Re: I wish to see one video on you tube
On Tuesday, February 08, 2011 05:45:37 pm you wrote: > On Tue, Feb 8, 2011 at 3:49 PM, Martino Papesso wrote: > > Hallo I live in Italy. > > I have firefox portable version with tor download from here : > > http://www.torproject.org/dist/torbrowser/tor-browser-1.3.17_it.exe . > > I wish to see this video > > http://www.youtube.com/watch?v=AmhApE1kIgA&feature=player_embedded. > > In Italy is not possible. > > For one friend in Romania is possible to see this > > video(http://img806.imageshack.us/img806/7321/31962895.png). > > I tried to watch the video using tor but did not succeed. > > I'm not very handy when using tor. > > Could you help me for to see this video please. > > Is there one person who speak Italian? > > Many thanks. > > Ciao. > > Martino > > > Clicking the link you post for the video, > http://www.youtube.com/watch?v=AmhApE1kIgA&feature=player_embedded, > this is what I get here in the USA. > > This video contains content from Sony Music Entertainment. It is not > available in your country. > > Which tells me it is not available here either. Makes me wonder which > country's are allowed to watch it. > > Jon Odd. I tried it originally via tor and the first time got it but didn't get it to play (noscript addon blocking) and then I got a denial as above. I then started firefox without tor in the USA and was able to view/listen no problem. -- The means of defense against foreign danger historically have become the instruments of tyranny at home. – James Madison *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: I wish to see one video on you tube
The video is from Silent Hill 2 OST. You MAY be able to play it if 1) you enable flash in your firefox browser and 2) you select an exit from a country not restricted (like Romania). I say MAY because if they use flash to check your location, sidestepping tor, then you will get the same restricted message. praedor On Tuesday, February 08, 2011 04:49:28 pm you wrote: > Hallo I live in Italy. > I have firefox portable version with tor download from here : > http://www.torproject.org/dist/torbrowser/tor-browser-1.3.17_it.exe . > I wish to see this video > http://www.youtube.com/watch?v=AmhApE1kIgA&feature=player_embedded. > In Italy is not possible. > For one friend in Romania is possible to see this > video(http://img806.imageshack.us/img806/7321/31962895.png). > I tried to watch the video using tor but did not succeed. > I'm not very handy when using tor. > Could you help me for to see this video please. > Is there one person who speak Italian? > Many thanks. > Ciao. > Martino > > > > > > > > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > > -- The means of defense against foreign danger historically have become the instruments of tyranny at home. – James Madison *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: DuckDuckGo
On Wednesday, August 18, 2010 01:11:28 pm you wrote: > Just a few days ago I recall reading an announcement that duckduckgo (search > engine) was running a tor exit farm right here in this list. I get my tor > setup and running and go over to duckduckgo to test it all out and what do I > find? Duckduckgo requires javascript to be enabled! WTF? > > Clearly, this is NOT a search engine to use for this reason. A quick response from DuckDuckGo indicated that they are currently working on a non-javascript version -- Economics is not practiced as a science. Rather, it is a pretentious way to covertly promote political prejudices. - Fred Harrison *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: torcheck failing in reality
On Wednesday, August 18, 2010 12:45:05 pm you wrote: > I am running tor 0.2.1.26, vidalia 0.1.15 on Mandriva with privoxy. Tor is > running and according to vidalia I can see my node and everything else. If I > turn on the torbutton in firefox (and check the proxy settings) and then go > to http://check.torproject.org it gives me a nice big "Congratulations" > because I'm using tor and then it shows the IP...but it is exactly MY IP. It > isn't covered at all by tor. So why would this page declare that I'm using > tor and then provide me with my actual IP address as evidence? > > I then fired up Konqueror and set it to use a proxy and tried again. Same > thing. What is going on? > This is now corrected. I found a flaw in my privoxy config file related to the socks4a setting. Tor works as expected now. -- Economics is not practiced as a science. Rather, it is a pretentious way to covertly promote political prejudices. - Fred Harrison *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
DuckDuckGo
Just a few days ago I recall reading an announcement that duckduckgo (search engine) was running a tor exit farm right here in this list. I get my tor setup and running and go over to duckduckgo to test it all out and what do I find? Duckduckgo requires javascript to be enabled! WTF? Clearly, this is NOT a search engine to use for this reason. -- Economics is not practiced as a science. Rather, it is a pretentious way to covertly promote political prejudices. - Fred Harrison *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
torcheck failing in reality
I am running tor 0.2.1.26, vidalia 0.1.15 on Mandriva with privoxy. Tor is running and according to vidalia I can see my node and everything else. If I turn on the torbutton in firefox (and check the proxy settings) and then go to http://check.torproject.org it gives me a nice big "Congratulations" because I'm using tor and then it shows the IP...but it is exactly MY IP. It isn't covered at all by tor. So why would this page declare that I'm using tor and then provide me with my actual IP address as evidence? I then fired up Konqueror and set it to use a proxy and tried again. Same thing. What is going on? -- Economics is not practiced as a science. Rather, it is a pretentious way to covertly promote political prejudices. - Fred Harrison *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: My relay never shows up
Yes, I appear to have shown up. I went over everything I could think of and finally checked my firewall/router and for some reason/at some point, the dyndns setting was deactivated. It appears that my actual IP was unavailable to tor (just my local IP). Reactivating dyndns looks like it fixed it. praedor On Wednesday, August 11, 2010 03:48:20 pm you wrote: > Am 11.08.2010 15:20, schrieb Praedor Atrebates: > > I am running a tor relay called "Stonekeep". > > is it you? > > http://torstatus.blutmagie.de/router_detail.php?FP=a0470c0ea30c3a4d58048db134b8f9e7c6b52d6c > > Olaf > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ > > -- Economics is not practiced as a science. Rather, it is a pretentious way to covertly promote political prejudices. - Fred Harrison *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
My relay never shows up
I am running a tor relay called "Stonekeep". I have port forwarding set on my firewall/router and my personal system firewall permits connections to the tor ports. I am also running Vidalia (Vidalia 0.1.15, tor 0.2.1.26). My relay never shows up in the list of servers/relays and doesn't show up on the various tor network status pages. Why not? I cannot find anything amiss to render my system invisible or unusable to the network. I have no trouble using the tor myself. praedor -- Economics is not practiced as a science. Rather, it is a pretentious way to covertly promote political prejudices. - Fred Harrison *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: A suggestion to TOR [a proxy server]
