Re: Vidalia Bundle and RSS in Thunderbird 3.0

2009-12-29 Thread Erilenz
* on the Tue, Dec 29, 2009 at 09:54:33AM -0600, Programmer In Training wrote:

>> r...@esse:~# grep '\*:465' /var/lib/tor/cached-descriptors|wc -l
>> 296
> 
> 
> God I hope you're not using your root account as your normal user account.

I don't, no. I just su'd to root to get access to /var/lib/tor

"drwx--S--- 3 debian-tor debian-tor 4096 2009-12-29 12:09 /var/lib/tor/" 

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Vidalia Bundle and RSS in Thunderbird 3.0

2009-12-29 Thread Erilenz
* on the Mon, Dec 28, 2009 at 09:12:10PM -0600, Scott Bennett wrote:

>> Actually, no.  The default exit policy blocks smtp ports.  Sometimes,
>> you can find exit nodes that allow smtp.  These are times are typically
>> few and far between.
> 
>  I thought that, pursuant to a discussion here last year or the year
> before, the default exit policy was changed to allow the smtps port.  Did
> that change not get made after all?

It did. Port 25 is rejected in the default policy, but 587 and 465 are not
any longer:

r...@esse:~# grep '\*:465' /var/lib/tor/cached-descriptors|wc -l
296
r...@esse:~# grep '\*:587' /var/lib/tor/cached-descriptors|wc -l
297
r...@esse:~# grep '\*:25' /var/lib/tor/cached-descriptors|wc -l
1127
r...@esse:~# 

If you're using TLS on port 587 then some information will be sent in plain
text for the exit node to sniff. The welcome banner, and the EHLO
request/response. If you can use SSL on connect on port 465, then nothing
is sent in plain text.

Other than DNS leaks, you need to make sure Thunderbird doesn't leak any
other information in the EHLO or the headers when sending mail.

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Google DNS

2009-12-03 Thread Erilenz
Google launched a free recursive DNS resolver service today:

http://googleblog.blogspot.com/2009/12/introducing-google-public-dns.html

It doesn't hijack NXDOMAIN or do any other sort of filtering. Just
thought I would mention it as the topic of countries blocking DNS
lookups or Exits using OpenDNS comes up every so often.

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Reduce hops when privacy level allows to save Tor network bandwidth

2009-11-19 Thread Erilenz
* on the Thu, Nov 19, 2009 at 07:43:01AM -0500, Andrew Lewman wrote:

>> That's fine, as long as you're assuming that people only use Tor when they 
>> need
>> strong anonymity. As soon as you realise that people who don't need strong
>> anonymity are using it as well, your point fails. Whether or not they 
>> *should*
>> be doing so is irrelevant. The options are:
>> 
>> 1.) Ignore that they're doing it
>> 2.) Prevent them from doing it
>> 3.) Make their impact smaller when they are doing it
>> 
>> I choose 3.
> 
> You are going to BMW asking them to include features from Ford, because
> you personally like some features found in Ford trucks.  If only BMW
> cars would include these features, then you'd buy a BMW and stop
> complaining about the lack of Ford features.

That is the worse analogy I've ever seen. It's terribly constructed and
doesn't bare even the slightest resemblance to what is being discussed.
Please try again. Or don't.

> This is the borderline definition of trolling.

No it's not. I've not done anything which would suggest I was trolling.
Random claims that somebody is trolling in order to discredit what they're
saying ... now *that's* trolling.

> Until the research shows less than three hops is as safe as the current
> three hops, we as the Tor Project are not changing the default number of
> hops.

Are you suggesting that I said something about changing the default number
of hops? I explicitly stated the *opposite* of that. Your first language
is English right?

> If you want simple circumvention without strong anonymity, there
> are ten thousand or so open proxies in the world, which are free.  If
> you want strong anonymity, use Tor.  The current research on anonymity
> networks is conveniently collected for you at
> http://freehaven.net/anonbib/.
> 
> Cypherpunks write code.  Feel free to write code so you can screw your
> own anonymity with the speed and efficiency you claim to want.  Others
> have already done this; some even got talks at blackhat or defcon for
> changing a line of code or two.  Google search has your answers.

