Re: I wish to see one video on you tube

2011-02-08 Thread Praedor Atrebates
On Tuesday, February 08, 2011 05:45:37 pm you wrote:
> On Tue, Feb 8, 2011 at 3:49 PM, Martino Papesso  wrote:
> > Hallo I live in Italy.
> > I have firefox portable version with tor download from here :
> > http://www.torproject.org/dist/torbrowser/tor-browser-1.3.17_it.exe .
> > I wish to see this video
> > http://www.youtube.com/watch?v=AmhApE1kIgA&feature=player_embedded.
> > In Italy is not possible.
> > For one friend in Romania is possible to see this
> > video(http://img806.imageshack.us/img806/7321/31962895.png).
> > I tried to watch the video using tor but did not succeed.
> > I'm not very handy when using tor.
> > Could you help me for to see this video please.
> > Is there one person who speak Italian?
> > Many thanks.
> > Ciao.
> > Martino
> 
> 
>  Clicking the link you post for the video,
> http://www.youtube.com/watch?v=AmhApE1kIgA&feature=player_embedded,
> this is what I get here in the USA.
> 
> This video contains content from Sony Music Entertainment. It is not
> available in your country.
> 
> Which tells me it is not available here either. Makes me wonder which
> country's are allowed to watch it.
> 
> Jon

Odd.  I tried it originally via tor and the first time got it but didn't get it 
to play (noscript addon blocking) and then I got a denial as above.  I then 
started firefox without tor in the USA and was able to view/listen no problem.

-- 
The means of defense against foreign danger historically have become the 
instruments of tyranny at home. 
– James Madison
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: I wish to see one video on you tube

2011-02-08 Thread Praedor Atrebates
The video is from Silent Hill 2 OST.  You MAY be able to play it if 1) you 
enable flash in your firefox browser and 2) you select an exit from a country 
not restricted (like Romania).  I say MAY because if they use flash to check 
your location, sidestepping tor, then you will get the same restricted message.

praedor

On Tuesday, February 08, 2011 04:49:28 pm you wrote:
> Hallo I live in Italy.
> I have firefox portable version with tor download from here :
> http://www.torproject.org/dist/torbrowser/tor-browser-1.3.17_it.exe .
> I wish to see this video
> http://www.youtube.com/watch?v=AmhApE1kIgA&feature=player_embedded.
> In Italy is not possible.
> For one friend in Romania is possible to see this
> video(http://img806.imageshack.us/img806/7321/31962895.png).
> I tried to watch the video using tor but did not succeed.
> I'm not very handy when using tor.
> Could you help me for to see this video please.
> Is there one person who speak Italian?
> Many thanks.
> Ciao.
> Martino
> 
> 
> 
> 
> 
> 
> 
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 
> 

-- 
The means of defense against foreign danger historically have become the 
instruments of tyranny at home. 
– James Madison
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: DuckDuckGo

2010-08-18 Thread Praedor Atrebates
On Wednesday, August 18, 2010 01:11:28 pm you wrote:
> Just a few days ago I recall reading an announcement that duckduckgo (search 
> engine) was running a tor exit farm right here in this list.  I get my tor 
> setup and running and go over to duckduckgo to test it all out and what do I 
> find?  Duckduckgo requires javascript to be enabled!  WTF?  
> 
> Clearly, this is NOT a search engine to use for this reason.

A quick response from DuckDuckGo indicated that they are currently working on a 
non-javascript version  

-- 
Economics is not practiced as a science. Rather, it is a pretentious way to 
covertly promote political prejudices.
- Fred Harrison
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: torcheck failing in reality

2010-08-18 Thread Praedor Atrebates
On Wednesday, August 18, 2010 12:45:05 pm you wrote:
> I am running tor 0.2.1.26, vidalia 0.1.15 on Mandriva with privoxy.  Tor is 
> running and according to vidalia I can see my node and everything else.  If I 
> turn on the torbutton in firefox (and check the proxy settings) and then go 
> to http://check.torproject.org it gives me a nice big "Congratulations" 
> because I'm using tor and then it shows the IP...but it is exactly MY IP.  It 
> isn't covered at all by tor.  So why would this page declare that I'm using 
> tor and then provide me with my actual IP address as evidence?
> 
> I then fired up Konqueror and set it to use a proxy and tried again.  Same 
> thing.  What is going on?  
> 

This is now corrected.  I found a flaw in my privoxy config file related to the 
socks4a setting.  Tor works as expected now.


-- 
Economics is not practiced as a science. Rather, it is a pretentious way to 
covertly promote political prejudices.
- Fred Harrison
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


DuckDuckGo

2010-08-18 Thread Praedor Atrebates
Just a few days ago I recall reading an announcement that duckduckgo (search 
engine) was running a tor exit farm right here in this list.  I get my tor 
setup and running and go over to duckduckgo to test it all out and what do I 
find?  Duckduckgo requires javascript to be enabled!  WTF?  

Clearly, this is NOT a search engine to use for this reason.


-- 
Economics is not practiced as a science. Rather, it is a pretentious way to 
covertly promote political prejudices.
- Fred Harrison
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


torcheck failing in reality

2010-08-18 Thread Praedor Atrebates
I am running tor 0.2.1.26, vidalia 0.1.15 on Mandriva with privoxy.  Tor is 
running and according to vidalia I can see my node and everything else.  If I 
turn on the torbutton in firefox (and check the proxy settings) and then go to 
http://check.torproject.org it gives me a nice big "Congratulations" because 
I'm using tor and then it shows the IP...but it is exactly MY IP.  It isn't 
covered at all by tor.  So why would this page declare that I'm using tor and 
then provide me with my actual IP address as evidence?

I then fired up Konqueror and set it to use a proxy and tried again.  Same 
thing.  What is going on?  
-- 
Economics is not practiced as a science. Rather, it is a pretentious way to 
covertly promote political prejudices.
- Fred Harrison

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: My relay never shows up

2010-08-11 Thread Praedor Atrebates
Yes, I appear to have shown up.  I went over everything I could think of and 
finally checked my firewall/router and for some reason/at some point, the 
dyndns setting was deactivated.  It appears that my actual IP was unavailable 
to tor (just my local IP).  Reactivating dyndns looks like it fixed it.

praedor

On Wednesday, August 11, 2010 03:48:20 pm you wrote:
> Am 11.08.2010 15:20, schrieb Praedor Atrebates:
> > I am running a tor relay called "Stonekeep".
> 
> is it you?
> 
> http://torstatus.blutmagie.de/router_detail.php?FP=a0470c0ea30c3a4d58048db134b8f9e7c6b52d6c
> 
> Olaf
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 
> 

-- 
Economics is not practiced as a science. Rather, it is a pretentious way to 
covertly promote political prejudices.
- Fred Harrison
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


My relay never shows up

2010-08-11 Thread Praedor Atrebates
I am running a tor relay called "Stonekeep".  I have port forwarding set on my 
firewall/router and my personal system firewall permits connections to the tor 
ports.  I am also running Vidalia (Vidalia 0.1.15, tor 0.2.1.26).  My relay 
never shows up in the list of servers/relays and doesn't show up on the various 
tor network status pages.  Why not?  I cannot find anything amiss to render my 
system invisible or unusable to the network.  I have no trouble using the tor 
myself.

praedor
-- 
Economics is not practiced as a science. Rather, it is a pretentious way to 
covertly promote political prejudices.
- Fred Harrison
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: A suggestion to TOR [a proxy server]

2010-07-25 Thread Praedor Atrebates
At work I am unable to run or use tor even from a USB key - they are prevented 
from working. It might be nice to have a website(s) that act as entry points to 
tor and that use names that do not immediately scream TOR PROXY SERVER!  TOR 
ENTRY POINT RIGHT HERE! so that it is less likely for IT departments to be able 
to easily block access to such (I am also prevented from accessing any proxy 
servers and they often name themselves as proxies to boot so they scream their 
nature and make it easy to block).  Is there any way to create tor entry point 
servers that provide the benefits of the tor network without the cost of 
providing the site with user ID AND endpoint site?



On Sunday 25 July 2010 04:40:33 pm you wrote:
> emigrant writes:
> 
> > hi all,
> > i would like to suggest TOR to build some sort of online system,
> > like a proxy server. where ppl just come and enter the address in the
> > text box and hit 'surf with tor' or something. so that the same
> > objective is achieved as in running the TOR client.
> > its easier for pcs and mobile devices as well (as most mobile devices
> > still don't support TOR).
> > 
> > and i think, this can be a step towards the increasing trend of cloud
> > computing, if i have correctly understood what is cloud computing. :D
> 
> The Tor developers don't think that would achieve the "same
> objective" as Tor, because the proxy server would be in a
> position to know both where you are coming from and what you
> are doing.  Tor aims to prevent anyone from being in this
> position, and in any case the Tor Project wouldn't want to be:
> 
> https://www.torproject.org/faq#Torisdifferent
> 
> 

-- 
"The modern conservative is engaged in one of man's oldest exercises in moral
philosophy; that is, the search for a superior moral justification for
selfishness." 
-- John Kenneth Galbraith

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OFF LIST] Re: attempt from Taiwan to connect to my privoxy port

2009-12-16 Thread Praedor Atrebates
As a member of a US military "organization", that term "weaponized icmp", etc, 
is bullshit speak to try to gin up tax dollars to support "info warfare" 
commands and related crap.  You have to call EVERYTHING a weapon or everyone a 
potential terrorist if you want to fund your latest pet project.

Total crap.  "Weaponized" icmp my ass.  And I'm a Comm troop too.  

praedor

On Wednesday 16 December 2009 09:13:09 am you wrote:
> On 12/16/2009 04:52 AM, grarpamp wrote:
>  > And of course everyone knows the Chinese boogeymen are probing the
> >
> > hell out of US address space. Oh wait, so are the Brazilians and
> > the Romanians and the... ;) Why just the other day I was feeling
> > lonely and sent out about 16M 'illegitimate' pings to some random/8
> > just to see who said hello.
> 
> The terms I continue to hear from military organizations are "weaponized
> icmp", "weaponized tcp", and "weaponized probing".
> 
> I don't really know how one can take an icmp packet and determine if
> it's weaponized or innocent, but it's quite the dichotomy that's being
> created.  Interestingly, most of these people don't think tor is
> weaponized.  For whatever that means.
> 

-- 
Freedom is not the Judeo-Christian divinity's gift to anybody. Freedom and 
democracy have their origins with the Greeks and the Romans, who had a bunch 
of gods whose idea of family does not comport with George Bush's.
--Nicholas Von Hoffman, NYObserver
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Random chaff [was: more work for Grobbages]

2009-09-23 Thread Praedor Atrebates
It would appear that the tor network should include some timing randomization 
and reordering of packets to thwart such analysis.  Not so much to really slow 
things down but enough to throw up uncertainty in the packet analyses.

On Wednesday 23 September 2009 10:59:03 am Paul Syverson wrote:
> On Wed, Sep 23, 2009 at 10:01:07AM -0400, Brian Mearns wrote:
> > 
> > So, if I understand this correctly, a correlation attack works (on a
> > very basic level) by noticing that Alice sent a message to Bob (a
> > known Tor node) at time X, and Dave (another known Tor node) sent a
> > message to Wally (a web server) at time X+e, where e is about how long
> > we would expect it to take for the onion to be routed. Is that more or
> > less the idea?
> 
> Yes. But packet counting can also play a role. Cf, 
> "Passive Attack Analysis for Connection-Based Anonymity Systems"
> at http://freehaven.net/anonbib/index.html#SS03
> 
> > 
> > It seems like determining e (time to route the packet) with any degree
> > of precision would be pretty difficult, so is this really a big
> > problem? (or is that still being debated?) 
> 
> It's not. Cf. my "Locating Hidden Servers"
> http://freehaven.net/anonbib/index.html#hs-attack06
> wherein we had zero false positives on any timing attacks conducted
> in finding hidden services, which generally was very quick.
> (That such attacks existed were known for years. That they were not
> just possible but so fast and effective using merely a single
> node in the network was the reason that guard nodes were introduced
> into the Tor network.)
> 
> And building on that see, "Low-Resource Routing Attacks Against Tor"
> http://freehaven.net/anonbib/index.html#bauer:wpes2007
> where timing attacks with epsilon false positives
> were based simply on circuit setup and were shown on general
> Tor circuits, not just for hidden services.
> 
> > On the other hand, if an attacker could monitor a good number of
> > nodes, wouldn't it be fairly easy to determine each three-node
> > circuit segment (like Alice, to Bob, to Charlie) and trace the whole
> > thing end-to-end? It seems like this could be defeated with a more
> > intelligent type of "chaff", where the receiving relay generates N
> > random dummy onions (with an appreciable circuit length) for each
> > onion it receives, and then sends all N+1 into the network in a
> > random order.
> > 
> 
> There's been a lot of research on this. I think Nick pointed at
> some. Cf. the anonbib.
> Research against timing attacks continues. (I'm doing some myself.)
> But so far, any "chaff" strategy in the literature is both too
> expensive and not at all effective against active attacks on
> general low-latency systems for wide use, such as Tor.
> 
> HTH,
> Paul
> 
> 

-- 
“We can have a democratic society or we can have the concentration of great 
wealth in the hands of the few. We cannot have both.” 
— Louis Brandeis, Supreme Court Justice, 1916-1939


Re: Gmail

2009-09-02 Thread Praedor Atrebates
On Wednesday 02 September 2009 02:22:33 am Ansgar Wiechers wrote:
> On 2009-09-01 Ted Smith wrote:
> > On Tue, 2009-09-01 at 23:27 -0400, Andrew Del Vecchio wrote:
> >> Ted Smith wrote:
> >>> On Tue, 2009-09-01 at 22:43 -0400, DM wrote:
>  Don't use Gmail.
> >>> 
> >>> Instead, use...
> >> 
> >> dude you are using gmail, at least allegedly :)
> > 
> > I'm sorry if I was unclear. I meant my statement as a question, namely:
> > "If we are not to use GMail, what mail service should we instead use?"
> 
> Gee, I wonder how people e-mailed before Google created GMail ...
> 
> *shakes head*

Yahoo, prodigy, aol, their school/university, their jobs, etc.  Gmail is a 
relative newcomer.
I have never heard of any of the previously listed servers/providers (activix, 
antifa, etc).  Any of them in the USA?  If you use a mailserver outside the USA 
and you are IN the USA then you can be absolutely certain that all your comms 
will be recorded/stored at the NSA.  While the chance is still fairly high that 
you will still get swept up anyway, it is better to do all one can to minimize 
the chances.  Also, at least a couple of those in the list (nadir.org in 
particular) appears to be defunct.

praedor
-- 
“We can have a democratic society or we can have the concentration of great 
wealth in the hands of the few. We cannot have both.” 
— Louis Brandeis, Supreme Court Justice, 1916-1939


signature.asc
Description: This is a digitally signed message part.


Re: Supercookies

2009-08-20 Thread Praedor Atrebates
On Thursday 20 August 2009 09:36:40 am Ted Smith wrote:
> On Thu, 2009-08-20 at 08:55 +0200, Matej Kovacic wrote:
> > Hi,
> > 
> > I am not sure if this was on this list, but it is an interesting
> > information:
> > 
> > http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/
> > it seems cookies could be "respawned"...
> > 
> > And there is a plugin to remove this LSO's:
> > https://addons.mozilla.org/en-US/firefox/addon/6623
> > 
> > You need to set Flash directory (autodetection does not always work):
> > - Windows: %APPDATA%\Macromedia\Flash Player\
> > - Macintosh: ~/Library/Preferences/Macromedia/Flash Player/
> > - Linux/Unix: ~/.macromedia/Flash_Player/
> > 
> > Maybe something like that should be integraded into TorButton...
> > However, the question is what about Silverlight and other non-flash
> > plugins...
> > 
> > There is also a Windows tool called CCleaner (http://www.ccleaner.com/)...
> > 
> > bye, Matej
> 
> The best solution here is not to use non-free software as a general
> rule, and stay the f*** away from non-free software peddled by companies
> that have their software phone home to "192.168.1.2o7.net". IIRC, Gnash,
> the GNU swf decoder/player/interpreter/whatever, does not have these
> flash cookies, and if it did, you could easily disable or find a way to
> purge them. 

There is a nice writeup on these cookies and simple (non-firefox/global) 
protection from such cookies at:
http://www.linuxplanet.com/linuxplanet/tutorials/6709/1/

No need to go extreme and lose most functionality by going 1% free/open 
software.  You simply lose a lot of nice, desireable web functionality if you 
do.  At the end of the above article is a quick write about Gnash, the 
open/free flashplayer (though lacking a lot of functionality/compatibility) and 
how it handles flash cookies.

