Re: Is "gatereloaded" a Bad Exit?

2011-02-01 Thread Orionjur Tor-admin
mi nt wrote:
> On Mon, Jan 31, 2011 at 08:39:29PM -0500, Gregory Maxwell wrote:

> The chances of having your traffic logged by malicious operators, known or 
> unknown, allowing traffic on 443 or not, can be minimized by not using 
> Tor.
> Just saying! :-)
> 
>  -- 
> m...@sdf.lonestar.org
> SDF Public Access UNIX System - http://sdf.lonestar.org
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 
The chances of having your traffic logged by anyone, known or
unknown, allowing traffic on 443 or not, can be minimized by not using
Internet! :)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is "gatereloaded" a Bad Exit?

2011-01-31 Thread Orionjur Tor-admin
Mike Perry wrote:
> Thus spake morphium (morph...@morphium.info):
> 
>>> Do you have a rational reason why we should allow people to carry the
>>> unencrypted version of a service but not the encrypted one, other than
>>> "Well, they could be bad actors even with a good policy!"
>> As I stated above, it's not a good idea to BadExit them, because it
>> puts more load on the servers, that DO support https i.e. - and makes
>> them slower.
>> Those weren't 10K/s Nodes you blacklisted there, they've been really
>> fast Exit Nodes.
>> And I don't see ANY point in BadExit'ing 5 "random" Nodes, suggesting
>> that no one could capture your unencrypted traffic now.
>>
>> This is just further slowing down the whole Tor-Network.
> 
> This is not true. The exit nodes in question account for ~6% of the
> network Exit-flagged bandwidth. That is, *IF* they actually had the
> Exit flag (they did not), they would have provided 6% of that
> bandwidth. They do not have the Exit flag, however, so they provide
> 0%.
>
How is it possible that they configured their nodes as exits and defined
their exit policies but those nodes didn't work as exits in practice?
Are those nodes misconfiured?  So, how those can sniffing exit-traffic?
But I can confirm that somedays ago I have used oompaloompa and
oompaloompa2 for connecting to the LiveJournal.
I know it becouse their ip (and an ip of Olaf's node too) was banned by
the LJ team as "bots" and I sent to the LJ team report for unblocking
that ips as belonging not to bots but to exit-nodes of the Tor.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is "gatereloaded" a Bad Exit?

2011-01-31 Thread Orionjur Tor-admin
morphium wrote:
> 2011/1/31 Olaf Selke :
>> I disagree Morphium's position mainly for the same reasons Mike and Jake
>> already pointed out. If the operators really care about their nodes
>> they'll certainly contact Tor admins. Damaging Tor's reputation in the
>> public due to exit sniffing imo is much more worse than loosing some
>> bandwidth.
> 
> Sniffing is worse than loosing bandwidth, right. But sniffing still
> occurs, we just don't know where. And we can't tell wether they did.
> I think concluding "only 80: he is sniffing" is wrong (and even would
> be "80 and 443: he is a good guy").
> And if those nodes really are ran by "the bad guys", I don't think
> it's a problem for them now to setup a new node on a new subnet that
> allows their old ports + 443 and continue sniffing.
> 
> I can not see the Tor project won _anything_ with this decision.
> 
> morphium
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


And, then, it seems to me that it is no a big problem to exclude
packages with encrypted information from sniffing logs for people who
setting up nodes for that evil purposes.
But, in the other side, it seems to me that guys which set up so such
fast nodes are not full lamers. And they probably can read this mailing
list and are able to answer us, am I wrong?
As concern to me, if I read some bad about my nodes here I will write
something to answer, no?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is "gatereloaded" a Bad Exit?

2011-01-30 Thread Orionjur Tor-admin
Damian Johnson wrote:
> The five relays Mike mentioned have been flagged as BadExits [1].
> Adding them to your ExcludeExitNodes isn't necessary. -Damian
> 
> [1] https://trac.torproject.org/projects/tor/wiki/badRelays
> 
> On Sun, Jan 30, 2011 at 1:33 AM, Jan Weiher  wrote:
>>> At some point, we intend to shrink exit policies further as Tor scales
>>> to more decentralized schemes. Those exit policies will likely be
>>> represented as bits representing subsets of ports. When that time
>>> comes, we will very likely combine encrypted and unencrypted versions
>>> of ports together, removing this option entirely.
>>>
>> Sounds good. But what to do for now? Just creating a list of nodes which
>> only allow unencrypted traffic and put them into the ExcludeExitNodes
>> list? Shouldnt these nodes be excluded by default?
>> I'm unsure. I want to stress again that I'm not saying any operator is
>> doing anything evil, but I think we should find some way to avoid nodes
>> which have such weird exitpolicies.
>>
>> best regards,
>> Jan
>> ***
>> To unsubscribe, send an e-mail to majord...@torproject.org with
>> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>>
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


Is it possible to publish a list of bad-exits for copypasting it to
/etc/torrc in addition to the above-mentioned list?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor 0.2.2.22-alpha is out

2011-01-30 Thread Orionjur Tor-admin
Roger Dingledine wrote:
> Tor 0.2.2.22-alpha fixes a few more less-critical security issues. The
> main other change is a slight tweak to Tor's TLS handshake that makes
> relays and bridges that run this new version reachable from Iran again.
> We don't expect this tweak will win the arms race long-term, but it will
> buy us a bit more time until we roll out a better solution.
> 
> Anybody running a relay or bridge who wants it to work for Iran should
> upgrade.
> 
> https://www.torproject.org/download/download
> 
> Changes in version 0.2.2.22-alpha - 2011-01-25
>   o Major bugfixes:
> - Fix a bounds-checking error that could allow an attacker to
>   remotely crash a directory authority. Bugfix on 0.2.1.5-alpha.
>   Found by "piebeer".
> - Don't assert when changing from bridge to relay or vice versa
>   via the controller. The assert happened because we didn't properly
>   initialize our keys in this case. Bugfix on 0.2.2.18-alpha; fixes
>   bug 2433. Reported by bastik.
> 
>   o Minor features:
> - Adjust our TLS Diffie-Hellman parameters to match those used by
>   Apache's mod_ssl.
> - Provide a log message stating which geoip file we're parsing
>   instead of just stating that we're parsing the geoip file.
>   Implements ticket 2432.
> 
>   o Minor bugfixes:
> - Check for and reject overly long directory certificates and
>   directory tokens before they have a chance to hit any assertions.
>   Bugfix on 0.2.1.28 / 0.2.2.20-alpha. Found by "doorss".
> 

I installed it in the morning of yesterday or in the morning of the day
before yesteray on my debian exit node.
How can I do it before this release?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is "gatereloaded" a Bad Exit?

2011-01-30 Thread Orionjur Tor-admin
Mike Perry wrote:
> Thus spake Eddie Cornejo (corn...@gmail.com):
> 
>> Forgive my ignorance but this seeks rather knee-jerk to me. Maybe I'm
>> missing something.
> 
> Yeah, I believe you're missing the fact that these ports also contain
> plaintext passwords than can be used to gain access to information on
> these and other accounts that may or may not have ever traveled over
> tor. That is the difference.
> 

And what is a difference in using the Tor and not using the Tor when you
don't use SSL?
Only that in the last time your password etc. can see your ISP or
governmental systems like european "Echelon", Russian "SORM" and etc.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is "gatereloaded" a Bad Exit?

