Re: LiveCD For Testing

2007-04-05 Thread Alexander W. Janssen

Hi all,

since the tracker Robert used went down, I set up a tracker elsewhere.
The torrent Metafile can be accessed at
http://yalla.ynfonatic.de/media/TorLiveCD-TestingOnly.iso.torrent

The md5sum of the ISO is 0843b24fb08edf6e0ef64f82083e041b and it would
be good if Robert could confirm that.

I'm currently seeding with two machines, but I'm going to take the
second seeder down as soon as other people joined in to save
bandwidth; I noticed that a couple of people already completly
downloaded the ISO, so there's no need to download it again. Starting
your Client in the same directory where the original ISO is stored is
enough.

Cheers, Alex.

--
I am tired of all this sort of thing called science here... We have spent
millions in that sort of thing for the last few years, and it is time it
should be stopped.
-- Simon Cameron, U.S. Senator, on the Smithsonian Institute, 1901.


Re: Another Method to Block Java Hijinks

2007-04-05 Thread James Muir

norvid wrote:

Hello

I have another method that may block Java hijinks that can allow a
site to determine your real IP.  This one allows you to use the normal
default browser settings.  You do not have to turn off all sorts of
scripts.  You probably should still block cookies.

Use a firewall with settings which block the browser from accessing
the internet but allows Privoxy access.  Set up your firewall this
way.  Now to test obviously all you need do is turn the firewall off
and on.

Go to this page to test:
http://stayinvisible.com/cgi-bin/iptest.cgi
This page uses a Java applet to reveal your real IP.
It will guess mine when the firewall is off but fails to when the
firewall is on.

Now test your IP without the firewall but while turning off Java.  You
should see that the test will not reveal your IP.  Don't worry about
javascript.  It has nothing to do with it on this particular page.

I'm throwing this out here as potentially another way to protect your
privacy while using Tor and depending on the firewall used it may be
easier to set up than turning off all sorts of browser functionality.


I've heard that properly configuring a firewall can be tricky.  In any 
case, using a firewall still doesn't protect from Java applets reading 
identifying information locally and sending it back through the 
anonymous connection.


In my opinion, I think its best just to disable Java, and all the other 
plugins mentioned in the warning on the download page.


You may be interested to know that there is a Live CD which bundles Tor 
and some ipchains rules.  It is mentioned in the Tor FAQ -- see Virtual 
Privacy Machine:


http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ

-James




Re: Another Method to Block Java Hijinks

2007-04-05 Thread norvid

On 4/5/07, James Muir [EMAIL PROTECTED] wrote:

norvid wrote:


snip


I've heard that properly configuring a firewall can be tricky.  In any
case, using a firewall still doesn't protect from Java applets reading
identifying information locally and sending it back through the
anonymous connection.


Actually, I believe that with the browser denied access to the
internet, the normal 2-way java applet communication is prevented.
Please try the test I mentioned.



In my opinion, I think its best just to disable Java, and all the other
plugins mentioned in the warning on the download page.


I agree.  I am throwing my idea out here just for info purposes so
that those who know more than I might take it into consideration for
whatever it's worth (perhaps not much).



You may be interested to know that there is a Live CD which bundles Tor
and some ipchains rules.  It is mentioned in the Tor FAQ -- see Virtual
Privacy Machine:


I am perfectly happy for my purposes with the way I have Tor
configured.  I'd likely give that a try if and when I get a new
machine with a new OS.

snip

Dave


Re: Another Method to Block Java Hijinks

2007-04-05 Thread norvid

On 4/5/07, James Muir [EMAIL PROTECTED] wrote:

norvid wrote:
 On 4/5/07, James Muir [EMAIL PROTECTED] wrote:
 norvid wrote:

 snip

 I've heard that properly configuring a firewall can be tricky.  In any
 case, using a firewall still doesn't protect from Java applets reading
 identifying information locally and sending it back through the
 anonymous connection.

 Actually, I believe that with the browser denied access to the
 internet, the normal 2-way java applet communication is prevented.
 Please try the test I mentioned.

In the tests that I have done previously, the Java VM inherits the proxy
settings listed in the browser (at least this is what is supposed to
happen; sometimes this does not happen).  So if the browser is
configured to use Privoxy and these setting are communicated correctly
to the Java VM, what is there to stop a Java applet from sending back
data through Privoxy?


I don't know the answers to these questions other than to say that I
am not configuring any of the proxy settings in the Java VM.  They are
the default.

I have tried to configure Java VM proxy settings with no apparent
success.  I have no idea why this does not work.

My test might best be performed on a Windows machine as the
availability of software firewalls is fairly extensive.  Alot of these
are easily configurable to block the browser and allow Privoxy access.
Although I don't have much experience with Linux, I'm guessing that
it might be a little more difficult to configure than Windows.

I am certain that on my machine using two different firewalls, the
very specific test I detailed will not determine my real IP even
though Java is enabled.  Of course it cannot determine my IP if Java
is disabled also.




-James



Dave