Re: Has anyone had the identity revealed in Tor?

2007-09-15 Thread Eugen Leitl
On Sat, Sep 15, 2007 at 08:49:17AM +0200, Stephen wrote:

 In some instances maybe so, in other instances not so hard to know:
 
 http://cryptome.org/nsa-ip-update8.htm

Anyone knows what the false positives rate in the list is?
I've long considered putting the address ranges in the firewall
deny list, but was hesitant inasmuch this could affect legitimate
customers.

Oh, and somebody tell John Young to stop using stickers
on Cryptome DVDs. That makes them unreadable, soon. Inkjet
or LaserScribe labelling would have been preferrable.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


Re: What do you think about this exit policy for germany?

2007-09-15 Thread Marco A. Calamari
On Wed, 2007-09-12 at 10:31 +0200, TOR-Admin (gpfTOR1) wrote:
 supporting spammers
  when setting up my node for 465,993,995?
 
 
 The SSL-encrypted SMTP-ports are using SMTP-Auth (mostly). The
 support of spammer is very low (in my opinion).
 
 By the way, I have the same problems like you since Nov.2006
 (trouble with the german BKA because of childporn, trouble with my
 ISP). Half a year ago I switched to middleman but it did not help. I
 run into a telecommunication surveillance and became a terrorist or
 something like that.
 
 You have read the Heise-News about bad exit nodes (controlled
 governments and others):
 http://www.heise.de/newsticker/meldung/95770
 
 I think, a middleman node is not a solution for our problems. May
 be, we are listed in a database and the listing is not deleted after
 switching to middleman. May be, a bad exit feature out the next
 middleman...
 
 My recommendation: Try to find a strong, TOR-friendly organisation
 for your nodes. You manage the nodes and the organisation takes the
 liability (jurisitische Verantwortung).

Good recommandation, I agree, but almost impossible to follow
IMHO only privacy and civil right organization are eligible,
 and in Italy there are very few, and normally not interested
 in technology. No way, at least for me.

The normal pattern of a contact for this activity 
 when I contacted a candidate organization is

1) you find a person that can decide
2) you talk to him, explaining the fact and normally
 have some interest in return
3) suddendly the person understand that sooner or later
 someone will say or write that he is helping terrorist
 and paedophiles
4) end of the story

Someone has a success story ?

Ciao.   Marco
-- 

+--- http://www.winstonsmith.info ---+
| il Progetto Winston Smith: scolleghiamo il Grande Fratello |
| the Winston Smith Project: unplug the Big Brother  |
| Marco A. Calamari [EMAIL PROTECTED]  http://www.marcoc.it   |
| DSS/DH:  8F3E 5BAE 906F B416 9242 1C10 8661 24A9 BFCE 822B |
+ PGP RSA: ED84 3839 6C4D 3FFE 389F 209E 3128 5698 --+



signature.asc
Description: This is a digitally signed message part


Re: What do you think about this exit policy for germany?

2007-09-15 Thread Alexander W. Janssen
Just one contra:

Supporting $some_crime always means that you knew about that certain
case they're suing you about. Since you can only know about something
if you start sniffing - which is strictly forbidden - you can't
possibly know about a direct certain crime.
Unless you were it yourself, using your own Tor exit-node, trying to
veil yourself behind this clever coupe. (yes, that's what one
policeman thought of me once...)

However, that doesn't protect you from Mickey Mouse investigation.

Any lawyers here who can confirm/dissect my argument?

Alex.

-- 
I am tired of all this sort of thing called science here... We have spent
millions in that sort of thing for the last few years, and it is time it
should be stopped.
 -- Simon Cameron, U.S. Senator, on the Smithsonian Institution, 1901.


.


Re: a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-15 Thread Vlad \SATtva\ Miller
coderman wrote on 14.09.2007 06:39:
 On 9/13/07, scar [EMAIL PROTECTED] wrote:
 ...
 so, if we are using a website that uses HTTPS, but, in firefox, for
 example, in the cookies list under that website it shows Send
 for: any type of connection, then the session is vulnerable?
 
 vulnerable against a MITM that can request / inject an HTTP page,
 frame, or item to the site.  this would expose the auth cookie and
 allow hijacking of the account.
 
 for solely passive monitoring, as long as everything is HTTPS it will
 be protected. snip

Unfortunately, the problem is bigger than that. Suppose a website that
stores user_login+hashed_password an as authentication token in a cookie
not marked as secure (SSL only) cookie. If, even accidentally, our
user browses to that site by means of an open HTTP, his browser will
transfer this stored cookie in a standard GET request and make it
susceptible to passive sniffering. Now the attacker can trivially pass
the same cookie data to the website and hijack user's account.

