Re: [OT]FW: Invitation to connect on LinkedIn

2010-06-30 Thread Michael Holstein

 And just how can you add a mailing list to your professional network???
   

This is a feature of these sort of sites .. you (stupidly) provide
your email password, they suck in all the addresses of your contacts and
attempt to befriend them.

One person's marketing and/or networking is everyone else's spam.

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-29 Thread Michael Holstein

 As in, MediaSentry doesn't want Tor to exist (for obvious reasons), so
 it DMCA-DoS's new exit nodes?
   

No, they pick on everyone pretty much equally .. easy to do when you're
just using a script to scrape a tracker and complain.

I've investigated many of the complaints over the years, and have yet to
find any evidence that that Mediasentry (et.al.) makes any effort to
download or verify that the client they are complaining about is in
fact, offering the content in question. This was most hilariously
demonstrated by Washington University when they spoofed a bunch of
printers and got DMCA notices for them(*).

(*): http://dmca.cs.washington.edu/

Also, as I've mentioned previously, it's not at all unusual to get
complaints for IP addresses (within our block) that have never been
used. I get the impression that folks (probably the media companies
themselves) are intentionally injecting fake information into BitTorrent
like they used to do with Napster .. except that BitTorrent handles this
much better. The fallout from that is companies get a bunch of bogus
complaints.

My 0.02.

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-23 Thread Michael Holstein

 If you can get SoftLayer to do SWIP on the IP address/range assigned to
 you, that will offload their complaint person and let you handle
 everything automatically.  

Agreed. Having the whois info for your TOR box come to you as an
ORG-ABUSE will offload a lot of this from Softlayer. BayTSP, et.al.
don't bother doing ASN lookups, they complain by IP whois.

 BayTSP/MediaSentry/etc have heard all the
 excuses, including when they tagged my printer as serving up movies;
 they don't care. 

True. We get tons of them for nonexistant IP ranges. They never answer
any questions about it.

 The response is probably then
 catalogued for some future court case.

   

As are all of the bogus notices and supporting documentation that
nothing has ever occupied that IP address.

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: TOR Blocked at Universities

2010-02-12 Thread Michael Holstein

 Could you bind your exit traffic to IPs outside your University's
 primary block?

Not sure what you mean by bind to outside IP, but our network is a
contiguous /16. We would have to register for extra /24s from ARIN, and
that costs money.

Cheers,

Michael Holstein
Cleveland State University

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: TOR Blocked at Universities

2010-02-12 Thread Michael Holstein

 Why not simply block that entire network in the Exit policy?

You're missing the point .. we already blocked our *own* /16 in the
exit. The problem was the thousands of academic journals, all of which
have distinct addresses, that consider any traffic from our /16 as being
on campus and thus not needing of authentication. As the exit node
resided with that /16, any traffic sourced from it would appear to be
on campus from the perspective of the other entity.

I could have :

a) created an exit policy thousands of lines long prohibiting
a.b.c.d/32:* for each of them
b) used IPtables to do the same thing, but that would not make the
prohibition known to clients and break things.
c) use entries in /etc/hosts to accomplish the same things as b) with
the same results.

We found that since the list of exit nodes is known, people would
actively seek those that ended in .edu and try to rape the journals with
them .. downloading entire issues of various scientific journals (this
happens on-campus too from misguided students, but that's easier to
track down).

If the network spec could easily handle any number of exit nodes, each
with a policy of unlimited length .. this wouldn't be a problem (other
than the ongoing maintenance headache). Likewise, if we had a few /24s
to stick stuff like this into that were outside the primary /16 we could
make it work .. but IP space is getting harder to come by, and it's hard
to justify additional allocations when you already have a class B (plus,
it costs money).

Before anyone tells me it's broken to authenticate just by IP address
.. I already know that .. but that's how most of the academic publishers
do it at the moment.

For the record, the DMCA complaints, subpoenas, and various angry phone
calls were never a problem. It was the theft of academic journals (and
that doing so jeopardized our subscriptions) that did it in.

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Torbutton : please offer better user agent choices

2010-02-12 Thread Michael Holstein
Perhaps the best choice would be the one used by the most people.

http://www.eff.org/deeplinks/2010/01/tracking-by-user-agent

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: TOR Blocked at Universities

2010-02-11 Thread Michael Holstein

 Why couldn't your exit policy just block the IPs of the journal sites?

Because there's  1000 of them (and each would be a /32). It was
discussed in another thread at the time, and the developers led me to
the conclusion that such hugely long exit policies were a bad idea.

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: browser fingerprinting - panopticlick

2010-01-29 Thread Michael Holstein

 The main cause was the screen resolution.
   

Running TOR and leaving javascript enabled sort of defeats the point,
doesn't it?

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Need for sane ISP's?

2010-01-25 Thread Michael Holstein

 Is there a need for a 'by the books' ISP/hoster based in the USA?
   

It's a capitalist market. If someone's willing to pay the premium for
that type of service, it'll be offered.

The reason it isn't is that each warrant, subpoena, DMCA request, etc.
requires an army of technicians, lawyers, and the like to deal with.
Just because you might be immune under US law doesn't stop them from
suing you, and you needing to pay council to go in there and defend you
(and your techs to testify, outside experts, etc.).

It doesn't take very many of those cases to drive up costs.

If you can justify the need for your own ASN (because you're
multi-homed, etc.) then you *become* the ISP. This is completely
impractical for an end-user, but it's how Universities (and the like)
get away with hosting the nodes .. there's nobody else to complain to
but the entity itself.

Cheers,

Michael Holstein
Cleveland State University


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Why governments fund TOR?

2009-12-30 Thread Michael Holstein

 may i know why governmetns fund TOR. i read 49% funds coming from
 government. TOR is usually considered for passing government restriction
 by journalists and activists. so why should governments fund this?


Consider that many of the nodes are run by public Universities, which
are partially funded by their respective states.

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: TOR and ISP

2009-12-29 Thread Michael Holstein

 Toward a U.S. Data-Retention Standard for ISPs
 http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/TowardaUSDataRetentionStandard/158105
 Current law, as contained in Title 18 U.S.C. Section 2703(f), outlines
 the process by which law enforcement can contact ISPs to request the
 preservation of identified records or communications related to a
 particular person. The information cannot be deleted for 90 days,
 during which time law enforcement obtains the proper legal process.7
   

This is called a request to preserve records and is quite common.

Basically it's a FAX from $agency to your legal department (and then
forwarded to the IT folks) that says hey, IF (and only IF) you have
data relating to $x $y and $z, don't delete it until you get the subpoena

This is meant to counteract the routine log rotation in place almost
everywhere. The first request gets them 90 days to follow up with the
appropriate paperwork (subpoena or warrant, depending on what and how
old it is).

Those preservation requests do not create any duty to BEGIN collecting
anything .. you just can't destroy what you've already got. Also,
there's no duty to retain other records that may relate tangentially to
the request but aren't specifically requested(*).

(*) : IANAL, check with your company lawyers in all cases when answering
legal process, etc.

A forward-going request is known as a Title III Order AKA wiretap.
These are quite rare by comparison.

Regards,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: TOR is for anonymization; so how to add encryption as well?

2009-12-28 Thread Michael Holstein

 1) is no one able to decrypt the tor's encryption?

As for the node-to-node encryption, you can assume the answer to be
probably not. AES128 is seen to be reasonably secure at the present
time, enough so to be used for classified communication channels by the
US Government.

Does this mean $they probably couldn't brute-force a given key with
enough time and/or resources? .. No.

 2) how can i trust the person who runs the tor's exit node?


You can't. Hence the need to use encrypted end-services like SSH, HTTPS,
IMAPS, etc.

 optional -3) [forgive me if it is too silly]
 why people run TOR nodes? is that only to support the community or
 other benifits as well?

Yes, to support the community and to generally frustrate repressive
governments (our own included, since doing so is still within the bounds
of the law at the moment).

Benefits? If you need a recent real-life example .. during the Iran
election protests, people were creating S3/Vmware instances for TOR that
allowed access to Twitter, etc. and created an ever-moving target for
the authorities over there .. enough so that information continued to
leak out to the rest of us. The same is true for China, WikiLeaks, etc.

Cheers,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Talking w/local service CEOs [LJ, goog...]

2009-12-22 Thread Michael Holstein

 Yahoo does not block access.  However you will frequently get an error 999. 
  You can get around this by using their CAPTCHA based login.  Do realize that 
 while the login is https, the mail viewing/sending is not.  So malicious exit 
 nodes will be able to view all of the email you view/send.
   

And sniff/steal the session cookie.

Regards,

Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: I Write Mass Surveillance Software

2009-09-17 Thread Michael Holstein



http://www.reddit.com/r/IAmA/comments/9kwph/i_am_a_guy_who_writes_covert_software_that_runs/

Thoughts?


The mention of C like code and the DPI makes me think the hardware 
uses Intel's IPX series network processors. For those, the ruleset is 
basically written in C and uploaded to the device.


SANS has a whitepaper on doing Snort IDS with them, a fairly similar 
application to the above (this is for the 24xx series @ 2.5gbps)


http://www.sans.org/reading_room/whitepapers/detection/intel_ixp_network_processor_based_intrusion_detection_32919

The IXP2800 can do line-rate 10gbps
http://download.intel.com/design/network/ProdBrf/27905403.pdf

Cheers,

Michael Holstein
Cleveland State University


Re: I Write Mass Surveillance Software

2009-09-17 Thread Michael Holstein



The IXP2800 can do line-rate 10gbps
http://download.intel.com/design/network/ProdBrf/27905403.pdf


Here's one more link that explains the IXP series architecture

http://www.cs.uiuc.edu/homes/luddy/PROCESSORS/IXP2850.pdf

(basically, all the OP on Rededit was saying, was he's the guy that 
writes the microengine code)  .. the processors themselves aren't 
capable of realtime brute-force decryption ... but they are the sort of 
thing that can look for signatures/keywords/etc in a stream and act upon 
it at wire-speed.


As for breaking encryption, this would be a task better suited for a 
large farm of purpose-programmed FPGAs, since I'm not aware of any 
commercially-produced ASIC that does this (although the NSA does list 
jobs for semiconductor fabrication, so I'm sure they're in that game).


