Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread tor-op
On Mon, Sep 24, 2007 at 03:22:34AM +0200, Ricky Fitz wrote:
> Am Sonntag, den 23.09.2007, 20:50 -0400 schrieb [EMAIL PROTECTED]:
> > On Mon, Sep 24, 2007 at 12:42:31AM +0200, Ricky Fitz wrote:
> > > It is running on the same server my TOR-Server is running (called
> > > GrossATuin).
> > 
> > Does your proxy use a separate Tor client, do you exclude your node as
> > as an entry?
> 
> No, it does not use a seperate Tor-Client. Therefore it doesn't make
> sense to exklude my node. It uses the Tor-Session which runs as a
> tor-node. So if you spy on the traffic of the server, you will not be
> able to see, which traffic is from routing traffic for acting as a
> server, and which from acting as a client. I think that's safer than
> using a second client.

I was also wondering how this affects your proxy users anonymity. Even
if you don't disclose your proxy in the headers, there still is a
superior risk due to the fact that an attacker knows that there is a more
than average proportion of your users that are using you as first node.
This proportion is derivable from your proxy trafic (as you mention
there is some risk in having a second, different service that access
tor). Adding a fourth node to your server circuits could plug this hole,
even make it more secure for some users, I guess, but it would also make it 
slower, probably for every users (I'm not sure it would affect trafic for
which you are not the entry node).

> > I was wondering recently about the security implications of such a setup.
> > 
> > I was thinking of using a vpn to access my Tor server. From there, all vpn
> > traffic would be proxied through another tor instance running in client mode
> > with no bw limitations. Would that be more secure because a tor server
> > is already running there or less secure because, if in some way, the
> > traffic from the two instances could be differenciated and the vpn
> > connections would make the whole system less secure because they would
> > allow timing and statistical attacks relating vpn traffic to the second
> > tor traffic?
> 
> I really don't know, if it will be possible to identify the
> vpn-connection because of the data which is transferred.
> But it would be possible, to see that there is another servicei
> running than tor. Also, what Bluestar is doubled. 

I already use the vpn for other things local to that network so it's not
obvious that the trafic coming in is going out through tor or staying
in.

At the network level both tor connections look the same (random local port ->
tor server port). I was mostly asking if at Tor's level there would be some
abnormal behavior (like connecting twice to the same node) that could
tell an attacker that there is two tor instances generating those connections 
and, eventually allow him to tell their trafic apart.


> If we build a VPN from my server to yours, not
> only me is theoretical able to spy on the traffic, but also you. (Not
> that I want to say I do not trust you, but it kills the advantages of
> onion-system.

I was talking of a proxied vpn access to tor for tcp protocols. It's a
generalisation of your setup and so has the same implications
security-wise.

I'm not sure what a tunnel between servers could be used for (let alone
a vpn ;) Since you bring it up, I'm not sure but I think it could be considered
as an extension the family concept for tor servers...

Nice work on tor-proxy, anyway.

Regards


pgp1vlcJdOWlq.pgp
Description: PGP signature


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread phobos
On Mon, Sep 24, 2007 at 12:42:31AM +0200, [EMAIL PROTECTED] wrote 0.9K bytes in 
40 lines about:
: I just wanted to let you know, that I have set up a Webproxy to the
: TOR-Network, for letting people get the advantages of TOR who are not
: able to install TOR for themselves.

Hi,

  I have a few concerns about your proxy setup and service.  First off,
  you should disclaim that this site and service isn't an official
  project of Tor.  People may confuse your url with the real Tor and
  think they are getting the same anonymity properties.

  Second is a concern over the last bullet point at the bottom 
  of http://tor-proxy.net/impressum.html.  It appears to say that you are 
  recording IP address and browser in a log file.  Additionally, the log
  file is purged when 48 hours old.  Why log at all?  Simply disable all 
  logging in relation to the proxy service on the server.  The default
  Tor log settings should be sufficient.

  Third, can you publish the source code that runs the proxy site?  It
  appears you are using php and CGI:Proxy code to interface with Tor.
  Feel free to choose a FSF-approved license, such as the GPL or
  3-clause BSD, and publish the source for the site, along with any dependent
  software and licenses as required by their license terms.

  Fourth, in order to be more transparent, you should publish the
  configuration of the proxy.  A clear description, whether text or
  graphical, will help increase the trustworthiness of the service.