You keep talking as though it is *me* who wants this capability. For
myself, I want a 3 hop circuit, but I want more bandwidth available to
me. In order to get more bandwidth, I want those who *can* use a 2 hop
circuit to do so.

This is one of those ideal/practical arguments. Idealistically, Tor
would only have 3 hop circuits and those who want "simple circumvention"
wouldn't use it. That doesn't make it the practical truth of what is
happening though.

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Reduce hops when privacy level allows to save Tor network bandwidth

2009-11-19 Thread Erilenz
* on the Wed, Nov 18, 2009 at 12:08:10PM -0500, Marcus Griep wrote:

>> Yes, they should. However, just because people shouldn't be doing something
>> doesn't mean you should ignore the fact that they are.
> 
> Responding to a deficiency in an area which Tor does not attempt to solve is
> a poor use of resources.

That's fine, as long as you're assuming that people only use Tor when they need
strong anonymity. As soon as you realise that people who don't need strong
anonymity are using it as well, your point fails. Whether or not they *should*
be doing so is irrelevant. The options are:

1.) Ignore that they're doing it
2.) Prevent them from doing it
3.) Make their impact smaller when they are doing it

I choose 3.

> "There are many use cases where that level of protection isn't required." --
> In that case, use a tool better suited to your goals.

Again. Whether or not people *should* be using Tor under these circumstances is
irrelevant. The point is, they are, and how to deal with it.
 
> Now, if you were interested in coding this piece, and you felt it a good use
> of your resources, then it might be worthwhile. However, remember that every
> choice given to the end user is a chance for the end user to make a bad or
> misinformed decision. Tor has bandwidth issues that come with multiple
> routing hops. Many users "just want Tor faster", but often are not savvy
> enough to understand that reducing the number of hops, even by one, severely
> limits the Tor's ability to hamper tracking efforts. As such many may choose
> to reduce their hops, and get faster usage, but falsely believe that just
> because it is still "Tor", they can't be tracked.

I prefer the concept of combining safe defaults with more choice. If people
are afraid for their life, they're not going to reduce the number of hops
from 3 to 2.

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Reduce hops when privacy level allows to save Tor network bandwidth

2009-11-18 Thread Erilenz
* on the Tue, Nov 17, 2009 at 09:03:42AM -0500, Andrew Lewman wrote:
> On 11/17/2009 08:57 AM, Erilenz wrote:
> > The following occured to me. Tor is designed to protect users from
> > traffic analysis by very technical adversaries. There are many use
> > cases where that level of protection isn't required. In those cases,
> > if there was a config option to reduce the number of hops in a circuit
> > to 2 (or possibly even 1), then users would be able to get themselves a
> > more responsive circuit, whilst saving the Tor network overall
> > bandwidth.
> 
> People who don't want strong anonymity should use VPNS, single-hop proxy
> providers, or setup an ssh tunnel somewhere.

Yes, they should. However, just because people shouldn't be doing something
doesn't mean you should ignore the fact that they are.

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Reduce hops when privacy level allows to save Tor network bandwidth

2009-11-18 Thread Erilenz
* on the Tue, Nov 17, 2009 at 03:26:10PM +0100, Georg Sluyterman wrote:

>> The following occured to me. Tor is designed to protect users from
>> traffic analysis by very technical adversaries. There are many use
>> cases where that level of protection isn't required. In those cases,
>> if there was a config option to reduce the number of hops in a circuit
>> to 2 (or possibly even 1), then users would be able to get themselves a
>> more responsive circuit, whilst saving the Tor network overall
>> bandwidth.
>> 
>> In a three hop circuit, when x contacts y, the Tor network ends up
>> having to transfer 4X the data:
>> 
>> x -(1)> Entry -(2)> Middle -(3)> Exit -(4)> y
>> 
>> In a 2 hop circuit it only has to transfer 75% of that:
>> 
>> x -(1)> Entry -(2)> Exit -(3)> y
>> 
> If you send a 1 kByte packet through a Tor node (lets forget the
> overhead for now), the Tor node has to download the packet and upload it
> to the next node (or endpoint) which equals 2 kByte traffic on the
> internetconnection for the specific Tor node.
> 
> If you send a 1 kByte packet through Tor (again forget about overhead)
> the traffic used in the network will be ~6 kByte (packetsize * 2 *
> number_of_hops).
> 
> If you send through two hops instead of three, you will genereate 4
> kByte traffic instead of 6 kByte. Thats 67% not 75%. You are forgetting
> that between nodes, the packet has to be uploaded _and_ downloaded again
> (both things cost bandwidth).

