Re: Is "gatereloaded" a Bad Exit?
mi nt wrote: > On Mon, Jan 31, 2011 at 08:39:29PM -0500, Gregory Maxwell wrote: > The chances of having your traffic logged by malicious operators, known or > unknown, allowing traffic on 443 or not, can be minimized by not using > Tor. > Just saying! :-) > > -- > m...@sdf.lonestar.org > SDF Public Access UNIX System - http://sdf.lonestar.org > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > The chances of having your traffic logged by anyone, known or unknown, allowing traffic on 443 or not, can be minimized by not using Internet! :) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Is "gatereloaded" a Bad Exit?
Mike Perry wrote: > Thus spake morphium (morph...@morphium.info): > >>> Do you have a rational reason why we should allow people to carry the >>> unencrypted version of a service but not the encrypted one, other than >>> "Well, they could be bad actors even with a good policy!" >> As I stated above, it's not a good idea to BadExit them, because it >> puts more load on the servers, that DO support https i.e. - and makes >> them slower. >> Those weren't 10K/s Nodes you blacklisted there, they've been really >> fast Exit Nodes. >> And I don't see ANY point in BadExit'ing 5 "random" Nodes, suggesting >> that no one could capture your unencrypted traffic now. >> >> This is just further slowing down the whole Tor-Network. > > This is not true. The exit nodes in question account for ~6% of the > network Exit-flagged bandwidth. That is, *IF* they actually had the > Exit flag (they did not), they would have provided 6% of that > bandwidth. They do not have the Exit flag, however, so they provide > 0%. > How is it possible that they configured their nodes as exits and defined their exit policies but those nodes didn't work as exits in practice? Are those nodes misconfiured? So, how those can sniffing exit-traffic? But I can confirm that somedays ago I have used oompaloompa and oompaloompa2 for connecting to the LiveJournal. I know it becouse their ip (and an ip of Olaf's node too) was banned by the LJ team as "bots" and I sent to the LJ team report for unblocking that ips as belonging not to bots but to exit-nodes of the Tor. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Is "gatereloaded" a Bad Exit?
morphium wrote: > 2011/1/31 Olaf Selke : >> I disagree Morphium's position mainly for the same reasons Mike and Jake >> already pointed out. If the operators really care about their nodes >> they'll certainly contact Tor admins. Damaging Tor's reputation in the >> public due to exit sniffing imo is much more worse than loosing some >> bandwidth. > > Sniffing is worse than loosing bandwidth, right. But sniffing still > occurs, we just don't know where. And we can't tell wether they did. > I think concluding "only 80: he is sniffing" is wrong (and even would > be "80 and 443: he is a good guy"). > And if those nodes really are ran by "the bad guys", I don't think > it's a problem for them now to setup a new node on a new subnet that > allows their old ports + 443 and continue sniffing. > > I can not see the Tor project won _anything_ with this decision. > > morphium > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > And, then, it seems to me that it is no a big problem to exclude packages with encrypted information from sniffing logs for people who setting up nodes for that evil purposes. But, in the other side, it seems to me that guys which set up so such fast nodes are not full lamers. And they probably can read this mailing list and are able to answer us, am I wrong? As concern to me, if I read some bad about my nodes here I will write something to answer, no? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Is "gatereloaded" a Bad Exit?
Damian Johnson wrote: > The five relays Mike mentioned have been flagged as BadExits [1]. > Adding them to your ExcludeExitNodes isn't necessary. -Damian > > [1] https://trac.torproject.org/projects/tor/wiki/badRelays > > On Sun, Jan 30, 2011 at 1:33 AM, Jan Weiher wrote: >>> At some point, we intend to shrink exit policies further as Tor scales >>> to more decentralized schemes. Those exit policies will likely be >>> represented as bits representing subsets of ports. When that time >>> comes, we will very likely combine encrypted and unencrypted versions >>> of ports together, removing this option entirely. >>> >> Sounds good. But what to do for now? Just creating a list of nodes which >> only allow unencrypted traffic and put them into the ExcludeExitNodes >> list? Shouldnt these nodes be excluded by default? >> I'm unsure. I want to stress again that I'm not saying any operator is >> doing anything evil, but I think we should find some way to avoid nodes >> which have such weird exitpolicies. >> >> best regards, >> Jan >> *** >> To unsubscribe, send an e-mail to majord...@torproject.org with >> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ >> > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Is it possible to publish a list of bad-exits for copypasting it to /etc/torrc in addition to the above-mentioned list? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor 0.2.2.22-alpha is out
Roger Dingledine wrote: > Tor 0.2.2.22-alpha fixes a few more less-critical security issues. The > main other change is a slight tweak to Tor's TLS handshake that makes > relays and bridges that run this new version reachable from Iran again. > We don't expect this tweak will win the arms race long-term, but it will > buy us a bit more time until we roll out a better solution. > > Anybody running a relay or bridge who wants it to work for Iran should > upgrade. > > https://www.torproject.org/download/download > > Changes in version 0.2.2.22-alpha - 2011-01-25 > o Major bugfixes: > - Fix a bounds-checking error that could allow an attacker to > remotely crash a directory authority. Bugfix on 0.2.1.5-alpha. > Found by "piebeer". > - Don't assert when changing from bridge to relay or vice versa > via the controller. The assert happened because we didn't properly > initialize our keys in this case. Bugfix on 0.2.2.18-alpha; fixes > bug 2433. Reported by bastik. > > o Minor features: > - Adjust our TLS Diffie-Hellman parameters to match those used by > Apache's mod_ssl. > - Provide a log message stating which geoip file we're parsing > instead of just stating that we're parsing the geoip file. > Implements ticket 2432. > > o Minor bugfixes: > - Check for and reject overly long directory certificates and > directory tokens before they have a chance to hit any assertions. > Bugfix on 0.2.1.28 / 0.2.2.20-alpha. Found by "doorss". > I installed it in the morning of yesterday or in the morning of the day before yesteray on my debian exit node. How can I do it before this release? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Is "gatereloaded" a Bad Exit?