-- 
“We can have a democratic society or we can have the concentration of great 
wealth in the hands of the few. We cannot have both.” 
— Louis Brandeis, Supreme Court Justice, 1916-1939


Re: Comcast throws down gauntlet to residential accounts

2009-08-10 Thread Praedor Atrebates
On Monday 10 August 2009 02:55:13 pm Gregory Maxwell wrote:
> On Mon, Aug 10, 2009 at 2:39 PM, Scott Bennett wrote:
> [snip]
>
> > business-class service, but it seems unlikely to be any cheaper.
> >  Verizon's residential service does not currently have a cap, but I don't
> > know whether they prohibit listening on ports accessable from the
> > Internet.
>
> VZN's residential AUP prohibits "servers" along with a number of other
> offensive prohibitions which they don't currently enforce. (For
> example, you're prohibited from using your VZN broadband for anything
> "sexually explicit").
>
> As I recall the business FiOS AUP had it's own set of ridiculous
> terms... but it didn't attempt to prohibit you from running "servers".

AUPs are rarely enforced.  They are there so they can cut you off if/when 
someone complains or you do something to annoy them.

In any case, I would run my servers regardless of their AUP.  NO ONE tells me 
I cannot run sshd or any other of what I consider personally critical apps.  
They also don't get to tell me not to run a tor relay.



-- 
“We can have a democratic society or we can have the concentration of great 
wealth in the hands of the few. We cannot have both.” 
— Louis Brandeis, Supreme Court Justice, 1916-1939


Re: VoIP telephony building like Tor

2009-08-04 Thread Praedor Atrebates
Sigh.  Tor is political by its very existence and design.  It is NOT a neutral 
entity.  Its very existence is for political reasons.

On Monday 03 August 2009 06:19:23 pm Alexander Cherepanov wrote:
> Hi Scott!
>
> On Wed, 29 Jul 2009 02:16:29 -0500 (CDT), Scott Bennett  
wrote:
> >  On Sat, 25 Jul 2009 22:04:11 +0400 "Alexander Cherepanov"
> >
> >  wrote:
> >>You wrote to or-talk@freehaven.net, "Vlad \"SATtva\" Miller" 
 on Sat, 25 Jul 2009 06:59:43 -0500 (CDT):
> >>>  On Sat, 25 Jul 2009 18:12:52 +0700 "Vlad \"SATtva\" Miller" 
 wrote:
> James Brown (25.07.2009 00:16):
> >>
> >>[skip]
> >>
> > Very many Russian people were killed, unlawful arrest or simply
> > disappear last 4 - 5 years from activity our new Government...
> 
> Please, please, keep political FUD off the list.
> >>>
> >>>  Given that what he wrote is about a) events reported in the press
> >>> internationally and b) one of the highest priority justifications for
> >>> having a tor development project in the first place, *your* comment
> >>> would appear to be a non sequitur.  Perhaps you should have changed
> >>> your Subject: line to reflect whatever OT issue you wished to discuss
> >>> instead of what was already being discussed.
> >>>  The OP has requested information, and several of us now have tried
> >>> to find information that he might be able to use to his advantage in
> >>> the situation he believes he faces.  If you have additional information
> >>> along these lines, please post it.
> >>
> >>I'm sure that Vlad is happy to see the ongoing discussion of technical
> >>questions raised by the OP. He just asked to keep political FUD off
> >
> >  He gave no such indication in the single line of text that
> > constituted his followup and to which I was following up.
>
> Ok, I cannot guarantee that he is happy about technical questions:-)
> But he clearly toalks about non-technical points.
>
> >>the list. And I'm completely agree with him, IMHO unfounded (and
> >>founded probably also:-) talks about bloody regime are not for this
> >>mailing list. YMMV.
> >
> >  Please reread what I wrote that you have quoted above.  It doesn't
> > matter whether you support or oppose the OP's political views.
>
> Sure. But only while he keeps his political views for himself and
> doesn't bring them to this list.
>
> > The point
> > is that the OP made apparent reference to events reported both in the
> > press in Russia and in the international press as a reason *he* was
> > afraid and wanted to use tor.  That should be more than sufficient
> > information for anyone on this list to understand the OP's motivation for
> > asking his questions.
>
> Just to be sure: you talk about banning Skype? No problem here, it's a
> valid concern, it's in the news, in the press, on TV etc.
>
> The problem is the rhetoric such as quoted at beginning of this mail.
> OP started the thread talking about bloody regime. IMHO it already is
> beyond the acceptable line. But then he continues about killed people
> etc. in the following mails. That very much brings the politics to the
> list and adds nothing to the technical side of discussions.
>
> >>As for banning Skype in Russia, AFAICT it's FUD also. Everything seems
> >>to be based on some discussions in The Russian Union of Industrialists
> >>and Entrepreneurs (just hysterics by mobile operators loosing market
> >>share?). It's somewhat troubling but I'm not sure it's worth much
> >>discussion until there are some concrete details.
> >
> >  Fair enough.  However, if Phil Zimmermann had waited until the FBI
> > had its Carnivore system up and running, along with further development
> > already in progress, we probably would never have gotten PGP or its
> > successors.  He dropped all of his paying work for many months in order
> > to design, code, test, and release PGP 1.0, all justified *in his own
> > mind* on the basis of what he had heard or read that the FBI was talking
> > about doing.
>
> One doesn't need to wait for additional reasons to switch away from
> Skype. It's proprietary and closed technology with all accompanying
> problems. BTW last news are about eBay possibly closing Skype entirely
> which is quite in line with its proprietary nature. So no question
> here.
>
> If someone is concerned about possibility of banning Skype or VoIP in
> general s/he can start with research how VoIP is banned in those
> countries in which it's already banned. There are some examples in
> http://en.wikipedia.org/wiki/VoIP#Legal_issues .
>
> >>What the OP proposes is also somewhat strange. Build the possibility
> >>to "call to ordina[r]y telephones" into Tor? Sure, just add some PSTN
> >>exit nodes...
> >
> >  Yeah, well, that is certainly unnecessary.  Specific applications
> > should be developed outside of tor by interested parties.  I already
> > worry that tor itself will become too large and complex to be kept safe
> > to use. There are already various telephone appl

Re: VoIP telephony building like Tor

2009-07-24 Thread Praedor Atrebates
On Friday 24 July 2009 10:21:52 am James Brown wrote:
> Gitano wrote:
> > James Brown wrote:
> >> There is a very strong control over telephony in many countries. Many
> >> counties intend to make this control more and more stronger.
> >> In the Russia, when I live, for example the Putin's and Medvedev's
> >> bloody dictatorial regim now intend to ban VoIP telephony:
> >> http://www.point.ru/news/stories/20598/
> >> Besides, there is no effective open source system of VoIP telepony which
> >> let people freely talk and connect by chat and sending-receiving files
> >> between each other without any control from Governments, companies etc.,
> >> maintaining anonimity and encryption of communication at the same time.
> >
> > For chat and files exchange there exists a nice small program 'TorChat'.
> >
> > --> http://code.google.com/p/torchat/
>
> And what about phone calls, including call to ordinaty telephones?

You might want to take a look at zfone and zrtp.  zfone is a free software 
phone that originates zrtp, an encryption scheme about to be implemented into 
a number of other free softphones (ekiga, for instance).  

http://www.zfoneproject.org/prod_zfone.html

If you and your recipient have zfone (or a zrtp-enabled softphone) then it 
will automatically establish an encrypted, secure connection.  You don't get 
anonymity but you do get privacy.  

praedor

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: eventdns: all nameservers have failed

2009-07-16 Thread Praedor Atrebates
On Thursday 16 July 2009 01:00:01 pm Scott Bennett wrote:
>  On Thu, 16 Jul 2009 09:53:36 -0400 Praedor Atrebates
> 
>
> wrote:
> >I get this message now in my tor log.  No other useful info provided.
> >
> >What is the cause?  I have been cleaning up my system daemons (Mandriva
> > linux) and terminated a few services that I didn't believe I needed.
>
>  I'm not sure that anyone knows yet.  I get this messages, too, usually
> followed within a few tens of milliseconds by another message, saying that
> one of the name servers is available again.  Here's an example from this
> morning.
>
> Jul 16 07:48:37.512 [warn] eventdns: All nameservers have failed
> Jul 16 07:48:37.535 [notice] eventdns: Nameserver 68.87.72.134 is back up
[...]
Thank you.

I hadn't seen this message in memorable recent history - but only this morning 
after tidying up my ports and other services so I assumed it was associated 
with some service I shut down.

In any case, all I got was the first message, no follow-up.  Just in case I 
shut down and restarted tor and haven't seen it again.  Very sporadic for me 
at this point and possibly a one-off event.

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


eventdns: all nameservers have failed

2009-07-16 Thread Praedor Atrebates
I get this message now in my tor log.  No other useful info provided.

What is the cause?  I have been cleaning up my system daemons (Mandriva linux) 
and terminated a few services that I didn't believe I needed.  

What are the services/ports required for tor to operate properly?  What 
service being shut down might cause this message?

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Odd connection attempt to tor

2009-07-15 Thread Praedor Atrebates
I am running Mandriva with its interactive firewall enabled so it alerts me 
whenever a connection is attempted, including tor network connections to port 
9001.  Usually the source is logical:  an ip address or a system name but just 
this morning I found an odd one I've never seen before.  A connection to my 
port 9001 was made by '.' , that is, just .  No address.

What is this?

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Help Iranian dissidents

2009-06-19 Thread Praedor Atrebates
This website is one of the locations with useful info.  The email 
ph.on.twit...@gmail.com is still active and the place to send tor bridge info.

http://iran.whyweprotest.net/
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: Help Iranian dissidents by collecting and posting Bridge addresses? (here?)

2009-06-19 Thread Praedor Atrebates
On Friday 19 June 2009 13:49:48 Chris Humphry wrote:
> From twitter, there is a user ("austinheap") out of San Fran who organized
>
> >this.  It is simply having people setup squid proxies and sending the
> >pertinent info to him by email or twitter direct message:  ip address and
> > port (change from the default port and other "standard" ports...I set
> > mine up for port 8808).  He then compiles the list of ips and port info
> > and passes it along to his trusted iranian contacts who then disburse the
> > info to their trusted friends.
>
> Excellent info, thanks.
>
> >Try http://blog.austinheap.com/  click through the first blurb screen
> > image in green to get to the actual site.  He has an entry about 1/3 down
> > the page titled "Best proxy practices" for this situation, providing
> > guidance to help and get around the Iranian govt censors.
>
> Great.  I will inform others who want to help but do not know how.
>
> >He is providing guidance on squid proxy.  As for tor, you can setup a
> > bridge relay in addition to this direct proxy.
>
> Do you know if he reads this list?  Have you contacted him about Tor?  The
> Revolutionary Guard has stated they will crack down on anyone disseminating
> images out of Iran.  I fear they could be running honey pots in the form of
> simple squid proxies and such.  So austinheap just trusts each provider of
> squid proxies at face value?  That seems very dangerous...


There is a parallel tor bridge effort going on.  You setup your tor bridge and 
send you information to ph.on.twit...@gmail.com.  Austinheap (among one or two 
others) collects the squid proxy info and passes it on and the people behind 
explaining how the iranians can quickly setup and use tor are collecting 
bridge info.  Their original website (http://tor.ir.org/) appears to be toast 
but the tor main website is linked to from one of the protest aid sites and 
I've seen many links to tor in twitter.  I am trying to verify that the 
ph.on.twitter email is still active and good.

Also:  http://blog.austinheap.com/ has some info.  He provides the squid info 
but also recently posted that Freegate appears to be working (hadn't heard of 
freegate until now) in  Iran.  Apparently, it is popular with chinese in 
evading their firewall censors.

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: Help Iranian dissidents by collecting and posting Bridge addresses? (here?)

2009-06-18 Thread Praedor Atrebates
From twitter, there is a user ("austinheap") out of San Fran who organized 
this.  It is simply having people setup squid proxies and sending the 
pertinent info to him by email or twitter direct message:  ip address and port 
(change from the default port and other "standard" ports...I set mine up for 
port 8808).  He then compiles the list of ips and port info and passes it 
along to his trusted iranian contacts who then disburse the info to their 
trusted friends.

Try http://blog.austinheap.com/  click through the first blurb screen image in 
green to get to the actual site.  He has an entry about 1/3 down the page 
titled "Best proxy practices" for this situation, providing guidance to help 
and get around the Iranian govt censors.

He is providing guidance on squid proxy.  As for tor, you can setup a bridge 
relay in addition to this direct proxy.

praedor

On Thursday 18 June 2009 13:51:45 Chris Humphry wrote:
> Hi Roger,
>
> On Wed, 2009-06-17 at 22:11 -0400, Roger Dingledine wrote:
> >>On Wed, Jun 17, 2009 at 06:26:43PM -0700, Chris Humphry wrote:
> >>Please help...without proxies (ie. Bridges) the Iranian dissidents
> >>have no voice!
> >
> >Yeah, see, I'm not sure whether this is true. If ordinary bridges are
> >working, then probably ordinary Tor relays are working too. Or said
> >another way, if ordinary Tor relays aren't working, probably ordinary
> >bridges won't work either.
>
> I have no idea if Tor relays are working from Iran or not.  On CNN they
> have been reporting that a vast amount of proxies are provided each day
> to the dissidents.  Supposedly that is how they are sending the pics and
> video we see each day.  To me it sounds like plain ol' one hop open
> proxies, not Tor.  I have emailed CNN asking how one can provide proxies
> and to which organization, they have yet to email me back.
>
> >We've heard rumors they're blocking all encrypted traffic. Does this
> >mean everything that does an SSL handshake no matter the port? Or does
> >it mean the blocked port 443?
> >
> >If the former, an automated system like Tor is going to have a tough time
> >keeping up -- at least without the tweaks we've been pondering over the
> >past few days. ;)
>
> Even if it is the former I like the tone of your sentence!  I am looking
> forward to seeing what your guys/gals come up with :)
>
> >If the latter, then setting up a bunch of bridges on port 80 (even
> >though everything's still encrypted) might be the ticket.
>
> I will email CNN and ask them, but they are getting SO much email I
> have doubts they will get back to me.  Does Tor Project not have contacts
> in Iran?  I wonder how/if we can find out specifically how the Iran
> Government is blocking Internet access?
>
> If a representative from the EFF or Tor contacted CNN I bet they would
> respond...
>
> >Lots of misinformation going around, and not so much information.
>
> Yea I was wondering about that.  Who to trust?...
>
> Thanks!

-- 
There is danger from all men. The only maxim of a free government ought to be 
to trust no man living with power to endanger the public liberty.
- John Adams [1772]


Re: This doubletalk is driving me nuts

2009-06-04 Thread Praedor Atrebates
On Thursday 04 June 2009 13:31:34 Ted Smith wrote:
> On Thu, 2009-06-04 at 13:28 -0400, Praedor Atrebates wrote:
> > I have just built and installed tor-0.2.1.15-rc in replacement for my
> > previous 0.2.0.34 version.
> >
> > Nothing has changed from before this upgrade, not the location or entries
> > in my torrc, not the perms on tor, not the perms on /var/lib/tor, etc. 
> > When I try to start tor via vidalia, it now fails with messages:
> >
> > Jun 04 13:23:43.160 [Warning] Error setting groups to gid 85: "Operation
> > not permitted".
> > Jun 04 13:23:43.160 [Warning] If you set the "User" option, you must
> > start Tor as root.
> > Jun 04 13:23:43.160 [Warning] Failed to parse/validate config: Problem
> > with User value. See logs for details.
> > Jun 04 13:23:43.160 [Error] Reading config failed--see warnings above.
> >
> >
> > I have a "toruser" group set on my system.  I am a member of the toruser
> > group.  It worked before, but now it doesn't.  Then there is the
> > doubletalk - "you must start tor as root"   I read that it is a
> > bad idea and totally unnecessary to run tor as root and here this message
> > is telling me I MUST run it as root all of a sudden.
> >
> > I want vidalia to start tor when I run it as a mere user who happens to
> > be a member of the toruser group.  How do I do this?  Nothing I do with
> > the vidalia settings changes anything and I am still prevented from
> > running tor and I will not run it as root.
> >
> > Someone, please explain/help?
> >
> > thx
> > praedor
>
> If you set the "User" option in torrc, Tor will try to change uid to
> that user. That capability is only available to the root user. If you
> want to run Tor as a lower user from the start, unset the "User" option.


Thanks, but if I unset the user option then it fails to start because it 
cannot create /var/lib/tor (which exists and is owned by toruser.toruser of 
which I am a member).

