Re: Traffic question

2010-09-16 Thread Arjan
On 2010-09-16 14:41, Michael Gomboc wrote:
 Hi!
 
 I'm wondering why the traffic of my Tor node topped significant this month.
 Only Tor is running on the server and I did not change any settings.
 It goes down every day!
...
 A part of my torrc:
 
 *RelayBandwidthRate 150 KBytes
 RelayBandwidthBurst 200 KBytes
 
 AccountingStart day 00:00
 AccountingMax 20 GB*
 
 
 Thanx a lot!
 

On my relays, traffic started to drop about 5 months ago. It the years
before they were usually relaying at the full RelayBandwidthRate.

Maybe there's too much relay bandwidth available?

See the relay bandwidth graph at the bottom of the page:
http://metrics.torproject.org/graphs.html
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: huge pages, was where are the exit nodes gone?

2010-04-14 Thread Arjan
Scott Bennett wrote:
  On Tue, 13 Apr 2010 19:10:37 +0200 Arjan
 n6bc23cpc...@list.nospam.xutrox.com wrote:
 Scott Bennett wrote:
  BTW, I know that there are *lots* of tor relays running on LINUX
 systems whose operators are subscribed to this list.  Don't leave Olaf and
 me here swinging in the breeze.  Please jump in with your LINUX expertise
 and straighten us out.
 I'm not an expert, but I managed to perform some google searches.

 http://libhugetlbfs.ozlabs.org/
 From that website:
 libhugetlbfs is a library which provides easy access to huge pages of
 memory. It is a wrapper for the hugetlbfs file system. Applications can
 use huge pages to fulfill malloc() requests without being recompiled by
 using LD_PRELOAD.
 
  [Aside to Olaf:  oh.  So forcing the use of OpenBSD's malloc() might
 prevent the libhugetlbfs stuff from ever knowing that it was supposed to
 do something. :-(  I wonder how hard it would be to fix the malloc() in
 libhugetlbfs, which is most likely derived from the buggy LINUX version.
 Does libhugetlbfs come as source code?  Or is the use of LD_PRELOAD simply
 causing LINUX's libc to appear ahead of the OpenBSD version, in which case
 forcing reordering of the libraries might work?  --SB]

If Olafs test shows that CPU usage is reduced and throughput stays the
same or improves, modifying Tor to support linux huge pages might be an
option. Part 2 of this article contains some information about the
available interfaces:
http://lwn.net/Articles/374424/
Getting the wrapper to work with (or like) the OpenBSD version will
probably be easier.


 Someone is working on transparent hugepage support:
 http://thread.gmane.org/gmane.linux.kernel.mm/40182
 
  I've now had time to get through that entire thread.  I found it
 kind of frustrating reading at times.  It seemed to me that in one of
 the very first few messages, the author described how they had long
 since shot themselves in the feet (i.e., by rejecting the algorithm of
 Navarro et al. (2002), which had already been demonstrated to work on an early
 FreeBSD 5 system modified by Navarro's team) on emotional grounds (i.e.,
 we didn't feel its [Navarro's method's] heuristics were right).
snipped the remainder of the analysis

Thanks for your analysis of the thread and the reference to the Navarro
paper.

I've located the paper and will read it when time permits:
http://www.usenix.org/events/osdi02/tech/full_papers/navarro/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: huge pages, was where are the exit nodes gone?

2010-04-13 Thread Arjan
Scott Bennett wrote:
  BTW, I know that there are *lots* of tor relays running on LINUX
 systems whose operators are subscribed to this list.  Don't leave Olaf and
 me here swinging in the breeze.  Please jump in with your LINUX expertise
 and straighten us out.

I'm not an expert, but I managed to perform some google searches.

http://libhugetlbfs.ozlabs.org/
From that website:
libhugetlbfs is a library which provides easy access to huge pages of
memory. It is a wrapper for the hugetlbfs file system. Applications can
use huge pages to fulfill malloc() requests without being recompiled by
using LD_PRELOAD.