IIRC the Russians had purpose-built their own ASICs to break DES when it 
was en-vouge .. I'm sure our side of the pond actively does the same.


Sneakier mice, better mousetraps.
Lather, rinse, repeat.
while().

Cheers,

Michael Holstein
Cleveland State University


Re: Gmail

2009-09-02 Thread Michael Holstein



Noticed today that gmail is again requiring
new account creation to use SMS verification.
Tried with a number of exits. Anyone else?

  


There are email-SMS gateways .. do the reverse not exist?

What about SMS-SIP services? .. eg : 
http://www.iptel.org/ser/doc/modules/sms





Re: UDP and data retention

2008-12-19 Thread Michael Holstein



This is off-topic, but isn't UDP making data retention more difficult
than TCP/IP.
  


I don't see how ..

tcpdump -s 1514 -w evidence.pcap ip proto \\udp

is any harder than ..

tcpdump -s 1514 -w evidence.pcap ip proto \\tcp

Now I guess you could rig a communications network that dealt entirely 
in header-source forged UDP packets, but as best practices dictate (not 
the everybody follows them) .. one should filter egress of packets with 
a source address not within your netblock.


Cheers,

Michael Holstein
Cleveland State University


Re: Abuse complaint

2008-10-07 Thread Michael Holstein


Does anyone have any suggestions on how to respond to these 
complaints?  Is IP filtering the best (or only) option for addressing 
TWC's issues?


You do know that running a server of ANY kind on a residential 
connection is generally against the provider's terms of service, right?


Cheers,

Michael Holstein
Cleveland State University


Re: Abuse complaint

2008-10-07 Thread Michael Holstein


Yup, and I suspected that they would say something about that...but 
they didn't.  The TWC representative just asked me to assure that the 
attack would not occur again.  So perhaps ISPs are accepting the 
reality that customers will run servers on residential cable modem 
service?


Actually, I was looking up TWC's terms of service to support my claim, 
and it seems in light of being beat up upon by the FCC for the network 
management foolishness, they've simplified it quite a bit.


http://help.twcable.com/html/twc_misp_aup.html

However, like many ISPs, it still contains this clause :

The ISP Service may not be used to breach or attempt to breach the 
security, the computer, the software or the data of any person or 
entity, including Operator, to circumvent the user authentication 
features or security of any host, network or account, to use or 
distribute tools designed to compromise security, or to interfere with 
another's use of the ISP Service through the posting or transmitting of 
a virus or other harmful item to deliberately overload or flood that 
entity's system.


... and they make no distinction between YOU (as in the real you) and 
TOR (as in traffic that appears to come from you, but isn't the real 
you) .. all they care about is what comes out of your pipe.


Anyway .. good luck, and keep up the good fight!

Cheers,

Michael Holstein
Cleveland State University


Re: Paid performance-tor option?

2008-08-19 Thread Michael Holstein



A lot easier to sell to WHOM? (Let's say you are Novartis ... who are those
which you are--implicitly or not, and slip of the tongue or not--mentioning as
a destination for selling attested, proven sneak-oil ... a lot easier?)
  


Management.

When I approached the higher-ups about doing a TOR node, I needed to 
pick a repressive regime to use as the reason for doing it. I didn't 
think using our own country (equally repressive, for mostly the same 
reasons) would fly.


It worked, btw .. we ran one @10mbps for almost a year, until folks 
started raping online academic journals with it.



Michael Holstein
Cleveland State University


Re: Paid performance-tor option?

2008-08-18 Thread Michael Holstein


If tor is incompetent to find HUGE funding for free, it may be time to 
setup an international tor paid option.


Many of TORs current high-bandwidth nodes are run by universities .. who 
would be legally prohibited from participating in a for-profit system 
(even if the model was just cost recovery). It's also a lot easier to 
sell the idea of exposing yourself to endless abuse complaints if you 
can use the ...but we're helping Chinese dissidents... angle.


If you want paid-for anonymity services, there's tons to choose from .. 
but consider that once you attach payment to a username, you've created 
an easily attributable path back to you. TOR from the coffee shop's wifi 
is a lot harder to trace.


I guess it depends on *why* you need the performance .. if it's p2p 
you're trying to do (which you shouldn't be doing on TOR anyway) I'd 
suggest you take a look at what the friendly pirates at PRQ have come up 
with (Relakks .. www.relakks.com).


Cheers,

Michael Holstein
Cleveland State University


Re: About WLAN and monitoring..

2008-01-31 Thread Michael Holstein


I run a Tor client on a laptop at easy to access pub wifi access 
points. What I need to know is, assuming I have disallowed file 
sharing, ect what info could a wifi host be able to access on my 
computer? I have heard they could only log my MAC address, the unique 
code identifying my wifi card. Is more available to an attacker?


The MAC of the wireless card (which can be changed .. from the advanced 
properties tab in Windows, or 'ifconfig hw ether' in *nix).

The hostname sent to the DHCP server (also modifiable)

Just turning off file sharing does not disable all the exposed ports .. 
run netstat -an |findstr LISTEN to see what's open (replace 'findstr' 
with 'grep' for *nix).


Also : consider things like Windows Update, Weatherbug, Webshots, 
AntiVirus progs, etc. All of those apps send a unique ID to the remote 
side, and could be used to associate the non-TOR-you with the 
TOR-you. So could your web-based email if you've EVER used it from an 
identifiable location.


Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: [OT] NSA to spy on rest of government, launch counterattacks at crackers

2008-01-28 Thread Michael Holstein



It reminds me of some of the stuff out of the Matrix... hackers casing
damage by manipulating the code of the Matrix, Machines moving in and
out of everything...

  


Greetings professor .. would you like to play a game?


Re: Restrict relay to internet2

2008-01-09 Thread Michael Holstein


The final part of my scheme would require that I be able to restrict 
my tor node to ONLY relay traffic to/from I2 nodes.  I can't figure 
out how to do this. 


I doubt your school will do this for you, but the only way it's gonna 
work is to get a BGP feed into quagga (or some other BGPd) and build 
your netfilter tables from that.


Here is a (somewhat dated) article on doing it : 
http://www.ibiblio.org/john/pubs/route-qos/index.html


I see why you're trying though .. when I was running a TOR node here, it 
was by far the largest user of Internet2 bandwidth (since many other TOR 
nodes are on academic sites).


Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: SORBS vs Tor and the world

2008-01-07 Thread Michael Holstein



and no involvement with SORBS idiots is required.


If you don't like SORBS, don't use them.

TOR doesn't try to be invisible .. if a site admin wants to block 
anonymous ($whatever) .. they're free to do so, and SORBS just makes it 
easier (the TOR dnsbl).


Statistically speaking, the volume of non-legitimate email coming from 
anonymous routers makes TOR a pretty easy target.


Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: Testing bridge capabilities

2007-12-27 Thread Michael Holstein



I've got my OR set up to be a bridge, and everything seems to be going
ok. However, I suspect that my ISP (Cox Communications) may be blocking
HTTP port 433, as I can't get a confirmation on it. 


Well geez .. that's easy .. just tell us your IP address and we'll see 
if we can telnet to port 443.


Email somebody privately if you want ONE test, email the list if you 
want several.



~Mike.


Re: another seeming attack on my server's DirPort

2007-12-19 Thread Michael Holstein



The symptom, like the last time, was that output rate on my
machine's main Ethernet interface was running steadily around the transmit
rate limit imposed by my ADSL line.
tweak as desired ... this would permit 1 connection per minute from a 
given IP. Replace (torDirPort) with whatever TCP port you're serving the 
DIR on.


iptables -A INPUT -p tcp --dport (torDirPort) -m state --state NEW -m recent 
--set --name TORdir -j ACCEPT
iptables -A INPUT -p tcp --dport (torDirPort) -m recent --update --seconds 60 --hitcount 
1 --rttl --name TORdir -j LOG --log-prefix TORdir flood
iptables -A INPUT -p tcp --dport (torDirPort) -m recent --update --seconds 60 
--hitcount 1 --rttl --name TORdir -j DROP

(adapted from a SSH bruteforce mitigation rule to do a similar thing..)

Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: Encrypted Web Pages?

2007-12-17 Thread Michael Holstein


I have what may perhaps seem like a strange question. 
Is there any commonly used software for encrypting and
decrypting web pages?  
  


Yes, SSL .. and it's been around for quite a while.


Let me explain that a little better:  imagine a web
site which has content destined for specific
individuals.  For each individual there is separate
content on separate pages, and no one but the
individual for whom the content is destined should be
able to read the content, not even the creator of the
content!
  


Why not just SSL the site, and then restrict access to it using 
certificates (still X.509, but separate from the one used for transport 
security)



In other words, is there a private/public key
mechanism similar to PGP (or even a PGP web page
plugin) that will work transparently while browsing
the web?  The transparently part would mean that a
user can provide a private key to a browser and any
pages encrypted with the user's public key would
automatically be decrypted for him when he views them.

  


Again, this can be easily provided by issuing X.509 certificates to the 
end-users and then requiring those certificates to authenticate to the 
webserver. Transport security (as it pertains to TOR, etc.) is provided 
by a separate X.509 certificate who's purpose is to sign the encrypted 
channel over which the data is transfered. You would manage the X.509 
certificates assigned to your users by yourself, so you could handle 
revolkations (although Verisign, et.al. will happily sell you a 
commercial X.509 solution for client auth).


If you had a scenario where you needed to deploy a webserver in hostile 
territory and needed to ensure the security of the data thereon, you 
could conceivably gzip and GPG each .html page and associated items with 
multiple public keys based on some other criteria (like what cert the 
browser provided) and then let the end-user decrypt it with their 
private .. but this definitely won't be automatic .. but you could 
wrap it in Java to make it somewhat portable if you wanted. You could 
also write an ActiveX or XPI plug-in to incorporate it into the browser 
.. but then you're putting a lot of trust in a 3rd party with your GPG 
keys.


~Mike.


Re: Encrypted Web Pages?

2007-12-17 Thread Michael Holstein


Despite my bias, an embedded java app 
would not work since it would be 
controlled (provided) by the hostile 
server right?
  