All of that is wrong. You're assuming that Node1 transmitting to Node2
and Node2 receiving from Node1 are two separate streams. My "diagram"
has numbers where each transfer takes place. The first diagram has 4
transfers and the second diagram has 3 transfers.

> With regards to reducing the number of hops i agree with Andrew about
> using something else than Tor.

People are going to use Tor even if they don't need strong anonymity
because it is free, and because it has certain desirable attributes
that other things such as VPNs don't give you. Given that they're
going to use Tor, why not minimise the amount of bandwidth they're
using in the process of doing so.

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Reduce hops when privacy level allows to save Tor network bandwidth

2009-11-17 Thread Erilenz
The following occured to me. Tor is designed to protect users from
traffic analysis by very technical adversaries. There are many use
cases where that level of protection isn't required. In those cases,
if there was a config option to reduce the number of hops in a circuit
to 2 (or possibly even 1), then users would be able to get themselves a
more responsive circuit, whilst saving the Tor network overall
bandwidth.

In a three hop circuit, when x contacts y, the Tor network ends up
having to transfer 4X the data:

x -(1)> Entry -(2)> Middle -(3)> Exit -(4)> y

In a 2 hop circuit it only has to transfer 75% of that:

x -(1)> Entry -(2)> Exit -(3)> y

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-17 Thread Erilenz
* on the Fri, Nov 13, 2009 at 04:28:20PM +, John Case wrote:

>> Second, it sounds like you want to protect against a local attacker from
>> seeing your traffic.  If so, go to proxy.org, find an https:// or
>> vpn-based provider and enjoy your encrypted protection against your
>> local ISP seeing your destination.
>>
>> If you actually want anonymity, then use Tor as is, for it's designed to
>> provide anonymity online by default.
>
> Yes, but back to my thread hijack :)
>
> Let's say my protection model does indeed require Tor, but at the same  
> time requires "more" speed.
> 
> Forcing Tor to only use fast nodes probably doesn't work, since those 
> fast nodes are probably inundated just like the slow ones are.  This also 
> suggests that organic growth in the Tor network is not going to solve 
> much of the speed problem in the near term...  existing users will 
> certainly use more and more traffic.

If you're only concerned with hiding where you're connecting to from
your neighbour, you can modify the source code fairly easily to make two
hop circuits instead of three hop circuits (*). You could then limit the
ExitNodes to be fairly local (your own country), and then after a little
trial and error, manually pick a group of EntryNodes which are also in
your own country, and which perform well for you. High bandwidth
University nodes for example. One thing you absolutely don't want to do
is use a Hidden Service for your VPN as that doubles the number of hops
in the circuit.

(*) I can't remember how though. Google it.

-- 
Erilenz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


logrotate email alerts for old versions of Tor

2009-09-18 Thread Erilenz
I use the deb.torproject.org repository to install Tor on my Ubuntu box.
On several occasions I've noticed in my Tor log file that it has been
telling me to upgrade for several days, without me noticing. I applied
the following changes to my logrotate config in order to get email
alerts when I need to upgrade Tor. I don't know how portable it is, but
the idea it's self should be portable. I think the root user should get
email alerts when they're running a non-recommended version of Tor.. An
entry in an often unmonitored log isn't enough.

r...@server:/etc/logrotate.d# diff -u tor.original tor
--- tor.original2009-09-18 15:32:16.0 -0400
+++ tor 2009-09-17 07:48:25.0 -0400
@@ -7,6 +7,9 @@
notifempty
create 0640 debian-tor adm
sharedscripts
+   prerotate
+   if [ "`grep '\[warn\] Please upgrade' /var/log/tor/log`" != "" 
]; then echo "Upgrade Tor"|mail -s "Upgrade Tor" root; fi
+   endscript
postrotate
    /etc/init.d/tor reload > /dev/null
endscript