Someone is working on transparent hugepage support:
http://thread.gmane.org/gmane.linux.kernel.mm/40182
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: More important: Bridges or ORs

2009-09-04 Thread Arjan
Gregory Maxwell wrote:
 On Wed, Sep 2, 2009 at 3:47 PM,
 Arjann6bc23cpc...@list.nospam.xutrox.com wrote:
 Maybe the FAQ should advise people with a static IP address to
 run a relay instead of a bridge? If the IP address of your bridge
 is static, an ISP or government that filters Tor will eventually
 find the address and block it.
 
 Hm? but if it's dynamic the people who need to use your bridge will be
 unable to find it.

If the address changes once a day or once a month, that's dynamic
for me.
According to my ISP, my IP address is dynamic too, but it hasn't
changed once since I got my ADSL connection almost two years ago.
Therefore, my IP address would be of little use for running a bridge.



Re: More important: Bridges or ORs

2009-09-02 Thread Arjan
Roger Dingledine wrote:
 On Tue, Sep 01, 2009 at 10:47:45PM -0400, Andrew Del Vecchio wrote:
 I'm currently running my tor node as a bridge, and have been for a
 couple of months now. Haven't seen much traffic, which I guess makes
 sense. Which does the community think is more important right now,
 running as a bridge or as a OR? I'm located geographically in the
 Northeastern portion of the USA, if that makes any kind of difference.
 
 Fortunately, I wrote this up as a faq entry during the June Iran
 events. :)
 
 https://www.torproject.org/faq#RelayOrBridge

Maybe the FAQ should advise people with a static IP address to
run a relay instead of a bridge? If the IP address of your bridge
is static, an ISP or government that filters Tor will eventually
find the address and block it.



Re: what is best - speed or stability?

2009-07-27 Thread Arjan
monitor wrote:
 I run my relay on a VPS with limited bandwidth, so have set it to 
 hibernate every day after 1Gb usage.
 
 When I set my RelayBandwithRate to 50kb, this means my relay is running 
 for 12-16 hours per day.

It's running longer longer than I would have expected. That may be
because it takes a while for the clients to find out that your relay got
out of hibernation.

 If I set it to 25kb, it runs all day - and switching off hibernation 
 becomes possible.

When the relay is available all day, it's likely that it will
permanently run at the set RelayBandwithRate (that's what happens with
my relays).
If you're not running a directory mirror, your relay will send and
receive about 2 GiB each day (4 GiB total).

 Which is the most useful option? Longer availability at a slower rate, 
 or limited availability at a higher rate?

Someone else may have the answer to that.




Re: Hidden Service Weirdness

2009-07-25 Thread Arjan
Ringo wrote:
 unfortunately you must run qemu as root to bind to privileged ports
 like 80, which negates some of the protections you're hoping to
 provide.
 
 Is there a system list that can be edited and have port 80 removed from it?

Maybe POSIX Capabilities are an option:
http://www.friedhoff.org/posixfilecaps.html


Re: 25 tbreg relays in directory

2009-07-02 Thread Arjan
Jim McClanahan wrote:
[...]
 Certainly, protecting
 the network is a priority.  Protecting uninformed or unsuspecting
 users gets trickier IMHO.  I'll admit this is a bit of a hot-button
 issue for me and I may have overreacted.  But I think care needs to be
 taken before cavalierly shutting something down to protect uninformed or
 unsuspecting users.  I agree with Ringo 2600den...@gmail.com when he
 wrote (at Tue, 30 Jun 2009 00:06:01 -0400) Remotely disabling Tor nodes
 is a slippery slope.

In my humble opinion, protecting uninformed or unsuspecting users /
relay operators should be a priority.