You could sign the applet with a key provided to your clients, since 
you're using a distribution model where you have known end-users (as you 
need their keys to encrypt the data).


My thought on Java was to be able to automate the key scheme within the 
browser, versus requiring them download a .gz.gpg file and decrypt it on 
their own. A (sort-of) working example of this is how HushMail does it 
(using Java to code the PGP stuff).


It's an interesting threat model though :)

~Mike.


Re: Encrypted Web Pages?

2007-12-17 Thread Michael Holstein


Is there a mechanism to use HTTPS to 
preencrypt web pages so that they 
are encrypted on the server (and so the 
server does not have the keys to decrypt 
them!)  


Not using HTTPS per-se, but you can use SSL to encrypt files.


My initial constraints are that once the data
is put on the server that no one except for
the intended recipient could decrypt it, 
including the original poster, server admin...


  


Or, to basically do with HTTP what GPG does with email. The original 
poster would necessarily need to have access to the plaintext, as they 
would need to encrypt it with the end-user's public keys (each of them 
individually).


I'm not a mathematician, but it can't be wise to store multiple copies 
of the same plaintext encrypted by the same cipher using different keys 
.. much crypto has historically been broken that way.



~Mike.


Re: Best Hardware for TOR server..

2007-12-14 Thread Michael Holstein



 P4 processor @ 3GHZ, Intel MB, 2GB DDR2 RAM, 80 GB SATA HD


This will be fine (more than fine, actually) .. I had no issues running 
a ~10mbit (symmetric) node on an old P3/1ghz with 1gb RAM (it was FreeBSD).



all behind a  Linksys Firewall Router.


This will be a problem. Cheap-o routers don't have enough memory to 
manage huge state tables. You'd be better off getting a second NIC card 
for the PC and just using the server to firewall/NAT your LAN, in 
addition to running TOR. If that scares you, just re-use an old PC and 
run Smoothwall on it (or any of the other many appliance distros that 
do this).



  My service provider will most likely be Comcast cable broadband.



YMMV, but Comcrap will axe you if they know you're running servers, and 
they WILL know that if you decide to run an exit, because they'll get 
lots of complaints about it. I lost count of the number of complaints 
mine generated, but I still have copies of the various subpoenas I got (*).


Good luck in any case!

Cheers,

Michael Holstein CISSP GCIA
Cleveland State Unviersity

(*): ultimately, it wasn't all the legal problems that made me take down 
our node, it was the fact that I couldn't stop folks who were stealing 
journal articles from various academic publishers that (stupidly) rely 
on CIDR subnetting to authenticate a campus.


Re: Best Hardware for TOR server..

2007-12-14 Thread Michael Holstein




I've been running a server (phrenograph) on a Comcast connection in 
the Washington, DC, area for a few months now, and I haven't heard 
anything from Comcast about it.


I guess I should have been more clear .. I ran the tor node on an 
academic network, and we have our own ASN, so there's no provider to 
complain to (but that didn't stop them from trying .. one idiot used our 
public email/phone directory to email the president of our .edu). I'm 
also the ORG-ABUSE contact on our ARIN record, and I'm the one that 
reads security@ and [EMAIL PROTECTED]


I did, however, annoy Comcast in Indiana by using honeyd to answer 
every one of their stupid FTP/HTTP probes that they were sending out 
back in the day to see if you were running servers. Again, YMMV .. but 
their TOS is pretty clear on the issue :


http://www.comcast.net/terms/subscriber.jsp

*Prohibited Uses of HSI.* You agree not to use HSI for operation as an 
Internet service provider, a server site for ftp, telnet, rlogin, e-mail 
hosting, Web hosting or other similar applications


Cheers,

~Mike.


Re: Best Hardware for TOR server..

2007-12-14 Thread Michael Holstein



Are you sure OpenWRT on a Linksys can't handle the states with 32 MBytes RAM,
and a 0.2..0.5 MBit/s upstream?
  


Yeah, but the standard store-bought WRT54G (ver 6) is only 8mb.


Linksys uses Linux (Vxworks for its more braindead types of routers which
I know nothing about), but the default firmware is pretty pathetic.

  


No they don't .. they've been using VxWorks on those standard Linksys 
boxes for quite a while. They created the WRT54GL (Linux model) which 
was basically the same hardware as earlier generation WRT54G's. The 
reason they (Linksys) changed was to save a few bucks on hardware costs 
(and because they know the Linux tinkerers will pay the extra $20).


~Mike.


Re: Spam over Tor

2007-10-25 Thread Michael Holstein



What exactly is happening? Somebody is using your Tor exit node to
access a website (yahoo mail) and using that to send spam? And this is
being traced back to you by the spam being traced back to Yahoo, and
Yahoo checking their webmail logs and finding your exit node's IP?


Look at a Yahoo! mail's headers .. the IP of the submitter (by HTTP from 
...) is in there.


I don't see how this is any different than the pwned calls (eg: hey 
dood .. somebody flamed my blog from yer server!) .. people have been 
using free porno (or whatever) to get folks to answer Yahoo/Hotmail 
catchpas for a while now .. and then using those accounts to send spam 
until Yahoo/Hotmail/etc figures it out and they move on to the next account.


Actually blocking Yahoo mail without causing other problems would 
require a fair amount of work, but could be done by proxying outbound 
traffic and filtering the specific bits of the URL that allow composing 
an email.


Re: Hello Ringo Kamens,,, Having trouble setting up TOR server behind firewall...

2007-10-25 Thread Michael Holstein

http://your.router.ip

username: blank
password: admin

Go to the advanced tab - forwarding

set up two applications, ORport, DIRport .. select TCP, select 9001 and 
9030, and point them to whatever IP you have on your linux box.


Make sure you tell TOR to advertise your external IP address via torc.

~Mike.

Hello Ringo Kamens
  Nice to hear from you, and thank you for your response. I am running 
RHEL v5, and a Linksys hardware firewall. I do not know yet how to 
configure port forwarding, am going to check with firewall settings to 
see if port forwarding is available there and confirm that I have 
entered the right IP of my RHEL system behind the firewall. I will 
reply with updated news, thanks for reply, hope ppl stay interested.,,:),,

  Algenon

*/Ringo Kamens [EMAIL PROTECTED]/* wrote:

It sounds like you haven't enabled port forwarding on your firewall.
Even if the ports are unblocked, the traffic might not go to the
server. You need to forward all traffic coming to the firewall on
ports 9001 and 9030 to your tor server.
Comrade Ringo Kamens

On 10/23/07, algenon flower wrote:
 Hello experienced TOR ppl,
 I am trying to set up a TOR server on Linux Redhat Enterprise
v5,, I am
 using a Linksys hardware firewall that does have NAT and have
modified the
 system to open ports 9001-9031. I have just installed TOR and
Vidalia for
 Redhat on my system,and, using Vidalia configured TOR ot act as
a server. My
 problem is: (TOR log below)

 
 Oct 22 20:45:19.089 [Notice] Tor v0.2.0.7-alpha (r11572). This is
 experimental software. Do not rely on it for strong anonymity.
(Running on
 Linux i686)
 Oct 22 20:45:29.624 [Notice] Tor has successfully opened a
circuit. Looks
 like client functionality is working.
 Oct 22 20:45:29.769 [Notice] Now checking whether ORPort
24.22.67.176:9001
 and DirPort 24.22.67.176:9030 are reachable... (this may take up
to 20
 minutes -- look for log messages indicating success)
 Oct 22 20:46:37.127 [Warning] eventdns: All nameservers have failed
 Oct 22 20:46:37.299 [Notice] eventdns: Nameserver 68.87.69.146
is back up
 Oct 22 20:47:29.326 [Notice] Freeing linked Socks connection
[waiting for
 circuit] with 65 bytes on inbuf, 0 on outbuf.
 Oct 22 20:54:35.222 [Notice] Freeing linked Socks connection
[waiting for
 circuit] with 65 bytes on inbuf, 0 on outbuf.
 Oct 22 21:00:39.050 [Notice] Freeing linked Socks connection
[waiting for
 circuit] with 65 bytes on inbuf, 0 on outbuf.
 Oct 22 21:05:25.858 [Warning] Your server (24.22.67.176:9001)
has not
 managed to confirm that its ORPort is reachable. Please check your
 firewalls, ports, address, /etc/hosts file, etc.
 Oct 22 21:05:25.876 [Warning] Your server (24.22.67.176:9030)
has not
 managed to confirm that its DirPort is reachable. Please check your
 firewalls, ports, address, /etc/hosts file, etc.

***

 To simplify things, I have disabled Redhat's software firewall,
to make
 sure it is not causing the problem. I am a little unsure I have
configured
 my firewall to accept traffic on ports 9001 and 9030,, I can
supply info
 from the firewall to whomever is interested in helping.
 Does anyone have any good ideas about how I can get my TOR
server up 
 what the problem is?? Love to hear,,,

 Algenon




 __
 Do You Yahoo!?
 Tired of spam? Yahoo! Mail has the best spam protection around
 http://mail.yahoo.com

 __
 Do You Yahoo!?
 Tired of spam? Yahoo! Mail has the best spam protection around
 http://mail.yahoo.com




__
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com





Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Michael Holstein


Don't forget the side effect - that the more questionable material we 
filter the more remains to be used in legal ways.


You're missing the point.

If you live under a repressive regime whereby you feel legally obligated 
to filter the exit traffic, you should be using the client, not running 
a server.




RE: exit policies (WAS: Re: Filtering traffic from your node)

2007-09-11 Thread Michael Holstein



The only problem I have with the latter is that blocking beyond IP
and/or port blocking is not handled by the directories.
  


Not only that, but the directory structure doesn't scale to those of us 
that need large exit policies.


I ran a 10MB/sec exit node at my .edu for a while, and it was ultimately 
the politics of people ripping off journal articles, accessible since we 
have a /16 netblock and that's how the journal services differentiate an 
on-campus versus off-campus user (yes, I know that's a bad idea, but 
that's how they do it) that made me shut it down.


I have thousands of IPs I'd need to block .. and it's detrimental to TOR 
to fib about what you'll exit (I tried lying via /etc/hosts, and later 
nullrouting with ipfw .. BOTH were a BAD idea, but the only thing I 
could think of).