-- 
Erilenz


Re: Vidalia exit-country and Hulu

2009-09-16 Thread Erilenz
* on the Tue, Sep 15, 2009 at 04:26:24PM -0700, bao song wrote:

> Some time ago (2008) I read about a Canadian who used Tor to view
> Hulu.
> 
> I tried it from outside the US, and it worked, but the speed was too
> slow for me to use it regularly. Today, a clip from Hulu was highly
> recommended by the New York Times, so I tried again: Hulu now tries to
> block all attempts to connect via Tor. I tried two US exits, and both
> were blocked.
> 
> Of course, the idea of Tor is NOT to allow people to watch high
> bandwidth commercial videos restricted to US audiences, but to allow
> people who need privacy to obtain it.
> 
> Still, it was nice to be able to use tor to access Hulu while it
> lasted.

If you shop around, you'll find you can get a virtual server in the US
for just a few dollars a month. If you bounce your connection through
one of those, it'll be a lot faster too. You could even split the cost
if you know other people who would want access.

-- 
Erilenz


Re: Tor/Iptables Question

2009-08-19 Thread Erilenz
* on the Wed, Aug 19, 2009 at 02:00:01AM -0400, Ringo wrote:

> One problem I've continually run into while trying to setup a secure tor
> virtual machine for browsing is that I have to allow it access to
> localhost (to connect to Tor). Is there a way in iptables to say "deny
> localhost access to all local ports except xyz" or even better say "deny
> user access to all local ports except xyz"
> 
> Thanks for any help people can offer,

I prevent all users other than root from connecting to the Tor Control port 
with an
iptables rule which looks like this:

iptables -A OUTPUT -o lo -p tcp --dport 9051 -m owner ! --uid-owner root -j 
REJECT

You should be able to modify that for your own purposes.

-- 
Erilenz


Re: Stable releases - old versions

2009-07-31 Thread Erilenz
* on the Thu, Jul 30, 2009 at 11:51:39PM -0400, grarpamp wrote:

> Related to the blox* thread.
> When 0.2.0.3x was marked stable, I went through and
> mailed all the contacts running old versions. Some
> profusly thanked, some silently updated, some ignored.
> 
> It would be handy if...
> 
> Upon marking and releasing a new stable branch, include
> in the release notes what the minimum recommended versions
> are and why [security breach, crashing, performance, needing
> to break backward compat going forward, etc]... only
> the really major reasons, just a few quotable lines. Some people
> were like, why bother?
> 
> Make the contact field more of an encouraged option to use.
> Maybe only a third of nodes had valid addresses.

I like this idea. Perhaps the various package maintainers could be
lobbied to update the installation scripts to request a valid
contact email address on installation/upgrade?

> Make Tor emit a logline hourly or at least daily when it notices
> that it is old. Much more likely to stick out like that. Perhaps
> graduate the verbosity/capitalization if it detects itself is not
> in the current stable branch or older.

As well as logging, perhaps Tor should make an effort to send an
email to the local root account when it detects it is "too old".
Obviously, that wont work in many instances, eg Windows Tor servers,
but it would be an additional contact route...
 
-- 
Erilenz


Re: Yahoo Mail and Tor

2009-07-10 Thread Erilenz
* on the Fri, Jul 10, 2009 at 01:44:22AM -0500, Scott Bennett wrote:

>> A long time ago I think there was a problem with the .exit... in the URL
>> being passed along to the website in the GET (or other) requests, which
>> sometimes caused problems.  Somebody correct me if I am wrong, but I
>> believe now something in the tor chain of software (client, relays,
>> exit) filters that out.
>  I should think that such a bug would have had to have been inside tor,
> not privoxy, if it indeed existed.  Consider the process of privoxy making
> a connection via a tor circuit to a destination IP address and then requesting
> a page.  An unproxied browser will first resolve a name to an IP address and
> then connect to that IP address.  When proxied through privoxy, privoxy passes
> the entire hostname.domainname.Nickname.exit to tor instead of an IP address
> when requesting an exit connection to the destination system.  The exit node
> itself then does the name-to-address resolution and establishes the connection
> to the resulting IP address.  Next, privoxy sends an HTTP GET request, which
> contains no hostname, domainname, Nickname.exit, nor IP address through the
> connection to the web server at the other end.  The web server reads (or has
> cached) the page contents from the filesystem path given in the GET relative
> to the base of the server's directory tree (i.e., everything *starting* with
> the third slash in the URL and continuing to the end of the URL) and then 
> sends
> the file contents back through the connection toward the requesting system.
> Of course, some parts of that "path" may actually be other kinds of arguments
> that will be processed by the web server, that fact has no bearing on the
> process described here.

That doesn't sound completely accurate to me. Specifically the sentence "Next,
privoxy sends an HTTP GET request, which contains no hostname, domainname,
Nickname.exit, nor IP address through the connection to the web server at the
other end."

If I'm proxying through Tor and I type this into my browser:

www.google.com.example.exit

My browser asks the proxy for a connection to "www.google.com.example.exit"

Once my browser receives the connection, it then sends this down it:

GET / HTTP/1.1\r\n
Host: www.google.com.example.exit\r\n
\r\n

The problem is that some web servers have multiple websites on the same IP
and they decide which website to serve by looking at the HTTP Host header.
So you need privoxy/polipo to strip the "example.exit" from the HTTP Host
header before forwarding on the actual HTTP request, so it sends this
instead:

GET / HTTP/1.1\r\n
Host: www.google.com\r\n
\r\n

-- 
Erilenz


Re: Firefox video tag

2009-07-01 Thread Erilenz
* on the Tue, Jun 30, 2009 at 09:56:05PM -0400, Gregory Maxwell wrote:

>> Firefox 3.5 was released today. Has anyone investigated the new video tag 
>> that
>> it supports with regards to whether or not it can cause leaks with Tor?
> 
>  and  should have exactly the same attack surface as  has.
> 
> Thats one of the benefits that firefox's approach of building the
> codecs internally rather than invoking an external media framework
> (like safari does) should have.
> 
> I've been hoping very much that tor would not ultimately need to filter 
> these???

So as long as Firefox doesn't invoke an external media player for any video 
type it
supports, it's safe for Tor? Perhaps it's worth keeping an eye on it in case 
they
introduce a new video type which uses an external player which bypasses the 
proxy
settings?

-- 
Erilenz


Firefox video tag

2009-06-30 Thread Erilenz
Hi,

Firefox 3.5 was released today. Has anyone investigated the new video tag that
it supports with regards to whether or not it can cause leaks with Tor?

-- 
Erilenz


Moxie Marlinspike

2009-02-19 Thread Erilenz
http://blog.internetnews.com/skerner/2009/02/black-hat-hacking-ssl-with-ssl.html

There's nothing in there that we didn't already know was possible, and I realise
it's not a Tor specific flaw. I just read this paragraph and thought I'd pass it
on here:

"Marlinspike also claimed that in a limited 24 hour test case running on the
anonymous TOR network (and without actually keeping any personally identifiable
information) he intercepted 114 yahoo logins â 50 gmail logins, 9 paypal, 9 
inkedin and 3 facebook. So apparently the tool works - and works well."

Lots of people simply don't know how to use Tor safely.

I wonder if something could/should be built into TorButton to force a list of
commonly used services to go entirely over https? Eg any request for
^http://mail\.google\.com/.*$

Also, how feasible would it be to add a popup which says something along the
lines of:

"You are about to post unencrypted data over the Tor network. Are you sure you
wish to proceed?"

-- 
Erilenz


Perl modules

2008-11-24 Thread Erilenz
Hello,

I just checked CPAN, and I can't find any modules related to Tor. Not
even a module for talking to the control port. Are there really no Perl
modules for manipulating Tor, or are they just hidden somewhere else
online?

-- 
Erilenz


Re: Limiting hops

2008-11-18 Thread Erilenz
* on the Mon, Nov 17, 2008 at 01:05:27PM -0800, Marc Erickson wrote:

> I use Tor on my laptop to encrypt wireless packets when connecting to an
> unsecured wireless network.  Is there a way to limit the number of hops the
> packets take through the servers so that I can better the speed?  I only
> need one hop.  I'm running Windows XP.

By using Tor for that purpose, all you're doing is making it so people
running Exit Tor nodes can sniff your traffic, rather than people watching
the unsecured wireless network.

I wouldn't automatically assume that reduces your chance of having your
traffic sniffed. It might even increase the chance of that occuring.

-- 
Erilenz


Re: Hidden service route

2008-11-12 Thread Erilenz
* on the Tue, Nov 11, 2008 at 05:50:08PM +0100, Karsten Loesing wrote:

>> If I connect to a Tor hidden service am I right in thinking it goes like:
>> Web browser -> Tor client -> Entry Node -> Middle Node -> Hidden Service
> No, that's not how it works. There are 6 nodes between you and the
> hidden service, three chosen by the hidden service, three chosen by you.
> See https://www.torproject.org/hidden-services for a description of the
> hidden service protocol.

Ah, I got that quite wrong. Now I understand, "rendevouz," and why hidden
services through Tor are so much slower than normal services. Thanks.

-- 
Erilenz


Hidden service route

2008-11-11 Thread Erilenz
Hi,

If I connect to a Tor hidden service am I right in thinking it goes like:

Web browser -> Tor client -> Entry Node -> Middle Node -> Hidden Service

If I then change routelen to '2' in circuitbuild.c as per 
http://www.mail-archive.com/or-talk@freehaven.net/msg08747.html does that give 
me:

Web browser -> Tor client -> Entry Node -> Hidden Service

-- 
Erilenz


Re: is tor an email mixmaster?

2008-11-10 Thread Erilenz
* on the Sun, Nov 09, 2008 at 10:43:29AM -0800, Christopher Davis wrote:

>> someone has setup an open SMTP relay as hidden service:
>>   oogjrxidhkttf6vl.onionport: 587 
>> May be, it works. I did not test it. :-(
>>  
> Unfortunately, this doesn't seem to be running. The idea is
> interesting, though. It would be prudent to enable spam filtering
> and/or hashcash for a service like this, of course.

Yeah. I've heared that relay mentioned several times before, but I've
never been able to connect to it. I can connect to other hidden services
fine. You're the first other person I've come across that has either
confirmed it working or not working.

-- 
Erilenz


[no subject]

2008-11-02 Thread Erilenz
If you run as an exit node, it's my understanding that you also act as a
middleman node. Would it be possible, and would it be a good idea, to
add an option such that you only act as an exit node?

It seems a bit of a waste to use potential exit bandwidth as middleman
relaying bandwidth when exit bandwdith is more scarce.

-- 
Erilenz


Re: Google searches

2008-10-24 Thread Erilenz
* on the Fri, Oct 24, 2008 at 08:32:23AM -0400, Alessandro Donnini wrote:

> For the past month or so, I have been unable to consistently run web searches
> via Google using a "Tor-enabled" browser".

Use https://ssl.scroogle.org/ instead. It's a wrapper around Google.

-- 
Erilenz


Re: Performance

2008-10-22 Thread Erilenz
* on the Wed, Oct 22, 2008 at 04:49:35PM +0200, Martin Balvers wrote:

> I have changed the route length to 2 hops

How did you manage to do this? I know you have to edit the source code, but
what specifically needs changing in it? I remember attempting this a while
ago but haven't looked recently...

-- 
Erilenz


Multiple machines using Tor behind NAT

2008-10-20 Thread Erilenz
Hi,

I have several local machines behind NAT which I want to use Tor. Would
I get better performance by installing Tor on each of them, or by having
a single machine with Tor on and then pointing the web browsers on each
of them at the proxy on that box?

If I were to install Tor on each of them, would it be possible for an
observer to see that there are several copies of Tor running from
machines on the same IP? I'm guessing that it would be obvious because
of the increase in the number of directory requests?

If I were to install it on just one box and then point all the other
boxes at it, wouldn't I end up putting all the traffic through a
smaller number of circuits and thus having a slower network?

