Re: PrivacyNow
downie - wrote, On 2010-03-23 20:27: Hi, would the owner of exit PrivacyNow (reportedly in Denmark) please turn off blacklisting of sites in their OpenDNS account? Or even better, use the resolvers from: http://censurfridns.dk/ -- Regards Georg Sluyterman *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: tor-ramdisk testing needed.
basile wrote, On 2010-01-03 16:22: Hi everyone, Last time I released tor-ramdisk, Georg Sluyterman requested that I add the option of allowing the user to manually set a DNS server when acquiring an IP address via DHCP. I added that feature with the next release which will be based on tor-0.2.1.21 (bumped from .20). The image is being tested now before release. Anyone want to test the new feature? *nudges Georg* Prerelease images: http://opensource.dyc.edu/pub/tor-ramdisk/archives/images.testing/ Bug reports: http://opensource.dyc.edu/flyspray/ Great. Thanks for implementing the feature! My exit-node is running right now, and everything seems to work. I am using one of the publicly available DNS-resolvers at http://censurfridns.dk/ (i don't like OpenDNS since they also filter and give false answers.). -- Venlig hilsen Georg Sluyterman *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Danish TPB DNS Blocks
Flamsmark wrote, On 2009-11-25 04:33: A number of Danish ISPs have blocked thepiratebay.org, by redirecting the DNS entry for that domain to a page stating that the site is blocked. This sometimes results in Danish exits giving this inappropriate result for that domain. Should the IP addresses of those ISPs be automatically given the badexit flag, since they don't do DNS in a correct and neutral way? Have you tried e-mailing the ones giving the problem (if they have any contact-info)? I must admit that i did not think of this when i set up my danish exit-node. I have changed it to OpenDNS now. I hate censorship. Stupid stupid IFPI et al. -- Venlig hilsen Georg Sluyterman *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?
Georg Sluyterman wrote, On 2009-11-25 18:29: ---cut I have changed it to OpenDNS now. ---cut--- Or maybe not.. It seems that i can not get an IP via DHCP and manually change the DNS-resolver address, because (as far as i can see) shell support is removed in recent Tor-ramdisk releases. What do i do then? -- Regards Georg Sluyterman *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?
Flamsmark wrote, On 2009-11-25 20:52: Perhaps you'll just have to wait for the developer to fix the problem? I will send a feature request :-) -- Venlig hilsen Georg Sluyterman *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Reduce hops when privacy level allows to save Tor network bandwidth
Erilenz wrote, On 2009-11-17 14:57: The following occured to me. Tor is designed to protect users from traffic analysis by very technical adversaries. There are many use cases where that level of protection isn't required. In those cases, if there was a config option to reduce the number of hops in a circuit to 2 (or possibly even 1), then users would be able to get themselves a more responsive circuit, whilst saving the Tor network overall bandwidth. In a three hop circuit, when x contacts y, the Tor network ends up having to transfer 4X the data: x -(1) Entry -(2) Middle -(3) Exit -(4) y In a 2 hop circuit it only has to transfer 75% of that: x -(1) Entry -(2) Exit -(3) y If you send a 1 kByte packet through a Tor node (lets forget the overhead for now), the Tor node has to download the packet and upload it to the next node (or endpoint) which equals 2 kByte traffic on the internetconnection for the specific Tor node. If you send a 1 kByte packet through Tor (again forget about overhead) the traffic used in the network will be ~6 kByte (packetsize * 2 * number_of_hops). If you send through two hops instead of three, you will genereate 4 kByte traffic instead of 6 kByte. Thats 67% not 75%. You are forgetting that between nodes, the packet has to be uploaded _and_ downloaded again (both things cost bandwidth). With regards to reducing the number of hops i agree with Andrew about using something else than Tor. -- Regards Georg Sluyterman *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
New swedish survailance law.
FYI Sweden has introduced a new law. A copy of all traffic crossing the borders of Sweden has to be delivered to an intelligence agency called FRA. This affects nodes in Sweden, but also countries like Finland (80% of Finland's international traffic goes through Sweden.). The law is set to take affect 2009-01-01. http://www.thelocal.se/12534.html -- Regards Georg Sluyterman Denmark
Re: German Tor-Exitnode mailinglist ([EMAIL PROTECTED])
Dieter Zinke wrote: Well, germany and tor. I know that there are a lot of tor servers and i know they are fast and frequently used. But i would never ever use a german exit node. NEVER! ---snip--- Would you use exit-servers from Denmark? We also have data retention, although not the exact same law as in Germany (but implemented from the same EU-directive). You should lobby the EU politicians in the parliament - there is a lack of interest groups explaining the problems to them (i was just down there for some weeks ago with a danish interest group. The politicians told us that groups like us are very rare, and that they only get input from big companies etc. with economic interests). So get up from the chair and lobby, course nobody else is doing it! :-) -- Regards Georg Sluyterman
Re: TOR and non-contineous internet connections
Alexander W. Janssen wrote: ---snip--- (...) although I wouldn't advice you run a Tor-node at home if you want to be an Exit-Node. Why? -- Regards Georg
Re: 20090101... - Dänemark
Eugen Leitl wrote: Data retention law has just been passed in Germany. Here's the list of who voted how http://www.bundestag.de/parlament/plenargeschehen/abstimmung/20071109_teleueberwach.pdf This will be contested as unconstitutional, but in cases it will become law all Tor operators are required by law to start logging 20090101. Similiar applies to the entire EU, but the dates and details might differ. The details indeed does differ :-) In Denmark, the implementation of the EU-directive (which is called 'logningsbekendtgørelsen') is not bad news for Tor-operators. If you have a Tor-server in Denmark, you don't have to log *anything*! I have this in writing (from something called IT- og Telestyrelsen), if anybody is interested. Regarding to the danish 'version' of Vorratsdatenspeicherung ('logningsbekendtgørelsen'), you only have to log data, that you /know/. That means, if you eg. have an open access point, then normally you do not know which physical persons have a specific IP-address, and therefore you do not have to log that. If you are non-commercial (eg. Tor-operaters normally are), then you do not have to log *anything*. That means a private open access point does not have to be register anything. So if you want to host a Tor-server somewhere in Denmark, feel free to contact me by e-mail if i can be at any help. -- Regards Georg Sluyterman