Re: Directory information no longer up-to-date; access blocked?

2007-08-04 Thread coderman
On 8/3/07, c t [EMAIL PROTECTED] wrote:
 ...
 I also tried removing the torrc file from /Library/Tor/ and re-running
 tor, but no luck

try deleting ~/.vidalia/torrc

best regards,


Re: Directory information no longer up-to-date; access blocked?

2007-08-04 Thread c t
That worked! I didn't think to read that file before deleting it, but
out of curiosity, what would have been in there that could cause this
problem, and do you know why the problem would suddenly materialize?

Regardless, thank you all so much for your quick attention and helpfulness!

On 8/4/07, coderman [EMAIL PROTECTED] wrote:
 On 8/3/07, c t [EMAIL PROTECTED] wrote:
  ...
  I also tried removing the torrc file from /Library/Tor/ and re-running
  tor, but no luck

 try deleting ~/.vidalia/torrc

 best regards,



Re: Directory information no longer up-to-date; access blocked?

2007-08-04 Thread coderman
On 8/3/07, c t [EMAIL PROTECTED] wrote:
 ... out of curiosity, what would have been in there that could cause this
 problem, and do you know why the problem would suddenly materialize?

Isn't Defcon _fun_, kids?
http://archives.seul.org/or/cvs/Aug-2007/msg7.html

appears to be those pesky hackers causing trouble.  you shouldn't
encounter problems of this type anymore if you're running a recent
version (0.1.2.16 or 0.2.0.4-alpha).  the directory

best regards,

:)


critical security vulnaribility fixed in Tor 0.1.2.16

2007-08-04 Thread [EMAIL PROTECTED]




Dear Roger and every reader of this mailing list,

I read about the critical security vulnerability in your release notes.
I understand that some funny hackers have accessed tor's control port
9051 and modified the torrc. Is that right?

To my understanding any Tor client or server behind a well-configured physical
firewall aren't vulnerable to this type of attack.
The only ones vulnerable are people without firewall or with
only a software firewall installed on their computer. People
with a badly configured physical firewall, for example with DMZ
enabled are also at risk.

A simple trick to avoid this type of attack is to have a physical
firewall between your computer and the internet connection.
A cheaper type of combined router/firewall/switch nowadays only cost
around 30€ or 40$US. It's a simple and effective way to protect
yourself from attacks made possible by opened ports in various programs.

(Please tell me if I'm wrong. Because if so I want to change my tor
server from version 0.2.0.2alpha immediately. Until then I will keep
that version as there is no version 0.2.0.4alpha yet for win32.)

/Vikingserver


Roger Dingledine skrev:

  Tor 0.1.2.16 fixes a critical security vulnerability that allows a
remote attacker in certain situations to rewrite the user's torrc
configuration file. This can completely compromise anonymity of users
in most configurations, including those running the Vidalia bundles,
TorK, etc. Or worse.

Users who do not have ControlPort enabled are secure; if you are not
sure, you should upgrade and you should probably overwrite your torrc
file with the default when you upgrade. More details will be posted over
the next few days.

https://tor.eff.org/download.html

We have Vidalia bundles for OS X Tiger on the website now. The recommended
workaround for Windows users is either to wait until we have a Vidalia
bundle ready, or do separate installs of the Win32 "expert" package from
https://tor.eff.org/download-windows
and the Windows Vidalia-only package from
http://vidalia-project.net/download.php

Changes in version 0.1.2.16 - 2007-08-01
  o Major security fixes:
- Close immediately after missing authentication on control port;
  do not allow multiple authentication attempts.

  





tor servers communicating to wrong ports

2007-08-04 Thread [EMAIL PROTECTED]
I went through my firewall's log today, and noticed a large number of
blocked packets coming from other tor servers.
I run a tor server myself on port 995.
About 1-10 packets per minute coming from other tor servers are blocked.
They all communicate to ports between 59000 and 65000, and my firewall
blocks their communication.

My most important question is, why do other servers communicate to my
server through any other port than 995? 995 is my advertised port.

And if other tor servers' communication to me are answers to requests
from my own tor server sent to them through ports 59000-65000 in my
firewall, why doesn't my firewall allow those answers? The firewall
doesn't block traffic that are answers to normal internet software for
example: internet explorer, firefox, email. And only rarely block
streaming video/audio by mistake. But it blocks a lot of tor traffic,
why? (By the way, it blocks tor server traffic to ports 59000-65000 even
when i disable SPI.)

And is the tor software intelligent enough to resend the packets to port
995 instead of ports 59000-65000 when they get blocked?

I'd be thankful for answers to these questions. Not that my life depends
on it, but I'm curious. :-)
/Viking


Re: critical security vulnaribility fixed in Tor 0.1.2.16

2007-08-04 Thread coderman
On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
  ...
  To my understanding any Tor client or server behind a well-configured
 physical firewall aren't vulnerable to this type of attack.
 ...
  (Please tell me if I'm wrong.

you're wrong.  upgrade to the latest version (0.1.2.16 or
0.2.0.4-alpha) to avoid this type of attack.

best regards,


Re: tor servers communicating to wrong ports

2007-08-04 Thread coderman
On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 ...
 I run a tor server myself on port 995.
 About 1-10 packets per minute coming from other tor servers are blocked.
 They all communicate to ports between 59000 and 65000, and my firewall
 blocks their communication.

is this TCP or UDP?  (DNS)

59k and above are ephemeral ports usually associated with a local
client type connection to a remote public ip/port.

best regards,


Re: critical security vulnaribility fixed in Tor 0.1.2.16

2007-08-04 Thread [EMAIL PROTECTED]




Please describe a little bit. "You're wrong" is not a good answer.
Please describe how someone can reach port 9051 behind a firewall. Or
is the attack not done by connecting to the control port 9051? Is it
done by connecting to the advertised port? (in my case 995)

/Viking


coderman skrev:

  On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
  
  
 ...
 To my understanding any Tor client or server behind a well-configured
physical firewall aren't vulnerable to this type of attack.
...
 (Please tell me if I'm wrong.

  
  
you're wrong.  upgrade to the latest version (0.1.2.16 or
0.2.0.4-alpha) to avoid this type of attack.

best regards,

  





Re: tor servers communicating to wrong ports

2007-08-04 Thread [EMAIL PROTECTED]




It's TCP.

/Viking

coderman skrev:

  On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
  
  
...
I run a tor server myself on port 995.
About 1-10 packets per minute coming from other tor servers are blocked.
They all communicate to ports between 59000 and 65000, and my firewall
blocks their communication.

  
  
is this TCP or UDP?  (DNS)

59k and above are ephemeral ports usually associated with a local
client type connection to a remote public ip/port.

best regards,

  





Re: critical security vulnaribility fixed in Tor 0.1.2.16

2007-08-04 Thread coderman
On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

  Please describe a little bit.
  Please describe how someone can reach port 9051 behind a firewall.

port 9051 is usually bound to localhost (127.0.0.1).  a firewall
(usually) protects against external connections.  applications /
utilities bound to localhost can access other ports bound to this
address.

best regards,


Re: tor servers communicating to wrong ports

2007-08-04 Thread coderman
On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:

  It's TCP.

i'd be curious to know if you uncover additional details (packet
dump?) to determine the nature of these connections.  it may be that
you are attempting connections to potential external servers for
reachability verification or something else of this nature.

best regards,

(is there anything in the logs to indicate the nature of these
requests as well?)


Re: tor servers communicating to wrong ports

2007-08-04 Thread [EMAIL PROTECTED]




Sorry, the log is just a list of blocked IPs with port numbers. There
is no additional information. All my firewall gives you is a simple log
file with blocked connections.
Tor works fine, so it was out of curiosity that I wanted to know, and
if this is a problem for the Tor-network, I wanted to post it to the
or-talk list, to inform the programmers and users.