At work I am unable to run or use tor even from a USB key - they are prevented from working. It might be nice to have a website(s) that act as entry points to tor and that use names that do not immediately scream TOR PROXY SERVER! TOR ENTRY POINT RIGHT HERE! so that it is less likely for IT departments to be able to easily block access to such (I am also prevented from accessing any proxy servers and they often name themselves as proxies to boot so they scream their nature and make it easy to block). Is there any way to create tor entry point servers that provide the benefits of the tor network without the cost of providing the site with user ID AND endpoint site? On Sunday 25 July 2010 04:40:33 pm you wrote: > emigrant writes: > > > hi all, > > i would like to suggest TOR to build some sort of online system, > > like a proxy server. where ppl just come and enter the address in the > > text box and hit 'surf with tor' or something. so that the same > > objective is achieved as in running the TOR client. > > its easier for pcs and mobile devices as well (as most mobile devices > > still don't support TOR). > > > > and i think, this can be a step towards the increasing trend of cloud > > computing, if i have correctly understood what is cloud computing. :D > > The Tor developers don't think that would achieve the "same > objective" as Tor, because the proxy server would be in a > position to know both where you are coming from and what you > are doing. Tor aims to prevent anyone from being in this > position, and in any case the Tor Project wouldn't want to be: > > https://www.torproject.org/faq#Torisdifferent > > -- "The modern conservative is engaged in one of man's oldest exercises in moral philosophy; that is, the search for a superior moral justification for selfishness." -- John Kenneth Galbraith *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: [OFF LIST] Re: attempt from Taiwan to connect to my privoxy port
As a member of a US military "organization", that term "weaponized icmp", etc, is bullshit speak to try to gin up tax dollars to support "info warfare" commands and related crap. You have to call EVERYTHING a weapon or everyone a potential terrorist if you want to fund your latest pet project. Total crap. "Weaponized" icmp my ass. And I'm a Comm troop too. praedor On Wednesday 16 December 2009 09:13:09 am you wrote: > On 12/16/2009 04:52 AM, grarpamp wrote: > > And of course everyone knows the Chinese boogeymen are probing the > > > > hell out of US address space. Oh wait, so are the Brazilians and > > the Romanians and the... ;) Why just the other day I was feeling > > lonely and sent out about 16M 'illegitimate' pings to some random/8 > > just to see who said hello. > > The terms I continue to hear from military organizations are "weaponized > icmp", "weaponized tcp", and "weaponized probing". > > I don't really know how one can take an icmp packet and determine if > it's weaponized or innocent, but it's quite the dichotomy that's being > created. Interestingly, most of these people don't think tor is > weaponized. For whatever that means. > -- Freedom is not the Judeo-Christian divinity's gift to anybody. Freedom and democracy have their origins with the Greeks and the Romans, who had a bunch of gods whose idea of family does not comport with George Bush's. --Nicholas Von Hoffman, NYObserver *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Random chaff [was: more work for Grobbages]
It would appear that the tor network should include some timing randomization and reordering of packets to thwart such analysis. Not so much to really slow things down but enough to throw up uncertainty in the packet analyses. On Wednesday 23 September 2009 10:59:03 am Paul Syverson wrote: > On Wed, Sep 23, 2009 at 10:01:07AM -0400, Brian Mearns wrote: > > > > So, if I understand this correctly, a correlation attack works (on a > > very basic level) by noticing that Alice sent a message to Bob (a > > known Tor node) at time X, and Dave (another known Tor node) sent a > > message to Wally (a web server) at time X+e, where e is about how long > > we would expect it to take for the onion to be routed. Is that more or > > less the idea? > > Yes. But packet counting can also play a role. Cf, > "Passive Attack Analysis for Connection-Based Anonymity Systems" > at http://freehaven.net/anonbib/index.html#SS03 > > > > > It seems like determining e (time to route the packet) with any degree > > of precision would be pretty difficult, so is this really a big > > problem? (or is that still being debated?) > > It's not. Cf. my "Locating Hidden Servers" > http://freehaven.net/anonbib/index.html#hs-attack06 > wherein we had zero false positives on any timing attacks conducted > in finding hidden services, which generally was very quick. > (That such attacks existed were known for years. That they were not > just possible but so fast and effective using merely a single > node in the network was the reason that guard nodes were introduced > into the Tor network.) > > And building on that see, "Low-Resource Routing Attacks Against Tor" > http://freehaven.net/anonbib/index.html#bauer:wpes2007 > where timing attacks with epsilon false positives > were based simply on circuit setup and were shown on general > Tor circuits, not just for hidden services. > > > On the other hand, if an attacker could monitor a good number of > > nodes, wouldn't it be fairly easy to determine each three-node > > circuit segment (like Alice, to Bob, to Charlie) and trace the whole > > thing end-to-end? It seems like this could be defeated with a more > > intelligent type of "chaff", where the receiving relay generates N > > random dummy onions (with an appreciable circuit length) for each > > onion it receives, and then sends all N+1 into the network in a > > random order. > > > > There's been a lot of research on this. I think Nick pointed at > some. Cf. the anonbib. > Research against timing attacks continues. (I'm doing some myself.) > But so far, any "chaff" strategy in the literature is both too > expensive and not at all effective against active attacks on > general low-latency systems for wide use, such as Tor. > > HTH, > Paul > > -- “We can have a democratic society or we can have the concentration of great wealth in the hands of the few. We cannot have both.” — Louis Brandeis, Supreme Court Justice, 1916-1939
Re: Gmail
On Wednesday 02 September 2009 02:22:33 am Ansgar Wiechers wrote: > On 2009-09-01 Ted Smith wrote: > > On Tue, 2009-09-01 at 23:27 -0400, Andrew Del Vecchio wrote: > >> Ted Smith wrote: > >>> On Tue, 2009-09-01 at 22:43 -0400, DM wrote: > Don't use Gmail. > >>> > >>> Instead, use... > >> > >> dude you are using gmail, at least allegedly :) > > > > I'm sorry if I was unclear. I meant my statement as a question, namely: > > "If we are not to use GMail, what mail service should we instead use?" > > Gee, I wonder how people e-mailed before Google created GMail ... > > *shakes head* Yahoo, prodigy, aol, their school/university, their jobs, etc. Gmail is a relative newcomer. I have never heard of any of the previously listed servers/providers (activix, antifa, etc). Any of them in the USA? If you use a mailserver outside the USA and you are IN the USA then you can be absolutely certain that all your comms will be recorded/stored at the NSA. While the chance is still fairly high that you will still get swept up anyway, it is better to do all one can to minimize the chances. Also, at least a couple of those in the list (nadir.org in particular) appears to be defunct. praedor -- “We can have a democratic society or we can have the concentration of great wealth in the hands of the few. We cannot have both.” — Louis Brandeis, Supreme Court Justice, 1916-1939 signature.asc Description: This is a digitally signed message part.
