Re: Anonymizer tool like Tor?

2009-03-14 Thread Wojciech Puchar

through a GELI encrypted GEOM. (No plain-text ever touches the disk.)


much better - use keyboard password.


Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to
be a new pseudo-random value at each boot. Configure the system to
automatically receive an IP address via DHCP. Dissable the wireless
card. (Most have a physical switch.) Boot the system with the USB
stick at home. Leave the USB stick at home! Plug the laptop it into a
cigarette lighter adapter in your car. Go perusing through urban areas
during daylight hours looking for un-secured wireless networks. (There
are many to be found.) Once you find a connection, do your business.


this works well in Poland.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-13 Thread Gilles
On Thu, 12 Mar 2009 13:47:07 -0400, T.
freebsd-questi...@lists.goldenpath.org wrote:
You want a transparent tor proxy, which you setup with freebsd and pf.

Thanks much for the help. If my modest Python script used to download
some web pages goes through Tor, is there a way for the remote web
server to somehow trace this connection back to me?

FWIW, the web server is run by people who do care for their data (they
sell company listings for a living), but aren't l33t hackers either.

You do not want to run tor as root, which unfortunately takes some 
tweeking to run properly as the default _tor user.

Can you elaborate? After compiling the Ports, a _tor user is
created. I could successfully launch Tor by su - _tor.

Thank you.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-13 Thread Wojciech Puchar

Thanks much for the help. If my modest Python script used to download
some web pages goes through Tor, is there a way for the remote web
server to somehow trace this connection back to me?


if you won't help them with extra info in request headers - no.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-13 Thread T.

Gilles wrote:

On Thu, 12 Mar 2009 13:47:07 -0400, T.
freebsd-questi...@lists.goldenpath.org wrote:
  

You want a transparent tor proxy, which you setup with freebsd and pf.



Thanks much for the help. If my modest Python script used to download
some web pages goes through Tor, is there a way for the remote web
server to somehow trace this connection back to me?

no


Can you elaborate? After compiling the Ports, a _tor user is
created. I could successfully launch Tor by su - _tor.

  


If you want it to work as I've described, as a transparent proxy, you'll 
need to follow all the steps I've detailed.


Yes, of course you can su - _tor
The given start stop method is
# /usr/local/etc/rc.d/tor start
# /usr/local/etc/rc.d/tor stop

The way I've described, the machine becomes a transparent tor proxy for 
all machines that use it as their default gateway and dns servers.
This has a huge advantage in that the client machines are un-trickable. 
You don't have to figure out how to proxify anything.
You cannot misconfigure their network / proxy settings. Everything uses 
the network exactly as it always does.
If they have no direct access to the internet, they cannot be forced to 
reveal your real IP.


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-13 Thread Modulok
On 3/12/09, Gilles gilles.gana...@free.fr wrote:
 Hello

 I'd like to download information from our competitor's web site,
 without their knowing it's from us.

 Do you know of an alternative for FreeBSD, ie. a solution that will
 let me connect to a web server through at least one other host, and
 have the IP address change automatically every few minutes?

It depends on how 'anonymous' it has to be. For simple corporate
espionage script-type stuff, you could buy a small web-hosting service
which provides an SSH account. You can get one of these for about
$10.00 a month or less. Simply ssh to the remote server and do all of
your bidding from there. It's inexpensive, convenient and somewhat
anonomous. If your adversary has enough muscle to convince the web
host to give out information about who owns the given IP, you'll need
more protection.

For actual anonymity from those with significant resources and the
motivation to find you, the following should work. This goes beyond
petty corporate espionage though, and requires significant motivation
on your part as well:

Buy a used laptop from a garage sale with cash. Make sure it has a
wireless ethernet card or can accommodate one. Install BSD on it
through a GELI encrypted GEOM. (No plain-text ever touches the disk.)
Put the decryption key on a USB stick and leave it at a secure
location NOT on your person. (Somewhere at home perhaps. You should
covertly store the decryption key, itself encrypted and protected by a
password, within an image or audio file on the USB stick via something
like steghide. See: /usr/ports/security/steghide) This way, even if
the USB stick is recovered, it contains no obvious information. In an
audio or image file the decryption key will be indistinguishable from
static or dark-current.

Edit the rc.conf file to spoof the Ethernet (MAC) hardware address to
be a new pseudo-random value at each boot. Configure the system to
automatically receive an IP address via DHCP. Dissable the wireless
card. (Most have a physical switch.) Boot the system with the USB
stick at home. Leave the USB stick at home! Plug the laptop it into a
cigarette lighter adapter in your car. Go perusing through urban areas
during daylight hours looking for un-secured wireless networks. (There
are many to be found.) Once you find a connection, do your business.
When totally done, issue the shutdown command. You, nor anyone else,
will be able to boot the laptop without the decryption key, which you
do NOT carry with you! In this manner if your adversary should
approach you while in the field, simply cutting the power to the
system should protect you from physical incrementing evidence. All but
the most significantly motivated attackers should not be capable of
obtaining any of the information on the laptop. Unless you're jumped
by people in black suits while in the field, nobody will be able to
connect you to the business you've been doing. Just remember not to do
anything stupid from the laptop which would connect you to it, like
checking your email.

