Re: Restricted Exit Policy Port Suggestions?

2010-08-11 Thread Harry Hoffman
In my opinion, more often then not DMCA takedown requests center around file-sharing and also more often then not the takedown requests actually have validity to them. There are certainly instances where takedown requests are incorrect but the frequency of them isn't high (again, my opinion). My

Re: TOR Blocked at Universities

2010-02-11 Thread Harry Hoffman
Hi Peter, When you say blocked are you saying that faculty, staff, and students are not allowed to run exit nodes in the TOR network? Or rather that the above are not allowed to use TOR clients to connect into the TOR network? Cheers, Harry On Thu, 2010-02-11 at 13:15 -0600, Peter Farver wrote:

Re: Tor Project infrastructure updates in response to security breach

2010-01-21 Thread Harry Hoffman
Hi Roger, Thanks for the detailed explanation. It's always interesting to hear about how other go into the "verification route" when a compromise happens. Do you know the nature of the compromise? Was it against Tor itself or one of the other services running on the Directory Authorities? J

Re: Tor Project infrastructure updates in response to security breach

2010-01-20 Thread Harry Hoffman
When you guys have finished the assessment will you be releasing details of how the compromise happened? Cheers, Harry On Wed, 2010-01-20 at 16:43 -0500, Roger Dingledine wrote: > You should upgrade to Tor 0.2.1.22 or 0.2.2.7-alpha: > https://www.torproject.org/download.html.en > > In early Janu

Re: tor experimental???

2010-01-20 Thread Harry Hoffman
Thanks Roger, I should have been taking better care of this box but have been super busy. My bridge is back up and running :-) Cheers, Harry Roger Dingledine wrote: On Wed, Jan 20, 2010 at 03:11:01PM -0500, Harry Hoffman wrote: So, at some point in time the apt url I was using for tor

tor experimental???

2010-01-20 Thread Harry Hoffman
Hi, So, at some point in time the apt url I was using for tor ceased to exist: http://mirror.noreply.org/pub/tor/dists/experimental-0.2.1.x-intrepid/main/binary-i386/Packages.gz Did experimental become unstable? Cheers, Harry

Re: [OT] Problems With Outlook 2k2

2010-01-15 Thread Harry Hoffman
isn't email (i.e. tcp/25) blocked by default as a exit policy? Programmer In Training wrote: As part of my attempts to write an article about using GPG and Tor with Outlook I set up a test email account. O says it connects just fine and sends/receives a test message, but when I attempt to send m

Re: Conspiracy: Piratebay owned by CIA (TOR involved, also)

2009-06-23 Thread Harry Hoffman
wrote: Could someone post the contact addresses for cashing in? And perhaps some proof that they do (or do not) pay? On Tue, Jun 23, 2009 at 03:55:57PM +0200, Timo Schoeler wrote: thus Tom Hek spake: On Jun 23, 2009, at 15:01 PM, Harry Hoffman wrote: At $0.20USD/MB I was able to supplement my

Re: Conspiracy: Piratebay owned by CIA (TOR involved, also)

2009-06-23 Thread Harry Hoffman
oh, sure this has been known for a long time. In fact, the CIA will even pay you (much like google adsense) per MB that you allow them to intercept upon exit. At $0.20USD/MB I was able to supplement my regular income. Soon I'll be able to quit my regular job. It's like all of those emails say,

Re: Information at exit node.

2009-04-21 Thread Harry Hoffman
Hi Brent, At the very least the src ip (although this would be another tor server), src port, dst ip, dst port, protocol (tcp), timestamp. If the traffic is unencrypted (i.e. you browse to www.google.com) then you can also add application protocol (i.e. HTTP) and payload (i.e. GET / HTTP/1.1

thoughts???

2009-04-14 Thread Harry Hoffman
Just came across this: http://hosted.ap.org/dynamic/stories/T/TEC_PUNISHING_PROXIES?SITE=ILEDW&SECTION=HOME&TEMPLATE=DEFAULT Cheers, Harry

Re: Abuse ticket

2009-03-16 Thread Harry Hoffman
Not to turn this into a legal thread (compulsary IANAL warning) but I don't see how running a tor exit node makes anyone a common carrier. I would be very interested to see any legal precedence for this. If anything most exit nodes reside in network space that has it's own set of acceptable use p

Re: Metasploit Decloak Project v2

2008-12-15 Thread Harry Hoffman
Interesting, it works with Open Office on Linux revealing the true ip addr. There's a option in OO to use a proxy, it was set to system at the time and I tried just using foxyproxy. But yeah, like someone else mentioned, using iptables to redirect all attempts so that you don't have to worry abou

Re: Researchers could face legal risks for Tor network snooping

2008-07-24 Thread Harry Hoffman
It's interesting because the Wiretap Act requires consent before intercepting the traffic. This is usually done via AUPs or other policy. I wonder what it means for people who don't have the opportunity to agree or disagree with these policies because they don't know about them. On Thu, 2008-07-

DNS queries through the Tor network

2008-07-22 Thread Harry Hoffman
Hi, Just curious to get some expert opinions from the tor maintainers about how to deal with the new DNS vulnerabilities being discussed[1]. Is anyone testing whether or not the DNS servers available via exit nodes are patched? Cheers, Harry [1] http://isc.sans.org/diary.html?storyid=4765

RE: How do we defeat exit node sniffing?

2008-06-06 Thread Harry Hoffman
Why do you think it would be embarrassing? I'm fairly certain that some exit nodes have been setup as "research" projects. On Thu, 2008-06-05 at 21:49 -0700, Wesley Kenzie wrote: > > Or BostonUCompSci? It would be kind of embarrassing to Boston > University wouldn't it, if they were found to

Re: Holy shit I caught 1

2006-08-27 Thread Harry Hoffman
Hmm, Point taken. I guess I hadn't realized that that many windows users are running tor clients. At work we are considering "quizzing" users for certain facts regarding network operations. Nothing major, just a, "hey, you need to understand the risks of running p2p software". Perhaps something

Re: Holy shit I caught 1

2006-08-27 Thread Harry Hoffman
Hopefully the people using Tor would be "clued in" enough to check their certs. Arrakistor wrote: > Amazing(ly bad). Perhaps we need some sort of monster programs > stalking through the system to check for things like this. > > What I would like to know is how long the router on the node has b

Re: Good reason for using Tor/Privoxy

2006-06-13 Thread Harry Hoffman
Don't render html or load remote images in client software, otherwise you are just asking for trouble :-D -- Harry Hoffman Integrated Portable Solutions, LLC 877.846.5927 ext 1000 http://www.ip-solutions.net/ Freemor wrote: > Hi all, > >came across this little Gem while re