD37t3ChE8w47F3oMRAhP/AJ9JtyTf/CpniCTtw0M2CNJ9LSlBCgCaAr9z
kKu3imuJT+vC9642ERxq4FE=
=yMJU
-----END PGP SIGNATURE-----
From lnoferin at cybervalley.org Wed Jan 4 23:18:25 2006
From: lnoferin at cybervalley.org (leandro noferini)
Date: Thu, 05 Jan 2006 00:18:25 +0100
Subject: Running a server on the 80 and 443 ports
Message-ID: <87vewzoa4e.fsf@clementino.cybervalley.org>
Ciao a tutti,
I am going to setup a new server with a good connection: this server
will run on a dedicated ip so I would like to run on the ports 80 and
443 as requested at http://tor.eff.org/cvs/tor/doc/tor-doc-server.html
but I am finding this problem.
The server will run as a special user not and root will only start the
program so I put these two lines on torrc to let the change of user
User torserver
Group torgruppo
but the same I get this error in log file
Jan 05 00:05:07.731 [warn] connection_create_listener(): Could not bind
to port 443: Permission denied
Jan 05 00:05:07.731 [err] options_act(): Failed to bind one of the
listener ports.
Jan 05 00:05:07.731 [err] init_from_config(): Acting on config options
left us in a broken state. Dying.
?
--
Ciao
leandro
Un esteso e "normale" uso della crittografia ? il sistema pi? forte
per rivendicare il diritto alla privacy nelle comunicazioni
telematiche: come tutti i diritti e come i muscoli se non viene
esercitato costantemente si atrofizza e va perso.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 188 bytes
Desc: not available
URL:
From huber at paradoxical.net Tue Jan 31 19:48:31 2006
From: huber at paradoxical.net (Josh)
Date: Tue, 31 Jan 2006 14:48:31 -0500
Subject: dynamically changable options in torrc?
In-Reply-To: <20060131083026.GS15157@localhost.localdomain> (Roger
Dingledine's message of "Tue, 31 Jan 2006 03:30:26 -0500")
References: <87ek2uderj.fsf@callisto.paradoxical.net>
<20060131083026.GS15157@localhost.localdomain>
Message-ID: <87d5i8govk.fsf@callisto.paradoxical.net>
Roger Dingledine writes:
> See options_transition_allowed() in
> http://tor.eff.org/cvs/tor/src/or/config.c
Thanks, that was exactly what I was looking for.
> Sure. For lots more details, see section 3.1 and the end of 3.3 in
> http://tor.eff.org/cvs/doc/control-spec.txt
> and also
> http://tor.eff.org/cvs/control/doc/howto.txt
Excellent, even more information. :)
Josh
From matt at snark.net Tue Jan 31 19:50:09 2006
From: matt at snark.net (Matt Ghali)
Date: Tue, 31 Jan 2006 11:50:09 -0800 (PST)
Subject: choosing a syslog facility other than 'daemon'
In-Reply-To: <20060131084223.GU15157@localhost.localdomain>
References:
<20060131084223.GU15157@localhost.localdomain>
Message-ID:
Funny you should reply now- I spent the morning hacking on autoconf
and friends, so configure can be used to select a log facility; and
also, a useful method to point configure at libevent not located in
/usr/local/lib.
I suspect that a "nicer" way to support other log facilities would
be to add support in config.c; which I may do instead, given the
time. Of course, given the lack of interest, I suspect that
compile-time would be good enough.
I will make sure to send diffs if/when I get them working.
matto
On Tue, 31 Jan 2006, Roger Dingledine wrote:
> On Mon, Jan 23, 2006 at 09:02:05PM -0800, Matt Ghali wrote:
>> Is there a user-friendly way to ask tor to log to a different
>> facility than 'daemon'? IE, something that does not involve editing
>> the source and recompiling :)
>
> Hi Matt,
>
> You're the only person who wants this, as far as I've heard. Did
> you have another facility in mind, or did you want to handle all
> of them?
>
> I would be pleased to apply a patch. :)
>
> --Roger
>
--matt at snark.net------------------------------------------<
The only thing necessary for the triumph
of evil is for good men to do nothing. - Edmund Burke
From rumage_time at yahoo.com Tue Jan 31 22:06:25 2006
From: rumage_time at yahoo.com (jtnnd ddfff)
Date: Tue, 31 Jan 2006 14:06:25 -0800 (PST)
Subject: Autostarting Server if X connection speed is found?
Message-ID: <20060131220625.411.qmail@web35706.mail.mud.yahoo.com>
Hi,
I was wondering if there is a torrc command which tells Tor *only* to function as a server if X connection speed.
I looked through the manual and the wikiki and I did not find anything I thought was on-topic.
I would like to set X to a speed of say 30kb each way. If this connection speed is found Tor will auto-start it's server functions.
If the above is possible would it be advisable to set both the "BandwidthRate" and "BandwidthBurst" to 50kb?
Thank You
---------------------------------
Do you Yahoo!?
With a free 1 GB, there's more in store with Yahoo! Mail.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
From arma at mit.edu Wed Jan 4 23:34:53 2006
From: arma at mit.edu (Roger Dingledine)
Date: Wed, 4 Jan 2006 18:34:53 -0500
Subject: Running a server on the 80 and 443 ports
In-Reply-To: <87vewzoa4e.fsf@clementino.cybervalley.org>
References: <87vewzoa4e.fsf@clementino.cybervalley.org>
Message-ID: <20060104233453.GE15157@localhost.localdomain>
On Thu, Jan 05, 2006 at 12:18:25AM +0100, leandro noferini wrote:
> I am going to setup a new server with a good connection: this server
> will run on a dedicated ip so I would like to run on the ports 80 and
> 443 as requested at http://tor.eff.org/cvs/tor/doc/tor-doc-server.html
> but I am finding this problem.
>
> Jan 05 00:05:07.731 [warn] connection_create_listener(): Could not bind
> to port 443: Permission denied
Step 9 of http://tor.eff.org/cvs/tor/doc/tor-doc-server.html
points you to this FAQ entry:
http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ#ServerForFirewalledClients
which walks you through setting up port forwarding with iptables, etc.
Hope that helps,
--Roger
From superm40 at comcast.net Thu Jan 5 03:38:09 2006
From: superm40 at comcast.net (Matthew Seth Flaschen)
Date: Wed, 04 Jan 2006 22:38:09 -0500
Subject: Voting for nym
In-Reply-To: <792ce4370601032003u2b6c2ff1qdf6cb569973c6b2d@mail.gmail.com>
References: <20051202010441.GM22994@localhost.localdomain> <792ce4370601032003u2b6c2ff1qdf6cb569973c6b2d@mail.gmail.com>
Message-ID: <43BC94A1.2020803@comcast.net>
> I would see a proxy as being, from Wikipedia's point of view, like an
> ISP. It would be like aol.com or, more analogously, momandpopisp.com,
> some ISP with a number of users. If one misbehaves at Wikipedia they
> probably don't block the whole ISP. That would be an unfriendly action
> that would give them a bad reputation. Instead they probably make an
> effort to contact someone at the ISP responsible for abuse and tell
> them about the user who caused trouble, letting the ISP block him.
> Only if an ISP were persistently unresponsive to abuse complaints
> would they be justified in blocking the entire ISP, and I imagine that
> this is exactly what they do.
To the best of my knowledge, we've never blocked an entire ISP, largely
because it is difficult to determine all the relevant IP ranges.
However, when large range blocks are done, that may block an entire ISP
or organization. I would also note that ISPs have been very
unresponsive to our abuse compliants.
> BTW Jimmy Wales himself suffered some embarrassment a few weeks ago
> when it came out that he had edited his own Wikipedia entry (an action
> that is frowned upon) to change it and make himself look better and
> more important.
You're right that he has made edits to the page. Some have made himself
look better while others have been neutral factual edits (see
http://en.wikipedia.org/w/index.php?title=Jimmy_Wales&action=history for
a record of all edits to the page). However, he now expressed regret for
making any edits. More importantly, he made those edits from his
established account, with no attempt to hide his identity. It is wrong
to imply he was trying to be secretive.
From ron_davis at ftml.net Sat Jan 7 01:40:17 2006
From: ron_davis at ftml.net (Ron Davis)
Date: Sat, 07 Jan 2006 02:40:17 +0100
Subject: Warning message in v0.1.1.10-alpha
Message-ID: <1136598017.9167.251280614@webmail.messagingengine.com>
Hi all,
I'm running Tor v0.1.1.10-alpha in client mode on Win 98SE.
Several times today, I saw a warning message like the one below.
Any ideas?
Thanks,
Ron
Jan 07 02:20:06.450 [warn] connection_dir_client_reached_eof(): Received
http st
atus code 302 ("Found") from server '65.254.37.163:80' while fetching
"/tor/serv
er/fp/C76815FA912A6B2954B70DA4FF033902CC4F0650+C790983B7A75E52FBAA167A78795138F4
00E8B18+CB82503D8E750F5486CE280DEC973221679C0F7F+D12BD550CCB17AB14211025655918C8
2208E9BB0+D7BBC9D1B08AE5933B08A21610205940D697C8F2+D897181CBFB75B0DA3E90E81DD07D
C11CD1CFC5A+DCC0984284410C322F94E08E422B1D641C7B715F+DE1462CB122675127C158E69B40
3F52EDD30BC9F+E3B1360083D406A632F807D9CD67E93EAFFF4AEB+EB16E6B8A5146BBD3EC64A463
85CBDBA9EE6A990+EB6086CA3FF2ACE751D55EC5C6679D6AAE5B3349+FB4E78D82806D28AFB96CBB
525E60320FB81A06A.z". I'll try again soon.
--
Ron Davis
ron_davis at ftml.net
--
http://www.fastmail.fm - Accessible with your email software
or over the web
From phobos at rootme.org Sat Jan 7 04:53:03 2006
From: phobos at rootme.org (phobos at rootme.org)
Date: Fri, 6 Jan 2006 23:53:03 -0500
Subject: Warning message in v0.1.1.10-alpha
In-Reply-To: <1136598017.9167.251280614@webmail.messagingengine.com>
References: <1136598017.9167.251280614@webmail.messagingengine.com>
Message-ID: <20060107045303.GA10771@deimos>
On Sat, Jan 07, 2006 at 02:40:17AM +0100, ron_davis at ftml.net wrote 1.0K bytes in 33 lines about:
: Several times today, I saw a warning message like the one below.
:
: Any ideas?
Yes, this is what happens when the proxy on port 80 continues to
work, but the tor server itself has crashed. Therefore, people
trying to contact this server, "phobos", did get a response on
my port 80 proxy, but not actually get a connection to the
DirPort served up by tor itself.
By the way, it's fixed and working again.
--
Andrew
From alexismanning at hotpop.com Mon Jan 2 13:43:33 2006
From: alexismanning at hotpop.com (Alexis Manning)
Date: Mon, 2 Jan 2006 13:43:33 -0000
Subject: Dealing with bad Tor nodes
Message-ID: <004d01c60fa2$87d0e250$1901a8c0@fishtest>
I hit a lot of 404s because the path I'm going through has a knackered node.
Is there any way the client could automatically deduce bad nodes and stop
using them? Sure, some 404s are going to be legit, but the majority won't
be.
Failing that, is there any easy way the client could try to repeat a request
using a different chain if a couple of 404s are returned in succession?
-- A.
From firefox-gen at walala.org Sat Jan 7 21:02:11 2006
From: firefox-gen at walala.org (ADB)
Date: Sat, 07 Jan 2006 13:02:11 -0800
Subject: Warning message in v0.1.1.10-alpha
In-Reply-To: <1136598017.9167.251280614@webmail.messagingengine.com>
References: <1136598017.9167.251280614@webmail.messagingengine.com>
Message-ID: <43C02C53.2080806@walala.org>
I get that a lot too on winxp. I have no clue, but it doesn't seem to
cause any issues that I can see.
~Andrew
Ron Davis wrote:
>Hi all,
>
>I'm running Tor v0.1.1.10-alpha in client mode on Win 98SE.
>
>Several times today, I saw a warning message like the one below.
>
>Any ideas?
>
>Thanks,
>Ron
>
>
>Jan 07 02:20:06.450 [warn] connection_dir_client_reached_eof(): Received
>http st
>atus code 302 ("Found") from server '65.254.37.163:80' while fetching
>"/tor/serv
>er/fp/C76815FA912A6B2954B70DA4FF033902CC4F0650+C790983B7A75E52FBAA167A78795138F4
>00E8B18+CB82503D8E750F5486CE280DEC973221679C0F7F+D12BD550CCB17AB14211025655918C8
>2208E9BB0+D7BBC9D1B08AE5933B08A21610205940D697C8F2+D897181CBFB75B0DA3E90E81DD07D
>C11CD1CFC5A+DCC0984284410C322F94E08E422B1D641C7B715F+DE1462CB122675127C158E69B40
>3F52EDD30BC9F+E3B1360083D406A632F807D9CD67E93EAFFF4AEB+EB16E6B8A5146BBD3EC64A463
>85CBDBA9EE6A990+EB6086CA3FF2ACE751D55EC5C6679D6AAE5B3349+FB4E78D82806D28AFB96CBB
>525E60320FB81A06A.z". I'll try again soon.
>
>
From eugen at leitl.org Mon Jan 9 15:37:20 2006
From: eugen at leitl.org (Eugen Leitl)
Date: Mon, 9 Jan 2006 16:37:20 +0100
Subject: [selected.by.rael@rael-science.org: [rael-science] The great firewall of China]
Message-ID: <20060109153720.GA2247@leitl.org>
Source: bbc
http://news.bbc.co.uk/2/hi/programmes/click_online/4587622.stm
The great firewall of China
In the space of about a decade, China's tech
development has raced ahead to catch up with some
of the most advanced countries in the West. But
there are still stark differences, finds Richard Taylor.
With a rapidly expanding online population, it is
tempting to see China as hurtling full speed
towards digital nirvana, but all is not quite what it seems.
Somewhere along the way the idea that the Chinese
people should be allowed to inform and be informed appears to have been lost.
China is proof that the net can be developed and strangled all at once.
Being online here is a distinctly hit and miss
experience - fine if you want to access mundane
content, but try to get into anything considered
even remotely sensitive by the government and it
soon starts grinding to a halt.
I tried accessing the BBC News website but to no
avail. A government official told me there must
be what he called "a technical problem".
In truth, those "technical problems" are
afflicting more and more information sites in
China, for example the open source encyclopaedia
Wikipedia, perhaps because it has fallen foul of
the government's recent declaration that news and
information in today's China should only be what
it calls "healthy" and "in the public interest".
One official from the internet publishing
department, Kuo Xiao Wei, admitted the
authorities consider the net a mixed blessing.
He said it abounds with pornography and gambling
sites, and while it can be a source of good
information, it also carries with it the
possibility of spreading rumour and misinformation.
"With 56 ethnic minorities, we can't risk one slandering another", he added.
-----
Amnesty International is aware of at least 64
cyber dissidents who are imprisoned right now
just for peacefully expressing their opinions
online, whether it's on an e-mail or a website
Steve Ballinger, Amnesty International
-----
So Chinese netizens find themselves surfing in
the shadow of the world's most sophisticated
censorship machine, which is now more menacing than ever.
There is now an estimated 30,000-strong internet
police force which, with the aid of
Western-provided technology, is dedicated to monitoring websites and e-mails.
On a technical level the five gateways which
connect China to the global internet filter
traffic coming into and going out of the country.
Keyword blocking technology - much of it provided
by western companies - is used to prevent access to offending sites.
Even the country's 110,000 internet caf?s are now
highly regulated and state-licensed, and all are
equipped with standard surveillance systems.
Self-censorship
Increasingly, though, the authorities are relying
on individuals to censor themselves or risk harsh
and well publicised penalties if they dare to challenge the establishment.
Steve Ballinger, of Amnesty International, says:
"Amnesty International is aware of at least 64
cyber dissidents who are imprisoned right now
just for peacefully expressing their opinions
online, whether it's on an e-mail or a website.
"Some of the offences they're accused of are
signing an online petition, sending information
to a foreign organisation, or disseminating information about the SARS virus."
Corporate China is also expected to play an
active part in this self-censorship, keeping a close eye on content.
One website forum administrator was willing to
talk to me, but did not want to be identified.
Suffice to say, he is in no doubt what his job entails.
He said: "If you say anything against the
government we've got to delete it, no exception,
because it's a forum, it's a public place. If the
government finds anything against them in the
forum, that will jeopardise the company."
Finding a way
In spite of all this, many people here simply
refuse to be cowed and they are finding some
inventive ways to circumvent the restrictions.
The government doesn't know how to control the
blog thing. Next year maybe they'll be able to
but we'll find other ways of expressing ourselves
Michael Anti, free speech campaigner
One simple and effective way is to turn to other
forms of communication, like texting from mobiles
and instant messaging, which have proved
successful in distributing information quickly.
Blogging is also proving a hugely popular
alternative to websites, for individuals to find self-expression.
SOME PUBLIC WEB-BASED CIRCUMVENTION SERVICES
The BBC is not responsible for the content of external websites
Michael Anti has long been campaigning for free
speech. His blog is renowned as being one of
China's true sources of information.
He believes the cat and mouse game between the
government and its people is set to continue.
"The government doesn't know how to control the
blog thing. Next year maybe they'll be able to
but we'll find other ways of expressing ourselves."
Equipped with the right know-how, some Chinese
are already using more sophisticated technologies
to beat the authorities at their own game.
Advanced software for example allows users
anonymously to redirect their internet activity
through a third-party computer known as a proxy
server, which is out of reach of the Chinese authorities.
----- End forwarded message -----
--
Eugen* Leitl leitl http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From nogard_is_here at sbcglobal.net Tue Jan 10 04:42:31 2006
From: nogard_is_here at sbcglobal.net (Ernie)
Date: Mon, 09 Jan 2006 23:42:31 -0500
Subject: Tor problems with Proxomiton and privoxy
Message-ID: <43C33B37.4040007@sbcglobal.net>
I have tor set up with proxomiton and privoxy. Every time I try to connect to a site, I get a message in the tor window that says, "[notice] tried for 60 seconds to get connection to [scrubbed]:80.Giving up." How can I fix this? I'm using tor version 0.1.0.16
From force44 at Safe-mail.net Tue Jan 10 09:26:21 2006
From: force44 at Safe-mail.net (force44 at Safe-mail.net)
Date: Tue, 10 Jan 2006 04:26:21 -0500
Subject: Error messages in Tor
Message-ID:
Hi everybody,
I receive regular error messages like these 2:
"Error writing router store to disk"
and
"Error replacing "[mypath]/cached-routers.new": File exists"
"Error replacing "[mypath]/cached-routers": File exists"
"Error replacing "[mypath]/cached-routers.new": Permission denied"
I am using WinXP...