  Fifth, you probably want to publish the fingerprint of your
  self-signed ssl cert, or look into getting a cert signed by a browser
  accepted CA.  This is weak, but possibly better than nothing.

  Sixth and final, if you decide to put ads on the site or become a
  commercial entity, please contact The Tor Project before doing so.  We
  cannot allow a commercial entity to confuse users about Tor.  As an
  open source project, the disclaimer in the first paragraph may be
  enough to not confuse users.  

  Feel free to bring up any questions/concerns with my six requests.
  Thanks.

-- 
Andrew


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread Ricky Fitz
Am Sonntag, den 23.09.2007, 20:50 -0400 schrieb [EMAIL PROTECTED]:
> On Mon, Sep 24, 2007 at 12:42:31AM +0200, Ricky Fitz wrote:
> > It is running on the same server my TOR-Server is running (called
> > GrossATuin).
> 
> Does your proxy use a separate Tor client, do you exclude your node as
> as an entry?

No, it does not use a seperate Tor-Client. Therefore it doesn't make
sense to exklude my node. It uses the Tor-Session which runs as a
tor-node. So if you spy on the traffic of the server, you will not be
able to see, which traffic is from routing traffic for acting as a
server, and which from acting as a client. I think that's safer than
using a second client.

> I was wondering recently about the security implications of such a setup.
> 
> I was thinking of using a vpn to access my Tor server. From there, all vpn
> traffic would be proxied through another tor instance running in client mode
> with no bw limitations. Would that be more secure because a tor server
> is already running there or less secure because, if in some way, the
> traffic from the two instances could be differenciated and the vpn
> connections would make the whole system less secure because they would
> allow timing and statistical attacks relating vpn traffic to the second
> tor traffic?

I really don't know, if it will be possible to identify the
vpn-connection because of the data which is transferred. But it would be
possible, to see that there is another service running than tor. Also,
what Bluestar is doubled. If we build a VPN from my server to yours, not
only me is theoretical able to spy on the traffic, but also you. (Not
that I want to say I do not trust you, but it kills the advantages of
onion-system.

Regards.
Ricky.
-- 
"Falls Freiheit überhaupt etwas bedeutet, dann bedeutet sie das Recht
darauf, den Leuten das zu sagen, was sie nicht hören wollen." 
- George Orwell, aus dem Nachwort zu "Animal Farm", 1945 -

GPG-Fingerprint: 10D6 7B8F 1F7C 7CB1 2C4E 930E AFD2 FDF3 A10B D302
GPG-Key-ID: AFD2FDF3A10BD302
http://www.lawlita.com/pgp-schluessel/


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread tor-op
On Mon, Sep 24, 2007 at 12:42:31AM +0200, Ricky Fitz wrote:
> It is running on the same server my TOR-Server is running (called
> GrossATuin).

Does your proxy use a separate Tor client, do you exclude your node as
as an entry?

I was wondering recently about the security implications of such a setup.

I was thinking of using a vpn to access my Tor server. From there, all vpn
traffic would be proxied through another tor instance running in client mode
with no bw limitations. Would that be more secure because a tor server
is already running there or less secure because, if in some way, the
traffic from the two instances could be differenciated and the vpn
connections would make the whole system less secure because they would
allow timing and statistical attacks relating vpn traffic to the second
tor traffic?

If this is insecure then you could expose your users by using a second
instance.

If it is secure then it is a necessary mesure, I think. Otherwise, you
could be offering access to a lesser secure version of Tor for your
users by circumventing the three nodes "by-design" circuits of Tor.


pgpXJTOMh7WD2.pgp
Description: PGP signature


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread Ricky Fitz
Hi Bluestar,

> First: Another single-point-of-trust service. Principally a bad idea,
> because *you* know all the sites the users are surfing to! Why should I
> (as user) trust you?

Of course, that is true, and I mention it in the FAQ. But you can ask
every anonymizer on the web the same question. Of course it is better to
use TOR by yourself, but as I said, it is not made for people who can
run their own TOR-Session.

> Your HTTP-VIA  1.1 v31663.1blu.de:8080 (squid/2.6.STABLE1)
> 
> Like this you are uncovering the the first onion hop (yourself).
> 
> You should fix that, at least!

Thanks a lot for that hint, should be fixed now.