I do not want the lib/tor in my home I want it in one single location on my 
system.  This worked before I upgraded to 0.2.1.15-rc so I don't understand 
why it refuses now.

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


This doubletalk is driving me nuts

2009-06-04 Thread Praedor Atrebates
I have just built and installed tor-0.2.1.15-rc in replacement for my previous 
0.2.0.34 version.  

Nothing has changed from before this upgrade, not the location or entries in 
my torrc, not the perms on tor, not the perms on /var/lib/tor, etc.  When I 
try to start tor via vidalia, it now fails with messages:

Jun 04 13:23:43.160 [Warning] Error setting groups to gid 85: "Operation not 
permitted".
Jun 04 13:23:43.160 [Warning] If you set the "User" option, you must start Tor 
as root.
Jun 04 13:23:43.160 [Warning] Failed to parse/validate config: Problem with 
User value. See logs for details.
Jun 04 13:23:43.160 [Error] Reading config failed--see warnings above.


I have a "toruser" group set on my system.  I am a member of the toruser 
group.  It worked before, but now it doesn't.  Then there is the doubletalk - 
"you must start tor as root"   I read that it is a bad idea and 
totally unnecessary to run tor as root and here this message is telling me I 
MUST run it as root all of a sudden.  

I want vidalia to start tor when I run it as a mere user who happens to be a 
member of the toruser group.  How do I do this?  Nothing I do with the vidalia 
settings changes anything and I am still prevented from running tor and I will 
not run it as root.  

Someone, please explain/help?

thx
praedor

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: Tor 0.2.1.15-rc is out

2009-06-01 Thread Praedor Atrebates
I don't get it.  Apparently there is no such things as libevent-devel for 
Mandriva so I cannot build tor.  Mandriva has libevent2 (but there is no 
libevent2-devel) and it has libevent-devel for 1.4.8 but it conflicts with 
libevent2.  It also have libevent0.9_0-devel but tor doesn't care.

What libevent is tor requiring?

On Sunday 31 May 2009 16:37:34 Roger Dingledine wrote:
> Tor 0.2.1.15-rc marks the second release candidate for the 0.2.1.x
> series. It fixes a major bug on fast exit relays, as well as a variety
> of more minor bugs.
>
> This is a release candidate! That means that we don't know of any
> remaining show-stopping bugs, and this will become the new stable if
> there are no problems. Please test it, and tell us about any problems
> that you find.
>
> https://www.torproject.org/download.html.en
>
> Changes in version 0.2.1.15-rc - 2009-05-25
>   o Major bugfixes (on 0.2.0.x):
> - Fix a timing-dependent, allocator-dependent, DNS-related crash bug
>   that would occur on some exit nodes when DNS failures and timeouts
>   occurred in certain patterns. Fix for bug 957.
>
>   o Minor bugfixes (on 0.2.0.x):
> - Actually return -1 in the error case for read_bandwidth_usage().
>   Harmless bug, since we currently don't care about the return value
>   anywhere. Bugfix on 0.2.0.9-alpha.
> - Provide a more useful log message if bug 977 (related to buffer
>   freelists) ever reappears, and do not crash right away.
> - Fix an assertion failure on 64-bit platforms when we allocated
>   memory right up to the end of a memarea, then realigned the memory
>   one step beyond the end. Fixes a possible cause of bug 930.
> - Protect the count of open sockets with a mutex, so we can't
>   corrupt it when two threads are closing or opening sockets at once.
>   Fix for bug 939. Bugfix on 0.2.0.1-alpha.
> - Don't allow a bridge to publish its router descriptor to a
>   non-bridge directory authority. Fixes part of bug 932.
> - When we change to or from being a bridge, reset our counts of
>   client usage by country. Fixes bug 932.
> - Fix a bug that made stream bandwidth get misreported to the
>   controller.
> - Stop using malloc_usable_size() to use more area than we had
>   actually allocated: it was safe, but made valgrind really unhappy.
> - Fix a memory leak when v3 directory authorities load their keys
>   and cert from disk. Bugfix on 0.2.0.1-alpha.
>
>   o Minor bugfixes (on 0.2.1.x):
> - Fix use of freed memory when deciding to mark a non-addable
>   descriptor as never-downloadable. Bugfix on 0.2.1.9-alpha.

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: A tor error message prior to crash

2009-05-19 Thread Praedor Atrebates
Thanks.  I'll check it out.  

I have also since found that the problem is associated with being and exit 
rather than being a relay.  

I was using Vidalia default settings and set to be a relay (Vidalia in this 
regard appears to configure tor to be either/both(?).  I delved deeper into the 
Vidalia configuration options and deselected any settings that seemed to set me 
up to serve as an exit.  Since doing this, tor has not faltered on me at all.

On Tuesday 19 May 2009 13:54:51 Nick Mathewson wrote:
> On Mon, May 11, 2009 at 01:33:41PM -0400, Praedor Atrebates wrote:
> > I finally picked up a log entry that is associated with vidalia/tor
> > failing at random moments:
> >
> > May 11 13:30:49.177 [err] Error from libevent: event_queue_insert:
> > 0xa2e6d68(fd 33) already on queue 2
> >
> > What does this mean and how do I fix it?
>
> I have a patch in the repository that might fix it.  If you can build
> from source, please try out the latest maint-0.2.1 branch to see
> whether the bug is gone for you.
>
> (There might be some warning messages in the log that start with
> "Bug".  If there are, please let me know.)
>
> yrs,

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


What is url for tor proxy list?

2009-05-19 Thread Praedor Atrebates
I keep getting blocked from joining freenet.org IRC because it thinks I am 
running a tor exit.  I have my system set to be a RELAY only and I recall 
there being a nice official website that lists current tor servers and whether 
they are good, bad, reliable, etc.  Can anyone point me to the proper URL?  I 
want to make sure it is listing me as a relay and not an exit.

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: A tor error message prior to crash

2009-05-13 Thread Praedor Atrebates
It isn't a matter of how I feel, it is simply a fact.  If my tor relay server 
is going to keep crashing randomly, then I cannot operate it because I do not 
have the time to babysit it and keep restarting it.

On Wednesday 13 May 2009 07:33:58 Andrew Lewman wrote:
> Praedor Atrebates wrote:
> > I can no longer provide support to the tor network because my tor relay
> > server wont operate for more than an hour at a time AT BEST.
>
> Sorry you feel this way.  Bug 957 seems like an odd bug affecting some
> specific configurations or operating systems.  This assumes you're
> seeing the affects of bug 957 and not some new bug.  However, without
> gdb and core output, we'll never know.

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: A tor error message prior to crash

2009-05-12 Thread Praedor Atrebates
Just great.  I have now tried the mandriva cooker libevent rpm and it produces 
the crash as well as the 2009.1 libevent and the previous (updated version) of 
2009.0 libevent.

I can no longer provide support to the tor network because my tor relay server 
wont operate for more than an hour at a time AT BEST.

praedor

On Monday 11 May 2009 14:01:19 Olaf Selke wrote:
> Praedor Atrebates schrieb:
> > I finally picked up a log entry that is associated with vidalia/tor
> > failing at random moments:
> >
> > May 11 13:30:49.177 [err] Error from libevent: event_queue_insert:
> > 0xa2e6d68(fd 33) already on queue 2
>
> there's an existing bug report for this issue:
> http://bugs.noreply.org/flyspray/index.php?do=details&id=957
>
> Got already about a dozen core dumps triggered by libevent.
>
> yrs Falo

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: A tor error message prior to crash

2009-05-11 Thread Praedor Atrebates
I am running (or trying to) tor-0.2.0.34.  My libevent was 
libevent2-1.4.8-2mdv (with 2009.1 mandriva install) but after this, I went 
back and tried libevent2-1.4.7-1mdv from mandriva 2009.0.  Same ultimate 
result with same error message.  I am about to try the mandriva cooker 
libevent2-1.4.10-1mdv rpm.

I run a tor relay server.

praedor
On Monday 11 May 2009 14:54:56 Nick Mathewson wrote:
> On Mon, May 11, 2009 at 08:01:19PM +0200, Olaf Selke wrote:
> > Praedor Atrebates schrieb:
> > > I finally picked up a log entry that is associated with vidalia/tor
> > > failing at random moments:
> > >
> > > May 11 13:30:49.177 [err] Error from libevent: event_queue_insert:
> > > 0xa2e6d68(fd 33) already on queue 2
> >
> > there's an existing bug report for this issue:
> > http://bugs.noreply.org/flyspray/index.php?do=details&id=957
> >
> > Got already about a dozen core dumps triggered by libevent.
>
> What?? The logs say this?
>
> Olaf, I didn't know the logs said that.  Do they?  It would help to
> know if they did.
>
> Praedor -- do you have a stack trace here?  What version of Libevent
> do you have, if you know?  Is this a server or a client?
>
> yrs,

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: Vidalia issue yet ANOTHER problem

2009-05-11 Thread Praedor Atrebates
Frankly, I have no idea what log level I am operating tor at because I am only 
now trying to work with vidalia and have no idea what it's settings are in 
that regard.  I am trying to use vidalia with its defaults (at least as they 
are in the mandriva rpm).  I DID alter the vidalia conf so that instead of 
stderr, tor is logging to /usr/local/var/log/tor/debug.log.

It took a while for me to figure out how Tork was doing things.  I think it may 
take at least a little for futzing before I figure out the basics of vidalia 
too.

praedor

On Monday 11 May 2009 13:33:49 Jon wrote:
> Praedor Atrebates wrote:
> > On Saturday 09 May 2009 08:25:30 Andrew Lewman wrote:
> >> On Fri, 8 May 2009 13:01:23 -0400
> >>
> >> Praedor Atrebates  wrote:
> >>> I have had to give up on Tork and am now trying to make vidalia
> >>> work.  I am unable to get vidalia to assign a password to the control
> >>> port.  How does one do this short of running vidalia as root?  It is
> >>> preventing me from being able to support the tor network because I do
> >>> not want to run with no protected control port.
[...]
> > I have just confirmed yet another vidalia problem:  the log window, if
>
> opened,
>
> > scrolls rapidly and refuses to clear or close after I've opened it while
> > vidalia is running.  All the buttons in the window become unresponsive
>
> and the
>
> > only way to close the window is to click the shutdown X in the window
>
> corner.
>
> > After that, in about 5 seconds, I get a message that the message window
>> is not
> > responding and do I want to terminate the application or keep it
>> running (it
> > eats up lots of CPU too).  I hit "terminate" and it takes vidalia down

> with
>
> > it.

> What log level are you running when this occurs?

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


A tor error message prior to crash

2009-05-11 Thread Praedor Atrebates
I finally picked up a log entry that is associated with vidalia/tor failing at 
random moments:

May 11 13:30:49.177 [err] Error from libevent: event_queue_insert: 
0xa2e6d68(fd 33) already on queue 2

What does this mean and how do I fix it?

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: Vidalia issue yet ANOTHER problem

2009-05-11 Thread Praedor Atrebates
On Saturday 09 May 2009 08:25:30 Andrew Lewman wrote:
> On Fri, 8 May 2009 13:01:23 -0400
>
> Praedor Atrebates  wrote:
> > I have had to give up on Tork and am now trying to make vidalia
> > work.  I am unable to get vidalia to assign a password to the control
> > port.  How does one do this short of running vidalia as root?  It is
> > preventing me from being able to support the tor network because I do
> > not want to run with no protected control port.
>
> Is tor started by the system/run as a daemon?  And vidalia is trying to
> attach to the existing Tor?

I have just confirmed yet another vidalia problem:  the log window, if opened, 
scrolls rapidly and refuses to clear or close after I've opened it while 
vidalia is running.  All the buttons in the window become unresponsive and the 
only way to close the window is to click the shutdown X in the window corner.  
After that, in about 5 seconds, I get a message that the message window is not 
responding and do I want to terminate the application or keep it running (it 
eats up lots of CPU too).  I hit "terminate" and it takes vidalia down with 
it.

-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Re: Vidalia issue and then some more

2009-05-11 Thread Praedor Atrebates
On Saturday 09 May 2009 08:25:30 Andrew Lewman wrote:
> On Fri, 8 May 2009 13:01:23 -0400
>
> Praedor Atrebates  wrote:
> > I have had to give up on Tork and am now trying to make vidalia
> > work.  I am unable to get vidalia to assign a password to the control
> > port.  How does one do this short of running vidalia as root?  It is
> > preventing me from being able to support the tor network because I do
> > not want to run with no protected control port.
>
> Is tor started by the system/run as a daemon?  And vidalia is trying to
> attach to the existing Tor?

Hello.  Tor is started by myself when I start Vidalia (or in the past, Tork).  

I am not allowed to assign a password to the control port.

As I've run this for several days now, I am also finding another problem.  
Vidalia will operate for a while but then at some point tor simply dies.  I 
cannot find anything in the vidalia logs to explain why.  I simply notice at 
some point that the vidalia onion icon in my kde panel has developed a red x 
signifying it is no longer operating.

Tork, which I would much rather use (because of the addon support like 
mixminion, anonymous telnet, anonymous ssh, anonymous IRC, etc) no longer 
works.  I upgraded from Mandriva 2009.0, tor-0.2.34, Tork 0.29, to Mandriva 
2009.1, same tor and tork version, yet Tork will no longer function because 
the first run wizard will not bring up the root password dialog to permit 
modification of the privoxy config file and it wont bring up the pword dialog 
to 
set netstat to run as root.  Tor then fails to even start at all so I was 
forced to switch to Vidalia by default.  Now Vidalia and tor wont run 
indefinitely, producing a new problem.

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Vidalia issue

2009-05-08 Thread Praedor Atrebates
I have had to give up on Tork and am now trying to make vidalia work.  I am 
unable to get vidalia to assign a password to the control port.  How does one 
do this short of running vidalia as root?  It is preventing me from being able 
to support the tor network because I do not want to run with no protected 
control port.

Any help on this would be greatly appreciated (I am a member of both sudo and 
toruser).

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


Privoxy change?

2009-05-08 Thread Praedor Atrebates
I just upgraded my linux system to Mandriva 2009.1 and installed tor and tork 
as usual.  I have tried to configure privoxy as in the past with a "forward-
socks4a/localhost:9050 ." added at the end of the config file.  When privoxy 
starts, it produces:  Starting privoxy: May 08 11:52:50.191 b7d2a6c0 Error: 
Ignoring unrecognized directive 'forward-socks4a/localhost:9050 .'

What exactly is the format of this line supposed to be?  Has privoxy changed 
recently to render this nonfunctional?

praedor
-- 
"If we have Senators and Congressmen there that can't protect themselves 
against the evil temptations of lobbyists, we don't need to change our 
lobbies, we need to change our representatives." - Will Rogers


signature.asc
Description: This is a digitally signed message part.


Re: Moxie Marlinspike

2009-02-19 Thread Praedor Atrebates
Another good reason to keep ExcludeNodes.

praedor

On Thursday 19 February 2009 07:15:47 Scott Bennett wrote:
>  On Thu, 19 Feb 2009 07:17:04 -0500 Erilenz  wrote:
> >http://blog.internetnews.com/skerner/2009/02/black-hat-hacking-ssl-with-ssl.html
> >
> >There's nothing in there that we didn't already know was possible, and I 
> >realise
> >it's not a Tor specific flaw. I just read this paragraph and thought I'd 
> >pass it
> >on here:
> >
> >"Marlinspike also claimed that in a limited 24 hour test case running on the
> >anonymous TOR network (and without actually keeping any personally 
> >identifiable
> >information) he intercepted 114 yahoo logins â 50 gmail logins, 9 paypal, 9 
> >inkedin and 3 facebook. So apparently the tool works - and works well."
> 
>  Thank you very much for pointing out yet another unscrupulous exit
> operator.  I've just added
> 
> ExcludeExitNodes thoughtcrime,$1E6882D9AB86DA56C48BDE96698B8F8AF81FD707
> 
> to my torrc file.
> >
> >Lots of people simply don't know how to use Tor safely.
> 
>  Very true, but then, lots of people simply don't know how to use the
> Internet safely.  Lots of people don't bother to buy and use a paper shredder
> to dispose of sensitive USnail safely.
> >
> >I wonder if something could/should be built into TorButton to force a list of
> >commonly used services to go entirely over https? Eg any request for
> >^http://mail\.google\.com/.*$
> >
> >Also, how feasible would it be to add a popup which says something along the
> >lines of:
> >
> >"You are about to post unencrypted data over the Tor network. Are you sure 
> >you
> >wish to proceed?"
> 
>  It's looks like a good idea, but what about pop-up blockers?  Maybe it
> should be built into browsers, perhaps enabled as a configurable option turned
> on by default.
> 
> 
>   Scott Bennett, Comm. ASMELG, CFIAG
> **
> * Internet:   bennett at cs.niu.edu  *
> **
> * "A well regulated and disciplined militia, is at all times a good  *
> * objection to the introduction of that bane of all free governments *
> * -- a standing army."   *
> *-- Gov. John Hancock, New York Journal, 28 January 1790 *
> **
> 
> X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on 
> lapdog.ravenhome.net
> X-Spam-Level: **
> X-Spam-Status: No, score=6.7 required=8.0 tests=EMPTY_MESSAGE,MISSING_DATE,
>   
> MISSING_HEADERS,MISSING_MID,MISSING_SUBJECT,NO_HEADERS_MESSAGE,NO_RECEIVED,
>   NO_RELAYS,TVD_SPACE_RATIO autolearn=no version=3.2.5
> Learned tokens from 1 message(s) (1 message(s) examined)
> 
> X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on 
> lapdog.ravenhome.net
> X-Spam-Level: **
> X-Spam-Status: No, score=6.7 required=8.0 tests=EMPTY_MESSAGE,MISSING_DATE,
>   
> MISSING_HEADERS,MISSING_MID,MISSING_SUBJECT,NO_HEADERS_MESSAGE,NO_RECEIVED,
>   NO_RELAYS,TVD_SPACE_RATIO autolearn=no version=3.2.5
> Learned tokens from 1 message(s) (1 message(s) examined)
> 
> 

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Re: another reason to keep ExcludeNodes

2009-02-17 Thread Praedor Atrebates
I'm with Bennett on this.  Taking away ExcludeNodes is essentially taking power 
and choice from tor users.