Mike Perry wrote: > Thus spake Eddie Cornejo (corn...@gmail.com): > >> Forgive my ignorance but this seeks rather knee-jerk to me. Maybe I'm >> missing something. > > Yeah, I believe you're missing the fact that these ports also contain > plaintext passwords than can be used to gain access to information on > these and other accounts that may or may not have ever traveled over > tor. That is the difference. > And what is a difference in using the Tor and not using the Tor when you don't use SSL? Only that in the last time your password etc. can see your ISP or governmental systems like european "Echelon", Russian "SORM" and etc. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Is "gatereloaded" a Bad Exit?
Gregory Maxwell wrote: > On Sat, Jan 29, 2011 at 9:56 PM, grarpamp wrote: > > Instead, I think that nodes which exit _only_ to the unencrypted > version of a service (e.g. 80 but not 443) should be excluded from > operating as exits entirely (except as enclaves). In this way these > nodes would be force to "pay their way". We can't stop them from > sniffing, but at least we can make them carry traffic they can't sniff > as part of the cost of doing their evil business. They could do things > like severely throttle encrypted traffic, but that is activity that > testing could detect. > Where I can read what it means "a bad exit"? Earlier I thought that it is and exit which works wrong in something. And I thought that them excludes from routing. But I pereodically can see that my client establish connections through bad exits. Have I to need do something from preventing it for protection of my anonimity? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Is "gatereloaded" a Bad Exit?
grarpamp wrote: >> I dont see how to recognize if the traffic is recorded? > > I know people who record exit traffic, lots of it. And they > do all sorts of things with it too. Does that news trouble > you? If so, you need to readjust your thinking. > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Is it a serious problem if some of owners of tor-nodes record the exit traffic? It seems to me that the Govermental bodies can do it instead of them and they probably do it in such countries as the US or Germany and etc. If the first is serious problem, why the last is not one? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Is "gatereloaded" a Bad Exit?
Jan Weiher wrote: > > > Of course these ports are popular, but 443 is popular as well? So for me > it looked like "pick all the popular _unencrypted_ ports". > > best regards, > Jan > > > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Maybe the owner of that node is just only a lamer? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Anybody use n900?
Does anybody describe their expirience in using nokia n900 and Tor under it? Is it possible to make more than one ordinary users on it? Is the iptables of it fully functionary? Is it possible transparently torify such users via iptables on it? Is it possible to change by software mac-address, IMEI of it? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
How can I increase my bandwidth?
I am operating 2 tor-servers: one under FreeBSD and other under Debian Lenny. Their parameteres: 1. uname -a 8.1-STABLE FreeBSD 8.1-STABLE #0 r34M: Wed Nov 24 10:02:09 IRKT 2010 RAM 512 Mb CPU 1GHz r...@freebsd8-amd64.ispsystem.net:/root/src/sys/amd64/compile/ISPSYSTEM amd64 Tor v0.2.2.20-alpha OpenSSL 0.9.8n 24 Mar 2010 non-exit node 2. uname -a Linux 2.6.18-028stab070.4-ent #1 SMP Tue Aug 17 19:03:05 MSD 2010 i686 GNU/Linux RAM 786432 kB CPU 502.313 MHz Tor version 0.2.2.20-alpha OpenSSL 0.9.8g 19 Oct 2007 exit-node As it can be shown from the Tor Statistics the bandwidth of the first node is more that one of the second: http://torstatus.blutmagie.de/router_detail.php?FP=c82e893bbe859e01a9bb38517ff6b3f91493560d http://torstatus.blutmagie.de/router_detail.php?FP=2ce7d7703c7679f0bbe711668ff0923ffcf8997f What can be a cause of that and how can I increase the bandwidth of my Debian node? P.S. I have set the next setting in the '/etc/tor/torrc' of both of them: RelayBandwidthRate 200 KBytes RelayBandwidthBurst 400 KBytes *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Gmail saying "cookies are turned off" but they are not
Praedor Atrebates wrote: > I am using my usual tor button + firefox to access a gmail account. I have > generally had no problems but lately I try to log in and get a "cookies are > turned off" and that I need to turn them on. > > Cookies are NOT turned off, they are set to be treated as session cookies and > they get wiped whenever I shut off firefox. Perhaps there is a setting > hidden away somewhere that I can check, whether in the tor button settings or > firefox? > > I periodically have such probolem. It is very intresting what is causes of it. Sometimes it resolves after some preriod of time by oneself (I don't know how and why; deleting of cashe usually doesn't take any effect); sometimes I need to delete all my user's profile of my browser to resolve it. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: blutmagie law enforcement inquiry stats
Olaf Selke wrote: > On 11.01.2011 11:15, Matthew wrote: >> What does this mean? > > sorry, I meant I didn't visit countries with oppressive regimes during > the last three years. Don't know if they'd like me entering their > country even when coming in peace as a tourist. > > Olaf > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > And what are those countries? And what they did? Refuse your requests for visa or deport you in spite of giving a visa earlier? Or threaten you of your arrest? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: blutmagie law enforcement inquiry stats
Olaf Selke wrote: > On 11.01.2011 11:15, Matthew wrote: >> What does this mean? > > sorry, I meant I didn't visit countries with oppressive regimes during > the last three years. Don't know if they'd like me entering their > country even when coming in peace as a tourist. > > Olaf > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > And what are those countries? And what they did? Refuse your requests for visa or deport you in spite of giving a visa earlier? Or threaten you of your arrest? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: blutmagie law enforcement inquiry stats
Olaf Selke wrote: > Am 10.01.2011 20:42, schrieb Roc Admin: >> This is interesting. Could you detail time consumed in resolving the >> requests and any problems you ran into with authorities? > > this morning arrived the first fax in 2011 requesting user data. Police > is back again from Xmas vacation ;-) > > Using my template composing the answer and sending it thru a fax machine > usually takes less than 15min. I never did run into difficulties with > police so far. However I'm not sure what will happen at certain > country's airport immigration. > > In most cases the police officers are quite polite and almost happy to > close their file cause the trace ends. I suppose it's much more easy to > deal with law enforcement if you appear 25 times a year on police's > radar than only once. At least they tend to believe my words. > > regards Olaf > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Do they describe causes their requests? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Best Hidden Service web server?