Best regards,
Ricky.
-- 
"Falls Freiheit überhaupt etwas bedeutet, dann bedeutet sie das Recht
darauf, den Leuten das zu sagen, was sie nicht hören wollen." 
- George Orwell, aus dem Nachwort zu "Animal Farm", 1945 -

GPG-Fingerprint: 10D6 7B8F 1F7C 7CB1 2C4E 930E AFD2 FDF3 A10B D302
GPG-Key-ID: AFD2FDF3A10BD302
http://www.lawlita.com/pgp-schluessel/


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread BlueStar88
Ricky Fitz schrieb:
> Hi Folks,
> 
> I just wanted to let you know, that I have set up a Webproxy to the
> TOR-Network, for letting people get the advantages of TOR who are not
> able to install TOR for themselves.

[...]

> 
> Let me know what you think about!
> 
> Greetings,
> Ricky.

First: Another single-point-of-trust service. Principally a bad idea,
because *you* know all the sites the users are surfing to! Why should I
(as user) trust you?

Second: You are showing your proxy host name to the target web service.
This...

https://www.tor-proxy.net/cgi-bin/nph-proxy.cgi/00A/http/torcheck.xenobite.eu/

...leads to following result:

Your HTTP-VIA1.1 v31663.1blu.de:8080 (squid/2.6.STABLE1)

Like this you are uncovering the the first onion hop (yourself).

You should fix that, at least!



Greets

-- 


BlueStar88

PGPID: 0x36150C86
PGPFP: E9AE 667C 4A2E 3F46 9B69 9BB2 FC63 8933 3615 0C86



signature.asc
Description: OpenPGP digital signature


Set up a webproxy to TOR - tor-proxy.net

2007-09-23 Thread Ricky Fitz
Hi Folks,

I just wanted to let you know, that I have set up a Webproxy to the
TOR-Network, for letting people get the advantages of TOR who are not
able to install TOR for themselves.

For example, if they are using a computer, they do not have full access
to, or something else.

It is running on the same server my TOR-Server is running (called
GrossATuin).

You can reach it here:

http://www.tor-proxy.net or
https://www.tor-proxy.net

Let me know what you think about!

Greetings,
Ricky.


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Servers and the "Named" flag (was Re: time needed to register a serve)

2007-09-23 Thread Roger Dingledine
On Tue, Sep 18, 2007 at 03:06:53AM -0500, Scott Bennett wrote:
>  Does anyone have a sense of the current processing delay in registering
> a server?  I ask only because I sent off the registration information to
> [EMAIL PROTECTED] last Thursday evening, 13 Sept., and my server is still
> showing up in the status documents without the "Named" flag in them.
>  It's not a big deal; I'm just curious.  Processing of flight instructor
> certificate renewals is now said to take more than six months, and the
> certificates have to be renewed every 24 months.  (Your tax dollars at work,
> of course. :-)

Alas, we've pretty much stopped assigning the Named flag to servers.
This is because it's a time-sink to manually go through and make sure
the server is actually acting correctly, go put the keys in the right
place, etc. There have been some proposals to make it easier, e.g.
https://tor.eff.org/svn/trunk/doc/spec/proposals/113-fast-authority-interface.txt
and at some point we should do one of them. See also the discussion
under http://archives.seul.org/or/dev/Apr-2007/msg00040.html
I'm a fan of solution #2 in the above url: there's no reason why a human
needs to be in the loop, and if we don't know the operator on the other
end, the "Named" flag doesn't mean what it meant in 2003 when we created
it anyway.

Once upon a time (2003 era), you needed to be manually approved or you
wouldn't be able to join the network. The primary reason was that we
needed to verify that your server was reachable, working, etc. Then
we got more than a dozen servers, including servers run by people we
didn't know, and we automated the process of testing reachability at the
directory authorities. Then we started to allow unnamed servers to join
the network and play pretty much the same role.

The only main difference at this point is from the client perspective:
if you manually specify a non-named server in your torrc or using the
foo.exit syntax, your Tor will complain to you (well, to your logs)
and suggest a hex digest that you should use instead.

Now, there is an argument for letting people remember nicknames rather
than hex digests. But I would eventually like to see some sort of
graphical "server picking" interface that most users would use, and it
would be smart enough to know the hex digest of the picked server. If,
that is, we need any sort of server picking to be happening at all --
most users I hear from who need to specify a specific server rather than
just let Tor pick for them seem to be doing it to get around crude access
controls on websites or other services, and I'm not sure that's an arms
race I want to get into.