Maybe some one else has the same thing happening with their firewall
blocking tor server communication on ports 59000-65000? Maybe someone
else has a firewall which gives more descriptive logs, or packed dumps?
If this only happens with my firewall, then it shouldn't be a big
problem for the tor-network. But if it's common, then it might be worth
to investigate further.

Thanks,
Viking


coderman skrev:

  On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
  
  
 It's TCP.

  
  
i'd be curious to know if you uncover additional details (packet
dump?) to determine the nature of these connections.  it may be that
you are attempting connections to potential external servers for
reachability verification or something else of this nature.

best regards,

(is there anything in the logs to indicate the nature of these
requests as well?)

  





Directory servers for a subset of Tor routers

2007-08-04 Thread nobledark
Hi,

Question, is it possible to set up private directory servers and 
make available only a portion of the available Tor routers? For 
example, if you only wanted to make routers that were online in the 
U.K. or France available to users who got their info from these dir 
servers, can that be done? 

I know you can set entry and exit nodes but this only addresses 
part of the question and is too static for this example. I've seen 
some info on Blossom but don't know if that will do it either. If 
it can't be done or there are other problems, does anyone have any 
other ideas or suggestions?


Thanks...

--
Free information on becoming a Photographer. Click Now!
http://tagline.hushmail.com/fc/Ioyw6h4fQtFznTeLcy3AEY651ReJH32DRSQ2P3pVLpQiG47cRgOe7X/



Too many connections when ORPort is defined

2007-08-04 Thread gypsy
FYI:
I would like to run a tor server, but there is no way to limit the
number of connections.  Also my tor.log gets filled with Failing
because we have 991 connections already. Please raise your ulimit -n.
which is crap I do not care to see.

Development REALLY needs to implement a connection limit so that tor can
be configured to be less a resource pig.  While there is an
overabundance of bandwidth here, the host computer simply cannot handle
more than 100 simultaneous connections because it has so little RAM and
a low horsepower CPU.

If that ever happens, you might want to notify me (off list because I
won't still be subscribed), at which time I'll turn the server back on.

Note that bandwith limiting is not effective, either via htb or htb +
configuration options in torrc.
--
gypsy at iswest dot com


Re: critical security vulnaribility fixed in Tor 0.1.2.16

2007-08-04 Thread Roger Dingledine
On Sat, Aug 04, 2007 at 04:40:04PM +0200, [EMAIL PROTECTED] wrote:
 Perhaps someone else has an answer for this.br
 Nothing in coderman's short answers have made this clear to me. The
 answers look rather confusing to me, sorry.br

(Typing on defcon network so will be quite brief)

The short answer is yes, this is an attack, and no, we're not going
to tell you exactly how it works yet. That's because several hundred
thousand people are vulnerable, and we're going to give them several
weeks to upgrade before we arm random people on the Internet with the
ability to launch this attack against them.

You should be one of the people who upgrades. :)

--Roger



Re: Too many connections when ORPort is defined

2007-08-04 Thread phobos
On Sat, Aug 04, 2007 at 11:00:25AM -0700, [EMAIL PROTECTED] wrote 0.8K bytes in 
19 lines about:
: FYI:
: I would like to run a tor server, but there is no way to limit the
: number of connections.  Also my tor.log gets filled with Failing
: because we have 991 connections already. Please raise your ulimit -n.
: which is crap I do not care to see.


Sockets and memory consumption are two different things.  I've run tor
servers in virtual servers with 256MB of ram just fine.  You could also
man tor and find:

ConnLimit NUM

The  minimum number of file descriptors that must be
available to the Tor process before it will start. Tor
will ask the OS for as many file descriptors as the OS will allow (you
can find this by ulimit -H -n). If this number is  less  than  ConnLimit,  
then
Tor  will refuse to start.

