Re: Questions about gathering information and statistics about the tor-network

2009-03-01 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Martin,

who maintains TorStatus these days? Is it you, Kasimir, both, even more
people...? :) Is there a mailing list, IRC channel, or some other way to
contact you rather than or-talk?

none wrote:
> I tried something similar recently. My approach was to monitor the
> infrastructure only, as this is public knowledge, and collect no
> informations on the clients whatsoever. I incorporated this monitoring
> already into TorStatus. Check out the SVN of TorStatus for the
> implementation and see the trunk version of TorStatus @
> http://trunk.torstatus.kgprog.com/ or
> http://trunk.torstatus.kgprog.com/network_history.php
> 
> It is not yet perfect. The timeslot for updating is too short, so the
> graphs look frayed. Short summary:
> 
> * collect the total number of running, running exits, running guards
>   and running fast servers and save them in an RRD over time.
> * On the top 11 countries these values are collected as well.

Looks like a great start to me!

Right now, I'm investigating options to display more statistics about
the Tor network: https://www.torproject.org/projects/metrics . TorStatus
seems to be a promising tool for that.

What would you say, how hard would it be to add router descriptors from
the past years to the database and make nice graphs from them? I have
written a Java application to feed descriptor archives into a PostgreSQL
database that could be adapted to MySQL and the TorStatus schema.

Also, how hard would it be to add more graphs displaying other
information than the numbers of servers with certain flags? For an
example what output I'm interested in, see the evaluation of the 2008
data: http://freehaven.net/~karsten/metrics/dirarch-2009-02-11.pdf

And finally, how extensible is TorStatus regarding other data than
descriptor archives? Given that there are other interesting data about
the Tor network than what relays advertise, would it be feasible to
extend the TorStatus database and add more graphs?

Thanks!
- --Karsten
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJqpo40M+WPffBEmURArFjAJ9leJhzSfSgJ/HyoxxCg659PyFOLQCg2xnF
DxWLJNwh5LVCDa5+xfm8W/g=
=Z5Mf
-END PGP SIGNATURE-


Re: Avoiding HTTPS pitfalls [was: Re: Moxie Marlinspike]

2009-03-01 Thread Jo
2009/2/24 coderman :
> On Mon, Feb 23, 2009 at 12:04 PM, Fran Litterio  wrote:
>> ...
>> This is ok, but I'd also like to be alerted when the certificate changes for
>> a site that I regularly visit.
>
> yes.
>
> Tyler's suggestion is a good one.  if you want the certs themselves
> authenticated you get to manage them yourself too.  remove all CA's by
> nuking libnssckbi.so and only add back those you've authenticated and
> trust.
>
> sadly, this is beyond the skills of most people. the PKI cartel lives
> another day... :P

Perspectives (http://www.cs.cmu.edu/~perspectives/) is another useful
tool.  You can change the quorum %, the length of time that quorum
must be acheived, and conditions under which Perspectives checks.
This isn't self-management, but does provide a additional certificate
check.

J


Re: Excluding some networks

2009-03-01 Thread leandro noferini
Marco Bonetti ha scritto:

> > I use the trasparent proxy through tor to connect for a user but I would
> > like to exclude some networks  (vpn with a 192.168.X.X address): I could
> > do?
> Tor should already ignore the "local" net address like yours by default,
> unless you explicity set ExitPolicyRejectPrivate to 0.

Yes, this is true.

I have a problem connecting but this is not due to tor, I think.


[...]


-- 
Ciao
leandro
Io non voglio sapere tutto, io voglio capire tutto


pgp46ZwOQS18I.pgp
Description: PGP signature