There are other problems that need to be solved from a usability angle.
For example, if the nickname Alice picks is already registered, then when
she tries to sign up her server, it will print a mysterious message in her
logs ("there are logs? what's a log?") and her server won't be useful. We
need to make that simpler somehow, and the simplest approach for now
(by default) is to not have many Named servers. My preferred solution
would be to add an "Unnamed" flag that servers get when they're using a
nickname that is already registered -- the server will continue to be a
fine server, but it will be invisible from the perspective of referring
to servers by nickname.

And lastly, one of the crucial reasons for maintaining contact with server
operators is so they feel appreciated, and so we have an opportunity
to answer their questions, address their concerns and problems, etc.
Maintaining communication with the server community helps it to grow
and be stable. We are doing a poor job at that currently. A few years
ago I realized that I could choose between answering a whole lot
more mail (and having the number of good Tor servers keep going up)
and getting more development work done on Tor. Since Tor is nowhere
close to done, the latter was the clear choice -- as long as there
is *some* sort of Tor network, that's good enough for testing the new
scalability/anonymity/performance features and bugfixes.

Peter Palfrader then stepped up to answer mail for a while, but he
soon found it to be a flood too. My fix at the time was to modify
https://tor.eff.org/docs/tor-doc-server#email to make it clearer that we
may not ever answer the mails. Maybe I should make the statement even
stronger, or just erase 'step four' entirely, until somebody sorts out
proposal 113 and implements and deploys a good solution.

I don't think getting a pile of volunteers to answer the mails is the
right answer -- we should instead a) work to take out the artificial
bottleneck (help appreciated! :), and b) figure out better ways to build
server operator community that don't involve as much manual attention
from me (help appreciated! :).

Thanks,
--Roger



Re: Warning TorButton 1.1.7-alfa

2007-09-23 Thread Mike Perry
Thus spake Scott Bennett ([EMAIL PROTECTED]):

>  On Sun, 23 Sep 2007 06:47:17 -0400 [EMAIL PROTECTED] wrote:
> >I upgraded to 1.1.7-alfa yesterday and saw that it is really a crap :(
> >
> >I used to manage my cookies, javacsript and history, MYSELF. Now trobutton 
> >wants to do all by itself, and the result is that:
> >
> >1- My history isn't cleared when I close Firefox, even when this option is 
> >selected in the Firefox options.
> >
> >2- Some websites that use javascript do not work with Tor. It is possible 
> >that I TRUST the CONTENT of a website, including scripts, BUT I want to use 
> >TOR to hide my IP. With torbutton this is a real hassle now.
> 
>  That kind of thing is only one of the reasons I do not use TorButton and
> most likely never will.

Can you give me a list of websites torbutton breaks for you? And how
does it break them? Toggling torbutton will kill javascript in
websites that are currently open, but you want that, unless you like
random javascript timers going off and sending your real IP to
website.

> >Will try to go back to an older version if it is still available online 
> >:( Torbutton is a GREAT extension but WHY hell does the author want to 
> >care of all together??? Maybe he should also include Firefox in the 
> >extension, and why not, Windows or a unix distribution??? really BAD now 
> >:
> 
>  (You have a bad case of linewrap there, friend. :-)
>  You could also try FoxyProxy, which I have used in the past, or
> SwitchProxy, which I prefer use now.  (I used FoxyProxy for a while at a time
> when SwitchProxy stopped working.  But then FoxyProxy came out with a version
> that didn't work, and I was afraid I might have to go with TorButton.  But
> SwitchProxy returned to the rescue with a newer, working version.:-)  These
> two are both more versatile than TorButton in the sense that they allow you
> to configure as many different proxies as you like and to switch between them
> at will.  Each proxy can, of course, be configured with addresses that bypass
> proxies entirely, too.

SwitchProxy should be usable with Torbutton. If you configure your Tor
proxy settings as one of the proxies, Torbutton should detect when it
is enabled and turn on its security features for you without your
needing to actually hit the torbutton itself. If it does not, it is a
bug. Please report it.

Again, Torbutton protects against numerous web exploits that can
reveal your IP address when you use vanilla proxy changers. Please
read over http://torbutton.torproject.org/dev/ before you go
recommending insecure solutions to people, or simply hate on Torbutton
without providing any bug reports to the maintainer as to why.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpuXyEwrNzwc.pgp
Description: PGP signature


Re: Warning TorButton 1.1.7-alfa

2007-09-23 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

> I upgraded to 1.1.7-alfa yesterday and saw that it is really a crap
> :(

Thanks for the bug report. Even though it is a bit immaturely
delivered with lots of whining instead of actual helpful content, I
will do my best to fix the issues you have encountered.
 