Numbers of relays running a particular Tor version (extracted from the
current consensus):
  1 0.1.1.19-rc
  2 0.1.1.23
  2 0.1.1.25
  2 0.1.1.26
  1 0.1.2.13
  2 0.1.2.14
  7 0.1.2.16
 20 0.1.2.17
 11 0.1.2.18
 73 0.1.2.19
  1 0.1.2.3-alpha
  1 0.1.2.9-rc
  3 0.2.0.30 (r15956)
 32 0.2.0.31 (r16744)
 23 0.2.0.32 (r17346)
 39 0.2.0.33 (r18212)
   1048 0.2.0.34 (r18423)
411 0.2.0.35
  1 0.2.0.4-alpha
  2 0.2.0.7-alpha (r11572)
  1 0.2.1.10-alpha (r17969)
  9 0.2.1.11-alpha (r18192)
 10 0.2.1.12-alpha (r18423)
  1 0.2.1.13-alpha-dev (r19091)
  2 0.2.1.13-alpha-dev (r19200)
  1 0.2.1.13-alpha-dev (r19220)
 11 0.2.1.13-alpha (r18828)
 29 0.2.1.14-rc (r19307)
  1 0.2.1.14-rc (r19364)
  1 0.2.1.14-rc (r19715)
  1 0.2.1.14-rc (r19870)
 40 0.2.1.15-rc
100 0.2.1.16-rc
  8 0.2.1.2-alpha (r15383)
  2 0.2.1.7-alpha (r17216)
 17 0.2.2.0-alpha-dev
Just remove all relays from the directory that are running old versions
and only keep 0.2.0.34, 0.2.0.35, 0.2.1.15-rc, 0.2.1.16-rc and maybe
0.2.2.0 listed. You'll only lose about 300 relays, so no big loss.
A relay operator should be able to keep his Tor updated. If he doesn't,
chances are that his machine will be compromised. That's bad for him.
It's also bad for the Tor users (and their anonymity), because some
entity might be able to compromise a large number of Tor relays.

Relays that are running without the PC owner knowing about it should
also be removed. The PC owner might get into trouble with his ISP or
government and the relay also has a higher risk of being compromised.


Re: 25 tbreg relays in directory

2009-07-02 Thread Arjan
Niels Elgaard Larsen wrote:
[...]
 I run an TOR-access-point. Users have no way of upgrading TOR on it. They 
 probably do not
 even know that they are using TOR. If I fail to upgrade the access-point at 
 we lock it
 out, the users loose the internet connection. And the users are not that 
 anonymous anyway.
 The wireless traffic is not through TOR.

I don't think that redirecting traffic of unsuspecting users through Tor
is wise. Using TOR will make things less secure / anonymous for the
people using your wireless AP.

People using an open, unencrypted, AP can have their traffic sniffed by:
- other people nearby
- AP owner
- ISP of the AP owner
- government
- ... (depends on the destination)
When sending the traffic over TOR, it can also be monitored by:
- exit node operators (some owned by crackers / government agencies)
- ISPs of exit node operators
- governments of exit node operators

Since the AP user doesn't know he's using TOR, he will probably transmit
information that shows his identity. He may end up on a government watch
list, because they know that all TOR users are potential child
pornographers / terrorists.



Re: 25 tbreg relays in directory

2009-07-02 Thread Arjan
Martin Fick wrote:
 --- On Thu, 7/2/09, Arjan n6bc23cpc...@list.nospam.xutrox.com wrote:
 He may end up on a government watch list, because they know that all 
 TOR users are potential child pornographers / terrorists.
 
 
 Give me a break, so are all internet users, so are all people 
 of the world.  This kind of silly slurring of tor users is 
 really unnecessary, isn't it?

I omitted the ;-) in that example, because I thought it was obvious.

I'll rephrase what I meant to say:
People who choose to use Tor will think about the consequences. They
will encrypt their traffic, hide their identity or simply refrain from
transmitting things via Tor that can get them into trouble somewhere on
this planet.
People who are using Tor without them knowing it, may not be so careful.



