Re: Anonymizer tool like Tor?
through a GELI encrypted GEOM. (No plain-text ever touches the disk.) much better - use keyboard password. Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to be a new pseudo-random value at each boot. Configure the system to automatically receive an IP address via DHCP. Dissable the wireless card. (Most have a physical switch.) Boot the system with the USB stick at home. Leave the USB stick at home! Plug the laptop it into a cigarette lighter adapter in your car. Go perusing through urban areas during daylight hours looking for un-secured wireless networks. (There are many to be found.) Once you find a connection, do your business. this works well in Poland. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, 12 Mar 2009 13:47:07 -0400, T. freebsd-questi...@lists.goldenpath.org wrote: You want a transparent tor proxy, which you setup with freebsd and pf. Thanks much for the help. If my modest Python script used to download some web pages goes through Tor, is there a way for the remote web server to somehow trace this connection back to me? FWIW, the web server is run by people who do care for their data (they sell company listings for a living), but aren't l33t hackers either. You do not want to run tor as root, which unfortunately takes some tweeking to run properly as the default _tor user. Can you elaborate? After compiling the Ports, a _tor user is created. I could successfully launch Tor by su - _tor. Thank you. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
Thanks much for the help. If my modest Python script used to download some web pages goes through Tor, is there a way for the remote web server to somehow trace this connection back to me? if you won't help them with extra info in request headers - no. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
Gilles wrote: On Thu, 12 Mar 2009 13:47:07 -0400, T. freebsd-questi...@lists.goldenpath.org wrote: You want a transparent tor proxy, which you setup with freebsd and pf. Thanks much for the help. If my modest Python script used to download some web pages goes through Tor, is there a way for the remote web server to somehow trace this connection back to me? no Can you elaborate? After compiling the Ports, a _tor user is created. I could successfully launch Tor by su - _tor. If you want it to work as I've described, as a transparent proxy, you'll need to follow all the steps I've detailed. Yes, of course you can su - _tor The given start stop method is # /usr/local/etc/rc.d/tor start # /usr/local/etc/rc.d/tor stop The way I've described, the machine becomes a transparent tor proxy for all machines that use it as their default gateway and dns servers. This has a huge advantage in that the client machines are un-trickable. You don't have to figure out how to proxify anything. You cannot misconfigure their network / proxy settings. Everything uses the network exactly as it always does. If they have no direct access to the internet, they cannot be forced to reveal your real IP. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On 3/12/09, Gilles gilles.gana...@free.fr wrote: Hello I'd like to download information from our competitor's web site, without their knowing it's from us. Do you know of an alternative for FreeBSD, ie. a solution that will let me connect to a web server through at least one other host, and have the IP address change automatically every few minutes? It depends on how 'anonymous' it has to be. For simple corporate espionage script-type stuff, you could buy a small web-hosting service which provides an SSH account. You can get one of these for about $10.00 a month or less. Simply ssh to the remote server and do all of your bidding from there. It's inexpensive, convenient and somewhat anonomous. If your adversary has enough muscle to convince the web host to give out information about who owns the given IP, you'll need more protection. For actual anonymity from those with significant resources and the motivation to find you, the following should work. This goes beyond petty corporate espionage though, and requires significant motivation on your part as well: Buy a used laptop from a garage sale with cash. Make sure it has a wireless ethernet card or can accommodate one. Install BSD on it through a GELI encrypted GEOM. (No plain-text ever touches the disk.) Put the decryption key on a USB stick and leave it at a secure location NOT on your person. (Somewhere at home perhaps. You should covertly store the decryption key, itself encrypted and protected by a password, within an image or audio file on the USB stick via something like steghide. See: /usr/ports/security/steghide) This way, even if the USB stick is recovered, it contains no obvious information. In an audio or image file the decryption key will be indistinguishable from static or dark-current. Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to be a new pseudo-random value at each boot. Configure the system to automatically receive an IP address via DHCP. Dissable the wireless card. (Most have a physical switch.) Boot the system with the USB stick at home. Leave the USB stick at home! Plug the laptop it into a cigarette lighter adapter in your car. Go perusing through urban areas during daylight hours looking for un-secured wireless networks. (There are many to be found.) Once you find a connection, do your business. When totally done, issue the shutdown command. You, nor anyone else, will be able to boot the laptop without the decryption key, which you do NOT carry with you! In this manner if your adversary should approach you while in the field, simply cutting the power to the system should protect you from physical incrementing evidence. All but the most significantly motivated attackers should not be capable of obtaining any of the information on the laptop. Unless you're jumped by people in black suits while in the field, nobody will be able to connect you to the business you've been doing. Just remember not to do anything stupid from the laptop which would connect you to it, like checking your email. -Modulok- ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Anonymizer tool like Tor?