Always always always default towards providing more choice and power to users, 
not less.  In any case, as indicated, reporting bad nodes is not exclusive of 
ExcludeNodes.  ExcludeNodes is effective immediately.  Reporting a bad node 
takes time for a response.  Allow us to exclude the nodes we wish to exclude 
NOW, not after some period of time after reporting for something to be done.

praedor

On Tuesday 17 February 2009 14:05:09 Scott Bennett wrote:
>  On Tue, 17 Feb 2009 17:54:51 +0100 Mitar  wrote:
> >On Tue, Feb 17, 2009 at 10:59 AM, Scott Bennett  wrote:
> >> I just read Roger's message from July 2006 on playing down the use of
> >> ExcludeNodes and maybe eventually eliminating it.  I encountered a reason
> >> to use it not long ago that doesn't seem to have been mentioned.  I noticed
> >> that certain image files that are frequently updated and that I look at 
> >> many
> >> times a day were getting truncated at random points in the files.  After a
> >> little bit of investigation it turned out that one particular relay was
> >> always in a circuit that truncated those files, so I added it to my
> >> ExcludeNodes list.  And voila' complete images from then on.
> >
> >Would not it be better if you would report this node so that its
> >problem can be fixed?
> >
>  Certainly, but that isn't possible when no valid contact information is
> provided in the relay descriptor in the directory.  It also doesn't allow an
> immediate solution to the problem for the user.  Notification and use of
> ExcludeNodes are not mutually exclusive, after all.

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Re: Bittorrent

2009-02-17 Thread Praedor Atrebates
As a relay, it would be quite easy to never ever see full utilization.  The 
main limiting factor would be entry nodes, or more likely, exit nodes.  The 
number of exit nodes are MUCH lower than the number of relays so while your 
system may see little traffic, the exit nodes could easily be maxed out.

On Tuesday 17 February 2009 04:00:57 Scott Bennett wrote:
>  On Tue, 17 Feb 2009 08:40:23 + sigi  wrote:
> >On Tue, Feb 17, 2009 at 09:21:30AM +0100, Marco Bonetti wrote:
> >> On Mon, February 16, 2009 22:17, Ted Smith wrote:
> >> > Yes, I believe the proper way to do so is to use Tor as the tracker
> >> > proxy, but conduct actual data transfer "in the clear". Or at least,
> >> > that's what I've seen on this list in the past. Would anyone like to
> >> > correct me?
> >> 
> >> it's also possible to run an "all-torified" bittorrent swarm (both peers
> >> and tracker) and more, see the instructions on the azureus site:
> >> http://azureus.sourceforge.net/doc/AnonBT/Tor/howto_0.5.htm
> > 
> >You definitely shouldn't do that, since the tor-network is not capable 
> >of such a huge traffic-amount through P2P with bittorrent these days. 
> >
> >By downloading with bittorrent via Tor, you take away the bandwidth 
> >from the people who really need it for browsing the web safely.  
> >
>  Really?  I know that seems to be in accord with the received wisdom
> on this list, but I, for one, no longer make that assumption.  For one thing,
> my node spends most of the time handling somewhere between 15% and 50% of its
> proven data rate capacity.  Occasionally it may sustain on the order of 70%
> or 75% for up to a few minutes at a time.  Also, the torstatus page now
> frequently shows many more nodes that have peaked at over 5,000 KB/s (14 the



-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


Re: Win98Se and Tor (thread restart)

2009-02-12 Thread Praedor Atrebates
Wow.  Was that on a 486 or a pentium?

On Thursday 12 February 2009 14:21:27 pho...@rootme.org wrote:
> I setup Win98SE today.  I used the vidalia-bundle for 0.2.0.34.
> Installed and ran.  It works fine.
> 
> http://interloper.org/tmp/tor/2009-02-12-win98se-tor-works-0.png
> 
> and
> 
> http://interloper.org/tmp/tor/2009-02-12-win98se-tor-works-1.png
> 
> In fact, I can't make either Tor or Vidalia crash.  If I set the total
> system memory to 80MB, as suggested by the original poster, Win98SE
> swaps to death, but eventually does run vidalia and tor.
> 
> So, without further data, screenshots, code snippets, etc, I cannot
> replicate the problem.
> 

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


Re: Some Bones to Pick with Tor Admins

2009-02-12 Thread Praedor Atrebates
The recommend for NOT word wrapping (and allowing the end client handle it) 
came 
from one of the only groups that matter:  a linux group.

One's email client should handle formatting for display, or have the 
capability, 
or it is broken or poorly designed or written in dinosaur days.

On Thursday 12 February 2009 06:36:09 Hannah Schroeter wrote:
> Hi!
>
> On Wed, Feb 11, 2009 at 08:16:08PM -0500, Praedor Atrebates wrote:
> >Bit of a problem there (with long text lines).  If I want to be able to
> > send http links to friends/ colleagues/family, I have to turn off the new
> > line feature in my email client and allow end-user email clients deal
> > with formatting (all too often, if you have auto-formatting/new lines
> > setup, you will totally bork http links).
>
> Huh? If you wrap lines only at whitespace, http links are not wrapped,
> even with automatic line wrapping.  And if you hit return before the
> line gets 72 characters long (and not only at about 100 characters!),
> it's no problem either.
>
> >[...]
>
> Kind regards,
>
> Hannah.

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


Re: Some Bones to Pick with Tor Admins

2009-02-11 Thread Praedor Atrebates
Bit of a problem there (with long text lines).  If I want to be able to send 
http links to friends/
colleagues/family, I have to turn off the new line feature in my email client 
and allow end-user
email clients deal with formatting (all too often, if you have 
auto-formatting/new lines setup,
you will totally bork http links).  

What client are you using that is causing a problem?  Mutt?

On Wednesday 11 February 2009 19:48:41 Scott Bennett wrote:
>  On Wed, 11 Feb 2009 07:49:05 -0500 Praedor Atrebates 
> top-posted:
> >Looks like I may have to create a procmail filter to pre-dump posts.
> >
> >Money may be tight now (for lots of peeps) but one should be able to acquire 
> >a much more modern windoze for virtually nothing.  SE?  SE?!!!  Why not run 
> >win95?  Or 3.5?
> >
> >If you are REALLY hurting for money: LINUX!  Download and install a free 
> >version - pick a distro.  ANY modern linux will do much more than SE can, 
> >you wont miss anything but viruses and trojans (though anyone foolish enough 
> >to still run SE doesn't give a f*ck about the trojans and other hacks part 
> >of the equation). If you have SE on something, it is sure as hell you aren't 
> >running anything demanding on it (by modern Homo sapiens standards).  SE 
> >dates back to the Homo erectus period.
> 
>  Do you suppose you could avoid putting entire paragraphs onto single
> lines of text?
>  LINUX is certainly an option, but don't forget the BSDs.  FreeBSD 7, for
> example, is very fast.  For those with multi-CPU or multi-cored CPUs, FreeBSD 
> 7
> and 8-CURRENT have the *only* efficient kernels for heavy CPU loads.  (See
> http://www.freebsd.org.)  PC-BSD 7 is a particular packaging of FreeBSD 7 that
> is especially designed to be newbie-friendly.  (See www.pcbsd.org.)
>  In any case, there is simply no excuse for running tor on unsafe 
> operating
> systems that no longer get security updates.  If the OP would identify his
> tor relay by nickname or key fingerprint, I would be happy to add it to my
> ExcludeNodes list for my own protection.  Also, a machine like the one
> described by the OP cannot contribute much data rate capacity to the tor
> network anyway, so if he were to take it offline permanently, it would be no
> great loss to the tor community and would have the benefit of removing an
> unsafe relay from the network.
> 
> 
>   Scott Bennett, Comm. ASMELG, CFIAG
> **
> * Internet:   bennett at cs.niu.edu  *
> **
> * "A well regulated and disciplined militia, is at all times a good  *
> * objection to the introduction of that bane of all free governments *
> * -- a standing army."   *
> *-- Gov. John Hancock, New York Journal, 28 January 1790 *
> **
> 
> 

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


Re: Some Bones to Pick with Tor Admins

2009-02-11 Thread Praedor Atrebates
Looks like I may have to create a procmail filter to pre-dump posts.

Money may be tight now (for lots of peeps) but one should be able to acquire a 
much more modern windoze for virtually nothing.  SE?  SE?!!!  Why not run 
win95?  Or 3.5?

If you are REALLY hurting for money: LINUX!  Download and install a free 
version - pick a distro.  ANY modern linux will do much more than SE can, you 
wont miss anything but viruses and trojans (though anyone foolish enough to 
still run SE doesn't give a f*ck about the trojans and other hacks part of the 
equation). If you have SE on something, it is sure as hell you aren't running 
anything demanding on it (by modern Homo sapiens standards).  SE dates back to 
the Homo erectus period.

On Tuesday 10 February 2009 20:42:27 Ringo Kamens wrote:
> Don't feed the trolls people.
> 
> Michael G. Reed wrote:
> > On Tue, 10 Feb 2009 mark485ander...@eml.cc wrote:
> > |> no need also to upgrade from 98se, except tor developers are too lazy to
> > |> code properly.
> >
> > You know, Tor is open sourceyou can go fix the damn bugs yourself
> > if they are so important to you and your antiquated setup.  If you
> > weren't being such an ass-hat in the way you are DEMANDING support
> > while insulting the developers and not even so much as filing a
> > quasi-readable bug report, people might actually be willing to help
> > you.  I tend to bet that most folks on this list wrote you off with
> > your very first email...and with good reason.  Just my $0.02.
> >
> > -Michael
> >
> >
> 
> 

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


Re: Time Warner bad / VPS recommendations

2009-02-09 Thread Praedor Atrebates
On Thursday 05 February 2009 16:03:52 Mitar wrote:
> Hi!
> 
> On Thu, Feb 5, 2009 at 9:52 PM, slush  wrote:
> > Although Im big Tor fan, I think it is better idea to run Tor in unused
> > bandwith (like me) on plenty of computers rather than pay together few big
> > centralized servers (like you offer). Firstly, using unused bandwidth is for
> > free. And it is also more secure.
> 
> I agree and this is also the way I am using "my" bandwidth.
> 
> But on the other hand I am seeing many e-mails like "I would like to
> contribute to Tor but my ISP/university/mom does not allow me/has
> blocked me/does not want to hassle". So maybe those could cooperate in
> a way of putting together such nodes.

I've sometimes wondered about the whether it would be possible to alter tor a 
bit, or place another app between tor and the net (perl script or something) 
that would work with a tor exit.  In cases where someone would like to run a 
tor exit node but gets into trouble with their ISP, might it be possible to add 
a script that might take at least the web traffic from a tor exit node in 
question and package it up and send it to anonymizer or kaxy or some other web 
anonymity proxy on the net?  It would be equivalent to adding a 4th, external 
node to the 3 official tor nodes...

This is a variation of a way I have considered for doing some extra 
anonymizing:  use tor to connect to a web anonymizing proxy and browse from 
there.

It would offload complaints about "inappropriate" acts by tor users away from 
the exit node and to the anonymizer service, which I am sure can take it 
because it is what they DO.

praedor

-- 
There is danger from all men. The only maxim of a free government ought to be 
to trust no man living with power to endanger the public liberty.
- John Adams [1772]


Re: another BADEXIT found $8424E8653469B1EFF87E79E8599933A3BAF8FDB2

2009-02-09 Thread Praedor Atrebates
Another option would be for users to block any and all S. Korean nodes as 
exits.  Exclude any S. Korean exit nodes and no matter what "apple" does, you 
wont get caught.

On Monday 09 February 2009 16:42:56 Scott Bennett wrote:
>  On Mon, 9 Feb 2009 19:23:36 +0100 Ansgar Wiechers 
> wrote:
> >On 2009-02-09 pho...@rootme.org wrote:
> >> On Mon, Feb 09, 2009 at 09:07:15AM -0600, benn...@cs.niu.edu wrote 1.4K 
> >> bytes in 26 lines about:
> >> :  An unnamed exit with fingerprint 
> >> $8424E8653469B1EFF87E79E8599933A3BAF8FDB2
> >> : is redirecting HTTP port 80 to
> >> 
> >> Ah, 'apple'.  Again they try this exact same tactic.  Silly people.
> >
> >Please elaborate, because I have no idea what you're referring to? Feel
> >free to e-mail me in private should this be old news for the rest of the
> >list.
> >
>  Some time ago, a tor relay called "apple" appeared.  "apple" was found
> to be a crooked exit relay in that it was replacing the URLs of its exiting
> traffic with URLs of the form
> 
> https://kangnam.megapass.net:7003/index.html?sso=121.138.5.103&no=8403&origin=OriginalURL
> 
> where "OriginalURL" was the URL requested by whatever tor client built the
> circuit using "apple" as its exit relay.  "apple" frequently restarted under
> different IP addresses.  Its perfidy was reported here, and eventually 
> [*ahem*]
> the directory authority operators flagged it as a BADEXIT, so that tor clients
> around the globe would avoid using "apple" as an exit.
>  "apple" disappeared after that for a time, but now it's back.  It still
> uses varying IP addresses, but has changed its private OR key, perhaps to 
> avoid
> recognition as a bad exit.  Unfortunately, there is no good way for the
> software to recognize a corrupt tor operator, but it should be given a BADEXIT
> flag for its *name*, as well as its new key, to force "apple"'s crooked
> operator to change his/her relay's torrc file next time.  It isn't much, but
> anything is a help.

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Re: Time Warner bad / VPS recommendations

2009-02-04 Thread Praedor Atrebates
On Wednesday 04 February 2009 10:23:50 Matthew McCabe wrote:
> Yup, I restricted my exit node policy in hopes that it would limit 
> torrent traffic and it seemed to work.  However, the last "hacking" 
> complaint was the result of someone making excessive or inappropriate 
> postings on a newsgroup or website.  So while the torrent/DMCA 
> complaints stopped, the "hacking" complaints continued.

So...now simply leaving undesirable or unwelcome comments on a site that takes 
comments is "hacking"?

Annoyance factor aside - what a load of crap.

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Re: Here we go again...tor just stops

2009-01-22 Thread Praedor Atrebates
On Thursday 22 January 2009 02:04:49 pho...@rootme.org wrote:
> On Wed, Jan 21, 2009 at 04:22:53PM -0500, prae...@yahoo.com wrote 1.5K bytes 
in 48 lines about:
> : As of this morning I had been running tor-0.2.0.32 through Tork 0.29.2
> : without hitch (Mandriva linux 2009.0).  Any time I have tried to progress
> : to anything beyond this version I run into the same problem every time: 
> : tor will either not run or, more likely, will run for some period of time
> : and then simply stop without any error messages to explain the
> : termination.
>
> Have you run tor with info loglevel yet?  Have you run tor inside gdb?
> Have you enabled ulimit -c unlimited for core dumps?

My ulimit has long since been set at unlimited.  As for logging, I had it set 
to 
debug but nothing came of it.  