Dirk wrote: > Jerzy Łogiewa wrote: >> What is the best web server for hidden service? Are any containing exploits >> that can reveal IPs, or maybe even in the 404 pages etc? >> >> -- >> Jerzy Łogiewa -- jerz...@interia.eu >> > > http://www.acme.com/software/thttpd/ > http://www.acme.com/software/mini_httpd/ > http://www.acme.com/software/micro_httpd/ (~200 lines of code) > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Is it a bad idea to use an apache for a hidden serice? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor and google groups
Moritz Bartl wrote: > Hi, > > Am 05.01.2011 20:37, schrieb Matthew: >> Have you tried this in Spain? In Madrid the shop photocopied the back >> page of my passport. > > Germany introduced an electronic ID recently. In the revised laws they > made clear that leaving the ID as deposit, or having it photocopied, is > illegal. The new ID carries a personal identifier printed on it that > "should only be known to the bearer". > > [Source: > http://www.heise.de/newsticker/meldung/Deine-wichtigste-Karte-Vom-Umgang-mit-dem-neuen-Personalausweis-1133588.html > ] That is a very bad practice breaking anonymity and human rights. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor and google groups
G-Lo ☠ wrote: >> I am under the impression that in most countries you have to show ID >> which is copied to obtain a SIM? This was my experience in Spain for >> example. > > In France, anyone can buy a phone with a SIM card usable immediately, in > any tobacco shop, without the need to show an ID. > > > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > It seems as very good and democratic laws and practice. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor and google groups
forc...@safe-mail.net wrote: >> I am under the impression that in most countries you have to show ID >> which is copied to obtain a SIM? This was my experience in Spain for >> example. > > Yes in Western Europe it is so. But there are many countries were SIM cards > are just sold in the streets without any requirements. Former USSR, many > countries in Asia, some in Africa, etc. > Is it very difficult to buy a SIM without showing ID in the USA or countries of Western Europe? Sorry for such off topic but it is very interesting to know are there any countries in Western Europe or states of the USA when it is possible to buy a SIM without showing your ID with accordance to local law? >>> Maybe you should start up a gmail activation service! Or at least for >>> us here in the group! > > > I do it already for some friends but the point is that with the phone number > I would be able to enter the account and change the password, read emails > etc. Not that good for privacy, people who do not know me should not accept :) > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > You can do it on a paying basis not only as an enthusiast which assists for all paranoids in the World :) And it will be a good idea, if I am not wrong, to do it not at your home but only at public places - restaraunts, cafes, bars and etc. for an Adversary cannot reseach where are you live and who you are. And if you have many such clients it seems your anonymity will be high. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor and google groups
M wrote: >> Yes, but I have a nice collection of SIM cards from various countries... >> Every time I travel (twice a month at least) I bring back some SIM cards for >> this kind of "work"... >> > > Maybe you should start up a gmail activation service! Or at least for us > here in the group! > It will be fine :) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor in German media (27c3)
Eugen Leitl wrote: > On Tue, Jan 04, 2011 at 05:55:09PM +0100, Moritz Bartl wrote: > >> Most people run "as many exit nodes as they want" without even having a >> lawyer in the first place. It is not an illegal service at all. >> >> For the future, it might be a good idea to form a lose network of >> lawyers/funds that openly promise legal help to ANY Tor node operator. >> In Germany, both Chaos Computer Club and German Privacy Foundation >> promise to fight for the right of Tor node operators in case something >> big hits them. In the US, EFF made a similar promise. > > That is good to know. Unfortunately, finding an exit-sympathetic > hoster will be more of a problem. Hetzner e.g. seems to tolerate > middlemen but not exits, as they're abuse-driven. > I operate 2 nodes of the Tor both in Germany. Fistly, I set up one of them, the OrionTorNode as an exit, but I had some problems with my vds provider and turn it in the middlemen regim. After that I rented a new vds from a vds provider listing in the Tor blog as frendly to the Tor and set up on it an exit node OrionTorNode1 that works fine to that days. My provider received an abuse in late of December concerning using my tor-exit for torrenting but after I informed them that I reconfigured my /etc/tor/torrc they was fully satisfied and did not requre me stop my exit-node such their colleaques - staff of the vds provider of my first node. But it will be very good to set up an exit node without any restrictions of exit policy. If anyone could recommend me an offshore vds provider which is rigid to any abuses and which prices are not very expensive I would be thankful. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
test
test *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
Jon wrote: > > On Wed, Dec 29, 2010 at 10:38 AM, The Doctor wrote: >> >> > > I then tried again with a German exit, and had no problems. Since I > > don't speak German very well, I had to guess some, but it went thru > > with out any captcha.. > > > > Am wondering if it is only with a US exit or if it is happening on > > other country exits? > > > > Jon > > *** > > To unsubscribe, send an e-mail to majord...@torproject.org with > > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > > I have tried to creat gmail-accounts with Netherlands and German exits and have had problems: the Google required sms-verification. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
Jon wrote: > On Wed, Dec 29, 2010 at 10:38 AM, The Doctor wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> On 12/29/2010 08:38 AM, Orionjur Tor-admin wrote: >> >>> I heard that many times from differen people but I cannot creat any >>> gmail account without asking sms-verification about 2 or 3 years... And >>> tried do it many times >> For what it is worth, I just tried, and was unsuccessful in the attempt. >> I had to answer a CAPCHA (which is not a big deal) but was then >> confronted with a request to receive either a text message or a phone >> call. Sorry - that is a deal breaker. >> >> - -- >> > > I tried also, and had to do a captcha and this is what the next page said: > > Verify your account > You're almost done! We just need to verify your account before we can > create it. > > Account verification helps with: > Preventing spam: we try to verify that real people, not robots, are > creating accounts. > Recovering account access: we will use your information to verify your > identity if you ever lose access to your account. > Communication: we will use your information to notify you of important > changes to your account (for example, password changes from a new > location). > Unless you explicitly tell us to do so, your phone number will never > be sold or shared with other companies, and we will not use it for any > purpose other than during this verification step and for password > recovery and account security issues. In other words, you don't have > to worry about getting spam calls or text messages from us, ever. > > For more information, please read our frequently asked questions. > Verification Options > Text Message > Google will send a text message containing a verification code to > your mobile phone. > Voice Call > Google will make an automated voice call to your phone with a > verification code > > > I then tried again with a German exit, and had no problems. Since I > don't speak German very well, I had to guess some, but it went thru > with out any captcha.. > > Am wondering if it is only with a US exit or if it is happening on > other country exits? > > Jon > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Thanks for the information, I would know it. About a half of a year I tried to create a gmail account from my real ip but have had such result (asking for verification). After that I decided that it is a general rool of the Google to do it, but - with according to you information, my decision was wrong. It seems to me that it very difficult to find out why and when they require that. Thanks for that information again. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
How does a ftp-server log real ip-address of client machine?