> I used to manage my cookies, javacsript and history, MYSELF. Now
> trobutton wants to do all by itself, and the result is that:
>
> 1- My history isn't cleared when I close Firefox, even when this
> option is selected in the Firefox options.

This is a bug. It will be fixed in 1.1.8. Thanks for reporting!

In the meantime, the workaround is to go into the Torbutton
preferences, go to the "Shutdown" tab, and click "Allow me to manage
my own Private Data Settings."

> 2- Some websites that use javascript do not work with Tor. It is
> possible that I TRUST the CONTENT of a website, including scripts,
> BUT I want to use TOR to hide my IP. With torbutton this is a real
> hassle now.

Is it possible for you to give me a list of websites torbutton breaks?
or describe how it breaks then? It works for me and I have recieved no
reports of breakage so far from others.

> Will try to go back to an older version if it is still available
> online :( Torbutton is a GREAT extension but WHY hell does the
> author want to care of all together??? Maybe he should also include
> Firefox in the extension, and why not, Windows or a unix
> distribution??? really BAD now :

You can hate on me all day long, but the fact of the matter is that
every other Firefox extension combo (including self management up to
the point of a Tor-only firewall) leaves you vulnerable to numerous
attacks to reveal your IP address and other location infromation. So
people can either help me fix Torbutton so it is usable for them, or
they can choose to remain vulnerable.

You may want to read over http://torbutton.torproject.org/dev/ to see
what sort of things you are vulnerable to without torbutton. If that
documentation is unclear, again, please notify me.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpos06cJRbaG.pgp
Description: PGP signature


Re: time needed to register a serve

2007-09-23 Thread Kasimir Gabert
Hello,

I must add that I have also tried to register kgabertgoldmine2 *twice*
since around the end of June, 2007, and seeing that it has not
happened I assumed that servers which are trying to be named are not
even being looked at.  When I registered kgabertgoldmine (which is now
offline, and I registered it quite awhile back), I received a response
within two days.

Kasimir Gabert

On 9/23/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> On Tue, Sep 18, 2007 at 10:38:14PM -0700, [EMAIL PROTECTED] wrote 1.8K bytes 
> in 53 lines about:
>
> I'm trying to find the details, but essentially the "named" flag isn't
> as valuable as it was in the past.  Perhaps Roger or Nick can weigh in
> with more info.
>
> We do receive all of the emails to tor-ops with your server info sent in
> via https://tor.eff.org/docs/tor-doc-server.html.en#email.
>
> --
> Andrew
>


-- 
Kasimir Gabert


Re: About HTTP 1.1 Cache

2007-09-23 Thread Juliusz Chroboczek
>> Most servers treat Last-Modified values as opaque validators --

> IIS and Apache -- don't.

Interesting -- thanks for the info.

Juliusz


Re: Load Balancing

2007-09-23 Thread Fabian Keil
Juliusz Chroboczek <[EMAIL PROTECTED]> wrote:

> > I believe this results in a perceptible performance improvement for general 
> > browsing.
> 
> I think so too, but some people disagree.  Since I don't want to get
> into this discussion again, I refer you to the following friendly flamewar.

Additionally there's http://tor.eff.org/volunteer.html.en#Coding:

|We need a measurement study of Polipo vs Privoxy. Is Polipo in
|fact significantly faster, once you factor in the slow-down from Tor?
|Are the results the same on both Linux and Windows? Related, does Polipo
|handle more web sites correctly than Privoxy, or vice versa? Are there
|stability issues on any common platforms, e.g. Windows?

Looks like the first person who comes up with a reproducible
benchmark could make three projects happy at the same time.

> (Note that while the tone was not always as polite as it should have
> been, Fabian and I live in good friendship and mutual respect.)

I second that.

Fabian


signature.asc
Description: PGP signature


Re: About HTTP 1.1 Cache

2007-09-23 Thread Fabian Keil
Juliusz Chroboczek <[EMAIL PROTECTED]> wrote:

> > That's why Privoxy can randomize the time within ranges that
> > are unlikely to cause revalidation failures:
> > http://www.privoxy.org/user-manual/actions-file.html#HIDE-IF-MODIFIED-SINCE
> > http://www.privoxy.org/user-manual/actions-file.html#OVERWRITE-LAST-MODIFIED
> 
> I believe you're referring to the following functionality:
> 
>   > The "randomize" option overwrites the value of the
>   > "Last-Modified:" header with a randomly chosen time between the
>   > original value and the current time.