Despite this, it seems that TOR is running well, using the last Alfa, and the last TorCP interface.
Thanks for your comments :)
From cwilson352 at cogeco.ca Tue Jan 10 21:12:16 2006
From: cwilson352 at cogeco.ca (Wilson)
Date: Tue, 10 Jan 2006 16:12:16 -0500
Subject: New beta version of TorDNS
Message-ID: <43C42330.5070509@cogeco.ca>
Attempting to rectify the problem with TorDNS not always resolving
hostnames when using the internet, TorDNS is now coded to hammer Tor
resolve over socks function, making TorDNS a little more cpu intensive
at times, but should insure better hostname to ip resolvements. The
problem with using TorDNS and Tor to resolve hostnames to ip addresses
(When TorDNS sometimes does not resolve them right away) is seemingly
Tor itself, and not TorDNS. I encountered the same problem when using
Tor_resolve, Tor would lose connection and retry on a new circuit,
while using TorDNS or Tor_resolve. It is due to broken resolve over
socks functions on the exit nodes (From what I was told). Also, TorDNS
v1.7 listens on address
127.1.2.3 instead of localhost. I hope this has fixed the problem with
windows users that do not
have a localhost interface (win2k i.e.). The webpage is below
http://sandos.ath.cx/~badger/tordns.html
C. Wilson
From arma at mit.edu Wed Jan 11 05:12:55 2006
From: arma at mit.edu (Roger Dingledine)
Date: Wed, 11 Jan 2006 00:12:55 -0500
Subject: Tor 0.1.1.11-alpha is out
Message-ID: <20060111051255.GM15075@localhost.localdomain>
This is the eleventh development snapshot for the 0.1.1.x series.
This release implements entry guard nodes: it automatically chooses a
handful of entry nodes and sticks with them for all circuits. The logs
about entry guards are still pretty chatty, but hopefully that will help
us track down any problems. Please let us know whether it works for you.
The release also reduces directory bandwidth overhead substantially,
makes Tor servers with dynamic IP addresses useful again, and makes IRC
and IM connections over Tor more reliable.
Everybody who runs a hidden service should upgrade.
http://tor.eff.org/download.html
Changes in version 0.1.1.11-alpha - 2006-01-10
o Crashes in 0.1.1.x:
- Include all the assert/crash fixes from 0.1.0.16.
- If you start Tor and then quit very quickly, there were some
races that tried to free things that weren't allocated yet.
- Fix a rare memory stomp if you're running hidden services.
- Fix segfault when specifying DirServer in config without nickname.
- Fix a seg fault when you finish connecting to a server but at
that moment you dump his server descriptor.
- Extendcircuit and Attachstream controller commands would
assert/crash if you don't give them enough arguments.
- Fix an assert error when we're out of space in the connection_list
and we try to post a hidden service descriptor (reported by weasel).
- If you specify a relative torrc path and you set RunAsDaemon in
your torrc, then it chdir()'s to the new directory. If you HUP,
it tries to load the new torrc location, fails, and exits.
The fix: no longer allow a relative path to torrc using -f.
o Major features:
- Implement "entry guards": automatically choose a handful of entry
nodes and stick with them for all circuits. Only pick new guards
when the ones you have are unsuitable, and if the old guards
become suitable again, switch back. This will increase security
dramatically against certain end-point attacks. The EntryNodes
config option now provides some hints about which entry guards you
want to use most; and StrictEntryNodes means to only use those.
- New directory logic: download by descriptor digest, not by
fingerprint. Caches try to download all listed digests from
authorities; clients try to download "best" digests from caches.
This avoids partitioning and isolating attacks better.
- Make the "stable" router flag in network-status be the median of
the uptimes of running valid servers, and make clients pay
attention to the network-status flags. Thus the cutoff adapts
to the stability of the network as a whole, making IRC, IM, etc
connections more reliable.
o Major fixes:
- Tor servers with dynamic IP addresses were needing to wait 18
hours before they could start doing reachability testing using
the new IP address and ports. This is because they were using
the internal descriptor to learn what to test, yet they were only
rebuilding the descriptor once they decided they were reachable.
- Tor 0.1.1.9 and 0.1.1.10 had a serious bug that caused clients
to download certain server descriptors, throw them away, and then
fetch them again after 30 minutes. Now mirrors throw away these
server descriptors so clients can't get them.
- We were leaving duplicate connections to other ORs open for a week,
rather than closing them once we detect a duplicate. This only
really affected authdirservers, but it affected them a lot.
- Spread the authdirservers' reachability testing over the entire
testing interval, so we don't try to do 500 TLS's at once every
20 minutes.
o Minor fixes:
- If the network is down, and we try to connect to a conn because
we have a circuit in mind, and we timeout (30 seconds) because the
network never answers, we were expiring the circuit, but we weren't
obsoleting the connection or telling the entry_guards functions.
- Some Tor servers process billions of cells per day. These statistics
need to be uint64_t's.
- Check for integer overflows in more places, when adding elements
to smartlists. This could possibly prevent a buffer overflow
on malicious huge inputs. I don't see any, but I haven't looked
carefully.
- ReachableAddresses kept growing new "reject *:*" lines on every
setconf/reload.
- When you "setconf log" via the controller, it should remove all
logs. We were automatically adding back in a "log notice stdout".
- Newly bootstrapped Tor networks couldn't establish hidden service
circuits until they had nodes with high uptime. Be more tolerant.
- We were marking servers down when they could not answer every piece
of the directory request we sent them. This was far too harsh.
- Fix the torify (tsocks) config file to not use Tor for localhost
connections.
- Directory authorities now go to the proper authority when asking for
a networkstatus, even when they want a compressed one.
- Fix a harmless bug that was causing Tor servers to log
"Got an end because of misc error, but we're not an AP. Closing."
- Authorities were treating their own descriptor changes as cosmetic,
meaning the descriptor available in the network-status and the
descriptor that clients downloaded were different.
- The OS X installer was adding a symlink for tor_resolve but
the binary was called tor-resolve (reported by Thomas Hardly).
- Workaround a problem with some http proxies where they refuse GET
requests that specify "Content-Length: 0" (reported by Adrian).
- Fix wrong log message when you add a "HiddenServiceNodes" config
line without any HiddenServiceDir line (reported by Chris Thomas).
o Minor features:
- Write the TorVersion into the state file so we have a prayer of
keeping forward and backward compatibility.
- Revive the FascistFirewall config option rather than eliminating it:
now it's a synonym for ReachableAddresses *:80,*:443.
- Clients choose directory servers from the network status lists,
not from their internal list of router descriptors. Now they can
go to caches directly rather than needing to go to authorities
to bootstrap.
- Directory authorities ignore router descriptors that have only
cosmetic differences: do this for 0.1.0.x servers now too.
- Add a new flag to network-status indicating whether the server
can answer v2 directory requests too.
- Authdirs now stop whining so loudly about bad descriptors that
they fetch from other dirservers. So when there's a log complaint,
it's for sure from a freshly uploaded descriptor.
- Reduce memory requirements in our structs by changing the order
of fields.
- There used to be two ways to specify your listening ports in a
server descriptor: on the "router" line and with a separate "ports"
line. Remove support for the "ports" line.
- New config option "AuthDirRejectUnlisted" for auth dirservers as
a panic button: if we get flooded with unusable servers we can
revert to only listing servers in the approved-routers file.
- Auth dir servers can now mark a fingerprint as "!reject" or
"!invalid" in the approved-routers file (as its nickname), to
refuse descriptors outright or include them but marked as invalid.
- Servers store bandwidth history across restarts/crashes.
- Add reasons to DESTROY and RELAY_TRUNCATED cells, so clients can
get a better idea of why their circuits failed. Not used yet.
- Directory mirrors now cache up to 16 unrecognized network-status
docs. Now we can add new authdirservers and they'll be cached too.
- When picking a random directory, prefer non-authorities if any
are known.
- New controller option "getinfo desc/all-recent" to fetch the
latest server descriptor for every router that Tor knows about.
From cwilson352 at cogeco.ca Thu Jan 12 05:17:29 2006
From: cwilson352 at cogeco.ca (Wilson)
Date: Thu, 12 Jan 2006 00:17:29 -0500
Subject: TorDNS beta 2 release
Message-ID: <43C5E669.4040109@cogeco.ca>
Sorry for all the new versions everybody, I will find a major bug in the
program the next day after a new release. TorDNS beta 2 website link below:
http://sandos.ath.cx/~badger/tordns.html
From arma at mit.edu Thu Jan 12 05:32:10 2006
From: arma at mit.edu (Roger Dingledine)
Date: Thu, 12 Jan 2006 00:32:10 -0500
Subject: Tor 0.1.1.12-alpha is out
Message-ID: <20060112053209.GQ15075@localhost.localdomain>
This is the twelfth development snapshot for the 0.1.1.x series.
It fixes a bug that prevented Tor servers from accepting connections
from non-servers. If you run a server, you should use this release rather
than 0.1.1.11-alpha.
http://tor.eff.org/download.html
Changes in version 0.1.1.12-alpha - 2006-01-11
o Bugfixes on 0.1.1.x:
- The fix to close duplicate server connections was closing all
Tor client connections if they didn't establish a circuit
quickly enough. Oops.
- Fix minor memory issue (double-free) that happened on exit.
o Bugfixes on 0.1.0.x:
- Tor didn't warn when it failed to open a log file.
From moses.mason at gmail.com Thu Jan 12 15:12:16 2006
From: moses.mason at gmail.com (Moses)
Date: Thu, 12 Jan 2006 23:12:16 +0800
Subject: Tor 0.1.1.12-alpha is out
In-Reply-To: <20060112053209.GQ15075@localhost.localdomain>
References: <20060112053209.GQ15075@localhost.localdomain>
Message-ID: <87bcf3800601120712o7ab776f0ye26c73041a570646@mail.gmail.com>
Thank you for your work :)
BTW: Where's your PGP key?
On 1/12/06, Roger Dingledine wrote:
> This is the twelfth development snapshot for the 0.1.1.x series.
>
> It fixes a bug that prevented Tor servers from accepting connections
> from non-servers. If you run a server, you should use this release rather
> than 0.1.1.11-alpha.
>
> http://tor.eff.org/download.html
>
> Changes in version 0.1.1.12-alpha - 2006-01-11
> o Bugfixes on 0.1.1.x:
> - The fix to close duplicate server connections was closing all
> Tor client connections if they didn't establish a circuit
> quickly enough. Oops.
> - Fix minor memory issue (double-free) that happened on exit.
>
> o Bugfixes on 0.1.0.x:
> - Tor didn't warn when it failed to open a log file.
>
>
--
"I may not agree with what you say but I will defend to the death your
right to say it"
From goodell at eecs.harvard.edu Thu Jan 12 16:02:37 2006
From: goodell at eecs.harvard.edu (Geoffrey Goodell)
Date: Thu, 12 Jan 2006 11:02:37 -0500
Subject: migrating exit.pl from serifos:8000 to serifos:80
Message-ID: <20060112160237.GG2367@eecs.harvard.edu>
In an effort to simplify and consolidate my computing infrastructure, I
am collapsing the two web servers running on serifos.eecs.harvard.edu
into a single web server. Effective immediately,
serifos.eecs.harvard.edu:8000 is deprecated in favor of
serifos.eecs.harvard.edu:80. Please migrate your links and automated
scripts for harvesting content on serifos.eecs.harvard.edu:8000.
In particular, the following URL:
http://serifos.eecs.harvard.edu:8000/cgi-bin/exit.pl
is deprecated in favor of:
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl
For now, both URLs work. I plan to disable the server on port 8000 one
week from today, 19 Jaunary 2006.
Thank you for understanding, and I apologize for the inconvenience.
Geoff
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From numE at onionizer.de Mon Jan 2 13:46:09 2006
From: numE at onionizer.de (numE)
Date: Mon, 02 Jan 2006 14:46:09 +0100
Subject: Dealing with bad Tor nodes
In-Reply-To: <004d01c60fa2$87d0e250$1901a8c0@fishtest>
References: <004d01c60fa2$87d0e250$1901a8c0@fishtest>
Message-ID: <43B92EA1.4010905@onionizer.de>
A way to deal with this could be the following:
always build two node-chains and compare the results...
this could also help to detect nodes wich manipulate data....
Alexis Manning schrieb:
> I hit a lot of 404s because the path I'm going through has a knackered node.
> Is there any way the client could automatically deduce bad nodes and stop
> using them? Sure, some 404s are going to be legit, but the majority won't
> be.
>
> Failing that, is there any easy way the client could try to repeat a request
> using a different chain if a couple of 404s are returned in succession?
>
> -- A.
>
From glymr_darkmoon at ml1.net Thu Jan 12 21:39:11 2006
From: glymr_darkmoon at ml1.net (Glymr Darkmoon)
Date: Thu, 12 Jan 2006 22:39:11 +0100
Subject: migrating exit.pl from serifos:8000 to serifos:80
In-Reply-To: <20060112160237.GG2367@eecs.harvard.edu>
References: <20060112160237.GG2367@eecs.harvard.edu>
Message-ID: <43C6CC7F.6060002@ml1.net>
Geoffrey Goodell wrote:
>In an effort to simplify and consolidate my computing infrastructure, I
>am collapsing the two web servers running on serifos.eecs.harvard.edu
>into a single web server. Effective immediately,
>serifos.eecs.harvard.edu:8000 is deprecated in favor of
>serifos.eecs.harvard.edu:80. Please migrate your links and automated
>scripts for harvesting content on serifos.eecs.harvard.edu:8000.
>
>In particular, the following URL:
>
>http://serifos.eecs.harvard.edu:8000/cgi-bin/exit.pl
>
>is deprecated in favor of:
>
>http://serifos.eecs.harvard.edu/cgi-bin/exit.pl
>
>For now, both URLs work. I plan to disable the server on port 8000 one
>week from today, 19 Jaunary 2006.
>
>Thank you for understanding, and I apologize for the inconvenience.
>
>Geoff
>
>
could you not simply create a redirector that pushes stuff from 8000
onto 80... oh, i may me remembering incorrectly, but can't apache be
told to listen on more than one port anyway? idk, sorry if i'm talking
out my ass.
From goodell at eecs.harvard.edu Thu Jan 12 21:46:40 2006
From: goodell at eecs.harvard.edu (Geoffrey Goodell)
Date: Thu, 12 Jan 2006 16:46:40 -0500
Subject: migrating exit.pl from serifos:8000 to serifos:80
In-Reply-To: <43C6CC7F.6060002@ml1.net>
References: <20060112160237.GG2367@eecs.harvard.edu> <43C6CC7F.6060002@ml1.net>
Message-ID: <20060112214640.GB10018@eecs.harvard.edu>
On Thu, Jan 12, 2006 at 10:39:11PM +0100, Glymr Darkmoon wrote:
> could you not simply create a redirector that pushes stuff from 8000
> onto 80... oh, i may me remembering incorrectly, but can't apache be
> told to listen on more than one port anyway? idk, sorry if i'm talking
> out my ass.
Yes, of course, and this is in fact what I am doing right now. But
ultimately I want port 8000 to be free for other purposes, and I do not
want my dependency on port 8000 to become a permanent tombstone in my
system as the result of an historical decision.
Geoff
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From glymr_darkmoon at ml1.net Thu Jan 12 21:54:00 2006
From: glymr_darkmoon at ml1.net (Glymr Darkmoon)
Date: Thu, 12 Jan 2006 22:54:00 +0100
Subject: migrating exit.pl from serifos:8000 to serifos:80
In-Reply-To: <20060112214640.GB10018@eecs.harvard.edu>
References: <20060112160237.GG2367@eecs.harvard.edu> <43C6CC7F.6060002@ml1.net> <20060112214640.GB10018@eecs.harvard.edu>
Message-ID: <43C6CFF8.1090106@ml1.net>
Geoffrey Goodell wrote:
>On Thu, Jan 12, 2006 at 10:39:11PM +0100, Glymr Darkmoon wrote:
>
>
>>could you not simply create a redirector that pushes stuff from 8000
>>onto 80... oh, i may me remembering incorrectly, but can't apache be
>>told to listen on more than one port anyway? idk, sorry if i'm talking
>>out my ass.
>>
>>
>
>Yes, of course, and this is in fact what I am doing right now. But
>ultimately I want port 8000 to be free for other purposes, and I do not
>want my dependency on port 8000 to become a permanent tombstone in my
>system as the result of an historical decision.
>
>Geoff
>
>
ah, pardon my stupidity :/ yes of course, port 8000 being the port for
shoutcast of course, for one example
From arma at mit.edu Thu Jan 12 22:04:52 2006
From: arma at mit.edu (Roger Dingledine)
Date: Thu, 12 Jan 2006 17:04:52 -0500
Subject: Tor 0.1.1.12-alpha is out
In-Reply-To: <87bcf3800601120712o7ab776f0ye26c73041a570646@mail.gmail.com>
References: <20060112053209.GQ15075@localhost.localdomain> <87bcf3800601120712o7ab776f0ye26c73041a570646@mail.gmail.com>
Message-ID: <20060112220452.GH15157@localhost.localdomain>
On Thu, Jan 12, 2006 at 11:12:16PM +0800, Moses wrote:
> Thank you for your work :)
>
> BTW: Where's your PGP key?
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#DistSignatures
--Roger
From goodell at eecs.harvard.edu Fri Jan 13 04:31:47 2006
From: goodell at eecs.harvard.edu (Geoffrey Goodell)
Date: Thu, 12 Jan 2006 23:31:47 -0500
Subject: using OzymanDNS to access Tor via DNS
Message-ID: <20060113043147.GB10646@eecs.harvard.edu>
Since we have been discussing ways for people with limited Internet
access to make use of Tor, I decided to run a service on one of my hosts
that provides a free gateway to Tor via OzymanDNS. I posted a web page
about it here:
http://afs.eecs.harvard.edu/~goodell/blossom/tor-via-dns.html
Please check it out and send me comments. Here is the overview:
Thanks to a nifty tool from Dan Kaminsky called OzymanDNS, we have
successfully constructed a gateway to the Tor network that allows an
arbitrary host to establish a secure connection to the Tor network even
if its upstream ISP filters all traffic except DNS requests. We provide
access to this gateway as a free service.
This means that if you and your laptop find yourselves in an environment
that forbids you from communicating with the Internet except to send and
receive DNS data, then you can still access network resources visible
via the Tor network. Performance is limited to a maximum of about 1.7
kB/s, which is comparable to the speed of a 14.4 kbps modem.