I usually connect to my servers through the Tor. When I connecting with them through ssh or sffp I don't find any serious in logs of my server except ip--addresses or names of apropriate exit-nodes of the Tor. But when I connect with them through ftp immediate (without ssh) I can see real ip-addresses of my client's machine such the next: proftpd[32816] someuser (anonymizer2.torservers.net[174.36.199.200]): Refused PORT 192,168,1,5,203,191 (address mismatch) As I understand if my machine would not be behind NAT and have 'white' ip-address my anonimity would be compromised. How does a ftp-server log real ip-address of client machine? And how I can avoid it? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
Bjarni Rúnar Einarsson wrote: > On Wed, Dec 29, 2010 at 7:37 PM, Orionjur Tor-admin < > tor-ad...@orionjurinform.com> wrote: > >> Aleksandr wrote: >>> On 12/29/2010 12:34 PM, Moritz Bartl wrote: >>>> Hi, >>>> The Tor Hidden Wiki lists a few other free email services offering >>> HTTPS at: >>>> http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email >>> The link above returns nothing. >> It opens on my machine. It seems that it could be very useful information. >> > > Silly thing to say on this list, but if not on Tor, you can try > http://kpvz7ki2v5agwt35.tor2web.com/wiki/index.php/Email :-) > Thanks *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
Andrew Lewman wrote: > On Wed, 29 Dec 2010 14:02:34 -0500 > grarpamp wrote: > >>> We've generally suggested gmail because their bulk account creation >>> process was good. It seems this is not the case any more. >> What is this bulk account creation you speak of? > > Gmail used to have the ability to stop bots from creating accounts en > masse. gmail doesn't have this ability any more. > >>> This is false. I just created a gmail account via tor without >>> needing a phone number or any other information. >> Hmm, you mean "just", as in today? What exit were you using? >> Want to sell the account for bitcoins? Kidding :-) > > As in around 08:45 AM EST. I didn't look to see which exit, it just > worked, just a captcha required. > > I have tried to creat a gmail account some minutes ago and the Google requred sms-verification. I have used 'anonymizer6.torservers.net' with ip-address 174.36.199.203 located in the US. For creating account I have used an Iceweasel 3.0.6 with TB v. 1.2.5. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
Aleksandr wrote: > > > On 12/29/2010 12:34 PM, Moritz Bartl wrote: >> Hi, > >> The Tor Hidden Wiki lists a few other free email services offering > HTTPS at: >> http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email > > > The link above returns nothing. It opens on my machine. It seems that it could be very useful information. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
Praedor Atrebates wrote: > Interesting. I have a fully anonymous email from gmail (about 1 yr old) that > I created via tor and it required no call, no text message, nothing, just a > captcha. I have had several other accounts created at gmail previous to > this, also created via tor, and have not had any issue or > privacy/anonymity-violating issues. > > Have they changed something very recently? > > praedor > When did you do it? I have some accounts created through such method about 3 - 4 years ago, not later. And one of them they required activate though sms after about 2 years of using!!! *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
The Doctor wrote: > On 12/29/2010 08:38 AM, Orionjur Tor-admin wrote: > >> I heard that many times from differen people but I cannot creat any >> gmail account without asking sms-verification about 2 or 3 years... And >> tried do it many times > > For what it is worth, I just tried, and was unsuccessful in the attempt. > I had to answer a CAPCHA (which is not a big deal) but was then > confronted with a request to receive either a text message or a phone > call. Sorry - that is a deal breaker. > *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ Last years I always have such problem. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
and...@torproject.org wrote: > On Wed, Dec 29, 2010 at 03:42:00AM -0500, grarp...@gmail.com wrote 0.9K bytes > in 15 lines about: > : Keep in mind that google does not allow new accounts to be > : created via Tor. Unless you are willing to give up your phone > > This is false. I just created a gmail account via tor without needing a > phone number or any other information. > > Frequently, google's > anti-ddos/spam/too-many-creations-from-a-single-ip-address detector > is tripped for tor exit nodes and requires other information. > > We've generally suggested gmail because their bulk account creation > process was good. It seems this is not the case any more. > I heard that many times from differen people but I cannot creat any gmail account without asking sms-verification about 2 or 3 years... And tried do it many times *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor & Email?