How about this idea .. what if a TOR server could send a reply back to 
the client (via the TOR network) that says my local exit policy 
prohibits that. It could be a HTTP status code, a TCP flag, anything .. 
not as efficient as telling the client to not try in the first place, 
but better than just breaking it without notifying.


(I mention the HTTP code because that would be easy to implement in a 
proxy, and the TCP mangling because it'd be easy with NetFilter).


Performance-wise, you'd want to cache the list of nodes/can't-do's in 
memory, since you wouldn't want that stuff written to disk (ever). That 
might be the Achile's heel in my idea.


Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: Connections to botnet masters

2007-08-27 Thread Michael Holstein



Some times ago we have a thread about SORBS and many exit nodes were
listed in this DNSBL with the attribut trojan hacked. Conclusion of
the thread was: They have no glue!
  


Yeah .. well SORBS is to be taken with a grain of salt.

Google sometimes does not work with several exit nodes and give you the
message You may have a virus or malware, please clean your computer!
(or something like that).

  
As do Slashdot, Craigslist, and a bunch of others. People tend to be 
jerks when they are anonymous .. and yes, it is sort of the price you pay


Re: Ideas on increasing the significance of tor

2007-05-30 Thread Michael Holstein

Mrtg motoring of my box clearly shows what's going on with throughput
and cpu load. Thus I'm bothering this mailing list with more enhanced
multithread capabilities, taking better advantage from multiple cores.


Two ideas :

run multiple instances (and use family option), and let each instance 
handle ($X) amount of traffic. Since TOR doesn't thread itself very 
well, that's one way to do it (sort of like what you've got to do with 
Snort).


(or)

run tor using hardware crypto acceleration (it's sort-of supported, 
usually via patches to OpenSSL)


Side note to developers .. why not create one parent thread and ($n) 
worker threads (like Apache, etc. does) to solve this?




Re: ISP TOS restrictions on servers

2007-05-29 Thread Michael Holstein

Do ISPs really care about whether people run servers on residential accounts


Depends on who you ask .. but generally, as long as you pay your bill 
and you don't make them do paperwork on your behalf (eg: DMCA crapola), 
they ignore it.


do they scan ports? If so, how often? 


Again .. depends. Back when I had ComCrap (Comcast), I'd get hits on 
tcp/21 fairly often. Run your ftpd on some obscure port (better yet with 
starttls) and you'll be fine.


Will they be able to decrypt the data from a middle node? 


Not in this lifetime.

Is it worth also running a public web\ftp  server (on a different port than 80\21)? 


Always .. they don't have the patience to scan every port .. avoid the 
well-known ones and you'll be fine.



If they find out, will it be a  warning letter or termination?


Usually you get a warning first, unless they get a DMCA or some-such on 
your behalf .. then you generally get a 1-year ban from that company.


On the plus side, getting canceled by them gets you out of your contract 
agreements. Play your cards right and keep mis-spelling your name when 
you sign-up, and you can switch between cable and DSL forever.


Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: Tor nodes blocked by e-gold

2007-04-27 Thread Michael Holstein

SORBS marks TOR servers as zombie spammers I believe.


Um, in the interest of settling this argument :

grep router cached-routers |grep -v signature |awk -F   '{print host 
$3.dnsbl.sorbs.net}' |sh


(most return NXDOMAIN, meaning not listed by SORBS). The ones that do, 
return the database in which they're listed as the last octet.


  http.dnsbl.sorbs.net127.0.0.2
 socks.dnsbl.sorbs.net127.0.0.3
  misc.dnsbl.sorbs.net127.0.0.4
  smtp.dnsbl.sorbs.net127.0.0.5
  new.spam.dnsbl.sorbs.net127.0.0.6
   recent.spam.dnsbl.sorbs.net127.0.0.6
  old.spam.dnsbl.sorbs.net127.0.0.6
  spam.dnsbl.sorbs.net127.0.0.6
   escalations.dnsbl.sorbs.net127.0.0.6
   web.dnsbl.sorbs.net127.0.0.7
 block.dnsbl.sorbs.net127.0.0.8
zombie.dnsbl.sorbs.net127.0.0.9
   dul.dnsbl.sorbs.net127.0.0.10
   badconf.rhsbl.sorbs.net127.0.0.11
nomail.rhsbl.sorbs.net127.0.0.12

Of the 887 IPs I have in my cached-routers file, 709 return NXDOMAIN. 
The others :


0   http.dnsbl.sorbs.net
0   socks.dnsbl.sorbs.net
0   misc.dnsbl.sorbs.net
0   smtp.dnsbl.sorbs.net
2   *.spam.dnsbl.sorbs.net
0   web.dnsbl.sorbs.net
0   block.dnsbl.sorbs.net
0   zombie.dnsbl.sorbs.net
46  dul.dnsbl.sorbs.net
0   badconf.rhsbl.sorbs.net
0   nomail.rhsbl.sorbs.net

So, according to SORBS, they're blacklisted because they're in dynamic 
IP ranges


Cheers,

Michael Holstein CISSP GCIA
Information Security Administrator
Cleveland State University


Re: Tor nodes blocked by e-gold

2007-04-27 Thread Michael Holstein
(gaak .. make that 759 queries, 709 NXDOMAIN, and 48 that appear somehow 
.. the rest of what's below is correct).


~Mike.

Michael Holstein wrote:

SORBS marks TOR servers as zombie spammers I believe.


Um, in the interest of settling this argument :

grep router cached-routers |grep -v signature |awk -F   '{print host 
$3.dnsbl.sorbs.net}' |sh


(most return NXDOMAIN, meaning not listed by SORBS). The ones that do, 
return the database in which they're listed as the last octet.


  http.dnsbl.sorbs.net127.0.0.2
 socks.dnsbl.sorbs.net127.0.0.3
  misc.dnsbl.sorbs.net127.0.0.4
  smtp.dnsbl.sorbs.net127.0.0.5
  new.spam.dnsbl.sorbs.net127.0.0.6
   recent.spam.dnsbl.sorbs.net127.0.0.6
  old.spam.dnsbl.sorbs.net127.0.0.6
  spam.dnsbl.sorbs.net127.0.0.6
   escalations.dnsbl.sorbs.net127.0.0.6
   web.dnsbl.sorbs.net127.0.0.7
 block.dnsbl.sorbs.net127.0.0.8
zombie.dnsbl.sorbs.net127.0.0.9
   dul.dnsbl.sorbs.net127.0.0.10
   badconf.rhsbl.sorbs.net127.0.0.11
nomail.rhsbl.sorbs.net127.0.0.12

Of the 887 IPs I have in my cached-routers file, 709 return NXDOMAIN. 
The others :


0http.dnsbl.sorbs.net
0socks.dnsbl.sorbs.net
0misc.dnsbl.sorbs.net
0smtp.dnsbl.sorbs.net
2*.spam.dnsbl.sorbs.net
0web.dnsbl.sorbs.net
0block.dnsbl.sorbs.net
0zombie.dnsbl.sorbs.net
46dul.dnsbl.sorbs.net
0badconf.rhsbl.sorbs.net
0nomail.rhsbl.sorbs.net

So, according to SORBS, they're blacklisted because they're in dynamic 
IP ranges


Cheers,

Michael Holstein CISSP GCIA
Information Security Administrator
Cleveland State University



SORBS and TOR

2007-04-27 Thread Michael Holstein

Okay, I flummoxed the dnsbl .. forgot that you had to reverse the octets.

This is more like it ..

 grep router cached-routers |grep -v signature |awk -F   '{print $3}' 
|awk -F \. '{print host $4.$3.$2.$1.dnsbl.sorbs.net}' |sh


(yes, I know I probably could have done that easier with perl, just 
didn't want to think on it long)


Total queries : 892
573  NXDOMAIN
0http.dnsbl.sorbs.net
0socks.dnsbl.sorbs.net
0misc.dnsbl.sorbs.net
0smtp.dnsbl.sorbs.net
4*.spam.dnsbl.sorbs.net
68   web.dnsbl.sorbs.net
0block.dnsbl.sorbs.net
0zombie.dnsbl.sorbs.net
247  dul.dnsbl.sorbs.net
0badconf.rhsbl.sorbs.net
0nomail.rhsbl.sorbs.net

(so yes, they still block most because they're in dynamic address 
ranges, but they block a bunch as web proxies too).


I didn't test as to which ones were exits or not, so I assume most of 
the middlemen didn't get listed.


Sorry about the earlier screw-up. Mea culpa.

Michael Holstein CISSP GCIA
Cleveland State University


AHBL and TOR

2007-04-27 Thread Michael Holstein

(while we're on the subject..)

Using the same testing method, AHBL's standard dnsbl lists 14 of the 
routers, but they have a second one (tor.ahbl.org) that lists 823 of 
them (only 63 return NXDOMAIN).


It's also not rocket science to run a client (or wget the directory from 
router/tor) and parse it for the IPs.


TOR's developers have always made it clear that people can block them, 
and even has a Google SoC project to write their own dnsbl,


It was just a business decision on behalf of eGold .. I'm guessing their 
risk analysis folks looked at the fraud numbers and saw a few too many 
from addresses associated with proxies (as always, a few bad apples 
spoil the lot...).


Ironic though, since eGold's claim to fame is making anonymous payments. 
Why wouldn't they want someone to make an anonymous payment *anonymously*?


~Mike.


Re: Building tracking system to nab Tor pedophiles

2007-03-07 Thread Michael Holstein
I've seen a VM that routes all traffic over TOR, invisibly to the O/S.  
(Not sure what they do about UDP).

Developed at Georgia Tech.


One better .. TOR on OpenWRT on a Linksys router.

Tor at the *hardware* level.

~Mike.


Re: Compile error w/0.1.2.9-rc on Kubuntu 6.10

2007-03-07 Thread Michael Holstein


checking for libevent directory... configure: error:
Could not find a linkable libevent. You can specify an
explicit path using --with-libevent-dir



./configure --with-libevent-dir=/usr/local/lib

that got it working for me (also Ubuntu 6.10 here, but the gnome variety)


Re: Norwegian DNS compromized

2007-02-28 Thread Michael Holstein

Poor kids DON'T!!!


