[Slight OT] Re: Problems with XS4ALL in The Netherlands

2008-05-06 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Tue, May 6, 2008 at 7:54 PM, Tom Hek <[EMAIL PROTECTED]
> wrote:
> 
> Hello fellow Tor relay operators,
> 
> Six days ago XS4ALL shut down the DSL connection of a friend of mine who
> was running a Tor exit relay on this DSL connection (relay nickname
> ILiekMudkipz).
(snip)

Aw, too bad. I liek his relay name. =;o)

- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=dI1l
-END PGP SIGNATURE-


Re: Spoofing location - possible?

2008-05-06 Thread Geoffrey Goodell
On Tue, May 06, 2008 at 02:08:48PM -0400, [EMAIL PROTECTED] wrote:
> @Geoff - I take it you are the same Goodell as in the "Blossom" link in  
> the TOR FAQ? I tried googling"Perspective Access Network" - 11 hits  
> including some references to Blossom and a PDF of yours (?). Is the  
> Vidalia "pipeline" you mentioned this?

The Vidalia work is not the same as Blossom, but it addresses the aspect
of Blossom that (I think) you are interested to use.

Perhaps Matt Edman and Camilo Viecco can explain more.

Geoff


Re: Spoofing location - possible?

2008-05-06 Thread buralex
 Wesley Kenzie <[EMAIL PROTECTED]> said on May 06, 2008 13:32 -0400 (in 
part):

Alec, we have setup pickaproxy.com specifically for this purpose - to
geospoof your location and to eliminate the need to install and 
maintain Tor
and Vidalia. 
But then I would have missed the fun of playing around with Tor and 
Vidalia and torrc and all the other good stuff I've been doing for the 
last 5 or 6 hours :-)

Check it out. Essentially we run (at present) a bunch of Tor
clients on our server that have strict exit nodes for a specific 
country, so

you don't lose your geolocation when the exit nodes get changed every 10
minutes. 
I configured a new us.pickaproxy.com:8125 in FoxyProxy. At first I was 
getting timeouts on everything but unticking [Socks proxy?] and then 
setting it "use Proxy for all URL's" was able to get it used. (I think)

We keep these refreshed every couple hours to make sure they work,
we only use fast nodes, and we make sure that strict entry nodes are also
used from a completely different country and continent to help mitigate
against privacy monitoring risks. You have the option of using stunnel to
encrypt your connection to our server as well.
AFAICT - the manual solution (loading torrc with selected nicknames from 
torstatus.kgprog.com ) is equivalent to 
using pickaproxy so long as I am only interested in US sites - correct? 
If for some reason I want to spoof as UK then pickaproxy would be much 
easier than getting fresh exit nodes from above, identifying the good 
ones, exiting TOR, reloading torrc  Given enough time and need I 
think I could probably cobble together a batch script which could take 
down TOR (is that  necessary(?) or can a reload be triggered on the 
fly), search the torstatus csv file for desired country 
code/speed/upload days and rebuild torrc "ExitNodes" line. Better would 
be (I guess) to have a batch job that would build (say) torrc-us, 
torrc-uk, torrc-fr once a day so they can be easily copied to torrc (the 
live one) as desired.


Question: Your right sidebar says "We ask that you limit your use to 1 
hour per day. We take down and restart all of these proxy services every 
few hours". So turning on Pandora and letting it play all day in the 
background is something you would prefer I avoid?


As one Canuck to another - any suggestions for "neat" sites requiring 
geospoofing outside the US and not open to Canadians?


Regards ... Alec -- buralex-gmail
--



Re: Problems with XS4ALL in The Netherlands

2008-05-06 Thread Nils Vogels
Hi list,

Unfortunately, I have the same experience, except for the threatning of
terminating the account.