Thanks,
Geoff
[bcc]
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From force44 at Safe-mail.net Fri Jan 13 05:48:18 2006
From: force44 at Safe-mail.net (force44 at Safe-mail.net)
Date: Fri, 13 Jan 2006 00:48:18 -0500
Subject: Error messages in Tor
Message-ID:
Hi everybody,
I receive regular error messages :
"Error writing router store to disk"
"Error replacing "[mypath]/cached-routers.new": File exists"
"Error replacing "[mypath]/cached-routers": File exists"
"Error replacing "[mypath]/cached-routers.new": Permission denied"
I am using WinXP...
Despite this, it seems that TOR is running well, using the last Alfa, and
the last TorCP interface.
Thanks for your comments :)
From cwilson352 at cogeco.ca Fri Jan 13 06:21:18 2006
From: cwilson352 at cogeco.ca (Wilson)
Date: Fri, 13 Jan 2006 01:21:18 -0500
Subject: TorDNS security issue resolved
Message-ID: <43C746DE.5070301@cogeco.ca>
I was watching my isp interfere with TorDNS. Was watching them do so
four 3 or 4 weeks now.
When I would be using firefox to browse, once in a blue moon my isp name
was found in the TorDNS log screen, and the website would not be
resolved. The instructions for fixing this (I hope this will perminantly
stop your isp from interfering with TorDNS on your windows box) can be found
on the TorDNS website under "READ THIS...".... Also, I have released
TorDNS beta 4, hopefully I have fixed all the major bug issues. Website
is below............
http://sandos.ath.cx/~badger/tordns.html
From tor at tracker.fire-world.de Fri Jan 13 16:33:29 2006
From: tor at tracker.fire-world.de (Sebastian Wiesinger)
Date: Fri, 13 Jan 2006 17:33:29 +0100
Subject: Errors/Warnings in Tor 0.1.1.12-alpha
Message-ID: <20060113163329.GA7948@data.fire-world.de>
Hi,
I have the following warnings with the new alpha:
Jan 13 16:40:13.852 [notice] entry_guards_set_status_from_directory(): Entry guard 'err' is up in latest directories.
Jan 13 16:40:13.852 [notice] entry_guards_set_status_from_directory(): (5/5 entry guards are usable/new)
Jan 13 16:46:32.961 [warn] entry_guard_set_status(): Connection to entry guard 'err' failed. 4/5 entry guards usable/new.
Jan 13 16:55:29.450 [notice] entry_guards_set_status_from_directory(): Entry guard 'err' is up in latest directories.
Jan 13 16:55:29.450 [notice] entry_guards_set_status_from_directory(): (5/5 entry guards are usable/new)
Jan 13 16:58:17.412 [warn] entry_guard_set_status(): Connection to entry guard 'err' failed. 4/5 entry guards usable/new.
Jan 13 17:10:43.352 [notice] entry_guards_set_status_from_directory(): Entry guard 'err' is up in latest directories.
Jan 13 17:10:43.352 [notice] entry_guards_set_status_from_directory(): (5/5 entry guards are usable/new)
Jan 13 17:18:53.981 [notice] conn_close_if_marked(): Something wrong with your network connection? We tried to write 118784 bytes to addr [scrubbed] (fd 197, type OR, state 5) but timed out. (Marked at main.c:672)
Jan 13 17:26:24.616 [warn] entry_guard_set_status(): Connection to entry guard 'err' failed. 4/5 entry guards usable/new.
Is that something that should bother me?
"Something wrong with your network connection?"
No, surely not, tor was running fine here for months. :)
Regards,
Sebastian
--
GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
Wehret den Anfaengen: http://odem.org/informationsfreiheit/
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant
From listpost at bananasplit.info Fri Jan 13 16:47:28 2006
From: listpost at bananasplit.info (Steve Crook)
Date: Fri, 13 Jan 2006 16:47:28 +0000
Subject: Errors/Warnings in Tor 0.1.1.12-alpha
In-Reply-To: <20060113163329.GA7948@data.fire-world.de>
References: <20060113163329.GA7948@data.fire-world.de>
Message-ID: <20060113164728.GA32394@bananasplit.info>
On Fri, Jan 13, 2006 at 05:33:29PM +0100, Sebastian Wiesinger wrote:
> Hi,
>
> I have the following warnings with the new alpha:
>
> Jan 13 16:40:13.852 [notice] entry_guards_set_status_from_directory(): Entry guard 'err' is up in latest directories.
> Jan 13 16:40:13.852 [notice] entry_guards_set_status_from_directory(): (5/5 entry guards are usable/new)
> Jan 13 16:46:32.961 [warn] entry_guard_set_status(): Connection to entry guard 'err' failed. 4/5 entry guards usable/new.
> Jan 13 16:55:29.450 [notice] entry_guards_set_status_from_directory(): Entry guard 'err' is up in latest directories.
Hi,
You might want to check out:-
http://wiki.noreply.org/noreply/TheOnionRouter/LogExplanations
I haven't documented many warnings yet, but that's one of them. :)
From afpno69 at yahoo.se Fri Jan 13 20:43:04 2006
From: afpno69 at yahoo.se (Player69)
Date: Fri, 13 Jan 2006 21:43:04 +0100 (CET)
Subject: Tor uninstaller for Mac OS X as requested
Message-ID: <20060113204304.73217.qmail@web25602.mail.ukl.yahoo.com>
I read here:
http://tor.eff.org/volunteer.html.en
that a Tor uninstaller for Mac OS X was wanted.
So I did one.
It's only a shell script but it will do the trick. :)
It removes all files specified here:
http://tor.eff.org/cvs/tor/doc/tor-doc-osx.html#uninstall
It would be great if somebody would like to try it out
and give me some feedback :)
http://www.kabo.nu/Tor_uninstall.command.zip
/Calle Kabo
From alexismanning at hotpop.com Mon Jan 2 14:17:32 2006
From: alexismanning at hotpop.com (Alexis Manning)
Date: Mon, 2 Jan 2006 14:17:32 -0000
Subject: Dealing with bad Tor nodes
References: <004d01c60fa2$87d0e250$1901a8c0@fishtest> <43B92EA1.4010905@onionizer.de>
Message-ID: <007c01c60fa7$48292950$1901a8c0@fishtest>
> A way to deal with this could be the following:
>
> always build two node-chains and compare the results...
> this could also help to detect nodes wich manipulate data....
That's not a bad idea, but obviously you wouldn't want to do that on every
request.
Perhaps the client could do a restricted number of tests like this per day,
and perhaps test the exit nodes directly once a day or so when the client is
idle?
Currently I have to keep manually stopping and restarting Tor, which I find
quite aggravating.
-- A.
From eugen at leitl.org Mon Jan 16 14:47:07 2006
From: eugen at leitl.org (Eugen Leitl)
Date: Mon, 16 Jan 2006 15:47:07 +0100
Subject: WIRED: Anonymity on a Disk
Message-ID: <20060116144707.GQ2301@leitl.org>
http://www.wired.com/news/technology/0,70017-0.html?tw=wn_tophead_1
By Quinn Norton | Also by this reporter
WASHINGTON DC -- To many privacy geeks, it's the holy grail -- a totally anonymous and secure computer so easy to use you can hand it to your grandmother and send her off on her own to the local Starbucks.
That was the guiding principle for the members of kaos.theory security research
when they set out to put a secure crypto-heavy operating systems on a bootable CD: a disk that would offer the masses the same level of privacy available to security professionals, but with an easy user interface.
"If Granny's into trannies, and doesn't want her grandkids to know, she should be able to download without fear," says Taylor Banks, project leader.
It's a difficult problem, entailing a great deal of attention to both security details and usability issues. The group finally unveiled their finished product at the Shmoo Con hacker conference here Saturday, with mixed results.
Titled Anonym.OS, the system is a type of disk called a "live CD" -- meaning it's a complete solution for using a computer without touching the hard drive. Developers say Anonym.OS is likely the first live CD based on the security-heavy OpenBSD operating system.
OpenBSD running in secure mode is relatively rare among desktop users. So to keep from standing out, Anonym.OS leaves a deceptive network fingerprint. In everything from the way it actively reports itself to other computers, to matters of technical minutia such as TCP packet length, the system is designed to look like Windows XP SP1. "We considered part of what makes a system anonymous is looking like what is most popular, so you blend in with the crowd," explains project developer Adam Bregenzer of Super Light Industry.
Booting the CD, you are presented with a text based wizard-style list of questions to answer, one at a time, with defaults that will work for most users. Within a few moments, a fairly naive user can be up and running and connected to an open Wi-Fi point, if one is available.
Once you're running, you have a broad range of anonymity-protecting applications at your disposal.
But actually using the system can be a slow experience. Anonym.OS makes extensive use of Tor, the onion routing network that relies on an array of servers passing encrypted traffic to permit untraceable surfing. Sadly, Tor has recently suffered from user-base growth far outpacing the number of servers available to those users -- at last count there were only 419 servers worldwide. So Tor lags badly at times of heavy use.
Between Tor's problems, and some nagging performance issues on the disk itself, Banks concedes that the CD is not yet ready for the wide audience he hopes to someday serve. "Is Grandma really going to be able to use it today? I don't know. If she already uses the internet, yes."
Experts also say Anonym.OS may not solve the internet's most pressing issues, such as the notorious China problem: repressive governments that monitor their population's net access, and censor or jail citizens who speak out against the government.
Ethan Zuckerman, fellow with Harvard's Berkman Center for Internet and Society, works extensively with international bloggers and journalists, many of whom live under constant threat from their own governments. He see Anonym.OS as a blessing for some -- but not for those at the greatest risk.
"I think it's going to be tremendously useful for fairly sophisticated users when they are traveling, but where it may not be as effective as people would hope is in counties where the government is really seriously about locking down the net, constraining internet access," Zuckerman says.
Because most people in the developing world use the internet from shared desktop environments, services for them have to consider office place and cyber cafe-based computer situations. "Rebooting isn't often an option," explains Zuckerman, who would like to see anonymity solutions move toward minimally invasive strategies like the TorPark, a USB key that allows access to a Tor enabled browser without rebooting, and private proxies matched up one by one with dissidents.
But kaos.theory members say Anonym.OS is just the first step in making anonymity widely available. Future versions, they say, may run on a USB keychain. Additionally, they plan to implement Enigmail to allow encrypted e-mail for Thunderbird and Gaim Off The Record, which allows users to use instant messaging without their logs being tied to them.
David Del Torto, chief security officer of the non-profit CryptoRights group, says projects like Anonym.OS are heading in the right direction, but thinks the project overreaches by trying to be useful to everyone. "Grandmas are not the ones that need this right now.... My instincts tell me that it's a very small number of people (that can use Anonym.OS). You can't really solve this problem by simplifying the interface. It's almost impossible to anticipate everything a user can do to hurt themselves."
--
Eugen* Leitl leitl http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From y0himba at technolounge.org Mon Jan 16 14:53:41 2006
From: y0himba at technolounge.org (y0himba)
Date: Mon, 16 Jan 2006 09:53:41 -0500
Subject: WIRED: Anonymity on a Disk
In-Reply-To: <20060116144707.GQ2301@leitl.org>
Message-ID: <005001c61aac$a499ae70$6400a8c0@y0himba>
You know what, you go to their web site, and it is the exact same web site
template my daughter uses. That sends up flags right there....
-----Original Message-----
From: owner-or-talk at freehaven.net [mailto:owner-or-talk at freehaven.net] On
Behalf Of Eugen Leitl
Sent: Monday, January 16, 2006 9:47 AM
To: or-talk at freehaven.net
Cc: cypherpunks at al-qaeda.net
Subject: WIRED: Anonymity on a Disk
http://www.wired.com/news/technology/0,70017-0.html?tw=wn_tophead_1
By Quinn Norton | Also by this reporter
WASHINGTON DC -- To many privacy geeks, it's the holy grail -- a totally
anonymous and secure computer so easy to use you can hand it to your
grandmother and send her off on her own to the local Starbucks.
That was the guiding principle for the members of kaos.theory security
research
when they set out to put a secure crypto-heavy operating systems on a
bootable CD: a disk that would offer the masses the same level of privacy
available to security professionals, but with an easy user interface.
"If Granny's into trannies, and doesn't want her grandkids to know, she
should be able to download without fear," says Taylor Banks, project leader.
It's a difficult problem, entailing a great deal of attention to both
security details and usability issues. The group finally unveiled their
finished product at the Shmoo Con hacker conference here Saturday, with
mixed results.
Titled Anonym.OS, the system is a type of disk called a "live CD" -- meaning
it's a complete solution for using a computer without touching the hard
drive. Developers say Anonym.OS is likely the first live CD based on the
security-heavy OpenBSD operating system.
OpenBSD running in secure mode is relatively rare among desktop users. So to
keep from standing out, Anonym.OS leaves a deceptive network fingerprint. In
everything from the way it actively reports itself to other computers, to
matters of technical minutia such as TCP packet length, the system is
designed to look like Windows XP SP1. "We considered part of what makes a
system anonymous is looking like what is most popular, so you blend in with
the crowd," explains project developer Adam Bregenzer of Super Light
Industry.
Booting the CD, you are presented with a text based wizard-style list of
questions to answer, one at a time, with defaults that will work for most
users. Within a few moments, a fairly naive user can be up and running and
connected to an open Wi-Fi point, if one is available.
Once you're running, you have a broad range of anonymity-protecting
applications at your disposal.
But actually using the system can be a slow experience. Anonym.OS makes
extensive use of Tor, the onion routing network that relies on an array of
servers passing encrypted traffic to permit untraceable surfing. Sadly, Tor
has recently suffered from user-base growth far outpacing the number of
servers available to those users -- at last count there were only 419
servers worldwide. So Tor lags badly at times of heavy use.
Between Tor's problems, and some nagging performance issues on the disk
itself, Banks concedes that the CD is not yet ready for the wide audience he
hopes to someday serve. "Is Grandma really going to be able to use it today?
I don't know. If she already uses the internet, yes."
Experts also say Anonym.OS may not solve the internet's most pressing
issues, such as the notorious China problem: repressive governments that
monitor their population's net access, and censor or jail citizens who speak
out against the government.
Ethan Zuckerman, fellow with Harvard's Berkman Center for Internet and
Society, works extensively with international bloggers and journalists, many
of whom live under constant threat from their own governments. He see
Anonym.OS as a blessing for some -- but not for those at the greatest risk.
"I think it's going to be tremendously useful for fairly sophisticated users
when they are traveling, but where it may not be as effective as people
would hope is in counties where the government is really seriously about
locking down the net, constraining internet access," Zuckerman says.
Because most people in the developing world use the internet from shared
desktop environments, services for them have to consider office place and
cyber cafe-based computer situations. "Rebooting isn't often an option,"
explains Zuckerman, who would like to see anonymity solutions move toward
minimally invasive strategies like the TorPark, a USB key that allows access
to a Tor enabled browser without rebooting, and private proxies matched up
one by one with dissidents.
But kaos.theory members say Anonym.OS is just the first step in making
anonymity widely available. Future versions, they say, may run on a USB
keychain. Additionally, they plan to implement Enigmail to allow encrypted
e-mail for Thunderbird and Gaim Off The Record, which allows users to use
instant messaging without their logs being tied to them.
David Del Torto, chief security officer of the non-profit CryptoRights
group, says projects like Anonym.OS are heading in the right direction, but
thinks the project overreaches by trying to be useful to everyone. "Grandmas
are not the ones that need this right now.... My instincts tell me that it's
a very small number of people (that can use Anonym.OS). You can't really
solve this problem by simplifying the interface. It's almost impossible to
anticipate everything a user can do to hurt themselves."
--
Eugen* Leitl leitl http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
From y0himba at technolounge.org Mon Jan 16 15:07:37 2006
From: y0himba at technolounge.org (y0himba)
Date: Mon, 16 Jan 2006 10:07:37 -0500
Subject: WIRED: Anonymity on a Disk
In-Reply-To: <20060116144707.GQ2301@leitl.org>
Message-ID: <005101c61aae$96f491c0$6400a8c0@y0himba>
Also, the file is not downloadable from Sourceforge.
-----Original Message-----
From: owner-or-talk at freehaven.net [mailto:owner-or-talk at freehaven.net] On
Behalf Of Eugen Leitl
Sent: Monday, January 16, 2006 9:47 AM
To: or-talk at freehaven.net
Cc: cypherpunks at al-qaeda.net
Subject: WIRED: Anonymity on a Disk
http://www.wired.com/news/technology/0,70017-0.html?tw=wn_tophead_1
By Quinn Norton | Also by this reporter
WASHINGTON DC -- To many privacy geeks, it's the holy grail -- a totally
anonymous and secure computer so easy to use you can hand it to your
grandmother and send her off on her own to the local Starbucks.
That was the guiding principle for the members of kaos.theory security
research
when they set out to put a secure crypto-heavy operating systems on a
bootable CD: a disk that would offer the masses the same level of privacy
available to security professionals, but with an easy user interface.
"If Granny's into trannies, and doesn't want her grandkids to know, she
should be able to download without fear," says Taylor Banks, project leader.
It's a difficult problem, entailing a great deal of attention to both
security details and usability issues. The group finally unveiled their
finished product at the Shmoo Con hacker conference here Saturday, with
mixed results.
Titled Anonym.OS, the system is a type of disk called a "live CD" -- meaning
it's a complete solution for using a computer without touching the hard
drive. Developers say Anonym.OS is likely the first live CD based on the
security-heavy OpenBSD operating system.
OpenBSD running in secure mode is relatively rare among desktop users. So to
keep from standing out, Anonym.OS leaves a deceptive network fingerprint. In
everything from the way it actively reports itself to other computers, to
matters of technical minutia such as TCP packet length, the system is
designed to look like Windows XP SP1. "We considered part of what makes a
system anonymous is looking like what is most popular, so you blend in with
the crowd," explains project developer Adam Bregenzer of Super Light
Industry.
Booting the CD, you are presented with a text based wizard-style list of
questions to answer, one at a time, with defaults that will work for most
users. Within a few moments, a fairly naive user can be up and running and
connected to an open Wi-Fi point, if one is available.
Once you're running, you have a broad range of anonymity-protecting
applications at your disposal.
But actually using the system can be a slow experience. Anonym.OS makes
extensive use of Tor, the onion routing network that relies on an array of
servers passing encrypted traffic to permit untraceable surfing. Sadly, Tor
has recently suffered from user-base growth far outpacing the number of
servers available to those users -- at last count there were only 419
servers worldwide. So Tor lags badly at times of heavy use.
Between Tor's problems, and some nagging performance issues on the disk
itself, Banks concedes that the CD is not yet ready for the wide audience he
hopes to someday serve. "Is Grandma really going to be able to use it today?
I don't know. If she already uses the internet, yes."