Okay .. we're seriously off-topic here, but many a person's rights are 
trampled because :


it's for the children...

There is no okay form of censorship. A spade is a spade is a spade.

If you believe in censoring this or that, under any guise, then maybe 
TOR isn't the project for you.


~Mike.


Re: Newbie's questions

2007-02-27 Thread Michael Holstein
(1) Does it mean that even when I visit unencrypted sites, nobody would 
be able to tell what sites or pages I am requesting?


Correct. As long as you're also proxying the DNS via SOCKSv4, the only 
person that could see your traffic in the clear is the folks between 
the exit node and the destination.


However .. if you do something like access your (real) Yahoo mail, 
someone could connect that traffic with the real you .. because they 
could see your name in the HTTP traffic. Thus, it's unwise to leak the 
recipe to the secret sauce, and then go check your Hotmail account all 
in the same session.


You also need to be mindful of combining your anonymous and regular 
activities .. if, for example, you allow sites to set cookies and you 
visit two sites both using DoubleClick .. that cookie will connect the 
real you and the tor you. Same goes for any website that requires 
authentication (eg: Yahoo mail, etc.). Someone could check the logs and 
say well, I see it was TOR this time, but yesterday it was Comcast.



(2) Can the green line be cracked by intercepting the packets or headers?


An attack against AES that's more effective than bruteforce is not (yet) 
known, so I'd say probably not, although TOR developers are clear to 
tell you it doesn't defend against a global adversary (eg: 
$3_letter_agencies).


(3) I don't know where the encryption key is stored. Can it be stolen if 
my pc is hacked?


The client key is in memory, so no .. unless you do something like 
suspend your laptop while TOR is running (thus writing it to disk). 
Also, it's possible to have the key written to swap accidently.


You can prevent both those problems with a liveCD distro that dosen't 
touch the hard disk. There are many such internet privacy appliances, 
my personal favorite being the one based on OpenBSD (Anonym.OS).


Other general recommendations :

Firefox (dump cookies on exit, no cache, etc)
NoScript plugin (no javascript)
FlashBlock plugin (no flash)

Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: building pages with tor in mind

2007-02-27 Thread Michael Holstein

Have a look over here :

http://gemal.dk/browserspy/

Cheers,

Michael Holstein CISSP GCIA
Cleveland State University

Bryan Fordham wrote:
on a more general note: Does anyone actually have an example of how 
javascript can compromise your anonymity? Not it can obtain your 
IP-type stuff, but actual code.


Re: building pages with tor in mind

2007-02-27 Thread Michael Holstein
I have yet to see an example of pure JavaScript code that can read an 
end-user's IP address.  Any code I've seen returns either localhost or 
127.0.0.1.


Bear in mind you need not get javascript to return the results of 
something like ipconfig /all to work .. all you need do is create a 
non SOCKS'ed connection to somewhere.


Flash is one excellent way to do that .. invoked via JS.


Re: Tor server web page?

2007-02-22 Thread Michael Holstein

Run Apache (or whatever) on the same box and follow these instructions :

http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients

specifically :

To offer your directory mirror on port 80, where apache is already 
listening, add this to your apache config:


   IfModule mod_proxy.c
   ProxyPass /tor/ http://localhost:9030/tor/
   ProxyPassReverse /tor/ http://localhost:9030/tor/
   /IfModule

Then just set the basic html page as you describe in httdocs. It's also 
a good idea to have the reverse dns say something like 
tor-anonymous-proxy.whateverdomain.com because that's the first place 
folks will look.


Cheers,

Michael Holstein CISSP GCIA
Cleveland State University

Sam Creasey wrote:

I know I've seen this discussed on here, and it's pretty much just a
FAQ at this point, but somehow my google skills are failing me...

Does anyone have a link to some example text to reply to HTTP queries
for the / page of an ip which runs *only* a tor exit server? (http://torserver/)
Something along the lines of Any traffic you've seen from this IP was
generated by a tor server.  there is nothing to see here.

Thanks.

-- Sam



Re: PHP coder needs Tor details

2007-02-12 Thread Michael Holstein

Um .. send the signal to the pid of tor?
(or do it the lazy way and do 'killall -SIGNAL tor' from the command line)

see the PidFile part of torrc. Something sensible like /var/run/tor.pid 
comes to mind ... Then just 'kill $signal $pid'.


Note : to make this work, the command that executes the SIG_WHATEVER 
will have to be either the same UID as what started TOR, or root .. a 
security concern since I'm guessing you want to do some web $foo with it 
and PHP.


Regards,

Michael Holstein CISSP GCIA
Cleveland State University

Mr. Blue wrote:

Hello,

I am new here and am trying to utilize Tor by PHP from command line.
I have read all manual and all faq but it helped me very little.

With that information I've only achived to install tor and make PHP do 
request through Tor.


Problem 1:

I start Tor by simply typing tor in command line(FreeBSD 6.x). When I 
tried to stop it by SIGNALS form Tor man pages none of them worked.
Obviously SIGNALS are not ment to be passed to Tor through command 
line(This MUST be in a man but it ISN'T!), while options with theirs 
values ARE ok if passed to Tor through command line.


So let's firstly solve this - How to start and stop Tor through command 
line?

After that I will pas question 2.

Thanks in advance!

Ipsens


Any questions? Get answers on any topic at Yahoo! Answers 
http://answers.yahoo.com/;_ylc=X3oDMTFvbGNhMGE3BF9TAzM5NjU0NTEwOARfcwMzOTY1NDUxMDMEc2VjA21haWxfdGFnbGluZQRzbGsDbWFpbF90YWcx. 
Try it now.


Re: About http request of browser.

2007-02-08 Thread Michael Holstein

True, but that's configurable in most sensible browsers.

In Firefox, check out the stuff in about:config
specifically the general.useragent.* stuff.

Better yet, get the User Agent Switcher plugin.

~Mike

devel wrote:

Hello,
In some cases when OS version or architecture are not popular, I think
that browser HTTP request can be bad for anonymity.


Re: Forwarding email ports

2007-02-05 Thread Michael Holstein

(responses inline) :


I read through the january archives on email ports, specifically 465,
587, and 995.

First, are these the ports needed to support standard secure email
(SMTP and PoP)?


Except for tcp/587 (submission), yes. 465 is smtps (smtp via SSL) and 
995 is pops (pop via SSL). tcp/587 is part of the standard exit policy 
(deny).



Second, why were there three of them for two protocols? Did I
misunderstand something?


Nope .. 587 is an alternative to 25. Unlike the other two, it's not 
encrypted.



Third, what are the implications -- both security, and legal -- if I
open these on my machine. I'm thinking in particular, that:
1. If only one exit node is outputting these ports, it becomes an
obvious snoop target -- how does that affect security?


Well, with TOR (and any anon proxy) you've got to trust the exit 
operator. This is why TOR says you should only trust it for transport, 
not end-to-end security, and you should use your own transport-layer 
security (eg: ssl, tls, ssh, ...)


2. If I'm forwarding email, am I likely to find my site blacklisted 
somewhere?


Yep .. 100%. Open proxies are an email-admin's worst friend. Exiting 
tcp/25 is a sure way to never send email again from that IP. Also, many 
websites that you probably enjoy (craigslist, slashdot, etc) have been 
hassled by tor-wielding vandals one-too-many times and will block even 
read-only access. Thus, it's wise to have the TOR box on a separate IP 
(that you'll never-ever need again .. the one we used here -- 5.13 -- a 
year ago is still blocked a number of places).



3. Am I likely to get some sort of Cease and desist letter, or other
legal hassle, for this?


Maybe .. but those are easy to respond to. A standard I'm a TOR exit.. 
email usually does the trick. See the archives for examples .. I've 
posted one (SXW format) that has worked for $3_letter_agency subpoenas.



4. Since my machine has about 22K/s bandwidth, how likely is it that I
will be badly backlogged / overtargetted?


Set the BandwidthMax and Min to appropriate values and sleep easy.

Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: Fwd: EZZI.net Abuse Warning

2007-01-24 Thread Michael Holstein
Here's the boiler plate I use for such things (137.148.5.13 was 
previously the exit-node router csutor). You should obviously 
's/137.148.5.13/your.ip.address/g':


--snip--

137.148.5.13 is an anonymous proxy that's part of the TOR network. You
can learn more about TOR at http://tor.eff.org.

We are unable to assist you in tracing the source of this attack, but it
did not originate from us -- TOR requires all traffic traverse three
onion routers in physically separate locations -- 137.148.5.13 just
happened to be the exit node for this particular session.

You're welcome to block 137.148.5.13 as you see fit. There are also
several free sites that assist in dynamic (DNSBL) blocking of TOR if you
so desire -- one is http://www.ahbl.org. TOR developers also make
available a Python script : http://tor.eff.org/cvs/tor/contrib/exitlist
which can obtain the IP addresses of all TOR exit nodes, given a copy of
the current directory : http://belegost.mit.edu/

Please let me know if I can be of further assistance.

Regards,

Michael Holstein CISSP GCIA
IST Information Security
Cleveland State University


xiando wrote:

Subject: EZZI.net Abuse Warning
Date: Tuesday 23 januar 2007 22:39
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]

[EMAIL PROTECTED]

Regarding Server Main IP: 66.199.236.130

We got a notice from the Undernet IRC Network about a number of servers on
 our network making suspicious connections to their network, your server
 appears to be one of those boxes. It appears whoever caused this hacked the
 servers by brute forcing SSH logins and uploading a fake httpd binary and
 launching it.

Please look into this matter immediately, if you need help feel free to open
 a trouble ticket. It is also suggested you check your servers password
 policy and make sure your passwords are secure. We suggest at least 6
 characters, uppercase and lowercase letters and numbers.

We thank you in advance for your swift cooperation in this important matter.


Thank you,
EZZI.net Support Team

---

I got multiple copies of this (I have more than one Tor exit server).

There are - apparently - bad people on the Internet (no shit). It is likely 
the first time EZZI.net has got a (very much likely) Tor-related abuse 
complaint. 

Please share any view on how to respond to EZZI.net about some person on the 
Internet hacking some box on the Internet using Tor (which seems to be why 
EZZI.net wants me to explain myself).