Roger Dingledine wrote: > On Tue, Dec 28, 2010 at 08:57:24PM -0500, Alek wrote: >> I'm curious- in what way can Tor be used for emailing? When someone is >> connected to the Tor network is there email routed along the Tor network >> too? Or, does it go through their the normal connection with their ISP? > > The only recommended way to use email with Tor is to use web mail, > e.g. https connections to gmail. > > Periodically people ask about using Thunderbird or the like. The problem > is that client-side applications that compose and deliver email could > leave identifying features in the mail headers they generate, or in the > application-level data while interacting with remote mail servers. Nobody > has investigated what would be needed to write a Torbutton equivalent > for Thunderbird. > > To answer what might be your more immediate question, you may be > confused about Tor when you say "when someone is connected to the Tor > network". Only applications that have been specifically configured > to use Tor will send their traffic over Tor. See point 'a' at > https://www.torproject.org/download/download.html.en#warning > > --Roger > > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Hello Roger, As I know sometimes ago there were plans of the Tor developers to make TB for Thunderbird, am I wrong? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: My vds was blocked
Runa A. Sandvik wrote: > On Wed, Dec 29, 2010 at 9:40 AM, Orionjur Tor-admin > wrote: >> I had set up a tor exit-node on my vds. It worked about 5 month but now >> I have received a messages about blocking my vds on the grounds of >> receiving an abuse report (attached). >> My vds-provider is one from the list of "good" providers from the list >> published on the tor blogs. >> What do you, people, can reccomend me to do?! > > I suggest you read > https://www.torproject.org/docs/faq-abuse.html.en#TypicalAbuses > What do you think about the next exit-policies: ExitPolicy accept *:20-21 ExitPolicy accept *:22 ExitPolicy accept *:80 ExitPolicy accept *:110 ExitPolicy accept *:443 ExitPolicy accept *:465 ExitPolicy accept *:563 ExitPolicy accept *:587 ExitPolicy accept *:993 ExitPolicy accept *:995 ExitPolicy accept *:5222 ExitPolicy accept *:5223 ExitPolicy accept *:5224 ExitPolicy accept *:6660-6667 ExitPolicy reject *:* Could it be seriously abusive for any reasons? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: My vds was blocked
Runa A. Sandvik wrote: > On Wed, Dec 29, 2010 at 9:40 AM, Orionjur Tor-admin > wrote: >> I had set up a tor exit-node on my vds. It worked about 5 month but now >> I have received a messages about blocking my vds on the grounds of >> receiving an abuse report (attached). >> My vds-provider is one from the list of "good" providers from the list >> published on the tor blogs. >> What do you, people, can reccomend me to do?! > > I suggest you read > https://www.torproject.org/docs/faq-abuse.html.en#TypicalAbuses > It seems to me that I did wrong including the record 'ExitPolicy accept *:32768-65535' in /etc/tor/torrc. But I cannot understand why the abusing port was 8080? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
My vds was blocked
I had set up a tor exit-node on my vds. It worked about 5 month but now I have received a messages about blocking my vds on the grounds of receiving an abuse report (attached). My vds-provider is one from the list of "good" providers from the list published on the tor blogs. What do you, people, can reccomend me to do?! RE: Unauthorized Distribution of the Copyrighted Television Series Entitled Navy: NCIS Dear Abuse Department: We are writing this letter on behalf of the relevant subsidiaries of CBS Corporation. We have received information that an individual has utilized the below-referenced IP address at the noted date and time to offer downloads of copyrighted television programs through a \"peer-to-peer\" service, including such title(s) as: Navy: NCIS The distribution of unauthorized copies of copyrighted television programs constitutes copyright infringement under the Copyright Act, Title 17 United States Code Section 106(3). This conduct may also violate the laws of other countries, international law, and/or treaty obligations. Since you own this IP address (87.118.93.143), we request that you immediately do the following: 1) Remove or disable access to the individual who has engaged in the conduct described above; and 2) Take appropriate action against the account holder under your Abuse Policy/Terms of Service Agreement. We also would request that you inform the individual who engaged in this conduct that legitimate copies of CBS content are widely available for viewing online, for example on www.cbs.com and many other sites that participate in the CBS Audience Network. On behalf of CBS, owner of the exclusive rights in the copyrighted material at issue in this notice, we hereby state that we have a good faith belief that use of the material in the manner complained of is not authorized by CBS, its respective agents, or the law. Also, we hereby state, under penalty of perjury, that the information in this notification is accurate and that we are authorized to act on behalf of the owner of the exclusive rights being infringed as set forth in this notification. Please direct any end user queries to the following: copyrigh...@mediasentry.com Please include the Case ID 1299490088, also noted above, in the subject line of all future correspondence regarding this matter. We appreciate your assistance and thank you for your cooperation in this matter. Your prompt response is requested. Respectfully, D. Brewer Enforcement Coordinator Peermedia Technologies -- INFRINGEMENT DETAIL Infringing Work: Navy: NCIS First Found: 25 Dec 2010 04:32:46 EST (GMT -0500) Last Found: 25 Dec 2010 04:32:46 EST (GMT -0500) IP Address: 87.118.93.143 IP Port: 8080 Protocol: BitTorrent Torrent InfoHash: 1DDBDCF0740A2E164A2A4B82AA4463B48E86B327 Containing file(s): NCIS.S08E09.HDTV.XviD-LOL.[VTV].avi.torrent (366,560,986 bytes)
Web-page of Tor-status
How can I set up a web-page of Tor-status like this: http://torstatus.blutmagie.de/ ? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: [notice] Circuit build measurement period of 218915ms is more than twice the maximum build time we have ever observed. Capping it to 152350ms.
Roger Dingledine wrote: > On Sat, Dec 04, 2010 at 07:00:17AM +0000, Orionjur Tor-admin wrote: >> I have the above record in '/var/tor/log' on my exit-node. >> What it can mean?! > > Tor clients build circuits when they first start up, to estimate the > average amount of time it takes to build a circuit. Once they have a good > estimate, they abandon the slowest 20% of the circuits they make, since > a circuit that takes a long time to build will probably be no fun to use. > > Your circuit build times appear to be really crummy. Your Tor has > estimated that the 80% mark for you is 219 seconds. But in fact, the > slowest circuit you've actually created took only 152 seconds. I believe > this situation can occur when many of the circuits your Tor tries to > make fail to get created at all. > > Are you rate limiting your exit node? Perhaps you should start. It seems > like your network is really overloaded. > > --Roger > > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > I rated limiting my node the following: BandwidthRate 200 KBytes BandwidthBurst 400 KBytes And some times ago it works time. But that time it permanently crashes, I cannot understand why. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
[notice] Circuit build measurement period of 218915ms is more than twice the maximum build time we have ever observed. Capping it to 152350ms.