-- 
SATtva | security consulting
www.vladmiller.info | www.pgpru.com





signature.asc
Description: OpenPGP digital signature


Re: MinGW compile link errors with svn 11440

2007-09-15 Thread Nick Mathewson
On Sat, Sep 15, 2007 at 08:27:36AM +0800, Li-Hui Zhou wrote:
 There's a lot of errors when linking

Thanks!  Fixed in r11445.

yrs,
-- 
Nick Mathewson


pgpNnVearY4dj.pgp
Description: PGP signature


ATTN: An attack on my torrc? I did not specify a server or an exit node!!!

2007-09-15 Thread jeffery statin

This was in my message log today and I did not specify
a server or an exit node (if that is what using exit
refers to).  Hell, I just re-installed this Windows XP
SP2 and just installed the Tor bundle (Tor v.0.1.2.17,
Vidalia v0.0.14).  I haven't even opened the torrc or
torrc.orig.1 before I noticed this warning!  

So I looked into those files and vidalia.conf.  The
nodes mono and ZoneSecurite are not present in
those files.

Message Log:
Sep 15 08:07:28.203 [Notice] Tor v0.1.2.17. This is
experimental software. Do not rely on it for strong
anonymity.
Sep 15 08:07:28.312 [Notice] Initialized libevent
version 1.3b using method win32. Good.
Sep 15 10:03:58.546 [Notice] We tried for 15 seconds
to connect to '[scrubbed]' using exit 'ZoneSecurite'.
Retrying on a new circuit.
Sep 15 10:03:58.640 [Notice] We tried for 15 seconds
to connect to '[scrubbed]' using exit 'ZoneSecurite'.
Retrying on a new circuit.
Sep 15 10:21:37.031 [Notice] Have tried resolving or
connecting to address '[scrubbed]' at 3 different
places. Giving up.
Sep 15 11:45:27.093 [Notice] Have tried resolving or
connecting to address '[scrubbed]' at 3 different
places. Giving up.
Sep 15 11:47:17.765 [Notice] Have tried resolving or
connecting to address '[scrubbed]' at 3 different
places. Giving up.
Sep 15 11:49:32.906 [Warning] You specified a server
mono by name, but this name is not registered, so it
could be used by any server, not just the one you
meant. To make sure you get the same server in the
future, refer to it by key, as
$B468125D79F3C03491EB95FD8126981E5348D88C.



   

Building a website is a piece of cake. Yahoo! Small Business gives you all the 
tools to get online.
http://smallbusiness.yahoo.com/webhosting 


RE: Exclude nodes from certain countries

2007-09-15 Thread Wesley Kenzie
Fyi, what you are asking for is exactly what we are working towards with
http://pickaproxy.com - allowing you to pick or exclude exit nodes by
Country - where Tor is setup on our server as a client to your workstation.
We are calling this geospoofing.

. . .
Wesley


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of misc
Sent: September 15, 2007 8:43 AM
To: or-talk@freehaven.net
Subject: Re: Exclude nodes from certain countries


On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:

 The best option is to run a squid server on localhost with a block by 
 country filter. Then, route your tor client through it. Comrade Ringo 
 Kamens

I understand the part about running squid on localhost and routing web
brouser through it. I can route the traffic from the brouser to squid and
then into tor.

But how can I route Tor client through localhost proxy? Tor client has to
make an encrypted connection to Tor entry node. Do you mean putting squid in
the middle of that encrypted connection? How would you do that?

Plus, that will only filter the entry nodes by country. But I want to avoid
EXIT nodes from certain countries. The entry nodes do not see my traffic, so
I don't really care about them. However the exit nodes can see all my
traffic in clear text, so it's the exit nodes that I want to filter by
country (sorry if I didn't make it clear in my original post).





Re: ATTN: An attack on my torrc? I did not specify a server or an exit node!!!

2007-09-15 Thread Robert Hogan
On Saturday 15 September 2007 20:20:32 jeffery statin wrote:
 This was in my message log today and I did not specify
 a server or an exit node (if that is what using exit
 refers to).  Hell, I just re-installed this Windows XP
 SP2 and just installed the Tor bundle (Tor v.0.1.2.17,
 Vidalia v0.0.14).  I haven't even opened the torrc or
 torrc.orig.1 before I noticed this warning!

The warnings are nothing to worry about. 


 Sep 15 10:03:58.640 [Notice] We tried for 15 seconds
 to connect to '[scrubbed]' using exit 'ZoneSecurite'.
 Retrying on a new circuit.

Tor/Vidalia created this circuit automatically and chose the exit randomly.

 Sep 15 11:49:32.906 [Warning] You specified a server
 mono by name, but this name is not registered, so it
 could be used by any server, not just the one you
 meant. To make sure you get the same server in the
 future, refer to it by key, as
 $B468125D79F3C03491EB95FD8126981E5348D88C.


