<div dir="ltr"><br><br><div class="gmail_quote">On Fri, Aug 15, 2008 at 3:29 PM, Teddy Smith <span dir="ltr"><<a href="mailto:teddks@gmail.com">teddks@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
<div><div></div><div class="Wj3C7c">On Fri, 2008-08-15 at 12:33 -0600, Kasimir Gabert wrote:<br>
> On Fri, Aug 15, 2008 at 12:29 PM, Teddy Smith <<a href="mailto:teddks@gmail.com">teddks@gmail.com</a>> wrote:<br>
> > On Fri, 2008-08-15 at 20:18 +0200, Noiano wrote:<br>
> >> Hello everybody,<br>
> >> as you may know The Pirate Bay is being blocked in Italy for legal<br>
> >> issues. It's just a matter of time before all connection to all the TPB<br>
> >> servers will be blocked. Many people are suggesting to use tor+vidalia<br>
> >> in order to bypass the block. It's a good suggestion but, IMHO, people<br>
> >> care very little about just surfing <a href="http://thepiratebay.org" target="_blank">thepiratebay.org</a>. They want to<br>
> >> access the tracker and download ;-) .<br>
> >> Since I do not know the torrent protocol I wander: is it possible to use<br>
> >> tor as a "proxy" to access the tracker and get the data connections not<br>
> >> passing through tor? This would be possible if the request a client<br>
> >> makes to a tracker contains the non-tor ip of the client, I guess.<br>
> >><br>
> >> Any idea is welcome.<br>
> >><br>
> >> Noiano (from italy :-P )<br>
> >><br>
> >><br>
> > IIRC, a few months ago someone set up a tracker as a hidden service,<br>
> > specifically for this kind of thing. I didn't test it myself, but some<br>
> > people reported success.<br>
> ><br>
><br>
> Hello,<br>
><br>
> I think what is being talked about is something far simpler: accessing<br>
> TPB through Tor, but have the P2P connections not being blocked. This<br>
> is actually the recommended way of using Tor with P2P, and is easily<br>
> possible in most clients. I only know about deluge, seeing that is<br>
> what I use on my Ubuntu box, and all I had to do was check "Tracker<br>
> Proxy" in the settings, and type in my Tor SOCKS proxy.<br>
><br>
> Let me know if this helps, and good luck!<br>
> Kasimir<br>
><br>
><br>
</div></div>Sorry, I meant to imply that it was possible to have a torified or even<br>
hidden tracker, answering the OP's question of "is it possible". Thanks<br>
for the Deluge tip, it's my client too and as usual, it's incredibly<br>
simple to configure!<br>
<br>
I do see a possible risk here, though: How easy would it be for the<br>
MAFIAA to run hostile exits that killed connections to trackers? They<br>
(or their proxies, e.g., Media Defender and the like) seem exactly the<br>
type to do this, and they definitely have the resources. So if Tor was<br>
to be used as a method of bypassing tracker censorship, the trackers<br>
should probably be advised to run their own nodes.<br>
</blockquote></div><br>I've modified a torrent tracker to work exclusively with .onion addresses. It will not work with regular IP addresses.<br>The tracker is bound only to localhost, and sits behind two firewalls to block it from regular IP addresses.<br>
I've found only one torrent client (Azureus) that allows you to use a .onion address for a tracker and peers.<br>I wish uTorrent would behave the same way Azureus does, but it doesn't.<br>This system is in testing right now. This is running on a separate Tor network.<br>
Let me repeat that last part. This is NOT the normal Tor network. This is a SEPARATE Tor network.<br>This has been worked here and there for about a year now. Working out the bugs is time consuming.<br>So far, it works well with 7 users. <br>
However, scalability issues are going to be inevitable and will probably be the cause for failure down the road.<br><br>If anyone would like to be a alpha/beta tester, e-mail me directly.<br></div>