I have the above record in '/var/tor/log' on my exit-node. What it can mean?! *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Tor-node failed
Last time my tor-node regularry fails. How can I debug causes of it? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
RIPE bloks some tor-nodes
whois xxx.xx.xxx.x % This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See http://www.ripe.net/db/support/db-terms-conditions.pdf %ERROR:201: access denied for 192.251.226.206 % % Sorry, access from your host has been permanently % denied because of a repeated excessive querying. % Please see http://www.ripe.net/db/err201.html % for more information. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Server periodically failed, my script unworkable
I have a tor-node under my vds on FreeBSD 8.1-STABLE and I have a record "tor_enable="YES" in my /etc/rc.conf. But I have periodically a problem when my tor-server unexpectedly stop and don't restart. As I think, if my ISP restart their physicla machine or etc. (and my vds) so the tor-daemon on my vds must start through that record, no? So I wrote such script: #!/bin/sh # tormail.script # checking of existing tor-daemon in system # and mail to me if not if [ -f /var/run/tor/tor.pid ] && [ -s /var/run/tor/tor.pid ] ; then : else /etc/rc.d/tor start || exim tor-ad...@orionjurinform.com < /root/tormail.alarmmessage fi I want it to start tor if it doesn't work or if it impossible to send me message. and include it in my crontab, but it don't works. It (and that record in my crontab) exist about 2 month and don't works. I cannot understand why. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor 0.2.2.16-alpha is out
Roger Dingledine wrote: > Tor 0.2.2.16-alpha fixes a variety of old stream fairness bugs (most > evident at exit relays), and also continues to resolve all the little > bugs that have been filling up trac lately. > > https://www.torproject.org/download.html.en > > Packages will be appearing over the next few days or weeks (except > on Windows, which apparently doesn't build -- stay tuned for an > 0.2.2.17-alpha in that case). > > Changes in version 0.2.2.16-alpha - 2010-09-17 > o Major bugfixes (stream-level fairness): > - When receiving a circuit-level SENDME for a blocked circuit, try > to package cells fairly from all the streams that had previously > been blocked on that circuit. Previously, we had started with the > oldest stream, and allowed each stream to potentially exhaust > the circuit's package window. This gave older streams on any > given circuit priority over newer ones. Fixes bug 1937. Detected > originally by Camilo Viecco. This bug was introduced before the > first Tor release, in svn commit r152: it is the new winner of > the longest-lived bug prize. > - When the exit relay got a circuit-level sendme cell, it started > reading on the exit streams, even if had 500 cells queued in the > circuit queue already, so the circuit queue just grew and grew in > some cases. We fix this by not re-enabling reading on receipt of a > sendme cell when the cell queue is blocked. Fixes bug 1653. Bugfix > on 0.2.0.1-alpha. Detected by Mashael AlSabah. Original patch by > "yetonetime". > - Newly created streams were allowed to read cells onto circuits, > even if the circuit's cell queue was blocked and waiting to drain. > This created potential unfairness, as older streams would be > blocked, but newer streams would gladly fill the queue completely. > We add code to detect this situation and prevent any stream from > getting more than one free cell. Bugfix on 0.2.0.1-alpha. Partially > fixes bug 1298. > > o Minor features: > - Update to the September 1 2010 Maxmind GeoLite Country database. > - Warn when CookieAuthFileGroupReadable is set but CookieAuthFile is > not. This would lead to a cookie that is still not group readable. > Closes bug 1843. Suggested by katmagic. > - When logging a rate-limited warning, we now mention how many messages > got suppressed since the last warning. > - Add new "perconnbwrate" and "perconnbwburst" consensus params to > do individual connection-level rate limiting of clients. The torrc > config options with the same names trump the consensus params, if > both are present. Replaces the old "bwconnrate" and "bwconnburst" > consensus params which were broken from 0.2.2.7-alpha through > 0.2.2.14-alpha. Closes bug 1947. > - When a router changes IP address or port, authorities now launch > a new reachability test for it. Implements ticket 1899. > - Make the formerly ugly "2 unknown, 7 missing key, 0 good, 0 bad, > 2 no signature, 4 required" messages about consensus signatures > easier to read, and make sure they get logged at the same severity > as the messages explaining which keys are which. Fixes bug 1290. > - Don't warn when we have a consensus that we can't verify because > of missing certificates, unless those certificates are ones > that we have been trying and failing to download. Fixes bug 1145. > - If you configure your bridge with a known identity fingerprint, > and the bridge authority is unreachable (as it is in at least > one country now), fall back to directly requesting the descriptor > from the bridge. Finishes the feature started in 0.2.0.10-alpha; > closes bug 1138. > - When building with --enable-gcc-warnings on OpenBSD, disable > warnings in system headers. This makes --enable-gcc-warnings > pass on OpenBSD 4.8. > > o Minor bugfixes (on 0.2.1.x and earlier): > - Authorities will now attempt to download consensuses if their > own efforts to make a live consensus have failed. This change > means authorities that restart will fetch a valid consensus, and > it means authorities that didn't agree with the current consensus > will still fetch and serve it if it has enough signatures. Bugfix > on 0.2.0.9-alpha; fixes bug 1300. > - Ensure DNS requests launched by "RESOLVE" commands from the > controller respect the __LeaveStreamsUnattached setconf options. The > same goes for requests launched via DNSPort or transparent > proxying. Bugfix on 0.2.0.1-alpha; fixes bug 1525. > - Allow handshaking OR connections to take a full KeepalivePeriod > seconds to handshake. Previously, we would close them after > IDLE_OR_CONN_TIMEOUT (180) seconds, the same timeout as if they > were open. Bugfix on 0.2.1.26;
Re: Google and Tor.
Mike Perry wrote: > > This should be fixed in Torbutton 1.2.6. > Hello Mike, When you plan to release it? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: After upgrading a stable Tor-version to alfa Tor-version fingerprint of node was changed? (was $keyid of my server)