Re: Supercookies
On Thursday 20 August 2009 09:36:40 am Ted Smith wrote: > On Thu, 2009-08-20 at 08:55 +0200, Matej Kovacic wrote: > > Hi, > > > > I am not sure if this was on this list, but it is an interesting > > information: > > > > http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/ > > it seems cookies could be "respawned"... > > > > And there is a plugin to remove this LSO's: > > https://addons.mozilla.org/en-US/firefox/addon/6623 > > > > You need to set Flash directory (autodetection does not always work): > > - Windows: %APPDATA%\Macromedia\Flash Player\ > > - Macintosh: ~/Library/Preferences/Macromedia/Flash Player/ > > - Linux/Unix: ~/.macromedia/Flash_Player/ > > > > Maybe something like that should be integraded into TorButton... > > However, the question is what about Silverlight and other non-flash > > plugins... > > > > There is also a Windows tool called CCleaner (http://www.ccleaner.com/)... > > > > bye, Matej > > The best solution here is not to use non-free software as a general > rule, and stay the f*** away from non-free software peddled by companies > that have their software phone home to "192.168.1.2o7.net". IIRC, Gnash, > the GNU swf decoder/player/interpreter/whatever, does not have these > flash cookies, and if it did, you could easily disable or find a way to > purge them. There is a nice writeup on these cookies and simple (non-firefox/global) protection from such cookies at: http://www.linuxplanet.com/linuxplanet/tutorials/6709/1/ No need to go extreme and lose most functionality by going 1% free/open software. You simply lose a lot of nice, desireable web functionality if you do. At the end of the above article is a quick write about Gnash, the open/free flashplayer (though lacking a lot of functionality/compatibility) and how it handles flash cookies. -- “We can have a democratic society or we can have the concentration of great wealth in the hands of the few. We cannot have both.” — Louis Brandeis, Supreme Court Justice, 1916-1939
Re: Comcast throws down gauntlet to residential accounts
On Monday 10 August 2009 02:55:13 pm Gregory Maxwell wrote: > On Mon, Aug 10, 2009 at 2:39 PM, Scott Bennett wrote: > [snip] > > > business-class service, but it seems unlikely to be any cheaper. > > Verizon's residential service does not currently have a cap, but I don't > > know whether they prohibit listening on ports accessable from the > > Internet. > > VZN's residential AUP prohibits "servers" along with a number of other > offensive prohibitions which they don't currently enforce. (For > example, you're prohibited from using your VZN broadband for anything > "sexually explicit"). > > As I recall the business FiOS AUP had it's own set of ridiculous > terms... but it didn't attempt to prohibit you from running "servers". AUPs are rarely enforced. They are there so they can cut you off if/when someone complains or you do something to annoy them. In any case, I would run my servers regardless of their AUP. NO ONE tells me I cannot run sshd or any other of what I consider personally critical apps. They also don't get to tell me not to run a tor relay. -- “We can have a democratic society or we can have the concentration of great wealth in the hands of the few. We cannot have both.” — Louis Brandeis, Supreme Court Justice, 1916-1939
Re: VoIP telephony building like Tor
Sigh. Tor is political by its very existence and design. It is NOT a neutral entity. Its very existence is for political reasons. On Monday 03 August 2009 06:19:23 pm Alexander Cherepanov wrote: > Hi Scott! > > On Wed, 29 Jul 2009 02:16:29 -0500 (CDT), Scott Bennett wrote: > > On Sat, 25 Jul 2009 22:04:11 +0400 "Alexander Cherepanov" > > > > wrote: > >>You wrote to or-talk@freehaven.net, "Vlad \"SATtva\" Miller" on Sat, 25 Jul 2009 06:59:43 -0500 (CDT): > >>> On Sat, 25 Jul 2009 18:12:52 +0700 "Vlad \"SATtva\" Miller" wrote: > James Brown (25.07.2009 00:16): > >> > >>[skip] > >> > > Very many Russian people were killed, unlawful arrest or simply > > disappear last 4 - 5 years from activity our new Government... > > Please, please, keep political FUD off the list. > >>> > >>> Given that what he wrote is about a) events reported in the press > >>> internationally and b) one of the highest priority justifications for > >>> having a tor development project in the first place, *your* comment > >>> would appear to be a non sequitur. Perhaps you should have changed > >>> your Subject: line to reflect whatever OT issue you wished to discuss > >>> instead of what was already being discussed. > >>> The OP has requested information, and several of us now have tried > >>> to find information that he might be able to use to his advantage in > >>> the situation he believes he faces. If you have additional information > >>> along these lines, please post it. > >> > >>I'm sure that Vlad is happy to see the ongoing discussion of technical > >>questions raised by the OP. He just asked to keep political FUD off > > > > He gave no such indication in the single line of text that > > constituted his followup and to which I was following up. > > Ok, I cannot guarantee that he is happy about technical questions:-) > But he clearly toalks about non-technical points. > > >>the list. And I'm completely agree with him, IMHO unfounded (and > >>founded probably also:-) talks about bloody regime are not for this > >>mailing list. YMMV. > > > > Please reread what I wrote that you have quoted above. It doesn't > > matter whether you support or oppose the OP's political views. > > Sure. But only while he keeps his political views for himself and > doesn't bring them to this list. > > > The point > > is that the OP made apparent reference to events reported both in the > > press in Russia and in the international press as a reason *he* was > > afraid and wanted to use tor. That should be more than sufficient > > information for anyone on this list to understand the OP's motivation for > > asking his questions. > > Just to be sure: you talk about banning Skype? No problem here, it's a > valid concern, it's in the news, in the press, on TV etc. > > The problem is the rhetoric such as quoted at beginning of this mail. > OP started the thread talking about bloody regime. IMHO it already is > beyond the acceptable line. But then he continues about killed people > etc. in the following mails. That very much brings the politics to the > list and adds nothing to the technical side of discussions. > > >>As for banning Skype in Russia, AFAICT it's FUD also. Everything seems > >>to be based on some discussions in The Russian Union of Industrialists > >>and Entrepreneurs (just hysterics by mobile operators loosing market > >>share?). It's somewhat troubling but I'm not sure it's worth much > >>discussion until there are some concrete details. > > > > Fair enough. However, if Phil Zimmermann had waited until the FBI > > had its Carnivore system up and running, along with further development > > already in progress, we probably would never have gotten PGP or its > > successors. He dropped all of his paying work for many months in order > > to design, code, test, and release PGP 1.0, all justified *in his own > > mind* on the basis of what he had heard or read that the FBI was talking > > about doing. > > One doesn't need to wait for additional reasons to switch away from > Skype. It's proprietary and closed technology with all accompanying > problems. BTW last news are about eBay possibly closing Skype entirely > which is quite in line with its proprietary nature. So no question > here. > > If someone is concerned about possibility of banning Skype or VoIP in > general s/he can start with research how VoIP is banned in those > countries in which it's already banned. There are some examples in > http://en.wikipedia.org/wiki/VoIP#Legal_issues . > > >>What the OP proposes is also somewhat strange. Build the possibility > >>to "call to ordina[r]y telephones" into Tor? Sure, just add some PSTN > >>exit nodes... > > > > Yeah, well, that is certainly unnecessary. Specific applications > > should be developed outside of tor by interested parties. I already > > worry that tor itself will become too large and complex to be kept safe > > to use. There are already various telephone appl