I have since gone to 0.2.0.33 and am running it at this time.  If it craps out 
like any and all attempts to run 0.2.1.x-alpha versions since 0.2.0.32 stable, 
I 
will try running it in gdb.
-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Here we go again...tor just stops

2009-01-21 Thread Praedor Atrebates
This is getting annoying to point of wanting to simply drop tor.

As of this morning I had been running tor-0.2.0.32 through Tork 0.29.2 without 
hitch (Mandriva linux 2009.0).  Any time I have tried to progress to anything 
beyond this version I run into the same problem every time:  tor will either 
not 
run or, more likely, will run for some period of time and then simply stop 
without any error messages to explain the termination. 

This morning, I decided to give tor-0.2.1.11-alpha a try.  Built and installed 
just fine and started up just fine.  It was running for at least several hours 
without hitch but then I had to leave for a meeting.  I'm gone for 2 1/2 hours 
only to come back and find that tor has stopped without so much as a single 
message anywhere on the system.  Nothing in the tork logs either.

What the heck is going on? 
-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Re: redirect to meagpass.net while using Tor

2009-01-13 Thread Praedor Atrebates
On Tuesday 13 January 2009 14:58:19 Adlesshaven wrote:
> I was redirected on several slashdot pages I was trying to view.
>

Wait...you anonymously browse slashdot?

Why?

Just curious.
-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Re: redirect to meagpass.net while using Tor

2009-01-13 Thread Praedor Atrebates
Hmpf.  I'll do a little tor-based browsing and keep an eye on my tork window 
and 
identify any exit that redirects me - unless someone beats me to the info.

On Tuesday 13 January 2009 14:58:19 Adlesshaven wrote:
> I was redirected on several slashdot pages I was trying to view.
>
> Praedor Atrebates wrote:
> > Is this occurring while you are trying to go to torcheck
> > (torcheck.xenobite.eu)?
> >
> > praedor
> >
> > On Tuesday 13 January 2009 14:10:36 Adlesshaven wrote:
> >> KT wrote:
> >>> On 1/13/09, Roger Dingledine  wrote:
> >>>> On Tue, Jan 13, 2009 at 05:06:37PM +, KT wrote:
> >>>>> On 1/13/09, John Brooks  wrote:
> >>>>>> Figure out what exit is doing this (visit
> >>>>>> http://torcheck.xenobite.eu/ while
> >>>>>> it's happening)
> >>>>>
> >>>>> Thanks for reply. I tried exactly that but that request was
> >>>>> redirected
> >
> > [...]
> >
> >> I just got this redirection too! Unfortunately I was running log notice
> >> and no Vidalia so I couldn't see what exit I was using. I'll work on
> >> setting it up so I can tell what exit I was using.

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Re: redirect to meagpass.net while using Tor

2009-01-13 Thread Praedor Atrebates
Is this occurring while you are trying to go to torcheck (torcheck.xenobite.eu)?

praedor

On Tuesday 13 January 2009 14:10:36 Adlesshaven wrote:
> KT wrote:
> > On 1/13/09, Roger Dingledine  wrote:
> >> On Tue, Jan 13, 2009 at 05:06:37PM +, KT wrote:
> >>> On 1/13/09, John Brooks  wrote:
>  Figure out what exit is doing this (visit http://torcheck.xenobite.eu/
>  while
>  it's happening)
> >>>
> >>> Thanks for reply. I tried exactly that but that request was redirected
[...]
> I just got this redirection too! Unfortunately I was running log notice
> and no Vidalia so I couldn't see what exit I was using. I'll work on
> setting it up so I can tell what exit I was using.

-- 
"An imbalance between rich and poor is the oldest and most fatal ailment of all 
republics."
--Plutarch


signature.asc
Description: This is a digitally signed message part.


Re: Tor 0.2.1.9-alpha STILL BROKEN

2009-01-05 Thread Praedor Atrebates
On Monday 05 January 2009 13:31:06 Roger Dingledine wrote:
> On Mon, Jan 05, 2009 at 01:24:44PM -0500, Praedor Atrebates wrote:
> > I have not been able to continuously run tor since 0.2.0.31.  EVERY
> > version since fails to run continuously (0.2.1.7, 0.2.1.8, and now
> > 0.2.1.9).  It starts fine, it runs for a while, then simply stops running
> > without any error messages, nothing.  It just stops.
>
> You might find
> https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ReportBug
> to be useful for tracking down the issue.

Thanks for the info/link.  No core but possible reference to a segfault from 
dmesg.  Waiting now for the current instance to crash out.

praedor
-- 
"Moral indignation is jealousy with a halo."
--H.G. Wells


signature.asc
Description: This is a digitally signed message part.


Tor 0.2.1.9-alpha STILL BROKEN

2009-01-05 Thread Praedor Atrebates
I have not been able to continuously run tor since 0.2.0.31.  EVERY version 
since fails to run continuously (0.2.1.7, 0.2.1.8, and now 0.2.1.9).  It 
starts fine, it runs for a while, then simply stops running without any error 
messages, nothing.  It just stops.

What the hell has been changed in tor to so totally wreck it?  Perhaps core 
parts of it should be left as they were in 0.2.0.31 since that works 
flawlessly.  I cannot detail the problem since there are no log entries to 
show why it is failing.

I am running Mandriva linux 2009.0, kernel 2.6.27.  Tor builds without hitch 
and installs without issue.  It simply will not run continuously and will not 
produce any log messages as to why.

praedor
-- 
"Moral indignation is jealousy with a halo."
--H.G. Wells


signature.asc
Description: This is a digitally signed message part.


Re: another tor issue...? (irc...)

2009-01-05 Thread Praedor Atrebates
I rather suspect that you are not going to be able to resolve the issue so 
long as you run an exit.  It doesn't matter what sort of traffic you block, 
all that matters is that your ip will appear in the list of published exit 
nodes shortly after you start it up and that list will lead to you being 
blocked by other sites.

You will either need to operate an exit node from a separate IP than the 
computer (physically or via a separate proxy) you wish to connect to freenode 
with (or use their hidden service) and Slashdot or you will need to forego 
running an exit, no matter how configured (I suppose if you personally knew 
someone at Slashdot or one of the admins of freenode you might finangle a 
personal exception...).

Most of these sites have this policy because of actual past abuses rather than 
a general philosophical dislike of anonymity or tor.

On Monday 05 January 2009 12:03:55 Udo van den Heuvel wrote:
> Praedor Atrebates wrote:
> > To regain normal access, you have to ensure you are not running a tor
> > exit AND you need to contact the freenode operators and request you be
> > unblocked, explaining that you are not running (or are no longer running)
> > a tor exit node.
>
> I did so, thanks. (worked OK)
> So how can I open exit ports without fearing (too much) abuse or bad
> response from otherwise OK services?
> (even slashdot has tor issues!)


-- 
"Moral indignation is jealousy with a halo."
--H.G. Wells


signature.asc
Description: This is a digitally signed message part.


Re: another tor issue...? (irc...)

2009-01-05 Thread Praedor Atrebates
I have periodically been blocked from freenode (and then run into problems 
when trying to use the freenode onion service).  This has usually happened 
when/if I run tor, even briefly, as an exit node.  Freenode (and others) 
checks the exit node list and if it sees your IP there, you are blocked from 
normal access.  

To regain normal access, you have to ensure you are not running a tor exit AND 
you need to contact the freenode operators and request you be unblocked, 
explaining that you are not running (or are no longer running) a tor exit 
node.

praedor

On Wednesday 31 December 2008 07:47:39 Udo van den Heuvel wrote:
> Ted Smith wrote:
> > Freenode also has no way of knowing if you're connecting from your
> > machine, or from your exit node. All the traffic from your exit node is
> > "in the clear".
>
> They can know that it is me when I authenticate my account.
> I can't even get to that point.
> When I disable my exitpolicy it makes no difference.
>
> So that's a very nice feature indeed. Not.
>
> What's the most effective way to regain Freenode irc access?
>
> Kind regards,
> Udo

-- 
"Moral indignation is jealousy with a halo."
--H.G. Wells


signature.asc
Description: This is a digitally signed message part.


Re: Metasploit Decloak Project v2

2008-12-15 Thread Praedor Atrebates
It works against me running linux, tor, and using firefox IF I elect to open 
the document directly via Openoffice.  

praedor

On Sunday 14 December 2008 21:08:45 Freemor wrote:
> On Sun, 14 Dec 2008 18:57:18 -0600
>
> "Roc Admin"  wrote:
> > I just noticed that HDMoore re-released his decloak engine.
> >
> > http://metasploit.com/data/decloak
> >
> > He's improved some of the attacks from before like java, flash, and
> > DNS in pretty interesting ways.  There's also a test for Microsoft
> > Office documents which I thought was interesting.  From the page:
> >
> > When Microsoft Office is installed and configured to automatically
> > open
> >
> > > documents, a file can be returned which automatically downloads an
> > > image from the internet. This can bypass proxy settings and expose
> > > the real DNS servers of the user.
> >
> > It doesn't seem like there are any new attack vectors but I wanted to
> > pass it along to see if anyone had comments.
> >
> > -ROC Tor Admin
>
> Well I must be doing something right...
> the only IP it showed for me was:
>
> External Address  204.13.236.244
>
> all the rest showed as "unknown". and the above is definitely not my IP
>
> Still good to have something to test my config against tho.

-- 
"Moral indignation is jealousy with a halo."
--H.G. Wells


signature.asc
Description: This is a digitally signed message part.


Re: Need help with MPAA threats

2008-12-15 Thread Praedor Atrebates
In another vein, being an exit for even a brief period of time puts your IP on 
a website identifying you as such and you will find yourself banned from some 
(many?) irc servers and/or banned from posting at certain blogs.  Irritating 
but there you go.

On Saturday 13 December 2008 15:46:14 Jon wrote:
> krishna e bera wrote:
> > It is unlikely that the content in question was ever on your computer
> >at all, because Tor does not transfer UDP packets (used by bittorrent for 
data)
[...]
> > After looking at several dozen automated DMCA letters,
> > i noticed that all but a few point to tracker websites for ThePirateBay.
> > I decided to add the ip addresses for those tracker websites to my reject 
list
>
> > and have not received a DMCA notice for a few weeks now.
> > Although this technically rejects some web (http) traffic,
> > it seems to me just an extension of the exit policy rejecting
>
> bittorrent ports
>
> > because those tracker ip addresses are primarily used for setting up
>
> p2p transfers.
>
> > I'm paying $100 a month in bandwidth fees to facilitate anonymous
>
> communication
>
> > for activists etc - not to subsidize consumption of games and movies.
> > Yes i know p2p can carry all sorts of content;
> > if there is lots of "legitimate" stuff available via ThePirateBay my
>
> attitude could change.
>
> > Feedback on this is welcome.
>
> Your attitude I think is correct.  I mean to say, yes, your intent for
> your relay is for censorship frustration, not games, movies, et
> cetera.  I think your implementation is correct also.  I run a relay
> without any exit permitted.  The only reason I do this, is because I
> do not want to deal with any complaints ranging from DMCA, hacking,
> child exploitation transiting my link.  If I ever decide to permit
> exiting, it will be on a dedicated server that I would pay for,
> located elsewhere.  I just wish there were a better way to inspect the
> traffic and disallow certain traffic.  Don't get me wrong, I'm not
> advocating that any relay inspect any traffic, just that illegal
> traffic transiting outside my link could land me in trouble.  Perhaps
> thoughtworthy.


-- 
"Moral indignation is jealousy with a halo."
--H.G. Wells


Re: Need help with MPAA threats

2008-12-15 Thread Praedor Atrebates
Could I not simply remap unwanted services (by you) to different ports and 
skip through?  I mean, I can run an ssh tunnel through any port, and probably 
set up at least some of the file sharing apps to work on different ports than 
the default...or am I missing something?

praedor

On Saturday 13 December 2008 15:30:18 David Kammering wrote:
> Matthew McCabe schrieb:
> > Here is where I need your help.  First, is there a good way to filter
> > out torrents in my exit policy?
>
> I tried out some different exit policies after getting a big load of
> DMCA notices. My provider didn't really mind forwarding them to me but
> it got me started playing with the exit policies as I don't see any
> reason for me donating (expensive) bandwith for filesharing over Tor. I
> am currently running the exit policy pasted below on my exit node:
>
> ExitPolicy accept *:20-23   # FTP,SSH,TELNET
> ExitPolicy accept *:53  # DNS
> ExitPolicy accept *:80-82   # HTTP
> ExitPolicy accept *:110-119 # POP3/NNTP
> ExitPolicy accept *:143 # IMAP
> ExitPolicy accept *:443 # HTTPS
> ExitPolicy accept *:465 # MAIL
> ExitPolicy accept *:587 # MAIL
> ExitPolicy accept *:993 # IMAPS
> ExitPolicy accept *:1194# OPENVPN
> ExitPolicy accept *:1720# H.323
> ExitPolicy accept *:1731# Netmeeting Audio Control
> ExitPolicy accept *:5050-5061   # YAHOO MESSENGER, SIP
> ExitPolicy accept *:5190# ICQ
> ExitPolicy accept *:5222-5223   # JABBER
> ExitPolicy accept *:3128# Proxy
> ExitPolicy accept *:8080# Proxy
> ExitPolicy reject *:*   # Disallow everything else
>
> I think most needed protocols are included but I got my copyright
> infringements down to zero.
>
> Maybe redefining your policy would anticipate further problems with your
> provider but still keep your exit node quite useful to most of the users.
>
> YT,
> David

-- 
"Moral indignation is jealousy with a halo."
--H.G. Wells


Slight correction Konversation, NOT Kopete: Troubles getting on IRC now

2008-12-11 Thread Praedor Atrebates
I had been connecting to the irc.freenode.org server but recently, while 
running tor I am no longer allowed to connect even though I am not trying to 
connect anonymously with tor.  I know there are a couple hidden service 
versions for freenode but neither of them work for me either.  I enter their 
*.onion address and my client (Konversation, KDE 4.1.3, Mandriva linux) SEES 
them but it never actually succeeds in connecting.  I get:
[...]
What is it about running tor, even as a relay, that prevents me from 
connecting at all to freenode?  I can connect to undernet but it doesn't have 
the chat rooms I seek/need.

praedor



signature.asc
Description: This is a digitally signed message part.


Troubles getting on IRC now

2008-12-11 Thread Praedor Atrebates
I had been connecting to the irc.freenode.org server but recently, while 
running tor I am no longer allowed to connect even though I am not trying to 
connect anonymously with tor.  I know there are a couple hidden service 
versions for freenode but neither of them work for me either.  I enter their 
*.onion address and my client (Kopete) SEES them but it never actually 
succeeds in connecting.  I get:

[08:57] [Info] Looking for server mejokbp2brhw4omd.onion:6667...
[08:57] [Info] Server found, connecting...
[09:00] [Error] Connection to Server mejokbp2brhw4omd.onion lost: operation is 
not supported.
[09:00] [Info] Trying to reconnect to mejokbp2brhw4omd.onion in 20 seconds.
[09:01] [Info] Looking for server mejokbp2brhw4omd.onion:6667...
[09:01] [Info] Server found, connecting...

over and over and over.  The other freenode hidden service is authenticated by 
pgp key but I cannot connect to that because I would first have to connect to 
the regular server, or the non-authenticated hidden service above to generate 
a hash, etc.  

What is it about running tor, even as a relay, that prevents me from 
connecting at all to freenode?  I can connect to undernet but it doesn't have 
the chat rooms I seek/need.

praedor


signature.asc
Description: This is a digitally signed message part.


Re: Tork - all tor versions lead to 0.2.1.7-alpha?

2008-12-08 Thread Praedor Atrebates
OK, and thanks...I posted here because I was wondering if the two tors had 
merged (development and stable) for the moment or if there was something I was 
unaware of in tor world (perhaps a fork or a weird new naming convention).

praedor

On Monday 08 December 2008 14:01:51 Robert Hogan wrote:
> On Monday 08 December 2008 15:19:39 Praedor Atrebates wrote:
> > I am wondering if anyone knows why Tork (0.29.2) seeks to download
> > tor-0.2.1.7-alpha regardless of whether one asks it to check for the
> > latest "stable" tor instead of the latest "experimental" tor.  I see
> > that the latest STABLE tor release appears to be 0.2.0.32, not
> > 0.2.1.7-alpha.
> >
> > What gives?
> >
> > praedor
>
> a bug in the code. thanks for pointing it out. for future reference you can
> contact me directly with tork bugs/issues or use [EMAIL PROTECTED]
> I know that you've done both before, so just a reminder.



Tork - all tor versions lead to 0.2.1.7-alpha?

2008-12-08 Thread Praedor Atrebates
I am wondering if anyone knows why Tork (0.29.2) seeks to download 
tor-0.2.1.7-alpha regardless of whether one asks it to check for the latest 
"stable" tor instead of the latest "experimental" tor.  I see that the latest 
STABLE tor release appears to be 0.2.0.32, not 0.2.1.7-alpha.

What gives?

praedor


Re: More info on my own tor problems - Fixed? NOT

2008-12-05 Thread Praedor Atrebates
Tor 0.2.1.7 just died on me with a message about a dns failure and now I 
cannot restart it.  No error messages (in Tork).  Firing up vidalia...I get 
this AGAIN:

Dec 05 12:27:41.833 [Notice] Tor v0.2.1.7-alpha (r17216). This is experimental 
software. Do not rely on it for strong anonymity. (Running on Linux i686)
Dec 05 12:27:41.847 [Warning] Linelist option '__HashedControlSessionPassword' 
has no value. Skipping.
Dec 05 12:27:41.849 [Warning] Skipping obsolete configuration option 'Group'
Dec 05 12:27:41.850 [Warning] ControlPort is open, but no authentication 
method has been configured.  This means that any program on your computer can 
reconfigure your Tor.  That's bad!  You should upgrade your Tor controller as 
soon as possible.
Dec 05 12:27:41.851 [Notice] Initialized libevent version 1.4.7-stable using 
method epoll. Good.
Dec 05 12:27:41.852 [Notice] Opening OR listener on 0.0.0.0:9001
Dec 05 12:27:41.854 [Notice] Opening Directory listener on 0.0.0.0:9030
Dec 05 12:27:41.855 [Notice] Opening Socks listener on 127.0.0.1:9050
Dec 05 12:27:41.856 [Notice] Opening Control listener on 127.0.0.1:9051
Dec 05 12:27:41.857 [Warning] Error setting configured groups: Operation not 
permitted
Dec 05 12:27:41.859 [Warning] Failed to parse/validate config: Problem with 
User value. See logs for details.
Dec 05 12:27:41.860 [Error] Reading config failed--see warnings above.


Back to 0.2.0.31 or so.  Tor-0.2.1.7-alpha IS broken.

praedor

On Friday 05 December 2008 08:42:30 Praedor Atrebates wrote:
> For the second day now I have been successful (finally) at operating
> tor-0.2.1.7-alpha via Tork (0.29.2).
>
> The "fix" for me was to manually edit the torrc.sample and save it as torrc
> in /etc/tor and then search out any and all other torrc files on my system
> and link them all to the base torrc I placed in /etc/tor.  After doing
> this, I was still unable to start tor so I deleted my ~/.tor directory and
> tried again by starting it from the CLI.  This did get tor started and it
> ran for a while until I killed it.  I was then able to start tor from Tork
> and it remained stable.  This morning I started it again from Tork and it
> is (so far) still operating.
>
> Up to this point, neither Tork nor Vidalia was able to configure or run
> tor.
>
> praedor
>
> On Thursday 04 December 2008 08:25:26 Praedor Atrebates wrote:
> > Forgot to add:  I saw the "unable to open /etc/tor/torrc" message and
> > fixed that and tried again.  I get essentially the same messages except
> > lacking the above statement:
> >
> > Dec 04 08:13:34.430 [Notice] Tor v0.2.1.7-alpha (r17216). This is
> > experimental software. Do not rely on it for strong anonymity. (Running
> > on Linux i686) Dec 04 08:13:34.431 [Warning] Linelist option
> > '__HashedControlSessionPassword' has no value. Skipping.
> > Dec 04 08:13:34.432 [Warning] Skipping obsolete configuration option
> > 'Group' Dec 04 08:13:34.432 [Warning] ControlPort is open, but no
> > authentication method has been configured.  This means that any program
> > on your computer can reconfigure your Tor.  That's bad!  You should
> > upgrade your Tor controller as soon as possible.
> > Dec 04 08:13:34.433 [Notice] Initialized libevent version 1.4.7-stable
> > using method epoll. Good.
> > Dec 04 08:13:34.433 [Notice] Opening OR listener on 0.0.0.0:9001
> > Dec 04 08:13:34.434 [Notice] Opening Socks listener on 127.0.0.1:9050
> > Dec 04 08:13:34.434 [Notice] Opening Control listener on 127.0.0.1:9051
> > Dec 04 08:13:34.434 [Warning] Error setting configured groups: Operation
> > not permitted
> > Dec 04 08:13:34.435 [Warning] Failed to parse/validate config: Problem
> > with User value. See logs for details.
> > Dec 04 08:13:34.435 [Error] Reading config failed--see warnings above.
> >
> > On Thursday 04 December 2008 08:17:18 Praedor Atrebates wrote:
> > > I have had a long-running problem upgrading to tor-0.2.1.7-alpha.  I
> > > usually use Tork as my tor manager (version 0.29.2 rpm - I can't build
> > > the latest because I am using kde 4 and it wont build on such a system)
> > > and run the configuation wizard after every tor upgrade.  This has
> > > worked perfectly up until 0.2.1.7-alpha.
> > >
> > > The problem is that no matter what I do, be it configure tor via Tork
> > > or do it manually with a text editor, I cannot get tor to run.  It
> > > crashes very quickly and, from Tork, produces no useful log
> > > information.  It just stops.
> > >
> > > I have now tried with vidalia and I am still unable to run tor but I am
> > > getting useful log data:
> > >
&g

Re: More info on my own tor problems - Fixed?

2008-12-05 Thread Praedor Atrebates
For the second day now I have been successful (finally) at operating 
tor-0.2.1.7-alpha via Tork (0.29.2).

The "fix" for me was to manually edit the torrc.sample and save it as torrc in 
/etc/tor and then search out any and all other torrc files on my system and 
link them all to the base torrc I placed in /etc/tor.  After doing this, I was 
still unable to start tor so I deleted my ~/.tor directory and tried again by 
starting it from the CLI.  This did get tor started and it ran for a while 
until I killed it.  I was then able to start tor from Tork and it remained 
stable.  This morning I started it again from Tork and it is (so far) still 
operating.

Up to this point, neither Tork nor Vidalia was able to configure or run tor.

praedor

On Thursday 04 December 2008 08:25:26 Praedor Atrebates wrote:
> Forgot to add:  I saw the "unable to open /etc/tor/torrc" message and fixed
> that and tried again.  I get essentially the same messages except lacking
> the above statement:
>
> Dec 04 08:13:34.430 [Notice] Tor v0.2.1.7-alpha (r17216). This is
> experimental software. Do not rely on it for strong anonymity. (Running on
> Linux i686) Dec 04 08:13:34.431 [Warning] Linelist option
> '__HashedControlSessionPassword' has no value. Skipping.
> Dec 04 08:13:34.432 [Warning] Skipping obsolete configuration option
> 'Group' Dec 04 08:13:34.432 [Warning] ControlPort is open, but no
> authentication method has been configured.  This means that any program on
> your computer can reconfigure your Tor.  That's bad!  You should upgrade
> your Tor controller as soon as possible.
> Dec 04 08:13:34.433 [Notice] Initialized libevent version 1.4.7-stable
> using method epoll. Good.
> Dec 04 08:13:34.433 [Notice] Opening OR listener on 0.0.0.0:9001
> Dec 04 08:13:34.434 [Notice] Opening Socks listener on 127.0.0.1:9050
> Dec 04 08:13:34.434 [Notice] Opening Control listener on 127.0.0.1:9051
> Dec 04 08:13:34.434 [Warning] Error setting configured groups: Operation
> not permitted
> Dec 04 08:13:34.435 [Warning] Failed to parse/validate config: Problem with
> User value. See logs for details.
> Dec 04 08:13:34.435 [Error] Reading config failed--see warnings above.
>
> On Thursday 04 December 2008 08:17:18 Praedor Atrebates wrote:
> > I have had a long-running problem upgrading to tor-0.2.1.7-alpha.  I
> > usually use Tork as my tor manager (version 0.29.2 rpm - I can't build
> > the latest because I am using kde 4 and it wont build on such a system)
> > and run the configuation wizard after every tor upgrade.  This has worked
> > perfectly up until 0.2.1.7-alpha.
> >
> > The problem is that no matter what I do, be it configure tor via Tork or
> > do it manually with a text editor, I cannot get tor to run.  It crashes
> > very quickly and, from Tork, produces no useful log information.  It just
> > stops.
> >
> > I have now tried with vidalia and I am still unable to run tor but I am
> > getting useful log data:
> >
> > Dec 04 08:05:41.407 [Notice] Tor v0.2.1.7-alpha (r17216). This is
> > experimental software. Do not rely on it for strong anonymity. (Running
> > on Linux i686) Dec 04 08:05:41.409 [Warning] Unable to open configuration
> > file "/etc/tor/torrc".
> > Dec 04 08:05:41.410 [Error] Reading config failed--see warnings above.
> > Dec 04 08:06:24.666 [Notice] Tor v0.2.1.7-alpha (r17216). This is
> > experimental software. Do not rely on it for strong anonymity. (Running
> > on Linux i686) Dec 04 08:06:24.669 [Warning] Skipping obsolete
> > configuration option 'Group' Dec 04 08:06:24.673 [Notice] Initialized
> > libevent version 1.4.7-stable using method epoll. Good.
> > Dec 04 08:06:24.675 [Notice] Opening OR listener on 0.0.0.0:9001
> > Dec 04 08:06:24.679 [Notice] Opening Socks listener on 127.0.0.1:9050
> > Dec 04 08:06:24.682 [Notice] Opening Control listener on 127.0.0.1:9051
> > Dec 04 08:06:24.686 [Warning] Error setting configured groups: Operation
> > not permitted
> > Dec 04 08:06:24.689 [Warning] Failed to parse/validate config: Problem
> > with User value. See logs for details.
> > Dec 04 08:06:24.693 [Error] Reading config failed--see warnings above.
> >
> >
> > I have no idea what the problem is with the torrc file.  I merely took
> > the sample provided with the software and uncommented the applicable
> > parts (after Tork failed to configure it) and copy it to torrc.  What is
> > the deal with tor-0.2.1.7?  What has changed vis a vis configuration that
> > appears to break it compared to the any and all of the previous versions?
> >  Most important of all, how do I get past this so I can start running tor
> > again?
> >
> > praedor



Re: Commercial tor offering?

2008-12-04 Thread Praedor Atrebates
That point was just an extra.  The major problem would be, as others chimed in 
about too, that you (person charging) would be royally screwed when the Feds 
decide to go on a witch hunt.  You (the potential person charging for service) 
and all your paying customers would be, as stated previously, on the short 
list for investigation.  You would definitely go on a watch list.

praedor

On Thursday 04 December 2008 13:00:44 OgnenD wrote:
> On Thursday 04 December 2008 12:21:04 Praedor Atrebates wrote:
> > The point of tor isn't to lock people out by charging for service, it is
> > to act as a totally open access system for ALL people regardless of
> > economic status.  Charging locks out a lot of people, especially in
> > foreign countries with naughty governments and shitty economic
> > situations.
>
> Thanks. You could still use the free infrastructure if you chose to do so.
> This would be an extra offering for people who want both anonymity and
> speed for a fee.
> Thanks for replying, it is not my intention to defend such an idea, just to
> see if it has been entertained before and if so, what was the conclusion.
>
> Ognen



Re: More info on my own tor problems

2008-12-04 Thread Praedor Atrebates
I can look but don't think that could be the issue.  I don't start tor as a 
service when I boot, I manually start it (via Tork or Vidalia).  If I don't 
start tor up via script in the rc directories, how could such a script have 
any effect on tor started on command?

praedor

On Thursday 04 December 2008 12:27:50 Scott Bennett wrote:

> >
> >I have no idea what the problem is with the torrc file.  I merely took the
> >sample provided with the software and uncommented the applicable parts
> > (after Tork failed to configure it) and copy it to torrc.  What is the
> > deal with tor-0.2.1.7?  What has changed vis a vis configuration that
> > appears to break it compared to the any and all of the previous versions?
> >  Most important of all, how do I get past this so I can start running tor
> > again?
>
>  The problem may not actually be in the torrc file.  Check to see
> whether you have a startup/shutdown script, perhaps run by /etc/rc on your
> system, that specifies --user and --group.  If you do, try removing those
> arguments from the command line that starts tor in the script.
>  The error messages could be more accurate.



Re: Commercial tor offering?

2008-12-04 Thread Praedor Atrebates
On Thursday 04 December 2008 11:54:51 OgnenD wrote:
> Hello,
>
> I am sure someone had digested this before but what would be some issues
> with purchasing (say) twenty different boxes around the USA with good pipes
> and allowing people to use them as tor relays/exit nodes (while charging a
> monthly fee for it)? The way I see it, greatest obstacle to using tor every
> day is speed, but I might be wrong.

A couple things:  such KNOWN and set boxes would be subject to taps (probably 
wouldn't matter much if they are relays but it becomes a potential problem if 
they are exits).

Second, I believe (correct if wrong) that if you, a private citizen, are 
donating your system for use as a relay/tor server you have no real or even 
potential legal "obligation" to keep logs for presentation to authorities when 
they ask for them (with a bogus non-warrant FBI "National Security Letter" for 
instance).  If you are now a fee-for-use entity (basically commercial) you are 
potentially subject to such nonsense.

The point of tor isn't to lock people out by charging for service, it is to 
act as a totally open access system for ALL people regardless of economic 
status.  Charging locks out a lot of people, especially in foreign countries 
with naughty governments and shitty economic situations.




Re: More info on my own tor problems

2008-12-04 Thread Praedor Atrebates
Forgot to add:  I saw the "unable to open /etc/tor/torrc" message and fixed 
that and tried again.  I get essentially the same messages except lacking the 
above statement:

Dec 04 08:13:34.430 [Notice] Tor v0.2.1.7-alpha (r17216). This is experimental 
software. Do not rely on it for strong anonymity. (Running on Linux i686)
Dec 04 08:13:34.431 [Warning] Linelist option '__HashedControlSessionPassword' 
has no value. Skipping.
Dec 04 08:13:34.432 [Warning] Skipping obsolete configuration option 'Group'
Dec 04 08:13:34.432 [Warning] ControlPort is open, but no authentication 
method has been configured.  This means that any program on your computer can 
reconfigure your Tor.  That's bad!  You should upgrade your Tor controller as 
soon as possible.
Dec 04 08:13:34.433 [Notice] Initialized libevent version 1.4.7-stable using 
method epoll. Good.
Dec 04 08:13:34.433 [Notice] Opening OR listener on 0.0.0.0:9001
Dec 04 08:13:34.434 [Notice] Opening Socks listener on 127.0.0.1:9050
Dec 04 08:13:34.434 [Notice] Opening Control listener on 127.0.0.1:9051
Dec 04 08:13:34.434 [Warning] Error setting configured groups: Operation not 
permitted
Dec 04 08:13:34.435 [Warning] Failed to parse/validate config: Problem with 
User value. See logs for details.
Dec 04 08:13:34.435 [Error] Reading config failed--see warnings above.


On Thursday 04 December 2008 08:17:18 Praedor Atrebates wrote:
> I have had a long-running problem upgrading to tor-0.2.1.7-alpha.  I
> usually use Tork as my tor manager (version 0.29.2 rpm - I can't build the
> latest because I am using kde 4 and it wont build on such a system) and run
> the configuation wizard after every tor upgrade.  This has worked perfectly
> up until 0.2.1.7-alpha.
>
> The problem is that no matter what I do, be it configure tor via Tork or do
> it manually with a text editor, I cannot get tor to run.  It crashes very
> quickly and, from Tork, produces no useful log information.  It just stops.
>
> I have now tried with vidalia and I am still unable to run tor but I am
> getting useful log data:
>
> Dec 04 08:05:41.407 [Notice] Tor v0.2.1.7-alpha (r17216). This is
> experimental software. Do not rely on it for strong anonymity. (Running on
> Linux i686) Dec 04 08:05:41.409 [Warning] Unable to open configuration file
> "/etc/tor/torrc".
> Dec 04 08:05:41.410 [Error] Reading config failed--see warnings above.
> Dec 04 08:06:24.666 [Notice] Tor v0.2.1.7-alpha (r17216). This is
> experimental software. Do not rely on it for strong anonymity. (Running on
> Linux i686) Dec 04 08:06:24.669 [Warning] Skipping obsolete configuration
> option 'Group' Dec 04 08:06:24.673 [Notice] Initialized libevent version
> 1.4.7-stable using method epoll. Good.
> Dec 04 08:06:24.675 [Notice] Opening OR listener on 0.0.0.0:9001
> Dec 04 08:06:24.679 [Notice] Opening Socks listener on 127.0.0.1:9050
> Dec 04 08:06:24.682 [Notice] Opening Control listener on 127.0.0.1:9051
> Dec 04 08:06:24.686 [Warning] Error setting configured groups: Operation
> not permitted
> Dec 04 08:06:24.689 [Warning] Failed to parse/validate config: Problem with
> User value. See logs for details.
> Dec 04 08:06:24.693 [Error] Reading config failed--see warnings above.
>
>
> I have no idea what the problem is with the torrc file.  I merely took the
> sample provided with the software and uncommented the applicable parts
> (after Tork failed to configure it) and copy it to torrc.  What is the deal
> with tor-0.2.1.7?  What has changed vis a vis configuration that appears to
> break it compared to the any and all of the previous versions?  Most
> important of all, how do I get past this so I can start running tor again?
>
> praedor



More info on my own tor problems

2008-12-04 Thread Praedor Atrebates
I have had a long-running problem upgrading to tor-0.2.1.7-alpha.  I usually 
use Tork as my tor manager (version 0.29.2 rpm - I can't build the latest 
because I am using kde 4 and it wont build on such a system) and run the 
configuation wizard after every tor upgrade.  This has worked perfectly up 
until 0.2.1.7-alpha.  