Experts also say Anonym.OS may not solve the internet's most pressing
issues, such as the notorious China problem: repressive governments that
monitor their population's net access, and censor or jail citizens who speak
out against the government.
Ethan Zuckerman, fellow with Harvard's Berkman Center for Internet and
Society, works extensively with international bloggers and journalists, many
of whom live under constant threat from their own governments. He see
Anonym.OS as a blessing for some -- but not for those at the greatest risk.
"I think it's going to be tremendously useful for fairly sophisticated users
when they are traveling, but where it may not be as effective as people
would hope is in counties where the government is really seriously about
locking down the net, constraining internet access," Zuckerman says.
Because most people in the developing world use the internet from shared
desktop environments, services for them have to consider office place and
cyber cafe-based computer situations. "Rebooting isn't often an option,"
explains Zuckerman, who would like to see anonymity solutions move toward
minimally invasive strategies like the TorPark, a USB key that allows access
to a Tor enabled browser without rebooting, and private proxies matched up
one by one with dissidents.
But kaos.theory members say Anonym.OS is just the first step in making
anonymity widely available. Future versions, they say, may run on a USB
keychain. Additionally, they plan to implement Enigmail to allow encrypted
e-mail for Thunderbird and Gaim Off The Record, which allows users to use
instant messaging without their logs being tied to them.
David Del Torto, chief security officer of the non-profit CryptoRights
group, says projects like Anonym.OS are heading in the right direction, but
thinks the project overreaches by trying to be useful to everyone. "Grandmas
are not the ones that need this right now.... My instincts tell me that it's
a very small number of people (that can use Anonym.OS). You can't really
solve this problem by simplifying the interface. It's almost impossible to
anticipate everything a user can do to hurt themselves."
--
Eugen* Leitl leitl http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
From alok.mishra at imperial.ac.uk Mon Jan 16 15:13:11 2006
From: alok.mishra at imperial.ac.uk (Alok Mishra)
Date: Mon, 16 Jan 2006 15:13:11 +0000
Subject: Tor reputation system
Message-ID: <43CBB807.2030809@imperial.ac.uk>
I was looking at the design paper on Tor. I was thinking that one
problem with malicious node might be that they would advertise their
services and when the directory servers attempt to connect to them they
reply fine but any other request is totally ignored. Since directory
servers can't afford to try passing traffic through so many nodes to
ensure that they are functional, do we need some kind of a reputation
mechanism that will collect evidence from each of the OPs that
successfully (or not) can complete their transaction.
From nickm at freehaven.net Mon Jan 16 19:36:44 2006
From: nickm at freehaven.net (Nick Mathewson)
Date: Mon, 16 Jan 2006 14:36:44 -0500
Subject: Tor reputation system
In-Reply-To: <43CBB807.2030809@imperial.ac.uk>
References: <43CBB807.2030809@imperial.ac.uk>
Message-ID: <20060116193644.GA3783@totoro.wangafu.net>
On Mon, Jan 16, 2006 at 03:13:11PM +0000, Alok Mishra wrote:
> I was looking at the design paper on Tor. I was thinking that one
> problem with malicious node might be that they would advertise their
> services and when the directory servers attempt to connect to them they
> reply fine but any other request is totally ignored.
Yes, this is a fine attack. It's similar to some described in
http://freehaven.net/anonbib/topic.html#mix-acc
http://freehaven.net/anonbib/topic.html#casc-rep
Right now, though, we don't do anything to automate testing for
complex failure modes.
--
Nick Mathewson
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 652 bytes
Desc: not available
URL:
From digi_news at gmx.de Tue Jan 17 10:33:15 2006
From: digi_news at gmx.de (Oliver Niesner)
Date: Tue, 17 Jan 2006 11:33:15 +0100
Subject: You think you can hide your ip?
Message-ID: <43CCC7EB.2090901@gmx.de>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
...not if you have java enabled check this out!
> http://www.inet-police.com/cgi-bin/env.cgi
Does anyone know a way to check sites for such applets?
Or is the only way to disable java, which surely breaks
some of our favorite sites :-/
Oliver
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org
iD8DBQFDzMfq724ZL5LNhNcRAutfAJ9pMcmqwDtFXG3OTYqTcJ5ttkaV3wCeJtwk
mAN1czrsiwKWGOo6/kucF3Q=
=4s2N
-----END PGP SIGNATURE-----
From listpost at bananasplit.info Tue Jan 17 11:16:55 2006
From: listpost at bananasplit.info (Steve Crook)
Date: Tue, 17 Jan 2006 11:16:55 +0000
Subject: You think you can hide your ip?
In-Reply-To: <43CCC7EB.2090901@gmx.de>
References: <43CCC7EB.2090901@gmx.de>
Message-ID: <20060117111655.GA3236@bananasplit.info>
On Tue, Jan 17, 2006 at 11:33:15AM +0100, Oliver Niesner wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> ...not if you have java enabled check this out!
>
> > http://www.inet-police.com/cgi-bin/env.cgi
>
> Does anyone know a way to check sites for such applets?
> Or is the only way to disable java, which surely breaks
> some of our favorite sites :-/
Hi Oliver,
I use a combination of two Firefox plugins to gain granular control over
what scripts are allowed to run.
First of all, NoScript is a good tool for blocking all scripts by
default. It then allows me to whitelist specific url's where I have
confidence in the source.
The other tool I use is Adblock which allows me to blacklist any
component on a webpage. This is useful for all those sites where the
content is in plain html put there are advertising scripts all over the
place. It supports basic regex so I can (for example) blacklist any
link that contains 'doubleclick'.
I'm sure there are plenty of other scripts doing similar jobs, but these
two happen to coexist quite happily in my experience. Running them
along side SwitchProxy also doesn't cause me any issues.
HTH
From or at inbox.org Tue Jan 17 11:19:13 2006
From: or at inbox.org (Anthony DiPierro)
Date: Tue, 17 Jan 2006 06:19:13 -0500
Subject: You think you can hide your ip?
In-Reply-To: <43CCC7EB.2090901@gmx.de>
References: <43CCC7EB.2090901@gmx.de>
Message-ID: <71cd4dd90601170319q7eec28dchd1c5905a7e9d0145@mail.gmail.com>
On 1/17/06, Oliver Niesner wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> ...not if you have java enabled check this out!
>
> > http://www.inet-police.com/cgi-bin/env.cgi
>
> Does anyone know a way to check sites for such applets?
> Or is the only way to disable java, which surely breaks
> some of our favorite sites :-/
>
>
> Oliver
I'm assuming what is being done is that java is being used to connect
back to the site - this will reveal the IP address because java
doesn't go through the proxy.
I looked really quickly, and there doesn't seem to be an easy way to
disable just this one java feature (to make TCP connections) without
disabling java completely (at least not on firefox, there *might* be a
way to do it on IE which has differing java security levels, but I
didn't really look into it because I don't really use IE with tor).
Another option would be some sort of restrictive firewall. There is
software for Unix and Windows that can restrict the ability to make
connections on a program by program basis. Limit connections only to
Tor and you know you won't make any leaks (this could be turned on and
off when switching Tor on and off).
Personally I have java on my firefox browser turned off, party for
security reasons and partly for performance reasons. I've found it
really doesn't affect many sites that I use. For those few sites it
does affect, I use IE. Now that I think about it there is likely a
firefox extension which can easily turn java on and off (maybe even on
a site-by-site whitelist basis), though until Interactive Brokers
decides to support something other than IE (or someone else offers $1
stock trades) I'm kind of stuck.
I'm curious, what are the favorite sites you have which insist on
java? The only one I really go to more than rarely is Yahoo Games,
and it's pretty obvious why they need java. Now if only there were
enough sites which don't require javascript...
From maillist at piirakka.com Tue Jan 17 11:24:14 2006
From: maillist at piirakka.com (M)
Date: Tue, 17 Jan 2006 13:24:14 +0200
Subject: You think you can hide your ip?
References: <43CCC7EB.2090901@gmx.de>
Message-ID: <002801c61b58$8c51a230$0a0aa8c0@none>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi
I'm transparently routing all traffic from my workstation to internet via
Tor, that solves the problem. I'm using Firefox, Privoxy and java is
enabled.
M
- ----- Original Message -----
From: "Oliver Niesner"
To: "or"
Sent: Tuesday, January 17, 2006 12:33 PM
Subject: You think you can hide your ip?
>
> ...not if you have java enabled check this out!
>
>> http://www.inet-police.com/cgi-bin/env.cgi
>
> Does anyone know a way to check sites for such applets?
> Or is the only way to disable java, which surely breaks
> some of our favorite sites :-/
>
>
> Oliver
>
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
Comment: GnuPT 2.7.2
iD8DBQFDzNPj6fSN8IKlpYoRAkAiAJkBpvnbKrjKpFMn+lCrxqihmyM/iACcDZkO
D8HLvKVHZTmrNy9uP9s0NyU=
=4doF
-----END PGP SIGNATURE-----
From cwilson352 at cogeco.ca Tue Jan 17 13:47:52 2006
From: cwilson352 at cogeco.ca (Wilson)
Date: Tue, 17 Jan 2006 08:47:52 -0500
Subject: You think you can hide your ip?
In-Reply-To: <002801c61b58$8c51a230$0a0aa8c0@none>
References: <43CCC7EB.2090901@gmx.de> <002801c61b58$8c51a230$0a0aa8c0@none>
Message-ID: <43CCF588.8020109@cogeco.ca>
How the heck can you route all trafiic through Tor? I am wondering
because I would like to do that myself.......
M wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi
> I'm transparently routing all traffic from my workstation to internet via
> Tor, that solves the problem. I'm using Firefox, Privoxy and java is
> enabled.
>
>
> M
>
>
>
> - ----- Original Message -----
> From: "Oliver Niesner"
> To: "or"
> Sent: Tuesday, January 17, 2006 12:33 PM
> Subject: You think you can hide your ip?
>
>
>>
>> ...not if you have java enabled check this out!
>>
>>> http://www.inet-police.com/cgi-bin/env.cgi
>>
>>
>> Does anyone know a way to check sites for such applets?
>> Or is the only way to disable java, which surely breaks
>> some of our favorite sites :-/
>>
>>
>> Oliver
>>
>>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
> Comment: GnuPT 2.7.2
>
> iD8DBQFDzNPj6fSN8IKlpYoRAkAiAJkBpvnbKrjKpFMn+lCrxqihmyM/iACcDZkO
> D8HLvKVHZTmrNy9uP9s0NyU=
> =4doF
> -----END PGP SIGNATURE-----
>
From arma at mit.edu Mon Jan 2 14:28:30 2006
From: arma at mit.edu (Roger Dingledine)
Date: Mon, 2 Jan 2006 09:28:30 -0500
Subject: Dealing with bad Tor nodes
In-Reply-To: <004d01c60fa2$87d0e250$1901a8c0@fishtest>
References: <004d01c60fa2$87d0e250$1901a8c0@fishtest>
Message-ID: <20060102142830.GA15157@localhost.localdomain>
On Mon, Jan 02, 2006 at 01:43:33PM -0000, Alexis Manning wrote:
> I hit a lot of 404s because the path I'm going through has a knackered node.
Upgrade to the latest 0.1.1.x-alpha and you should see some marked
improvement.
The upcoming 0.1.0.16 release has several backports from the 0.1.1.x
tree that should make it behave better too.
--Roger
From glymr_darkmoon at ml1.net Tue Jan 17 14:05:00 2006
From: glymr_darkmoon at ml1.net (glymr)
Date: Wed, 18 Jan 2006 00:05:00 +1000
Subject: You think you can hide your ip?
In-Reply-To: <43CCF588.8020109@cogeco.ca>
References: <43CCC7EB.2090901@gmx.de> <002801c61b58$8c51a230$0a0aa8c0@none> <43CCF588.8020109@cogeco.ca>
Message-ID: <43CCF98C.2090805@ml1.net>
using a router box with iptables does the trick i believe
Wilson wrote:
> How the heck can you route all trafiic through Tor? I am wondering
> because I would like to do that myself.......
>
>
> M wrote:
>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> Hi
>> I'm transparently routing all traffic from my workstation to internet
>> via
>> Tor, that solves the problem. I'm using Firefox, Privoxy and java is
>> enabled.
>>
>>
>> M
>>
>>
>>
>> - ----- Original Message -----
>> From: "Oliver Niesner"
>> To: "or"
>> Sent: Tuesday, January 17, 2006 12:33 PM
>> Subject: You think you can hide your ip?
>>
>>
>>>
>>> ...not if you have java enabled check this out!
>>>
>>>> http://www.inet-police.com/cgi-bin/env.cgi
>>>
>>>
>>>
>>> Does anyone know a way to check sites for such applets?
>>> Or is the only way to disable java, which surely breaks
>>> some of our favorite sites :-/
>>>
>>>
>>> Oliver
>>>
>>>
>>
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
>> Comment: GnuPT 2.7.2
>>
>> iD8DBQFDzNPj6fSN8IKlpYoRAkAiAJkBpvnbKrjKpFMn+lCrxqihmyM/iACcDZkO
>> D8HLvKVHZTmrNy9uP9s0NyU=
>> =4doF
>> -----END PGP SIGNATURE-----
>>
>
From maillist at piirakka.com Tue Jan 17 18:28:38 2006
From: maillist at piirakka.com (M)
Date: Tue, 17 Jan 2006 20:28:38 +0200
Subject: You think you can hide your ip?
References: <43CCC7EB.2090901@gmx.de> <002801c61b58$8c51a230$0a0aa8c0@none> <43CCF588.8020109@cogeco.ca>
Message-ID: <005b01c61b93$d5de5ca0$0a0aa8c0@none>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> How the heck can you route all trafiic through Tor? I am wondering because
> I would like to do that myself.......
You can do this by using a router box, iptables and some other software.
Found this from my sent emails (This isn't meant to be step-by-step howto,
just some pointers):
- --------------------------------------------------
I assume that you're familiar compiling stuff from source and so on...
First you must download and compile Dante, transocks needs some libraries
from it:
ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
(the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
and INSTALL, "./configure && make && make install")
I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't work
(transocks.c failed to compile against dante-1.1.15).
Download and compile transocks. I attached a simple patch by me to
transocks.c, it adds verbose option and some help, you can apply it by
"patch -p1 < transocks.patch" and when it asks a file to patch just type
path to transocks.c.
http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/
Compile transocks by typing "make" and copy freshly compiled transocks to
/usr/local/sbin/.
Install iptables if you already dont have it.
Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit your
needs.
Edit /etc/socks.conf to look like following:
route {
from: 0.0.0.0/0 to: 0.0.0.0/0 via: 192.168.10.1 port = 9050
proxyprotocol: socks_v4
method: none
protocol: tcp
}
Edit /etc/tor/torrc, change
SocksBindAddress 127.0.0.1
to
SocksBindAddress routers_local_ip
where routers_local_ip is your routers nics local address (LAN), example
192.168.1.1.
Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and test if
it works... I assume that you have working Tor installation.
If everything goes right I recommend that you install Privoxy and Squid for
http connections. I have following setup: for traffic going out to port 80
client -> squid -> privoxy -> tor, other ports are directed straight to Tor,
everything else is dropped. Privoxy filters out some bad javascript and
stuff that could break your privacy.
- ------------------------------------------------------
M
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
Comment: GnuPT 2.7.2
iD8DBQFDzTdX6fSN8IKlpYoRAl6aAJ9+3Ts+xQfAjnBASKETLRYNQqWEvwCdGXnC
y+wCBH991arTI+QoflFj8rs=
=lowO
-----END PGP SIGNATURE-----
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocksify.sh
Type: application/octet-stream
Size: 920 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocksify.sh.asc
Type: application/octet-stream
Size: 226 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocks.patch
Type: application/octet-stream
Size: 1066 bytes
Desc: not available
URL:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: transocks.patch.asc
Type: application/octet-stream
Size: 226 bytes
Desc: not available
URL:
From numE at onionizer.de Tue Jan 17 18:37:33 2006
From: numE at onionizer.de (numE)
Date: Tue, 17 Jan 2006 19:37:33 +0100
Subject: You think you can hide your ip?
In-Reply-To: <005b01c61b93$d5de5ca0$0a0aa8c0@none>
References: <43CCC7EB.2090901@gmx.de> <002801c61b58$8c51a230$0a0aa8c0@none> <43CCF588.8020109@cogeco.ca> <005b01c61b93$d5de5ca0$0a0aa8c0@none>
Message-ID: <43CD396D.4040706@onionizer.de>
Why not building a small linux system image for one of those embedded
systems?
i suggested this before..
(just copied from one of my old mails)
--
for example:
http://www.pcengines.ch/wrap.htm
(it is a little embedded pc - quite cheap - form factor of a normal home
use router)
wireless mini-pci cards are optional - so it could be used as a wireless
access point, too.
the whole thing should be configurable via webinterface, like for example
the m0n0wall linux firewall (they also use the wrap hardware):
(see here: http://m0n0.ch/wall/ )
features should include:
- webadministration
- possibility to run as server, client, hidden service (forward to local
network)
- built in proxy
- ...
- independent trust system (external directory service or something)
(if the box images would be precompiled they could be more trustworthy,
of course sources should be availiable, too)
only a quick idea - you probably have even more ideas...
perhaps we should look at the m0n0wall project... i think there are some
ideas realized, which could
be used for a tor-in-a-box project, too:
quoute from m0n0wall:
" m0n0wall is probably *the first UNIX system that has its boot-time
configuration done with PHP*,
rather than the usual shell scripts, and that has *the entire system
configuration stored in XML format*."
--
M schrieb:
> >> How the heck can you route all trafiic through Tor? I am wondering
> because
> >> I would like to do that myself.......
>
>
> You can do this by using a router box, iptables and some other software.
>
>
> Found this from my sent emails (This isn't meant to be step-by-step howto,
> just some pointers):
>
> --------------------------------------------------
> I assume that you're familiar compiling stuff from source and so on...
>
> First you must download and compile Dante, transocks needs some libraries
> from it:
> ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
> (the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
> and INSTALL, "./configure && make && make install")
>
> I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't
> work
> (transocks.c failed to compile against dante-1.1.15).
>
> Download and compile transocks. I attached a simple patch by me to
> transocks.c, it adds verbose option and some help, you can apply it by
> "patch -p1 < transocks.patch" and when it asks a file to patch just type
> path to transocks.c.
> http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/
>
> Compile transocks by typing "make" and copy freshly compiled transocks to
> /usr/local/sbin/.
>
> Install iptables if you already dont have it.
>
> Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit your
> needs.