Re: Tor bridge not generating any traffic

2009-06-10 Thread Arjan
Scott Bennett wrote:
[...]
  Now that you've published your tor bridge's IP address on this list--
 assuming the one you've shown us is accurate, rather than an appropriate
 substitution for purposes of sending it to this list--you ought to consider
 contacting your host company in the U.S. to get them to change the IP address
 and restart tor using the new IP address.  The IP address shown above, if
 correct, will probably be useless anywhere that access via bridges is needed.

It doesn't matter much. All bridges with static IP address will probably
end up on block lists eventually.



Re: Out-of-date Tors (was Re: 25 tbreg relays in directory)

2009-05-26 Thread Arjan
Roger Dingledine wrote:
[...]
 But yes, there is definitely a tradeoff here. I'm not sure where the
 right point in the tradeoff is. But my intuition is that cutting 0.1.2.x
 relays out of the network would hurt more than help at this point. But
 for the few remaining 0.1.1.x relays? Hm.

You should cut off all insecure relays, because some people might rely
on Tor for providing strong anonymity. Security and anonymity should be
more important than speed.




Re: Version checking (was Re: 25 tbreg relays in directory)

2009-04-29 Thread Arjan
Nils Vogels wrote:

 IMHO, just adding a list of allowed versions in the consensus will
 accomplish just that, without the need of all that extra traffic and
 CRC complexity.

Use as much donated network capacity as possible without reducing
anonymity by treating exit nodes and other nodes differently:
- Old exit nodes: Use them, but increase the circuit length by 1
- Other old nodes: Don't use them at all

Old versions that are remotely exploitable should be automatically
shutdown. Maybe the directory authorities could instruct them to do that?.
If that's not possible, they should not be listed in the directory to
reduce the risk of them getting compromised. That won't help for
existing nodes with static IP, but it will help in other cases.


Re: aes performance

2009-02-23 Thread Arjan
Olaf Selke wrote:
 hello there,
 
 as I understood tor spends most of its cpu time within openssl library aes 
 crypto.
 Which result of openssl speed aes applies to tor? Is it aes-128 cbc 16 
 bytes?

It would be nice if Tor was using bigger blocks, but I've not looked at
the code yet.


 In this case my old Prestonia P4 Netburst Xeon box's throughput is supposed to
 be roughly about 40 MBit/s as middleman. Correct?
 
 type 16 bytes 64 bytes256 bytes   1024 bytes   8192 bytes
 aes-128 cbc  84098.99k   119729.69k   138053.97k   142741.16k   144386.04k
 aes-192 cbc  75035.35k   104143.72k   115681.81k   120099.84k   120949.42k
 aes-256 cbc  69559.47k92221.78k   102006.05k   105361.75k   100274.74k
 
 Strange to say that my desktop Core2 Duo E8400 @home performs only 33% better 
 in
 openssl aes crypto than one of the old P4 Netburst Xeon cores from my tor 
 node.
 For the sake of better performance I'm thinking about replacing my tor node's
 hardware.

If you're going to replace hardware, hardware assisted encryption may be
an option. Recent VIA CPUs like the C7 and the Nano can do that. Their
clock frequency isn't very high, so something else (instead of
encryption) may become the bottleneck.

Resuls for VIA Nano (with 32-bit openssl):

VIA Nano 1.6 GHz with padlock engine
type 16 bytes64 bytes   256 bytes  1024 bytes  8192 bytes
aes-128-cbc  69796.09k  275407.68k  585574.57k  815018.33k  920136.36k
aes-192-cbc  52670.82k  208539.14k  472485.55k  691277.82k  798340.44k
aes-256-cbc  50984.77k  201934.27k  439964.25k  623764.14k  709612.89k

VIA Nano 1.6 GHz without padlock engine
type 16 bytes64 bytes   256 bytes  1024 bytes  8192 bytes
aes-128-cbc  41429.86k   55836.29k   60886.87k   62508.03k   62974.63k
aes-192-cbc  35838.02k   47521.62k   51671.72k   52854.10k   53177.00k
aes-256-cbc  33208.77k   41789.16k   45009.83k   45891.24k   46153.73k

Performance for 16-byte blocks is pretty poor, but for bigger blocks
it's much faster.