This seems somewhat strange, since 'dizum', the new v3 authority, is run
within the XS4All network (or at least has an xs4all hostname)

Kind regards,

Nils

On Tue, May 6, 2008 at 7:54 PM, Tom Hek <[EMAIL PROTECTED]> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hello fellow Tor relay operators,
>
> Six days ago XS4ALL shut down the DSL connection of a friend of mine who
> was running a Tor exit relay on this DSL connection (relay nickname
> ILiekMudkipz). They did this because they thought there was a trojan
> running on this system.
>
> This isn't the first time XS4ALL did this, but this time they threatened
> him with terminating his DSL account if you would run a Tor relay again.
> After making the promise that he wouldn't run a Tor exit again on this
> DSL connection, they reconnected him. He forwarded the e-mail where they
> threathened him with terminating his account but it's in Dutch. If
> anyone wants to read it, please send me a mail.
>
> This is a warning for all Dutch Tor relay operators who run a Tor exit
> relay on their XS4ALL DSL. XS4ALL doesn't like Tor. I'm kinda shocked of
> coming to conclusion that one of the most liberal ISP's in the
> Netherlands, who fights for human rights on the Internet like privacy
> and unfiltered access, doesn't like Tor and even punishes exit relay
> operators for running a relay.
>
> Tom Hek
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.8 (Darwin)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkggm2IACgkQStmJ9+mkUHMuVwCfU12cSgZUC1u8i3kMCbPltPOI
> t2sAnRwVyvkO2PqDp0AMFmEvFjUNXsKB
> =KvHq
> -END PGP SIGNATURE-
>



-- 
Simple guidelines to happiness:
Work like you don't need the money,
Love like your heart has never been broken and
Dance like no one can see you.


Re: exit nodes earn money?

2008-05-06 Thread H D Moore

Just inject google ads into all response pages! 


Folks who run an exit node behind a "bad" ISP are already doing this 
(whether they know it or not). See the following article:
http://www.pcworld.com/businesscenter/article/144682/isps_meddled_with_their_customers_web_traffic_study_finds.html

On Tuesday 06 May 2008, Wesley Kenzie wrote:
> With regards to the pickaproxy.com service we are setting up, I am
> interested in feedback from current Tor users and developers on the
> possibility of sharing earned subscription revenues with both the Tor
> project and exit node operators.  There are costs associated with
> operating our service and setting up a series of domains and servers to
> run it, and there are values that can be added to the basic Tor system
> that subscribers may be prepared to pay for.




exit nodes earn money?

2008-05-06 Thread Wesley Kenzie
With regards to the pickaproxy.com service we are setting up, I am
interested in feedback from current Tor users and developers on the
possibility of sharing earned subscription revenues with both the Tor
project and exit node operators.  There are costs associated with operating
our service and setting up a series of domains and servers to run it, and
there are values that can be added to the basic Tor system that subscribers
may be prepared to pay for.
 
I am thinking that earning some money might offset some of the risks
associated with enabling an exit node for the benefit of all. Has this been
discussed or considered?  Are there known issues in liability or law that
come into play if participation is not simply voluntary and altruistic?
 
The logistics of making payments and transparency and privacy and auditing
all would have to be addressed, of course, and suggestions are welcome.
 
. . . . .
Wesley
<>

Re: Spoofing location - possible?

2008-05-06 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

[EMAIL PROTECTED] wrote:
(much snippage)
> guess what - it works! I've been happily listening to "stations" I set
> up on Pandora 16 months ago before they blacked out everything outside
> the US for the last 4 hours and even watched two clips from Saturday
> Night Live. Life is GOOD :-)
> 
> Is this usage "OK" or am I abusing the spirit of TOR?
(snip)

1.) Tor seems to have clever uses besides anonymity; I've used it to
spoof geolocation myself, sometimes.

2.) While piping large amounts of data through Tor is generally frowned
upon, that viewpoint is generally pointed towards P2P (like BitTorrent
[peer traffic proxy, not just tracker], Gnutella, etc.). It doesn't bug
me, but I'm just one of many.


- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=/WpP
-END PGP SIGNATURE-


Re: Spoofing location - possible?

2008-05-06 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Yes, you can spoof geolocation with Tor. You just need to pin your exit
node to one in the area you'd like.