Thanks.



Re: more letters from the feds

2007-01-11 Thread Michael Holstein
However, I don't know what that -HUP is about. 


man signal

(-HUP is 'hangup' .. )


Re: Opening 2 Firefox profiles |was: Re: Tor and Thunderbird: Outgoing Email Unsafe?

2007-01-03 Thread Michael Holstein

It's easy.

Start your first instance of firefox as usual. Start the second one like 
this : /path/to/firefox -ProfileManager and create a new profile (call 
it TOR, or whatever). You'll need to reinstall plugins (eg: FoxyProxy, 
NoScript, etc) under that new profile, but the settings are separate 
from your normal one.


Then just set up a shortcut to involke the second instance using the 
-ProfileManager switch, and select the 2nd profile.


GeorgeDS wrote:

On Tue, 2007-01-02 at 13:23, Michael Holstein wrote:
The reason I suggested seperate Firefox profiles is you can have the 
anonymous one and a regular one open at the same time, since routing 
everything through TOR makes your highspeed connection more like dialup 
(there's always a trade-off...).


If you could tell me how to do do this I'd really appreciate it. This
may vary with OS. I've tried multiple times on Linux (CentOS/Red Hat
Enterprise 3.4) and not succeeded. Once one or more Firefox windows are
open, the -ProfileManager flag does not appear to be recognized, so I've
been unable to find a way to get copies of Firefox using different
profiles to open at the same time. It's a real nuisance to have to close
a dozen tabs, to do a few things with Tor.

Thanks.

George Shaffer




_
Get now your FREE e-mail! http://freemail.1net.gr
Live your Myth in Greece! http://www.gotogreece.gr
Register Domains for $9.5/year! http://www.aegeas.net
Hosting 100mb only $2.5/mo! http://www.hostingkey.com



Re: Opening 2 Firefox profiles

2007-01-03 Thread Michael Holstein
I'm on Linux 2.6.17 (Ubuntu), and the -ProfileManager switch works fine 
for me, regardless of what windows are open.


Did you check the box always ask which profile when starting firefox 
the first time you created the 2nd profile?


~Mike.

George Shaffer wrote:

It may be easy on your system but not mine. I've read this works on
Windows. My experience is that it does not on Linux.

I've used -ProfileManager with firefox on the path, with the entire
explicit path to firefox, and switching to the firefox directory and
using ./firefox. I've tried this on Linux, CentOS 3.3 and 4.4, which
should be functionally identical to Red Hat Enterprise Linux 3.3 and
4.4. I've even cut and pasted -ProfileManager from the Firefox Help: How
To Manage Profiles page to assure I was spelling and capitalizing it
correctly. The 3.3 system is much older but fully patched. The
-Profilemanager switch has never worked once any Firefox window is open.
On the 3.3 system, I have three quite different profiles, including one
specific to Tor, that I can switch between, but I've never succeeded in
opening two Firefox windows using different profiles at the same time.

If there is anyone who has solved this problem on a similar **Linux**
system, I'd like to know how.

Thank you,

George Shaffer

On Wed, 2007-01-03 at 08:51, Michael Holstein wrote:

It's easy.

Start your first instance of firefox as usual. Start the second one like 
this : /path/to/firefox -ProfileManager and create a new profile (call 
it TOR, or whatever). You'll need to reinstall plugins (eg: FoxyProxy, 
NoScript, etc) under that new profile, but the settings are separate 
from your normal one.


Then just set up a shortcut to involke the second instance using the 
-ProfileManager switch, and select the 2nd profile.


GeorgeDS wrote:

On Tue, 2007-01-02 at 13:23, Michael Holstein wrote:
The reason I suggested seperate Firefox profiles is you can have the 
anonymous one and a regular one open at the same time, since routing 
everything through TOR makes your highspeed connection more like dialup 
(there's always a trade-off...).

If you could tell me how to do do this I'd really appreciate it. This
may vary with OS. I've tried multiple times on Linux (CentOS/Red Hat
Enterprise 3.4) and not succeeded. Once one or more Firefox windows are
open, the -ProfileManager flag does not appear to be recognized, so I've
been unable to find a way to get copies of Firefox using different
profiles to open at the same time. It's a real nuisance to have to close
a dozen tabs, to do a few things with Tor.

Thanks.

George Shaffer




Re: Tor and Thunderbird: Outgoing Email Unsafe?

2007-01-02 Thread Michael Holstein
Most exit nodes disallow port 25 (smtp) because NOT doing so would make 
TOR a spammer's paradise. If you know a relay-server that runs smtps or 
uses an alternate smtp port, use that.


Cheers,

Michael Holstein CISSP GCIA
Cleveland State University.

Job wrote:

Hello,

I just got Tor to be safer online and used the Tor-button to 
automatically confugure Firefox and Thunderbird for Tor.
In Thunderbird however I have to exclude the server I use to SEND emails 
from being handled by Tor.


Maybe I am wrong but doesnt this defeat the whole purpose of Tor? Cause 
if my outgoing email is not handled by Tor the receives can still see my 
IP and all the other data and so can easely identify me.
The most essential thing is to have the outgoing emails handeled by Tor 
so the receiver can see my private information right?


How do I set thunderbird in such a waythat the receiver of my emails 
wont be able to trace me or see my private info(IP etc etc)?







Re: Tor and Thunderbird: Outgoing Email Unsafe?

2007-01-02 Thread Michael Holstein
So if i use a web based email and use firefox with Tor to access it with 
my normal settings(the settings that I always use when i use the 
Internet) so not a totally separate profile.The receiver still wont be 
able to trace me right? 


Well .. sort of. The problem is cookies from the likes of doubleclick. 
You run the risk of having them re-check an existing cookie and seeing 
your real IP as well as your TOR ip. Would somebody subpoena 
doubleclick because you sent your boss a shitty email? probably not, but 
then again, doubleclick sells your personal info to anyone that can 
cough up an account number.


on my own computer they have nothing to do with any info the receiver of 
email might be able to get from the header or whatever of the email i 
sent, am i correct?


Receiver of email, no .. but cookies are managed by 3rd parties (and 
bear in mind that many 3rd party cookies (yahoo, for example) are used 
for customization of your page and are also read during a mail session 
-- so you run the risk of Yahoo knowing your real IP as well as your TOR 
one by identifying the UID in the cookie, and what IP accessed it. You 
can use the same browser for regular and anonymous browsing, but only 
have one window/tab open, go to about:blank and clear 
cookies/cache/sessions, then fire up tor and do your email. When done, 
kill tor, close all but one window/tab, clear cookies/cache/sessions 
from the about:blank page, and resume normal activities.


The reason I suggested seperate Firefox profiles is you can have the 
anonymous one and a regular one open at the same time, since routing 
everything through TOR makes your highspeed connection more like dialup 
(there's always a trade-off...).


Some web based email services,like mail.com if i am not mistaken, give 
you the option to download a little prog that warns you when a new 
emailis in.
Does this affect my anonymity? I suppose it does as the server from 
mail.com will connect to my comp to tell me there is a new message. On 
the other hand, if I use tor enabled firefox wouldn't that connection 
also be anonymous?


Depends. If that little program has SOCKS v4a support, then it'll work 
fine with TOR. Most of them only support a HTTP proxy though, which TOR 
is not (although you can use it with other programs to make it work). I 
say this because I have personally assisted in investigations where 
something like weatherbug (which broadcasts a unique ID) has positively 
identified a user, despite their use of a proxy.


If you just want to send a few anonymous emails here and there, I'd look 
into one of the many internet privacy appliances that are 
boot-from-cdrom operating systems that are totally locked down and route 
everything through TOR.


~Mike.


Re: Tor and Thunderbird: Outgoing Email Unsafe?

2007-01-02 Thread Michael Holstein

Here's another idea ... gmail allows SMTP via SSL (smtps on tcp/465).

You've got to authenticate for in/out (meaning google account) but you 
can get one of those anonymously. They do POP via SSL as well (pop3s on 
tcp/995). Combine the two and you've got a functional client.


This should help you out .. (applies to Outlook, but Thunderbird would 
use same settings in different places) :


http://mail.google.com/support/bin/answer.py?answer=13278query=smtptopic=type=fctx=search

Cheers,

~Mike.

Job wrote:

Tanks Mike for your fast and helpful replies

I am not that worried about traces of activities left on my computer. I 
just want to be sure receivers of email wont be able t see my IP and stuff.
So if i use a web based email and use firefox with Tor to access it with 
my normal settings(the settings that I always use when i use the 
Internet) so not a totally separate profile.The receiver still wont be 
able to trace me right? I understand that for complete security I should 
make a new browser profile so the cookies wont mix. but as cookies are 
on my own computer they have nothing to do with any info the receiver of 
email might be able to get from the header or whatever of the email i 
sent, am i correct?


Some web based email services,like mail.com if i am not mistaken, give 
you the option to download a little prog that warns you when a new 
emailis in.
Does this affect my anonymity? I suppose it does as the server from 
mail.com will connect to my comp to tell me there is a new message. On 
the other hand, if I use tor enabled firefox wouldn't that connection 
also be anonymous?


last question: Why cant I access the account without Tor?(safety wise i 
mean). As long as i dont send any emails to anyone isnt it safe? I 
understand my ISP and mail.com will be able to trace me but not 
receivers of emails as I am not sending any at that moment.






Michael Holstein schreef:
ps: am i correct that if i use a webbased email account(for example 
gmail) without pop3 and I use (Torified)Firefox to acces it I CAN 
send emails out without the receiver being able to see my personal IP 
etc?
I dont mind of they se my email address ofcourse as they need that to 
reply to me, just dont want them to be able to view my info.


Yes. TOR and (yahoo|hotmail|gmail|$whatever) is an anonymous way to go 
about it. Just make sure you use a totally separate browser profile 
(eg: start firefox with -ProfileManager) as to not cross-contaminate 
cookies, etc. and do everything regarding that email account -- 
including signup -- using TOR, and never access it outside of TOR, nor 
access anything else with that browser profile.


~Mike.





Re: suggestion for 'is my installation of tor working?' page

2006-12-19 Thread Michael Holstein

what about http://www.showmyip.com

It will tell you if you're using a TOR node (and which one, as well as 
its exit policy)


~Mike.

Robert Hogan wrote:

Hi all,

http://lefkada.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1
https://tns.nighteffect.com/
https://torstat.xenobite.eu/

All of the above provide useful information for the first-time tor user. But 
the last two are only really meaningful to initates (and probably confusing 
to everyone else), while the first is reassuring but could really offer a 
little more.


What is needed (IMVHO) is a page that confirms you are using tor successfully, 
but also introduces you to the other services that tor offers and also some 
advice for the tor debutante. A sort of official or unofficial 'welcome to 
the tor network' page. This could be linked to in the FAQ/INSTALL and used by 
controllers/front-ends.


Would the maintainers of any of the above be interested in providing such a 
thing? Given that the heavy lifting has already been done on all of the 
above, it would be very trivial to create. Would there be an appetite for 
such a thing on the tor homepage itself?


Suggestions for content:

* A warm greeting!
* Top Five things all tor users should know
* Appeal for users to run servers and link to how-to
* An introduction to some hidden services

Anyway, just a thought...

Robert




Re: Stephen Soghoian on U.S. Gov't Attitudes Toward Tor

2006-11-30 Thread Michael Holstein

What about the Department of the Navy that initially funded it?  I
wonder if it was pointed out in these meeting that it was the DoD that
wanted this in the first place through the Office of Naval Research
and DARPA?


Simple. It's okay for them to be sneaky to avoid *US* (the citizens) 
from knowing what they're up to, but *NOT* okay when we try to hide from 
them.


TINFOIL HAT
It's the .. you shouldn't mind if we're listening if you don't have 
something to hide... mentality that I've been told from many an $agency.

/TINFOIL HAT

Keep in mind these are the same folks that think we should keep 
subscriber records for 3 years (and give them a key to our wiring 
closets) but stall like crazy when they get a FOIA request.


~Mike.


Re: setup tor in private intranet

2006-11-30 Thread Michael Holstein

i am new to tor and was wondering if it is possible to setup tor in a private 
intranet without gateways to the internet?  i have to
assume it is, but where would i find documentation and code to build such a 
system?


Yep .. just setup your own DirServer. See : 
http://tor.eff.org/tor-manual.html.en


(excerpt):

DirServer [nickname] [v1] address:port fingerprint
Use a nonstandard authoritative directory server at the provided 
address and port, with the specified key fingerprint. This option can be 
repeated many times, for multiple authoritative directory servers. If 
the v1 option is provided, Tor will use this server as an authority 
for old-style (v1) directories as well. (Only directory mirrors care 
about this.) If no dirserver line is given, Tor will use the default 
directory servers: moria1, moria2, and tor26. NOTE: this option is 
intended for setting up a private Tor network with its own directory 
authorities.


Cheers,

~Mike.


Re: hijacked SSH sessions

2006-10-17 Thread Michael Holstein
There have been various TOR exit nodes that have been behaving badly 
lately (check the tor-talk list) .. some are doing frames, popups, etc 
.. there is a list of bad nodenames somewhere on that list (can't find 
it at hand..)


Personally, I wouldn't use any exit node in China .. use the 
ExcludeNodes part of your torrc.


~Mike.

Taka Khumbartha wrote:

today i have had several attempted man in the middle attacks on my SSH 
sessions.  i am not sure which exit node(s) i was using, but the MD5 hash of the 
fingerprint of the spoofed host key is:

4d:64:6f:bc:bf:4a:fa:bd:ce:00:b0:8e:c9:40:60:57

and it does not matter which host i connect to, the MD5 hash presented it 
always the same.

just a heads up



Re: Tor Defense Fund...an idea.

2006-09-11 Thread Michael Holstein

I agree that being behind someone else's firewall is a problem as the
user may not understand the implications of this and thus advertise an
impossible exit policy.


Suggestion for the coders .. make the client test itself and adjust the 
exit policy on the fly.


Re: Exit Node sniffing solution...an idea...

2006-08-21 Thread Michael Holstein
 4. A couple dozen _fast_ 24x7 exit nodes are run by
 trusted operators (read: known personally by Nick or
 Roger) on a local machine the operators control.

The $3_letter_agency would just *love* to have a dozen places (or 2
people) they already know about to serve the subpoenas.

 7. All Tor traffic exits from these .EXIT.onion nodes.

Again .. you've just defined where to wiretap.

The beauty of TOR is that anybody, anywhere can setup an exit node. The
design of the network allows an operator to sniff the exit, but still
can't tell where it came from. If you're using TOR, you shouldn't be
using your name in the first place (what's the point of *anonymously*
identifying yourself?).

I know there are other arguments for TOR like defeating geolocation, but
if that's all you're after, there are easier ways to do it (like just
rent a shell account somewhere and use SSH redirection).

/mike.


Re: My ExcludeNodes list...post yours

2006-08-18 Thread Michael Holstein
 Depending on what constitutes authentication (and encryption).  If the
 encryption adds integrity to the authentication (if not there already)
 and prevents an eavesdropper from being able to trivially learn what
 is needed to masquerade as you, then it has value against adversaries
 not sophisticated enough or motivated enough for stream
 hijacking. Good enough for many purposes. But in principle and
 for more sensitive usage your point is well taken, thus worth raising.

You need not stream-hijack .. you can cookie-jack (like in Yahoo's case
.. would give you 24hr access) .. then you look through old mail to see
who else somebody does business with, request password-resets be emailed
to you, and viola! You're in.

If you use TOR 24x7, I'd suggest judicious use of FoxyProxy's rules to
ensure traffic that you'd rather be secure than anonymous just use your
own ISP (why pass a message through 3 strangers when you don't have any
desire to deny you sent it?).

Alternately, you can use FoxyProxy to *only* annonymize some things
(like your Google searches). /. published an article on this a week or
so ago.

~Mike.


Re: Can governments block tor?

2006-08-14 Thread Michael Holstein
 what prevents government from running Tor (exit) points and sniffing
 exit (incoming) traffic on them?

Nothing .. but the incoming traffic (between nodes 2 and 3) would be TLS
and encrypted.

(this is what I thought was happening when I saw a .cn exit node)

~Mike.


Re: Sending mail through TOR/Socks

2006-07-17 Thread Michael Holstein

what about configuring your SMTP/POP3 port to something else?


Sure .. if you can find a MTA that will do that (and of course you could 
always set one up, but that'd totally defeat the purpose of trying to 
hide the path).


Really, you're better off with tools like Mixmaster. The alternative is 
you could (using TOR) setup a Hotmail or Gmail account, and then (also 
using TOR) use one of the various Perl modules that offer an interface 
to those and send it that way.


Note that both limit the number of messages/day.

~Mike.


Re: DNS Server question

2006-07-14 Thread Michael Holstein

There is no way in Windows to redirect all DNS queries over Tor
at a system level yet.  Only at an application level.


You can use TorDNS to accomplish that.

http://sandos.ath.cx/~badger/tordns.html

/mike.


Re: Easy Firefox hacks to improve anonymity (HTTPS Header Scrubbing)

2006-05-24 Thread Michael Holstein

Why not just install the User Agent Switcher plugin for firefox?

http://releases.mozilla.org/pub/mozilla.org/extensions/user_agent_switcher/user_agent_switcher-0.6.8-fx+fl+mz.xpi

Does the same thing on the fly.

~Mike.

Anothony Georgeo wrote:

---

*CONCEPT*

There has been bit of dicussion latley about filtering
HTTP/S environmental variable headers and creating a
default HTTP/S header template for Tor users.

The last big hurdle (now solved) in header scrubbing
is the scrubbing of HTTPS headers.  


I think the solution is to use Firefox or FF
extensions to filter the HTTPS headers as FF and FF
extensions have access to the verifed and decrypted
HTTPS headers on-the-fly by default.

I will describe how to edit the about:config menu
and  how to configure the FF extensions User Agent
Switcher and RefControl.

The goal is to enable HTTPS header scrubbing while
using the *same* anonymity set charastics as those
which may be used by future relases of Tor bundled
with Privoxy (using the default template).
http://archives.seul.org/or/talk/May-2006/msg00327.html

For example, FF and FF extensions should make the
HTTPS headers identical the HTTP headers created by
Privoxy.  Thus inceasing the anonymity set and
everyone's anonymity in general.

The anonymity set that I am attempting to use is as
follows:

A. User-Agent: 
Mozilla, Windows XP, 128-bit encryption, English

(non-localized), Firefox.

-
Mozilla/5.0 (Windows; U; Windows NT 5.1; en;
rv:1.7.10) Gecko/20050716 Firefox/1.0.5
-

B. Referer(Referrer):
Is set to the root (home page) of the site you are
currently visiting (eg.http://www.example-root.com;).



I think it is wise to use {forge} for the template
Referer setting.  If we use a real domain with the
{custom} paramiter it may get Tor in trouble with the
real domain's owners.  I am pretty sure we can not use
{block} as it breakes many sites.

Note: 
HTTPS referrer from one HTTPS URL directly to another

HTTPS URL is set to {block} incase RegControl can not
properly handle these headers.  This is because I have
not tested (and I don't know) HTTPS to HTTPS referrer
headers.  


-Questions:
-Can 'referer' {custom} be set to a fake URL without
breaking sites?
- 'referer' {forge} will generate random headers for
Tor users, will this increase anonymity set?

C. Keep-Alive:
Close

D. Compression:
Prevented

E. X-Forwarded-for:
Not removed or spoofed as FF does not have this
capibility.  Besides, the entry node removes your real
X-Forwarded-for: header and it already has your real
IP.

