Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-27 Thread Moritz Bartl
Hi,

On 27.06.2010 04:17, Mondior Folimun wrote:
> I also allow 465 and 563. Those are used by authenticated SMTPS and
> NNTPS.
> There's also the chat ports: 1863 (MSN), 5190 (aim), 5050 (yahoo), 5222-
> 5223 (xmpp/gchat). Those haven't given me any problems either.

Thanks. I have added them to the exit policy.

--
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Help translate Vidalia info pages

2010-06-27 Thread Runa A. Sandvik
Hi everyone,

I have created a new project in the translation portal called "Vidalia
Help": https://translation.torproject.org/projects/vidaliahelp/. It
would be great to see these pages translated into more languages.

I have already added a few languages, such as Norwegian, German and
French.Please send an email to tor-translat...@torproject.org if your
language is missing.

Thanks,

-- 
Runa A. Sandvik
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-27 Thread Bill Weiss
Mondior Folimun(mfoli...@elitemail.org)@Sun, Jun 27, 2010 at 04:17:15AM +0200:
> On Wed, 23 Jun 2010 12:49 +0200, "Moritz Bartl" 
> wrote:
> > Hi,
> >
> > > Out of curiosity, what exit policy are you now using? Perhaps we
> > > want to standardize on a policy that is effective at reducing these
> > > complaints.
> >
> > At the moment, I allow ports 20-22,53,79-81,110,143,443,706,873,993,
> > 995,8008,8080,. Feel free to suggest others.
> 
> I also allow 465 and 563. Those are used by authenticated SMTPS and
> NNTPS.
> So far, I have not received any spam abuse complaints from them, after
> running a 10Mbit+ exit for the past 2-3 years (though I do occasionally
> get web spam abuse complaints).

Interestingly, I was contacted by the police at some university a couple
of years ago about abuse through my Tor node on port 587 (authenticated
SMTP).  After a ton of explaining what Tor was (at first they believed the
abuser to be a client of mine because his bits were coming from my
machine), it turned out that they had a severely busted submission port:
it was the same as port 25 (so, accepted unauthenticated email from the
world).  The person they were investigating had used this to send email
via Tor to an address there.

I finally explained to them that their damaged configuration was letting
spam through, and they stopped bothering me.  Ah well.

I'd suggest adding that port to the mix, since it should be authenticated
and TLSed (despite the occasional evidence otherwise).

-- 
Bill Weiss
 
Break yo pipe man, and the funny dudes scribblin' licence plates go away.
-- Kha0s, alt.2600

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-27 Thread Mike Perry
Thus spake Moritz Bartl (t...@wiredwings.com):

> On 27.06.2010 04:17, Mondior Folimun wrote:
> > I also allow 465 and 563. Those are used by authenticated SMTPS and
> > NNTPS.
> > There's also the chat ports: 1863 (MSN), 5190 (aim), 5050 (yahoo), 5222-
> > 5223 (xmpp/gchat). Those haven't given me any problems either.
> 
> Thanks. I have added them to the exit policy.

Please get back to us in a week or so with info on your abuse
complaint rate with the new policy. I'll update
https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
with the policy if it does in fact drastically reduce your abuse
complaint raint.

(Though I suspect the SWIP will also help greatly. I am beginning to
believe that these abuse-bot companies deliberately pick on new
hosters who do not have their own IP allocation specified to bully
them off the net).

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpUwdiZEx6bI.pgp
Description: PGP signature


Re: question on thunderbird and tor

2010-06-27 Thread M


Any more comments?

On 22/06/2010 18:28, Snake Taste wrote:

And what would be the best client option for windows?


Thanks

Joao

2010/6/21 Ringo <2600den...@gmail.com >

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Thunderbird does do DNS leaks but I'm not sure about the actual
data (ie
your IP address) it sends. You should run this in TorVM (or
whichever VM
is current) or something to protect your privacy if you insist on
using
thunderbird.

Ringo

On 06/21/2010 01:06 AM, M wrote:
> I have read some of the previous posts but fail to understand.
>
> I have configured my portable thunderbird  to use TOR. In the proxy
> settings, i have entered port 8118, for http and ssl, and 9050
or socks 5.
>
> I have added 3 accts: gmail, yahoo, and hotmail. i can access
yahoo and
> hotmail thru an add-on called webmail. Also, hotmail allows pop3
if you
> change the type to hotmail asia.
>
> When i connect, i can see that the connections are made thru tor
from
> the network map.
>
> I am unsure of the following:
>
> 1) DNS leak, as there is no socks4a
>
> 2) Several posts said that your outgoing mail will have my real
IP. Is
> this true? and why when i am connected thru TOR?
>
> Also, if these things are true, then how can i go about doing it
> properly? Any help would be much appreciated.
>
>
>
***
> To unsubscribe, send an e-mail to majord...@torproject.org
 with
> unsubscribe or-talkin the body.
http://archives.seul.org/or/talk/
>
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkwfzN4ACgkQETpif9i/srpe4wCfcRyva8Q5QuFPQ0y/xqjJUmIY
28MAnRQV6yABfzshGdn13dokLPiy3RW3
=uLZn
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org
 with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/