Re: Connections to botnet masters
On 8/28/07, M [EMAIL PROTECTED] wrote: The problem is that my ISP called me that some botnet had been controlled from my ip. Cert.fi had contacted my ISP when they we're investigating some DDOS or something like that. I think that they thought that my server is cracked. I had the same problem last week with my ISP. Also, botnet issues. I am blocking IRC for now in my exitpolicy, to see if this solves the problem I changed my exit nodes policy, now I only allow traffic to http(s), imap(s) and pop(s) =(. If blocking IRC using Bill's example doesnt solve the issue, I'm tempted to go that way as well. Offcourse, I would rather have an exit policy that is as wide as possible, but I would also prefer not to be kicked off the internet by my ISP :) Greets, Nils -- Simple guidelines to happiness: Work like you don't need the money, Love like your heart has never been broken and Dance like no one can see you.
Re: Connections to botnet masters
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 The problem is that my ISP called me that some botnet had been controlled from my ip. Cert.fi had contacted my ISP when they we're investigating some DDOS or something like that. I think that they thought that my server is cracked. I had the same problem last week with my ISP. Also, botnet issues. I am blocking IRC for now in my exitpolicy, to see if this solves the problem I had blocked exit to common IRC ports before this problem arise. When I was allowing exit to common irc ports my server was banned in couple of hours from irc-servers that I used myself so I had to deny exit to irc. In this case the offending exit port was 8080 (as far as I know there was sitting some custom irc-server behind that port). M -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFG0/CS6fSN8IKlpYoRAqOxAJ4/B62fj1O7RCYJnRHplJa7q4qCOwCdEIqy 472t1J5vUTJqu5LcdKIcGRM= =031q -END PGP SIGNATURE-
unsubscribe
Jon McLachlan [EMAIL PROTECTED] wrote: It is trivial for global passive adversaries, like the government or large telcom companies, to link true sources and true destinations of Tor traffic. Tor aims to provide anonymity against weaker, local adversaries - and even then, adversaries can win, as investigated in these papers. Read, http://www.cl.cam.ac.uk/~sjm217/papers/oakland05torta.pdf http://cypherspace.org/adam/pubs/traffic.pdf http://www-users.cs.umn.edu/~hopper/ccs-latency-leak.pdf http://petworkshop.org/2007/papers/PET2007_preproc_Sampled_traffic.pdf Or, for a lot of papers on anonymity, http://freehaven.net/anonbib/date.html I would bet it happens more often than we'd like to think, as practical low-cost anonymity is still an open problem. ~Jon Drake Wilson wrote: On Mon, Aug 27, 2007 at 01:37:55PM -0700, Rouslan Nabioullin wrote: Just curious, up to date has anyone been caught while using Tor? That's a very vague question. Suppose I'm using Tor to hide my current IP address, since I don't want people to know that I'm actually posting something from a secret hideout in Paraguay. I still post my full name and telephone number, so everyone knows that I made the post, and they can find out where I usually live by using reverse lookup on the number, but my rivals at Foocorp never manage to associate me with the hideout. Have I been caught? You can attach arbitrarily complicated semantics to the idea of identity and what it means to have been revealed in this context, so you'll need to be much clearer than that to get any reasonable answer out. Even then, I doubt the data are easy to get reliably, unless perhaps there's been a case of someone being tracked down while using Tor that was reported in major broadcast media. If the NSA were keeping tabs on Tor users somehow, it'd be very hard to find out. --- Drake Wilson Here are some very usefull links: Passive income using Google AdSense Personal developement Blogging Make money online My Interests - Shape Yahoo! in your own image. Join our Network Research Panel today!
Some problems setting up a server
Hi, I'm new to this and apologize in advance, in case I ask questions that have been asked too often. I have checked the Internet up and down and didn't find the right answers - maybe just because I wasn't able to formulate the question properly. My system: OpenSuse 10.2 with current updates, Tor 0.1.2.16, and yesterday added Tork 0.18 (not CVS, that didn't compile properly), as I prefer the graphical interfaces... 1. I started using TOR a few days ago, and yesterday managed to set up the server. After a while (I'm not sure how many hours) my Internet connection was completely gone, so that I had to restart the PC. I'm not sure if that has to do with using TOR as a server, but if others have had such an experience, I would like to know what could cause it, so I can fix it - if it's related. Currently, the server is turned off. 2. I receive messages from the server in the log: a. You may be leaking DNS requests. I found out that kmail and nscd were doing that. nscd is caching DNS requests - should I disable that? It's said to improve performance quite well. Or is there a way to integrate it in TOR? Or can I just ignore the message? b. Your traffic can be eavesdropped. Now, that is what I want to avoid. But I didn't find a hint how TOR found it out, or which program makes it possible, or which settings I have to change. I followed the book when setting it all up and was happy that it was working. Can you please direct me to the right resources, where I can find answers, or answer me here? I try to be more specific if necessary. However, I am not so much familiar with the technical details, some terms are completely new to me and I have to learn. Thanks, Martin -- Dr. Martin Senftleben, Ph.D. (S.V.U.) http://www.drmartinus.de/ http://www.daskirchenjahr.de/ pgpw5zftoTPiS.pgp Description: PGP signature
Re: Some problems setting up a server
Hi Roger, thanks for your reply. Am Dienstag, 28. August 2007 23:14 schrieb Roger Dingledine: On Tue, Aug 28, 2007 at 06:50:10PM +0100, Robert Hogan wrote: On Tuesday 28 August 2007 11:48:26 Martin Senftleben wrote: 1. I started using TOR a few days ago, and yesterday managed to set up the server. After a while (I'm not sure how many hours) my Internet connection was completely gone, so that I had to restart the PC. I'm not sure if that has to do with using TOR as a server, but if others have had such an experience, I would like to know what could cause it, so I can fix it - if it's related. Currently, the server is turned off. Don't know what the explanation for this is. Tor certainly doesn't clobber your internet connection, and I certainly hope TorK doesn't! If your cablemodem/dsl router died, this is the hint: http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#CablemodemCra shes and if your PC's networking and stuff died, it's probably this: This was the case. http://wiki.noreply.org/noreply/TheOnionRouter/WindowsBufferProblem s Hm, I'm running Linux. The answers there don't help me much. I'm starting the server again just to test if it happens again. Martin -- Dr. Martin Senftleben, Ph.D. (S.V.U.) http://www.drmartinus.de/ http://www.daskirchenjahr.de/ pgpVv4biEOZnT.pgp Description: PGP signature
TorCheck - New Features
Hi, the TorCheck at 'http://torcheck.xenobite.eu', a webbased Tor Usage-Detector, has got some new Features: Browser-Checks + JavaScript-Support Check + Cookies-Support Check Additional Tor-Node Reference to + TorDNSEL-Service at 'exitlist.torproject.org' Greets -- BlueStar88 [EMAIL PROTECTED] signature.asc Description: Dies ist ein digital signierter Nachrichtenteil