Hello I'd like to download information from our competitor's web site, without their knowing it's from us. The Tor network works fine, but they don't seem to provide a *nix version, much less a command-line version (the download script will run on a non-X FreeBSD 6.3 server). Do you know of an alternative for FreeBSD, ie. a solution that will let me connect to a web server through at least one other host, and have the IP address change automatically every few minutes? Thank you. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, 12 Mar 2009 10:12:48 +0100 Gilles gilles.gana...@free.fr wrote: I'd like to download information from our competitor's web site, without their knowing it's from us. ? The Tor network works fine, but they don't seem to provide a *nix version /usr/ports/security/tor/ Andreas -- GnuPG key : 0x2A573565|http://www.gnupg.org/howtos/de/ Fingerprint: 925D 2089 0BF9 8DE5 9166 33BB F0FD CD37 2A57 3565 pgpc91pNHdCXJ.pgp Description: PGP signature
Re: Anonymizer tool like Tor?
On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net wrote: /usr/ports/security/tor/ Thanks Andeas. Up to now, I only used the Tor client for Windows that comes with Privoxy, so never used Tor as-is, and never on the command line. If someone's used to using Tor, I have a couple of questions. On FreeBSD, I intend to use it to run a Python script to connect to a remote web server and download pages. Do I need to start the Tor server? Do I need a web proxy like Privoxy, or is the Tor client enough? How do set things up so my Python scripts connects to Tor? Thank you. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
I'd like to download information from our competitor's web site, without their knowing it's from us. so tell me address and i will download and send it ;) The Tor network works fine, but they don't seem to provide a *nix there is tor for unix in ports. tor works fine i used it a lot and stopped. Why - because it got to widely known and there are actually less secure than not using it at all. There are lots of hackers that run modified tor that do analyzes/changes what going through. I stopped when i once used it on my bank webpage and got message about change of SSL key!!! Not funny. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
Thanks Andeas. Up to now, I only used the Tor client for Windows that comes with Privoxy, so never used Tor as-is, and never on the command line. If someone's used to using Tor, I have a couple of questions. On FreeBSD, I intend to use it to run a Python script to connect to a remote web server and download pages. set up tor and use it as socks proxy with your browser and python script. You don't need privoxy for that. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, Mar 12, 2009 at 12:08 PM, Gilles gilles.gana...@free.fr wrote: On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net wrote: /usr/ports/security/tor/ Thanks Andeas. Up to now, I only used the Tor client for Windows that comes with Privoxy, so never used Tor as-is, and never on the command line. If someone's used to using Tor, I have a couple of questions. On FreeBSD, I intend to use it to run a Python script to connect to a remote web server and download pages. Do I need to start the Tor server? Do I need a web proxy like Privoxy, or is the Tor client enough? How do set things up so my Python scripts connects to Tor? Thank you. Not to put a damper on everyone's fun but wouldn't just be easier to go to an internet cafe, run you're web scraper from a USB drive and leave? ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
2009/3/12 Gilles gilles.gana...@free.fr: Hello I'd like to download information from our competitor's web site, without their knowing it's from us. The Tor network works fine, but they don't seem to provide a *nix version, much less a command-line version (the download script will run on a non-X FreeBSD 6.3 server). Do you know of an alternative for FreeBSD, ie. a solution that will let me connect to a web server through at least one other host, and have the IP address change automatically every few minutes? Thank you. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org Don't you think it's a bad idea to publish your nefarious intentions to a PUBLIC mailing list with your name on it? Your 'competitor' will see this if all s/he does is do a Google search for your name, which would certainly be easier than scouring their httpd logs. Chris -- R $h ! $- ! $+ $@ $2 @ $1 .UUCP. (sendmail.cf) ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