Re: VoIP telephony building like Tor
On Friday 24 July 2009 10:21:52 am James Brown wrote: > Gitano wrote: > > James Brown wrote: > >> There is a very strong control over telephony in many countries. Many > >> counties intend to make this control more and more stronger. > >> In the Russia, when I live, for example the Putin's and Medvedev's > >> bloody dictatorial regim now intend to ban VoIP telephony: > >> http://www.point.ru/news/stories/20598/ > >> Besides, there is no effective open source system of VoIP telepony which > >> let people freely talk and connect by chat and sending-receiving files > >> between each other without any control from Governments, companies etc., > >> maintaining anonimity and encryption of communication at the same time. > > > > For chat and files exchange there exists a nice small program 'TorChat'. > > > > --> http://code.google.com/p/torchat/ > > And what about phone calls, including call to ordinaty telephones? You might want to take a look at zfone and zrtp. zfone is a free software phone that originates zrtp, an encryption scheme about to be implemented into a number of other free softphones (ekiga, for instance). http://www.zfoneproject.org/prod_zfone.html If you and your recipient have zfone (or a zrtp-enabled softphone) then it will automatically establish an encrypted, secure connection. You don't get anonymity but you do get privacy. praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: eventdns: all nameservers have failed
On Thursday 16 July 2009 01:00:01 pm Scott Bennett wrote: > On Thu, 16 Jul 2009 09:53:36 -0400 Praedor Atrebates > > > wrote: > >I get this message now in my tor log. No other useful info provided. > > > >What is the cause? I have been cleaning up my system daemons (Mandriva > > linux) and terminated a few services that I didn't believe I needed. > > I'm not sure that anyone knows yet. I get this messages, too, usually > followed within a few tens of milliseconds by another message, saying that > one of the name servers is available again. Here's an example from this > morning. > > Jul 16 07:48:37.512 [warn] eventdns: All nameservers have failed > Jul 16 07:48:37.535 [notice] eventdns: Nameserver 68.87.72.134 is back up [...] Thank you. I hadn't seen this message in memorable recent history - but only this morning after tidying up my ports and other services so I assumed it was associated with some service I shut down. In any case, all I got was the first message, no follow-up. Just in case I shut down and restarted tor and haven't seen it again. Very sporadic for me at this point and possibly a one-off event. praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
eventdns: all nameservers have failed
I get this message now in my tor log. No other useful info provided. What is the cause? I have been cleaning up my system daemons (Mandriva linux) and terminated a few services that I didn't believe I needed. What are the services/ports required for tor to operate properly? What service being shut down might cause this message? praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Odd connection attempt to tor
I am running Mandriva with its interactive firewall enabled so it alerts me whenever a connection is attempted, including tor network connections to port 9001. Usually the source is logical: an ip address or a system name but just this morning I found an odd one I've never seen before. A connection to my port 9001 was made by '.' , that is, just . No address. What is this? praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Help Iranian dissidents
This website is one of the locations with useful info. The email ph.on.twit...@gmail.com is still active and the place to send tor bridge info. http://iran.whyweprotest.net/ -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: Help Iranian dissidents by collecting and posting Bridge addresses? (here?)
On Friday 19 June 2009 13:49:48 Chris Humphry wrote: > From twitter, there is a user ("austinheap") out of San Fran who organized > > >this. It is simply having people setup squid proxies and sending the > >pertinent info to him by email or twitter direct message: ip address and > > port (change from the default port and other "standard" ports...I set > > mine up for port 8808). He then compiles the list of ips and port info > > and passes it along to his trusted iranian contacts who then disburse the > > info to their trusted friends. > > Excellent info, thanks. > > >Try http://blog.austinheap.com/ click through the first blurb screen > > image in green to get to the actual site. He has an entry about 1/3 down > > the page titled "Best proxy practices" for this situation, providing > > guidance to help and get around the Iranian govt censors. > > Great. I will inform others who want to help but do not know how. > > >He is providing guidance on squid proxy. As for tor, you can setup a > > bridge relay in addition to this direct proxy. > > Do you know if he reads this list? Have you contacted him about Tor? The > Revolutionary Guard has stated they will crack down on anyone disseminating > images out of Iran. I fear they could be running honey pots in the form of > simple squid proxies and such. So austinheap just trusts each provider of > squid proxies at face value? That seems very dangerous... There is a parallel tor bridge effort going on. You setup your tor bridge and send you information to ph.on.twit...@gmail.com. Austinheap (among one or two others) collects the squid proxy info and passes it on and the people behind explaining how the iranians can quickly setup and use tor are collecting bridge info. Their original website (http://tor.ir.org/) appears to be toast but the tor main website is linked to from one of the protest aid sites and I've seen many links to tor in twitter. I am trying to verify that the ph.on.twitter email is still active and good. Also: http://blog.austinheap.com/ has some info. He provides the squid info but also recently posted that Freegate appears to be working (hadn't heard of freegate until now) in Iran. Apparently, it is popular with chinese in evading their firewall censors. praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: Help Iranian dissidents by collecting and posting Bridge addresses? (here?)