>
> Edit /etc/socks.conf to look like following:
>
> route {
> from: 0.0.0.0/0 to: 0.0.0.0/0 via: 192.168.10.1 port = 9050
> proxyprotocol: socks_v4
> method: none
> protocol: tcp
> }
>
> Edit /etc/tor/torrc, change
>
> SocksBindAddress 127.0.0.1
> to
> SocksBindAddress routers_local_ip
>
> where routers_local_ip is your routers nics local address (LAN), example
> 192.168.1.1.
>
> Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and
> test if
> it works... I assume that you have working Tor installation.
>
> If everything goes right I recommend that you install Privoxy and
> Squid for
> http connections. I have following setup: for traffic going out to port 80
> client -> squid -> privoxy -> tor, other ports are directed straight
> to Tor,
> everything else is dropped. Privoxy filters out some bad javascript and
> stuff that could break your privacy.
> ------------------------------------------------------
>
> M
From firefox-gen at walala.org Tue Jan 17 20:23:58 2006
From: firefox-gen at walala.org (A. Bourdon)
Date: Tue, 17 Jan 2006 12:23:58 -0800
Subject: You think you can hide your ip?
In-Reply-To: <43CCC7EB.2090901@gmx.de>
References: <43CCC7EB.2090901@gmx.de>
Message-ID: <20060117122358.waf1czq1jdce80so@libertarianactivism.com>
The wiki talks about solving this problem with the Firefox NoScript
extension. I
should know, because I wrote it ;D
~ADB
Quoting Oliver Niesner :
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> ...not if you have java enabled check this out!
>
>> http://www.inet-police.com/cgi-bin/env.cgi
>
> Does anyone know a way to check sites for such applets?
> Or is the only way to disable java, which surely breaks
> some of our favorite sites :-/
>
>
> Oliver
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.6 (GNU/Linux)
> Comment: Using GnuPG with CentOS - http://enigmail.mozdev.org
>
> iD8DBQFDzMfq724ZL5LNhNcRAutfAJ9pMcmqwDtFXG3OTYqTcJ5ttkaV3wCeJtwk
> mAN1czrsiwKWGOo6/kucF3Q=
> =4s2N
> -----END PGP SIGNATURE-----
>
From zorba at pavlovian.net Tue Jan 17 18:24:49 2006
From: zorba at pavlovian.net (Ben Wilhelm)
Date: Tue, 17 Jan 2006 10:24:49 -0800
Subject: You think you can hide your ip?
In-Reply-To: <71cd4dd90601170319q7eec28dchd1c5905a7e9d0145@mail.gmail.com>
References: <43CCC7EB.2090901@gmx.de> <71cd4dd90601170319q7eec28dchd1c5905a7e9d0145@mail.gmail.com>
Message-ID: <43CD3671.7060505@pavlovian.net>
Anthony DiPierro wrote:
> Another option would be some sort of restrictive firewall. There is
> software for Unix and Windows that can restrict the ability to make
> connections on a program by program basis. Limit connections only to
> Tor and you know you won't make any leaks (this could be turned on and
> off when switching Tor on and off).
I've got my home network set up so that my "Tor-browsing box" simply
isn't allowed to go out to the internet. I've got a second computer that
runs Tor, and *it's* allowed to connect out. The browsing box has to
connect through it to get to the Internet in any way, which leaves me
neatly immune to the whole thing.
-Ben
From firefox-gen at walala.org Tue Jan 17 23:35:22 2006
From: firefox-gen at walala.org (Andrew Bourdon)
Date: Tue, 17 Jan 2006 18:35:22 -0500
Subject: Stop the Patriot Act Expansion
Message-ID: <200601172335.k0HNZMAu005345@action.downsizedc.org>
Stop the Patriot Act Expansion
Dear friend,
Congress is on the verge of expanding police-state powers, and making permanent others, under a new version of the Patriot Act. Please send Congress a message opposing this by clicking here: http://action.downsizedc.org/wyc.php?cid=31
Let's fire up the Patriot act resistance bandwagon yet again!
Come to DownsizeDC.org to learn more:
http://action.downsizedc.org/wyc.php?cid=31
From arrakistor at gmail.com Tue Jan 17 23:14:30 2006
From: arrakistor at gmail.com (Arrakistor)
Date: Tue, 17 Jan 2006 17:14:30 -0600
Subject: Stop the Patriot Act Expansion
In-Reply-To: <200601172335.k0HNZMAu005345@action.downsizedc.org>
References: <200601172335.k0HNZMAu005345@action.downsizedc.org>
Message-ID: <181994365.20060117171430@gmail.com>
Thank you Alex Jones!
> Stop the Patriot Act Expansion
> Dear friend,
> Congress is on the verge of expanding police-state powers, and
> making permanent others, under a new version of the Patriot Act.
> Please send Congress a message opposing this by clicking here:
> http://action.downsizedc.org/wyc.php?cid=31
> Let's fire up the Patriot act resistance bandwagon yet again!
> Come to DownsizeDC.org to learn more:
> http://action.downsizedc.org/wyc.php?cid=31
--
Best regards,
Arrakistor mailto:arrakistor at gmail.com
From cwilson352 at cogeco.ca Wed Jan 18 00:11:16 2006
From: cwilson352 at cogeco.ca (Wilson)
Date: Tue, 17 Jan 2006 19:11:16 -0500
Subject: You think you can hide your ip?
In-Reply-To: <005b01c61b93$d5de5ca0$0a0aa8c0@none>
References: <43CCC7EB.2090901@gmx.de> <002801c61b58$8c51a230$0a0aa8c0@none> <43CCF588.8020109@cogeco.ca> <005b01c61b93$d5de5ca0$0a0aa8c0@none>
Message-ID: <43CD87A4.9010901@cogeco.ca>
Thanks for the info M, but I am running windows ..... what you described
looked like it was for linux or something........Very interesting though :)
M wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
>> How the heck can you route all trafiic through Tor? I am wondering
>> because
>> I would like to do that myself.......
>
>
>
> You can do this by using a router box, iptables and some other software.
>
>
> Found this from my sent emails (This isn't meant to be step-by-step
> howto,
> just some pointers):
>
> - --------------------------------------------------
> I assume that you're familiar compiling stuff from source and so on...
>
> First you must download and compile Dante, transocks needs some libraries
> from it:
> ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
> (the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
> and INSTALL, "./configure && make && make install")
>
> I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't
> work
> (transocks.c failed to compile against dante-1.1.15).
>
> Download and compile transocks. I attached a simple patch by me to
> transocks.c, it adds verbose option and some help, you can apply it by
> "patch -p1 < transocks.patch" and when it asks a file to patch just type
> path to transocks.c.
> http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/
>
> Compile transocks by typing "make" and copy freshly compiled transocks to
> /usr/local/sbin/.
>
> Install iptables if you already dont have it.
>
> Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit
> your
> needs.
>
> Edit /etc/socks.conf to look like following:
>
> route {
> from: 0.0.0.0/0 to: 0.0.0.0/0 via: 192.168.10.1 port = 9050
> proxyprotocol: socks_v4
> method: none
> protocol: tcp
> }
>
> Edit /etc/tor/torrc, change
>
> SocksBindAddress 127.0.0.1
> to
> SocksBindAddress routers_local_ip
>
> where routers_local_ip is your routers nics local address (LAN), example
> 192.168.1.1.
>
> Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and
> test if
> it works... I assume that you have working Tor installation.
>
> If everything goes right I recommend that you install Privoxy and
> Squid for
> http connections. I have following setup: for traffic going out to
> port 80
> client -> squid -> privoxy -> tor, other ports are directed straight
> to Tor,
> everything else is dropped. Privoxy filters out some bad javascript and
> stuff that could break your privacy.
> - ------------------------------------------------------
>
> M
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
> Comment: GnuPT 2.7.2
>
> iD8DBQFDzTdX6fSN8IKlpYoRAl6aAJ9+3Ts+xQfAjnBASKETLRYNQqWEvwCdGXnC
> y+wCBH991arTI+QoflFj8rs=
> =lowO
> -----END PGP SIGNATURE-----
From firefox-gen at walala.org Wed Jan 18 05:09:45 2006
From: firefox-gen at walala.org (A. Bourdon)
Date: Tue, 17 Jan 2006 21:09:45 -0800
Subject: Stop the Patriot Act Expansion
In-Reply-To: <181994365.20060117171430@gmail.com>
References: <200601172335.k0HNZMAu005345@action.downsizedc.org>
<181994365.20060117171430@gmail.com>
Message-ID: <20060117210945.qhtqfhvi7rvcwoo0@libertarianactivism.com>
What does that freak have to do w/ anything? This is actually legit :D
~Andrew
Quoting Arrakistor :
> Thank you Alex Jones!
>
>
>> Stop the Patriot Act Expansion
>
>> Dear friend,
>
>> Congress is on the verge of expanding police-state powers, and
>> making permanent others, under a new version of the Patriot Act.
>> Please send Congress a message opposing this by clicking here:
>> http://action.downsizedc.org/wyc.php?cid=31
>
>> Let's fire up the Patriot act resistance bandwagon yet again!
>
>> Come to DownsizeDC.org to learn more:
>> http://action.downsizedc.org/wyc.php?cid=31
>
>
>
> --
> Best regards,
> Arrakistor mailto:arrakistor at gmail.com
>
>
From w9osxbh02 at sneakemail.com Wed Jan 18 09:15:51 2006
From: w9osxbh02 at sneakemail.com (w9osxbh02 at sneakemail.com)
Date: 18 Jan 2006 09:15:51 -0000
Subject: Anonym.OS
Message-ID: <6363-21942@sneakemail.com>
For those of you trying to download Anonym.OS from the Wired article, there's also the Bittorrent, which seems to work pretty quickly.
Mark
--------------------------------------
Protect yourself from spam,
use http://sneakemail.com
From goodell at eecs.harvard.edu Mon Jan 2 15:13:41 2006
From: goodell at eecs.harvard.edu (Geoffrey Goodell)
Date: Mon, 2 Jan 2006 10:13:41 -0500
Subject: benchmarking a node
In-Reply-To: <20060102123610.GK2235@leitl.org>
References: <20060102123610.GK2235@leitl.org>
Message-ID: <20060102151341.GO20671@eecs.harvard.edu>
On Mon, Jan 02, 2006 at 01:36:11PM +0100, Eugen Leitl wrote:
> Another question: as Tor alpha seems to crash regularly,
> will the keys/torrc be wiped if I do apt-get remove tor,
> to downgrade to the stable branch?
Issuing "apt-get remove tor" will not delete the tor configuration and
data files, but it would probably be easiest for you to just apt-get
install or dpkg -i the stable version of tor, which will automatically
perform the downgrade for you.
Geoff
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From maillist at piirakka.com Wed Jan 18 11:10:03 2006
From: maillist at piirakka.com (M)
Date: Wed, 18 Jan 2006 13:10:03 +0200
Subject: You think you can hide your ip?
References: <43CCC7EB.2090901@gmx.de> <002801c61b58$8c51a230$0a0aa8c0@none> <43CCF588.8020109@cogeco.ca> <005b01c61b93$d5de5ca0$0a0aa8c0@none> <43CD87A4.9010901@cogeco.ca>
Message-ID: <001b01c61c1f$bba7ad50$0a0aa8c0@none>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Yes, you need one computer which has Linux installed that acts as router and
firewall. Workstation with Windows is connected to internet through router
box that routes traffic transparently through Tor.
M
- ----- Original Message -----
From: "Wilson"
To:
Sent: Wednesday, January 18, 2006 2:11 AM
Subject: Re: You think you can hide your ip?
> Thanks for the info M, but I am running windows ..... what you described
> looked like it was for linux or something........Very interesting though
> :)
>
> M wrote:
>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>>> How the heck can you route all trafiic through Tor? I am wondering
>>> because
>>> I would like to do that myself.......
>>
>>
>>
>> You can do this by using a router box, iptables and some other software.
>>
>>
>> Found this from my sent emails (This isn't meant to be step-by-step
>> howto,
>> just some pointers):
>>
>> - --------------------------------------------------
>> I assume that you're familiar compiling stuff from source and so on...
>>
>> First you must download and compile Dante, transocks needs some libraries
>> from it:
>> ftp://ftp.inet.no/pub/socks/dante-1.1.18.tar.gz
>> (the usual "tar xfvz dante-1.1.18.tar.gz && cd dante-1.1.18", read README
>> and INSTALL, "./configure && make && make install")
>>
>> I compiled transsocks against dante-1.1.14, try that if 1.1.18 doesn't
>> work
>> (transocks.c failed to compile against dante-1.1.15).
>>
>> Download and compile transocks. I attached a simple patch by me to
>> transocks.c, it adds verbose option and some help, you can apply it by
>> "patch -p1 < transocks.patch" and when it asks a file to patch just type
>> path to transocks.c.
>> http://cvs.sourceforge.net/viewcvs.py/transocks/transocks/
>>
>> Compile transocks by typing "make" and copy freshly compiled transocks to
>> /usr/local/sbin/.
>>
>> Install iptables if you already dont have it.
>>
>> Copy attached transocksify.sh to /usr/local/sbin/ and edit it to suit
>> your
>> needs.
>>
>> Edit /etc/socks.conf to look like following:
>>
>> route {
>> from: 0.0.0.0/0 to: 0.0.0.0/0 via: 192.168.10.1 port = 9050
>> proxyprotocol: socks_v4
>> method: none
>> protocol: tcp
>> }
>>
>> Edit /etc/tor/torrc, change
>>
>> SocksBindAddress 127.0.0.1
>> to
>> SocksBindAddress routers_local_ip
>>
>> where routers_local_ip is your routers nics local address (LAN), example
>> 192.168.1.1.
>>
>> Run /usr/local/sbin/transocks && /usr/local/sbin/transocksify.sh and test
>> if
>> it works... I assume that you have working Tor installation.
>>
>> If everything goes right I recommend that you install Privoxy and Squid
>> for
>> http connections. I have following setup: for traffic going out to port
>> 80
>> client -> squid -> privoxy -> tor, other ports are directed straight to
>> Tor,
>> everything else is dropped. Privoxy filters out some bad javascript and
>> stuff that could break your privacy.
>> - ------------------------------------------------------
>>
>> M
>> -----BEGIN PGP SIGNATURE-----
>> Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
>> Comment: GnuPT 2.7.2
>>
>> iD8DBQFDzTdX6fSN8IKlpYoRAl6aAJ9+3Ts+xQfAjnBASKETLRYNQqWEvwCdGXnC
>> y+wCBH991arTI+QoflFj8rs=
>> =lowO
>> -----END PGP SIGNATURE-----
>
>
>
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32) - GPGrelay v0.959
Comment: GnuPT 2.7.2
iD8DBQFDziIM6fSN8IKlpYoRAlz2AJ4onMBno72nTgkS4TtP2snZ2Y/8KgCfbU7d
BFwK9jD/MdHpJL3uST6kVd0=
=xU7h
-----END PGP SIGNATURE-----
From toruser at googlemail.com Wed Jan 18 12:38:16 2006
From: toruser at googlemail.com (Tor User)
Date: Wed, 18 Jan 2006 04:38:16 -0800
Subject: Spam sent to contact address
Message-ID:
I am running a tor server and publish a contact email address in a mangled
format, along the lines of toruser-at-gmail-dot-com. I have received two
apparent spams to that address recenly. A somewhat surprising aspect is that
both contained just one random word and no other content. They were the only
two emails ever received at that address, and I have not published the
address anywhere (although google finds it at moria.seul.org:9031).
I am wondering whether to put this down to the incopetence of the
spammer(s), or whether there could be any possible reason for why they might
have wanted to send me content-free messages after going into the effort of
unscrambling the email address. I doubt they would have wanted to learn
anything from an automated bounce message (which they would expect to come
from gmail in any case) but cannot see any other explanation.
Do others also get spam to addresses published only through tor status, does
said spam look like the usual sort of spam, and can anyone think of an
explanation for the above? Many thanks.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
From arrakistor at gmail.com Wed Jan 18 13:48:11 2006
From: arrakistor at gmail.com (Arrakistor)
Date: Wed, 18 Jan 2006 07:48:11 -0600
Subject: Spam sent to contact address
In-Reply-To:
References:
Message-ID: <293990577.20060118074811@gmail.com>
Hello Tor User,
If there are html references to remote files inside, this would be a way to track you, because it would leave your IP in the access logs via your mail program.
ST
Wednesday, January 18, 2006, 6:38:16 AM, you wrote:
> I am running a tor server and publish a contact email address in a mangled
> format, along the lines of toruser-at-gmail-dot-com. I have received two
> apparent spams to that address recenly. A somewhat surprising aspect is that
> both contained just one random word and no other content. They were the only
> two emails ever received at that address, and I have not published the
> address anywhere (although google finds it at moria.seul.org:9031).
> I am wondering whether to put this down to the incopetence of the
> spammer(s), or whether there could be any possible reason for why they might
> have wanted to send me content-free messages after going into the effort of
> unscrambling the email address. I doubt they would have wanted to learn
> anything from an automated bounce message (which they would expect to come
> from gmail in any case) but cannot see any other explanation.
> Do others also get spam to addresses published only through tor status, does
> said spam look like the usual sort of spam, and can anyone think of an
> explanation for the above? Many thanks.
--
Best regards,
Arrakistor mailto:arrakistor at gmail.com
From toruser at googlemail.com Wed Jan 18 14:38:50 2006
From: toruser at googlemail.com (Tor User)
Date: Wed, 18 Jan 2006 06:38:50 -0800
Subject: Spam sent to contact address
In-Reply-To: <293990577.20060118074811@gmail.com>
References:
<293990577.20060118074811@gmail.com>
Message-ID:
On 1/18/06, Arrakistor wrote:
>
> Hello Tor User,
>
> If there are html references to remote files inside, this would be a way
> to track you, because it would leave your IP in the access logs via your
> mail program.
>
Yes, that would certainly be possible in principle but i) both spams are
plain-text only, and ii) it is already easy to find the IP address of my tor
server based on the contact address (just scan through all few hundred known
tor servers, conveniently listed e.g. at
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl?sorbw=1&addr=1 ).
I am not at all worried, which is just as well given the amount of other
spam I get :-) I am, however, puzzled as to why anyone would bother to go
into a non-trivial amount of effort to decipher the email address, only to
then use it to send a meaningless one-word message. I suppose an
explanation might be that the process of harvesting mildly obfuscated email
addresses from the web has been automated and the resulting email addresses
were then used by an utterly incompetent spammer. Another possibility might
be that the spammer had a list of harvested emails not all of which were
necessarily converted correctly from whatever form of obfuscation was used.
It would then make sense for them to try to filter out invalid addresses
before selling the list on, although it is unclear why they would use a
one-word message rather than a real spam that they could have been paid for.