A VIA C7 running at the same clock frequency should produce similar results.



Re: aes performance

2009-02-23 Thread Arjan
John Brooks wrote:
 You're mistaken here.
[...]
My point was that the '16 bytes' column was showing significantly worse
results than the other columns. It's because of overhead for more
function calls, setting up keys, setting up initialization vectors, ...

 All of that aside, the encryption speed is a non-issue here. Unless you're
 using a large portion of a gigabit connection, AES will work far faster than
 your line speed on a modern processor. Additionally, just measuring the
 speed of that algorithm is very far from the entire story; there are MACs
 involved and tor has its own things that need to be applied, including
 layers of encryption. Still, I don't see encryption being a large issue for
 any but low-powered machines with high bandwidth connections.

Encryption speed is indeed only part of the problem, but on my LAN (with
a few years old hardware), the VIA Nano is by far the fastest when doing
SFTP file transfers or disk encryption.




Re: aes performance

2009-02-23 Thread Arjan
coderman wrote:
 On Mon, Feb 23, 2009 at 8:23 AM, Arjan
 n6bc23cpc...@list.nospam.xutrox.com wrote:
 ...
 It would be nice if Tor was using bigger blocks, but I've not looked at
 the code yet.
 
 i think you mean buffers (or at least multiples of 16 byte blocks);
 and yes the 4096 byte or larger buffers would be nice to get the most
 of the rep style XCRYPT instruction chaining.

Yes, that's what I meant.


 ...
 clock frequency isn't very high, so something else (instead of
 encryption) may become the bottleneck.
 
 it is also worthwhile to accelerate the public key ops with MONTMULT
 on the padlock core.  there is assembly optimized code for this in
 openssl 0.9.9 (work in progress).
 
 the bottleneck for Tor on these CPU's becomes the libz
 compression/decompression overhead with padlock enabled.

My upload speed is much too slow to run into this problem, but could the
compression be (partially) disabled for middle nodes? I'm assuming that
the data they are relaying has already been compressed + encrypted, so
it wouldn't compress much anyway.



Re: Avoiding HTTPS pitfalls [was: Re: Moxie Marlinspike]

2009-02-23 Thread Arjan
coderman wrote:
 On Thu, Feb 19, 2009 at 4:17 AM, Erilenz eril...@gmail.com wrote:
 ...
[...]
 I wonder if something could/should be built into TorButton to force a list of
 commonly used services to go entirely over https? Eg any request for
 ^http://mail\.google\.com/.*$
 
 a plugin to enforce secure cookies and https only operation for some
 domains would be useful.  i don't know of any that do this kind of
 thing yet...

Noscript has some options (Options, Advanced, HTTPS) that may help.
Disclaimer: I've not used these options and I don't know if it's secure.


Re: tor over ipv6

2009-01-20 Thread Arjan
Udo van den Heuvel wrote:
 Just a thought:
 
 With the previous tor experiences in mind w.r.t. services blocking me, I
 thought about IPv6.
 
 I could run a somewhat open relay on an IPv6 number via a IPv6 in IPV4
 tunnel if I (ever) get that to work. My isp (xs4all) offers such a
 tunnel for free and a (small?) IPv6 subnet to go.

The subnet (/48) isn't exactly small. It's 2^80 addresses ;-)
Try setting one up. Their Service Centre page can even create example
configuration files for you.
Note to other readers: The XS4ALL tunnels are for customers only.

I wouldn't recommend running an exit from XS4ALL IP space. The last time
I tried, it only took a few hours before they disconnected me.


 a) does tor work well with IPv6?

As Nick said, unfortunately it does not work at all. The three-year
development roadmap didn't mention IPv6 plans either (the roadmap
document only briefly pointed to the proposals).


 b) how is the added value for the tor network? (IPv6 vs IPv4?)