Indeed.
 
> Most servers treat Last-Modified values as opaque validators --
> i.e. ``IMS: foo'' matches if the modification date is not exactly foo,
> rather than matching if the modification date is more recent than foo.
> Hence, in practice the randomize setting will bust the cache.

I'm aware that Gatling does that, but the others I checked
-- including IIS and Apache -- don't. Privoxy log excerpt for the latter:

Initial request:

14:22:35.875 283a8500 Header: GET http://www.apache.org/favicon.ico HTTP/1.1
14:22:35.875 283a8500 Header: Tagger 'http-method' added tag 'GET'. No action 
bits update necessary.
14:22:35.876 283a8500 Header: Tagger 'client-ip-address' added tag 'IP-ADDRESS: 
10.0.0.1'. No action bits update necessary.
14:22:35.876 283a8500 Header: scan: User-Agent: curl/7.16.3 
(i386-portbld-freebsd7.0) libcurl/7.16.3 OpenSSL/0.9.8e zlib/1.2.3
14:22:35.876 283a8500 Header: Tagger 'user-agent' added tag 'User-Agent: 
curl/7.16.3 (i386-portbld-freebsd7.0) libcurl/7.16.3 OpenSSL/0.9.8e 
zlib/1.2.3'. Action bits updated accordingly.
14:22:35.876 283a8500 Header: scan: Host: www.apache.org
14:22:35.876 283a8500 Header: scan: Pragma: no-cache
14:22:35.876 283a8500 Header: scan: Accept: */*
14:22:35.876 283a8500 Header: scan: Proxy-Connection: Keep-Alive
14:22:35.876 283a8500 Header: Modified: User-Agent: Mozilla/5.0 (X11; U; 
FreeBSD sparc64; nl-NL; rv:1.8.1.6) Gecko/20070805 Firefox/2.0.0.6
14:22:35.876 283a8500 Header: crumble crunched: Proxy-Connection: Keep-Alive!
14:22:35.877 283a8500 Header: Adding: Connection: close
14:22:35.877 283a8500 Connect: Overriding forwarding settings based on 
'forward-socks4a tor-jail:9050 .'
14:22:35.877 283a8500 Header: New HTTP Request-Line: GET /favicon.ico HTTP/1.1
14:22:35.877 283a8500 Redirect: Decoding /favicon.ico if necessary.
14:22:35.877 283a8500 Redirect: Checking /favicon.ico for redirects.
14:22:35.877 283a8500 Request: www.apache.org/favicon.ico
14:22:35.877 283a8500 Connect: to www.apache.org
14:22:38.900 283a8500 Header: scan: HTTP/1.1 200 OK
14:22:38.900 283a8500 Header: scan: Date: Sun, 23 Sep 2007 12:22:38 GMT
14:22:38.900 283a8500 Header: scan: Server: Apache/2.3.0-dev (Unix)
14:22:38.900 283a8500 Header: scan: Last-Modified: Fri, 19 Aug 2005 07:37:30 GMT
14:22:38.900 283a8500 Header: scan: ETag: "31a763-e36-66f00280"
14:22:38.900 283a8500 Header: scan: Accept-Ranges: bytes
14:22:38.900 283a8500 Header: scan: Content-Length: 3638
14:22:38.900 283a8500 Header: scan: Cache-Control: max-age=86400
14:22:38.901 283a8500 Header: scan: Expires: Mon, 24 Sep 2007 12:22:38 GMT
14:22:38.901 283a8500 Header: scan: Connection: close
14:22:38.901 283a8500 Header: scan: Content-Type: image/x-icon
14:22:38.901 283a8500 Header: Tagger 'content-type' added tag 'image/x-icon'. 
No action bits update necessary.
14:22:38.901 283a8500 Header: Randomizing: Last-Modified: Fri, 19 Aug 2005 
07:37:30 GMT
14:22:38.901 283a8500 Header: Randomized:  Last-Modified: Wed, 29 Mar 2006 
06:51:34 GMT (added 221 days 23 hours 14 minutes 4 seconds)
10.0.0.1 - - [23/Sep/2007:14:22:39 +0200] "GET 
http://www.apache.org/favicon.ico HTTP/1.1" 200 3638