2011-01-29 Thread Orionjur Tor-admin
Gregory Maxwell wrote:
> On Sat, Jan 29, 2011 at 9:56 PM, grarpamp  wrote:
> 
> Instead, I think that nodes which exit _only_ to the unencrypted
> version of a service (e.g. 80 but not 443) should be excluded from
> operating as exits entirely (except as enclaves).  In this way these
> nodes would be force to "pay their way".  We can't stop them from
> sniffing, but at least we can make them carry traffic they can't sniff
> as part of the cost of doing their evil business. They could do things
> like severely throttle encrypted traffic, but that is activity that
> testing could detect.
> 

Where I can read what it means "a bad exit"? Earlier I thought that it
is and exit which works wrong in something. And I thought that them
excludes from routing.
But I pereodically can see that my client establish connections through
bad exits.
Have I to need do something from preventing it for protection of my
anonimity?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is "gatereloaded" a Bad Exit?

2011-01-29 Thread Orionjur Tor-admin
grarpamp wrote:
>> I dont see how to recognize if the traffic is recorded?
> 
> I know people who record exit traffic, lots of it. And they
> do all sorts of things with it too. Does that news trouble
> you? If so, you need to readjust your thinking.
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


Is it a serious problem if some of owners of tor-nodes record the exit
traffic?
It seems to me that the Govermental bodies can do it instead of them and
they probably do it in such countries as the US or Germany and etc.
If the first is serious problem, why the last is not one?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is "gatereloaded" a Bad Exit?

2011-01-29 Thread Orionjur Tor-admin
Jan Weiher wrote:
> 
> 
> Of course these ports are popular, but 443 is popular as well? So for me
> it looked like "pick all the popular _unencrypted_ ports".
> 
> best regards,
> Jan
> 
> 
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


Maybe the owner of that node is just only a lamer?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Anybody use n900?

2011-01-12 Thread Orionjur Tor-admin
Does anybody describe their expirience in using nokia n900 and Tor under it?
Is it possible to make more than one ordinary users on it? Is the
iptables of it fully  functionary? Is it possible transparently torify
such users via iptables on it?
Is it possible to change by software mac-address, IMEI of it?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


How can I increase my bandwidth?

2011-01-11 Thread Orionjur Tor-admin
I am operating 2 tor-servers: one under FreeBSD and other under Debian
Lenny.
Their parameteres:
1.  uname -a
 8.1-STABLE FreeBSD 8.1-STABLE #0 r34M: Wed Nov 24 10:02:09 IRKT 2010
RAM 512 Mb
CPU 1GHz
r...@freebsd8-amd64.ispsystem.net:/root/src/sys/amd64/compile/ISPSYSTEM
 amd64
 Tor v0.2.2.20-alpha
OpenSSL 0.9.8n 24 Mar 2010
non-exit node
2. uname -a
Linux 2.6.18-028stab070.4-ent #1 SMP Tue Aug 17
19:03:05 MSD 2010 i686 GNU/Linux
RAM 786432 kB
CPU 502.313 MHz
Tor version 0.2.2.20-alpha
OpenSSL 0.9.8g 19 Oct 2007
exit-node

As it can be shown from the Tor Statistics the bandwidth of the first
node is more that one of the second:
http://torstatus.blutmagie.de/router_detail.php?FP=c82e893bbe859e01a9bb38517ff6b3f91493560d
http://torstatus.blutmagie.de/router_detail.php?FP=2ce7d7703c7679f0bbe711668ff0923ffcf8997f

What can be a cause of that and how can I increase the bandwidth of my
Debian node?
P.S. I have set the next setting in the '/etc/tor/torrc' of both of them:
RelayBandwidthRate 200 KBytes
RelayBandwidthBurst 400 KBytes

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Gmail saying "cookies are turned off" but they are not

2011-01-11 Thread Orionjur Tor-admin
Praedor Atrebates wrote:
> I am using my usual tor button + firefox to access a gmail account.  I have 
> generally had no problems but lately I try to log in and get a "cookies are 
> turned off" and that I need to turn them on.  
> 
> Cookies are NOT turned off, they are set to be treated as session cookies and 
> they get wiped whenever I shut off firefox.  Perhaps there is a setting 
> hidden away somewhere that I can check, whether in the tor button settings or 
> firefox?  
> 
> 
I periodically have such probolem. It is very intresting what is causes
of it.
Sometimes it resolves after some preriod of time by oneself (I don't
know how and why; deleting of cashe usually doesn't take any effect);
sometimes I need to delete all my user's profile of my browser to
resolve it.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: blutmagie law enforcement inquiry stats

2011-01-11 Thread Orionjur Tor-admin
Olaf Selke wrote:
> On 11.01.2011 11:15, Matthew wrote:
>> What does this mean?
> 
> sorry, I meant I didn't visit countries with oppressive regimes during
> the last three years. Don't know if they'd like me entering their
> country even when coming in peace as a tourist.
> 
> Olaf
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

And what are those countries? And what they did? Refuse your requests
for visa or deport you in spite of giving a visa earlier? Or
threaten you of your arrest?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: blutmagie law enforcement inquiry stats

2011-01-11 Thread Orionjur Tor-admin
Olaf Selke wrote:
> On 11.01.2011 11:15, Matthew wrote:
>> What does this mean?
> 
> sorry, I meant I didn't visit countries with oppressive regimes during
> the last three years. Don't know if they'd like me entering their
> country even when coming in peace as a tourist.
> 
> Olaf
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

And what are those countries? And what they did? Refuse your requests
for visa or deport you in spite of giving a visa earlier? Or
threaten you of your arrest?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: blutmagie law enforcement inquiry stats

2011-01-10 Thread Orionjur Tor-admin
Olaf Selke wrote:
> Am 10.01.2011 20:42, schrieb Roc Admin:
>> This is interesting. Could you detail time consumed in resolving the
>> requests and any problems you ran into with authorities?
> 
> this morning arrived the first fax in 2011 requesting user data. Police
> is back again from Xmas vacation ;-)
> 
> Using my template composing the answer and sending it thru a fax machine
> usually takes less than 15min. I never did run into difficulties with
> police so far. However I'm not sure what will happen at certain
> country's airport immigration.
> 
> In most cases the police officers are quite polite and almost happy to
> close their file cause the trace ends. I suppose it's much more easy to
> deal with law enforcement if you appear 25 times a year on police's
> radar than only once. At least they tend to believe my words.
> 
> regards Olaf
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


Do they describe causes their requests?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Best Hidden Service web server?

2011-01-08 Thread Orionjur Tor-admin
Dirk wrote:
> Jerzy Łogiewa wrote:
>> What is the best web server for hidden service? Are any containing exploits 
>> that can reveal IPs, or maybe even in the 404 pages etc?
>>
>> --
>> Jerzy Łogiewa -- jerz...@interia.eu
>>
> 
> http://www.acme.com/software/thttpd/
> http://www.acme.com/software/mini_httpd/
> http://www.acme.com/software/micro_httpd/ (~200 lines of code)
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


Is it a bad idea to use an apache for a hidden serice?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor and google groups

2011-01-05 Thread Orionjur Tor-admin
Moritz Bartl wrote:
> Hi,
> 
> Am 05.01.2011 20:37, schrieb Matthew:
>> Have you tried this in Spain?  In Madrid the shop photocopied the back
>> page of my passport. 
> 
> Germany introduced an electronic ID recently. In the revised laws they
> made clear that leaving the ID as deposit, or having it photocopied, is
> illegal. The new ID carries a personal identifier printed on it that
> "should only be known to the bearer".
> 
> [Source:
> http://www.heise.de/newsticker/meldung/Deine-wichtigste-Karte-Vom-Umgang-mit-dem-neuen-Personalausweis-1133588.html
> ]


That is a very bad practice breaking anonymity and human rights.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor and google groups

2011-01-05 Thread Orionjur Tor-admin
G-Lo ☠ wrote:
>> I am under the impression that in most countries you have to show ID
>> which is copied to obtain a SIM?  This was my experience in Spain for
>> example. 
> 
> In France, anyone can buy a phone with a SIM card usable immediately, in
> any tobacco shop, without the need to show an ID.
> 
>  
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


It seems as very good and democratic laws and practice.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor and google groups

2011-01-05 Thread Orionjur Tor-admin
forc...@safe-mail.net wrote:
>> I am under the impression that in most countries you have to show ID
>> which is copied to obtain a SIM?  This was my experience in Spain for
>> example. 
> 
> Yes in Western Europe it is so. But there are many countries were SIM cards 
> are just sold in the streets without any requirements. Former USSR, many 
> countries in Asia, some in Africa, etc.
> 
Is it very difficult to buy a SIM without showing ID in the USA or
countries of Western Europe? Sorry for such off topic but it is very
interesting to know are there any countries in Western Europe or states
of the USA when it is possible to buy a SIM without showing your ID with
accordance to local law?


>>> Maybe you should start up a gmail activation service! Or at least for
>>> us here in the group!
> 
> 
> I do it already for some friends but the point is that with the phone number 
> I would be able to enter the account and change the password, read emails 
> etc. Not that good for privacy, people who do not know me should not accept :)
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

You can do it on a paying basis not only as an enthusiast which assists
for all paranoids in the World :)
And it will be a good idea, if I am not wrong, to do it not at your home
but only at public places - restaraunts, cafes, bars and etc. for an
Adversary cannot reseach where are you live and who you are.
And if you have many such clients it seems your anonymity will be high.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor and google groups

2011-01-05 Thread Orionjur Tor-admin
M wrote:
>> Yes, but I have a nice collection of SIM cards from various countries...
>> Every time I travel (twice a month at least) I bring back some SIM cards for
>> this kind of "work"...
>>
> 
> Maybe you should start up a gmail activation service! Or at least for us
> here in the group!
> 


It will be fine :)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor in German media (27c3)

2011-01-05 Thread Orionjur Tor-admin
Eugen Leitl wrote:
> On Tue, Jan 04, 2011 at 05:55:09PM +0100, Moritz Bartl wrote:
> 
>> Most people run "as many exit nodes as they want" without even having a  
>> lawyer in the first place. It is not an illegal service at all.
>>
>> For the future, it might be a good idea to form a lose network of  
>> lawyers/funds that openly promise legal help to ANY Tor node operator.  
>> In Germany, both Chaos Computer Club and German Privacy Foundation  
>> promise to fight for the right of Tor node operators in case something  
>> big hits them. In the US, EFF made a similar promise.
> 
> That is good to know. Unfortunately, finding an exit-sympathetic
> hoster will be more of a problem. Hetzner e.g. seems to tolerate
> middlemen but not exits, as they're abuse-driven.
> 


I operate 2 nodes of the Tor both in Germany.
Fistly, I set up one of them, the OrionTorNode as an exit, but I had
some problems with my vds provider and turn it in the middlemen regim.
After that I rented a new vds from a vds provider listing in the Tor
blog as frendly to the Tor and set up on it an exit node OrionTorNode1
that works fine to that days.
My provider received an abuse in late of December concerning using my
tor-exit for torrenting but after I informed them that I reconfigured my
/etc/tor/torrc they was fully satisfied and did not requre me stop my
exit-node such their colleaques - staff of the vds provider of my first
node.
But it will be very good to set up an exit node without any restrictions
of exit policy.
If anyone could recommend me an offshore vds provider
which is rigid to any abuses and which prices are not very expensive
I would be thankful.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


test

2011-01-04 Thread Orionjur Tor-admin
test
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2011-01-04 Thread Orionjur Tor-admin
Jon wrote:
> > On Wed, Dec 29, 2010 at 10:38 AM, The Doctor  wrote:
>> >>
> > I then tried again with a German exit, and had no problems. Since I
> > don't speak German very well, I had to guess some, but it went thru
> > with out any captcha..
> >
> > Am wondering if it is only with a US exit or if it is happening on
> > other country exits?
> >
> > Jon
> > ***
> > To unsubscribe, send an e-mail to majord...@torproject.org with
> > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> >

I have tried to creat gmail-accounts with Netherlands and German exits
and have had problems: the Google required sms-verification.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2010-12-29 Thread Orionjur Tor-admin
Jon wrote:
> On Wed, Dec 29, 2010 at 10:38 AM, The Doctor  wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> On 12/29/2010 08:38 AM, Orionjur Tor-admin wrote:
>>
>>> I heard that many times from differen people but I cannot creat any
>>> gmail account without asking sms-verification about 2 or 3 years... And
>>> tried do it many times
>> For what it is worth, I just tried, and was unsuccessful in the attempt.
>>  I had to answer a CAPCHA (which is not a big deal) but was then
>> confronted with a request to receive either a text message or a phone
>> call.  Sorry - that is a deal breaker.
>>
>> - --
>>
> 
>  I tried also,  and had to do a captcha and this is what the next page said:
> 
> Verify your account
> You're almost done! We just need to verify your account before we can
> create it.
> 
> Account verification helps with:
> Preventing spam: we try to verify that real people, not robots, are
> creating accounts.
> Recovering account access: we will use your information to verify your
> identity if you ever lose access to your account.
> Communication: we will use your information to notify you of important
> changes to your account (for example, password changes from a new
> location).
> Unless you explicitly tell us to do so, your phone number will never
> be sold or shared with other companies, and we will not use it for any
> purpose other than during this verification step and for password
> recovery and account security issues. In other words, you don't have
> to worry about getting spam calls or text messages from us, ever.
> 
> For more information, please read our frequently asked questions.
> Verification Options
>   Text Message
>  Google will send a text message containing a verification code to
> your mobile phone.
>   Voice Call
>  Google will make an automated voice call to your phone with a
> verification code
> 
> 
> I then tried again with a German exit, and had no problems. Since I
> don't speak German very well, I had to guess some, but it went thru
> with out any captcha..
> 
> Am wondering if it is only with a US exit or if it is happening on
> other country exits?
> 
> Jon
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

Thanks for the information, I would know it.
About a half of a year I tried to create a gmail account from my real ip
 but have had such result (asking for verification). After that I
decided that it is a general rool of the Google to do it, but - with
according to you information, my decision was wrong.
It seems to me that it very difficult to find out why and when they
require that.
Thanks for that information again.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


How does a ftp-server log real ip-address of client machine?

2010-12-29 Thread Orionjur Tor-admin
I usually connect to my servers through the Tor.
When I connecting with them through ssh or sffp I don't find any serious
in logs of my server except ip--addresses or names of apropriate
exit-nodes of the Tor.
But when I connect with them through ftp immediate (without ssh) I can
see real ip-addresses of my client's machine such the next:
proftpd[32816] someuser (anonymizer2.torservers.net[174.36.199.200]):
Refused PORT 192,168,1,5,203,191 (address mismatch)
As I understand if my machine would not be behind NAT and have 'white'
ip-address my anonimity would be compromised.
How does a ftp-server log real ip-address of client machine? And how I
can avoid it?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2010-12-29 Thread Orionjur Tor-admin
Bjarni Rúnar Einarsson wrote:
> On Wed, Dec 29, 2010 at 7:37 PM, Orionjur Tor-admin <
> tor-ad...@orionjurinform.com> wrote:
> 
>> Aleksandr wrote:
>>> On 12/29/2010 12:34 PM, Moritz Bartl wrote:
>>>> Hi,
>>>> The Tor Hidden Wiki lists a few other free email services offering
>>> HTTPS at:
>>>> http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email
>>> The link above returns nothing.
>> It opens on my machine. It seems that it could be very useful information.
>>
> 
> Silly thing to say on this list, but if not on Tor, you can try
> http://kpvz7ki2v5agwt35.tor2web.com/wiki/index.php/Email :-)
> 
 Thanks
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2010-12-29 Thread Orionjur Tor-admin
Andrew Lewman wrote:
> On Wed, 29 Dec 2010 14:02:34 -0500
> grarpamp  wrote:
> 
>>> We've generally suggested gmail because their bulk account creation
>>> process was good. It seems this is not the case any more.
>> What is this bulk account creation you speak of?
> 
> Gmail used to have the ability to stop bots from creating accounts en
> masse.  gmail doesn't have this ability any more.
> 
>>> This is false. I just created a gmail account via tor without
>>> needing a phone number or any other information.
>> Hmm, you mean "just", as in today? What exit were you using?
>> Want to sell the account for bitcoins? Kidding :-)
> 
> As in around 08:45 AM EST. I didn't look to see which exit, it just
> worked, just a captcha required.
> 
> 

I have tried to creat a gmail account some minutes ago and the Google
requred sms-verification.
I have used 'anonymizer6.torservers.net' with ip-address 174.36.199.203
located in the US.
For creating account I have used an Iceweasel 3.0.6 with TB v. 1.2.5.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2010-12-29 Thread Orionjur Tor-admin
Aleksandr wrote:
> 
> 
> On 12/29/2010 12:34 PM, Moritz Bartl wrote:
>> Hi,
> 
>> The Tor Hidden Wiki lists a few other free email services offering
> HTTPS at:
>> http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email
> 
> 
> The link above returns nothing.


It opens on my machine. It seems that it could be very useful information.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2010-12-29 Thread Orionjur Tor-admin
Praedor Atrebates wrote:
> Interesting.  I have a fully anonymous email from gmail (about 1 yr old) that 
> I created via tor and it required no call, no text message, nothing, just a 
> captcha.  I have had several other accounts created at gmail previous to 
> this, also created via tor, and have not had any issue or 
> privacy/anonymity-violating issues.
> 
> Have they changed something very recently?
> 
> praedor
> 


When did you do it? I have some accounts created through such method
about 3 - 4 years ago, not later.
And one of them they required activate though sms after about 2 years of
using!!!
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2010-12-29 Thread Orionjur Tor-admin
The Doctor wrote:
> On 12/29/2010 08:38 AM, Orionjur Tor-admin wrote:
> 
>> I heard that many times from differen people but I cannot creat any
>> gmail account without asking sms-verification about 2 or 3 years... And
>> tried do it many times
> 
> For what it is worth, I just tried, and was unsuccessful in the attempt.
>  I had to answer a CAPCHA (which is not a big deal) but was then
> confronted with a request to receive either a text message or a phone
> call.  Sorry - that is a deal breaker.
> 
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/



Last years I always have such problem.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2010-12-29 Thread Orionjur Tor-admin
and...@torproject.org wrote:
> On Wed, Dec 29, 2010 at 03:42:00AM -0500, grarp...@gmail.com wrote 0.9K bytes 
> in 15 lines about:
> : Keep in mind that google does not allow new accounts to be
> : created via Tor. Unless you are willing to give up your phone
> 
> This is false.  I just created a gmail account via tor without needing a
> phone number or any other information.
> 
> Frequently, google's
> anti-ddos/spam/too-many-creations-from-a-single-ip-address detector
> is tripped for tor exit nodes and requires other information.  
> 
> We've generally suggested gmail because their bulk account creation
> process was good.  It seems this is not the case any more. 
> 

I heard that many times from differen people but I cannot creat any
gmail account without asking sms-verification about 2 or 3 years... And
tried do it many times
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor & Email?

2010-12-29 Thread Orionjur Tor-admin
Roger Dingledine wrote:
> On Tue, Dec 28, 2010 at 08:57:24PM -0500, Alek wrote:
>> I'm curious- in what way can Tor be used for emailing?  When someone is
>> connected to the Tor network is there email routed along the Tor network
>> too?  Or, does it go through their the normal connection with their ISP?
> 
> The only recommended way to use email with Tor is to use web mail,
> e.g. https connections to gmail.
> 
> Periodically people ask about using Thunderbird or the like. The problem
> is that client-side applications that compose and deliver email could
> leave identifying features in the mail headers they generate, or in the
> application-level data while interacting with remote mail servers. Nobody
> has investigated what would be needed to write a Torbutton equivalent
> for Thunderbird.
> 
> To answer what might be your more immediate question, you may be
> confused about Tor when you say "when someone is connected to the Tor
> network". Only applications that have been specifically configured
> to use Tor will send their traffic over Tor. See point 'a' at
> https://www.torproject.org/download/download.html.en#warning
> 
> --Roger
> 
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

Hello Roger,

As I know sometimes ago there were plans of the Tor developers to make
TB for Thunderbird, am I wrong?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: My vds was blocked

2010-12-29 Thread Orionjur Tor-admin
Runa A. Sandvik wrote:
> On Wed, Dec 29, 2010 at 9:40 AM, Orionjur Tor-admin
>  wrote:
>> I had set up a tor exit-node on my vds. It worked about 5 month but now
>> I have received a messages about blocking my vds on the grounds of
>> receiving an abuse report (attached).
>> My vds-provider is one from the list of "good" providers from the list
>> published on the tor blogs.
>> What do you, people, can reccomend me to do?!
> 
> I suggest you read
> https://www.torproject.org/docs/faq-abuse.html.en#TypicalAbuses
> 


What do you think about the next exit-policies:

ExitPolicy accept *:20-21
ExitPolicy accept *:22
ExitPolicy accept *:80
ExitPolicy accept *:110
ExitPolicy accept *:443
ExitPolicy accept *:465
ExitPolicy accept *:563
ExitPolicy accept *:587
ExitPolicy accept *:993
ExitPolicy accept *:995
ExitPolicy accept *:5222
ExitPolicy accept *:5223
ExitPolicy accept *:5224
ExitPolicy accept *:6660-6667
ExitPolicy reject *:*


Could it be seriously abusive for any reasons?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: My vds was blocked

2010-12-29 Thread Orionjur Tor-admin
Runa A. Sandvik wrote:
> On Wed, Dec 29, 2010 at 9:40 AM, Orionjur Tor-admin
>  wrote:
>> I had set up a tor exit-node on my vds. It worked about 5 month but now
>> I have received a messages about blocking my vds on the grounds of
>> receiving an abuse report (attached).
>> My vds-provider is one from the list of "good" providers from the list
>> published on the tor blogs.
>> What do you, people, can reccomend me to do?!
> 
> I suggest you read
> https://www.torproject.org/docs/faq-abuse.html.en#TypicalAbuses
> 


It seems to me that I did wrong including the record 'ExitPolicy accept
*:32768-65535' in /etc/tor/torrc.
But I cannot understand why the abusing port was 8080?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


My vds was blocked

2010-12-29 Thread Orionjur Tor-admin
I had set up a tor exit-node on my vds. It worked about 5 month but now
I have received a messages about blocking my vds on the grounds of
receiving an abuse report (attached).
My vds-provider is one from the list of "good" providers from the list
published on the tor blogs.
What do you, people, can reccomend me to do?!

RE:  Unauthorized Distribution of the Copyrighted Television Series Entitled
   Navy: NCIS


Dear Abuse Department:

We are writing this letter on behalf of the relevant subsidiaries of CBS 
Corporation.

We have received information that an individual has utilized the 
below-referenced IP address at the noted date and time to offer downloads of 
copyrighted television programs through a \"peer-to-peer\" service, including 
such title(s) as:

Navy: NCIS

The distribution of unauthorized copies of copyrighted television programs 
constitutes copyright infringement under the Copyright Act, Title 17 United 
States Code Section 106(3).  This conduct may also violate the laws of other 
countries, international law, and/or treaty obligations.

Since you own this IP address (87.118.93.143), we request that you immediately 
do the following:

1) Remove or disable access to the individual who has engaged in the conduct 
described above; and

2) Take appropriate action against the account holder under your Abuse 
Policy/Terms of Service Agreement.

We also would request that you inform the individual who engaged in this 
conduct that legitimate copies of CBS content are widely available for viewing 
online, for example on www.cbs.com and many other sites that participate in the 
CBS Audience Network.

On behalf of CBS, owner of the exclusive rights in the copyrighted material at 
issue in this notice, we hereby state that we have a good faith belief that use 
of the material in the manner complained of is not authorized by CBS, its 
respective agents, or the law.

Also, we hereby state, under penalty of perjury, that the information in this 
notification is accurate and that we are authorized to act on behalf of the 
owner of the exclusive rights being infringed as set forth in this notification.

Please direct any end user queries to the following:

copyrigh...@mediasentry.com


Please include the Case ID 1299490088, also noted above, in the subject line of 
all future correspondence regarding this matter.


We appreciate your assistance and thank you for your cooperation in this 
matter. Your prompt response is requested.


Respectfully,

D. Brewer
Enforcement Coordinator
Peermedia Technologies



--

INFRINGEMENT DETAIL


Infringing Work: Navy: NCIS
First Found: 25 Dec 2010 04:32:46 EST (GMT -0500)
Last Found: 25 Dec 2010 04:32:46 EST (GMT -0500)
IP Address: 87.118.93.143
IP Port: 8080
Protocol: BitTorrent
Torrent InfoHash: 1DDBDCF0740A2E164A2A4B82AA4463B48E86B327
Containing file(s):
NCIS.S08E09.HDTV.XviD-LOL.[VTV].avi.torrent (366,560,986 bytes)




Web-page of Tor-status

2010-12-08 Thread Orionjur Tor-admin
How can I set up a web-page of Tor-status like this:
http://torstatus.blutmagie.de/ ?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [notice] Circuit build measurement period of 218915ms is more than twice the maximum build time we have ever observed. Capping it to 152350ms.

2010-12-05 Thread Orionjur Tor-admin
Roger Dingledine wrote:
> On Sat, Dec 04, 2010 at 07:00:17AM +0000, Orionjur Tor-admin wrote:
>> I have the above record in '/var/tor/log' on my exit-node.
>> What it can mean?!
> 
> Tor clients build circuits when they first start up, to estimate the
> average amount of time it takes to build a circuit. Once they have a good
> estimate, they abandon the slowest 20% of the circuits they make, since
> a circuit that takes a long time to build will probably be no fun to use.
> 
> Your circuit build times appear to be really crummy. Your Tor has
> estimated that the 80% mark for you is 219 seconds. But in fact, the
> slowest circuit you've actually created took only 152 seconds. I believe
> this situation can occur when many of the circuits your Tor tries to
> make fail to get created at all.
> 
> Are you rate limiting your exit node? Perhaps you should start. It seems
> like your network is really overloaded.
> 
> --Roger
> 
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


I rated limiting my node the following:
BandwidthRate 200 KBytes
BandwidthBurst 400 KBytes

And some times ago it works time. But that time it permanently crashes,
I cannot understand why.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


[notice] Circuit build measurement period of 218915ms is more than twice the maximum build time we have ever observed. Capping it to 152350ms.

2010-12-03 Thread Orionjur Tor-admin
I have the above record in '/var/tor/log' on my exit-node.
What it can mean?!
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Tor-node failed

2010-12-02 Thread Orionjur Tor-admin
Last time my tor-node regularry fails. How can I debug causes of it?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


RIPE bloks some tor-nodes

2010-11-02 Thread Orionjur Tor-admin
 whois xxx.xx.xxx.x
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf

%ERROR:201: access denied for 192.251.226.206
%
% Sorry, access from your host has been permanently
% denied because of a repeated excessive querying.
% Please see http://www.ripe.net/db/err201.html
% for more information.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Server periodically failed, my script unworkable

2010-09-23 Thread Orionjur Tor-admin
I have a tor-node under my vds on FreeBSD 8.1-STABLE and I have a record
"tor_enable="YES" in my /etc/rc.conf.
But I have periodically a problem when my tor-server unexpectedly stop
and don't restart.
As I think, if my ISP restart their physicla machine or etc. (and my
vds) so the tor-daemon on my vds must start through that record, no?
So I wrote such script:
#!/bin/sh
# tormail.script
# checking of existing tor-daemon in system
# and mail to me if not
if [ -f /var/run/tor/tor.pid ] && [ -s /var/run/tor/tor.pid ] ; then
   :
else
/etc/rc.d/tor start || exim tor-ad...@orionjurinform.com <
/root/tormail.alarmmessage
fi

I want it to start tor if it doesn't work or if it impossible to send me
message.

and include it in my crontab, but it don't works.
It (and that record in my crontab) exist about 2 month and don't works.
I cannot understand why.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor 0.2.2.16-alpha is out

2010-09-21 Thread Orionjur Tor-admin
Roger Dingledine wrote:
> Tor 0.2.2.16-alpha fixes a variety of old stream fairness bugs (most
> evident at exit relays), and also continues to resolve all the little
> bugs that have been filling up trac lately.
> 
> https://www.torproject.org/download.html.en
> 
> Packages will be appearing over the next few days or weeks (except
> on Windows, which apparently doesn't build -- stay tuned for an
> 0.2.2.17-alpha in that case).
> 
> Changes in version 0.2.2.16-alpha - 2010-09-17
>   o Major bugfixes (stream-level fairness):
> - When receiving a circuit-level SENDME for a blocked circuit, try
>   to package cells fairly from all the streams that had previously
>   been blocked on that circuit. Previously, we had started with the
>   oldest stream, and allowed each stream to potentially exhaust
>   the circuit's package window. This gave older streams on any
>   given circuit priority over newer ones. Fixes bug 1937. Detected
>   originally by Camilo Viecco. This bug was introduced before the
>   first Tor release, in svn commit r152: it is the new winner of
>   the longest-lived bug prize.
> - When the exit relay got a circuit-level sendme cell, it started
>   reading on the exit streams, even if had 500 cells queued in the
>   circuit queue already, so the circuit queue just grew and grew in
>   some cases. We fix this by not re-enabling reading on receipt of a
>   sendme cell when the cell queue is blocked. Fixes bug 1653. Bugfix
>   on 0.2.0.1-alpha. Detected by Mashael AlSabah. Original patch by
>   "yetonetime".
> - Newly created streams were allowed to read cells onto circuits,
>   even if the circuit's cell queue was blocked and waiting to drain.
>   This created potential unfairness, as older streams would be
>   blocked, but newer streams would gladly fill the queue completely.
>   We add code to detect this situation and prevent any stream from
>   getting more than one free cell. Bugfix on 0.2.0.1-alpha. Partially
>   fixes bug 1298.
> 
>   o Minor features:
> - Update to the September 1 2010 Maxmind GeoLite Country database.
> - Warn when CookieAuthFileGroupReadable is set but CookieAuthFile is
>   not. This would lead to a cookie that is still not group readable.
>   Closes bug 1843. Suggested by katmagic.
> - When logging a rate-limited warning, we now mention how many messages
>   got suppressed since the last warning.
> - Add new "perconnbwrate" and "perconnbwburst" consensus params to
>   do individual connection-level rate limiting of clients. The torrc
>   config options with the same names trump the consensus params, if
>   both are present. Replaces the old "bwconnrate" and "bwconnburst"
>   consensus params which were broken from 0.2.2.7-alpha through
>   0.2.2.14-alpha. Closes bug 1947.
> - When a router changes IP address or port, authorities now launch
>   a new reachability test for it. Implements ticket 1899.
> - Make the formerly ugly "2 unknown, 7 missing key, 0 good, 0 bad,
>   2 no signature, 4 required" messages about consensus signatures
>   easier to read, and make sure they get logged at the same severity
>   as the messages explaining which keys are which. Fixes bug 1290.
> - Don't warn when we have a consensus that we can't verify because
>   of missing certificates, unless those certificates are ones
>   that we have been trying and failing to download. Fixes bug 1145.
> - If you configure your bridge with a known identity fingerprint,
>   and the bridge authority is unreachable (as it is in at least
>   one country now), fall back to directly requesting the descriptor
>   from the bridge. Finishes the feature started in 0.2.0.10-alpha;
>   closes bug 1138.
> - When building with --enable-gcc-warnings on OpenBSD, disable
>   warnings in system headers. This makes --enable-gcc-warnings
>   pass on OpenBSD 4.8.
> 
>   o Minor bugfixes (on 0.2.1.x and earlier):
> - Authorities will now attempt to download consensuses if their
>   own efforts to make a live consensus have failed. This change
>   means authorities that restart will fetch a valid consensus, and
>   it means authorities that didn't agree with the current consensus
>   will still fetch and serve it if it has enough signatures. Bugfix
>   on 0.2.0.9-alpha; fixes bug 1300.
> - Ensure DNS requests launched by "RESOLVE" commands from the
>   controller respect the __LeaveStreamsUnattached setconf options. The
>   same goes for requests launched via DNSPort or transparent
>   proxying. Bugfix on 0.2.0.1-alpha; fixes bug 1525.
> - Allow handshaking OR connections to take a full KeepalivePeriod
>   seconds to handshake. Previously, we would close them after
>   IDLE_OR_CONN_TIMEOUT (180) seconds, the same timeout as if they
>   were open. Bugfix on 0.2.1.26; 

Re: Google and Tor.

2010-08-26 Thread Orionjur Tor-admin
Mike Perry wrote:
> 
> This should be fixed in Torbutton 1.2.6.
> 

Hello Mike,

When you plan to release it?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: After upgrading a stable Tor-version to alfa Tor-version fingerprint of node was changed? (was $keyid of my server)

2010-08-22 Thread Orionjur Tor-admin
Orionjur Tor-admin wrote:
> Roger Dingledine wrote:
>> On Sun, Aug 22, 2010 at 01:56:59PM +, Orionjur Tor-admin wrote:
>>> Oh, sorry, $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4 is an old
>>> fingerprint of my node named "Orion Tor Node", my current fingerfrint is
>>> another (after upgrading a stable Tor-version to alfa).
>>> Is it normal that after upgrading a stable Tor-version to alfa
>>> Tor-version fingerprint of node was changed?
>> No, it's not normal.
>>
>> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Iwanttoupgrademovemyrelay.HowdoIkeepthesamekey
>>
>> What package, which OS, how did you upgrade, etc?
>>
>> --Roger
>>
>> ***
>> To unsubscribe, send an e-mail to majord...@torproject.org with
>> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>>
> 
>  FreeBSD 8.1-STABLE (vds under FreeBSD-jail).
> The first package was tor-0.2.1.25.
> After deinstalling it the fingerprint was changed as I see from
> /var/log/tor.
> I upgrade it to tor-Tor 0.2.2.13-alpha.
> I don't strictly remember how, it was in the beginning of May 2010 and I
> found that problem only today, but I thinks that I deinstall the first
> version through make deinstall in the suitable directory in /usr/ports
> and install the new version through make install in the another
> directory in /usb/ports  referring to the new version.
> Today I upgrade my version of the Tor to  0.2.2.15-alpha and my
> finderprint didn't change.
> Maybe it was because I the first remove my stable tor-package at all and
> install alfa tor-package over again?
> 

Now I have upgrade it through portupgrade, not through make deinstall
/make install
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: After upgrading a stable Tor-version to alfa Tor-version fingerprint of node was changed? (was $keyid of my server)