1. Dig through a Tor directory to find a suitable exit node.

2. Put something like this in your torrc:

ExitNodes insert-one-or-two-nodes-in-the-country-you-need-here
StrictExitNodes 1

- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=imkS
-END PGP SIGNATURE-


Re: Spoofing location - possible?

2008-05-06 Thread buralex
 Robert Hogan <[EMAIL PROTECTED]> said on May 06, 2008 13:54 -0400 
(in part):

Fortunately, there is a project in the Vidalia project pipeline to build
> perspective choices (such as choosing the country in which you want your
> exit node to reside).  Matt Edman and Camilo Viecco know more about
> this.
>
> Geoff



Not strictly true, TorK provides exactly this option under the 'Citizen Of..' 
toolbar button.


The snag is that TorK is linux-only at this point.
Thanks Robert - yes that looks exactly like what I was after. Almost, 
but not quite enough, to make me leave my Microsoft comfort zone and 
venture into Linux, dual booting and a whole mess of technology I've 
been able to avoid up to now. :-\  
Especially since the find fast US nodes approach seems to work well 
(enough).


Regards ... Alec -- buralex-gmail
--



Re: Spoofing location - possible?

2008-05-06 Thread buralex
 Geoffrey Goodell <[EMAIL PROTECTED]> said on May 06, 2008 8:40 
-0400 (in part):
me: >I came to TOR looking not so much for the ability to surf anonymously  
> but to convince my end target that I'm from a particular country.  
> Primarily to allow use of streaming media (radio and video) from sites  
> that restrict access to those from the United States.



What you are looking for is a  -- an overlay
network that allows you to choose the perspective from which you want to
access Internet services.

Tor allows controllers such as Vidalia to determine exactly how circuits
are built and which TCP streams are attached.  However, to our knowledge
nothing that gives you what you want in a useful way actually exists at
this point.

Fortunately, there is a project in the Vidalia project pipeline to build
perspective choices (such as choosing the country in which you want your
exit node to reside).  Matt Edman and Camilo Viecco know more about
this.
@Geoff - I take it you are the same Goodell as in the "Blossom" link in 
the TOR FAQ? I tried googling"Perspective Access Network" - 11 hits 
including some references to Blossom and a PDF of yours (?). Is the 
Vidalia "pipeline" you mentioned this?
{7} Pending Enhancements (25 matches) View a list of enhancements 
planned for future versions of Vidalia. 
http://trac.vidalia-project.net/report/7
I don't recognize anything there as on point? Is there somewhere I can 
"lurk" to follow the progress of this project?


@Scott:

 Yes.  Pick some U.S.-based exit nodes, and use the .exit notation you
referred to above.  It means choosing your exits by hand, rather than
letting tor do that, but it will get you to the exit you want, provided
that exit is running and reachable from your location.
I downloaded 
http://torstatus.kgprog.com/ip_list_all.php/Tor_ip_list_ALL.csv hacked 
about with Excel and found 62 "nicknames" in US, bandwidth >= 100 KBS 
and uptime-days >= 10 and then added these two lines to torrc:

ExitNodes sneaker,croeso,bettyboop,..., 59 more
StrictExitNodes 1
guess what - it works! I've been happily listening to "stations" I set 
up on Pandora 16 months ago before they blacked out everything outside 
the US for the last 4 hours and even watched two clips from Saturday 
Night Live. Life is GOOD :-)


Is this usage "OK" or am I abusing the spirit of TOR?

One new question: I found a number of "what is my ip" sites and all of 
them agree that my URL originates in the US except for: 
http://www.ip2location.com/ which reports my true location in CANADA, 
ONTARIO, AURORA. I really don't mind but wonder if they've done 
something "special" the others haven't? If I cared enough, would this be 
where I start using Privoxy and/or other techniques described in the 
TOR-FAQ?


Regards ... Alec -- buralex-gmail
--



Problems with XS4ALL in The Netherlands

2008-05-06 Thread Tom Hek
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello fellow Tor relay operators,

Six days ago XS4ALL shut down the DSL connection of a friend of mine who
was running a Tor exit relay on this DSL connection (relay nickname
ILiekMudkipz). They did this because they thought there was a trojan
running on this system.

This isn't the first time XS4ALL did this, but this time they threatened
him with terminating his DSL account if you would run a Tor relay again.
After making the promise that he wouldn't run a Tor exit again on this
DSL connection, they reconnected him. He forwarded the e-mail where they
threathened him with terminating his account but it's in Dutch. If
anyone wants to read it, please send me a mail.

This is a warning for all Dutch Tor relay operators who run a Tor exit
relay on their XS4ALL DSL. XS4ALL doesn't like Tor. I'm kinda shocked of
coming to conclusion that one of the most liberal ISP's in the
Netherlands, who fights for human rights on the Internet like privacy
and unfiltered access, doesn't like Tor and even punishes exit relay
operators for running a relay.

Tom Hek
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkggm2IACgkQStmJ9+mkUHMuVwCfU12cSgZUC1u8i3kMCbPltPOI
t2sAnRwVyvkO2PqDp0AMFmEvFjUNXsKB
=KvHq
-END PGP SIGNATURE-


Re: Spoofing location - possible?

2008-05-06 Thread Robert Hogan
On Tuesday 06 May 2008 13:40:34 Geoffrey Goodell wrote:
> On Tue, May 06, 2008 at 07:04:38AM -0400, [EMAIL PROTECTED] wrote:
> >  Jamie McCarthy <[EMAIL PROTECTED]> said on May 05, 2008 12:38 -0400 (in
> >
> > part):
> >> Please forgive me for not doing more thorough research before
> >> emailing. I'm not part of the Tor community and not really
> >> interested in getting too into it. I'm just looking for some quick
> >> advice.
> >
> > I've done even less research than Jamie had for his question and I think
> > have less technical background than he but ...
> >
> > I came to TOR looking not so much for the ability to surf anonymously
> > but to convince my end target that I'm from a particular country.
> > Primarily to allow use of streaming media (radio and video) from sites
> > that restrict access to those from the United States.
>
> What you are looking for is a "Perspective Access Network" -- an overlay
> network that allows you to choose the perspective from which you want to
> access Internet services.
>
> Tor allows controllers such as Vidalia to determine exactly how circuits
> are built and which TCP streams are attached.  However, to our knowledge
> nothing that gives you what you want in a useful way actually exists at
> this point.
>
> Fortunately, there is a project in the Vidalia project pipeline to build
> perspective choices (such as choosing the country in which you want your
> exit node to reside).  Matt Edman and Camilo Viecco know more about
> this.
>
> Geoff

Not strictly true, TorK provides exactly this option under the 'Citizen Of..' 
toolbar button.

The snag is that TorK is linux-only at this point.


signature.asc
Description: This is a digitally signed message part.


Re: List of exit nodes wanted

2008-05-06 Thread Jacob Appelbaum
Jamie McCarthy wrote:
> These don't look like official URLs, so if they go dead in a year
> I guess I'll ask or-talk again.
> 
> This might be more efficient for my code than the DNSEL, so I might
> end up using it despite the false positives/negatives.
> 
> 

Hi there,

I'd really like to encourage you to use the DNSEL. I run
exitlist.torproject.org and I'd like to encourage you to use it. We
created it specifically just for people with the problem you have.

You can use a caching name server and you'll have a fast system once
you've done an initial lookup.

Regards,
Jacob Appelbaum


RE: Spoofing location - possible?

2008-05-06 Thread Wesley Kenzie
Alec, we have setup pickaproxy.com specifically for this purpose - to
geospoof your location and to eliminate the need to install and maintain Tor
and Vidalia.  Check it out.  Essentially we run (at present) a bunch of Tor
clients on our server that have strict exit nodes for a specific country, so
you don't lose your geolocation when the exit nodes get changed every 10
minutes.  We keep these refreshed every couple hours to make sure they work,
we only use fast nodes, and we make sure that strict entry nodes are also
used from a completely different country and continent to help mitigate
against privacy monitoring risks.  You have the option of using stunnel to
encrypt your connection to our server as well.

Wesley

> -Original Message-
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED]
> Sent: May 6, 2008 4:05 AM
> To: or-talk@freehaven.net
> Subject: Spoofing location - possible?
> 
> 
>   Jamie McCarthy <[EMAIL PROTECTED]> said on May 05, 2008 12:38 -0400 
> (in part):
> > Please forgive me for not doing more thorough research before 
> > emailing. I'm not part of the Tor community and not really 
> interested 
> > in getting too into it. I'm just looking for some quick advice.
> I've done even less research than Jamie had for his question 
> and I think 
> have less technical background than he but ...
> 
> I came to TOR looking not so much for the ability to surf anonymously 
> but to convince my end target that I'm from a particular country. 
> Primarily to allow use of streaming media (radio and video) 
> from sites 
> that restrict access to those from the United States.
> 
> I set up TOR and verified using http://torcheck.xenobite.eu/ 
> that when 
> using TOR I was usually identified as coming from a different country 
> than my location (CANADA). From my limited understanding I 
> would need a 
> means to request/require that my exit node be in a particular country 
> (ie. USA)
> 
> In the TheOnionRouter/TorFAQ I found these links that seem 
> somewhat on 
> point: 
> https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Comp
> arisonCommercialOneHop 
> and 
> https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#Comp
> arisonProxyAggregators 
> 
> 
> so ... is what I'm looking for possible?
> and assuming it is ... is there any prospect that TOR would 
> be able to 
> deliver enough throughput for effective streaming?
> 
> ANSWER: YES!! (google video works) so  did http://www.pandora.com/ 
> (streaming radio - not available non-US locations) but only briefly. 
> Maybe I was temporarily using a US-exit node? Attempting to get 
> streaming US television from big three www.cbs.com, www.abc.com and 
> www.nbc.com all failed with error messages about US-locations 
> only. (I 
> was able to get one "deleted scene" from NBC but when I tried 
> the next 
> one  got the "you can't watch this from where you are" message)
> 
> Now that I've verified (I think) that speed is fine, is there 
> any way to 
> request an exit point from a particular country?
> 
> oops ... almost missed this down at the bottom - 
> http://security.ngoinabox.org/Documentation/Misc/tor.eff.org/T
orFAQ.html#Blossom 
referred to near the top in
http://security.ngoinabox.org/Documentation/Misc/tor.eff.org/TorFAQ.html#Cho
oseEntryExit 
which says:
> If you want to choose the exit node for a specific request, you can
> give the hostname as hostname.nickname.exit (eg.  
> http://cnn.com.myfavoritetornode.exit). This will work fine if you're 
> using Privoxy. You can also install
> Blossom, which is a client-side Tor controller that lets you specify 
> what country you want to exit from when accessing a given resource.
but the link to Blossom: http://afs.eecs.harvard.edu/~goodell/blossom/ 
gives a 404 and according to the internet archive 
http://web.archive.org/web/*/http://afs.eecs.harvard.edu/~goodell/blossom/ 
was last available "live" on Jun 01, 2007. Quick read there seems to say 
that it used a Python script and depended on some additional web pages:
> Implementation
>
> Our implementation of Blossom uses the onion routing network Tor as a
> substrate and consists of the following components:
>
> * Blossom itself, written in Python.
> * A comprehensive web page providing the status of nodes in the
> Blossom Network, including the address, capacity, operating system, 
> and exit policy of each Blossom forwarder. [We also have a web page 
> providing the status of nodes in the Tor Network.]
> * edgeproxy, an HTTP proxy that provides a very basic Blossom 
> functionality to web browsers; this daemon relays traffic between a 
> web browser and another proxy such as Privoxy.
> * The Blossom User Interface, which provides an intuitive way to 
> view web pages from the perspective of specified nodes in the Tor network.
>
> We also have some experimental results.
so  is there any way for a non-technical Windows XP user to 
accomplish my goal?

Regards ... Alec -- bura

Re: List of exit nodes wanted

2008-05-06 Thread Jamie McCarthy
[EMAIL PROTECTED] (Olaf Selke) writes:

> you can obtain the list in plain txt format updated every 5
> minutes from Tor Network Status sites located in
> 
> the US
> http://torstatus.kgprog.com/ip_list_exit.php
> 
> or
> 
> the Old Europe
> http://torstatus.blutmagie.de/ip_list_exit.php

Thanks, Olaf.  I guess those are supposed to be the same list, with
one mirroring the other, but I've spot-checked them this morning
and they seem to be out of sync, never quite agreeing with each
other.

These don't look like official URLs, so if they go dead in a year
I guess I'll ask or-talk again.

This might be more efficient for my code than the DNSEL, so I might
end up using it despite the false positives/negatives.


[EMAIL PROTECTED] (coderman) writes:

> use the Tor DNSEL implementation.  it is up to date and easy to
> integrate:
> 
> http://wiki.noreply.org/noreply/TheOnionRouter/TorDNSExitList

That looks useful, I may write a CPAN module based on that sample
code.  Plus it looks like an official project, so its URL is more
likely to stick around.  Thanks!

If whoever runs that DNS server is reading this -- my website may
be hitting your server a lot (10K times a day).  Will that be a
problem?  At how many hits a day will you get mad at me if I don't
run a local cache?  :)
-- 
  Jamie McCarthy
 http://mccarthy.vg/
  [EMAIL PROTECTED]



xB Machine OS 0.9 Beta Released

2008-05-06 Thread Arrakis

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

xB Machine 0.9 Beta is now available for download.
For those of you unaware, it is the security hardened
next-gen anon OS. This package is ~400MB. The 4GB of
source code will be made available via torrent file
when the official version is released in a little bit.

Enjoy,
Steve Topletz

Download:

https://update.xerobank.com/beta/xBM0.9.zip
915A3960A5E3860D94F0300F3002A607

Added features since last release:

- - LiveCD and Bootable ISO, for CD/USB/HD usability.
- - From zero to GUI in 90 seconds.
- - Internalized QEMU and accelerator module
- - VMware detection and support
- - No login required
- - E17 Desktop with iBar
- - Includes xB Browser + generic xB Mail
- - Includes torrent client
- - Self-destruct
- - Compatible with Tor, XB 1.0, and XB 2.0 networks

Todo out of beta:

- - XB 2.0 automatic credentials DLer
- - WiFi support
- - Sound support
- - vmdisk/crypto drive support
- - crypto usb drive support
- - UI/icons/skinning

Usage:
To use this as a liveCD, execute xBMachine.exe.
To use as bootable, burn the ISO.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIIGo2YM+2mWxc4wkRAqRNAKC4WJSnpEWTQqwcOPTU6IxzXNHg+ACfaNr+
OnY7+5r9TWLVmoPfQc9oJD0=
=CRi2
-END PGP SIGNATURE-


Re: Spoofing location - possible?

2008-05-06 Thread Geoffrey Goodell
On Tue, May 06, 2008 at 07:04:38AM -0400, [EMAIL PROTECTED] wrote:
>  Jamie McCarthy <[EMAIL PROTECTED]> said on May 05, 2008 12:38 -0400 (in 
> part):
>> Please forgive me for not doing more thorough research before
>> emailing. I'm not part of the Tor community and not really
>> interested in getting too into it. I'm just looking for some quick
>> advice.
> I've done even less research than Jamie had for his question and I think  
> have less technical background than he but ...
>
> I came to TOR looking not so much for the ability to surf anonymously  
> but to convince my end target that I'm from a particular country.  
> Primarily to allow use of streaming media (radio and video) from sites  
> that restrict access to those from the United States.

What you are looking for is a "Perspective Access Network" -- an overlay
network that allows you to choose the perspective from which you want to
access Internet services.

Tor allows controllers such as Vidalia to determine exactly how circuits
are built and which TCP streams are attached.  However, to our knowledge
nothing that gives you what you want in a useful way actually exists at
this point.

Fortunately, there is a project in the Vidalia project pipeline to build
perspective choices (such as choosing the country in which you want your
exit node to reside).  Matt Edman and Camilo Viecco know more about
this.

Geoff



Re: Spoofing location - possible?

2008-05-06 Thread Scott Bennett
 On Tue, 06 May 2008 07:04:38 -0400 [EMAIL PROTECTED] wrote:
>  Jamie McCarthy <[EMAIL PROTECTED]> said on May 05, 2008 12:38 -0400 
>(in part):
>> Please forgive me for not doing more thorough research before
>> emailing. I'm not part of the Tor community and not really
>> interested in getting too into it. I'm just looking for some quick
>> advice.
>I've done even less research than Jamie had for his question and I think 
>have less technical background than he but ...
>
>I came to TOR looking not so much for the ability to surf anonymously 
>but to convince my end target that I'm from a particular country. 
>Primarily to allow use of streaming media (radio and video) from sites 
>that restrict access to those from the United States.
>
>I set up TOR and verified using http://torcheck.xenobite.eu/ that when 
>using TOR I was usually identified as coming from a different country 
>than my location (CANADA). From my limited understanding I would need a 
>means to request/require that my exit node be in a particular country 
>(ie. USA)
>
>In the TheOnionRouter/TorFAQ I found these links that seem somewhat on 
>point:
>https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ComparisonCommercialOneHop
> 
>and
>https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ComparisonProxyAggregators
> 
>
>
>so ... is what I'm looking for possible?
>and assuming it is ... is there any prospect that TOR would be able to 
>deliver enough throughput for effective streaming?

 This will be highly dependent upon a) the speed of each circuit you
get and b) how long the file being streamed is, relative to how long the
circuit remains operational.  If you're trying to get long files by HTTP
or HTTPS, it helps to add ports 80 and 443 to LongLivedPorts in torrc.
That reduces the (admittedly still huge) number of potential paths that
your client may choose from, but also reduces the likelihood that a router
along the path you're using will go down while you're using that path.
>
>ANSWER: YES!! (google video works) so  did http://www.pandora.com/ 
>(streaming radio - not available non-US locations) but only briefly. 
>Maybe I was temporarily using a US-exit node? Attempting to get 

 Apparently.

>streaming US television from big three www.cbs.com, www.abc.com and 
>www.nbc.com all failed with error messages about US-locations only. (I 
>was able to get one "deleted scene" from NBC but when I tried the next 
>one  got the "you can't watch this from where you are" message)
>
>Now that I've verified (I think) that speed is fine, is there any way to 
>request an exit point from a particular country?
>
>oops ... almost missed this down at the bottom -
>http://security.ngoinabox.org/Documentation/Misc/tor.eff.org/TorFAQ.html#Blossom
> 
>referred to near the top in
>http://security.ngoinabox.org/Documentation/Misc/tor.eff.org/TorFAQ.html#ChooseEntryExit
> 
>which says:
>> If you want to choose the exit node for a specific request, you can 
>> give the hostname as hostname.nickname.exit (eg.  
>> http://cnn.com.myfavoritetornode.exit). This will work fine if you're 
>> using Privoxy. You can also install
>> Blossom, which is a client-side Tor controller that lets you specify 
>> what country you want to exit from when accessing a given resource.
>but the link to Blossom: http://afs.eecs.harvard.edu/~goodell/blossom/ 
>gives a 404 and according to the internet archive 
>http://web.archive.org/web/*/http://afs.eecs.harvard.edu/~goodell/blossom/ 
>was last available "live" on Jun 01, 2007. Quick read there seems to say 

>> [Blossom info deleted  --SB]

>so  is there any way for a non-technical Windows XP user to 
>accomplish my goal?
>
 Yes.  Pick some U.S.-based exit nodes, and use the .exit notation you
referred to above.  It means choosing your exits by hand, rather than
letting tor do that, but it will get you to the exit you want, provided
that exit is running and reachable from your location.  If you're only
doing that when you want to get streaming video or audio, but you let tor
choose the paths for everything else, it shouldn't be that much of a hassle.
The U.S. has a large number of exits running at any given time, so you may
want to choose only exits with at least some fairly good bandwidth, say,
300 KB/sec or so.  In my experience, though, if the file is available for
download, it is much better to do that and then play the file locally than
it is to try to play it in streaming mode via tor.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock

Spoofing location - possible?