From twitter, there is a user ("austinheap") out of San Fran who organized this. It is simply having people setup squid proxies and sending the pertinent info to him by email or twitter direct message: ip address and port (change from the default port and other "standard" ports...I set mine up for port 8808). He then compiles the list of ips and port info and passes it along to his trusted iranian contacts who then disburse the info to their trusted friends. Try http://blog.austinheap.com/ click through the first blurb screen image in green to get to the actual site. He has an entry about 1/3 down the page titled "Best proxy practices" for this situation, providing guidance to help and get around the Iranian govt censors. He is providing guidance on squid proxy. As for tor, you can setup a bridge relay in addition to this direct proxy. praedor On Thursday 18 June 2009 13:51:45 Chris Humphry wrote: > Hi Roger, > > On Wed, 2009-06-17 at 22:11 -0400, Roger Dingledine wrote: > >>On Wed, Jun 17, 2009 at 06:26:43PM -0700, Chris Humphry wrote: > >>Please help...without proxies (ie. Bridges) the Iranian dissidents > >>have no voice! > > > >Yeah, see, I'm not sure whether this is true. If ordinary bridges are > >working, then probably ordinary Tor relays are working too. Or said > >another way, if ordinary Tor relays aren't working, probably ordinary > >bridges won't work either. > > I have no idea if Tor relays are working from Iran or not. On CNN they > have been reporting that a vast amount of proxies are provided each day > to the dissidents. Supposedly that is how they are sending the pics and > video we see each day. To me it sounds like plain ol' one hop open > proxies, not Tor. I have emailed CNN asking how one can provide proxies > and to which organization, they have yet to email me back. > > >We've heard rumors they're blocking all encrypted traffic. Does this > >mean everything that does an SSL handshake no matter the port? Or does > >it mean the blocked port 443? > > > >If the former, an automated system like Tor is going to have a tough time > >keeping up -- at least without the tweaks we've been pondering over the > >past few days. ;) > > Even if it is the former I like the tone of your sentence! I am looking > forward to seeing what your guys/gals come up with :) > > >If the latter, then setting up a bunch of bridges on port 80 (even > >though everything's still encrypted) might be the ticket. > > I will email CNN and ask them, but they are getting SO much email I > have doubts they will get back to me. Does Tor Project not have contacts > in Iran? I wonder how/if we can find out specifically how the Iran > Government is blocking Internet access? > > If a representative from the EFF or Tor contacted CNN I bet they would > respond... > > >Lots of misinformation going around, and not so much information. > > Yea I was wondering about that. Who to trust?... > > Thanks! -- There is danger from all men. The only maxim of a free government ought to be to trust no man living with power to endanger the public liberty. - John Adams [1772]
Re: This doubletalk is driving me nuts
On Thursday 04 June 2009 13:31:34 Ted Smith wrote: > On Thu, 2009-06-04 at 13:28 -0400, Praedor Atrebates wrote: > > I have just built and installed tor-0.2.1.15-rc in replacement for my > > previous 0.2.0.34 version. > > > > Nothing has changed from before this upgrade, not the location or entries > > in my torrc, not the perms on tor, not the perms on /var/lib/tor, etc. > > When I try to start tor via vidalia, it now fails with messages: > > > > Jun 04 13:23:43.160 [Warning] Error setting groups to gid 85: "Operation > > not permitted". > > Jun 04 13:23:43.160 [Warning] If you set the "User" option, you must > > start Tor as root. > > Jun 04 13:23:43.160 [Warning] Failed to parse/validate config: Problem > > with User value. See logs for details. > > Jun 04 13:23:43.160 [Error] Reading config failed--see warnings above. > > > > > > I have a "toruser" group set on my system. I am a member of the toruser > > group. It worked before, but now it doesn't. Then there is the > > doubletalk - "you must start tor as root" I read that it is a > > bad idea and totally unnecessary to run tor as root and here this message > > is telling me I MUST run it as root all of a sudden. > > > > I want vidalia to start tor when I run it as a mere user who happens to > > be a member of the toruser group. How do I do this? Nothing I do with > > the vidalia settings changes anything and I am still prevented from > > running tor and I will not run it as root. > > > > Someone, please explain/help? > > > > thx > > praedor > > If you set the "User" option in torrc, Tor will try to change uid to > that user. That capability is only available to the root user. If you > want to run Tor as a lower user from the start, unset the "User" option. Thanks, but if I unset the user option then it fails to start because it cannot create /var/lib/tor (which exists and is owned by toruser.toruser of which I am a member). I do not want the lib/tor in my home I want it in one single location on my system. This worked before I upgraded to 0.2.1.15-rc so I don't understand why it refuses now. praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
This doubletalk is driving me nuts
I have just built and installed tor-0.2.1.15-rc in replacement for my previous 0.2.0.34 version. Nothing has changed from before this upgrade, not the location or entries in my torrc, not the perms on tor, not the perms on /var/lib/tor, etc. When I try to start tor via vidalia, it now fails with messages: Jun 04 13:23:43.160 [Warning] Error setting groups to gid 85: "Operation not permitted". Jun 04 13:23:43.160 [Warning] If you set the "User" option, you must start Tor as root. Jun 04 13:23:43.160 [Warning] Failed to parse/validate config: Problem with User value. See logs for details. Jun 04 13:23:43.160 [Error] Reading config failed--see warnings above. I have a "toruser" group set on my system. I am a member of the toruser group. It worked before, but now it doesn't. Then there is the doubletalk - "you must start tor as root" I read that it is a bad idea and totally unnecessary to run tor as root and here this message is telling me I MUST run it as root all of a sudden. I want vidalia to start tor when I run it as a mere user who happens to be a member of the toruser group. How do I do this? Nothing I do with the vidalia settings changes anything and I am still prevented from running tor and I will not run it as root. Someone, please explain/help? thx praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: Tor 0.2.1.15-rc is out
