Stop TOR from building circuits in the background?

2010-10-06 Thread Brian Johnson
Hello,

I am using the -controlport Commands to build custom Circuits.

My problem with this is that I cannot trust TOR to use these circuits. 
It keeps building new ones which were not requested by me via the command 
interface.
I can drop all circuits, build 2 new ones, refresh the circuit list and there 
are more than 2. Can I deactivate this feature without recompiling?

thanks in advance
Brian
-- 
Neu: GMX De-Mail - Einfach wie E-Mail, sicher wie ein Brief!  
Jetzt De-Mail-Adresse reservieren: http://portal.gmx.net/de/go/demail
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Stop TOR from building circuits in the background?

2010-10-06 Thread Nick Mathewson
On Wed, Oct 6, 2010 at 8:47 AM, Brian Johnson brian_john...@gmx.net wrote:
 Hello,

 I am using the -controlport Commands to build custom Circuits.

 My problem with this is that I cannot trust TOR to use these circuits.
 It keeps building new ones which were not requested by me via the command 
 interface.
 I can drop all circuits, build 2 new ones, refresh the circuit list and there 
 are more than 2. Can I deactivate this feature without recompiling?


Keep reading control-spec.txt till you get to section 5.4.  Look at
the documentation for __LeaveStreamsUnattached and
__DisablePredictedCircuits.  You'll want both, and you'll need to use
ATTACHSTREAM to attach streams yourself.

peace,
-- 
Nick
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Stop TOR from building circuits in the background?

2010-10-06 Thread Benedikt Westermann
Hi,

I think you are looking for:

__DisablePredictedCircuits
__LeaveStreamsUnattached

see Section 5.4 in the control protocol [1] specification for details.

Regards,
Benne

[1] 
http://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=doc/spec/control-spec.txt


Am Mittwoch, den 06.10.2010, 14:47 +0200 schrieb Brian Johnson:
 Hello,
 
 I am using the -controlport Commands to build custom Circuits.
 
 My problem with this is that I cannot trust TOR to use these circuits. 
 It keeps building new ones which were not requested by me via the command 
 interface.
 I can drop all circuits, build 2 new ones, refresh the circuit list and there 
 are more than 2. Can I deactivate this feature without recompiling?
 
 thanks in advance
 Brian

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Me - Tor - VPN - Internet?

2010-10-06 Thread Load Bear
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- From what I have read, it is at least theoretically possible for someone
running a Tor exit node to monitor any plaintext, non-SSL/https
connections that are passed through that node. The solution that seems
to be usually suggested is to always use end-to-end encryption, such as
https. However, some sites do not support https.

I have also noticed that there exist some free VPN services which can be
used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
is there an easy way to, for lack of a better description, chain
proxies, so that the traffic between myself and the VPN is anonymized
through Tor, and my traffic between Tor and the internet is encrypted
through the VPN?


- -- 
LOADBEAR,8,1;RUN
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkytNwIACgkQ8Li/YMVVHuZGCgCgqcGoIEXD13bs3Vb8YklIiMuo
gZsAn312Q69Nr0I6ODHR+AQ+xkkGStOm
=r2iJ
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Me - Tor - VPN - Internet?

2010-10-06 Thread John Brooks
On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote:

 I have also noticed that there exist some free VPN services which can be
 used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
 is there an easy way to, for lack of a better description, chain
 proxies, so that the traffic between myself and the VPN is anonymized
 through Tor, and my traffic between Tor and the internet is encrypted
 through the VPN?


Then the traffic between the VPN and the actual destination won't be
encrypted, so the VPN sees everything you do. Same problem, different place.
There is no way you can encrypt traffic sent to a destination that doesn't
know how to decrypt it.

 - John Brooks


Re: Me - Tor - VPN - Internet?

2010-10-06 Thread Load Bear
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 2010/10/06 11:02 PM, John Brooks wrote:
 On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote:

 I have also noticed that there exist some free VPN services which can be
 used reasonably anonymously, such as ItsHidden. Thus, I was wondering -
 is there an easy way to, for lack of a better description, chain
 proxies, so that the traffic between myself and the VPN is anonymized
 through Tor, and my traffic between Tor and the internet is encrypted
 through the VPN?

 Then the traffic between the VPN and the actual destination won't be
 encrypted, so the VPN sees everything you do. Same problem, different place.
 There is no way you can encrypt traffic sent to a destination that doesn't
 know how to decrypt it.

I am aware of that limitation. However, I am currently less concerned
about eavesdroppers between a given VPN and the destination than I am
about Tor exit-node eavesdroppers. Knowing the limitations involved, do
you know of some method to accomplish my expressed goal?


- -- 
LOADBEAR,8,1;RUN
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkytOlEACgkQ8Li/YMVVHub8FACgg/j/wu+SQFa/vJ40x6Yc5xQq
p3YAn1Rrw2g8KtiycWn2AbOK5fmLMpBo
=AtlC
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Me - Tor - VPN - Internet?

2010-10-06 Thread John Brooks
On Wed, Oct 6, 2010 at 9:11 PM, Load Bear loadbear...@gmail.com wrote:
 I am aware of that limitation. However, I am currently less concerned
 about eavesdroppers between a given VPN and the destination than I am
 about Tor exit-node eavesdroppers. Knowing the limitations involved, do
 you know of some method to accomplish my expressed goal?

Assuming it's not a free VPN, you also run the risk of being
identified by your billing information. If it is free, I would say
that there is just as much if not more risk of your traffic being used
maliciously.

You would need to find VPN software that uses TCP and will allow you
to send it through SOCKS. I don't know of any, but perhaps somebody
else does.

 - John Brooks
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/