2008-05-06 Thread buralex
 Jamie McCarthy <[EMAIL PROTECTED]> said on May 05, 2008 12:38 -0400 
(in part):

Please forgive me for not doing more thorough research before
emailing. I'm not part of the Tor community and not really
interested in getting too into it. I'm just looking for some quick
advice.
I've done even less research than Jamie had for his question and I think 
have less technical background than he but ...


I came to TOR looking not so much for the ability to surf anonymously 
but to convince my end target that I'm from a particular country. 
Primarily to allow use of streaming media (radio and video) from sites 
that restrict access to those from the United States.


I set up TOR and verified using http://torcheck.xenobite.eu/ that when 
using TOR I was usually identified as coming from a different country 
than my location (CANADA). From my limited understanding I would need a 
means to request/require that my exit node be in a particular country 
(ie. USA)


In the TheOnionRouter/TorFAQ I found these links that seem somewhat on 
point:
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ComparisonCommercialOneHop 
and
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ComparisonProxyAggregators 



so ... is what I'm looking for possible?
and assuming it is ... is there any prospect that TOR would be able to 
deliver enough throughput for effective streaming?


ANSWER: YES!! (google video works) so  did http://www.pandora.com/ 
(streaming radio - not available non-US locations) but only briefly. 
Maybe I was temporarily using a US-exit node? Attempting to get 
streaming US television from big three www.cbs.com, www.abc.com and 
www.nbc.com all failed with error messages about US-locations only. (I 
was able to get one "deleted scene" from NBC but when I tried the next 
one  got the "you can't watch this from where you are" message)


Now that I've verified (I think) that speed is fine, is there any way to 
request an exit point from a particular country?


oops ... almost missed this down at the bottom -
http://security.ngoinabox.org/Documentation/Misc/tor.eff.org/TorFAQ.html#Blossom 
referred to near the top in
http://security.ngoinabox.org/Documentation/Misc/tor.eff.org/TorFAQ.html#ChooseEntryExit 
which says:
If you want to choose the exit node for a specific request, you can 
give the hostname as hostname.nickname.exit (eg.  
http://cnn.com.myfavoritetornode.exit). This will work fine if you're 
using Privoxy. You can also install
Blossom, which is a client-side Tor controller that lets you specify 
what country you want to exit from when accessing a given resource.
but the link to Blossom: http://afs.eecs.harvard.edu/~goodell/blossom/ 
gives a 404 and according to the internet archive 
http://web.archive.org/web/*/http://afs.eecs.harvard.edu/~goodell/blossom/ 
was last available "live" on Jun 01, 2007. Quick read there seems to say 
that it used a Python script and depended on some additional web pages:

Implementation

Our implementation of Blossom uses the onion routing network Tor as a 
substrate and consists of the following components:


* Blossom itself, written in Python.
* A comprehensive web page providing the status of nodes in the 
Blossom Network, including the address, capacity, operating system, 
and exit policy of each Blossom forwarder. [We also have a web page 
providing the status of nodes in the Tor Network.]
* edgeproxy, an HTTP proxy that provides a very basic Blossom 
functionality to web browsers; this daemon relays traffic between a 
web browser and another proxy such as Privoxy.
* The Blossom User Interface, which provides an intuitive way to 
view web pages from the perspective of specified nodes in the Tor network.


We also have some experimental results.
so  is there any way for a non-technical Windows XP user to 
accomplish my goal?


Regards ... Alec -- buralex-gmail
--