I suspect I will never know.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
From Christian.Kellermann at nefkom.net Wed Jan 18 14:55:30 2006
From: Christian.Kellermann at nefkom.net (Christian Kellermann)
Date: Wed, 18 Jan 2006 15:55:30 +0100
Subject: Spam sent to contact address
In-Reply-To:
References:
Message-ID: <20060118145529.GC13704@hermes.my.domain>
Hi,
* Tor User [060118 13:41]:
> I am wondering whether to put this down to the incopetence of the
> spammer(s), or whether there could be any possible reason for why they might
> have wanted to send me content-free messages after going into the effort of
> unscrambling the email address. I doubt they would have wanted to learn
> anything from an automated bounce message (which they would expect to come
> from gmail in any case) but cannot see any other explanation.
I don't think this is related to tor. It seems someone harvested
your email address from the status page and send you some garbage. I
have seen this form of spam as a part of a multipart message where
the plain text is used to confuse Bayes filters.
Maybe the spammer misconfigured his tool.
Why would anyone send just a couple words? Because they can I
guess....
Cheers,
Christian
--
You may use my gpg key for replies:
pub 1024D/47F79788 2005/02/02 Christian Kellermann (C-Keen)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL:
From Christian.Kellermann at nefkom.net Wed Jan 18 14:55:30 2006
From: Christian.Kellermann at nefkom.net (Christian Kellermann)
Date: Wed, 18 Jan 2006 15:55:30 +0100
Subject: Spam sent to contact address
In-Reply-To:
References:
Message-ID: <20060118145529.GC13704@hermes.my.domain>
Hi,
* Tor User [060118 13:41]:
> I am wondering whether to put this down to the incopetence of the
> spammer(s), or whether there could be any possible reason for why they might
> have wanted to send me content-free messages after going into the effort of
> unscrambling the email address. I doubt they would have wanted to learn
> anything from an automated bounce message (which they would expect to come
> from gmail in any case) but cannot see any other explanation.
I don't think this is related to tor. It seems someone harvested
your email address from the status page and send you some garbage. I
have seen this form of spam as a part of a multipart message where
the plain text is used to confuse Bayes filters.
Maybe the spammer misconfigured his tool.
Why would anyone send just a couple words? Because they can I
guess....
Cheers,
Christian
--
You may use my gpg key for replies:
pub 1024D/47F79788 2005/02/02 Christian Kellermann (C-Keen)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL:
From mlthorne at gmail.com Wed Jan 18 14:56:56 2006
From: mlthorne at gmail.com (Matt Thorne)
Date: Wed, 18 Jan 2006 09:56:56 -0500
Subject: Spam sent to contact address
In-Reply-To:
References:
<293990577.20060118074811@gmail.com>
Message-ID: <5c4c375e0601180656i4728fec4ldd2b85014f6072d9@mail.gmail.com>
perhaps that email address was added the Not so Good Email addr's
List, for whichever spammer, and they used that list to run testing
for whichever Bot they are designing.
On 1/18/06, Tor User wrote:
>
> On 1/18/06, Arrakistor wrote:
> > Hello Tor User,
> >
> > If there are html references to remote files inside, this would be a way
> to track you, because it would leave your IP in the access logs via your
> mail program.
> >
>
> Yes, that would certainly be possible in principle but i) both spams are
> plain-text only, and ii) it is already easy to find the IP address of my tor
> server based on the contact address (just scan through all few hundred known
> tor servers, conveniently listed e.g. at
> http://serifos.eecs.harvard.edu/cgi-bin/exit.pl?sorbw=1&addr=1
> ).
>
> I am not at all worried, which is just as well given the amount of other
> spam I get :-) I am, however, puzzled as to why anyone would bother to go
> into a non-trivial amount of effort to decipher the email address, only to
> then use it to send a meaningless one-word message. I suppose an
> explanation might be that the process of harvesting mildly obfuscated email
> addresses from the web has been automated and the resulting email addresses
> were then used by an utterly incompetent spammer. Another possibility might
> be that the spammer had a list of harvested emails not all of which were
> necessarily converted correctly from whatever form of obfuscation was used.
> It would then make sense for them to try to filter out invalid addresses
> before selling the list on, although it is unclear why they would use a
> one-word message rather than a real spam that they could have been paid for.
> I suspect I will never know.
>
>
From firefox-gen at walala.org Wed Jan 18 19:52:58 2006
From: firefox-gen at walala.org (ADB)
Date: Wed, 18 Jan 2006 11:52:58 -0800
Subject: Anonym.OS
In-Reply-To: <6363-21942@sneakemail.com>
References: <6363-21942@sneakemail.com>
Message-ID: <43CE9C9A.8010809@walala.org>
Cool. What BT client would you recommend for Linux? The standard one
sucks (or else I do) and I've never been able to DL anything with it.
Maybe I just don't know WTF I'm doing, who knows...
~A
w9osxbh02 at sneakemail.com wrote:
> For those of you trying to download Anonym.OS from the Wired article, there's also the Bittorrent, which seems to work pretty quickly.
>
> Mark
>
>
> --------------------------------------
> Protect yourself from spam,
> use http://sneakemail.com
>
>
>
>
From w9osxbh02 at sneakemail.com Thu Jan 19 03:09:08 2006
From: w9osxbh02 at sneakemail.com (w9osxbh02 at sneakemail.com)
Date: 19 Jan 2006 03:09:08 -0000
Subject: Anonym.OS
Message-ID: <8667-84200@sneakemail.com>
I use azeurus, but i don't drag the data through tor...too slow...i do run the tracker through tor...
----------reply separator----------
Cool. What BT client would you recommend for Linux? The standard one
sucks (or else I do) and I've never been able to DL anything with it.
Maybe I just don't know WTF I'm doing, who knows...
~A
--------------------------------------
Protect yourself from spam,
use http://sneakemail.com
From keithn at csh.rit.edu Thu Jan 19 04:00:21 2006
From: keithn at csh.rit.edu (Keith Needels)
Date: Wed, 18 Jan 2006 23:00:21 -0500
Subject: Tor Diffie-Hellman question
Message-ID: <43CF0ED5.2020401@csh.rit.edu>
Hello,
I just read through the design paper (Tor: The Second Generation Onion
Router), and I have a quick question that I'm sure one of you can answer.
I might be missing something obvious here, but if the first half of the
Diffie-Hellman key exchange sent with the Create/Relay Extend commands
is encrypted using RSA and the public key of the onion router in which
it is destined, why do Diffie-Hellman at all? Why not just have our
Alice generate the AES key by herself, and send it down the circuit
encrypted with the destination OR's public key?
Thanks a lot!
-Keith
From alexismanning at hotpop.com Mon Jan 2 16:28:38 2006
From: alexismanning at hotpop.com (Alexis Manning)
Date: Mon, 2 Jan 2006 16:28:38 -0000
Subject: Dealing with bad Tor nodes
References: <004d01c60fa2$87d0e250$1901a8c0@fishtest> <20060102142830.GA15157@localhost.localdomain>
Message-ID: <00dd01c60fb9$9bb059b0$1901a8c0@fishtest>
"Roger Dingledine" wrote:
> Upgrade to the latest 0.1.1.x-alpha and you should see some marked
> improvement.
>
> The upcoming 0.1.0.16 release has several backports from the 0.1.1.x
> tree that should make it behave better too.
Thanks Roger. I'll give the alpha a try and see what happens.
Apologies, I see the changelog says "Recover better from TCP connections to
Tor servers that are broken but don't tell you (it happens!);". I did skim
the alpha changelogs but obviously should have read them more carefully
before posting!
Cheers,
-- A.
From syverson at itd.nrl.navy.mil Thu Jan 19 04:10:01 2006
From: syverson at itd.nrl.navy.mil (Paul Syverson)
Date: Wed, 18 Jan 2006 23:10:01 -0500
Subject: Tor Diffie-Hellman question
In-Reply-To: <43CF0ED5.2020401@csh.rit.edu>
References: <43CF0ED5.2020401@csh.rit.edu>
Message-ID: <20060119041001.GA6050@itd.nrl.navy.mil>
On Wed, Jan 18, 2006 at 11:00:21PM -0500, Keith Needels wrote:
> Hello,
>
> I just read through the design paper (Tor: The Second Generation Onion
> Router), and I have a quick question that I'm sure one of you can answer.
>
> I might be missing something obvious here, but if the first half of the
> Diffie-Hellman key exchange sent with the Create/Relay Extend commands
> is encrypted using RSA and the public key of the onion router in which
> it is destined, why do Diffie-Hellman at all? Why not just have our
> Alice generate the AES key by herself, and send it down the circuit
> encrypted with the destination OR's public key?
>
This has some similarity to the generation 0 and generation 1 designs
of onion routing. The problem is that if someone saved all the traffic
that went to that OR and then later broke or otherwise obtained the
private key, they could now get the AES key with which data between
Alice and that OR was encrypted. Using ephemeral DH gets us perfect
forward secrecy. I.e., this sort of attack won't work.
HTH,
Paul
From firefox-gen at walala.org Thu Jan 19 07:38:29 2006
From: firefox-gen at walala.org (ADB)
Date: Wed, 18 Jan 2006 23:38:29 -0800
Subject: Anonym.OS
In-Reply-To: <8667-84200@sneakemail.com>
References: <8667-84200@sneakemail.com>
Message-ID: <43CF41F5.9020307@walala.org>
I have this thing called KTorrent on my PC- but Linuxtracker isn't
giving me the file. It's overloaded or something? :'(
~Andrew
w9osxbh02 at sneakemail.com wrote:
> I use azeurus, but i don't drag the data through tor...too slow...i do run the tracker through tor...
>
>
> ----------reply separator----------
>
> Cool. What BT client would you recommend for Linux? The standard one
> sucks (or else I do) and I've never been able to DL anything with it.
> Maybe I just don't know WTF I'm doing, who knows...
>
> ~A
>
>
>
>
>
> --------------------------------------
> Protect yourself from spam,
> use http://sneakemail.com
>
>
>
>
From w9osxbh02 at sneakemail.com Thu Jan 19 10:39:37 2006
From: w9osxbh02 at sneakemail.com (w9osxbh02 at sneakemail.com)
Date: 19 Jan 2006 10:39:37 -0000
Subject: Anonym.OS
Message-ID: <23996-43144@sneakemail.com>
Andrew,
Not sure as I've never used ktracker. I use asureus (spelled it wrong the first time) - which is java based and very easy to install under your user account and doesn't require root rights. All I do is find a torrent search site, search for what I'm looking for, download the torrent file, open it in azureus and the rest happens automatically.
I also have to adjust my upload speed as my upline pipe is rather limited.
I am pretty new to the bittorrent as well so I don't yet understand all the components.
Mark
---------reply separator---------------
I have this thing called KTorrent on my PC- but Linuxtracker isn't
giving me the file. It's overloaded or something? :'(
~Andrew
--------------------------------------
Protect yourself from spam,
use http://sneakemail.com
From mkol at poczta.neostrada.pl Thu Jan 19 13:53:23 2006
From: mkol at poczta.neostrada.pl (Michal Kolinski)
Date: Thu, 19 Jan 2006 14:53:23 +0100
Subject: Anonym.OS
References: <6363-21942@sneakemail.com> <43CE9C9A.8010809@walala.org>
Message-ID: <001a01c61cff$bfe1c3c0$0201a8c0@michalpc>
> Cool. What BT client would you recommend for Linux? The standard one sucks
> (or else I do) and I've never been able to DL anything with it.
Open (or forward) your BitTorrent port. Set your port to something in
1024-65535 range.
Don't use these ports: 1214, 4661-4672, 6346-6347, 6881-6889.
GUI client: http://azureus.sourceforge.net/
ncurses client: http://libtorrent.rakshasa.no/
From firefox-gen at walala.org Thu Jan 19 20:47:58 2006
From: firefox-gen at walala.org (ADB)
Date: Thu, 19 Jan 2006 12:47:58 -0800
Subject: Anonym.OS
In-Reply-To: <001a01c61cff$bfe1c3c0$0201a8c0@michalpc>
References: <6363-21942@sneakemail.com> <43CE9C9A.8010809@walala.org> <001a01c61cff$bfe1c3c0$0201a8c0@michalpc>
Message-ID: <43CFFAFE.8030006@walala.org>
I get an error mesage saying that linuxtracker.org/announce.php is
sending an impropper response. None of the SF mirrors seem to have this
file, no do any other BT search engines that I've tried! :(
~Andrew
PS- Are any other people having this problem?
Michal Kolinski wrote:
>> Cool. What BT client would you recommend for Linux? The standard one
>> sucks (or else I do) and I've never been able to DL anything with it.
>
> Open (or forward) your BitTorrent port. Set your port to something in
> 1024-65535 range.
> Don't use these ports: 1214, 4661-4672, 6346-6347, 6881-6889.
> GUI client: http://azureus.sourceforge.net/
> ncurses client: http://libtorrent.rakshasa.no/
>
>
>
>
From rabbi at abditum.com Sat Jan 21 19:54:02 2006
From: rabbi at abditum.com (Len Sassaman)
Date: Sat, 21 Jan 2006 11:54:02 -0800 (PST)
Subject: CodeCon program announced, early registration deadline nearing
Message-ID:
The program for CodeCon 2006 has been announced.
http://www.codecon.org/2006/program.html
CodeCon is the premier showcase of innovative software projects. It is a
workshop for developers of real-world applications with working code and
active development projects. All presentations will given by one of the
lead developers, and accompanied by a functional demo.
Highlights of CodeCon 2006 include:
iGlance - Open source push-to-talk videoconferencing and
screen-sharing
Monotone - Low stress, high functionality version control
Query By Example - Data mining operations within PostgreSQL
Djinni - Efficient approximations to NP-complete problems
Elsa/Oink/Cqual++ - A static-time whole-program dataflow analysis for C
and C++
Truman - An open-source behavioral malware analysis sandnet
VidTorrent/Peers - A scalable real-time p2p streaming protocol
The fifth annual CodeCon takes place February 10 - 12, 11:30 - 18:00, at
StudioZ (314 11th Street) in San Francisco. Early registration is $63,
available online until February 1st, 2006.
Registration will be available at the door for $85.
Supporting Attendee tickets are also available, and include a one-year
membership to the USENIX Association. Please see the CodeCon registration
page for details:
http://www.codecon.org/2006/registration.html
From w9osxbh02 at sneakemail.com Sun Jan 22 14:24:02 2006
From: w9osxbh02 at sneakemail.com (w9osxbh02 at sneakemail.com)
Date: 22 Jan 2006 14:24:02 -0000
Subject: Anonym.OS
Message-ID: <8512-39231@sneakemail.com>
Andrew,
Don't know what is causing the problem with your seeding error, but do you have a natted port set up in your firewall to allow through for Azureus?
Sometimes it takes a little while for the tracker info to come through.
Mark
------------Reply Separator------------
I get an error mesage saying that linuxtracker.org/announce.php is
sending an impropper response. None of the SF mirrors seem to have this
file, no do any other BT search engines that I've tried! :(
~Andrew
From glymr_darkmoon at ml1.net Mon Jan 23 02:36:53 2006
From: glymr_darkmoon at ml1.net (glymr)
Date: Mon, 23 Jan 2006 12:36:53 +1000
Subject: an idea about how to improve routing for interactive services
Message-ID: <43D44145.3020805@ml1.net>
Hi,
I've been running a tor server on and off for some time, I just recently
got a dsl connection again, only a measly 256/64 connection, and one of
my main uses for tor has always been instant messaging.
One of the most annoying things about tor, as it is presently run, for
instant messaging purposes, is getting circuits which die frequently. I
have an idea about how this problem could be solved, and I feel that
this idea should be promoted at tor.eff.org - of specialised interactive
traffic only nodes. This could be integrated into the configuration
system in fact. The rules for how to define what one should set a node
to do are as follows:
1. If a node is run which is frequently offline, but with high
bandwidth, this is suited to short-lived traffic, such as downloads
of files (p2p, web browsing).
2. If a node has low bandwidth, and can be kept online for long
periods of time, this is the ideal situation for low-volume
interactive traffic.
These rules could be used to weight classes of ports, a node could keep
a history of its uptime, and report its average uptime value accumulated
over time to the directory. This would help for choosing interactive
traffic routes, the longer the average uptime, the greater the chance of
it being picked on interactive circuits.
A cumulative history of average bandwidth usage would be added to this,
and through the combination of these two, routers could create a pair of
different classes of circuits, long lived circuits and short lived
circuits, and one could overlay this and create another two classes of
circuit, short-lived, low bandwidth circuits and long-lived
high-bandwidth circuits. This second set of classes is probably not so
important.
Tor could automatically select it's preference for the different traffic
classes according to these values. At this point, without an automated
system to do this, it can be done by users (as I am doing) - by using a
rate-limiting system (netlimiter) and allowing only a small set of
interactive traffic types through (in my case, irc and silc) - since tor
precludes the use of file transfers on these two protocols, I set the
rate limiting between 2 and 4kb/s depending on whether I am downloading
more or chatting more.
However, I think it would be a worthwhile addition to the system by
which Tor does its routing to use these rules in both the production of
an uptime and bandwidth average, which is used by clients to select a
pair of different circuit classes, interactive and high volume. High
volume traffic usually is short lived, and interactive traffic is
usually long lived. By specialising the circuits according to these
rules one would find that interactivity is better promoted, and
separated from volume.
David
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
From arma at mit.edu Mon Jan 23 04:14:32 2006
From: arma at mit.edu (Roger Dingledine)
Date: Sun, 22 Jan 2006 23:14:32 -0500
Subject: an idea about how to improve routing for interactive services
In-Reply-To: <43D44145.3020805@ml1.net>
References: <43D44145.3020805@ml1.net>
Message-ID: <20060123041432.GK15157@localhost.localdomain>
On Mon, Jan 23, 2006 at 12:36:53PM +1000, glymr wrote:
> These rules could be used to weight classes of ports, a node could keep
> a history of its uptime, and report its average uptime value accumulated
> over time to the directory. This would help for choosing interactive
> traffic routes, the longer the average uptime, the greater the chance of
> it being picked on interactive circuits.
Actually, we already do something like this. Nodes report their uptime,
and we assume that a long uptime implies that it will stay up.
> Tor could automatically select it's preference for the different traffic
> classes according to these values. At this point, without an automated
> system to do this, it can be done by users (as I am doing) - by using a
> rate-limiting system (netlimiter) and allowing only a small set of
> interactive traffic types through (in my case, irc and silc) - since tor
> precludes the use of file transfers on these two protocols, I set the
> rate limiting between 2 and 4kb/s depending on whether I am downloading
> more or chatting more.
I'm not sure I understand this part. You are using an external tool to
traffic shape the stuff you send into Tor? Or you are using an external
tool to traffic shape the stuff that exits from your Tor server?
