Re: Connections to botnet masters

2007-08-28 Thread Nils Vogels
On 8/28/07, M [EMAIL PROTECTED] wrote:


 The problem is that my ISP called me that some botnet had been
 controlled from my ip. Cert.fi had contacted my ISP when they we're
 investigating some DDOS or something like that. I think that they
 thought that my server is cracked.


I had the same problem last week with my ISP. Also, botnet issues. I am
blocking IRC for now in my exitpolicy, to see if this solves the problem

I changed my exit nodes policy, now I only allow traffic to http(s),
 imap(s) and pop(s) =(.


If blocking IRC using Bill's example doesnt solve the issue, I'm tempted to
go that way as well. Offcourse, I would rather have an exit policy that is
as wide as possible, but I would also prefer not to be kicked off the
internet by my ISP :)

Greets,

Nils
-- 
Simple guidelines to happiness:
Work like you don't need the money,
Love like your heart has never been broken and
Dance like no one can see you.


Re: Connections to botnet masters

2007-08-28 Thread M
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


 The problem is that my ISP called me that some botnet had been
 controlled from my ip. Cert.fi had contacted my ISP when they we're
 investigating some DDOS or something like that. I think that they
 thought that my server is cracked.
 
 
 I had the same problem last week with my ISP. Also, botnet issues. I am
 blocking IRC for now in my exitpolicy, to see if this solves the problem

I had blocked exit to common IRC ports before this problem arise. When I
was allowing exit to common irc ports my server was banned in couple of
hours from irc-servers that I used myself so I had to deny exit to irc.

In this case the offending exit port was 8080 (as far as I know there
was sitting some custom irc-server behind that port).

M
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFG0/CS6fSN8IKlpYoRAqOxAJ4/B62fj1O7RCYJnRHplJa7q4qCOwCdEIqy
472t1J5vUTJqu5LcdKIcGRM=
=031q
-END PGP SIGNATURE-


unsubscribe

2007-08-28 Thread Silviu Udrea


Jon McLachlan [EMAIL PROTECTED] wrote:  It is trivial for global passive 
adversaries, like the government or 
large telcom companies, to link true sources and true destinations of 
Tor traffic.

Tor aims to provide anonymity against weaker, local adversaries - and 
even then, adversaries can win, as investigated in these papers.

Read,
http://www.cl.cam.ac.uk/~sjm217/papers/oakland05torta.pdf
http://cypherspace.org/adam/pubs/traffic.pdf
http://www-users.cs.umn.edu/~hopper/ccs-latency-leak.pdf
http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf

Or, for a lot of papers on anonymity,
http://freehaven.net/anonbib/date.html


I would bet it happens more often than we'd like to think, as practical 
low-cost anonymity is still an open problem.


~Jon

Drake Wilson wrote:
 On Mon, Aug 27, 2007 at 01:37:55PM -0700, Rouslan Nabioullin wrote:
 
 Just curious, up to date has anyone been caught while using Tor?
 

 That's a very vague question.

 Suppose I'm using Tor to hide my current IP address, since I don't want
 people to know that I'm actually posting something from a secret hideout
 in Paraguay. I still post my full name and telephone number, so
 everyone knows that I made the post, and they can find out where I usually
 live by using reverse lookup on the number, but my rivals at Foocorp never
 manage to associate me with the hideout. Have I been caught?

 You can attach arbitrarily complicated semantics to the idea of
 identity and what it means to have been revealed in this context,
 so you'll need to be much clearer than that to get any reasonable answer
 out. Even then, I doubt the data are easy to get reliably, unless perhaps
 there's been a case of someone being tracked down while using Tor that was
 reported in major broadcast media. If the NSA were keeping tabs on Tor
 users somehow, it'd be very hard to find out.

 --- Drake Wilson
 




 Here are some very usefull links:


Passive income using Google AdSense

Personal developement

Blogging

Make money online

My Interests


   
-
Shape Yahoo! in your own image.  Join our Network Research Panel today!

Some problems setting up a server

2007-08-28 Thread Martin Senftleben
Hi,

I'm new to this and apologize in advance, in case I ask questions that 
have been asked too often. I have checked the Internet up and down 
and didn't find the right answers - maybe just because I wasn't able 
to formulate the question properly.
My system: OpenSuse 10.2 with current updates, Tor 0.1.2.16, and 
yesterday added Tork 0.18 (not CVS, that didn't compile properly), as 
I prefer the graphical interfaces...

1. I started using TOR a few days ago, and yesterday managed to set up 
the server. After a while (I'm not sure how many hours) my Internet 
connection was completely gone, so that I had to restart the PC. I'm 
not sure if that has to do with using TOR as a server, but if others 
have had such an experience, I would like to know what could cause 
it, so I can fix it - if it's related.
Currently, the server is turned off.
2. I receive messages from the server in the log:
a. You may be leaking DNS requests. 
I found out that kmail and nscd were doing that. nscd is caching DNS 
requests - should I disable that? It's said to improve performance 
quite well. Or is there a way to integrate it in TOR? Or can I just 
ignore the message?
b. Your traffic can be eavesdropped.
Now, that is what I want to avoid. But I didn't find a hint how TOR 
found it out, or which program makes it possible, or which settings I 
have to change. I followed the book when setting it all up and was 
happy that it was working.

Can you please direct me to the right resources, where I can find 
answers, or answer me here? I try to be more specific if necessary. 
However, I am not so much familiar with the technical details, some 
terms are completely new to me and I have to learn.

Thanks,

Martin
-- 
Dr. Martin Senftleben, Ph.D. (S.V.U.)
http://www.drmartinus.de/
http://www.daskirchenjahr.de/



pgpw5zftoTPiS.pgp
Description: PGP signature


Re: Some problems setting up a server

2007-08-28 Thread Martin Senftleben
Hi Roger,

thanks for your reply.

Am Dienstag, 28. August 2007 23:14 schrieb Roger Dingledine:
 On Tue, Aug 28, 2007 at 06:50:10PM +0100, Robert Hogan wrote:
  On Tuesday 28 August 2007 11:48:26 Martin Senftleben wrote:
   1. I started using TOR a few days ago, and yesterday managed to
   set up the server. After a while (I'm not sure how many hours)
   my Internet connection was completely gone, so that I had to
   restart the PC. I'm not sure if that has to do with using TOR
   as a server, but if others have had such an experience, I would
   like to know what could cause it, so I can fix it - if it's
   related.
   Currently, the server is turned off.
 
  Don't know what the explanation for this is. Tor certainly
  doesn't clobber your internet connection, and I certainly hope
  TorK doesn't!

 If your cablemodem/dsl router died, this is the hint:
 http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#CablemodemCra
shes

 and if your PC's networking and stuff died, it's probably this:

This was the case.

 http://wiki.noreply.org/noreply/TheOnionRouter/WindowsBufferProblem
s

Hm, I'm running Linux. The answers there don't help me much. 

I'm starting the server again just to test if it happens again.

Martin



-- 
Dr. Martin Senftleben, Ph.D. (S.V.U.)
http://www.drmartinus.de/
http://www.daskirchenjahr.de/



pgpVv4biEOZnT.pgp
Description: PGP signature


TorCheck - New Features

2007-08-28 Thread BlueStar88
Hi,

the TorCheck at 'http://torcheck.xenobite.eu', a webbased Tor
Usage-Detector, has got some new Features:

Browser-Checks

+ JavaScript-Support Check
+ Cookies-Support Check

Additional Tor-Node Reference to

+ TorDNSEL-Service at 'exitlist.torproject.org'



Greets

-- 
BlueStar88 [EMAIL PROTECTED]


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil