Re: Tor server for port 443

2008-05-22 Thread Mike Cardwell

Scott Bennett wrote:

While port 587 is the official standard port for email submission, it 
doesn't *require* the usage of SSL. GMail does however have this 
requirement.


Also, I'd still personally prefer to use port 465 over port 587 for mail 
submission when both are available, purely because when using port 465 
you negotitate SSL immediately, whilst with port 587 there is some plain 
text negotiation first which *could* accidently leak identifying 
information such as your hostname in the EHLO, to the Exit node.



 Now, if we keep 25 blocked, are we risking undoing the benefit from that
blockage by unblocking 587?  It turns out that I was rejecting exits for
port 465 and 587, so now I'm wondering whether it might be a Bad Thing to
accept exits to 587.  Also, the new allocation of 465 is for urd (URL
Rendezvous Directory for SSM).  Offhand, I don't know what SSM may be nor
whether accepting exits for this service would be okay.


Port 25 is used for both mail relay and mail submission, whilst ports 
587 and 465 are only used for mail submission. Mail submission over Tor 
isn't a problem, mail relay over Tor would allow it to be abused for 
spamming. There is nothing bad about opening up ports 465 and 587. I am 
also unfamiliar with SSM but I'd bet my left testicle that it's usage on 
the Internet is insignificant in comparison to smtps over port 465.


Mike


Re: GPG Public Keys

2008-05-22 Thread Nathaniel Dube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Thursday 22 May 2008 04:35:55 am Sebastian Hahn wrote:
 I'm still looking for a solution, and might switch to mutt when I have
 the time to set up my mail system properly.
One solution I might recommend is figuring out what you're doing different 
than every one else on the list who sign their email.  I've seen a hand full 
of people so far who sign their email to this list and kmail has no problem 
validating their signed messages.  It just seems to be yours.  I'm not trying 
to point fingers.  I'm just saying.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iD8DBQFINT/fvsn/sQCIOqQRAlexAJ9uuUXw9bLiGtGMxZc3QxhrlR9h+wCeMXkg
f0cs3ReFe3dSnJb7CA9uVn0=
=GxZU
-END PGP SIGNATURE-


unsubscribe

2008-05-22 Thread [EMAIL PROTECTED]
unsubscribe


Re: controller GETINFO ns/id/fingerprint s record

2008-05-22 Thread Nick Mathewson
On Wed, May 21, 2008 at 09:21:20PM -0400, BarkerJr wrote:
  What is the criteria for getting listed as an Exit node in the s record
  for the controller interface's GETINFO /ns/id/fingerprint?
 
 You need to have two of these three ports wide open: 80, 443, 6667.
 No, I don't think it's fair that you have to open unencrypted ports to
 be given the Exit badge.  But, yes, it's just a badge, and people will
 still use your exit even if you don't have the badge.

In particular, it's used to try to predict which nodes will have most
of their bandwidth used in being an exit, in order to avoid using up
their bandwidth with relay traffic.  See path-spec.txt.

yrs,
-- 
Nick


Re: a serious TOR adversary?

2008-05-22 Thread Nick Mathewson
On Wed, May 21, 2008 at 05:47:41PM -0500, Eugene Y. Vasserman wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA256
 
 Thus spake Bernardo Bacic, on 5/21/08 6:45 AM:
 | This link http://web.crypto.cs.sunysb.edu/spday/ contains a summary
 | description of a possible TOR threat.
 |
 | Does anyone have more details? opinions?
 |
 |
 | (apologies if this has been discussed before, i read the list only as
 | much as time permits)
 
 Although timing-based attacks have been demonstrated against
 non-timing-preserving anonymity networks, they have depended either on a
 global passive adversary or on the compromise of a substantial number of
 Tor nodes.
 
 Incorrect: Steven J. Murdoch. Hot or Not: Revealing Hidden Services by
 their Clock Skew; Nicholas Hopper, Eugene Y. Vasserman, and Eric
 Chan-Tin. How much anonymity does network latency leak?.
 (Full disclosure: I'm one of the authors of the second paper).

See also Locating Hidden Servers by Lasse O/velier and Paul Syverson,
which motivated Tor's guard node design.

yrs
-- 
Nick


RE: controller GETINFO ns/id/fingerprint s record

2008-05-22 Thread Wesley Kenzie
 
 On Wed, May 21, 2008 at 09:21:20PM -0400, BarkerJr wrote:
   What is the criteria for getting listed as an Exit node 
 in the s 
   record for the controller interface's GETINFO /ns/id/fingerprint?
  
  You need to have two of these three ports wide open: 80, 443, 6667. 
  No, I don't think it's fair that you have to open 
 unencrypted ports to 
  be given the Exit badge.  But, yes, it's just a badge, and 
 people will 
  still use your exit even if you don't have the badge.
 
 In particular, it's used to try to predict which nodes will 
 have most of their bandwidth used in being an exit, in order 
 to avoid using up their bandwidth with relay traffic.  See 
 path-spec.txt.
 
 yrs,
 -- 
 Nick
 

Thanks.  Anybody know the answer to my other question I posted yesterday?
where does the data originate from when the controller GETINFO command is
used?  Does it just grab data out of the cached* files on disk?  Or poll one
of the directory authorities?  Or something else?