-Modulok-
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Anonymizer tool like Tor?

2009-03-12 Thread Gilles
Hello

I'd like to download information from our competitor's web site,
without their knowing it's from us.

The Tor network works fine, but they don't seem to provide a *nix
version, much less a command-line version (the download script will
run  on a non-X FreeBSD 6.3 server).

Do you know of an alternative for FreeBSD, ie. a solution that will
let me connect to a web server through at least one other host, and
have the IP address change automatically every few minutes?

Thank you.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Andreas Rudisch
On Thu, 12 Mar 2009 10:12:48 +0100
Gilles gilles.gana...@free.fr wrote:

 I'd like to download information from our competitor's web site,
 without their knowing it's from us.

?

 The Tor network works fine, but they don't seem to provide a *nix
 version

/usr/ports/security/tor/

Andreas
--
GnuPG key  : 0x2A573565|http://www.gnupg.org/howtos/de/
Fingerprint: 925D 2089 0BF9 8DE5 9166  33BB F0FD CD37 2A57 3565


pgpc91pNHdCXJ.pgp
Description: PGP signature


Re: Anonymizer tool like Tor?

2009-03-12 Thread Gilles
On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net
wrote:
/usr/ports/security/tor/

Thanks Andeas. Up to now, I only used the Tor client for Windows that
comes with Privoxy, so never used Tor as-is, and never on the command
line.

If someone's used to using Tor, I have a couple of questions. On
FreeBSD, I intend to use it to run a Python script to connect to a
remote web server and download pages.

Do I need to start the Tor server? Do I need a web proxy like Privoxy,
or is the Tor client enough? How do set things up so my Python scripts
connects to Tor?

Thank you.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Wojciech Puchar


I'd like to download information from our competitor's web site,
without their knowing it's from us.


so tell me address and i will download and send it ;)



The Tor network works fine, but they don't seem to provide a *nix


there is tor for unix in ports. tor works fine i used it a lot and 
stopped.


Why - because it got to widely known and there are actually less secure 
than not using it at all.


There are lots of hackers that run modified tor that do analyzes/changes 
what going through.


I stopped when i once used it on my bank webpage and got message about 
change of SSL key!!!


Not funny.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Wojciech Puchar

Thanks Andeas. Up to now, I only used the Tor client for Windows that
comes with Privoxy, so never used Tor as-is, and never on the command
line.

If someone's used to using Tor, I have a couple of questions. On
FreeBSD, I intend to use it to run a Python script to connect to a
remote web server and download pages.



set up tor and use it as socks proxy with your browser and python script.

You don't need privoxy for that.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Ross Cameron
On Thu, Mar 12, 2009 at 12:08 PM, Gilles gilles.gana...@free.fr wrote:

 On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net
 wrote:
 /usr/ports/security/tor/

 Thanks Andeas. Up to now, I only used the Tor client for Windows that
 comes with Privoxy, so never used Tor as-is, and never on the command
 line.

 If someone's used to using Tor, I have a couple of questions. On
 FreeBSD, I intend to use it to run a Python script to connect to a
 remote web server and download pages.

 Do I need to start the Tor server? Do I need a web proxy like Privoxy,
 or is the Tor client enough? How do set things up so my Python scripts
 connects to Tor?

 Thank you.


Not to put a damper on everyone's fun but wouldn't just be easier to go to
an internet cafe, run you're web scraper from a USB drive and leave?
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Chris Rees
2009/3/12 Gilles gilles.gana...@free.fr:
 Hello

 I'd like to download information from our competitor's web site,
 without their knowing it's from us.

 The Tor network works fine, but they don't seem to provide a *nix
 version, much less a command-line version (the download script will
 run  on a non-X FreeBSD 6.3 server).

 Do you know of an alternative for FreeBSD, ie. a solution that will
 let me connect to a web server through at least one other host, and
 have the IP address change automatically every few minutes?

 Thank you.

 ___
 freebsd-questions@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-questions
 To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Don't you think it's a bad idea to publish your nefarious intentions
to a PUBLIC mailing list with your name on it? Your 'competitor' will
see this if all s/he does is do a Google search for your name, which
would certainly be easier than scouring their httpd logs.