F. Ping:
FF will supress the Ping function in HTTP/S.

---

**PROOF**
(More testing required)

1. Results from HTTPS (eg. SSL) envrionmental variable
test at
http://www.stilllistener.com/checkpoint1/ssi/


REMOTE_ADDR:
149.9.0.21

HTTP_ACCEPT:
text/xml,application/xml,application/xhtml+xml,
text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5

HTTP_ACCEPT_CHARSET:
ISO-8859-1,utf-8;q=0.7,*;q=0.7

HTTP_ACCEPT_ENCODING:
gzip;q=0,deflate;q=0,compress;q=0

HTTP_ACCEPT_LANGUAGE:
en-us,en;q=0.5

HTTP_CONNECTION:
close

HTTP_COOKIE:
$1

HTTP_HOST:
www.stilllistener.com

HTTP_REFERER:
http://www.stilllistener.com/

HTTP_USER_AGENT:
Mozilla/5.0 (Windows; U; Windows NT 5.1; en;
rv:1.7.10) Gecko/20050716 Firefox/1.0.5



2. Results from HTTP envrionmental variable test at
http://www.stilllistener.com/checkpoint1/test2/


REMOTE_ADDR:
64.74.207.50

HTTP_ACCEPT:
text/xml,application/xml,application/xhtml+xml,
text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5

HTTP_ACCEPT_CHARSET:
ISO-8859-1,utf-8;q=0.7,*;q=0.7 
 
HTTP_ACCEPT_ENCODING:

gzip;q=0,deflate;q=0,compress;q=0

HTTP_ACCEPT_LANGUAGE:
en-us,en;q=0.5

HTTP_CONNECTION:
close

HTTP_COOKIE:

$1

HTTP_HOST:

www.stilllistener.com

HTTP_REFERER:

http://www.stilllistener.com/

HTTP_USER_AGENT:

Mozilla/5.0 (Windows; U; Windows NT 5.1; en;
rv:1.7.10) Gecko/20050716 Firefox/1.0.5




---

**Directions**

--
Note:

I will attached the settings for Privoxy's
user.actions file which mirror those here in my next
post in this thread.
--



1. 
Start Firefox




2. 
Type this into the URL bar and hit [enter]: 


about:config



3. -HTTPS Referrer-
http://kb.mozillazine.org/Network.http.sendSecureXSiteReferrer

3a. Copy/paste the following line into the Filter:
bar:

network.http.sendSecureXSiteReferrer

3b. Right click on the title and choose toggle
ensure the 'Value' entry reads False.

{false} = Don't send the Referer header when
navigating from a https site to another https site.



4. -Keep-Alive(proxy connection)-
http://kb.mozillazine.org/Network.http.proxy.keep-alive

4a. Copy/paste the following line into the Filter:
bar:

Network.http.proxy.keep-alive

4b. Right click on the title and choose toggle
ensure the 'Value' entry reads False.

{false} = Never use keep-alive connections.



5. -Keep-Alive-
http://kb.mozillazine.org/Network.http.keep-alive

5a. Copy/paste the following line into the Filter:
bar:


Re: TOR on Academic networks (problem)

2006-05-17 Thread Michael Holstein

iptables -t nat -A POSTROUTING -p tcp -d ip of journal --dport 80 -j DNAT
--to-destination ip of you webserver


FreeBSD here, but I'll try something along those lines.


Still, I would also agree that rejecting *:80 would be the best until
this IP as authentication issue is resolved.


Since the /etc/hosts approach posions the DNS for clients, it now seems 
the better (although not ideal) approach is to allow legitimate DNS 
lookups, and then just blackhole the traffic. After 15 seconds, the 
client will give up and pick another node.


In reality, what I should do is just get a new /24 and put all the 
potentially bad stuff in there. Only problem is it'd be a subassignment 
since ARIN dosen't do a /24, and that gives people a higher place to 
complain. At least now, there's nobody besides us that folks can fuss at 
(unless they want to try and whine to our routing peers and get laughed at).


In ~6 months of running an exit, this is the first time this has ever 
been an issue .. so it hardly seems worth the effort .. but the 
potential for getting into hot water involving the contracts with 
publishers means I've got to do something.


grr

/mike.


Re: TOR on Academic networks (problem)

2006-05-17 Thread Michael Holstein

Thus making Tor suck for everyone.  The better approach would be to just
say reject *:80 or reject *:* or something like that.  Your node is
still useful as a middleman and wouldn't actively harm clients.


Everyone how? .. it'd just affect people trying to access a specific set 
of academic journals through TOR, and only for 15 seconds or so until it 
picked another node.


Academic networks represent a large portion of the TOR servers, and 
because of the way these journals operate, we all have this problem.


Either allow the ExitPolicy to be longer somehow, or change the program 
so the basic routing policy is published, and allow each server to 
have a more specific one that is checked only when someone's using that 
exit -- to say no, I don't allow that specific site, pick another node.


/mike.


TOR on Academic networks (problem)

2006-05-16 Thread Michael Holstein

I'm sure this has happened to others, but here goes on my problem.

Many academic networks have a variety of online journals they subscribe 
to (like thousands of them) .. most allow campus-wide use restricted 
only by IP address, usually the whole /16 or greater.


This of course presents a problem when you have a TOR router in that 
/16. Sometimes the admin at the journals will understand that TOR is 
just one of those 65k+ IP addresses and block that, and sometimes they 
get into a snit and say they'll block the whole /16.


Since we can't put thousands of lines in the exit policy without causing 
a cascading problem, what about null-routing them .. either by putting 
entries in /etc/hosts that will be denied by the exit policy (thus 
causing the client to pick another exit -- but not preventing access 
directly by IP address), or the more secure, but more problematic, 
blocking by changing the kernel routing tables to send those networks 
into a blackhole on the TOR router.


The first approach causes a minimal problem performance-wise since the 
client will choose a new path. The second will cause timeouts and 
significantly impact performance.


Problem is, if these sort of issues persist, most of our institutional 
support will evaporate -- so I'm going to have to do something.


I really don't want to hear about censorship, et.al. because I already 
know that's what it is, and don't have a problem admitting it. What I 
want is viable solutions to the problem.


Any suggestions?

Regards,

Michael Holstein CISSP GCIA
Cleveland State University


data remanence (was: Some legal trouble with TOR in France)

2006-05-14 Thread Michael Holstein

 There are methods (and they are used) to read data from a overwritten
 disk.

Has anyone tried creating a (ro) flash-boot linux system for TOR with 
all the (rw) stuff mounted in RAM ?


Such a device would raise the bar quite a bit, no? (AFIK, there is no 
data remanence problem with DRAM .. unless $they can stop the clock and 
keep power applied).


(seeing the $agency come in with a UPS and trying to splice the A/C 
without shutting it off, and then carrying out the server on battery 
power conjures up memories of a certian Seinfield episode).


/mike.


Re: [off topic] Configuring an IP blind Apache server

2006-05-01 Thread Michael Holstein

It seesm like there should be a way to plub in privoxy or something,
but I can quite think how.  Any suggestions or pointers?


Wouldn't it just be easier to edit your httpd.conf to change the log 
format to *not* log the IP address?


eg : take out the %h (for the IP address)

LogFormat %l %u %t \%r\ %s %b common

Complete docs :

http://httpd.apache.org/docs/1.3/logs.html#accesslog

Perhaps I'm missing something, but if all you want to do is have an 
Apache server that dosen't log what comes in, there are much easier ways 
than using Privoxy (et.al.) to do it.


Cheers,

Michael Holstein CISSP GCIA
Cleveland State University


Re: [off topic] Configuring an IP blind Apache server

2006-05-01 Thread Michael Holstein

The idea is a system wide solution that allows any user group to
install any semi-random PHP/MySQL frob without having to hack around
trying to find and disable its IP logging.


Then do as Dan just suggested and forward it using your firewall .. 
advantage there is you can still ban a user if you see the need by 
inserting the appropriate DENY rule above your forward one.


Note that other things in your network may still log the traffic 
though .. (most hardware firewalls, for example) .. so be sure you know 
what the end-to-end security is at least as far as your perimeter router.(*)


/mike.

(*): well .. unless you use ATT as an ISP, since we know they forward 
everything to the ($3_letter_agency) anyway.


Re: Weird behavior of my server

2006-04-27 Thread Michael Holstein
Bridged will work if you have an extra IP for the VM. NAT will also 
work, but you need to modify the config to make it aware of it's 
external address (and configure vmware-natd to forward 80/443).


~Mike.

Landorin wrote:

Okay, I'll try that out, thanks.
I just ran into another problem: the orport appears to be unreachable.
I really don't know how the connection works in VMWare environments.
Do I have to forward the orport to the VMWare IP or to my Windows IP?
Also, does it need bridged, NAT or host-only mode in VMWare?

Michael Holstein schrieb:


Okay, I just tried out a different orport and now the server
starts up. So somehow either port 443 is blocked already by
something else or it's because the permission is denied (since
it's a blank Ubuntu I guess it's the permission thing). Anything
I can do about it?


netstat -apn |grep 443 (as root) lsof |grep 443 (as root)

either one will tell you what process is binding to 443. My guess
is Apache. Try killall httpd (as root) and then try again. Also
try (path might vary) /etc/rc.d/rc.httpd stop

~Mike.






--
Accelerate cancer research with your PC:
http://www.chem.ox.ac.uk/curecancer.html

GPG key ID: 4096R/E9FD5518


Re: Firefox through Tor

2006-04-27 Thread Michael Holstein

So the problem is that a motivated adversary can subpoena or simply
ask DoubleClick to hand over their IP/cookie logs. If you are using
Tor for /everything/, then what they get from DoubleClick for that
email address is just a Tor IP, no harm no foul. However, if the user
had set up a filter that only sends *yahoo.com through Tor, then
DoubleClick will have their /real IP/ on file in association with
whatever unique ID yahoo passed for that email address, even though
yahoo's records show only the Tor IP.


Swichproxy (as well as CTRL+SHIFT+DEL) in Firefox will clear all cookies.

Anytime you switch between TOR/Direct you should close down to all but 
one blank window, clear cookies/cache one way or another, and *then* 
proceed.


/mike.


Re: Firefox extension: TorButton

2006-03-10 Thread Michael Holstein

SwitchProxy lets you manage and switch between *multiple proxy
configurations* quickly and easily. You can also use it as an anonymizer
to protect your computer from prying eyes.


Main bummer about that is it's a global setting. I wish I could control 
the proxy settings per TAB, not globally -- since if you've got Hotmail 
(or whatever) open when you switch, you've just advertised your identity 
associated with your new (tor) IP address.


Remember to close everything before you switch (and turn on the option 
to clear cookies in SwitchProxy).


~Mike.