2010-08-22 Thread Orionjur Tor-admin
Roger Dingledine wrote:
> On Sun, Aug 22, 2010 at 01:56:59PM +0000, Orionjur Tor-admin wrote:
>> Oh, sorry, $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4 is an old
>> fingerprint of my node named "Orion Tor Node", my current fingerfrint is
>> another (after upgrading a stable Tor-version to alfa).
>> Is it normal that after upgrading a stable Tor-version to alfa
>> Tor-version fingerprint of node was changed?
> 
> No, it's not normal.
> 
> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Iwanttoupgrademovemyrelay.HowdoIkeepthesamekey
> 
> What package, which OS, how did you upgrade, etc?
> 
> --Roger
> 
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

 FreeBSD 8.1-STABLE (vds under FreeBSD-jail).
The first package was tor-0.2.1.25.
After deinstalling it the fingerprint was changed as I see from
/var/log/tor.
I upgrade it to tor-Tor 0.2.2.13-alpha.
I don't strictly remember how, it was in the beginning of May 2010 and I
found that problem only today, but I thinks that I deinstall the first
version through make deinstall in the suitable directory in /usr/ports
and install the new version through make install in the another
directory in /usb/ports  referring to the new version.
Today I upgrade my version of the Tor to  0.2.2.15-alpha and my
finderprint didn't change.
Maybe it was because I the first remove my stable tor-package at all and
install alfa tor-package over again?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


?fter upgrading a stable Tor-version to alfa Tor-version fingerprint of node wa s changed? (was $keyid of my server)

2010-08-22 Thread Orionjur Tor-admin
Orionjur Tor-admin wrote:
> Orionjur Tor-admin wrote:
>> Olaf Selke wrote:
>>> Am 19.08.2010 17:49, schrieb Orionjur Tor-admin:
>>>> After I write there MyFamily
>>>> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB
>>>> I have the next errors output when I reatart my Tor daemon:
>>> prepend each fingerprint with a $ sign. Once I made the same mistake.
>>> The docs afaik doesn't mention it. Here's my exit nodes' config option:
>>>
>>> MyFamily
>>> $6297B13A687B521A59C6BD79188A2501EC03A065,$67EC84376D9C4C467DCE8621AACA109160B5264E,$66CA87E164F1CFCE8C3BB5C095217A28578B8BAF,$7B698D327F1695590408FED95CDEE1565774D136
>>>
>>> Olaf
>>> ***
>>> To unsubscribe, send an e-mail to majord...@torproject.org with
>>> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>>>
>> Very thanks, your advice was useful, the problem was resolved on its base.
>>
> 
> 
> Now I have seen to the statistics and find the next:
> 1) there are both my nodes in the item "Family" in the statistics of the
> first of them :
> http://torstatus.blutmagie.de/router_detail.php?FP=c82e893bbe859e01a9bb38517ff6b3f91493560d
> 2) there is only one of them in the statistics of another:
> http://torstatus.blutmagie.de/router_detail.php?FP=9087ca232b155b415ad81c0d3f636fc898246deb
> Why? In the torrc-file on each servers I pointed out identical
> information about my family: MyFamily
> $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,$9087CA232B155B415AD81C0D3F636FC898246DEB


Oh, sorry, $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4 is an old
fingerprint of my node named "Orion Tor Node", my current fingerfrint is
another (after upgrading a stable Tor-version to alfa).
Is it normal that after upgrading a stable Tor-version to alfa
Tor-version fingerprint of node was changed?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: $keyid of my server

2010-08-19 Thread Orionjur Tor-admin
Orionjur Tor-admin wrote:
> Olaf Selke wrote:
>> Am 19.08.2010 17:49, schrieb Orionjur Tor-admin:
>>> After I write there MyFamily
>>> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB
>>> I have the next errors output when I reatart my Tor daemon:
>> prepend each fingerprint with a $ sign. Once I made the same mistake.
>> The docs afaik doesn't mention it. Here's my exit nodes' config option:
>>
>> MyFamily
>> $6297B13A687B521A59C6BD79188A2501EC03A065,$67EC84376D9C4C467DCE8621AACA109160B5264E,$66CA87E164F1CFCE8C3BB5C095217A28578B8BAF,$7B698D327F1695590408FED95CDEE1565774D136
>>
>> Olaf
>> ***
>> To unsubscribe, send an e-mail to majord...@torproject.org with
>> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>>
> 
> Very thanks, your advice was useful, the problem was resolved on its base.
> 


Now I have seen to the statistics and find the next:
1) there are both my nodes in the item "Family" in the statistics of the
first of them :
http://torstatus.blutmagie.de/router_detail.php?FP=c82e893bbe859e01a9bb38517ff6b3f91493560d
2) there is only one of them in the statistics of another:
http://torstatus.blutmagie.de/router_detail.php?FP=9087ca232b155b415ad81c0d3f636fc898246deb
Why? In the torrc-file on each servers I pointed out identical
information about my family: MyFamily
$90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,$9087CA232B155B415AD81C0D3F636FC898246DEB
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: $keyid of my server

2010-08-19 Thread Orionjur Tor-admin
Olaf Selke wrote:
> Am 19.08.2010 17:49, schrieb Orionjur Tor-admin:
>> After I write there MyFamily
>> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB
>> I have the next errors output when I reatart my Tor daemon:
> 
> prepend each fingerprint with a $ sign. Once I made the same mistake.
> The docs afaik doesn't mention it. Here's my exit nodes' config option:
> 
> MyFamily
> $6297B13A687B521A59C6BD79188A2501EC03A065,$67EC84376D9C4C467DCE8621AACA109160B5264E,$66CA87E164F1CFCE8C3BB5C095217A28578B8BAF,$7B698D327F1695590408FED95CDEE1565774D136
> 
> Olaf
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

Very thanks, your advice was useful, the problem was resolved on its base.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: $keyid of my server

2010-08-19 Thread Orionjur Tor-admin
Olaf Selke wrote:
> Am 19.08.2010 17:49, schrieb Orionjur Tor-admin:
>> After I write there MyFamily
>> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB
>> I have the next errors output when I reatart my Tor daemon:
> 
> prepend each fingerprint with a $ sign. Once I made the same mistake.
> The docs afaik doesn't mention it. Here's my exit nodes' config option:
> 
> MyFamily
> $6297B13A687B521A59C6BD79188A2501EC03A065,$67EC84376D9C4C467DCE8621AACA109160B5264E,$66CA87E164F1CFCE8C3BB5C095217A28578B8BAF,$7B698D327F1695590408FED95CDEE1565774D136
> 
> Olaf
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

Very thanks, I will try.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Project 2008 Tax Return Now Online

2010-08-19 Thread Orionjur Tor-admin
Jonathan D. Proulx wrote:
> While I do think it's good to see the funding there are two points that
> are important to remember.
> 
> 1) this is a freesoftware project the code is there for all to see,
> hopefully clueful people other than the US Government are reading it.
> 
> 2) no matter who's funding it the US gov't could read the code (see
> above) and would continue to (potentially) have a near global view of
> internet traffic.
> 
> To a large extent freesoftware defends agains the worst abuses funders
> can demand (1), but I wouldn't fully trust TOR against China either (2) 
> 
> -Jon
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 


I think so too.
But I have an asking - were there any court proceedings (successful or
not) against tor-users based on their deanonimisation in the USA?
Because I never hear or read about it I very want to know it.
If there were no such proceedings it seems to me that we must
acknowledge that efficiency of the Tor has very high level.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: $keyid of my server

2010-08-19 Thread Orionjur Tor-admin
Orionjur Tor-admin wrote:
> Andrew Lewman wrote:
>> On Wed, 18 Aug 2010 01:20:25 +
>> Orionjur Tor-admin  wrote:
>>
>>> Where I can find it for pointing out "MyFamily" in /etc/torrc ?
>>> I find only my node fingerprint.
>> That's your keyid, or look for the log message on start:
>> [notice] Your Tor server's identity key fingerprint is
>>
>> Or here,
>> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Iwanttorunmorethanonerelay
>>
> 
> After I write there MyFamily
> 90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB
> I have the next errors output when I reatart my Tor daemon:
> 
> ABORTED: Tor configuration invalid:
> Aug 19 17:44:13.042 [notice] Tor v0.2.2.14-alpha (git-3218a82991d890b0).
> This is experimental software. Do not rely on it for strong anonymity.
> (Running on Linux i686)
> Aug 19 17:44:13.045 [warn] Failed to parse/validate config: Invalid
> nickname '90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4' in MyFamily line
> Aug 19 17:44:13.045 [err] Reading config failed--see warnings above.
> 
> When I point out nicknames of my nodes, restarting of tor-daemon has no
> problem but I have the next record in logs:
>  I have no descriptor for the router named "OrionTorNode" in my declared
> family; I'll use the nickname as is, but this may confuse clients.
> 
> What do I wrong?
> 


In addition to the above, I have the next record in my log of the tor on
my tor-node 'OrionTorNode':
You specified a server "OrionTorNode1" by name, but this name is not
registered, so it could be used by any server, not just the one you
meant. To make sure you get the same server in the future, refer to it
by key, as "$9087CA232B155B415AD81C0D3F636FC898246DEB".
But that name ('OrionTorNode1') is a name of working tor-server that
presents in statistics (see, for example, torstatus.blutmagie.de ).
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: $keyid of my server

2010-08-19 Thread Orionjur Tor-admin
Andrew Lewman wrote:
> On Wed, 18 Aug 2010 01:20:25 +
> Orionjur Tor-admin  wrote:
> 
>> Where I can find it for pointing out "MyFamily" in /etc/torrc ?
>> I find only my node fingerprint.
> 
> That's your keyid, or look for the log message on start:
> [notice] Your Tor server's identity key fingerprint is
> 
> Or here,
> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Iwanttorunmorethanonerelay
> 

After I write there MyFamily
90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4,9087CA232B155B415AD81C0D3F636FC898246DEB
I have the next errors output when I reatart my Tor daemon:

ABORTED: Tor configuration invalid:
Aug 19 17:44:13.042 [notice] Tor v0.2.2.14-alpha (git-3218a82991d890b0).
This is experimental software. Do not rely on it for strong anonymity.
(Running on Linux i686)
Aug 19 17:44:13.045 [warn] Failed to parse/validate config: Invalid
nickname '90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4' in MyFamily line
Aug 19 17:44:13.045 [err] Reading config failed--see warnings above.

When I point out nicknames of my nodes, restarting of tor-daemon has no
problem but I have the next record in logs:
 I have no descriptor for the router named "OrionTorNode" in my declared
family; I'll use the nickname as is, but this may confuse clients.

What do I wrong?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


$keyid of my server

2010-08-17 Thread Orionjur Tor-admin
Where I can find it for pointing out "MyFamily" in /etc/torrc ?
I find only my node fingerprint.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Flash Cookies and Tor.

2010-08-02 Thread Orionjur Tor-admin
and...@torproject.org wrote:
> On Fri, Jul 30, 2010 at 11:27:27PM +0100, pump...@cotse.net wrote 1.5K bytes 
> in 29 lines about:
>> OK, to continue this - in the past I did use Tor with Flash enabled after 
>> having Flash cookies on the hard drive from surfing when I was not using  
>> Tor.  In your opinion, is it likely that some websites would use these  
>> Flash cookies to realise that the person surfing with Tor is the same  
>> person who was surfing days / weeks / months earlier when not using Tor?  
>> Would they then be able to connect non-Tor IPs to the person currently  
>> using Tor (me)?
> 
> Yes.
> http://www.eff.org/deeplinks/2009/09/new-cookie-technologies-harder-see-and-remove-wide
> 


And are they possible to connect non-Tor IPs to the person currently
using Tor if the browser are running under UNIX-user transparently
torified throwgh firewall?

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: DerAufbruch{,1,2} nodes not in a Family

2010-05-31 Thread Orionjur Tor-admin
Scott Bennett wrote:
>  There are three nodes currently listed in the directory by the names of
> DerAufbruch, DerAufbruch1, and DerAufbruch2 without contact information that
> are not configured into a Family.  If you wish to have your tor client treat
> them as being in a single node Family, just add the following to your torrc
> file.
> 
>> 
>   Scott Bennett, Comm. ASMELG, CFIAG



Very thanks for your information, Scott,
It is a pitty that I have read this mail only today.
Is it useful to include that line in the torrc-file on my tor-node (I
don't use it as a client) or it useful only for tor-clients?
P.S. It seems like somebody begin many attacks to the Tor-network,
DerAufbruch1, perfect-privacy.com...)

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: When can I get TOR for mobile?

2010-05-25 Thread Orionjur Tor-admin
and...@torproject.org wrote:
> On Tue, May 25, 2010 at 12:59:48PM +, tor-ad...@orionjurinform.com wrote 
> 0.8K bytes in 18 lines about:
> : Does a Tor-version for WM exist? I thought that such tor-version didn't
> : exist.
> 
> It doesn't exist in binary form.  However, thanks to a volunteer, we
> just committed some code to support it this week.
> 
> See,
> https://gitweb.torproject.org/tor.git/commit/312f4ee410de718aaf20030d22a93f1c258faa37
> for an example.
> 

I have got the 312f4ee410de718aaf20030d22a93f1c258faa37.tar.gz file and
how I could install it to my WM-PPC? It seems me that I can't do it
through make && make install under my Linux-machine (for WM).
Sorry for lamer's qustion but I have never compiled windows-programs
from sources.
And where can I get OpenSSL and libz for the WM, does they exist? (I
have read in the readme.txt file that "OpenSSL and libz both compile on
MinGW out of the box").
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: When can I get TOR for mobile?

2010-05-25 Thread Orionjur Tor-admin
Nathan Freitas wrote:
> Sorry, there is no version of Tor available for that class of Java phone 
> currently. You need to upgrade to an Android, Windows Mobile, Nokia N900 or 
> iPhone device.
> 
> On May 24, 2010, at 12:20 PM, emigrant wrote:
> 
>> sony ericsson k530i
> 
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

Does a Tor-version for WM exist? I thought that such tor-version didn't
exist.
Where I can get it?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/