I don't get it. Apparently there is no such things as libevent-devel for Mandriva so I cannot build tor. Mandriva has libevent2 (but there is no libevent2-devel) and it has libevent-devel for 1.4.8 but it conflicts with libevent2. It also have libevent0.9_0-devel but tor doesn't care. What libevent is tor requiring? On Sunday 31 May 2009 16:37:34 Roger Dingledine wrote: > Tor 0.2.1.15-rc marks the second release candidate for the 0.2.1.x > series. It fixes a major bug on fast exit relays, as well as a variety > of more minor bugs. > > This is a release candidate! That means that we don't know of any > remaining show-stopping bugs, and this will become the new stable if > there are no problems. Please test it, and tell us about any problems > that you find. > > https://www.torproject.org/download.html.en > > Changes in version 0.2.1.15-rc - 2009-05-25 > o Major bugfixes (on 0.2.0.x): > - Fix a timing-dependent, allocator-dependent, DNS-related crash bug > that would occur on some exit nodes when DNS failures and timeouts > occurred in certain patterns. Fix for bug 957. > > o Minor bugfixes (on 0.2.0.x): > - Actually return -1 in the error case for read_bandwidth_usage(). > Harmless bug, since we currently don't care about the return value > anywhere. Bugfix on 0.2.0.9-alpha. > - Provide a more useful log message if bug 977 (related to buffer > freelists) ever reappears, and do not crash right away. > - Fix an assertion failure on 64-bit platforms when we allocated > memory right up to the end of a memarea, then realigned the memory > one step beyond the end. Fixes a possible cause of bug 930. > - Protect the count of open sockets with a mutex, so we can't > corrupt it when two threads are closing or opening sockets at once. > Fix for bug 939. Bugfix on 0.2.0.1-alpha. > - Don't allow a bridge to publish its router descriptor to a > non-bridge directory authority. Fixes part of bug 932. > - When we change to or from being a bridge, reset our counts of > client usage by country. Fixes bug 932. > - Fix a bug that made stream bandwidth get misreported to the > controller. > - Stop using malloc_usable_size() to use more area than we had > actually allocated: it was safe, but made valgrind really unhappy. > - Fix a memory leak when v3 directory authorities load their keys > and cert from disk. Bugfix on 0.2.0.1-alpha. > > o Minor bugfixes (on 0.2.1.x): > - Fix use of freed memory when deciding to mark a non-addable > descriptor as never-downloadable. Bugfix on 0.2.1.9-alpha. -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: A tor error message prior to crash
Thanks. I'll check it out. I have also since found that the problem is associated with being and exit rather than being a relay. I was using Vidalia default settings and set to be a relay (Vidalia in this regard appears to configure tor to be either/both(?). I delved deeper into the Vidalia configuration options and deselected any settings that seemed to set me up to serve as an exit. Since doing this, tor has not faltered on me at all. On Tuesday 19 May 2009 13:54:51 Nick Mathewson wrote: > On Mon, May 11, 2009 at 01:33:41PM -0400, Praedor Atrebates wrote: > > I finally picked up a log entry that is associated with vidalia/tor > > failing at random moments: > > > > May 11 13:30:49.177 [err] Error from libevent: event_queue_insert: > > 0xa2e6d68(fd 33) already on queue 2 > > > > What does this mean and how do I fix it? > > I have a patch in the repository that might fix it. If you can build > from source, please try out the latest maint-0.2.1 branch to see > whether the bug is gone for you. > > (There might be some warning messages in the log that start with > "Bug". If there are, please let me know.) > > yrs, -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
What is url for tor proxy list?
I keep getting blocked from joining freenet.org IRC because it thinks I am running a tor exit. I have my system set to be a RELAY only and I recall there being a nice official website that lists current tor servers and whether they are good, bad, reliable, etc. Can anyone point me to the proper URL? I want to make sure it is listing me as a relay and not an exit. praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: A tor error message prior to crash
It isn't a matter of how I feel, it is simply a fact. If my tor relay server is going to keep crashing randomly, then I cannot operate it because I do not have the time to babysit it and keep restarting it. On Wednesday 13 May 2009 07:33:58 Andrew Lewman wrote: > Praedor Atrebates wrote: > > I can no longer provide support to the tor network because my tor relay > > server wont operate for more than an hour at a time AT BEST. > > Sorry you feel this way. Bug 957 seems like an odd bug affecting some > specific configurations or operating systems. This assumes you're > seeing the affects of bug 957 and not some new bug. However, without > gdb and core output, we'll never know. -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: A tor error message prior to crash
Just great. I have now tried the mandriva cooker libevent rpm and it produces the crash as well as the 2009.1 libevent and the previous (updated version) of 2009.0 libevent. I can no longer provide support to the tor network because my tor relay server wont operate for more than an hour at a time AT BEST. praedor On Monday 11 May 2009 14:01:19 Olaf Selke wrote: > Praedor Atrebates schrieb: > > I finally picked up a log entry that is associated with vidalia/tor > > failing at random moments: > > > > May 11 13:30:49.177 [err] Error from libevent: event_queue_insert: > > 0xa2e6d68(fd 33) already on queue 2 > > there's an existing bug report for this issue: > http://bugs.noreply.org/flyspray/index.php?do=details&id=957 > > Got already about a dozen core dumps triggered by libevent. > > yrs Falo -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: A tor error message prior to crash
I am running (or trying to) tor-0.2.0.34. My libevent was libevent2-1.4.8-2mdv (with 2009.1 mandriva install) but after this, I went back and tried libevent2-1.4.7-1mdv from mandriva 2009.0. Same ultimate result with same error message. I am about to try the mandriva cooker libevent2-1.4.10-1mdv rpm. I run a tor relay server. praedor On Monday 11 May 2009 14:54:56 Nick Mathewson wrote: > On Mon, May 11, 2009 at 08:01:19PM +0200, Olaf Selke wrote: > > Praedor Atrebates schrieb: > > > I finally picked up a log entry that is associated with vidalia/tor > > > failing at random moments: > > > > > > May 11 13:30:49.177 [err] Error from libevent: event_queue_insert: > > > 0xa2e6d68(fd 33) already on queue 2 > > > > there's an existing bug report for this issue: > > http://bugs.noreply.org/flyspray/index.php?do=details&id=957 > > > > Got already about a dozen core dumps triggered by libevent. > > What?? The logs say this? > > Olaf, I didn't know the logs said that. Do they? It would help to > know if they did. > > Praedor -- do you have a stack trace here? What version of Libevent > do you have, if you know? Is this a server or a client? > > yrs, -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: Vidalia issue yet ANOTHER problem