Chris Rees wrote: 2009/3/12 Gilles gilles.gana...@free.fr: Hello I'd like to download information from our competitor's web site, without their knowing it's from us. The Tor network works fine, but they don't seem to provide a *nix version, much less a command-line version (the download script will run on a non-X FreeBSD 6.3 server). Do you know of an alternative for FreeBSD, ie. a solution that will let me connect to a web server through at least one other host, and have the IP address change automatically every few minutes? Thank you. Don't you think it's a bad idea to publish your nefarious intentions to a PUBLIC mailing list with your name on it? Your 'competitor' will see this if all s/he does is do a Google search for your name, which would certainly be easier than scouring their httpd logs. Chris It probably is, but you're assuming his competitors know that he works for their competition, and, for that matter, that Giles is his real name, etc., etc. KDK -- Campbell's Law: Nature abhors a vacuous experimenter. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, 12 Mar 2009 13:40:54 +0200, Ross Cameron abal...@gmail.com wrote: Not to put a damper on everyone's fun but wouldn't just be easier to go to an internet cafe, run you're web scraper from a USB drive and leave? Not if the script will run for three days ;) ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, 12 Mar 2009 07:16:15 -0500, Kevin Kinsey k...@daleco.biz wrote: It probably is, but you're assuming his competitors know that he works for their competition, and, for that matter, that Giles is his real name, etc., etc. Exactly ;) ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, 12 Mar 2009 11:38:13 +0100 (CET), Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: set up tor and use it as socks proxy with your browser and python script. You don't need privoxy for that. Thanks for the tip. I'll look into how to modify the Python script to use SOCKS instead. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, 12 Mar 2009 11:38:13 +0100 (CET) Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: set up tor and use it as socks proxy with your browser and python script. You don't need privoxy for that. but isn't the point of of using privoxy to strip identifying information from http requests that would otherwise undermine tor. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, 12 Mar 2009 11:37:26 +0100 (CET), Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: there is tor for unix in ports. tor works fine i used it a lot and stopped. Why - because it got to widely known and there are actually less secure than not using it at all.There are lots of hackers that run modified tor that do analyzes/changes what going through. I stopped when i once used it on my bank webpage and got message about change of SSL key!!! Thanks for the reminder. I only use Tor when I download stuff and need to hide my IP. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
On Thu, Mar 12, 2009 at 03:04:05PM +, RW wrote: On Thu, 12 Mar 2009 11:38:13 +0100 (CET) Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote: set up tor and use it as socks proxy with your browser and python script. You don't need privoxy for that. but isn't the point of of using privoxy to strip identifying information from http requests that would otherwise undermine tor. It's been a while since I played with tor, but I recall that the documentation said that you have to combine tor and privoxy (or the equivalent) in order to surf anonymously. On the other hand, Giles is using his own script run from the command line, rather than a web browser, so I assume that he won't write the script to send info that he wants to hide. It would probably be a good idea check the http requests that are sent externally and see what info is being passed with them. Then he can determine for himself if he needs anything more than tor. Just my uninformed opinion. :) ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
Gilles wrote: On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net wrote: /usr/ports/security/tor/ Thanks Andeas. Up to now, I only used the Tor client for Windows that comes with Privoxy, so never used Tor as-is, and never on the command line. If someone's used to using Tor, I have a couple of questions. On FreeBSD, I intend to use it to run a Python script to connect to a remote web server and download pages. Do I need to start the Tor server? Do I need a web proxy like Privoxy, or is the Tor client enough? How do set things up so my Python scripts connects to Tor? As with all things BSD, the tor server potential is a lot more valuable than it's tor user potential. All the user gadgets (vidialia, privoxy, etc.) are very fallible. As long as your machine has a routable connection to the internet, your machine can be tricked into revealing it's IP, in sooo many ways. I realize this is only some minor corporate espionage, but bad practice is bad practice. Don't feel safe with it. You want a transparent tor proxy, which you setup with freebsd and pf. You setup a separate lan with any number of machines (virtual machines?), all using the tor server as their default gateway and dns server. To the