Chris

--
R $h !  $- ! $+      $@ $2  @ $1 .UUCP.  (sendmail.cf)
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Kevin Kinsey

Chris Rees wrote:

2009/3/12 Gilles gilles.gana...@free.fr:

Hello

I'd like to download information from our competitor's web site,
without their knowing it's from us.

The Tor network works fine, but they don't seem to provide a *nix
version, much less a command-line version (the download script will
run  on a non-X FreeBSD 6.3 server).

Do you know of an alternative for FreeBSD, ie. a solution that will
let me connect to a web server through at least one other host, and
have the IP address change automatically every few minutes?

Thank you.



Don't you think it's a bad idea to publish your nefarious intentions
to a PUBLIC mailing list with your name on it? Your 'competitor' will
see this if all s/he does is do a Google search for your name, which
would certainly be easier than scouring their httpd logs.

Chris


It probably is, but you're assuming his competitors know that
he works for their competition, and, for that matter, that
Giles 
 is his real name, etc., etc.


KDK
--
Campbell's Law:
Nature abhors a vacuous experimenter.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Gilles
On Thu, 12 Mar 2009 13:40:54 +0200, Ross Cameron abal...@gmail.com
wrote:
Not to put a damper on everyone's fun but wouldn't just be easier to go to
an internet cafe, run you're web scraper from a USB drive and leave?

Not if the script will run for three days ;)

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Gilles
On Thu, 12 Mar 2009 07:16:15 -0500, Kevin Kinsey k...@daleco.biz
wrote:
It probably is, but you're assuming his competitors know that
he works for their competition, and, for that matter, that
Giles is his real name, etc., etc.

Exactly ;)

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Gilles
On Thu, 12 Mar 2009 11:38:13 +0100 (CET), Wojciech Puchar
woj...@wojtek.tensor.gdynia.pl wrote:
set up tor and use it as socks proxy with your browser and python script. You
 don't need privoxy for that.

Thanks for the tip. I'll look into how to modify the Python script to
use SOCKS instead.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread RW
On Thu, 12 Mar 2009 11:38:13 +0100 (CET)
Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote:


 set up tor and use it as socks proxy with your browser and python
 script.
 
 You don't need privoxy for that.

but isn't the point of of using privoxy to strip identifying
information from http requests  that would otherwise undermine tor.


___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Gilles
On Thu, 12 Mar 2009 11:37:26 +0100 (CET), Wojciech Puchar
woj...@wojtek.tensor.gdynia.pl wrote:
there is tor for unix in ports. tor works fine i used it a lot and 
stopped. Why - because it got to widely known and there are actually less 
secure 
than not using it at all.There are lots of hackers that run modified tor 
that do analyzes/changes 
what going through. I stopped when i once used it on my bank webpage and got 
message about 
change of SSL key!!!

Thanks for the reminder. I only use Tor when I download stuff and need
to hide my IP.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Bob Hall
On Thu, Mar 12, 2009 at 03:04:05PM +, RW wrote:
 On Thu, 12 Mar 2009 11:38:13 +0100 (CET)
 Wojciech Puchar woj...@wojtek.tensor.gdynia.pl wrote:
 
 
  set up tor and use it as socks proxy with your browser and python
  script.
  
  You don't need privoxy for that.
 
 but isn't the point of of using privoxy to strip identifying
 information from http requests  that would otherwise undermine tor.

It's been a while since I played with tor, but I recall that the
documentation said that you have to combine tor and privoxy (or the
equivalent) in order to surf anonymously. On the other hand, Giles is
using his own script run from the command line, rather than a web
browser, so I assume that he won't write the script to send info that he
wants to hide.

It would probably be a good idea check the http requests that are sent
externally and see what info is being passed with them. Then he can
determine for himself if he needs anything more than tor.

Just my uninformed opinion. :)
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread T.

Gilles wrote:

On Thu, 12 Mar 2009 10:42:53 +0100, Andreas Rudisch cyb.@gmx.net
wrote:
  

/usr/ports/security/tor/



Thanks Andeas. Up to now, I only used the Tor client for Windows that
comes with Privoxy, so never used Tor as-is, and never on the command
line.

If someone's used to using Tor, I have a couple of questions. On
FreeBSD, I intend to use it to run a Python script to connect to a
remote web server and download pages.

Do I need to start the Tor server? Do I need a web proxy like Privoxy,
or is the Tor client enough? How do set things up so my Python scripts
connects to Tor?


As with all things BSD, the tor server potential is a lot more valuable 
than it's tor user potential.
All the user gadgets (vidialia, privoxy, etc.) are very fallible. As 
long as your machine has a routable connection to the internet, your 
machine can be tricked into revealing it's IP, in sooo many ways.
I realize this is only some minor corporate espionage, but bad practice 
is bad practice. Don't feel safe with it.