Frankly, I have no idea what log level I am operating tor at because I am only now trying to work with vidalia and have no idea what it's settings are in that regard. I am trying to use vidalia with its defaults (at least as they are in the mandriva rpm). I DID alter the vidalia conf so that instead of stderr, tor is logging to /usr/local/var/log/tor/debug.log. It took a while for me to figure out how Tork was doing things. I think it may take at least a little for futzing before I figure out the basics of vidalia too. praedor On Monday 11 May 2009 13:33:49 Jon wrote: > Praedor Atrebates wrote: > > On Saturday 09 May 2009 08:25:30 Andrew Lewman wrote: > >> On Fri, 8 May 2009 13:01:23 -0400 > >> > >> Praedor Atrebates wrote: > >>> I have had to give up on Tork and am now trying to make vidalia > >>> work. I am unable to get vidalia to assign a password to the control > >>> port. How does one do this short of running vidalia as root? It is > >>> preventing me from being able to support the tor network because I do > >>> not want to run with no protected control port. [...] > > I have just confirmed yet another vidalia problem: the log window, if > > opened, > > > scrolls rapidly and refuses to clear or close after I've opened it while > > vidalia is running. All the buttons in the window become unresponsive > > and the > > > only way to close the window is to click the shutdown X in the window > > corner. > > > After that, in about 5 seconds, I get a message that the message window >> is not > > responding and do I want to terminate the application or keep it >> running (it > > eats up lots of CPU too). I hit "terminate" and it takes vidalia down > with > > > it. > What log level are you running when this occurs? -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
A tor error message prior to crash
I finally picked up a log entry that is associated with vidalia/tor failing at random moments: May 11 13:30:49.177 [err] Error from libevent: event_queue_insert: 0xa2e6d68(fd 33) already on queue 2 What does this mean and how do I fix it? praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: Vidalia issue yet ANOTHER problem
On Saturday 09 May 2009 08:25:30 Andrew Lewman wrote: > On Fri, 8 May 2009 13:01:23 -0400 > > Praedor Atrebates wrote: > > I have had to give up on Tork and am now trying to make vidalia > > work. I am unable to get vidalia to assign a password to the control > > port. How does one do this short of running vidalia as root? It is > > preventing me from being able to support the tor network because I do > > not want to run with no protected control port. > > Is tor started by the system/run as a daemon? And vidalia is trying to > attach to the existing Tor? I have just confirmed yet another vidalia problem: the log window, if opened, scrolls rapidly and refuses to clear or close after I've opened it while vidalia is running. All the buttons in the window become unresponsive and the only way to close the window is to click the shutdown X in the window corner. After that, in about 5 seconds, I get a message that the message window is not responding and do I want to terminate the application or keep it running (it eats up lots of CPU too). I hit "terminate" and it takes vidalia down with it. -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Re: Vidalia issue and then some more
On Saturday 09 May 2009 08:25:30 Andrew Lewman wrote: > On Fri, 8 May 2009 13:01:23 -0400 > > Praedor Atrebates wrote: > > I have had to give up on Tork and am now trying to make vidalia > > work. I am unable to get vidalia to assign a password to the control > > port. How does one do this short of running vidalia as root? It is > > preventing me from being able to support the tor network because I do > > not want to run with no protected control port. > > Is tor started by the system/run as a daemon? And vidalia is trying to > attach to the existing Tor? Hello. Tor is started by myself when I start Vidalia (or in the past, Tork). I am not allowed to assign a password to the control port. As I've run this for several days now, I am also finding another problem. Vidalia will operate for a while but then at some point tor simply dies. I cannot find anything in the vidalia logs to explain why. I simply notice at some point that the vidalia onion icon in my kde panel has developed a red x signifying it is no longer operating. Tork, which I would much rather use (because of the addon support like mixminion, anonymous telnet, anonymous ssh, anonymous IRC, etc) no longer works. I upgraded from Mandriva 2009.0, tor-0.2.34, Tork 0.29, to Mandriva 2009.1, same tor and tork version, yet Tork will no longer function because the first run wizard will not bring up the root password dialog to permit modification of the privoxy config file and it wont bring up the pword dialog to set netstat to run as root. Tor then fails to even start at all so I was forced to switch to Vidalia by default. Now Vidalia and tor wont run indefinitely, producing a new problem. praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Vidalia issue
I have had to give up on Tork and am now trying to make vidalia work. I am unable to get vidalia to assign a password to the control port. How does one do this short of running vidalia as root? It is preventing me from being able to support the tor network because I do not want to run with no protected control port. Any help on this would be greatly appreciated (I am a member of both sudo and toruser). praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers
Privoxy change?
I just upgraded my linux system to Mandriva 2009.1 and installed tor and tork as usual. I have tried to configure privoxy as in the past with a "forward- socks4a/localhost:9050 ." added at the end of the config file. When privoxy starts, it produces: Starting privoxy: May 08 11:52:50.191 b7d2a6c0 Error: Ignoring unrecognized directive 'forward-socks4a/localhost:9050 .' What exactly is the format of this line supposed to be? Has privoxy changed recently to render this nonfunctional? praedor -- "If we have Senators and Congressmen there that can't protect themselves against the evil temptations of lobbyists, we don't need to change our lobbies, we need to change our representatives." - Will Rogers signature.asc Description: This is a digitally signed message part.