The problem is that no matter what I do, be it configure tor via Tork or do it 
manually with a text editor, I cannot get tor to run.  It crashes very quickly 
and, from Tork, produces no useful log information.  It just stops.

I have now tried with vidalia and I am still unable to run tor but I am 
getting useful log data:

Dec 04 08:05:41.407 [Notice] Tor v0.2.1.7-alpha (r17216). This is experimental 
software. Do not rely on it for strong anonymity. (Running on Linux i686)
Dec 04 08:05:41.409 [Warning] Unable to open configuration file 
"/etc/tor/torrc".
Dec 04 08:05:41.410 [Error] Reading config failed--see warnings above.
Dec 04 08:06:24.666 [Notice] Tor v0.2.1.7-alpha (r17216). This is experimental 
software. Do not rely on it for strong anonymity. (Running on Linux i686)
Dec 04 08:06:24.669 [Warning] Skipping obsolete configuration option 'Group'
Dec 04 08:06:24.673 [Notice] Initialized libevent version 1.4.7-stable using 
method epoll. Good.
Dec 04 08:06:24.675 [Notice] Opening OR listener on 0.0.0.0:9001
Dec 04 08:06:24.679 [Notice] Opening Socks listener on 127.0.0.1:9050
Dec 04 08:06:24.682 [Notice] Opening Control listener on 127.0.0.1:9051
Dec 04 08:06:24.686 [Warning] Error setting configured groups: Operation not 
permitted
Dec 04 08:06:24.689 [Warning] Failed to parse/validate config: Problem with 
User value. See logs for details.
Dec 04 08:06:24.693 [Error] Reading config failed--see warnings above.


I have no idea what the problem is with the torrc file.  I merely took the 
sample provided with the software and uncommented the applicable parts (after 
Tork failed to configure it) and copy it to torrc.  What is the deal with 
tor-0.2.1.7?  What has changed vis a vis configuration that appears to break 
it compared to the any and all of the previous versions?  Most important of 
all, how do I get past this so I can start running tor again?

praedor


Tried one last time, giving up on 0.2.1.7-alpha

2008-12-03 Thread Praedor Atrebates
I went ahead and tried to use tor-0.2.1.7 again and again it has failed 
without any debug information or error messages or anything else to explain 
why it refuses to run.

If I totally delete my ~/.tor directory and start tor from the CLI, it will 
start and run for a little while (say less than a minute) and then just quit.  
If I then try to start it again, it is an IMMEDIATE fail without any messages 
to explain why.  

Using Tork, I use the First Run Wizard to try to get tor and tork setup and 
then hit the "start tor" button.  It starts out as if it is going to work, 
usually doing the "bootstrapping" thing until about 90%, then POOF, no more 
tor and any attempt to start it again immediately fails. 

Can someone please supply me with a torrc file that actually works with 
0.2.1.7-alpha (with your own personal settings altered) so I can try that?  
The torrc.sample that comes with the 0.2.1.7 install doesn't work when I try 
to manually edit it instead of using Tork.

praedor


Re: [Fwd: (Probably) a known problem?] - cant run a relay node

2008-12-03 Thread Praedor Atrebates
I erred.  I am no longer using 0.2.1.7.  I had to give up because I could not 
get it working properly.  Doing what I mention below allowed me to run tor via 
Vidalia but not via Tork (my preferred tor manager).  There was an issue with 
the config file that I could never figure out so I went back to a previous 
version of tor that worked (currently that is 0.2.0.31.

Don't think I will mess with 0.2.1.7 again.  Since you use Vidalia, you might 
manage to get it working more than temporarily.

praedor

On Wednesday 03 December 2008 12:26:51 Praedor Atrebates wrote:
> I had horrible troubles getting the latest tor 0.2.1.7 working after
> upgrading.  I use Tork, not Vidalia, but I suspect the problem is likely
> the same.
>
> I deleted my existing tor directory (in linux, that is in /home/ directory>/.tor - I have no idea if there is an equivalent windows setup to
> this - the directory that contains your tor configuration file) and started
> tor up again and it worked fine.  I then had to manually edit the config
> file to add my server name, contact info, etc.  Since then, it has worked.
>
> praedor
>
> On Wednesday 03 December 2008 12:15:50 Alessandro Donnini wrote:
> > Thanks for the response. I understand. Below, you will find the copy of
> > the Vidalia generated torrc.
> >
> > The problem is occurring on a system running MS Windows XP SP2.
> >
> > Note that prior to the upgrade from 0.2.0.31 to 0.2.1.7 I had no
> > problems. The problems started occurring as soon as I started Tor again
> > via Vidalia after the upgrade. Also note that I do not have any problems
> > running the Tor client.
> >
> > Thanks
> >
> >
> > torrc from Document and Settings\\Application Data\Vidalia
> > ==
> > # This file was generated by Tor; if you edit it, comments will not be
> > preserved # The old torrc file was renamed to torrc.orig.1 or similar,
> > and Tor will ignore it
> >
> > # If set, Tor will accept connections from the same machine (localhost
> > only) # on this port, and allow those connections to control the Tor
> > process using # the Tor Control Protocol (described in control-spec.txt).
> > ControlPort 9051
> > # Where to send logging messages.  Format is minSeverity[-maxSeverity]
> > # (stderr|stdout|syslog|file FILENAME).
> > Log notice stdout
> >
> > [EMAIL PROTECTED] wrote:
> > > On Wed, Dec 03, 2008 at 09:34:40AM -0500, [EMAIL PROTECTED] wrote
> > > 2.1K
>
> bytes in 74 lines about:
> > > : I would like to continue to run a Tor relay node but am unable to do
> > > : so until I resolve the problem described below, and I need help in
> > > : order to do that.
> > > :
> > > : > I just upgraded to versions
> > > : >
> > > : > 0.1.10 of Vidalia
> > > : > and
> > > : > 0.2.1.7 of Tor
> > > : >
> > > : > Vidalia is able to run Tor as a client without any problems.
> > > : >
> > > : > Nov 30 22:02:52.906 [Error] set_options(): Bug: Acting on config
> > > : > options left us in a broken state. Dying.
> > > : > Nov 30 22:02:52.906 [Warning] eventdns: Didn't find any
> > > : > nameservers. Nov 30 22:02:52.906 [Warning] Could not config
> > > : > nameservers. Nov 30 22:02:52.906 [Error] set_options(): Bug: Acting
> > > : > on config options left us in a broken state. Dying.
> > >
> > > A few things,  you probably haven't received a response because no one
> > > has a good idea how to fix it.  You may have 2 issues, one is that
> > > libevent can't find nameservers, and the other is that the config
> > > options are broken.
> > >
> > > As for the dns issues:
> > >
> > > https://bugs.torproject.org/flyspray/index.php?do=details&id=813
> > >
> > > or
> > >
> > > https://bugs.torproject.org/flyspray/index.php?do=details&id=868
> > >
> > > Are you running Windows?
> > >
> > > For the config issues, which may be related to the dns issues, do you
> > > have a copy of the torrc that's generated by Vidalia?
> >
> > gpgkeys: key DE3BBB9A8C295FD5 not found on keyserver



Re: Exceeding connection limit

2008-12-03 Thread Praedor Atrebates
On Wednesday 03 December 2008 15:47:17 Praedor Atrebates wrote:
> I don't understand this message.  My tor log (in tork) is full of
> repetitive messages:
>
> 2008-12-03 15:42:38 WARN  (1 of 1) Failing because we have 1004 
> connections
> already.  Please raise your ulimit -n.
>
> Over and over (with variable numbers of connections around 1000.

Forgot:  using tor-0.2.1.7 as a relay server.

praedor


Exceeding connection limit

2008-12-03 Thread Praedor Atrebates
I don't understand this message.  My tor log (in tork) is full of repetitive 
messages:

2008-12-03 15:42:38 WARN(1 of 1) Failing because we have 1004 
connections 
already.  Please raise your ulimit -n.

Over and over (with variable numbers of connections around 1000.

What is this talking about?  If it is a limit, how is it being exceeded?

How do I make this go away?  Is this signs of another tor network attack?

praedor


Re: [Fwd: (Probably) a known problem?] - cant run a relay node

2008-12-03 Thread Praedor Atrebates
I had horrible troubles getting the latest tor 0.2.1.7 working after 
upgrading.  I use Tork, not Vidalia, but I suspect the problem is likely the 
same.

I deleted my existing tor directory (in linux, that is in /home//.tor - I have no idea if there is an equivalent windows setup to 
this - the directory that contains your tor configuration file) and started 
tor up again and it worked fine.  I then had to manually edit the config file 
to add my server name, contact info, etc.  Since then, it has worked.

praedor

On Wednesday 03 December 2008 12:15:50 Alessandro Donnini wrote:
> Thanks for the response. I understand. Below, you will find the copy of the
> Vidalia generated torrc.
>
> The problem is occurring on a system running MS Windows XP SP2.
>
> Note that prior to the upgrade from 0.2.0.31 to 0.2.1.7 I had no problems.
> The problems started occurring as soon as I started Tor again via Vidalia
> after the upgrade. Also note that I do not have any problems running the
> Tor client.
>
> Thanks
>
>
> torrc from Document and Settings\\Application Data\Vidalia
> ==
> # This file was generated by Tor; if you edit it, comments will not be
> preserved # The old torrc file was renamed to torrc.orig.1 or similar, and
> Tor will ignore it
>
> # If set, Tor will accept connections from the same machine (localhost
> only) # on this port, and allow those connections to control the Tor
> process using # the Tor Control Protocol (described in control-spec.txt).
> ControlPort 9051
> # Where to send logging messages.  Format is minSeverity[-maxSeverity]
> # (stderr|stdout|syslog|file FILENAME).
> Log notice stdout
>
> [EMAIL PROTECTED] wrote:
> > On Wed, Dec 03, 2008 at 09:34:40AM -0500, [EMAIL PROTECTED] wrote 2.1K 
bytes in 74 lines about:
> > : I would like to continue to run a Tor relay node but am unable to do so
> > : until I resolve the problem described below, and I need help in order
> > : to do that.
> > :
> > : > I just upgraded to versions
> > : >
> > : > 0.1.10 of Vidalia
> > : > and
> > : > 0.2.1.7 of Tor
> > : >
> > : > Vidalia is able to run Tor as a client without any problems.
> > : >
> > : > Nov 30 22:02:52.906 [Error] set_options(): Bug: Acting on config
> > : > options left us in a broken state. Dying.
> > : > Nov 30 22:02:52.906 [Warning] eventdns: Didn't find any nameservers.
> > : > Nov 30 22:02:52.906 [Warning] Could not config nameservers.
> > : > Nov 30 22:02:52.906 [Error] set_options(): Bug: Acting on config
> > : > options left us in a broken state. Dying.
> >
> > A few things,  you probably haven't received a response because no one
> > has a good idea how to fix it.  You may have 2 issues, one is that
> > libevent can't find nameservers, and the other is that the config
> > options are broken.
> >
> > As for the dns issues:
> >
> > https://bugs.torproject.org/flyspray/index.php?do=details&id=813
> >
> > or
> >
> > https://bugs.torproject.org/flyspray/index.php?do=details&id=868
> >
> > Are you running Windows?
> >
> > For the config issues, which may be related to the dns issues, do you
> > have a copy of the torrc that's generated by Vidalia?
>
> gpgkeys: key DE3BBB9A8C295FD5 not found on keyserver



Re: Problems with irc because of tor?

2008-11-20 Thread Praedor Atrebates
I run a relay server only.  Never an exit (at least, not for about a year) 

On Thursday 20 November 2008 16:37:29 Robert Hogan wrote:
> On Thursday 20 November 2008 21:25:46 Praedor Atrebates wrote:
> > Now I'm really lost on this.  Tor quit running (I cannot run
> > tor-0.2.1.7-alpha for more than a couple minutes, so it seems.  It just
> > suddenly quits without any errors.  It's running then suddenly it isn't.
> >
> > Looks like it is back to the previous version again...
> >
> > That said, tor is down/off and I STILL get the same messages for my IRC
> > client.  It seems that simply running tor briefly is enough to bork my
> > IRC client from then on (at least until I reboot)?
>
> Do you run a server yourself? If so, your real IP may be on the irc
> server's 'tor blocklist'.
>


I keep seeing the "127.0.0.1 banned" message and wonder where this address is 
coming from to be mispresented to any outside server or computer.  Why is my 
REAL IP address be sidestepped and my localhost overriding it?  I am wondering 
if there is a tor configuration setting I am missing to prevent tor from 
"presenting" 127.0.0.1 as my address.


Re: Problems with irc because of tor?

2008-11-20 Thread Praedor Atrebates
ov 20 16:21:54.720 [debug] _connection_free(): closing fd 52.
Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 61.
Nov 20 16:21:54.721 [info] _connection_free(): Freeing linked Directory 
connection [client reading] with 0 bytes on inbuf, 0 on outbuf.
Nov 20 16:21:54.721 [info] _connection_free(): Freeing linked Socks connection 
[open] with 0 bytes on inbuf, 0 on outbuf.
Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 53.
Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 56.
Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 54.
Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 55.
Nov 20 16:21:54.722 [debug] _connection_free(): closing fd 57.
Nov 20 16:21:54.722 [debug] _connection_free(): closing fd 58.
Nov 20 16:21:54.723 [debug] _connection_free(): closing fd 59.
Nov 20 16:21:54.723 [info] buf_shrink_freelists(): Cleaning freelist for 4096-
byte chunks: keeping 0, dropping 18.
Nov 20 16:21:54.723 [info] buf_shrink_freelists(): Cleaning freelist for 8192-
byte chunks: keeping 0, dropping 61.
Nov 20 16:21:54.724 [info] buf_shrink_freelists(): Cleaning freelist for 
16384-byte chunks: keeping 0, dropping 2.
Nov 20 16:21:54.724 [info] buf_shrink_freelists(): Cleaning freelist for 
32768-byte chunks: keeping 0, dropping 1.

I have now uninstalled (again) tor-0.2.1.7-alpha and installed the 2009.0 
package for tor instead, tor-0.2.0.31, and it is (and has been) working 
without hitch since I started it.  There appears to be something about 0.2.1.7 
specifically that causes problems.  Prior to upgrading to it I was running 
tor-0.2.1.6, also without problem.

praedor



On Thursday 20 November 2008 16:35:04 Alexander W. Janssen wrote:
> Praedor Atrebates wrote:
> > Now I'm really lost on this.  Tor quit running (I cannot run
> > tor-0.2.1.7-alpha for more than a couple minutes, so it seems.  It just
> > suddenly quits without any errors.  It's running then suddenly it isn't.
>
> OK, that's another thing.
>
> > Looks like it is back to the previous version again...
> >
> > That said, tor is down/off and I STILL get the same messages for my IRC
> > client.  It seems that simply running tor briefly is enough to bork my
> > IRC client from then on (at least until I reboot)?
>
> N, no way. A couple of questions:
>
> 1) You run some kind of transparent proxy?
> 2) If not, check if Tor is really disabled. Use ps in UNIX or the
> Windows Taskmanager to check. Shut down Tor.
> 3) Check all your IRC-client's settings.
>
> To be more precise:
> 4) What operating system are you using?
> 5) What IRC-Client are you using?
>
> The error-message you're describing is hand-crafted for people who want
> to use the Freenode-network with Tor. It wouldn't appear for any other
> users (unless Freenode borked up their scanners).
>
> By the way, the message "Closing Link: 127.0.0.1 (Banned)" seems to
> indicate that you're using some kind of proxy.
>
> If you give us more details, we might be able to help.
>
> Alex.