Orionjur Tor-admin wrote: > Roger Dingledine wrote: >> On Sun, Aug 22, 2010 at 01:56:59PM +, Orionjur Tor-admin wrote: >>> Oh, sorry, $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4 is an old >>> fingerprint of my node named "Orion Tor Node", my current fingerfrint is >>> another (after upgrading a stable Tor-version to alfa). >>> Is it normal that after upgrading a stable Tor-version to alfa >>> Tor-version fingerprint of node was changed? >> No, it's not normal. >> >> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Iwanttoupgrademovemyrelay.HowdoIkeepthesamekey >> >> What package, which OS, how did you upgrade, etc? >> >> --Roger >> >> *** >> To unsubscribe, send an e-mail to majord...@torproject.org with >> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ >> > > FreeBSD 8.1-STABLE (vds under FreeBSD-jail). > The first package was tor-0.2.1.25. > After deinstalling it the fingerprint was changed as I see from > /var/log/tor. > I upgrade it to tor-Tor 0.2.2.13-alpha. > I don't strictly remember how, it was in the beginning of May 2010 and I > found that problem only today, but I thinks that I deinstall the first > version through make deinstall in the suitable directory in /usr/ports > and install the new version through make install in the another > directory in /usb/ports referring to the new version. > Today I upgrade my version of the Tor to 0.2.2.15-alpha and my > finderprint didn't change. > Maybe it was because I the first remove my stable tor-package at all and > install alfa tor-package over again? > Now I have upgrade it through portupgrade, not through make deinstall /make install *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: After upgrading a stable Tor-version to alfa Tor-version fingerprint of node was changed? (was $keyid of my server)
Roger Dingledine wrote: > On Sun, Aug 22, 2010 at 01:56:59PM +0000, Orionjur Tor-admin wrote: >> Oh, sorry, $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4 is an old >> fingerprint of my node named "Orion Tor Node", my current fingerfrint is >> another (after upgrading a stable Tor-version to alfa). >> Is it normal that after upgrading a stable Tor-version to alfa >> Tor-version fingerprint of node was changed? > > No, it's not normal. > > https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Iwanttoupgrademovemyrelay.HowdoIkeepthesamekey > > What package, which OS, how did you upgrade, etc? > > --Roger > > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > FreeBSD 8.1-STABLE (vds under FreeBSD-jail). The first package was tor-0.2.1.25. After deinstalling it the fingerprint was changed as I see from /var/log/tor. I upgrade it to tor-Tor 0.2.2.13-alpha. I don't strictly remember how, it was in the beginning of May 2010 and I found that problem only today, but I thinks that I deinstall the first version through make deinstall in the suitable directory in /usr/ports and install the new version through make install in the another directory in /usb/ports referring to the new version. Today I upgrade my version of the Tor to 0.2.2.15-alpha and my finderprint didn't change. Maybe it was because I the first remove my stable tor-package at all and install alfa tor-package over again? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
?fter upgrading a stable Tor-version to alfa Tor-version fingerprint of node wa s changed? (was $keyid of my server)
Orionjur Tor-admin wrote: > Orionjur Tor-admin wrote: >> Olaf Selke wrote: >>> Am 19.08.2010 17:49, schrieb Orionjur Tor-admin: >>>> After I write there MyFamily >>>> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB >>>> I have the next errors output when I reatart my Tor daemon: >>> prepend each fingerprint with a $ sign. Once I made the same mistake. >>> The docs afaik doesn't mention it. Here's my exit nodes' config option: >>> >>> MyFamily >>> $6297B13A687B521A59C6BD79188A2501EC03A065,$67EC84376D9C4C467DCE8621AACA109160B5264E,$66CA87E164F1CFCE8C3BB5C095217A28578B8BAF,$7B698D327F1695590408FED95CDEE1565774D136 >>> >>> Olaf >>> *** >>> To unsubscribe, send an e-mail to majord...@torproject.org with >>> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ >>> >> Very thanks, your advice was useful, the problem was resolved on its base. >> > > > Now I have seen to the statistics and find the next: > 1) there are both my nodes in the item "Family" in the statistics of the > first of them : > http://torstatus.blutmagie.de/router_detail.php?FP=c82e893bbe859e01a9bb38517ff6b3f91493560d > 2) there is only one of them in the statistics of another: > http://torstatus.blutmagie.de/router_detail.php?FP=9087ca232b155b415ad81c0d3f636fc898246deb > Why? In the torrc-file on each servers I pointed out identical > information about my family: MyFamily > $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,$9087CA232B155B415AD81C0D3F636FC898246DEB Oh, sorry, $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4 is an old fingerprint of my node named "Orion Tor Node", my current fingerfrint is another (after upgrading a stable Tor-version to alfa). Is it normal that after upgrading a stable Tor-version to alfa Tor-version fingerprint of node was changed? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: $keyid of my server
Orionjur Tor-admin wrote: > Olaf Selke wrote: >> Am 19.08.2010 17:49, schrieb Orionjur Tor-admin: >>> After I write there MyFamily >>> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB >>> I have the next errors output when I reatart my Tor daemon: >> prepend each fingerprint with a $ sign. Once I made the same mistake. >> The docs afaik doesn't mention it. Here's my exit nodes' config option: >> >> MyFamily >> $6297B13A687B521A59C6BD79188A2501EC03A065,$67EC84376D9C4C467DCE8621AACA109160B5264E,$66CA87E164F1CFCE8C3BB5C095217A28578B8BAF,$7B698D327F1695590408FED95CDEE1565774D136 >> >> Olaf >> *** >> To unsubscribe, send an e-mail to majord...@torproject.org with >> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ >> > > Very thanks, your advice was useful, the problem was resolved on its base. > Now I have seen to the statistics and find the next: 1) there are both my nodes in the item "Family" in the statistics of the first of them : http://torstatus.blutmagie.de/router_detail.php?FP=c82e893bbe859e01a9bb38517ff6b3f91493560d 2) there is only one of them in the statistics of another: http://torstatus.blutmagie.de/router_detail.php?FP=9087ca232b155b415ad81c0d3f636fc898246deb Why? In the torrc-file on each servers I pointed out identical information about my family: MyFamily $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,$9087CA232B155B415AD81C0D3F636FC898246DEB *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: $keyid of my server
Olaf Selke wrote: > Am 19.08.2010 17:49, schrieb Orionjur Tor-admin: >> After I write there MyFamily >> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB >> I have the next errors output when I reatart my Tor daemon: > > prepend each fingerprint with a $ sign. Once I made the same mistake. > The docs afaik doesn't mention it. Here's my exit nodes' config option: > > MyFamily > $6297B13A687B521A59C6BD79188A2501EC03A065,$67EC84376D9C4C467DCE8621AACA109160B5264E,$66CA87E164F1CFCE8C3BB5C095217A28578B8BAF,$7B698D327F1695590408FED95CDEE1565774D136 > > Olaf > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Very thanks, your advice was useful, the problem was resolved on its base. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: $keyid of my server
Olaf Selke wrote: > Am 19.08.2010 17:49, schrieb Orionjur Tor-admin: >> After I write there MyFamily >> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB >> I have the next errors output when I reatart my Tor daemon: > > prepend each fingerprint with a $ sign. Once I made the same mistake. > The docs afaik doesn't mention it. Here's my exit nodes' config option: > > MyFamily > $6297B13A687B521A59C6BD79188A2501EC03A065,$67EC84376D9C4C467DCE8621AACA109160B5264E,$66CA87E164F1CFCE8C3BB5C095217A28578B8BAF,$7B698D327F1695590408FED95CDEE1565774D136 > > Olaf > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Very thanks, I will try. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Project 2008 Tax Return Now Online