Successful revalidation request:

14:23:04.369 283a8f00 Header: GET http://www.apache.org/favicon.ico HTTP/1.1
14:23:04.369 283a8f00 Header: Tagger 'http-method' added tag 'GET'. No action 
bits update necessary.
14:23:04.369 283a8f00 Header: Tagger 'client-ip-address' added tag 'IP-ADDRESS: 
10.0.0.1'. No action bits update necessary.
14:23:04.369 283a8f00 Header: scan: User-Agent: curl/7.16.3 
(i386-portbld-freebsd7.0) libcurl/7.16.3 OpenSSL/0.9.8e zlib/1.2.3
14:23:04.369 283a8f00 Header: Tagger 'user-agent' added tag 'User-Agent: 
curl/7.16.3 (i386-portbld-freebsd7.0) libcurl/7.16.3 OpenSSL/0.9.8e 
zlib/1.2.3'. Action bits updated accordingly.
14:23:04.370 283a8f00 Header: scan: Host: www.apache.org
14:23:04.370 283a8f00 Header: scan: Pragma: no-cache
14:23:04.370 283a8f00 Header: scan: Accept: */*
14:23:04.370 283a8f00 Header: scan: Proxy-Connection: Keep-Alive
14:23:04.371 283a8f00 Header: scan: If-Modified-Since: Wed, 29 Mar 2006 
06:51:34 GMT
14:23:04.371 283a8f00 Header: Tagger 'revalidation' added tag 
'REVALIDATION-REQUEST'. No action bits update necessary.
14:23:04.371 283a8f00 Header: Modified: User-Agent: Mozilla/5.0 (X11; U; 
FreeBSD sparc64; nl-NL; rv:1.8.1.6) Gecko/20070805 Firefox/2.0.0.6
14:23:04.371 283a8f00 Header: Randomizing: If-Modified-Since: Wed, 29 Mar 2006 

Re: time needed to register a serve

2007-09-23 Thread phobos
On Tue, Sep 18, 2007 at 10:38:14PM -0700, [EMAIL PROTECTED] wrote 1.8K bytes in 
53 lines about:

I'm trying to find the details, but essentially the "named" flag isn't
as valuable as it was in the past.  Perhaps Roger or Nick can weigh in
with more info.

We do receive all of the emails to tor-ops with your server info sent in
via https://tor.eff.org/docs/tor-doc-server.html.en#email.  

-- 
Andrew


Re: Warning TorButton 1.1.7-alfa

2007-09-23 Thread phobos
On Sun, Sep 23, 2007 at 06:47:17AM -0400, [EMAIL PROTECTED] wrote 0.8K bytes in 
9 lines about:
: I used to manage my cookies, javacsript and history, MYSELF. Now trobutton 
wants to do all by itself, and the result is that:
: 1- My history isn't cleared when I close Firefox, even when this option is 
selected in the Firefox options.
: 2- Some websites that use javascript do not work with Tor. It is possible 
that I TRUST the CONTENT of a website, including scripts, BUT I want to use TOR 
to hide my IP. With torbutton this is a real hassle now.

The options available in the new torbutton are listed here:
http://www.freehaven.net/~squires/torbutton/dev/

The goal, I believe, is to try to address many of the exploits Tor users
may encounter when browsing the web with Firefox.  

The older version is still online at
https://addons.mozilla.org/firefox/2275/

-- 
Andrew


Re: Warning TorButton 1.1.7-alfa

2007-09-23 Thread Scott Bennett
 On Sun, 23 Sep 2007 13:10:28 +0200 Florian Reitmeir <[EMAIL PROTECTED]>
wrote:

>On Sun, 23 Sep 2007, [EMAIL PROTECTED] wrote:
>
>> I upgraded to 1.1.7-alfa yesterday and saw that it is really a crap :(
>maybe you didn't realize that this is release is _alpha_ quality?
>
>> I used to manage my cookies, javacsript and history, MYSELF. Now trobutton 
>> wants to do all by itself, and the result is that:
>> 
>> 1- My history isn't cleared when I close Firefox, even when this option is 
>> selected in the Firefox options.
>> 
>> 2- Some websites that use javascript do not work with Tor. It is possible 
>> that I TRUST the CONTENT of a website, including scripts, BUT I want to use 
>> TOR to hide my IP. With torbutton this is a real hassle now.
>> 
>> Will try to go back to an older version if it is still available online 
>> :( Torbutton is a GREAT extension but WHY hell does the author want to 
>> care of all together??? Maybe he should also include Firefox in the 
>> extension, and why not, Windows or a unix distribution??? really BAD now 
>> :
>
>So all your above points are against:
>   - websites which use javascript
>   - firefox