: Development REALLY needs to implement a connection limit so that tor can
: be configured to be less a resource pig.  While there is an
: overabundance of bandwidth here, the host computer simply cannot handle
: more than 100 simultaneous connections because it has so little RAM and
: a low horsepower CPU.

I believe someone has submitted patches to this effect.  We're always
happy to accept more patches.

-- 
Andrew


Re: Can we beat the Firewall of china attack?

2007-08-04 Thread phobos
On Fri, Aug 03, 2007 at 02:54:06PM -0700, [EMAIL PROTECTED] wrote 2.2K bytes in 
18 lines about:
: I am behind an ISA firewall so I need to use NTLMAPS to get through. My ISP 
have started to block TOR Servers to prevent anyone to connect through them. 
Yet I know I can access those servers through any free proxy already existing 
on the Internet, provided it can use SSL connections. It would be nice if I 
could point my TOR client to any of these proxies before it would connect to 
the TOR servers which are blocked. I know TOR allows for an HTTP proxy, but 
that one I have used to point to the NTLMAPS proxy already.
: Do I stand any chance to beat my ISP? I only need TOR to acces the circuit 
initially throgh an existing HTTP server. Should my ISP detect the HTTP server 
and block it, what the hell, still there are zillions more to connect to. :)

Unfortunately, Tor doesn't support NTLM authentication.I know others
have run into this problem as well.  I'm not sure if they ever figured
out a workaround.

-- 
Andrew


Tor and NTLM (was Re: Can we beat the Firewall of china attack?)

2007-08-04 Thread Roger Dingledine
On Sat, Aug 04, 2007 at 02:42:11PM -0400, [EMAIL PROTECTED] wrote:
 Unfortunately, Tor doesn't support NTLM authentication.I know others
 have run into this problem as well.  I'm not sure if they ever figured
 out a workaround.

See the middle paragraph of
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#HttpProxy
for how to do NTLM along with your http proxy for Tor.

--Roger



Re: critical security vulnaribility fixed in Tor 0.1.2.16

2007-08-04 Thread [EMAIL PROTECTED]




So both you and "coderman" know how this attack is done but simply
don't want to explain more? Now I understand why the answers were
confusing. ;-)

Thanks for answering anyways.
/Viking


Roger Dingledine skrev:

  On Sat, Aug 04, 2007 at 04:40:04PM +0200, [EMAIL PROTECTED] wrote:
  
  
Perhaps someone else has an answer for this.br
Nothing in coderman's short answers have made this clear to me. The
answers look rather confusing to me, sorry.br

  
  
(Typing on defcon network so will be quite brief)

The short answer is yes, this is an attack, and no, we're not going
to tell you exactly how it works yet. That's because several hundred
thousand people are vulnerable, and we're going to give them several
weeks to upgrade before we arm random people on the Internet with the
ability to launch this attack against them.

You should be one of the people who upgrades. :)

--Roger


  





Re: critical security vulnaribility fixed in Tor 0.1.2.16

2007-08-04 Thread Freemor
Did this end up biting TOR in the ass, or is this a Proactive move? I am
just curious as I mentioned this very problem (or something extremely
close to it) back in August last year (see:
http://archives.seul.org/or/talk/Aug-2006/msg00187.html  )

So I'm just wondering it if finally made it to the top of what I am sure
is a long To-do list that the DEV's have, or was it actually exploited.

I completely understand the need not to release further details until
people upgrade but I am looking forward (once things are safe) to
hearing how and by whom this was exploited if it was. 

In either case (exploited/not exploited), Kudos to the Dev's for fixing
it quickly and getting the word out. 

This has left me wondering one thing tho.. My tor was updated
auto-magically as I used a Debian based distro and have the official TOR
repository in my apt list. So my question is, is there, or could there
be some similar form of auto-updating for persons using the windows
version of TOR? If not maybe Vadalia could be made to check for TOR
updates and pop up notices to the users? ... just a thought. Sadly my
coding skills are decades out of date or I'd offer to help. 