Vidalia probably requested information from Tor for 'mono' by 'name' rather 
than 'fingerprint'. Again, this is not anything to worry about. Just the 
normal operation of your tor/vidalia bundle.



signature.asc
Description: This is a digitally signed message part.


Re: I break the silence: My arrest

2007-09-15 Thread Alexander W. Janssen
On 9/16/07, Juliusz Chroboczek [EMAIL PROTECTED] wrote:
  http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
 Alex, perhaps you or somebody could put up a web page, in German, that
 explains in simple terms what Tor is about, aimed at explaining to the
 average German police officer what tor is about.  This might (or might
 not) prove useful if other German tor operators get into a similar
 kind of situation.

Actually what'd be more useful would be something like a tag in the
whois-database... But the average copper would probably either ignore
or not understand it :-(

 Juliusz

Alex.


-- 
I am tired of all this sort of thing called science here... We have spent
millions in that sort of thing for the last few years, and it is time it
should be stopped.
 -- Simon Cameron, U.S. Senator, on the Smithsonian Institution, 1901.


.


Re: Exclude nodes from certain countries

2007-09-15 Thread Scott Bennett
 On  Sat, 15 Sep 2007 17:47:11 -0400 misc [EMAIL PROTECTED] wrote:
On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:

 www.pickaproxy.com

So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In other words users do not
have any protection from your server.

If you have not been approached by N$A/C1A/echel0n/etc yet, it will happen
sooner than you think.

 Why would they waste their time?  They will have already gotten copies
of what they want as it traveled in the clear between its origin and the web
server.  Remember the news articles a while back about all those snoop boxes
in the locked rooms at ATT?

Do you realize that fairly soon you will have a choice of various
unpleasant consequences versus obediently logging everything that goes
through your server and submitting the logs to proper channels?

 As noted above, if they want it, they will have already gotten it.  The
only reason to bother the web site operator(s) is for the general purpose of
intimidation.

That is, if you don't work there already :(  Do you, Wesley? This smells
to me like a honeypot...

 It's probably worth a few bucks to them to establish a sucker trap web
site, so maybe that's what he's doing.  The irony, of course, is that the
enemies of freedom, in particular, the domestic enemies referred to in our
Constitution, are funded at the expense of U.S. taxpayers.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: I break the silence: My arrest

2007-09-15 Thread Scott Bennett
 On Sun, 16 Sep 2007 00:32:27 +0200 Alexander W. Janssen
[EMAIL PROTECTED] wrote:

On 9/16/07, Juliusz Chroboczek [EMAIL PROTECTED] wrote:
  http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
 Alex, perhaps you or somebody could put up a web page, in German, that
 explains in simple terms what Tor is about, aimed at explaining to the
 average German police officer what tor is about.  This might (or might

 There is already a web page, though perhaps not tailored specifically
for cops:

http://tor.eff.org/index.html.de

 not) prove useful if other German tor operators get into a similar
 kind of situation.

Actually what'd be more useful would be something like a tag in the
whois-database... But the average copper would probably either ignore
or not understand it :-(

 Um...and that would be more useful how?  I thought the suggestion was
to provide them information that *would* convince the average cop not to
bother.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


[Fwd: Re: I break the silence: My arrest]

2007-09-15 Thread Xinwen Fu
Now that I can break my silence it's time for some action.

A question to all Tor-operators:
I'd like to do a survey about all incidents which happened to
operators. Stuff like:

* arrested
* confiscated equippment
* nastygram
* surveillance
* ...

What would be possible other questions/point in the survey?

Alex.

-- I am tired of all this sort of thing called science here... We have
spent millions in that sort of thing for the last few years, and it is
time it should be stopped. -- Simon Cameron, U.S. Senator, on the
Smithsonian Institution, 1901. .



Re: I break the silence: My arrest

2007-09-15 Thread Ryan Wagner
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Scott Bennett wrote:
  On Sun, 16 Sep 2007 00:32:27 +0200 Alexander W. Janssen
 [EMAIL PROTECTED] wrote:
 
 On 9/16/07, Juliusz Chroboczek [EMAIL PROTECTED] wrote:
 http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
 Alex, perhaps you or somebody could put up a web page, in German, that
 explains in simple terms what Tor is about, aimed at explaining to the
 average German police officer what tor is about.  This might (or might
 
  There is already a web page, though perhaps not tailored specifically
 for cops:
 
   http://tor.eff.org/index.html.de
 
 not) prove useful if other German tor operators get into a similar
 kind of situation.
 Actually what'd be more useful would be something like a tag in the
 whois-database... But the average copper would probably either ignore
 or not understand it :-(

  Um...and that would be more useful how?  I thought the suggestion was
 to provide them information that *would* convince the average cop not to
 bother.
 
There's still the possibility that a server op is using their Tor node
as a scapegoat and really is doing bad things (I don't mean to imply
that's the case here). Even if the police know that their suspect is
running a Tor node, what Tor is, and what it's used for, they're still
going to investigate him. All we can hope for is that they'd be a bit
nicer about it.
 
   Scott Bennett, Comm. ASMELG, CFIAG
 **
 * Internet:   bennett at cs.niu.edu  *
 **
 * A well regulated and disciplined militia, is at all times a good  *
 * objection to the introduction of that bane of all free governments *
 * -- a standing army.   *
 *-- Gov. John Hancock, New York Journal, 28 January 1790 *
 **
 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=lVfH
-END PGP SIGNATURE-


Re: I break the silence: My arrest

2007-09-15 Thread Alexander W. Janssen
On 9/16/07, Ryan Wagner [EMAIL PROTECTED] wrote:
 There's still the possibility that a server op is using their Tor node
 as a scapegoat and really is doing bad things (I don't mean to imply
 that's the case here). Even if the police know that their suspect is
 running a Tor node, what Tor is, and what it's used for, they're still
 going to investigate him. All we can hope for is that they'd be a bit
 nicer about it.

Actually one guy from the police exactly asked me: Can you prove that
the traffic is really from Tor and someone else and not from your
pretending this was Tor traffic?

F*ck! This is insane. If i'd be an evildoer I would use *every other*
exitnode, but not mine! Why should I use mine? There'd be a chance
that they kick down my door! I'd handcraft my torrc in a way to
blacklist my very own node.

And why on earth should I, as the suspect, prove myself unguilty in
that case? I can't!
There's a saying: Innocent until proven guilty. And it's good that
way. I don't need to prove my innocense. THEY have to prove I'm
guilty!

Never forget that. It's the law.

It's a stupid idea. Sorry. Bollocks.

Alex.

-- 
I am tired of all this sort of thing called science here... We have spent
millions in that sort of thing for the last few years, and it is time it
should be stopped.
 -- Simon Cameron, U.S. Senator, on the Smithsonian Institution, 1901.


.


Re: I break the silence: My arrest

2007-09-15 Thread Ringo Kamens
Is there any way that people can donate to help cover your legal fees?
I'll commit to one US dollar. If half the people who read this message
did that, it would at least take a small chunk out of that mountain of
legal fees you're facing. Also, have you talked to the CCC (ccc.de)
about this? They might be able to help.
Comrade Ringo Kamens

On 9/15/07, Alexander W. Janssen [EMAIL PROTECTED] wrote:
 On 9/16/07, Ryan Wagner [EMAIL PROTECTED] wrote:
  There's still the possibility that a server op is using their Tor node
  as a scapegoat and really is doing bad things (I don't mean to imply
  that's the case here). Even if the police know that their suspect is
  running a Tor node, what Tor is, and what it's used for, they're still
  going to investigate him. All we can hope for is that they'd be a bit
  nicer about it.

 Actually one guy from the police exactly asked me: Can you prove that
 the traffic is really from Tor and someone else and not from your
 pretending this was Tor traffic?

 F*ck! This is insane. If i'd be an evildoer I would use *every other*
 exitnode, but not mine! Why should I use mine? There'd be a chance
 that they kick down my door! I'd handcraft my torrc in a way to
 blacklist my very own node.

 And why on earth should I, as the suspect, prove myself unguilty in
 that case? I can't!
 There's a saying: Innocent until proven guilty. And it's good that
 way. I don't need to prove my innocense. THEY have to prove I'm
 guilty!

 Never forget that. It's the law.

 It's a stupid idea. Sorry. Bollocks.

 Alex.

 --
 I am tired of all this sort of thing called science here... We have spent
 millions in that sort of thing for the last few years, and it is time it
 should be stopped.
  -- Simon Cameron, U.S. Senator, on the Smithsonian Institution, 1901.


 .



Re: I break the silence: My arrest

2007-09-15 Thread Alexander W. Janssen
On 9/16/07, Ringo Kamens [EMAIL PROTECTED] wrote:
 Is there any way that people can donate to help cover your legal fees?
 I'll commit to one US dollar. If half the people who read this message
 did that, it would at least take a small chunk out of that mountain of
 legal fees you're facing. Also, have you talked to the CCC (ccc.de)
 about this? They might be able to help.

Hi Ringo,

thanks for your offer, but I'm able to sort this out on my own.
However, your offer is valid and some kinda Tor Legal Fund (which was
discussed earlier) would make sense. There are still some open cases
(like morphiums's case, a student) which could need monetary help.
However, I'm not a lawyer and I don't know anything about how to set
up such a thing.

It's be easy to set up a Paypal-account, but it'd be not non-profit,
means someone's got to pay taxes for this.

Any takers?

 Comrade Ringo Kamens

Alex.

-- 
I am tired of all this sort of thing called science here... We have spent
millions in that sort of thing for the last few years, and it is time it
should be stopped.
 -- Simon Cameron, U.S. Senator, on the Smithsonian Institution, 1901.


.


Re: I break the silence: My arrest

2007-09-15 Thread Ringo Kamens
If you set up a paypal account I would be willing to donate on a
case-by-case basis (in this case, it would be to help with your legal
fees). I think even if you don't need help with legal fees by
receiving donations from all across the world it sends the message to
German authorities that harassing and attacking tor node operators is
not acceptable. Also, being able to mail in money would also be nice ;
)
Comrade Ringo Kamens

On 9/15/07, Alexander W. Janssen [EMAIL PROTECTED] wrote:
 On 9/16/07, Ringo Kamens [EMAIL PROTECTED] wrote:
  Is there any way that people can donate to help cover your legal fees?
  I'll commit to one US dollar. If half the people who read this message
  did that, it would at least take a small chunk out of that mountain of
  legal fees you're facing. Also, have you talked to the CCC (ccc.de)
  about this? They might be able to help.

 Hi Ringo,

 thanks for your offer, but I'm able to sort this out on my own.
 However, your offer is valid and some kinda Tor Legal Fund (which was
 discussed earlier) would make sense. There are still some open cases
 (like morphiums's case, a student) which could need monetary help.
 However, I'm not a lawyer and I don't know anything about how to set
 up such a thing.

 It's be easy to set up a Paypal-account, but it'd be not non-profit,
 means someone's got to pay taxes for this.

 Any takers?

  Comrade Ringo Kamens

 Alex.

 --
 I am tired of all this sort of thing called science here... We have spent
 millions in that sort of thing for the last few years, and it is time it
 should be stopped.
  -- Simon Cameron, U.S. Senator, on the Smithsonian Institution, 1901.


 .



Re: Exclude nodes from certain countries

2007-09-15 Thread misc
On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:

 
  Why would they waste their time?  They will have already gotten copies
 of what they want as it traveled in the clear between its origin and the web
 server.  Remember the news articles a while back about all those snoop boxes
 in the locked rooms at ATT?

  As noted above, if they want it, they will have already gotten it.  The
 only reason to bother the web site operator(s) is for the general purpose of
 intimidation.

Scott, anybody who is browsing to www.pickaproxy.com to use Tor there would
OBVIOUSLY use SSL (https://www.pickaproxy.com). SSL support was the first
thing I checked when I went onto their web-site. (If they didn't support
SSL, I probably would not have even bothered replying to that post).

The connection to www.pickaproxy.com would be encrypted with SSL, then the
traffic would be decrypted at www.pickaproxy.com and redirected into their
Tor client, where it would be re-encrypted. Therefore the ONLY party
knowing the author IP and the contents of communication will be
www.pickaproxy.com (unless you use anonymous proxy-chain to connect to
www.pickaproxy.com).

I'm aware of those ISP rooms sucking the traffic from internet backbones
into N$A. So I can only imagine how much pressure this particular
web-server operator will be under, if that's not a honeypot from the start.



Re: I break the silence: My arrest

2007-09-15 Thread Alexander W. Janssen
On 9/16/07, Ringo Kamens [EMAIL PROTECTED] wrote:
 If you set up a paypal account I would be willing to donate on a
 case-by-case basis (in this case, it would be to help with your legal
 fees). I think even if you don't need help with legal fees by
 receiving donations from all across the world it sends the message to
 German authorities that harassing and attacking tor node operators is
 not acceptable. Also, being able to mail in money would also be nice ;
 )

Well. There's an EFF Europe now and it has a coordinator, Erik
Josefsson, who's in cahrge with it. Maybe we should contact him and
let all the funds ran over the european EFF?

Erik, you're listening? Is there any possiblity to create a legal fund?

(Problem is: At leat german organisations can't accept donations
tax-free from foreign countries. Also I'd like to see someone official
in charge rather than some person - like me, who is pretty much unkown
and not trustworthy when it comes to money.)

 Comrade Ringo Kamens

Alex.

-- 
I am tired of all this sort of thing called science here... We have spent
millions in that sort of thing for the last few years, and it is time it
should be stopped.
 -- Simon Cameron, U.S. Senator, on the Smithsonian Institution, 1901.


.


Re: I break the silence: My arrest

2007-09-15 Thread Ricky Fitz
Hi Alex,

I am really sorry about what has happened to you.

I think there is a need to incorporate. If there is for example an
incorporated society which runs some tor-nodes, police is going to
confiscate the servers (which is okay), but not going to search houses
from members of the incorporated society.

Also there would be some legal advantages in questions of liability.

Regards,
Ricky.
-- 
Falls Freiheit überhaupt etwas bedeutet, dann bedeutet sie das Recht
darauf, den Leuten das zu sagen, was sie nicht hören wollen. 
- George Orwell, aus dem Nachwort zu Animal Farm, 1945 -

GPG-Fingerprint: 10D6 7B8F 1F7C 7CB1 2C4E 930E AFD2 FDF3 A10B D302
GPG-Key-ID: AFD2FDF3A10BD302
http://www.lawlita.com/pgp-schluessel/


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Exclude nodes from certain countries

2007-09-15 Thread Ringo Kamens
My main criticism of pickaproxy is... why? Why do that when you can
program a tor controller to do exactly the same thing with a offline
database?
Comrade Ringo Kamens

On 9/15/07, misc [EMAIL PROTECTED] wrote:
 On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:

 
   Why would they waste their time?  They will have already gotten copies
  of what they want as it traveled in the clear between its origin and the web
  server.  Remember the news articles a while back about all those snoop boxes
  in the locked rooms at ATT?

   As noted above, if they want it, they will have already gotten it.  The
  only reason to bother the web site operator(s) is for the general purpose of
  intimidation.

 Scott, anybody who is browsing to www.pickaproxy.com to use Tor there would
 OBVIOUSLY use SSL (https://www.pickaproxy.com). SSL support was the first
 thing I checked when I went onto their web-site. (If they didn't support
 SSL, I probably would not have even bothered replying to that post).

 The connection to www.pickaproxy.com would be encrypted with SSL, then the
 traffic would be decrypted at www.pickaproxy.com and redirected into their
 Tor client, where it would be re-encrypted. Therefore the ONLY party
 knowing the author IP and the contents of communication will be
 www.pickaproxy.com (unless you use anonymous proxy-chain to connect to
 www.pickaproxy.com).

 I'm aware of those ISP rooms sucking the traffic from internet backbones
 into N$A. So I can only imagine how much pressure this particular
 web-server operator will be under, if that's not a honeypot from the start.




Re: Exclude nodes from certain countries

2007-09-15 Thread misc
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:

 The best option is to run a squid server on localhost with a block by
 country filter. Then, route your tor client through it.
 Comrade Ringo Kamens
 

I researched it more and everybody is saying squid goes between the browser
and tor:

Browser - Squid - Tor

Please explain how can you route Tor through squid?



Re: I break the silence: My arrest

2007-09-15 Thread BlueStar88
If the most Tor users are really into human rights, free speech,
reporters and the like, then there *are* organizations which vastly more
power than such a 'little' Tor-operator-fund can provide, thought..

But where are they, when it's getting hot on Tor?
Why all the load is up to the operators?
Where are the *users* supporting Tor?

I'm reading all this and coming to the conclusion: I'm alone (except
some nice words), if it takes me. There's nothing to read about external
professional support. My experience: Just finding a internet techieness
lawyer is a hard job...
But I don't like to be alone, if I'm doing something for all (the
users!) on this mission for freedom!

Are there mostly black hats on there, which surely not stand up and say
comrade, here's my hand, we'll drive this legal in the open field...?

If there is NO SUPPORT from the users itself, any organization or the
like, we (as the fully responsible operators) should seriously
reconsider...

Just another 'naive' one from me, or is it a point? ;-)



Greets


Am Samstag, den 15.09.2007, 19:50 -0400 schrieb Ringo Kamens:
 If you set up a paypal account I would be willing to donate on a
 case-by-case basis (in this case, it would be to help with your legal
 fees). I think even if you don't need help with legal fees by
 receiving donations from all across the world it sends the message to
 German authorities that harassing and attacking tor node operators is
 not acceptable. Also, being able to mail in money would also be nice ;
 )
 Comrade Ringo Kamens


-- 
BlueStar88 [EMAIL PROTECTED]


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Exclude nodes from certain countries

2007-09-15 Thread Ringo Kamens
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens

On 9/15/07, misc [EMAIL PROTECTED] wrote:
 On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:

  The best option is to run a squid server on localhost with a block by
  country filter. Then, route your tor client through it.
  Comrade Ringo Kamens
 

 I researched it more and everybody is saying squid goes between the browser
 and tor:

 Browser - Squid - Tor

 Please explain how can you route Tor through squid?




Re: Exclude nodes from certain countries

2007-09-15 Thread misc
On Sat, 15 Sep 2007 21:39:17 -0400, Ringo Kamens wrote:

 I don't think you get the problem here. Squid wouldn't be able to
 affect the choice of exit nodes. It would just be able to filter entry
 nodes.
 Comrade Ringo Kamens

I know how to filter entry nodes. I can do it with Protowall or another
firewall. That's easy.

I wonder if Tor makes an initial connection to all nodes from which it
later constructs a circuit.

If Tor is never allowed to connect to certain nodes, and therefore doesn't
know about them, can they still be used as exit nodes?



Re: Exclude nodes from certain countries

2007-09-15 Thread Ringo Kamens
If Tor is never allowed to connect to certain nodes, and therefore doesn't
know about them, can they still be used as exit nodes?

AFAIK tor connects to an entry guard which then connects to the exit
node for you. This way, they can't take the logs from the exit node
and go well.. the IP in question connected to you 20 seconds before
the alleged connection was made, so that's who it probably was. This
should be all explained in the docs somewhere.
Comrade Ringo Kamens

On 9/15/07, misc [EMAIL PROTECTED] wrote:
 On Sat, 15 Sep 2007 21:39:17 -0400, Ringo Kamens wrote:

  I don't think you get the problem here. Squid wouldn't be able to
  affect the choice of exit nodes. It would just be able to filter entry
  nodes.
  Comrade Ringo Kamens

 I know how to filter entry nodes. I can do it with Protowall or another
 firewall. That's easy.

 I wonder if Tor makes an initial connection to all nodes from which it
 later constructs a circuit.

 If Tor is never allowed to connect to certain nodes, and therefore doesn't
 know about them, can they still be used as exit nodes?




Re: I break the silence: My arrest

2007-09-15 Thread BlueStar88
I would really like to hear some good news from currently investigated
Tor ops, about their success contacting CCC or EFF EU...

Btw: Are there no official CCCers or EFFers reading here and open for a
comment?



Greets

Am Samstag, den 15.09.2007, 21:38 -0400 schrieb Ringo Kamens:

[...]

 that's where we need to focus our attention. And perhaps FSF EU, EFF
 EU, or CCC is the place to start with that.
 Comrade Ringo Kamens

[...]

-- 
BlueStar88 [EMAIL PROTECTED]


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil


Re: Exclude nodes from certain countries

2007-09-15 Thread misc
On Sat, 15 Sep 2007 22:20:16 -0400, Ringo Kamens wrote:
 
 AFAIK tor connects to an entry guard which then connects to the exit
 node for you. This way, they can't take the logs from the exit node
 and go well.. the IP in question connected to you 20 seconds before
 the alleged connection was made, so that's who it probably was. This
 should be all explained in the docs somewhere.
 Comrade Ringo Kamens

But if I click on network map in Vidalia I see various Exit Nodes there.
So obviously Tor knows about them.

Also, to determine if a node is an entry or exit node, Tor has to exchange
some sort of traffic with it, right? Since there is no centralized place
where Tor can get a list of all entry nodes, wouldn't it have to poll all
the nodes to determine their status?



Re: Exclude nodes from certain countries

2007-09-15 Thread Scott Bennett
 On Sat, 15 Sep 2007 21:39:17 -0400 Ringo Kamens [EMAIL PROTECTED]
wrote:

I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens

 This is getting to be really irritatingly frequent on this list.  Grrr...

On 9/15/07, misc [EMAIL PROTECTED] wrote:
 On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:

  The best option is to run a squid server on localhost with a block by
  country filter. Then, route your tor client through it.
  Comrade Ringo Kamens
 

 I researched it more and everybody is saying squid goes between the browser
 and tor:

 Browser - Squid - Tor

 Please explain how can you route Tor through squid?




C:  And it makes it confusing regarding which points you're referring
to in the message to which you're responding in your message if
don't intersperse your comments into the earlier message.
A:  It's hard to follow the thread because you have to start
at the end and read the quotations in reverse order.
B: Why not?
   A: Basic list courtesy:  DON'T TOP-POST!


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: Exclude nodes from certain countries

2007-09-15 Thread Scott Bennett
 On  Sat, 15 Sep 2007 23:30:58 -0400 misc [EMAIL PROTECTED] wrote

On Sat, 15 Sep 2007 22:20:16 -0400, Ringo Kamens wrote:
 
 AFAIK tor connects to an entry guard which then connects to the exit
 node for you. This way, they can't take the logs from the exit node
 and go well.. the IP in question connected to you 20 seconds before
 the alleged connection was made, so that's who it probably was. This
 should be all explained in the docs somewhere.
 Comrade Ringo Kamens

But if I click on network map in Vidalia I see various Exit Nodes there.
So obviously Tor knows about them.

Also, to determine if a node is an entry or exit node, Tor has to exchange
some sort of traffic with it, right? Since there is no centralized place
where Tor can get a list of all entry nodes, wouldn't it have to poll all
the nodes to determine their status?

 Please read the tor documentation.  If you think you've already done
that, please go back and read it again.  Once you understand the functions
of the directory authorities and the directory mirrors, take a few minutes
to browse through the files that tor maintains on your computer.  Note
especially the contents of the files named cached-routers and
cached-routers.new, and also the status document files in the cached-status/
subdirectory.  All should be clear to you after you do those basic things.
 Note that this is a user safety issue:  one should *not* use tor
without having gained first a minimal understanding of what tor is doing
and what it is not doing.  Without that understanding, a user is in grave
danger of assuming his/her anonymmity is being maintained when, in fact,
it may not be.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


RE: Exclude nodes from certain countries

2007-09-15 Thread Wesley Kenzie
On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:

 www.pickaproxy.com

 So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In 
 other words users do not have any protection from your server.

 If you have not been approached by N$A/C1A/echel0n/etc yet, it will happen
sooner than you think.
 
 Do you realize that fairly soon you will have a choice of various
unpleasant consequences versus obediently logging
 everything that goes through your server and submitting the logs to proper
channels?
 
 That is, if you don't work there already :(  Do you, Wesley? This smells
to me like a honeypot...
 

We are just responding to customer demand. Hundreds of our showmyip.com
users have asked for exactly this so we are working to make this
functionality available.  We will show users how to setup and use stunnel to
encrypt their connections to us.  But this is not intended to be only an
anonymous proxy service, but rather a geospoofing service that piggybacks on
some of Tor's functionality.  I am expecting that the most nefarious of Tor
users will avoid us, and personally I'll be glad of it.

. . .
Wesley





Re: Exclude nodes from certain countries

2007-09-15 Thread misc
On Sat, 15 Sep 2007 23:17:14 -0500 (CDT), Scott Bennett wrote:

  Please read the tor documentation.  If you think you've already done
 that, please go back and read it again.  

That brings back the pain of reading it the first time :)

I must admit I gave up after first few pages. I found it was too technical
and overwhelming, even though I'm not a computer novice.

 Once you understand the functions
 of the directory authorities and the directory mirrors, take a few minutes
 to browse through the files that tor maintains on your computer.  Note
 especially the contents of the files named cached-routers and
 cached-routers.new, and also the status document files in the cached-status/
 subdirectory.  All should be clear to you after you do those basic things.
  Note that this is a user safety issue:  one should *not* use tor
 without having gained first a minimal understanding of what tor is doing
 and what it is not doing.  Without that understanding, a user is in grave
 danger of assuming his/her anonymmity is being maintained when, in fact,
 it may not be.

Now that you pointed me to specific things to research, it's a bit easier
and it's a place to start.

Is there some sort of in-a-nutshell documentation without excessive
technicalities that you can recommend?



Re: I break the silence: My arrest

2007-09-15 Thread Martin Senftleben
Am Sonntag, 16. September 2007 02:19 schrieb Alexander W. Janssen:
 On 9/16/07, Ringo Kamens [EMAIL PROTECTED] wrote:
  If you set up a paypal account I would be willing to donate on a
  case-by-case basis (in this case, it would be to help with your
  legal fees). I think even if you don't need help with legal fees
  by receiving donations from all across the world it sends the
  message to German authorities that harassing and attacking tor
  node operators is not acceptable. Also, being able to mail in
  money would also be nice ; )

 Well. There's an EFF Europe now and it has a coordinator, Erik
 Josefsson, who's in cahrge with it. Maybe we should contact him and
 let all the funds ran over the european EFF?

 Erik, you're listening? Is there any possiblity to create a legal
 fund?

 (Problem is: At leat german organisations can't accept donations
 tax-free from foreign countries. Also I'd like to see someone
 official in charge rather than some person - like me, who is pretty
 much unkown and not trustworthy when it comes to money.)

I (a German) am particularly reluctant to use PayPal. Recently, c't (a 
German computer magazine) published a series of incidents which 
shattered my faith in PayPal completely. Further, PayPal informs the 
police willingly about movements at their end - also abroad. Even 
though I have an account with PayPal in Germany, US-police obviously 
could obtain information from PayPal about me. 
Besides, small submissions (like 1 US$) swallow high fees, that 
doesn't make much sense.

I am currently into registering an association that was founded more 
than a hundred years ago - that is quite some work, but manageable. 
I find the thought to found an association quite intriguing, 
particularly for Germany, where the members of a registered 
association (eingetragener Verein) would be protected against legal 
prosecution. The association could act as contract partners with the 
ISPs, and as that run Tor nodes which are managed by its members. 

BTW, one such node has just been set up which is legally registered 
with an association in Germany and run by a previous Tor-node admin 
who has also been harassed by the police. But I don't think they will 
be setting up more nodes.

Martin
-- 
Dr. Martin Senftleben, Ph.D. (S.V.U.)
http://www.drmartinus.de/
http://www.daskirchenjahr.de/



pgpZnoJ8KXLBP.pgp
Description: PGP signature