-- 
Erilenz


Re: Default ORPort 443 [was: Re: German data rentention law]

2008-10-19 Thread Erilenz
* on the Sun, Oct 19, 2008 at 07:14:31AM -0500, Scott Bennett wrote:

>> Besides, opening ports < 1024 usually requires root-privileges,
>> which could introduce serious security issues if an exploitable
>> flaw were found in Tor. You can still advertise port 443 as your
>> ORPort and listen on 9001, but this requires some port-forwarding
>> magic, which is not entirely feasible for a default
>> configuration. (But your other reason is sound as well)
>  Also good points.  Another is that an unprivileged user on a multi-user
> system may wish to run a tor relay, which would require a few configuration
> tricks, but should definitely be doable.  However, as you point out, an
> unprivileged user ought not to be able to open a secured port, so the default
> should not be a port in the secure ports range.

I just took a quick glance and there seem to be at least a couple of hundred
nodes running an OR port on 443, so people must be taking note of the
documentation at http://www.torproject.org/docs/tor-doc-relay.html.en

-- 
Erilenz


Re: Tor 0.2.1.6-alpha is out

2008-10-14 Thread Erilenz
* on the Sat, Oct 11, 2008 at 09:00:05AM -0400, Roger Dingledine wrote:

> - Allow ports 465 and 587 in the default exit policy again. We had
>   rejected them in 0.1.0.15, because back in 2005 they were commonly
>   misconfigured and ended up as spam targets. We hear they are better
>   locked down these days.

Thank you for this one. There already seems to be a lot more hosts exiting
on 465/587 spread across many more countries, compared to last time I
checked.

-- 
Erilenz


Re: unsubscribe

2008-10-10 Thread Erilenz
* on the Fri, Oct 10, 2008 at 02:44:46AM +0200, sigi wrote:

>>>> unsubscribe me.
>>>
>>> Please write your Mail to [EMAIL PROTECTED] with mailbody including:
>>> unsubscribe or-talk
>>>
>>> btw:
>>> When finally will list-subscribers check their mailheaders for this?
>>>
>> It would never have occurred to me to check the headers either, so
>> perhaps you are being too hard on them.
> 
> Possibly I was too hard on this, but this unsubscribe-question comes so 
> often on all mailinglists, that it bothers a lot nowadays... and it's
> been answered frequently already - so often...

Some people are just too lazy to look into how to unsubscribe from a
mailing list properly. I'm sure a 30 second google would have been
sufficient, but they'd rather email everyone on a mailing list asking
that information instead as it involves engaging less brain cells.

-- 
Erilenz


Re: Geode: some more headaches for TorButton? :-P

2008-10-09 Thread Erilenz
* on the Thu, Oct 09, 2008 at 01:11:37PM +0200, Tom Hek wrote:

> It's really scary when a random website can request your physical  
> location imo.. I really hope you can disable that shit in the new  
> version of Firefox when they include it..

Rather than adding to the speculation, I thought I'd actually test the plugin.
Whenever a site requests your location, your browser asks permission to send it,
and also allows you to specify how much granularity to provide. You can also
tick a box to make your browser remember those settings for a particular
website.

This is no risk whatsoever. They'll almost certainly include an option to turn
it off altogether, but even if they don't you have to explicitly state that
the website is allowed to see your location.

-- 
Erilenz


Re: hijacking DNS server

2008-09-23 Thread Erilenz
* on the Mon, Sep 22, 2008 at 07:24:52PM +0200, Marco Bonetti wrote:

> OpenDNS *does* hijacking too, they really like google:

This has been convered before, several times. OpenDNS provide stuff like 
Phishing protection, by mangling DNS results. They are a free service that you 
*don't have to use*. They ALSO give you the option to turn off those services 
that some people find useful, and to just get a normal DNS service. I don't see 
how anyone can say anything bad about the free service that they provide ...

-- 
Erilenz


DNS lookup types

2008-08-20 Thread Erilenz

Hi,

When using DNSPort or tor-resolve, you can look up A records and PTR 
records, but not NS or MX records. Can this functionality be added?


--
Erilenz