IPv4 addresses are running out:
http://www.potaroo.net/tools/ipv4/index.html

This means that IPv6 usage will go up. It has gotten much better in the
past year. Check the yearly graph for the Amsterdam Internet Exchange
(bottom graph):
http://www.ams-ix.net/technical/stats/sflow/?type=ipv6

IPv6 has the added advantage that there's no NAT. More people will be
able to run Tor relays.


 c) how well would the IPv6 setup work w.r.t. my IPv4 number(s) being
 blocked by whatver server/service/etc.

When using 6to4 or Teredo, your IPv6 addresses are derived from your
IPv4 address. This means that when one is known, the other is known (and
can be blocked) too.
When using native IPv6 or a tunnel from a tunnel broker, the IPv6 and
IPv4 addresses aren't related.


 d) any actual operational experiences here?

IPv6: Yes
Tor: Yes
And I'm willing to try IPv6 + Tor


 Anyone?

For anyone who wants to try IPv6:
- You can get a free tunnel from a tunnel broker:
  Hurricane Electric: Easy to sign up and they have IPv6
  certification tests to let you demonstrate your IPv6 skills:
http://tunnelbroker.net/
  SixXS: Signing up takes a little more effort. Privacy is a
  bit of a concern, but very recently it got better because they
  now allow you to hide your user details in the whois database:
http://www.sixxs.net/
- Or use 6to4
http://en.wikipedia.org/wiki/6to4
- Or use Teredo
http://en.wikipedia.org/wiki/Teredo_tunneling

SixXS (aiccu) and Teredo are easy to setup. It should work with
practically any IPv4 NAT setup.
Hurricane Electric, 6to4 and XS4ALL use protocol 41 IPv6 in IPv4 tunnels
and may be more difficult/impossible to setup, depending on your
modem/router/firewall.



Re: User tor issue

2008-12-31 Thread Arjan
Udo van den Heuvel wrote:
 pho...@rootme.org wrote:
 On Tue, Dec 30, 2008 at 03:48:10PM +0100, udo...@xs4all.nl wrote 1.0K
 bytes in 32 lines about:
 - Low traffic

 According to
 http://torstatus.blutmagie.de/router_detail.php?FP=5c7fc21ea828d2c2451bb1f5da191d59db1dd5cb,

 you're using the defined bandwidth now.
 
 Thanks but...
 Bandwidth it is configured at 2 bytes.
 So that would be 160 kbit/s. I am nowhere near that, not even in peaks.
 Or am I misunderstanding/misreading?

You're correct. It should be about 100 times higher.

Compare your graph and bandwidth settings with that of this randomly
picked router:
http://torstatus.blutmagie.de/router_detail.php?FP=611a96764577d2a2ff490666ba732382bae08bbc


Re: User tor issue

2008-12-29 Thread Arjan
Udo van den Heuvel wrote:
 People,
 
 I noticed that my tor process was running as a user '_tor' but that
 torrc specified 'tor' as user. (possibly a migration issue)
 Once I corrected this my tor traffic because 'much' higher:
 http://pindarots.xs4all.nl/mrtg/tor.html

Even with the 'much' higher traffic, it looks extremely slow to me with
an average of 100 - 200 bytes per second. Why doesn't traffic get
anywhere near the tor bandwidth limit settings?



Re: User tor issue

2008-12-29 Thread Arjan
pho...@rootme.org wrote:
 On Mon, Dec 29, 2008 at 06:51:13PM +0100, n6bc23cpc...@list.nospam.xutrox.com 
 wrote 0.5K bytes in 11 lines about:
 : Even with the 'much' higher traffic, it looks extremely slow to me with
 : an average of 100 - 200 bytes per second. Why doesn't traffic get
 : anywhere near the tor bandwidth limit settings?
 