 Read it again.  His complaint, basically, was that TorButton had removed
his option to choose the functioning of various aspects of his browser usage.
>
>Are there any On-Topic things so say about Tor?
>
 Last time I checked (a few hours ago now), TorButton was being distributed
as part of a bundle including tor and privoxy, as well, for the Defective OS.
Seems to me that discussion of bugs/misfeatures/whatever about software that
is distributed with tor from the tor web site is very much on topic for a tor
email discussion list.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: Warning TorButton 1.1.7-alfa

2007-09-23 Thread Scott Bennett
 On Sun, 23 Sep 2007 06:47:17 -0400 [EMAIL PROTECTED] wrote:
>I upgraded to 1.1.7-alfa yesterday and saw that it is really a crap :(
>
>I used to manage my cookies, javacsript and history, MYSELF. Now trobutton 
>wants to do all by itself, and the result is that:
>
>1- My history isn't cleared when I close Firefox, even when this option is 
>selected in the Firefox options.
>
>2- Some websites that use javascript do not work with Tor. It is possible that 
>I TRUST the CONTENT of a website, including scripts, BUT I want to use TOR to 
>hide my IP. With torbutton this is a real hassle now.

 That kind of thing is only one of the reasons I do not use TorButton and
most likely never will.
>
>Will try to go back to an older version if it is still available online :( 
>Torbutton is a GREAT extension but WHY hell does the author want to care of 
>all together??? Maybe he should also include Firefox in the extension, and why 
>not, Windows or a unix distribution??? really BAD now :

 (You have a bad case of linewrap there, friend. :-)
 You could also try FoxyProxy, which I have used in the past, or
SwitchProxy, which I prefer use now.  (I used FoxyProxy for a while at a time
when SwitchProxy stopped working.  But then FoxyProxy came out with a version
that didn't work, and I was afraid I might have to go with TorButton.  But
SwitchProxy returned to the rescue with a newer, working version.:-)  These
two are both more versatile than TorButton in the sense that they allow you
to configure as many different proxies as you like and to switch between them
at will.  Each proxy can, of course, be configured with addresses that bypass
proxies entirely, too.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: Warning TorButton 1.1.7-alfa

2007-09-23 Thread Florian Reitmeir
Hi,

On Sun, 23 Sep 2007, [EMAIL PROTECTED] wrote:

> I upgraded to 1.1.7-alfa yesterday and saw that it is really a crap :(
maybe you didn't realize that this is release is _alpha_ quality?

> I used to manage my cookies, javacsript and history, MYSELF. Now trobutton 
> wants to do all by itself, and the result is that:
> 
> 1- My history isn't cleared when I close Firefox, even when this option is 
> selected in the Firefox options.
> 
> 2- Some websites that use javascript do not work with Tor. It is possible 
> that I TRUST the CONTENT of a website, including scripts, BUT I want to use 
> TOR to hide my IP. With torbutton this is a real hassle now.
> 
> Will try to go back to an older version if it is still available online 
> :( Torbutton is a GREAT extension but WHY hell does the author want to 
> care of all together??? Maybe he should also include Firefox in the 
> extension, and why not, Windows or a unix distribution??? really BAD now :

So all your above points are against:
- websites which use javascript
- firefox

Are there any On-Topic things so say about Tor?

-- 
Florian Reitmeir


Warning TorButton 1.1.7-alfa

2007-09-23 Thread force44
I upgraded to 1.1.7-alfa yesterday and saw that it is really a crap :(

I used to manage my cookies, javacsript and history, MYSELF. Now trobutton 
wants to do all by itself, and the result is that:

1- My history isn't cleared when I close Firefox, even when this option is 
selected in the Firefox options.

2- Some websites that use javascript do not work with Tor. It is possible that 
I TRUST the CONTENT of a website, including scripts, BUT I want to use TOR to 
hide my IP. With torbutton this is a real hassle now.

Will try to go back to an older version if it is still available online :( 
Torbutton is a GREAT extension but WHY hell does the author want to care of all 
together??? Maybe he should also include Firefox in the extension, and why not, 
Windows or a unix distribution??? really BAD now :