Re: PHP coder needs Tor details

2007-02-14 Thread Juliusz Chroboczek
 Actually Windows does exactly the same thing...

I'm sorry I have started this discussion, which is off-topic for this list.

My point is merely that giving user ``nobody'' access to tor's data is
a tragically bad idea.  This has nothing to do with Windows.

Juliusz



how did my OP discover this IP address?

2007-02-14 Thread James Muir
I've been reading my OP's log file sorting through the various outbound 
connections that it makes into the Tor network.  I came across the 
following directory fetch request:


connection_connect(): Connecting to 72.1.218.225:9030

What has me a little puzzled is that I can't find this IP address 
anyplace in my OP's cached directory information.  Also, looking at the 
torstats web page (https://torstat.xenobite.eu), I don't find it listed 
there either.


I think maybe this was the IP address of the router hevad99, which is 
now listed with the IP 72.1.218.238.  If this host has a dhcp connection 
then that might explain things.


Is it the case that hevad99's IP address changed during my (1 hour) Tor 
session?


-James



Re: Question about 2 warn messages

2007-02-14 Thread Ringo Kamens

I wouldn't be concerned about the 403 error. I've gotten them before,
and I've always attributed them to the web filter. As long as you get
directory info from other servers, everything should be fine. This is
different if that dir server is an authoritative dir server. If it is,
it could hamper your anonymity because your client would trust
different tor nodes. Are you on windows or linux?
Ringo Kamens

On 2/14/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:


I found these two warn messages in my router log. Is it something i should
be worried about?


[warn] tor_gzip_uncompress(): Gzip decompression returned an error:
incorrect data check


[warn] connection_dir_client_reached_eof(): Received http status code 403
(Forbidden) from server '8.7.49.192:80' while fetching
/tor/server/d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z.
I'll try again soon.

___
Viren-Scan für Ihren PC! Jetzt für jeden. Sofort, online und kostenlos.
Gleich testen! http://www.pc-sicherheit.web.de/freescan/?mc=02




Re: how did my OP discover this IP address?

2007-02-14 Thread Ringo Kamens

Perhaps that was an IP you typed directly in. For example, you clicked
on a web link and instead of http://domainname.tld it was
http://182.271.274.175 in which case tor would only show and IP. I'm
not sure if that's how it would appear in the log file, but it's a
guess.
Ringo Kamens

On 2/14/07, James Muir [EMAIL PROTECTED] wrote:

I've been reading my OP's log file sorting through the various outbound
connections that it makes into the Tor network.  I came across the
following directory fetch request:

connection_connect(): Connecting to 72.1.218.225:9030

What has me a little puzzled is that I can't find this IP address
anyplace in my OP's cached directory information.  Also, looking at the
torstats web page (https://torstat.xenobite.eu), I don't find it listed
there either.

I think maybe this was the IP address of the router hevad99, which is
now listed with the IP 72.1.218.238.  If this host has a dhcp connection
then that might explain things.

Is it the case that hevad99's IP address changed during my (1 hour) Tor
session?

-James




Re: PHP coder needs Tor details

2007-02-14 Thread Mr. Blue
Hm...,
Why no one answers?
Did I said something wrong?


Mr. Blue [EMAIL PROTECTED] wrote: Hey Crew.

Thanks to all for your help.

First for all I would like to say that this file.php(which is manipulating Tor) 
will be located in admin area ONLY and will be intended for use ONLY by admin.
Admin area is protected by Apache pass authentication (Digest) over SSL and 
after that is passed, admin must enter another login password to enter admin 
area.

Only admin will use it - NOT publicly available to users!

Next
Firstly I need to issue to shell, from PHP, command that will start Tor.
Regarding that command...
It will have ALL directives that should normally be located in torrc, but 
there is no torrc, nor I have intention to use it.
So command is:
--
tor -gid $gid -pidfile $pidfile -RunAsDaemon $b -user $uid -ClientOnly 1 
-EntryNodes $nickname, -ExitNodes $nickname -StrictExitNodes 1 
-NewCircuitPeriod 3600 -
--
Regarding  nodes
Entry and exit nodes will be same.

Before I continue I would like to say that I have made a PHP script that is 
utilizing regular expresions and harvesting all exit nodes in a list of IP 
addresses from moria dirs.
So I would like to pull from my database IP of a node(NOT nickname) and put it 
in a $nickname variable.
Will this work? Can I select node by IP and NOT by nickname?

Also when that will be achived I am going to use PHP cURL and connect with it 
to 127.0.0.1:9050 using SOCKS5 protocol - then do request to some page on the 
internet and finaly use POSIX - posix_kill($pidfile, SIGTERM); php function to 
shutdown Tor, alternatively use kill to which I pass $pidfile, all in shell.

Now someone will say that I should connect to Tor using SOCKS4a and am I 
normall to use ONLY 1 node which will be entry and exit at the same time.
Be sure that  I am VERY aware of my actions - but I am not here because I don't 
wana be tracked and because I want to surf anonimously.

Now here we come to the bigest obstacle for me.(oh men, soon as I finish this 
script I am going to read FreeBSD book that I just got and learn that UNIX at 
once!)
Creating a valid shell command:
--
 tor -gid $gid -pidfile $pidfile -RunAsDaemon $b -user $uid -ClientOnly 1 
-EntryNodes $nickname, -ExitNodes $nickname -StrictExitNodes 1 
-NewCircuitPeriod 3600 -
 --
User nobody will run it.
 - Should I exlude -gid $gid part?
 - Should $b variable be 0 OR 1 (that is..., should I run it as deamon?)
 - Should I exlude -user $uid part?
 - What about $nickname? Can I pass it IP of a node?
 - What should I put in a $pidfile variable?!? - I never saw one (number or 
letters?) It will also be used for  shuting down Tor at the end of a process...

Also I just rememberd something...
Whan tor was already runnig(started by root) I was able to utilize connection 
trough it by nobody, but when I attempted shutdown I got message that there was 
no process with pid belonging to it - or something similar - so that explains 
all.

Thank in advance...

 
-
TV dinner still cooling?
Check out Tonight's Picks on Yahoo! TV.