Jonathan D. Proulx wrote: > While I do think it's good to see the funding there are two points that > are important to remember. > > 1) this is a freesoftware project the code is there for all to see, > hopefully clueful people other than the US Government are reading it. > > 2) no matter who's funding it the US gov't could read the code (see > above) and would continue to (potentially) have a near global view of > internet traffic. > > To a large extent freesoftware defends agains the worst abuses funders > can demand (1), but I wouldn't fully trust TOR against China either (2) > > -Jon > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > I think so too. But I have an asking - were there any court proceedings (successful or not) against tor-users based on their deanonimisation in the USA? Because I never hear or read about it I very want to know it. If there were no such proceedings it seems to me that we must acknowledge that efficiency of the Tor has very high level. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: $keyid of my server
Orionjur Tor-admin wrote: > Andrew Lewman wrote: >> On Wed, 18 Aug 2010 01:20:25 + >> Orionjur Tor-admin wrote: >> >>> Where I can find it for pointing out "MyFamily" in /etc/torrc ? >>> I find only my node fingerprint. >> That's your keyid, or look for the log message on start: >> [notice] Your Tor server's identity key fingerprint is >> >> Or here, >> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Iwanttorunmorethanonerelay >> > > After I write there MyFamily > 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB > I have the next errors output when I reatart my Tor daemon: > > ABORTED: Tor configuration invalid: > Aug 19 17:44:13.042 [notice] Tor v0.2.2.14-alpha (git-3218a82991d890b0). > This is experimental software. Do not rely on it for strong anonymity. > (Running on Linux i686) > Aug 19 17:44:13.045 [warn] Failed to parse/validate config: Invalid > nickname '90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4' in MyFamily line > Aug 19 17:44:13.045 [err] Reading config failed--see warnings above. > > When I point out nicknames of my nodes, restarting of tor-daemon has no > problem but I have the next record in logs: > I have no descriptor for the router named "OrionTorNode" in my declared > family; I'll use the nickname as is, but this may confuse clients. > > What do I wrong? > In addition to the above, I have the next record in my log of the tor on my tor-node 'OrionTorNode': You specified a server "OrionTorNode1" by name, but this name is not registered, so it could be used by any server, not just the one you meant. To make sure you get the same server in the future, refer to it by key, as "$9087CA232B155B415AD81C0D3F636FC898246DEB". But that name ('OrionTorNode1') is a name of working tor-server that presents in statistics (see, for example, torstatus.blutmagie.de ). *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: $keyid of my server
Andrew Lewman wrote: > On Wed, 18 Aug 2010 01:20:25 + > Orionjur Tor-admin wrote: > >> Where I can find it for pointing out "MyFamily" in /etc/torrc ? >> I find only my node fingerprint. > > That's your keyid, or look for the log message on start: > [notice] Your Tor server's identity key fingerprint is > > Or here, > https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Iwanttorunmorethanonerelay > After I write there MyFamily 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB I have the next errors output when I reatart my Tor daemon: ABORTED: Tor configuration invalid: Aug 19 17:44:13.042 [notice] Tor v0.2.2.14-alpha (git-3218a82991d890b0). This is experimental software. Do not rely on it for strong anonymity. (Running on Linux i686) Aug 19 17:44:13.045 [warn] Failed to parse/validate config: Invalid nickname '90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4' in MyFamily line Aug 19 17:44:13.045 [err] Reading config failed--see warnings above. When I point out nicknames of my nodes, restarting of tor-daemon has no problem but I have the next record in logs: I have no descriptor for the router named "OrionTorNode" in my declared family; I'll use the nickname as is, but this may confuse clients. What do I wrong? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
$keyid of my server
Where I can find it for pointing out "MyFamily" in /etc/torrc ? I find only my node fingerprint. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Flash Cookies and Tor.
and...@torproject.org wrote: > On Fri, Jul 30, 2010 at 11:27:27PM +0100, pump...@cotse.net wrote 1.5K bytes > in 29 lines about: >> OK, to continue this - in the past I did use Tor with Flash enabled after >> having Flash cookies on the hard drive from surfing when I was not using >> Tor. In your opinion, is it likely that some websites would use these >> Flash cookies to realise that the person surfing with Tor is the same >> person who was surfing days / weeks / months earlier when not using Tor? >> Would they then be able to connect non-Tor IPs to the person currently >> using Tor (me)? > > Yes. > http://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wide > And are they possible to connect non-Tor IPs to the person currently using Tor if the browser are running under UNIX-user transparently torified throwgh firewall? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: DerAufbruch{,1,2} nodes not in a Family
Scott Bennett wrote: > There are three nodes currently listed in the directory by the names of > DerAufbruch, DerAufbruch1, and DerAufbruch2 without contact information that > are not configured into a Family. If you wish to have your tor client treat > them as being in a single node Family, just add the following to your torrc > file. > >> > Scott Bennett, Comm. ASMELG, CFIAG Very thanks for your information, Scott, It is a pitty that I have read this mail only today. Is it useful to include that line in the torrc-file on my tor-node (I don't use it as a client) or it useful only for tor-clients? P.S. It seems like somebody begin many attacks to the Tor-network, DerAufbruch1, perfect-privacy.com...) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: When can I get TOR for mobile?
and...@torproject.org wrote: > On Tue, May 25, 2010 at 12:59:48PM +, tor-ad...@orionjurinform.com wrote > 0.8K bytes in 18 lines about: > : Does a Tor-version for WM exist? I thought that such tor-version didn't > : exist. > > It doesn't exist in binary form. However, thanks to a volunteer, we > just committed some code to support it this week. > > See, > https://gitweb.torproject.org/tor.git/commit/312f4ee410de718aaf20030d22a93f1c258faa37 > for an example. > I have got the 312f4ee410de718aaf20030d22a93f1c258faa37.tar.gz file and how I could install it to my WM-PPC? It seems me that I can't do it through make && make install under my Linux-machine (for WM). Sorry for lamer's qustion but I have never compiled windows-programs from sources. And where can I get OpenSSL and libz for the WM, does they exist? (I have read in the readme.txt file that "OpenSSL and libz both compile on MinGW out of the box"). *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: When can I get TOR for mobile?
Nathan Freitas wrote: > Sorry, there is no version of Tor available for that class of Java phone > currently. You need to upgrade to an Android, Windows Mobile, Nokia N900 or > iPhone device. > > On May 24, 2010, at 12:20 PM, emigrant wrote: > >> sony ericsson k530i > > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > Does a Tor-version for WM exist? I thought that such tor-version didn't exist. Where I can get it? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/