client machines, all they see is 100% normal internet traffic. They don't need tor, vidalia, privoxy or any other gizmos. It's completely transparent. Bear in mind, anything not encrypted is exposed to the exit router and everything else it normally would be. If you google Tor Transparent Proxy, this should be your first link: https://wiki.torproject.org/noreply/TheOnionRouter/TransparentProxy Half way down they have the BSD / pf setup. Things not mentioned there (quite a few actually): You do not want to run tor as root, which unfortunately takes some tweeking to run properly as the default _tor user. Yes, you want to start tor automatically on boot with rc.conf: pf_enable=YES pf_rules=/etc/pf.conf tor_enable=YES You want routing disabled, you're actually doing redirection through pf, not routing. In pf.conf you want, at least: trans_port = 9040 transdns_port = 53 set skip on lo scrub in rdr pass on $int_if inet proto tcp to !($int_if) - 127.0.0.1 port $trans_port rdr pass on $int_if inet proto udp to port domain - 127.0.0.1 port $transdns_port You need to set group ownership on /dev/pf to _tor and set suitable permissions or sort this out somehow. _tor user needs access to /dev/pf And put this in devfs.conf so it survives a reboot. own pf root:_tor permpf 0660 You need to set net.inet.ip.portrange.reservedlow=54 or use some other method to allow the _tor user to bind to privileged ports. And put this in sysctl.conf so it survives a reboot. Obviously you should also run tor in a jail, but I'm not going to detail that. I had some bugginess with port binding, so I found it works best if you explicitly state, like so in /usr/local/etc/tor/torrc VirtualAddrNetwork 10.192.0.0/10 AutomapHostsOnResolve 1 TransPort 9040 TransListenAddress 192.168.0.1:9040 TransListenAddress 127.0.0.1:9040 DNSPort 53 DNSListenAddress 192.168.0.1:53 DNSListenAddress 127.0.0.1:53 RunAsDaemon 1 ControlPort 9051 Where 192.168.0.1 is the tor server's IP address of the interface being provided to the private LAN that will us it as their Default Gateway. Note also that if you try to set a ControlListenAddress without authentication setup, it will close all Control Ports on startup. So just leave it local. If it's not obvious, yes it's assumed you have a 2nd interface with a valid IP connected to a LAN that has a route to the internet. A major thing lacking is a command line tor control utility. And this is important. Sometimes you get crappy circuits, sometimes you get a hacker who is trying to SSL / SSH M-i-t-M you. You need to be able to flush the router and grab new circuits on demand. I just enable the control port locally and telnet to it. To get new circuits, on the control port (assuming you haven't set any authentication): AUTHENTICATE SIGNAL NEWNYM Then flush pf: pfctl -F all pftop is nice for watching your tor circuits (in ports). ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
T. wrote: I just enable the control port locally and telnet to it. To get new circuits, on the control port (assuming you haven't set any authentication): AUTHENTICATESIGNAL NEWNYM Typo, that should be with a line break, obviously: AUTHENTICATE (you'll get a response, then). SIGNAL NEWNYM (any time you need new circuits, though you may get into a rate limiting issues. Don't do it just for fun.) I think a command line utility is definitely in order. A remote control utility might be nice too. I found some mention that you're supposed to be able to use Vidalia to remote control a server with, but its obviously not designed for that and when I tried it did not work. Also, I'm pretty sure you do not want other Tor's running in your network (vidialia doesn't go into control mode unless you turn tor on requiring a path to local tor binary, thereby running tor) or on the client machines, or else you're greatly increasing your susceptibility to being identified via statistical approaches. Because, your tor traffic could be doing two bounces within your own network, then just connecting to an exit node. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
You don't need privoxy for that. but isn't the point of of using privoxy to strip identifying information from http requests that would otherwise undermine tor. if python script won't put any extras - what info you want to strip out? ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org
Re: Anonymizer tool like Tor?
stopped. Why - because it got to widely known and there are actually less secure than not using it at all.There are lots of hackers that run modified tor that do analyzes/changes what going through. I stopped when i once used it on my bank webpage and got message about change of SSL key!!! Thanks for the reminder. I only use Tor when I download stuff and need to hide my IP. me too - when i don't have another way to do this. ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org