[tor-dev] Tor hangs at startup

2015-04-01 Thread spriver
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

the Tor software has a odd behaviour on my Debian machine; it hangs
when I start it via "service start tor" on my Debian (Wheezy
3.2.0-4-amd64 #1 SMP Debian 3.2.65-1+deb7u2) with Tor (0.2.4.26-1):

service tor start
[ ok ] Starting tor daemon...

And then nothing happens anymore, I have to kill the dialog with ^C.

As I figured out Tor starts correctly in the background (the logfile
tells me so) and also opens my ORport and Dirport (netstat told me).


Is this a bug or a behaviour that is supposed to be that way?

Cheers,

spriver
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBAgAGBQJVHEYUAAoJEMkUf8VoejgP1GYP+wWnfllpVIC942S6PvHW9lx0
wPp6aHYBFL46Fg/r2pO8+rz7L1E1M72V0lYiqkiuzRs7IW2DYgfBVMpTz5+EoPk4
vGf+vPnyDR5hmVEM4sJbtfawb7CsK6dps/4sU6QuxfPCQE8IEII4JxbP8krobrcL
7nQAr8PPwVnuwbZGf9eqHNN4fZUnmZv8bPTtwpPB7ie8lOMzeJVCiEMU8NXKIe3K
9Wui7vatgNvTqldrHLI0DJZRJJ86V/+Q4aSJ6hvH0C7JuB+tO7sOLlplIKLxYkb5
eXFzBUhqESslsGc07k8wVhytaYSEhsG3Y0xh18gcA2rZF3kf6zi4roK2wWECyV+/
7WsVQhQ0zJm2CUbprYKCAMqBHGm2fKdRLo+OyXQCzfO/Gn75NX2aWZBaAjZ3Ppt5
IMTdQh9UZzEPnrogjLVRwq8JvQBKNgMVe72zstMvnGtqevJuvu8bY/2EjAoK9085
UBiJyaOM8VoCf0CeEgiXijzf3dtzL6FSA78kQFlb1KWNm20PJxWaZ4YqK1vWHP/o
vHWz8w0252WaM1WF1raQFqVuMz4z5QFrjMOeGxkDoq2kDVaYDfwifQntzgspqOgG
CJzefHrob3cAEDPoFlPiod8k/RxHg9e1nJnLYORCbCuh5pqGL95NCA6f6/zE7xxb
eeu7eDN823KTBbwriyrU
=RZWR
-END PGP SIGNATURE-


0x687A380F.asc
Description: application/pgp-keys
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] PT-themed stuffed animals: huggable transports

2015-04-01 Thread Michael Rogers
On 01/04/15 16:50, Rishab Nithyanand wrote:
> Next, we went on to study possible replacements and found that the
> Scramblesuit rabbit [1] did significantly better! As a side benefit, it
> made all the censors go a and let it right through.
> 
> Expect our full results at USENIX Security.
> 
> [1] http://en.wikipedia.org/wiki/Rabbit

That's a plaintext rabbit - surely you meant [2]?

Cheers,
Michael

[2] https://en.wikipedia.org/wiki/File:Hare_Tonic.jpg



signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] PT-themed stuffed animals: huggable transports

2015-04-01 Thread Rishab Nithyanand
Agreed! In fact, our team at Stony Brook just completed a study on the
huggability of current PTs. One of our results is that the Scramblesuit
bumblebee fared worst. It caused some of our study participants to report
us to the IRB. We in turn chose to blame David for encouraging this study.

Next, we went on to study possible replacements and found that the
Scramblesuit rabbit [1] did significantly better! As a side benefit, it
made all the censors go a and let it right through.

Expect our full results at USENIX Security.

[1] http://en.wikipedia.org/wiki/Rabbit

On Wed, Apr 1, 2015 at 9:24 AM, David Fifield  wrote:

> In an effort to improve pluggable transports' visual identity, we should
> introduce a line of stuffed animals. The only rule that the the animal's
> name has to be made out of the transport name.
>
> The meek meerkat! [1]
> The obfs blobfish! [2]
> The FTE eft! [3]
> The flash proxy banded quail (Philortyx fasciatus)! [4]
> The ScrambleSuit bumblebee (Bombus centralis)! [5]
>
> Call now, operators are standing by.
>
> [1] https://en.wikipedia.org/wiki/Meerkat
> [2] https://en.wikipedia.org/wiki/Blobfish
> [3] https://en.wikipedia.org/wiki/Eft
> [4] https://en.wikipedia.org/wiki/Philortyx_fasciatus
> [5] https://en.wikipedia.org/wiki/Bombus_centralis
> ___
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] Raptor

2015-04-01 Thread Liste
Some people say to track tor users there is a tool named raptor.
It uses the packet data recognition to track via AS the data streams
between tor hosts.

Can be a good idea to split, merge, change the packet order, the data
streams etc... to obfuscate the traffic with an algotithm to create
false data recostruction?

Example:

Alice --->node-> node -> node --> Bob1 > False/EndOfStream
 ^ ^v ^v   ^v   ^v   |
 \--- node <- node <- node <-- node -/

If a complex network is created and some random data and connection are
added to negotiate the data
obfuscation, is very difficult to track a single data stream or packet.

When the data arrival, send some data (same payload size)to a random
loop circuit.

What do you think?
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] PT-themed stuffed animals: huggable transports

2015-04-01 Thread David Fifield
In an effort to improve pluggable transports' visual identity, we should
introduce a line of stuffed animals. The only rule that the the animal's
name has to be made out of the transport name.

The meek meerkat! [1]
The obfs blobfish! [2]
The FTE eft! [3]
The flash proxy banded quail (Philortyx fasciatus)! [4]
The ScrambleSuit bumblebee (Bombus centralis)! [5]

Call now, operators are standing by.

[1] https://en.wikipedia.org/wiki/Meerkat
[2] https://en.wikipedia.org/wiki/Blobfish
[3] https://en.wikipedia.org/wiki/Eft
[4] https://en.wikipedia.org/wiki/Philortyx_fasciatus
[5] https://en.wikipedia.org/wiki/Bombus_centralis
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev