Re: Reducing java leakage in windows

2007-12-02 Thread Jacob Appelbaum
James Muir wrote:
> Arrakis wrote:
>> It appears that Java attacks for causing external IP data to be leaked
>> can be mitigated to some good degree. The upshot is that you can now run
>> Java applets that even when attempting to phone home directly (revealing
>> your IP), they are routed through the socks port and thus Tor or any
>> other socks speaking application. What we are doing is changing the
>> proxy settings of the Java Control Panel in windows.
> 
> Some time ago, I conducted several tests that demonstrated that Java
> Applets have the ability to disregard proxy settings in the Java Control
> and open direct non-proxied connections.  I do not think what you have
> described will work.
> 

I remember these tests. I can't seem to find a copy of the applets you
used. Are you willing to publish them? Or point me in the right
direction should I want to try implementing them?

Regards,
Jacob


Broken DNS

2007-12-02 Thread s bier

I followed a link here with the title Earthlink's "broken DNS affecting Tor 
nodes".
Maybe someone here could answer these questions about
broken DNS.
 
If you check the two IP's 216.154.211.104 and 65.74.151.220 
 
http://ip-lookup.net/neighborhood.popup.php?ip=216.154.211.104
 
http://ip-lookup.net/neighborhood.popup.php?ip=65.74.151.220
 
they show broken DNS.
 
If you check at Robtex
 
http://www.robtex.com/ip/216.154.211.104.html
 
http://www.robtex.com/ip/65.74.151.220.html
 
you find eorrors on both IP's.
 
The reverse of the host name static-65-74-151-220.ey01.engineyard.com was found 
one time now
220.151.74.65.static.ey01.engineyard.com as the host name.
 
I can use www.agoracom.co agoracom.com and
220.175.74.65.static.ey01.engineyard.com to sign in.
 
Before I could sign in at static-65-74-151-220.ey01.engineyard.com .
The DNS looks like it is still broken.
 
What problems could this cause for a client using this site ?
Have the DNS records been compromised because the
servers have been hacked into ?
 
regards,
 
_
Use fowl language with Chicktionary. Click here to start playing!
http://puzzles.sympatico.msn.ca/chicktionary/index.html?icid=htmlsig

Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-02 Thread Michael Schmidt
privacy back-up storage concept:

http://sourceforge.net/tracker/index.php?func=detail&aid=1833093&group_id=178712&atid=886242
http://forums.truecrypt.org/viewtopic.php?t=8000


2007/12/3, F. Fox <[EMAIL PROTECTED]>:
>
> -BEGIN PGP SIGNED MESSAGE-
>
>


Re: Reducing java leakage in windows

2007-12-02 Thread Arrakis
James,

  Do you have a copy of these tests? I'm definitely interested in seeing
it. However, I am NOT posing this as a solution to java issues, just
another defense layer. This effectively keeps non-malicious applets from
surreptitious leakage. I highly doubt a determined application would be
cornered in, but most seem to be. Regarding DNS, well that is again
another issue to be looked at, unfortunately.

Steve

James Muir wrote:
> Arrakis wrote:
>> It appears that Java attacks for causing external IP data to be leaked
>> can be mitigated to some good degree. The upshot is that you can now run
>> Java applets that even when attempting to phone home directly (revealing
>> your IP), they are routed through the socks port and thus Tor or any
>> other socks speaking application. What we are doing is changing the
>> proxy settings of the Java Control Panel in windows.
> 
> Some time ago, I conducted several tests that demonstrated that Java
> Applets have the ability to disregard proxy settings in the Java Control
> and open direct non-proxied connections.  I do not think what you have
> described will work.
> 
> -James
> 


Re: Reducing java leakage in windows

2007-12-02 Thread James Muir

Arrakis wrote:

It appears that Java attacks for causing external IP data to be leaked
can be mitigated to some good degree. The upshot is that you can now run
Java applets that even when attempting to phone home directly (revealing
your IP), they are routed through the socks port and thus Tor or any
other socks speaking application. What we are doing is changing the
proxy settings of the Java Control Panel in windows.


Some time ago, I conducted several tests that demonstrated that Java 
Applets have the ability to disregard proxy settings in the Java Control 
and open direct non-proxied connections.  I do not think what you have 
described will work.


-James


Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread David Hill
Ringo,
thanks.  that I think does the trick.
Tetsu

On Dec 2, 2007 3:33 PM, Ringo Kamens <[EMAIL PROTECTED]> wrote:
> See "4.9. Can I control what nodes I use for entry/exit?" at
> http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ
> Comrade Ringo Kamens
>
> On Dec 2, 2007 5:39 PM, David Hill <[EMAIL PROTECTED]> wrote:
> > That's fine... for this exercise I don't really care about the
> > anonymity.   Can you literally describe how to do that?  the UI has me
> > a bit confused on how to do this?
> >
> > thanks
> >
> > Tetsu
> >
> >
> >
> >
> > On Dec 2, 2007 2:27 PM, Ringo Kamens <[EMAIL PROTECTED]> wrote:
> > > You can specify which exit node to use, but this makes you less anonymous
> > > because tor can't randomize your circuits. The best way (AFAIK) is to 
> > > block
> > > all nodes except those in the particular country you want to use.
> > > Comrade Ring Kamens
> > >
> > >
> > >
> > > On Dec 2, 2007 5:22 PM, David Hill <[EMAIL PROTECTED]> wrote:
> > > > Hey Folks,
> > > >
> > > > New to Tor, but love the idea and the functionality.  Privacy is my
> > > > business right now, so I find this a great effort.
> > > >
> > > > I've installed Tor and all on Firefox, and it works great.  Problem is
> > > > I can't quite figure out how to control the country from  which I
> > > > emerge from the Tor Cloud.  I need this to be able to check how a
> > > > particular website treats me based on my in-country IP addresss. e.g.,
> > > > I want to go to Facebook through Tor and emerge with a UK IP address
> > > > to assess whether Facebook sees me as coming from a UP IP addy.
> > > >
> > > > Any help would be appreciated.
> > > >
> > > > thanks,
> > > > David
> > > >
> > >
> > >
> >
>


Re: storage privacy

2007-12-02 Thread Eugene Y. Vasserman
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

> I don't think much of the aforementioned physical "destruction" methods;
> I also agree in that full disk encryption is the best way to go, if at
> all possible.

(snip)

While I don't think much of physical destruction either, the "encrypted
storage" method might be problematic for legal reasons, at least in the
UK. If the police were to ask you to provide encryption keys (which they
are now allowed to do), and you have "lost" the keys, they can put you
away, even if the data on the drive would not have incriminated you.
Thoughts? Anyone from the UK?
- ---
Eugene
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iFcDBQFHU2g4b9W6r3tKSVIRCE5MAQDXT/eaibgtyT1ds8qw8VMCIqE659JMmERA
G1uxtlK+TQD/dj51Atik/PxQ+CHwjtYnaWVbLpREx7TTdPc12wNfFFA=
=KvAx
-END PGP SIGNATURE-


Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

coderman wrote:
> apologies in advance for veering this far off topic...
> 
> On Dec 2, 2007 2:25 PM, F. Fox <[EMAIL PROTECTED]> wrote:
>> [ strange, dangerous, and likely to fail methods for destroying drives ]
> 
> use full disk encryption, even the latest ubuntu supports this.
> 
> destroy the disk keys and you've got platters full of entropy.
> 
> anything else is just a bad idea.
> 
(snip)

I don't think much of the aforementioned physical "destruction" methods;
I also agree in that full disk encryption is the best way to go, if at
all possible.

However, given that a system has already been deployed without such
encryption, wouldn't secure overwriting be a reasonable way of
destroying such data?

It'd be slow, and maybe not effective against the most determined (and
well-funded) attackers - but at least it wouldn't be dangerous, weird,
and violent... =:oD

- --
F. Fox
CompTIA A+, Net+, Security+
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFHU2HfbgkxCAzYBCMRAj0dAJ92NHfJqZVVcK/u99gbWTo0jsSnFACeOSJW
EmV8OG+cGBSMlWBGXfqvh1M=
=hc2d
-END PGP SIGNATURE-


Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread Ringo Kamens
See "4.9. Can I control what nodes I use for entry/exit?" at
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ
Comrade Ringo Kamens
On Dec 2, 2007 5:39 PM, David Hill <[EMAIL PROTECTED]> wrote:
> That's fine... for this exercise I don't really care about the
> anonymity.   Can you literally describe how to do that?  the UI has me
> a bit confused on how to do this?
>
> thanks
>
> Tetsu
>
>
>
>
> On Dec 2, 2007 2:27 PM, Ringo Kamens <[EMAIL PROTECTED]> wrote:
> > You can specify which exit node to use, but this makes you less anonymous
> > because tor can't randomize your circuits. The best way (AFAIK) is to block
> > all nodes except those in the particular country you want to use.
> > Comrade Ring Kamens
> >
> >
> >
> > On Dec 2, 2007 5:22 PM, David Hill <[EMAIL PROTECTED]> wrote:
> > > Hey Folks,
> > >
> > > New to Tor, but love the idea and the functionality.  Privacy is my
> > > business right now, so I find this a great effort.
> > >
> > > I've installed Tor and all on Firefox, and it works great.  Problem is
> > > I can't quite figure out how to control the country from  which I
> > > emerge from the Tor Cloud.  I need this to be able to check how a
> > > particular website treats me based on my in-country IP addresss. e.g.,
> > > I want to go to Facebook through Tor and emerge with a UK IP address
> > > to assess whether Facebook sees me as coming from a UP IP addy.
> > >
> > > Any help would be appreciated.
> > >
> > > thanks,
> > > David
> > >
> >
> >
>


Re: javaprogram using tor

2007-12-02 Thread coderman
On Nov 1, 2007 2:02 PM, Frozen Flame <[EMAIL PROTECTED]> wrote:
> You can use a java socks api or use an external app, such as tsocks
> (Linux) to socksify your app without it even knowing about it.

my understanding is that doing DNS resolution via tsocks is spotty at
best since it forces the resolver library to use TCP which may not be
reliable.  it is better to have the application use socks 4a, socks 5
with names, or perhaps a transparent Tor proxy.

best regards,


Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-02 Thread Tom Hek

On Dec 2, 2007 2:25 PM, F. Fox <[EMAIL PROTECTED]> wrote:
[ strange, dangerous, and likely to fail methods for destroying  
drives ]


use full disk encryption, even the latest ubuntu supports this.


Last time I tried this with the Ubuntu 7.10 Alternate CD it didn't  
work. The installer crashes over and over.. With the latest debian  
testing netinstall cd no problems..




Re: javaprogram using tor

2007-12-02 Thread coderman
On Oct 28, 2007 12:36 PM, Juliusz Chroboczek <[EMAIL PROTECTED]> wrote:
> [ configuring SOCKS in java ]

you can also use the system and/or user level deployment properties
file to set the SOCKS proxy settings:
http://java.sun.com/j2se/1.5.0/docs/guide/deployment/deployment-guide/properties.html


> Note however that Java most probably implements SOCKS with IP
> addresses, and unless you take special precautions, you will suffer
> from DNS leaks.  Which may or may not be a problem for your application.

this is correct.  the only way to do this securely is via transparent Tor proxy.
(it may be possible to implement your own lookups through Tor via JNDI
naming service hooks, but this would require a significant effort and
still leave you vulnerable to third party jars and such...)

best regards,


Re: Win32 / netsh

2007-12-02 Thread coderman
On Nov 20, 2007 8:06 AM, chris misztur <[EMAIL PROTECTED]> wrote:
> ... I'm thinking that the 'v4tov4' port proxy is only for
> inbound connections...

hi chris,

this works the opposite way you'd need it to for the behavior you seek.

it is indeed for inbound connection relay only.

note that even if this could redirect outbound connections, you'd
still need to proxy DNS requests to avoid compromising your anonymity
through name resolution.

best regards,


Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-02 Thread coderman
apologies in advance for veering this far off topic...

On Dec 2, 2007 2:25 PM, F. Fox <[EMAIL PROTECTED]> wrote:
> [ strange, dangerous, and likely to fail methods for destroying drives ]

use full disk encryption, even the latest ubuntu supports this.

destroy the disk keys and you've got platters full of entropy.

anything else is just a bad idea.

see the Tor Operational Security wiki page for more not bad ideas:
http://wiki.noreply.org/noreply/TheOnionRouter/OperationalSecurity

best regards,


Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread David Hill
That's fine... for this exercise I don't really care about the
anonymity.   Can you literally describe how to do that?  the UI has me
a bit confused on how to do this?

thanks

Tetsu

On Dec 2, 2007 2:27 PM, Ringo Kamens <[EMAIL PROTECTED]> wrote:
> You can specify which exit node to use, but this makes you less anonymous
> because tor can't randomize your circuits. The best way (AFAIK) is to block
> all nodes except those in the particular country you want to use.
> Comrade Ring Kamens
>
>
>
> On Dec 2, 2007 5:22 PM, David Hill <[EMAIL PROTECTED]> wrote:
> > Hey Folks,
> >
> > New to Tor, but love the idea and the functionality.  Privacy is my
> > business right now, so I find this a great effort.
> >
> > I've installed Tor and all on Firefox, and it works great.  Problem is
> > I can't quite figure out how to control the country from  which I
> > emerge from the Tor Cloud.  I need this to be able to check how a
> > particular website treats me based on my in-country IP addresss. e.g.,
> > I want to go to Facebook through Tor and emerge with a UK IP address
> > to assess whether Facebook sees me as coming from a UP IP addy.
> >
> > Any help would be appreciated.
> >
> > thanks,
> > David
> >
>
>


Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread Ringo Kamens
You can specify which exit node to use, but this makes you less anonymous
because tor can't randomize your circuits. The best way (AFAIK) is to block
all nodes except those in the particular country you want to use.
Comrade Ring Kamens

On Dec 2, 2007 5:22 PM, David Hill <[EMAIL PROTECTED]> wrote:

> Hey Folks,
>
> New to Tor, but love the idea and the functionality.  Privacy is my
> business right now, so I find this a great effort.
>
> I've installed Tor and all on Firefox, and it works great.  Problem is
> I can't quite figure out how to control the country from  which I
> emerge from the Tor Cloud.  I need this to be able to check how a
> particular website treats me based on my in-country IP addresss. e.g.,
> I want to go to Facebook through Tor and emerge with a UK IP address
> to assess whether Facebook sees me as coming from a UP IP addy.
>
> Any help would be appreciated.
>
> thanks,
> David
>


Re: Nice quiet, private, anonymous life??

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Alexander W. Janssen wrote:
> [EMAIL PROTECTED] wrote:
>> If I was in your position I might consider putting some bulk
>> demagnetizers near my hard drives with a panic switch, with backups to a
>> secure unknown location. 
> 
> Now this is definitively a bizarre idea... :-)
> 
> That reminds me of the "nuke gateway"-function in the game Uplink[1].
(snip)

Although bizarre, this thread is not the first where I've heard of
non-electronic panic-button-triggered data destruction mechanisms.

Some I've heard of, at least purportedly:

* Magnetism;
* Incindieries (I can't spell that word worth crap);
* Microwaves (the "Firedrive");
* Explosives (the plastique idea from earlier - I don't recommend it).

I still think the best idea is a few scrubs of pseudorandom data, and
then a sledgehammer to disable the physical mechanism (if you want extra
security, and have no intentions of reusing the drive); of course, for
the ultra-paranoid, this method will require a while for the PR streams
to finish. =:oD

- --
F. Fox
CompTIA A+, Net+, Security+
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFHUzDObgkxCAzYBCMRAo/7AJ9j17R/zzQdzmO+GY1g/Yg7b48fxgCeKdGx
1Q+Asn6zHyb/Z2ujAz5zwVU=
=hAMe
-END PGP SIGNATURE-


Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread David Hill
Hey Folks,

New to Tor, but love the idea and the functionality.  Privacy is my
business right now, so I find this a great effort.

I've installed Tor and all on Firefox, and it works great.  Problem is
I can't quite figure out how to control the country from  which I
emerge from the Tor Cloud.  I need this to be able to check how a
particular website treats me based on my in-country IP addresss. e.g.,
I want to go to Facebook through Tor and emerge with a UK IP address
to assess whether Facebook sees me as coming from a UP IP addy.

Any help would be appreciated.

thanks,
David


Re: Nice quiet, private, anonymous life??

2007-12-02 Thread Alexander W. Janssen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[EMAIL PROTECTED] wrote:
> If I was in your position I might consider putting some bulk
> demagnetizers near my hard drives with a panic switch, with backups to a
> secure unknown location. 

Now this is definitively a bizarre idea... :-)

That reminds me of the "nuke gateway"-function in the game Uplink[1].

Alex.

[1] http://www.uplink.co.uk/
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)

iQCVAwUBR1MpERYlVVSQ3uFxAQLmXAP9FKqkC/3tqzYVgWK7DwqUlme+nOsMyVXw
kPjRjl/vbZAHC1MuRlMsakMP6caKladDpX0JH8nMcNfjmIcDbm7B5qDjmrw6UuVv
y+u9f8oNWth1Nv0w7Qty84cTABkrrs/68zwJnLwvUoZwNgBObIftUZcjDKHraazi
yHKZyQ51N34=
=yQ5u
-END PGP SIGNATURE-


Re: Nice quiet, private, anonymous life??

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Eugen Leitl wrote:
> On Sat, Dec 01, 2007 at 02:06:22PM -0700, [EMAIL PROTECTED] wrote:
> 
>> If I was in your position I might consider putting some bulk
>> demagnetizers near my hard drives with a panic switch, with backups to a
> 
> Doesn't work, you'd need too many Teslas. Plastique or thermite would work.
> Cryptographic filesystem would work, since you only would have to lose
> power for a couple seconds.
> 

It might be a bit late for buying and placing explosives or
incindieries. =:oD In any case, I'm not about to give advice on
explosives, etc. - I'm not anonymized from here, forgetting the fact
that it's a moot idea.

A cryptographic filesystem is a day late and a dollar short... however,
he might be able to start overwriting with something like Darik's Boot &
Nuke: http://dban.sourceforge.net

To finish would take forever, but IIRC, the Gutmann-style wipe starts
with a pseudorandom stream - and if even a single one of those were to
complete before they got the drive, they'd need to stick the thing in a
cleanroom to get anything (again, IIRC).

They don't always do that... software usually comes first. I guess it
depends on the value of the data.

If something really, really nasty got relayed through your node - like
an [alleged] "terrorist threat" or similar hogwash - they might use such
a method.

But, DBAN's a free, practical, and non-violent idea.

- --
F. Fox
CompTIA A+, Net+, Security+
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFHUyhabgkxCAzYBCMRAsRVAJ9qTRxiTe8iCT2ntp/4WQ6HST6hpgCfYFMD
3GFNNSinPPreEFdMUKfS2qQ=
=Z6VG
-END PGP SIGNATURE-


Re: [Political/Legal] Passing ideas on German Tor nodes

2007-12-02 Thread Alexander W. Janssen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

F. Fox wrote:
> However, let's suppose that we're in a time when German Tor nodes are
> now actively keeping logs of all connections. What would be the best way to:

As I already said in an earlier posting, German Tor nodes won't be
starting logging before 1/1/2009 - if they'll log at all - there's still
a pending lawsuit against the data retention law in the supreme court.

And I bet that there will be a lot civil disobedience when it comes to
logging.

> [... idea ...]
> So, what if a maximum of one German Tor node were allowed in a circuit?
> Would that achieve both numbered goals?

If that's the idea, than it should only be the middleman node.
Entry-node might be possible too, but only if you make sure that this
node is the only German node in the circuit.

> Given the logging, it might be wise to not allow the German node to be
> the exit node; I'm not sure about the entry guard.

Considering the pressure which piled up in the last couple of months in
Germany, running an exit-node in Germany is not encouraged anyway.

> I would think that a German middleman node would be safe, though, right?

If it's the only German node in the circuit: Possibly.

Alex.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)

iQCVAwUBR1Mn5BYlVVSQ3uFxAQK/fQQAqe496ityWEiTZovIazse0XpBusyV0G+8
Zn5mVkZpREl9J0PZ4uKFRB6ydwBZ1TJNFsMIbgHZhhGsJqstGBQBfR8U5gAI2FtS
kAEv62vTm8EPBOAUWx7UZKwuekmo2veQD0c5b/t77jaXUph067Qbdnh/7PnqQ7vn
ESTZOMavZis=
=i84f
-END PGP SIGNATURE-


[Political/Legal] Passing ideas on German Tor nodes

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Just a couple ideas I had, regarding the issue of German Tor nodes and
the upcoming data retention policies; keep in mind that my own knowledge
regarding the Tor network isn't all that deep, so these may be flawed.

However, let's suppose that we're in a time when German Tor nodes are
now actively keeping logs of all connections. What would be the best way to:

1.) Protect the anonymity of Tor users as much as possible, while
2.) Attempting to allow some way for German Tor nodes to contribute to
the overall capacity of the network.

If I read things right, there are two things - barring client
misconfigurations or other SNAFUs - that are likely to reveal the
identity of a client:

* An adversary owning all three Tor nodes in a circuit, in which case
the client is *definitely* screwed;
* An adversary owning the entry guard and exit node in a circuit, which
may allow an end-to-end attack.

So, what if a maximum of one German Tor node were allowed in a circuit?
Would that achieve both numbered goals?

Given the logging, it might be wise to not allow the German node to be
the exit node; I'm not sure about the entry guard.

I would think that a German middleman node would be safe, though, right?

- --
F. Fox
CompTIA A+, Net+, Security+
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFHUyYtbgkxCAzYBCMRAq+hAJ4rDJLsXT+L6EYDK+jms+skZhotrwCdExnx
3zO/PlzAaT+4+uJu4GWAWks=
=wJKO
-END PGP SIGNATURE-


German Privacy Foundation

2007-12-02 Thread Burkhard Schroeder
Hi,

I am the chairman of the German Privacy Foundation
(www.privacyfoundation.de). We run two tor-servers in germany. If you
have any questions about the GPF, ask me. (also:
[EMAIL PROTECTED])
Greetz from Berlin
Burks
-- 
GnuPG-Key: www.burks.de/burks.asc | ID: 92B46AB6 | Fingerprint: 5609
942A F50F 8FA9 F9C3 F355 CF9C 634A 92B4 6AB6


Re: Help me understand tor with SSL?

2007-12-02 Thread Juliusz Chroboczek
>> Firefox should in principle not use the DNS if
>> 
>>   network.proxy.socks_remote_dns
>> 
>> is set to true (in about:config).

> Hm, I'm not sure - I thought this option only works if you're using a
> SOCKS-proxy, e.g. connecting directly to the Tor-socks interface?
>
> Is that also true for http-style proxies?

You're correct, this is only true for direct connections to tor.

Juliusz


Re: Nice quiet, private, anonymous life??

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[EMAIL PROTECTED] wrote:
> Not a professional techie, since running an exit node this fall I am
> being habitually banned from Google, Charter has asked me to stop
> spamming, and now today the police are at my door looking for Tobias.
(snip)
> 
> Hope this post goes to list, can't find list post commands.
> 

It made it to the list. =:o)

In any case, I set my node up as "middleman" from the beginning. Given
that I'm just running from my home, I wouldn't have a whole lot of
backing to defend from legal or police troubles; running as a middleman
allows me to provide capacity to the network, while avoiding most of the
liability (potentially) carried by exit nodes.

As others have suggested, I strongly recommend trying "going middleman"
before leaving the network completely. Taking an occasional peek at my
Tor service via TCPView (shouldn't be a problem, since I'm only
connected to other nodes), you'd be surprised how much utilization I get
even as a middleman! =:oD Every little bit of bandwidth helps.

- --
F. Fox
CompTIA A+, Net+, Security+
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFHUxmLbgkxCAzYBCMRAkmKAKCOIqmLACMxAckS5UusOLF7fGgNHACgkVaK
doirLmxSDOzuFRlpId0nVSI=
=+7/B
-END PGP SIGNATURE-


[Politics/Legal] Re: German Tor Legal Fund

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Onion wrote:
> Alexander W. Janssen wrote:
(snip)
> 
>  (ignore at will)
> 
> First of all, I'm not fond of political discussions in tech groups,
> but in this specific case of an aid, that was developed not least for
> sociopolitical reasons, motivating statements can't be misplaced.
(snip)

Here's an idea: Perhaps we could voluntarily tag the subject lines of
sociopolitical/legal-type messages, so people who want to ignore or
filter them can.

My proposition is in the subject of this email.

- --
F. Fox
CompTIA A+, Net+, Security+
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iD8DBQFHUxcEbgkxCAzYBCMRAjjKAJ4/53vwclaanVlyXEkiOanctv2IewCfcOBz
v4waOhebilkXY/Y5SeOVkIU=
=83n4
-END PGP SIGNATURE-


Re: Reducing java leakage in windows

2007-12-02 Thread coderman
On Dec 2, 2007 11:02 AM, Arrakis <[EMAIL PROTECTED]> wrote:
> It appears that Java attacks for causing external IP data to be leaked
> can be mitigated to some good degree. The upshot is that you can now run
> Java applets that even when attempting to phone home directly (revealing
> your IP), they are routed through the socks port
> ... [ discussion of deployment.properties for socks setup ]

the last time i looked into this (over a year ago) the socks proxy
settings, either 4 or 5, still did name lookup external to the proxy
(not 4a nor 5 with names).  this means the same DNS resolution tricks
to leak your IP will work, even if the simpler "open a TCP sock to
eve" does not.

i think HD Moore's revealer used this as one of the tricks, so it
might be worth checking against that with an updated
deployment.properties to confirm.

if you really want to use java you should use it behind a transparent Tor proxy.

best regards,


Re: Help me understand tor with SSL?

2007-12-02 Thread Alexander W. Janssen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Juliusz Chroboczek wrote:
> Firefox should in principle not use the DNS if
> 
>   network.proxy.socks_remote_dns
> 
> is set to true (in about:config).

Hm, I'm not sure - I thought this option only works if you're using a
SOCKS-proxy, e.g. connecting directly to the Tor-socks interface?

Is that also true for http-style proxies?

> Juliusz

Alex.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)

iQCVAwUBR1MJExYlVVSQ3uFxAQKkpgQAoaO14Cdw+U9XcUKylFkUaT4c6PEoNlWr
G8DBZ8BwLtLw31I4mbNI5CwsGiqETG29c1zG0ydfXJHeHoPmCj9b8x7q3/sQpxQn
TgDWWlM2pNtx4EkczCQaprkbFjctu66dDk/pI2UYeosEvL26L0rRRqWt2NoAX6gg
sP+nszQAyxQ=
=gM35
-END PGP SIGNATURE-


Re: Insecurities in Privoxy Configurations - Details

2007-12-02 Thread Juliusz Chroboczek
> 1) Those of us who use polipo should pay attention too, and make sure
> to put
>   disableLocalInterface=true
> in our polipo config file. Otherwise a remote attacker can reconfigure
> our polipo out from underneath us, examine our cache to see where we've
> been browsing, etc.

FWIW, both the cache index and the list of recently accessed servers
are disabled by default.  Reconfiguring Polipo is enabled by default,
and I agree that it is a good idea to disable it, ass suggested by
Roger above.

I'm trying to put together all hints about running Polipo with Tor on

  http://www.pps.jussieu.fr/~jch/software/polipo/tor.html

Please send your additions to the [EMAIL PROTECTED]
mailing list.

Thanks,

Juliusz


Re: Help me understand tor with SSL?

2007-12-02 Thread Juliusz Chroboczek
>   Using privoxy is necessary because 
>   browsers leak your DNS requests when 
>   they use a SOCKS proxy directly,
>   which is bad for your anonymity. 

Firefox should in principle not use the DNS if

  network.proxy.socks_remote_dns

is set to true (in about:config).

>   Privoxy also removes certain 
>   dangerous headers from your web 
>   requests, and blocks obnoxious ad 
>   sites like Doubleclick.

This is better done in the browser, for quite a few reasons, including
the fact that there is no way a proxy can do that for SSL connections.

Juliusz


Reducing java leakage in windows

2007-12-02 Thread Arrakis
It appears that Java attacks for causing external IP data to be leaked
can be mitigated to some good degree. The upshot is that you can now run
Java applets that even when attempting to phone home directly (revealing
your IP), they are routed through the socks port and thus Tor or any
other socks speaking application. What we are doing is changing the
proxy settings of the Java Control Panel in windows. The following will
shortly be applied to xB Browser after testing, and I highly suggest it
for other proxy programs. Needs lots of testing of course, and I would
also like to know if Java applets can acquire the authority to modify
that file as well. May require administrative access, but I imagine
Vista will popup a priv escalation window. There are probably variations
in the directories and syntax if you are running JRE <1.4. A good
indicator of old versioning is to see if your shoes employ the use of
velcro, you have a pair of 'jams' in your closet, or you've found
yourself to be too legitimate to quit.

Regards,
Steve Topletz


-


1. Look for $APPDATA\Sun\Java\Deployment\deployment.properties
If there is no deployment.properties file there, try all administrative
usernames we can enumerate until we find the file. This is not a certianty.

2. Back up deployment.properties to a new file name.
3. Open it up
4. Read and store all lines beginning with "deployment.version"
5. Read and store all lines beginning with "deployment.javapi"
6. Close the file
7. Create a new file deployment.properties where the old one was.
8. Open the file
9. Insert the following lines

 #deployment.properties
 deployment.system.tray.icon=false
 deployment.browser.vm.iexplorer=false
 deployment.proxy.socks.host=localhost
 deployment.proxy.type=1
 deployment.proxy.same=true
 deployment.browser.vm.mozilla=false
 deployment.capture.mime.types=true
 deployment.proxy.socks.port=8080

(where port 8080 is your socks port. in Tor, use 9050 by default)

10. Write all previously stored lines from old opened file.
11. Close the new deployment.properties

Continue starting your proxy program
On program exit...

12. Delete the deployment.properties file we created.
13. Restore the deployment.properties file we backed up.