 If you've just started the server, it will take a while for clients to
 start using it as a relay.  Don't worry, Tor will consume all bandwidth
 you give it.

According to the yearly mrtg graph it never gets much higher:
http://pindarots.xs4all.nl/mrtg/tor.html

The torstatus graph agrees with mrtg:
http://torstatus.blutmagie.de/router_detail.php?FP=5c7fc21ea828d2c2451bb1f5da191d59db1dd5cb


Firewall update (if you're filtering bogons)

2008-11-12 Thread Arjan
The list of IPv4 Global Unicast Address Assignments got updated yesterday:
http://iana.org/assignments/ipv4-address-space/

The previously unallocated prefixes 110/8 and 111/8 have been allocated.
Please remove them from your firewall filter if you're filtering bogons.



Re: Questions about bogon filtering [Was: Re: Firewall update (if you're filtering bogons)]

2008-11-04 Thread Arjan
F. Fox wrote:
 Arjan wrote:
 The list of IPv4 Global Unicast Address Assignments got updated yesterday:
  http://iana.org/assignments/ipv4-address-space/
 
 The previously unallocated prefix 197/8 has been allocated. Please
 remove it from your firewall filter if you're filtering bogons.
 
 
 
 A question: Does filtering bogons really help security all that much? I
 would think that about all it'd be good for would be dropping packets
 with spoofed IDs - but in the case of a DDoS, where such a thing is
 likely, they've accomplished their goal simply by having the packet get
 across your uplink and bounce off your firewall.
 
 I suppose it could help spare load on a server in the case of a SYN
 flood directed towards one, but I would think it wouldn't be all that
 hard to adjust the RNG algorithm (or counter, or whatever) to have the
 spoofed IPs on the packets generated only in non-bogon space.
 

You're right that it doesn't help security, but I prefer to filter all
traffic that's not supposed to come from / go to the internet. Filtering
invalid outgoing traffic should help me stay out of trouble with my ISP.



Attempting to connect to nodes in bogon space

2008-09-22 Thread Arjan
My tor middle node (0.2.0.31) tries to connect to some bogon IP
addresses and I was wondering why it does that.

Bogons in my firewall log:
1.50.130.65:9001
5.33.91.234:9001
5.66.101.27:9001
5.72.245.97:9001
5.96.52.246:9001
5.207.116.85:443
5.224.51.41:443
5.255.213.66:443
23.215.10.223:9001
36.234.6.234:9001
37.8.13.163:443
103.3.4.204:443

According to the IANA, the IP addresses above are all bogons:
http://www.iana.org/assignments/ipv4-address-space/

Prefix  Designation  Status
-   --   --
001/8   IANA UNALLOCATED
005/8   IANA UNALLOCATED
023/8   IANA UNALLOCATED
036/8   IANA UNALLOCATED
037/8   IANA UNALLOCATED
103/8   IANA UNALLOCATED
(note that bogon space is much bigger than the few lines I did put here)


Lots of entries from bogon space are listed in the directory. Maybe the
directory should be cleaned up?

Here's an IP address that's also in my firewall log:
r Unnamed H6J0l5pqLdXGRF3TRtwObv58BQ8 UThYzaccGtpl3tnbfiAkqwZeLXA
2008-09-22 10:15:32 36.234.6.234 9001 0
s Valid
opt v Tor 0.1.2.14

The other IP addresses in the firewall log aren't listed in the current
directory, but maybe they were recently removed?


Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-22 Thread Arjan
Bernhard Fischer wrote:
 OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. It 
 transmits any kind of IP-based data transparently through the TOR network on 
 a location hidden basis.  You can think of it as a point-to-multipoint VPN 
 between hidden services.

Although I don't have a practical use for it right now, I just had to
try this, because it's something with IPv6 in it ;-)

Installation is easy (but because of the root requirement for creating
the tun device, I had to run it in a virtual machine).
I tried your ping and http examples and it works fine for me.