You want a transparent tor proxy, which you setup with freebsd and pf.

You setup a separate lan with any number of machines (virtual 
machines?), all using the tor server as their default gateway and dns 
server.
To the client machines, all they see is 100% normal internet traffic. 
They don't need tor, vidalia, privoxy or any other gizmos.
It's completely transparent. Bear in mind, anything not encrypted is 
exposed to the exit router and everything else it normally would be.


If you google Tor Transparent Proxy, this should be your first link:
https://wiki.torproject.org/noreply/TheOnionRouter/TransparentProxy
Half way down they have the BSD / pf setup.

Things not mentioned there (quite a few actually):
You do not want to run tor as root, which unfortunately takes some 
tweeking to run properly as the default _tor user.

Yes, you want to start tor automatically on boot with rc.conf:
pf_enable=YES
pf_rules=/etc/pf.conf
tor_enable=YES

You want routing disabled, you're actually doing redirection through pf, 
not routing.

In pf.conf you want, at least:
trans_port = 9040
transdns_port = 53
set skip on lo
scrub in
rdr pass on $int_if inet proto tcp to !($int_if) - 127.0.0.1 port 
$trans_port
rdr pass on $int_if inet proto udp to port domain - 127.0.0.1 port 
$transdns_port


You need to set group ownership on /dev/pf to _tor and set suitable 
permissions or sort this out somehow. _tor user needs access to /dev/pf

And put this in devfs.conf so it survives a reboot.
own pf  root:_tor
permpf  0660

You need to set net.inet.ip.portrange.reservedlow=54 or use some other 
method to allow the _tor user to bind to privileged ports.

And put this in sysctl.conf so it survives a reboot.
Obviously you should also run tor in a jail, but I'm not going to detail 
that.


I had some bugginess with port binding, so I found it works best if you 
explicitly state, like so in /usr/local/etc/tor/torrc


VirtualAddrNetwork 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 9040
TransListenAddress 192.168.0.1:9040
TransListenAddress 127.0.0.1:9040
DNSPort 53
DNSListenAddress 192.168.0.1:53
DNSListenAddress 127.0.0.1:53
RunAsDaemon 1
ControlPort 9051

Where 192.168.0.1 is the tor server's IP address of the interface being 
provided to the private LAN that will us it as their Default Gateway.
Note also that if you try to set a ControlListenAddress without 
authentication setup, it will close all Control Ports on startup. So 
just leave it local.
If it's not obvious, yes it's assumed you have a 2nd interface with a 
valid IP connected to a LAN that has a route to the internet.


A major thing lacking is a command line tor control utility. And this is 
important.
Sometimes you get crappy circuits, sometimes you get a hacker who is 
trying to SSL / SSH M-i-t-M you.

You need to be able to flush the router and grab new circuits on demand.
I just enable the control port locally and telnet to it.
To get new circuits, on the control port (assuming you haven't set any 
authentication):


AUTHENTICATE
SIGNAL NEWNYM


Then flush pf:
pfctl -F all

pftop is nice for watching your tor circuits (in ports).
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread T.

T. wrote:

I just enable the control port locally and telnet to it.
To get new circuits, on the control port (assuming you haven't set any 
authentication):


AUTHENTICATESIGNAL NEWNYM


Typo, that should be with a line break, obviously:

AUTHENTICATE

(you'll get a response, then).

SIGNAL NEWNYM

(any time you need new circuits, though you may get into a rate limiting 
issues. Don't do it just for fun.)


I think a command line utility is definitely in order.
A remote control utility might be nice too. I found some mention that 
you're supposed to be able to use Vidalia to remote control a server 
with, but its obviously not designed for that and when I tried it did 
not work.


Also, I'm pretty sure you do not want other Tor's running in your 
network (vidialia doesn't go into control mode unless you turn tor on 
requiring a path to local tor binary, thereby running tor) or on the 
client machines, or else you're greatly increasing your susceptibility 
to being identified via statistical approaches. Because, your tor 
traffic could be doing two bounces within your own network, then just 
connecting to an exit node.

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Wojciech Puchar


You don't need privoxy for that.


but isn't the point of of using privoxy to strip identifying
information from http requests  that would otherwise undermine tor.


if python script won't put any extras - what info you want to strip out?
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org


Re: Anonymizer tool like Tor?

2009-03-12 Thread Wojciech Puchar

stopped. Why - because it got to widely known and there are actually less secure
than not using it at all.There are lots of hackers that run modified tor that 
do analyzes/changes
what going through. I stopped when i once used it on my bank webpage and got 
message about
change of SSL key!!!


Thanks for the reminder. I only use Tor when I download stuff and need
to hide my IP.


me too - when i don't have another way to do this.
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to freebsd-questions-unsubscr...@freebsd.org