Freemor [EMAIL PROTECTED]
Freemor [EMAIL PROTECTED]

This e-mail has been digitally signed with GnuPG

See: http://gnupg.org/ for more details




signature.asc
Description: This is a digitally signed message part


Re: critical security vulnaribility fixed in Tor 0.1.2.16

2007-08-04 Thread torqued
Quoting Roger Dingledine [EMAIL PROTECTED]:

 On Sat, Aug 04, 2007 at 04:40:04PM +0200, [EMAIL PROTECTED] wrote:
  Perhaps someone else has an answer for this.br
  Nothing in coderman's short answers have made this clear to me. The
  answers look rather confusing to me, sorry.br
 
 (Typing on defcon network so will be quite brief)
 
 The short answer is yes, this is an attack, and no, we're not going
 to tell you exactly how it works yet. That's because several hundred
 thousand people are vulnerable, and we're going to give them several
 weeks to upgrade before we arm random people on the Internet with the
 ability to launch this attack against them.
 
 You should be one of the people who upgrades. :)
 
 --Roger
 

When I read the following post last month in a.p.a-s I just _assumed_ it was a
kid trolling.

 - Posting in the clear through Google with his Portland, OR Verizon IP flapping
in the breeze.

I now _assume_ this Usenet post is related to the subject at hand (?)


http://preview.tinyurl.com/2d5wzx

   _

   Newsgroups: alt.privacy.anon-server
   Subject: Re: JanusVM
   Date: Fri, 13 Jul 2007 08:45:21 -
   Message-ID: [EMAIL PROTECTED]


   On Jul 13, 12:25 am, Anonymous Sender
   [EMAIL PROTECTED] wrote:
What do you think of this tor wrapper?
   
http://janusvm.peertech.org/
   
Has anyone tried it? Pros? Cons? Caveats?

   http://janusvm.peertech.org/Flash/JanusVM-SEC-Demo-1.html

   This is the only tool that prevents side channel attacks against Tor.
   This happens because JanusVM is transparently proxying ALL your TCP
   traffic through Tor.

   HD Moore had a very nice example of why you should NOT trust your
   applications to always use Tor correctly.  JanusVM doesn't have this
   problem because it catches everything at the Network Layer.

   Also, I am going to be releasing a 0-day against Tor @ DefCon15 this
   year that will reveal your true IP address. :-P
   Needless to say, the 0-day will not work against those using
   JanusVM.
   And no, I'm not releasing ANY details about it until Defcon.

   Enjoy!

   Kyle
   _




[no subject]

2007-08-04 Thread gypsy
unsubscribe


RE: Torbutton 1.1.6-alpha

2007-08-04 Thread Anas Matar
PLEASE UNSUBSCRIBE ME

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Mike Perry
Sent: Tuesday, July 31, 2007 4:21 AM
To: or-talk@freehaven.net
Subject: Torbutton 1.1.6-alpha

http://torbutton.torproject.org/dev/

1.1.6
  30 Jul 2007
  * bugfix: Fix an exception that may have messed up cookie/cache clearing
if you allowed Tor to write history URLs (possibly kills bug #457)
  * bugfix: Use only sub-browsers for tagging. Could fix some Date
hooking misses (possibly kills bug #460)
  * misc: Clean up annoying false positives with date hooking checks

I've been running this version for a week or so now, and I have not
seen any alerts about missing Javascript hooking. It is possible the
bug has been fixed by those other fixes, plus I cut down on the false
positives for those alerts.