Re: Tor security advisory: Debian flaw causes weak identity keys

2008-05-14 Thread Arjan
Roger Dingledine wrote:
 SUMMARY:
   This is a critical security announcement.
 
   A bug in the Debian GNU/Linux distribution's OpenSSL package was
   announced today. This bug would allow an attacker to figure out private
   keys generated by these buggy versions of the OpenSSL library. Thus,
   all private keys generated by affected versions of OpenSSL must be
   considered to be compromised.

One of my tor nodes was affected. I've upgraded openssl and changed keys.

Two questions:

Do I have to do something to get the old key blacklisted to make sure
that someone can't impersonate it?
(Old fingerprint: $C33ABC15B69DA274588CA1869CC1EE7B1DC11DAD)

Should I rename my node? It doesn't show up as named anymore because of
the key change.


Re: Tor relay shutted down by ISP

2008-02-23 Thread Arjan
Tom Hek wrote:
 This morning is a friend of mine also was disconnected from the internet
 because XS4ALL thinks there is a Trojan running on his system. He also
 runs Tor on his system.. I'll keep you guys posted.

This also happened to me and at least one other person. In my case it
was because of trojan activity on IRC. I was using the default Tor exit
policy at that time, which, as it turns out, isn't restrictive enough.
XS4ALL told me that it's OK to run a non-exit node, which I'm running
now. There's a number of other non-exit nodes in XS4LL IP space,
including the node of one of the XS4ALL founders, so running a non-exit
node seems to be fine.



Re: Tor relay shutted down by ISP

2008-02-23 Thread Arjan
Tom Hek wrote:
 This also happened to me and at least one other person. In my case it
 was because of trojan activity on IRC. I was using the default Tor exit
 policy at that time, which, as it turns out, isn't restrictive enough.
 XS4ALL told me that it's OK to run a non-exit node, which I'm running
 now. There's a number of other non-exit nodes in XS4LL IP space,
 including the node of one of the XS4ALL founders, so running a non-exit
 node seems to be fine.
 
 Yep, I'm going to run a non-exit node too.. But I really want to run an
 exit node and I really don't like it that XS4ALL is filtering me because
 of that..
 
They aren't filtering Tor exit nodes, but they check for bad traffic
coming from their IP space (spam, trojans, viruses, cracking, ...). With
a Tor exit node, that will happen sooner or later.


Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Arjan
Scott Bennett wrote:
[...]
  Governments are incomparably more dangerous than any 13-year-old or
 even ISPs.  Also, given the number of teenagers who have cracked well
 funded web servers, I'd say that said teenager is still not out of the loop
 without tor.
[...]
 Not using tor at all is far more dangerous in my view.

In this case, using TOR will make things less secure / anonymous for the
people using your wireless AP.

People using an open, unencrypted, AP can have their traffic sniffed by:
- other people nearby
- AP owner
- ISP of the AP owner
- government
- ... (depends on the destination)
When sending the traffic over TOR, (part of) it can also be watched by:
- all exit node operators (some owned by crackers / government agencies)
- their ISPs
- their governments

Since the AP user doesn't know he's using TOR, he will probably transmit
information that shows his identity. He may end up on a government watch
list, because they know that all TOR users are child pornographers /
terrorists.

Take a look at this too (it was mentioned on this list before):
http://www.derangedsecurity.com/time-to-reveal%e2%80%a6/


You should inform the users about TOR, before letting them use it. It's
less convenient, but it's much more secure for them. Not using TOR at
all would be even more secure for them, but then your IP would show up
when your users do bad things.

Some ideas:

Manual proxy setup
- redirect non-proxy http / https traffic to a page with setup
  information for your proxy
- allow traffic to your proxy
- block all other traffic

VPN, using PPTP or something like that
- redirect non-VPN http / https traffic to a page with setup information
- redirect all VPN traffic through TOR
- block all other traffic

I prefer a VPN solution, because of the wireless link encryption. It
should also work for any application that doesn't know about proxies.



Arjan