> However, I think it would be a worthwhile addition to the system by
> which Tor does its routing to use these rules in both the production of
> an uptime and bandwidth average, which is used by clients to select a
> pair of different circuit classes, interactive and high volume. High
> volume traffic usually is short lived, and interactive traffic is
> usually long lived. By specialising the circuits according to these
> rules one would find that interactivity is better promoted, and
> separated from volume.
Right, we do this too.
Check out the man page entry:
LongLivedPorts PORTS
A list of ports for services that tend to have long-running connec-
tions (e.g. chat and interactive shells). Circuits for streams that
use these ports will contain only high-uptime nodes, to reduce the
chance that a node will go down before the stream is finished.
(Default: 21, 22, 706, 1863, 5050, 5190, 5222, 5223, 6667, 8300,
8888)
In 0.1.0.x, "high-uptime" is defined as "claiming an uptime of at least 24
hours." In 0.1.1.11-alpha, high-uptime is defined as meeting or exceeding
the median uptime of running valid servers. On the current Tor network
this tends to vary between 2 to 3 days.
But this clearly does not totally solve the problem: long-term connections
over Tor do still break. Part of this is because the Tor network is very
young and still quite dynamic, so people are upgrading, restarting their
servers, and so on. There is also clearly a tension between scaling the
network (and thus being more flexible about the volunteers we can make
use of) and providing stable links.
Another nice approach would be to be able to move streams to a new
circuit if the current one dies. But this has its own problems:
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#MigrateStreams
What other approaches are there that might work?
--Roger
From glymr_darkmoon at ml1.net Mon Jan 23 04:47:44 2006
From: glymr_darkmoon at ml1.net (glymr)
Date: Mon, 23 Jan 2006 14:47:44 +1000
Subject: an idea about how to improve routing for interactive services
In-Reply-To: <20060123041432.GK15157@localhost.localdomain>
References: <43D44145.3020805@ml1.net> <20060123041432.GK15157@localhost.localdomain>
Message-ID: <43D45FF0.5030902@ml1.net>
Roger Dingledine wrote:
>On Mon, Jan 23, 2006 at 12:36:53PM +1000, glymr wrote:
>
>
>>These rules could be used to weight classes of ports, a node could keep
>>a history of its uptime, and report its average uptime value accumulated
>>over time to the directory. This would help for choosing interactive
>>traffic routes, the longer the average uptime, the greater the chance of
>>it being picked on interactive circuits.
>>
>>
>
>Actually, we already do something like this. Nodes report their uptime,
>and we assume that a long uptime implies that it will stay up.
>
>
>
yes, that's not a good assumption to make however. average uptime is a
more useful metric, when a system has been up for a long time it may be
just about to go down. also, for irc users, a connection which can stay
up for 8 hours or more is regarded as quite adequate by most.
>>Tor could automatically select it's preference for the different traffic
>>classes according to these values. At this point, without an automated
>>system to do this, it can be done by users (as I am doing) - by using a
>>rate-limiting system (netlimiter) and allowing only a small set of
>>interactive traffic types through (in my case, irc and silc) - since tor
>>precludes the use of file transfers on these two protocols, I set the
>>rate limiting between 2 and 4kb/s depending on whether I am downloading
>>more or chatting more.
>>
>>
>
>I'm not sure I understand this part. You are using an external tool to
>traffic shape the stuff you send into Tor? Or you are using an external
>tool to traffic shape the stuff that exits from your Tor server?
>
>
what i mean is, different ports, for different protocols, have different
traffic characteristics. irc, silc, msn, aim/icq, jabber etc, these are
all long lived and mostly low bandwidth connections, whereas web
browsing is short lived and bursty. they should be treated differently.
regarding the shaper, yes, i'm shaping the bandwidth that comes out of
my tor server so that it limits it, but because i have specified that it
only allows exit with irc and silc, to a large degree that will reduce
the amount of bursty high bandwidth connections it creates, once my node
is up for the 'long uptime' period (i'm still nutting out some problems
with a new installation, but i'm hoping i'll have over 24 hours uptime
soon).
but unfortunately there is nothing yet in the protocol to stop my node
being a part of a bursty, short-lived high-bandwidth circuit. being able
to control this would be very useful. and that's what i'm talking about,
having two classes of traffic in tor, so that nodes that have good
uptime but low bandwidth can contribute to improving the interactive
connection experience with tor.
>>However, I think it would be a worthwhile addition to the system by
>>which Tor does its routing to use these rules in both the production of
>>an uptime and bandwidth average, which is used by clients to select a
>>pair of different circuit classes, interactive and high volume. High
>>volume traffic usually is short lived, and interactive traffic is
>>usually long lived. By specialising the circuits according to these
>>rules one would find that interactivity is better promoted, and
>>separated from volume.
>>
>>
>
>Right, we do this too.
>
>Check out the man page entry:
>
>LongLivedPorts PORTS
> A list of ports for services that tend to have long-running connec-
> tions (e.g. chat and interactive shells). Circuits for streams that
> use these ports will contain only high-uptime nodes, to reduce the
> chance that a node will go down before the stream is finished.
> (Default: 21, 22, 706, 1863, 5050, 5190, 5222, 5223, 6667, 8300,
> 8888)
>
>In 0.1.0.x, "high-uptime" is defined as "claiming an uptime of at least 24
>hours." In 0.1.1.11-alpha, high-uptime is defined as meeting or exceeding
>the median uptime of running valid servers. On the current Tor network
>this tends to vary between 2 to 3 days.
>
>But this clearly does not totally solve the problem: long-term connections
>over Tor do still break. Part of this is because the Tor network is very
>young and still quite dynamic, so people are upgrading, restarting their
>servers, and so on. There is also clearly a tension between scaling the
>network (and thus being more flexible about the volunteers we can make
>use of) and providing stable links.
>
>Another nice approach would be to be able to move streams to a new
>circuit if the current one dies. But this has its own problems:
>http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#MigrateStreams
>
>What other approaches are there that might work?
>
>--Roger
>
>
I think that what i have described is the, at this point at least, best
answer to the problem of improving long lived interactive connections.
One other point that might be worth mentioning is that these long lived
connections would probably benefit, due to their long life and low ping,
from having 4 or 5 hops instead of 3 to help reduce the traffic analysis
problem, since it would be very easy to have a lot more people running
these low capacity high uptime nodes, the extra traffic is insignificant.
Oh, and because these connections are very low bandwidth, it could be
incorporated into the client to automatically relay traffic from known
low bandwidth ports, if the client finds itself with a high uptime average.
Think about how important persistence is with interactive connections.
SSH is a classic example... what happens if you are in the middle of
some irritaingly long process and suddenly your connection pings out? I
think that there should be a priority made in the tor architecture to
promote this kind of use of tor because it's probably the most delicate,
security wise. Consider the benefits for activists being able to use
instant messaging without being monitored, for organising and such.
David
From peter at palfrader.org Mon Jan 2 16:42:10 2006
From: peter at palfrader.org (Peter Palfrader)
Date: Mon, 2 Jan 2006 17:42:10 +0100
Subject: benchmarking a node
In-Reply-To: <20060102151341.GO20671@eecs.harvard.edu>
References: <20060102123610.GK2235@leitl.org> <20060102151341.GO20671@eecs.harvard.edu>
Message-ID: <20060102164210.GV30820@asteria.noreply.org>
On Mon, 02 Jan 2006, Geoffrey Goodell wrote:
> On Mon, Jan 02, 2006 at 01:36:11PM +0100, Eugen Leitl wrote:
> > Another question: as Tor alpha seems to crash regularly,
> > will the keys/torrc be wiped if I do apt-get remove tor,
> > to downgrade to the stable branch?
>
> Issuing "apt-get remove tor" will not delete the tor configuration and
> data files, but it would probably be easiest for you to just apt-get
> install or dpkg -i the stable version of tor, which will automatically
> perform the downgrade for you.
Generally, Debian packages do not support downgrades.
It will probably work in this very case but no guarantees.
--
PGP signed and encrypted | .''`. ** Debian GNU/Linux **
messages preferred. | : :' : The universal
| `. `' Operating System
http://www.palfrader.org/ | `- http://www.debian.org/
From firefox-gen at walala.org Mon Jan 23 08:23:18 2006
From: firefox-gen at walala.org (ADB)
Date: Mon, 23 Jan 2006 00:23:18 -0800
Subject: an idea about how to improve routing for interactive services
In-Reply-To: <43D44145.3020805@ml1.net>
References: <43D44145.3020805@ml1.net>
Message-ID: <43D49276.5060605@walala.org>
What OS are you using? I used to have this problem all the time with
Windows, and it got worse over time as the system got more and more
FUBARed. However, since switching entirely to Linux, I have not had any
of these issues more than once every week or so. This is just my case
though perhaps others have this issue on other platforms more frequently.
~Andrew
glymr wrote:
> Hi,
>
> I've been running a tor server on and off for some time, I just
> recently got a dsl connection again, only a measly 256/64 connection,
> and one of my main uses for tor has always been instant messaging.
>
> One of the most annoying things about tor, as it is presently run, for
> instant messaging purposes, is getting circuits which die frequently.
> I have an idea about how this problem could be solved, and I feel that
> this idea should be promoted at tor.eff.org - of specialised
> interactive traffic only nodes. This could be integrated into the
> configuration system in fact. The rules for how to define what one
> should set a node to do are as follows:
>
> 1. If a node is run which is frequently offline, but with high
> bandwidth, this is suited to short-lived traffic, such as
> downloads of files (p2p, web browsing).
>
> 2. If a node has low bandwidth, and can be kept online for long
> periods of time, this is the ideal situation for low-volume
> interactive traffic.
>
>
> These rules could be used to weight classes of ports, a node could
> keep a history of its uptime, and report its average uptime value
> accumulated over time to the directory. This would help for choosing
> interactive traffic routes, the longer the average uptime, the greater
> the chance of it being picked on interactive circuits.
>
> A cumulative history of average bandwidth usage would be added to
> this, and through the combination of these two, routers could create a
> pair of different classes of circuits, long lived circuits and short
> lived circuits, and one could overlay this and create another two
> classes of circuit, short-lived, low bandwidth circuits and long-lived
> high-bandwidth circuits. This second set of classes is probably not so
> important.
>
> Tor could automatically select it's preference for the different
> traffic classes according to these values. At this point, without an
> automated system to do this, it can be done by users (as I am doing) -
> by using a rate-limiting system (netlimiter) and allowing only a small
> set of interactive traffic types through (in my case, irc and silc) -
> since tor precludes the use of file transfers on these two protocols,
> I set the rate limiting between 2 and 4kb/s depending on whether I am
> downloading more or chatting more.
>
> However, I think it would be a worthwhile addition to the system by
> which Tor does its routing to use these rules in both the production
> of an uptime and bandwidth average, which is used by clients to select
> a pair of different circuit classes, interactive and high volume. High
> volume traffic usually is short lived, and interactive traffic is
> usually long lived. By specialising the circuits according to these
> rules one would find that interactivity is better promoted, and
> separated from volume.
>
> David
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
From glymr_darkmoon at ml1.net Mon Jan 23 10:35:22 2006
From: glymr_darkmoon at ml1.net (glymr)
Date: Mon, 23 Jan 2006 20:35:22 +1000
Subject: an idea about how to improve routing for interactive services
In-Reply-To: <43D49276.5060605@walala.org>
References: <43D44145.3020805@ml1.net> <43D49276.5060605@walala.org>
Message-ID: <43D4B16A.5040307@ml1.net>
yes, windows network system is seriously crappy at scheduling. i'm using
winxp but i've got netlimiter installed for ratelimiting.
ADB wrote:
> What OS are you using? I used to have this problem all the time with
> Windows, and it got worse over time as the system got more and more
> FUBARed. However, since switching entirely to Linux, I have not had
> any of these issues more than once every week or so. This is just my
> case though perhaps others have this issue on other platforms more
> frequently.
>
> ~Andrew
>
> glymr wrote:
>
>> Hi,
>>
>> I've been running a tor server on and off for some time, I just
>> recently got a dsl connection again, only a measly 256/64 connection,
>> and one of my main uses for tor has always been instant messaging.
>>
>> One of the most annoying things about tor, as it is presently run,
>> for instant messaging purposes, is getting circuits which die
>> frequently. I have an idea about how this problem could be solved,
>> and I feel that this idea should be promoted at tor.eff.org - of
>> specialised interactive traffic only nodes. This could be integrated
>> into the configuration system in fact. The rules for how to define
>> what one should set a node to do are as follows:
>>
>> 1. If a node is run which is frequently offline, but with high
>> bandwidth, this is suited to short-lived traffic, such as
>> downloads of files (p2p, web browsing).
>>
>> 2. If a node has low bandwidth, and can be kept online for long
>> periods of time, this is the ideal situation for low-volume
>> interactive traffic.
>>
>>
>> These rules could be used to weight classes of ports, a node could
>> keep a history of its uptime, and report its average uptime value
>> accumulated over time to the directory. This would help for choosing
>> interactive traffic routes, the longer the average uptime, the
>> greater the chance of it being picked on interactive circuits.
>>
>> A cumulative history of average bandwidth usage would be added to
>> this, and through the combination of these two, routers could create
>> a pair of different classes of circuits, long lived circuits and
>> short lived circuits, and one could overlay this and create another
>> two classes of circuit, short-lived, low bandwidth circuits and
>> long-lived high-bandwidth circuits. This second set of classes is
>> probably not so important.
>>
>> Tor could automatically select it's preference for the different
>> traffic classes according to these values. At this point, without an
>> automated system to do this, it can be done by users (as I am doing)
>> - by using a rate-limiting system (netlimiter) and allowing only a
>> small set of interactive traffic types through (in my case, irc and
>> silc) - since tor precludes the use of file transfers on these two
>> protocols, I set the rate limiting between 2 and 4kb/s depending on
>> whether I am downloading more or chatting more.
>>
>> However, I think it would be a worthwhile addition to the system by
>> which Tor does its routing to use these rules in both the production
>> of an uptime and bandwidth average, which is used by clients to
>> select a pair of different circuit classes, interactive and high
>> volume. High volume traffic usually is short lived, and interactive
>> traffic is usually long lived. By specialising the circuits according
>> to these rules one would find that interactivity is better promoted,
>> and separated from volume.
>>
>> David
>
From matt at snark.net Tue Jan 24 05:02:05 2006
From: matt at snark.net (Matt Ghali)
Date: Mon, 23 Jan 2006 21:02:05 -0800 (PST)
Subject: choosing a syslog facility other than 'daemon'
Message-ID:
Is there a user-friendly way to ask tor to log to a different
facility than 'daemon'? IE, something that does not involve editing
the source and recompiling :)
thanks!
matto
--matt at snark.net------------------------------------------<
The only thing necessary for the triumph
of evil is for good men to do nothing. - Edmund Burke
From cwilson352 at cogeco.ca Tue Jan 24 23:17:37 2006
From: cwilson352 at cogeco.ca (Wilson)
Date: Tue, 24 Jan 2006 18:17:37 -0500
Subject: TorDNS 1.7 final
Message-ID: <43D6B591.1020708@cogeco.ca>
Unless there is a problem with the final release, there probably won't
be a new version for a little while... Read the "furthermore..." section
of the "READ THIS" on the website.... Link is below:
http://sandos.ath.cx/~badger/tordns.html
From scarab7 at fastmail.fm Thu Jan 26 06:27:45 2006
From: scarab7 at fastmail.fm (Scarab)
Date: Wed, 25 Jan 2006 22:27:45 -0800
Subject: Bandwidth shaping by time of day / week / month? Adding that info to
Tor protocol?
Message-ID: <1138256865.28648.252795679@webmail.messagingengine.com>
Hi,
I'm new to the list. Perhaps this has been covered already, but are
there any plans to add cron-style bandwidth shaping options to Tor? I
mean using the common crontab notation for specifying arbitrary time
periods and bandwidth throttles within those periods. In my case, I want
a 20KB limit from 8am to 5pm Mon-Fri, no limit outside those hours. With
a cron-style implementation it'd be easy to do arbitrarily complex
shaping, i.e. cap Tor at 30KB on a specific night if a remote backup was
scheduled to occur, etc.
I'd like to ramp the rate on my end-node up to the full 50KB capacity of
the line when
I'm done using my ADSL connection for the day, but can't now do this
without stopping / restarting Tor, re-writing the config file, etc. Also
I'd prefer to keep my server up all the time in service of the overall
stability of the network.
Perhaps it'd add too much complexity, but the Tor protocol could perhaps
even take advantage of published cron-style bandwidth schedules to
optimize network throughput... a lot of the world is asleep while the
other part of it goes through the working (and playing) day.
Any comments on this? (I scanned the last 5 months of mailing list
archives "by hand" but found no mention. How do I search the mailing
list archives; I'm amazed there's not at least a rudimentary "Search"
field & button on the mailing list archive page.)
Thanks,
G. Osmond
--
Scarab
scarab7 at fastmail.fm
--
http://www.fastmail.fm - Accessible with your email software
or over the web
From m.balvers at addicts.nl Thu Jan 26 07:36:07 2006
From: m.balvers at addicts.nl (Martin Balvers)
Date: Thu, 26 Jan 2006 08:36:07 +0100 (CET)
Subject: Bandwidth shaping by time of day / week / month? Adding that
info to Tor protocol?
In-Reply-To: <1138256865.28648.252795679@webmail.messagingengine.com>
References: <1138256865.28648.252795679@webmail.messagingengine.com>
Message-ID: <16004.194.151.164.2.1138260967.squirrel@webmail.addicts.nl>
> Any comments on this? (I scanned the last 5 months of mailing list
> archives "by hand" but found no mention. How do I search the mailing
> list archives; I'm amazed there's not at least a rudimentary "Search"
> field & button on the mailing list archive page.)
You can search a (any) site with google like this:
To search for the term 'bandwidth' in the archives type the following term
in google:
site:archives.seul.org/or/talk/ bandwidth
http://www.google.com/search?hl=en&q=site%3Aarchives.seul.org%2For%2Ftalk%2F+bandwidth&btnG=Google+Search
Hope this helps someone :)
Martin
From force44 at Safe-mail.net Thu Jan 26 09:48:08 2006
From: force44 at Safe-mail.net (force44 at Safe-mail.net)
Date: Thu, 26 Jan 2006 04:48:08 -0500
Subject: Socks/TOR setup question
Message-ID:
Hello,
I use Tor, TorCP and Privoxy:
Privoxy listens on 8118
TOR requests are sent for http and https to 127.0.0.0 on 8118,
and to 127.0.0.1 on 9050 for the socks requests.