Re: Problems with irc because of tor?

2008-11-20 Thread Praedor Atrebates
Now I'm really lost on this.  Tor quit running (I cannot run tor-0.2.1.7-alpha 
for more than a couple minutes, so it seems.  It just suddenly quits without 
any errors.  It's running then suddenly it isn't.

Looks like it is back to the previous version again...

That said, tor is down/off and I STILL get the same messages for my IRC 
client.  It seems that simply running tor briefly is enough to bork my IRC 
client from then on (at least until I reboot)?

On Thursday 20 November 2008 16:12:42 Alexander W. Janssen wrote:
> Sebastian Hahn wrote:
> >> -Ursprüngliche Nachricht----- Von: "Praedor Atrebates"
> >> <[EMAIL PROTECTED]> Gesendet: 20.11.08 21:10:08 An:
> >> or-talk@freehaven.net Betreff: Problems with irc because of tor?
> >> Why does running tor suddenly cause me to be unable to connect to
> >> freenode?  I am NOT running a torified irc client.  Also, where's
> >> the address 127.0.0.1 coming from?  Why is my REAL IP address now
> >> invisible (apparently) and tor causing sites to think I am trying
> >> to use the  localhost IP?
> >>
> >> praedor
> >
> > Unfortunately, some service providers choose to not accept Tor users
> > as part of their userbase and block connections from exit nodes.
>
> That wasn't the question, he was wondering why he was using Tor at all
> though he told his client not to use it.
>
> Praedor: Sure you don't use a proxy in your IRC-client? Also, check - if
> you're using some flavour of UNIX - if you have some variable like
> http_proxy set.
>
> Alex.



Problems with irc because of tor?

2008-11-20 Thread Praedor Atrebates
I have been fighting to get tor-0.2.1.7-alpha working on my system for a while 
and finally appear to have it working now.  Now I find that trying to connect 
to IRC servers fails:

[15:06] [Info] Trying to reconnect to irc.freenode.org in 20 seconds.
[15:06] [Info] Looking for server irc.freenode.org:6667...
[15:06] [Info] Server found, connecting...
[15:06] [Info] Connected; logging in...
[15:06] [Notice] -- *** Looking up your hostname...
[15:06] [Notice] -- *** Checking ident
[15:06] [Notice] -- *** Couldn't look up your hostname
[15:06] [Notice] -- *** No identd (auth) response
[15:06] [Notice] -zelazny.freenode.net- *** Banned:  Tor freenode is hidden-
service-only (mejokbp2brhw4omd.onion) - see freenode.net/irc_servers.shtml. 
(2008/11/18 21.17)
[15:06] [error]  Closing Link: 127.0.0.1 (Banned)

Why does running tor suddenly cause me to be unable to connect to freenode?  I 
am NOT running a torified irc client.  Also, where's the address 127.0.0.1 
coming from?  Why is my REAL IP address now invisible (apparently) and tor 
causing sites to think I am trying to use the  localhost IP?  

praedor


Re: Absolutely cannot run tor 0.2.1.7-alpha

2008-11-13 Thread Praedor Atrebates
There!  FINALLY seem to have a working tor 0.2.1.7-alpha.  I went down the 
requisite lines in the config one by one, uncommenting the minimum needed and 
finally got it working.

SOMETHING must have changed from 0.2.1.6-alpha or the previous config would 
have worked fine with the new one...it didn't (on my system at least).

praedor

On Thursday 13 November 2008 15:06:19 [EMAIL PROTECTED] wrote:
> On Thu, Nov 13, 2008 at 02:53:27PM -0500, [EMAIL PROTECTED] wrote 0.7K bytes 
in 14 lines about:
> : This is driving me nuts.  I have repeatedly tried to upgrade to the
> : latest tor with no success.  If I build and install it without doing any
> : configuration, it will run with the builtin defaults (including the
> : default server name) but if I try to create a torrc file, no matter what
> : I do with it (using torrc.sample as a template) tor fails to run.  No
> : error messages at all.
> :
> : What the hell is it with the latest tor and its config file?  Did
> : something drastic change?  Why is the torrc.sample unusable as a simple
> : template?  I've tried simply uncommenting a few of the basic settings
> : (ORPort, etc) and changing the server name but this alone is enough to
> : prevent tor from running.
>
> Can you post your torrc somewhere?  0.2.1.7-alpha runs well for me.



Re: Absolutely cannot run tor 0.2.1.7-alpha

2008-11-13 Thread Praedor Atrebates
Here's the torrc as it now stands.  I thought I managed to get it working 
because it started up and had bootstrapped a circuit and was then Self-
testing...and then suddenly and without any error messages just quit.  I've 
been trying to go through and simply uncomment lines one by one to see when it 
quits dying but haven't yet succeeded, so I am starting again.

torrc:

## Replace this with "SocksPort 0" if you plan to run Tor only as a
## server, and not make any local application connections yourself.
SocksPort 9050 # what port to open for local application connections
SocksListenAddress 127.0.0.1 # accept connections only from localhost
#SocksListenAddress 192.168.0.1:9100 # listen on this IP:port also

## Entry policies to allow/deny SOCKS requests based on IP address.
## First entry that matches wins. If no SocksPolicy is set, we accept
## all (and only) requests from SocksListenAddress.
#SocksPolicy accept 192.168.0.0/16
#SocksPolicy reject *

## Logs go to stdout at level "notice" unless redirected by something
## else, like one of the below lines. You can have as many Log lines as
## you want.
##
## We advise using "notice" in most cases, since anything more verbose
## may provide sensitive information to an attacker who obtains the logs.
##
## Send all messages of level 'notice' or higher to 
/usr/local/var/log/tor/notices.log
#Log notice file /usr/local/var/log/tor/notices.log
## Send every possible message to /usr/local/var/log/tor/debug.log
#Log debug file /usr/local/var/log/tor/debug.log
## Use the system log instead of Tor's logfiles
Log notice syslog
## To send all messages to stderr:
#Log debug stderr

## Uncomment this to start the process in the background... or use
## --runasdaemon 1 on the command line. This is ignored on Windows;
## see the FAQ entry if you want Tor to run as an NT service.
#RunAsDaemon 1

## The directory for keeping all the keys/etc. By default, we store
## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
#DataDirectory /usr/local/var/lib/tor

## The port on which Tor will listen for local connections from Tor
## controller applications, as documented in control-spec.txt.
ControlPort 9051

### This section is just for location-hidden services ###

## Once you have configured a hidden service, you can look at the
## contents of the file ".../hidden_service/hostname" for the address
## to tell people.
##
## HiddenServicePort x y:z says to redirect requests on port x to the
## address y:z.

#HiddenServiceDir /usr/local/var/lib/tor/hidden_service/
#HiddenServicePort 80 127.0.0.1:80

#HiddenServiceDir /usr/local/var/lib/tor/other_hidden_service/
#HiddenServicePort 80 127.0.0.1:80
#HiddenServicePort 22 127.0.0.1:22

 This section is just for relays #
#
## See https://www.torproject.org/docs/tor-doc-relay for details.

## A unique handle for your server.
Nickname Lapdog

## The IP or FQDN for your server. Leave commented out and Tor will guess.
#Address noname.example.com

## Define these to limit the bandwidth usage of relayed (server)
## traffic. Your own traffic is still unthrottled.
## Note that RelayBandwidthRate must be at least 20 KB.
#RelayBandwidthRate 100 KBytes  # Throttle traffic to 100KB/s (800Kbps)
#RelayBandwidthBurst 200 KBytes # But allow bursts up to 200KB/s (1600Kbps)

## Contact info to be published in the directory, so we can contact you
## if your server is misconfigured or something else goes wrong.
#ContactInfo Random Person 
## You might also include your PGP or GPG fingerprint if you have one:
#ContactInfo 1234D/ Random Person 

## Required: what port to advertise for Tor connections.
ORPort 9001
## If you need to listen on a port other than the one advertised
## in ORPort (e.g. to advertise 443 but bind to 9090), uncomment the
## line below too. You'll need to do ipchains or other port forwarding
## yourself to make this work.
#ORListenAddress 0.0.0.0:9090

## Uncomment this to mirror directory information for others. Please do
## if you have enough bandwidth.
#DirPort 9030 # what port to advertise for directory connections
## If you need to listen on a port other than the one advertised
## in DirPort (e.g. to advertise 80 but bind to 9091), uncomment the line
## below too. You'll need to do ipchains or other port forwarding yourself
## to make this work.
#DirListenAddress 0.0.0.0:9091


On Thursday 13 November 2008 15:06:19 [EMAIL PROTECTED] wrote:
> On Thu, Nov 13, 2008 at 02:53:27PM -0500, [EMAIL PROTECTED] wrote 0.7K bytes 
in 14 lines about:
> : This is driving me nuts.  I have repeatedly tried to upgrade to the
> : latest tor with no success.  If I build and install it without doing any
> : configuration, it will run with the builtin defaults (including the
> : default server name) but if I try to create a torrc file, no matter what
> : I do with it (using torrc.sample as a template) tor fails to run.  No
> : error messages at all.
> :
> : What the hell is it wit

Absolutely cannot run tor 0.2.1.7-alpha

2008-11-13 Thread Praedor Atrebates
This is driving me nuts.  I have repeatedly tried to upgrade to the latest tor 
with no success.  If I build and install it without doing any configuration, 
it will run with the builtin defaults (including the default server name) but 
if I try to create a torrc file, no matter what I do with it (using 
torrc.sample as a template) tor fails to run.  No error messages at all. 

What the hell is it with the latest tor and its config file?  Did something 
drastic change?  Why is the torrc.sample unusable as a simple template?  I've 
tried simply uncommenting a few of the basic settings (ORPort, etc) and 
changing the server name but this alone is enough to prevent tor from running.

For now it looks like I'm back to tor-0.2.1.6-alpha AGAIN.

praedor


Re: Any plans to fix tor for OpenDNS?

2008-11-13 Thread Praedor Atrebates
Nevermind. I setup an account and changed the settings and will deal with the 
laptop issue later.

I do see a message from tor (tork, actually, but it is a tor message):  

"Recently exceeded local connection limit.  Check local system."

Huh?  WHAT connection limit?  I don't recall seeing anything about that in the 
tor config.  

praedor

On Thursday 13 November 2008 13:48:23 Praedor Atrebates wrote:
> Thanks.
>
> What about this:  I run a relay server on my laptop and my home desktop. 
> My laptop can end up on whatever network I connect to (obviously).  I DO
> have my own registered domain name and use it no matter what network I
> connect to, so my IP for my laptop can vary a lot.  Can OpenDNS settings
> still be set to hold in this circumstance (tie it to a domain name)?
>
> On Thursday 13 November 2008 13:04:05 Sven Anderson wrote:
> > Am 13.11.2008 um 17:17 schrieb Praedor Atrebates:
> > > I use OpenDNS servers and tor messages always contain a message that
> > > my
> > > service provider "may be hijacking DNS requests".  It isn't a
> > > problem for
> > > functionality of tor but it is somewhat annoying to see that warning
> > > all the
> > > time.  Is there any plan to make tor fully friendly with OpenDNS so
> > > these
> > > messages can go away?
> >
> > Go to the OpenDNS website, create an account, add a network for your
> > IP and then uncheck options in "advanced settings". Then the warnings
> > will go away.
> >
> > Sven



Re: Any plans to fix tor for OpenDNS?

2008-11-13 Thread Praedor Atrebates
Thanks.

What about this:  I run a relay server on my laptop and my home desktop.  My 
laptop can end up on whatever network I connect to (obviously).  I DO have my 
own registered domain name and use it no matter what network I connect to, so 
my IP for my laptop can vary a lot.  Can OpenDNS settings still be set to hold 
in this circumstance (tie it to a domain name)?

On Thursday 13 November 2008 13:04:05 Sven Anderson wrote:
> Am 13.11.2008 um 17:17 schrieb Praedor Atrebates:
> > I use OpenDNS servers and tor messages always contain a message that
> > my
> > service provider "may be hijacking DNS requests".  It isn't a
> > problem for
> > functionality of tor but it is somewhat annoying to see that warning
> > all the
> > time.  Is there any plan to make tor fully friendly with OpenDNS so
> > these
> > messages can go away?
>
> Go to the OpenDNS website, create an account, add a network for your
> IP and then uncheck options in "advanced settings". Then the warnings
> will go away.
>
> Sven



Re: Any plans to fix tor for OpenDNS?

2008-11-13 Thread Praedor Atrebates
Not until you just asked.  I have no idea what is involved in running one, 
having never configured/setup one before.  Would it consume lots of harddrive 
realestate?  Consume lots of swap or RAM?

praedor

On Thursday 13 November 2008 12:01:34 Eugen Leitl wrote:
> On Thu, Nov 13, 2008 at 11:58:51AM -0500, Praedor Atrebates wrote:
> > Thanks for the link.  I had switched to OpenDNS to avoid some of the
> > critical problems recently with "normal" DNS servers.
>
> Have you considered running your own (caching) DNS server?



Re: Any plans to fix tor for OpenDNS?

2008-11-13 Thread Praedor Atrebates
Thanks for the link.  I had switched to OpenDNS to avoid some of the critical 
problems recently with "normal" DNS servers.  

On another note, every time I post to this list, soon after I get a message 
from typepad asking me to confirm my post by replying to the typepad message.

Can this be turned off somewhere?  I've never seen this before with any other 
mailing list I've ever belonged to.

praedor

On Thursday 13 November 2008 11:26:53 Matt LaPlante wrote:
> On Thu, Nov 13, 2008 at 10:17 AM, Praedor Atrebates <[EMAIL PROTECTED]> 
wrote:
> > I use OpenDNS servers and tor messages always contain a message that my
> > service provider "may be hijacking DNS requests".  It isn't a problem for
> > functionality of tor but it is somewhat annoying to see that warning all
> > the time.  Is there any plan to make tor fully friendly with OpenDNS so
> > these messages can go away?
>
> The very nature of OpenDNS conflicts with the concept of anonymity and
> privacy.  By using the service, you're not only giving them the
> opportunity to track your requests, you're also allowing them to
> redirect your lookups to third parties at will.
>matlab.mat
> http://en.wikipedia.org/wiki/OpenDNS#Privacy_issues_and_covert_redirection




Any plans to fix tor for OpenDNS?

2008-11-13 Thread Praedor Atrebates
I use OpenDNS servers and tor messages always contain a message that my 
service provider "may be hijacking DNS requests".  It isn't a problem for 
functionality of tor but it is somewhat annoying to see that warning all the 
time.  Is there any plan to make tor fully friendly with OpenDNS so these 
messages can go away?


Re: problems with 0.2.1.7-alpha

2008-11-10 Thread Praedor Atrebates
On Monday 10 November 2008 16:48:46 [EMAIL PROTECTED] wrote:
> On Mon, Nov 10, 2008 at 03:38:01PM -0500, [EMAIL PROTECTED] wrote 0.7K bytes 
in 12 lines about:
> : When I build and install the latest 0.2.1.7-alpha tor, it refuses to run:
> :
> : Nov 10 15:30:25.383 [notice] Tor v0.2.1.6-alpha (r17011). This is
> : experimental software. Do not rely on it for strong anonymity. (Running
> : on Linux i686)
>
> You aren't running 0.2.1.7-alpha here.

Oops.  I got this after trying to run 0.2.1.7-alpha and getting the same 
output, then I went back to 0.2.1.6-alpha but didn't go through the tork 
wizard process to set up tor, so I got the same thing with 0.2.1.6-alpha.  
Upon re-running the setup wizard, tor-0.2.1.6-alpha (unlike 0.2.1.7-alpha) 
worked fine...but I am nervous about running this one because of the problems 
I was having over the last week with RAM and CPU consumption.

praedor


problems with 0.2.1.7-alpha

2008-11-10 Thread Praedor Atrebates
When I build and install the latest 0.2.1.7-alpha tor, it refuses to run:

Nov 10 15:30:25.383 [notice] Tor v0.2.1.6-alpha (r17011). This is experimental 
software. Do not rely on it for strong anonymity. (Running on Linux i686)   
 
Nov 10 15:30:25.385 [warn] Failed to parse/validate config: Servers must be 
able to freely connect to the rest of the Internet, so they must not set 
Reachable*Addresses or FascistFirewall. 
   
Nov 10 15:30:25.385 [err] Reading config failed--see warnings above.

When I go back to 0.2.1.6-alpha, it works fine.  What has changed in the 
latest to break it in this fashion?  Is there some new magical setting that 
needs to be made in the config?