As always, please keep an eye on Torbutton to make sure it is actually
properly blocking plugins, always properly clearing/isolating
cookies+cache, disabling javascript for pages loaded in an opposite
Tor state, and blocking CSS popups for the same.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Disclaimer: This E-mail and any attachments hereto are intended solely for the 
addressee and it may contain confidential material.  If you are
not the intended addressee or receive this in error, please delete the message 
and notify the sender. You must not disclose, forward or copy
this E-mail or attachments to any third party. Statements, opinions or comments 
expressed in this E-mail are those of the sender and do not
necessarily represent those of Arabian Advanced Systems AAS. AAS accepts no 
liability for any damage caused by this E-mail or its attachments




Re: Can we beat the Firewall of china attack?

2007-08-04 Thread Ringo Kamens
Are you on windows or Linux?
Comrade Ringo Kamens

On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 On Fri, Aug 03, 2007 at 02:54:06PM -0700, [EMAIL PROTECTED] wrote 2.2K bytes 
 in 18 lines about:
 : I am behind an ISA firewall so I need to use NTLMAPS to get through. My ISP 
 have started to block TOR Servers to prevent anyone to connect through them. 
 Yet I know I can access those servers through any free proxy already existing 
 on the Internet, provided it can use SSL connections. It would be nice if I 
 could point my TOR client to any of these proxies before it would connect to 
 the TOR servers which are blocked. I know TOR allows for an HTTP proxy, but 
 that one I have used to point to the NTLMAPS proxy already.
 : Do I stand any chance to beat my ISP? I only need TOR to acces the circuit 
 initially throgh an existing HTTP server. Should my ISP detect the HTTP 
 server and block it, what the hell, still there are zillions more to connect 
 to. :)

 Unfortunately, Tor doesn't support NTLM authentication.I know others
 have run into this problem as well.  I'm not sure if they ever figured
 out a workaround.

 --
 Andrew



Re: Directory servers for a subset of Tor routers

2007-08-04 Thread Ringo Kamens
I think this is possible with a little hacking of the code. If you
don't want to make you own version of tor (a bad idea to begin with)
you could run an authoritative dir server and then just block
connections to certain countries. Just make sure you configure your
server NOT to advertise that information to other directories.
Comrade Ringo Kamens

On 8/4/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
 Hi,

 Question, is it possible to set up private directory servers and
 make available only a portion of the available Tor routers? For
 example, if you only wanted to make routers that were online in the
 U.K. or France available to users who got their info from these dir
 servers, can that be done?

 I know you can set entry and exit nodes but this only addresses
 part of the question and is too static for this example. I've seen
 some info on Blossom but don't know if that will do it either. If
 it can't be done or there are other problems, does anyone have any
 other ideas or suggestions?


 Thanks...

 --
 Free information on becoming a Photographer. Click Now!
 http://tagline.hushmail.com/fc/Ioyw6h4fQtFznTeLcy3AEY651ReJH32DRSQ2P3pVLpQiG47cRgOe7X/




Unsubscribe

2007-08-04 Thread Anas Matar
Unsubscribe me please

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of [EMAIL PROTECTED]
Sent: Thursday, July 12, 2007 7:53 AM
To: or-talk@freehaven.net
Subject: Suggestion about TorButton

Hello!

First, thank you for this SUPERB extension :))

I have an idea of feature that could be interesting, but don't know
if you would agree to implement it, and moreover I think it is a lot
of job: It would be to force some of the bookmarks to use TOR,
whatever the TorButton status is.

For example, there would be one more function in the right click
menu, Bookmark this link WITH TOR. Then, the link will always use
TOR, even if Tor is turned OFF with Torbutton.

What do you think? :)

Best,

F44


Disclaimer: This E-mail and any attachments hereto are intended solely for the 
addressee and it may contain confidential material.  If you are
not the intended addressee or receive this in error, please delete the message 
and notify the sender. You must not disclose, forward or copy
this E-mail or attachments to any third party. Statements, opinions or comments 
expressed in this E-mail are those of the sender and do not
necessarily represent those of Arabian Advanced Systems AAS. AAS accepts no 
liability for any damage caused by this E-mail or its attachments