That works fine, but I am always receiving such message in the Log file: "[Warn] Your application (using socks4 on port 49370) is giving Tor only an IP address. Applications that do DNS resolves themselves may leak information. Consider using Socks4A (e.g. via privoxy or socat) instead."
This message is created when any application uses the TOR server, no matter if I parameter it as a socks4 or socks5.
As I am already using Privoxy, what must I change in my config so that this message isn't generated? Moreover, must I setup my applications to use TOR as a socks4 or a socks5 server>
Thank you!
From force44 at Safe-mail.net Thu Jan 26 09:49:28 2006
From: force44 at Safe-mail.net (force44 at Safe-mail.net)
Date: Thu, 26 Jan 2006 04:49:28 -0500
Subject: Tor and WinXP question
Message-ID:
Hi everybody,
I receive regular error messages like these 2:
"Error writing router store to disk"
and
"Error replacing "[mypath]/cached-routers.new": File exists"
"Error replacing "[mypath]/cached-routers": File exists"
"Error replacing "[mypath]/cached-routers.new": Permission denied"
I am using WinXP...
Despite this, it seems that TOR is running well, using the last Alfa, TorCP and Privoxy.
Thanks for your comments :)
From toruser at googlemail.com Thu Jan 26 10:15:12 2006
From: toruser at googlemail.com (Tor User)
Date: Thu, 26 Jan 2006 02:15:12 -0800
Subject: Bandwidth shaping by time of day / week / month? Adding that info to Tor protocol?
In-Reply-To: <1138256865.28648.252795679@webmail.messagingengine.com>
References: <1138256865.28648.252795679@webmail.messagingengine.com>
Message-ID:
>
> I'd like to ramp the rate on my end-node up to the full 50KB capacity of
> the line when
> I'm done using my ADSL connection for the day, but can't now do this
> without stopping / restarting Tor, re-writing the config file, etc.
You don't need to restart tor. Just update the config file and then do
something like
kill -HUP `cat /var/run/tor/tor.pid`
I guess you could have several config files and use cron to copy whichever
one you wanted to use at that time to /etc/tor, or you could update just the
bandwith section by calling e.g. sed.
Hope this helps,
Toruser
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
From iminium at wanadoo.fr Thu Jan 26 15:54:23 2006
From: iminium at wanadoo.fr (=?ISO-8859-1?Q?Jean-Paul_Desbru=E8res?=)
Date: Thu, 26 Jan 2006 16:54:23 +0100
Subject: Switching Tor on and off on Mac OS X Tiger
Message-ID: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr>
As using Tor slows down quite a bit web browsing and as going to the
weather forecast site for instance does not really need a protection
is there a simple way to switch Tor on or off on Mac OS 10 Tiger ?
From eugen at leitl.org Mon Jan 2 17:13:01 2006
From: eugen at leitl.org (Eugen Leitl)
Date: Mon, 2 Jan 2006 18:13:01 +0100
Subject: benchmarking a node
In-Reply-To: <20060102151341.GO20671@eecs.harvard.edu>
References: <20060102123610.GK2235@leitl.org> <20060102151341.GO20671@eecs.harvard.edu>
Message-ID: <20060102171301.GP2235@leitl.org>
On Mon, Jan 02, 2006 at 10:13:41AM -0500, Geoffrey Goodell wrote:
> On Mon, Jan 02, 2006 at 01:36:11PM +0100, Eugen Leitl wrote:
> > Another question: as Tor alpha seems to crash regularly,
> > will the keys/torrc be wiped if I do apt-get remove tor,
> > to downgrade to the stable branch?
>
> Issuing "apt-get remove tor" will not delete the tor configuration and
> data files, but it would probably be easiest for you to just apt-get
> install or dpkg -i the stable version of tor, which will automatically
> perform the downgrade for you.
Yes, with the exception of
85-31-186-61:~# dpkg -i tor_0.1.0.15-1~~sarge.1_i386.deb
dpkg - warning: downgrading tor from 0.1.1.10-alpha-1~~sarge.1 to 0.1.0.15-1~~sarge.1.
(Reading database ... 13875 files and directories currently installed.)
Preparing to replace tor 0.1.1.10-alpha-1~~sarge.1 (using tor_0.1.0.15-1~~sarge.1_i386.deb) ...
Stopping tor daemon: ...............................tor.
Unpacking replacement tor ...
Setting up tor (0.1.0.15-1~~sarge.1) ...
Configuration file `/etc/tor/torrc'
==> Modified (by you or by a script) since installation.
==> Package distributor has shipped an updated version.
What would you like to do about it ? Your options are:
Y or I : install the package maintainer's version
N or O : keep your currently-installed version
D : show the differences between the versions
Z : background this process to examine the situation
The default action is to keep your current version.
*** torrc (Y/I/N/O/D/Z) [default=N] ? N
Installing new version of config file /etc/default/tor ...
Installing new version of config file /etc/init.d/tor ...
debian-tor uid check: ok
debian-tor homedir check: ok
Starting tor daemon: tor...
Jan 02 18:11:26.745 [notice] Tor v0.1.0.15. This is experimental software. Do not rely on it for strong anonymity.
Jan 02 18:11:26.746 [warn] config_assign_line(): Unknown option 'SocksListenAddress'. Failing.
Jan 02 18:11:26.746 [err] tor_init(): Reading config failed--see warnings above. For usage, try -h.
invoke-rc.d: initscript tor, action "start" failed.
Just FYI.
--
Eugen* Leitl leitl http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL:
From numE at onionizer.de Thu Jan 26 15:56:31 2006
From: numE at onionizer.de (numE)
Date: Thu, 26 Jan 2006 16:56:31 +0100
Subject: Switching Tor on and off on Mac OS X Tiger
In-Reply-To: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr>
References: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr>
Message-ID: <43D8F12F.602@onionizer.de>
Firefox + Switchproxy
Jean-Paul Desbru?res schrieb:
> As using Tor slows down quite a bit web browsing and as going to the
> weather forecast site for instance does not really need a protection
> is there a simple way to switch Tor on or off on Mac OS 10 Tiger ?
From iminium at wanadoo.fr Thu Jan 26 16:00:13 2006
From: iminium at wanadoo.fr (=?ISO-8859-1?Q?Jean-Paul_Desbru=E8res?=)
Date: Thu, 26 Jan 2006 17:00:13 +0100
Subject: Switching Tor on and off on Mac OS X Tiger
In-Reply-To: <43D8F12F.602@onionizer.de>
References: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr> <43D8F12F.602@onionizer.de>
Message-ID:
Unfortunately I am using Safari
Le 26 janv. 06 ? 16:56, numE a ?crit :
> Firefox + Switchproxy
>
> Jean-Paul Desbru?res schrieb:
>> As using Tor slows down quite a bit web browsing and as going to the
>> weather forecast site for instance does not really need a protection
>> is there a simple way to switch Tor on or off on Mac OS 10 Tiger ?
>
> ----------------------------------------------------------------------
> -----------------
> Wanadoo vous informe que cet e-mail a ete controle par l'anti-
> virus mail.
> Aucun virus connu a ce jour par nos services n'a ete detecte.
>
>
>
From numE at onionizer.de Thu Jan 26 16:04:02 2006
From: numE at onionizer.de (numE)
Date: Thu, 26 Jan 2006 17:04:02 +0100
Subject: Switching Tor on and off on Mac OS X Tiger
In-Reply-To:
References: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr> <43D8F12F.602@onionizer.de>
Message-ID: <43D8F2F2.8060504@onionizer.de>
With Safari there is no real solution (at least i dont know).
you could generate two "profiles" in the osx network configuration.
one with proxy, one without..
the bad thing is.. when changing the profile your connection is cut for some
seconds....
this is why i use safari for normal surfing...
firefox with tor (and if i want to use firefox without tor i can simply
disable it via switchproxy).
Jean-Paul Desbru?res schrieb:
> Unfortunately I am using Safari
> Le 26 janv. 06 ? 16:56, numE a ?crit :
>
>> Firefox + Switchproxy
>>
>> Jean-Paul Desbru?res schrieb:
>>> As using Tor slows down quite a bit web browsing and as going to the
>>> weather forecast site for instance does not really need a protection
>>> is there a simple way to switch Tor on or off on Mac OS 10 Tiger ?
>>
>> ---------------------------------------------------------------------------------------
>>
>> Wanadoo vous informe que cet e-mail a ete controle par l'anti-virus
>> mail.
>> Aucun virus connu a ce jour par nos services n'a ete detecte.
>>
>>
>>
From huber at paradoxical.net Thu Jan 26 16:07:55 2006
From: huber at paradoxical.net (Josh)
Date: Thu, 26 Jan 2006 11:07:55 -0500
Subject: Switching Tor on and off on Mac OS X Tiger
In-Reply-To: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr> (Jean-Paul
=?iso-8859-1?Q?Desbru=E8res's?= message of "Thu, 26 Jan 2006 16:54:23
+0100")
References: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr>
Message-ID: <87wtgnnfac.fsf@callisto.paradoxical.net>
Jean-Paul Desbru?res writes:
> As using Tor slows down quite a bit web browsing and as going
> to the weather forecast site for instance does not really need
> a protection is there a simple way to switch Tor on or off on
> Mac OS 10 Tiger ?
If you're using Firefox you should take a look at the SwitchProxy
extension. Setup details for tor use are here:
http://tor.eff.org/cvs/tor/doc/tor-switchproxy.html
Also, you could specify your weather site as a proxy exception.
If you want to do this with safari, enter e.g. weather.com into
the "Bypass proxy settings for these Hosts & Domains" text box:
http://tor.eff.org/img/screenshot-osx-proxy-settings.png
(that image is from
http://tor.eff.org/cvs/tor/doc/tor-doc-osx.html)
Josh
From jay at tamboli.cx Thu Jan 26 16:13:21 2006
From: jay at tamboli.cx (Jay Goodman Tamboli)
Date: Thu, 26 Jan 2006 11:13:21 -0500
Subject: Switching Tor on and off on Mac OS X Tiger
In-Reply-To:
References: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr> <43D8F12F.602@onionizer.de>
Message-ID: <53245C62-220E-4766-9FA5-24B8131B1D30@tamboli.cx>
On 2006.01.26, at 11:00, Jean-Paul Desbru?res wrote:
> Unfortunately I am using Safari
Depending on what you're asking there are really two ways to control
Tor when you're using Safari.
If you're talking about turning Tor on and off completely, the
easiest way is to go to the "Network" System Preference panel and
uncheck the proxy settings. As someone else suggested, you could also
create separate network locations, one with proxies and one without,
though switching locations would interrupt connections.
Something else you can try is adding hosts you want fast access to to
the proxy exceptions list in the Network panel. Access to these will
be fast, but not anonymous.
For both situations, you can also edit your Privoxy config file (/
Library/Privoxy/config). You can comment out the "forward-socks4a /
localhost:9050 ." line to turn off Tor completely, or you can add
lines below that to keep certain hosts from going through Tor. For
example, I have the following lines in my config:
forward-socks4a / localhost:9050 .
forward 192.168.1.1 .
forward 160.79.128.22 . # Digitally Imported streaming music
forward swcdn.apple.com . # Apple system updates downloads
forward kh.google.com . # Google Earth
forward mail.google.com:443 . # Gmail
forward en.wikipedia.org .
/jgt
--
http://tamboli.cx/
From iminium at wanadoo.fr Thu Jan 26 16:18:25 2006
From: iminium at wanadoo.fr (=?ISO-8859-1?Q?Jean-Paul_Desbru=E8res?=)
Date: Thu, 26 Jan 2006 17:18:25 +0100
Subject: Switching Tor on and off on Mac OS X Tiger
In-Reply-To: <43D8F2F2.8060504@onionizer.de>
References: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr> <43D8F12F.602@onionizer.de> <43D8F2F2.8060504@onionizer.de>
Message-ID: <4ECE2A11-EF27-46F0-ACB0-DA95FF427CB1@wanadoo.fr>
Thanks a lot for your help.
I think I am going to use Firefox for protected surfing only.
Le 26 janv. 06 ? 17:04, numE a ?crit :
> With Safari there is no real solution (at least i dont know).
> you could generate two "profiles" in the osx network configuration.
> one with proxy, one without..
>
> the bad thing is.. when changing the profile your connection is cut
> for some
> seconds....
>
> this is why i use safari for normal surfing...
>
> firefox with tor (and if i want to use firefox without tor i can
> simply
> disable it via switchproxy).
>
> Jean-Paul Desbru?res schrieb:
>> Unfortunately I am using Safari
>> Le 26 janv. 06 ? 16:56, numE a ?crit :
>>
>>> Firefox + Switchproxy
>>>
>>> Jean-Paul Desbru?res schrieb:
>>>> As using Tor slows down quite a bit web browsing and as going to
>>>> the
>>>> weather forecast site for instance does not really need a
>>>> protection
>>>> is there a simple way to switch Tor on or off on Mac OS 10 Tiger ?
>>>
>>> --------------------------------------------------------------------
>>> -------------------
>>>
>>> Wanadoo vous informe que cet e-mail a ete controle par l'anti-virus
>>> mail.
>>> Aucun virus connu a ce jour par nos services n'a ete detecte.
>>>
>>>
>>>
>
> ----------------------------------------------------------------------
> -----------------
> Wanadoo vous informe que cet e-mail a ete controle par l'anti-
> virus mail.
> Aucun virus connu a ce jour par nos services n'a ete detecte.
>
>
>
From iminium at wanadoo.fr Thu Jan 26 16:19:19 2006
From: iminium at wanadoo.fr (=?ISO-8859-1?Q?Jean-Paul_Desbru=E8res?=)
Date: Thu, 26 Jan 2006 17:19:19 +0100
Subject: Switching Tor on and off on Mac OS X Tiger
In-Reply-To: <87wtgnnfac.fsf@callisto.paradoxical.net>
References: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr> <87wtgnnfac.fsf@callisto.paradoxical.net>
Message-ID: <9D20CDD3-E7B5-4DA7-80AC-4564021620B3@wanadoo.fr>
Thanks a lot for your help.
I think I am going to use Firefox for protected surfing only.
Le 26 janv. 06 ? 17:07, Josh a ?crit :
> Jean-Paul Desbru?res writes:
>
>> As using Tor slows down quite a bit web browsing and as going
>> to the weather forecast site for instance does not really need
>> a protection is there a simple way to switch Tor on or off on
>> Mac OS 10 Tiger ?
>
> If you're using Firefox you should take a look at the SwitchProxy
> extension. Setup details for tor use are here:
>
> http://tor.eff.org/cvs/tor/doc/tor-switchproxy.html
>
> Also, you could specify your weather site as a proxy exception.
> If you want to do this with safari, enter e.g. weather.com into
> the "Bypass proxy settings for these Hosts & Domains" text box:
>
> http://tor.eff.org/img/screenshot-osx-proxy-settings.png
>
> (that image is from
> http://tor.eff.org/cvs/tor/doc/tor-doc-osx.html)
>
> Josh
> ----------------------------------------------------------------------
> -----------------
> Wanadoo vous informe que cet e-mail a ete controle par l'anti-
> virus mail.
> Aucun virus connu a ce jour par nos services n'a ete detecte.
>
>
>
From iminium at wanadoo.fr Thu Jan 26 16:21:47 2006
From: iminium at wanadoo.fr (=?ISO-8859-1?Q?Jean-Paul_Desbru=E8res?=)
Date: Thu, 26 Jan 2006 17:21:47 +0100
Subject: Switching Tor on and off on Mac OS X Tiger
In-Reply-To: <53245C62-220E-4766-9FA5-24B8131B1D30@tamboli.cx>
References: <368606C4-DAFD-4ADB-AC91-661C8080EFE2@wanadoo.fr> <43D8F12F.602@onionizer.de> <53245C62-220E-4766-9FA5-24B8131B1D30@tamboli.cx>
Message-ID: <388D222D-CF3B-4CCE-B953-5D80081E6AA2@wanadoo.fr>
Thanks a lot for your help.
I think I am going to use Firefox for protected surfing only.
Le 26 janv. 06 ? 17:13, Jay Goodman Tamboli a ?crit :
> On 2006.01.26, at 11:00, Jean-Paul Desbru?res wrote:
>
>> Unfortunately I am using Safari
>
> Depending on what you're asking there are really two ways to
> control Tor when you're using Safari.
>
> If you're talking about turning Tor on and off completely, the
> easiest way is to go to the "Network" System Preference panel and
> uncheck the proxy settings. As someone else suggested, you could
> also create separate network locations, one with proxies and one
> without, though switching locations would interrupt connections.
>
> Something else you can try is adding hosts you want fast access to
> to the proxy exceptions list in the Network panel. Access to these
> will be fast, but not anonymous.
>
> For both situations, you can also edit your Privoxy config file (/
> Library/Privoxy/config). You can comment out the "forward-socks4a /
> localhost:9050 ." line to turn off Tor completely, or you can add
> lines below that to keep certain hosts from going through Tor. For
> example, I have the following lines in my config:
>
> forward-socks4a / localhost:9050 .
> forward 192.168.1.1 .
> forward 160.79.128.22 . # Digitally Imported streaming music
> forward swcdn.apple.com . # Apple system updates downloads
> forward kh.google.com . # Google Earth
> forward mail.google.com:443 . # Gmail
> forward en.wikipedia.org .
>
> /jgt
> --
> http://tamboli.cx/
>
>
> ----------------------------------------------------------------------
> -----------------
> Wanadoo vous informe que cet e-mail a ete controle par l'anti-
> virus mail.
> Aucun virus connu a ce jour par nos services n'a ete detecte.
>
>
>
From huber at paradoxical.net Thu Jan 26 18:29:20 2006
From: huber at paradoxical.net (Josh)
Date: Thu, 26 Jan 2006 13:29:20 -0500
Subject: dynamically changable options in torrc?
Message-ID: <87ek2uderj.fsf@callisto.paradoxical.net>
Is there a list of what options may be changed without restarting
the tor process? (i.e., change and kill -HUP )
By experimentation, I've discoverd that the various bandwidth
limiting options are changable. How about hidden services?
Thanks,
Josh
From grey at unixfu.net Thu Jan 26 23:30:39 2006
From: grey at unixfu.net (grey)
Date: Thu, 26 Jan 2006 18:30:39 -0500
Subject: OT: user who was trying to use EV-DO card with OpenBSD
Message-ID: <20060126233039.GK13140@fluffy.unixfu.net>
Ok, this is off topic, but I'm trying to find out anyone who has had
successful experiences with EVDO cards & OpenBSD, and this is the
closest google hit I could find:
http://archives.seul.org/or/talk/Jul-2005/msg00048.html
Anyone know what this person's email address is so that I could contact
them directly to see if they got off of the stompbox/linux
configuration?
I love tor btw - I use it constantly, sorry this is totally off topic.