Wesley




Re: unsubscribe

2008-05-22 Thread Nathaniel Dube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Thursday 22 May 2008 05:16:15 am [EMAIL PROTECTED] wrote:
 unsubscribe
Email [EMAIL PROTECTED] with the body [unsubscribe or-talk]
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iD8DBQFINhKrvsn/sQCIOqQRAkNMAJ9lb+W2tMsnEhRSSmM6Rk7Bx0gZsACeOarA
LAmn431UVyDO3mt6t/Tutm4=
=WPSd
-END PGP SIGNATURE-


Default Exit Policy

2008-05-22 Thread Nathaniel Dube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I was looking at my server's stats at https://torstatus.kgprog.com and noticed 
that it has an exit policy that I didn't put in my config file.  For 
example...

reject 0.0.0.0/8:*
reject 169.254.0.0/16:*
reject 127.0.0.0/8:*
reject 192.168.0.0/16:*
reject 10.0.0.0/8:*
reject 172.16.0.0/12:*
reject 75.63.1.109:*
reject *:25
reject *:119
reject *:135-139
reject *:445
reject *:465
reject *:563
reject *:587
reject *:1214
reject *:4661-4666
reject *:6346-6429
reject *:6699
reject *:6881-6999
accept *:*

The only part of that I have in my config file is [accept *:*].  Is the rest 
some kind of defaults?  I noticed one of the defaults is [reject *:587] which 
I'm wondering why that would be in the defaults.  That ports is used for 
sending secure email.  Port 25 I can understand but 587?!  I use that port 
for gmail.  I have two gmail accounts.  One is this one which is tied to my 
real name.  The other isn't and I use with Thunderbird and the torbutton 
addon.  I've noticed that sometimes I can't send email and sometimes I can.  
It all depends on the current circuit.  After seeing the defaults exit policy 
I can see why I've been having the issues with my email.

The point of this email?!  I wish to understand the rational of having the 
defaults block ports used for secure encrypted protocoles.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iD8DBQFINk83vsn/sQCIOqQRAn8nAKCHtbwbJgzK5LWyKdVOY7YaxgV1uwCeN78A
WSa9RDSj0/XcXGlqy2KhUnA=
=PtV5
-END PGP SIGNATURE-


Router Flags

2008-05-22 Thread Nathaniel Dube
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Can someone explain what these router flags mean?  Some of them I have a good 
guess what they mean but I decided to list them all.

Authority
Bad Directory
Bad Exit
Exit
Fast
Guard
Hibernating
Named
Stable
Running
Valid
V2Dir
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.4-svn0 (GNU/Linux)

iD8DBQFINlChvsn/sQCIOqQRAm8uAJwMaMpUU/NopSqCFNPae8JKGr3OUwCZAQn/
aJwpk/meBTGzNeBoglnq/pM=
=ehyp
-END PGP SIGNATURE-


Re: Router Flags

2008-05-22 Thread Scott Bennett
 On Fri, 23 May 2008 00:05:37 -0500 Nathaniel Dube [EMAIL PROTECTED]
wrote:
Can someone explain what these router flags mean?  Some of them I have a good 
guess what they mean but I decided to list them all.

Authority
Bad Directory
Bad Exit
Exit
Fast
Guard
Hibernating
Named
Stable
Running
Valid
V2Dir

 These have been explained in the documentation available at the
www.torproject.org web site.  Have you read it?  If you have read it and
still do not understand the explanations, please let us know.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: set up relay

2008-05-22 Thread Alto
hi madjon and all
(1) i did a google search for how to check firewall ports address hosts file 
and up came a list of online port scanners
i chose pc flank
and the reslut below scared me, so i deleted the 4 ports i had manually opened 
below.
(2) i do not think i have a router ...

QUESTION
what do you think is the next step for me now?


  :9090 - Private OR Port
  :443   - Public OR Port
  :9091 - Private DIR Port
  :80 - Public DIR Port

PC Flank Results of Advanced Port Scanner

TCP CONNECT scanning (scanned in 3 seconds)
We have scanned your computer' ports used by the most widespread trojan horses. 
Here is the description of possible ports' statuses:

Stealthed (by a firewall) -Means that your computer is invisible to others on 
the Internet and protected by a firewall or other similiar software;
Closed (non-stealthed) - means that this port is closed, but your computer is 
visible to others on the Internet that can be potentially dangerous;
Open - Means that this port is ready to establish (or has already 
established) a connection with remote address. It also means that your computer 
is vulnerable to attacks and could have been already hacked or infected by a 
trojan/backdoor;

Port:   Status  Service Description

137 stealthed   NETBIOS Name ServiceNetBios is used to 
share files through your Network Neighborhood

138 stealthed   NETBIOS DatagramService NetBios is used 
to share files through your Network Neighborhood

21  closed  FTP File Transfer Protocol 
is used to transfer files between computers

23  closed  TELNET  Telnet is used to 
remotely create a shell (dos prompt)

135 closed  RPC Remote Procedure Call 
(RPC) is used in client/server applications based on MS Windows operating 
systems

139 closed  NETBIOS Session Service NetBios is used 
to share files through your Network Neighborhood

1080closed  SOCKS PROXY Socks Proxy is an 
internet proxy service

1243closed  SubSevenSubSeven is one of the 
most widespread trojans

3128closed  Masters Paradise and RingZero   Trojan 
horses

12345   closed  NetBus  NetBus is one of the 
most widespread trojans

12348   closed  BioNet  BioNet is one of the 
most widespread trojan

27374   closed  SubSevenSubSeven is one of the 
most widespread trojans

31337   closed  Back OrificeBack Orifice is one of 
the most widespread trojans

80  openHTTPHTTP web services 
publish web pages







(2) i do not have a router as far as i know ...

Quoting Jonathan Addington [EMAIL PROTECTED]:

 (1) Make sure your firewall isn't blocking said ports.
 (2) If you have a router make sure that said ports are being
 forward to the
 computer running Tor. This is usually easier if you use a static IP for that  
 computer.
 
 -madjon


--
Get a free email account with anti spam protection.
http://www.bluebottle.com/tag/2