Re: Moxie Marlinspike
Another good reason to keep ExcludeNodes. praedor On Thursday 19 February 2009 07:15:47 Scott Bennett wrote: > On Thu, 19 Feb 2009 07:17:04 -0500 Erilenz wrote: > >http://blog.internetnews.com/skerner/2009/02/black-hat-hacking-ssl-with-ssl.html > > > >There's nothing in there that we didn't already know was possible, and I > >realise > >it's not a Tor specific flaw. I just read this paragraph and thought I'd > >pass it > >on here: > > > >"Marlinspike also claimed that in a limited 24 hour test case running on the > >anonymous TOR network (and without actually keeping any personally > >identifiable > >information) he intercepted 114 yahoo logins â 50 gmail logins, 9 paypal, 9 > >inkedin and 3 facebook. So apparently the tool works - and works well." > > Thank you very much for pointing out yet another unscrupulous exit > operator. I've just added > > ExcludeExitNodes thoughtcrime,$1E6882D9AB86DA56C48BDE96698B8F8AF81FD707 > > to my torrc file. > > > >Lots of people simply don't know how to use Tor safely. > > Very true, but then, lots of people simply don't know how to use the > Internet safely. Lots of people don't bother to buy and use a paper shredder > to dispose of sensitive USnail safely. > > > >I wonder if something could/should be built into TorButton to force a list of > >commonly used services to go entirely over https? Eg any request for > >^http://mail\.google\.com/.*$ > > > >Also, how feasible would it be to add a popup which says something along the > >lines of: > > > >"You are about to post unencrypted data over the Tor network. Are you sure > >you > >wish to proceed?" > > It's looks like a good idea, but what about pop-up blockers? Maybe it > should be built into browsers, perhaps enabled as a configurable option turned > on by default. > > > Scott Bennett, Comm. ASMELG, CFIAG > ** > * Internet: bennett at cs.niu.edu * > ** > * "A well regulated and disciplined militia, is at all times a good * > * objection to the introduction of that bane of all free governments * > * -- a standing army." * > *-- Gov. John Hancock, New York Journal, 28 January 1790 * > ** > > X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on > lapdog.ravenhome.net > X-Spam-Level: ** > X-Spam-Status: No, score=6.7 required=8.0 tests=EMPTY_MESSAGE,MISSING_DATE, > > MISSING_HEADERS,MISSING_MID,MISSING_SUBJECT,NO_HEADERS_MESSAGE,NO_RECEIVED, > NO_RELAYS,TVD_SPACE_RATIO autolearn=no version=3.2.5 > Learned tokens from 1 message(s) (1 message(s) examined) > > X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on > lapdog.ravenhome.net > X-Spam-Level: ** > X-Spam-Status: No, score=6.7 required=8.0 tests=EMPTY_MESSAGE,MISSING_DATE, > > MISSING_HEADERS,MISSING_MID,MISSING_SUBJECT,NO_HEADERS_MESSAGE,NO_RECEIVED, > NO_RELAYS,TVD_SPACE_RATIO autolearn=no version=3.2.5 > Learned tokens from 1 message(s) (1 message(s) examined) > > -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Re: another reason to keep ExcludeNodes
I'm with Bennett on this. Taking away ExcludeNodes is essentially taking power and choice from tor users. Always always always default towards providing more choice and power to users, not less. In any case, as indicated, reporting bad nodes is not exclusive of ExcludeNodes. ExcludeNodes is effective immediately. Reporting a bad node takes time for a response. Allow us to exclude the nodes we wish to exclude NOW, not after some period of time after reporting for something to be done. praedor On Tuesday 17 February 2009 14:05:09 Scott Bennett wrote: > On Tue, 17 Feb 2009 17:54:51 +0100 Mitar wrote: > >On Tue, Feb 17, 2009 at 10:59 AM, Scott Bennett wrote: > >> I just read Roger's message from July 2006 on playing down the use of > >> ExcludeNodes and maybe eventually eliminating it. I encountered a reason > >> to use it not long ago that doesn't seem to have been mentioned. I noticed > >> that certain image files that are frequently updated and that I look at > >> many > >> times a day were getting truncated at random points in the files. After a > >> little bit of investigation it turned out that one particular relay was > >> always in a circuit that truncated those files, so I added it to my > >> ExcludeNodes list. And voila' complete images from then on. > > > >Would not it be better if you would report this node so that its > >problem can be fixed? > > > Certainly, but that isn't possible when no valid contact information is > provided in the relay descriptor in the directory. It also doesn't allow an > immediate solution to the problem for the user. Notification and use of > ExcludeNodes are not mutually exclusive, after all. -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Re: Bittorrent
As a relay, it would be quite easy to never ever see full utilization. The main limiting factor would be entry nodes, or more likely, exit nodes. The number of exit nodes are MUCH lower than the number of relays so while your system may see little traffic, the exit nodes could easily be maxed out. On Tuesday 17 February 2009 04:00:57 Scott Bennett wrote: > On Tue, 17 Feb 2009 08:40:23 + sigi wrote: > >On Tue, Feb 17, 2009 at 09:21:30AM +0100, Marco Bonetti wrote: > >> On Mon, February 16, 2009 22:17, Ted Smith wrote: > >> > Yes, I believe the proper way to do so is to use Tor as the tracker > >> > proxy, but conduct actual data transfer "in the clear". Or at least, > >> > that's what I've seen on this list in the past. Would anyone like to > >> > correct me? > >> > >> it's also possible to run an "all-torified" bittorrent swarm (both peers > >> and tracker) and more, see the instructions on the azureus site: > >> http://azureus.sourceforge.net/doc/AnonBT/Tor/howto_0.5.htm > > > >You definitely shouldn't do that, since the tor-network is not capable > >of such a huge traffic-amount through P2P with bittorrent these days. > > > >By downloading with bittorrent via Tor, you take away the bandwidth > >from the people who really need it for browsing the web safely. > > > Really? I know that seems to be in accord with the received wisdom > on this list, but I, for one, no longer make that assumption. For one thing, > my node spends most of the time handling somewhere between 15% and 50% of its > proven data rate capacity. Occasionally it may sustain on the order of 70% > or 75% for up to a few minutes at a time. Also, the torstatus page now > frequently shows many more nodes that have peaked at over 5,000 KB/s (14 the -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch
Re: Win98Se and Tor (thread restart)
Wow. Was that on a 486 or a pentium? On Thursday 12 February 2009 14:21:27 pho...@rootme.org wrote: > I setup Win98SE today. I used the vidalia-bundle for 0.2.0.34. > Installed and ran. It works fine. > > http://interloper.org/tmp/tor/2009-02-12-win98se-tor-works-0.png > > and > > http://interloper.org/tmp/tor/2009-02-12-win98se-tor-works-1.png > > In fact, I can't make either Tor or Vidalia crash. If I set the total > system memory to 80MB, as suggested by the original poster, Win98SE > swaps to death, but eventually does run vidalia and tor. > > So, without further data, screenshots, code snippets, etc, I cannot > replicate the problem. > -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch
Re: Some Bones to Pick with Tor Admins
The recommend for NOT word wrapping (and allowing the end client handle it) came from one of the only groups that matter: a linux group. One's email client should handle formatting for display, or have the capability, or it is broken or poorly designed or written in dinosaur days. On Thursday 12 February 2009 06:36:09 Hannah Schroeter wrote: > Hi! > > On Wed, Feb 11, 2009 at 08:16:08PM -0500, Praedor Atrebates wrote: > >Bit of a problem there (with long text lines). If I want to be able to > > send http links to friends/ colleagues/family, I have to turn off the new > > line feature in my email client and allow end-user email clients deal > > with formatting (all too often, if you have auto-formatting/new lines > > setup, you will totally bork http links). > > Huh? If you wrap lines only at whitespace, http links are not wrapped, > even with automatic line wrapping. And if you hit return before the > line gets 72 characters long (and not only at about 100 characters!), > it's no problem either. > > >[...] > > Kind regards, > > Hannah. -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch
Re: Some Bones to Pick with Tor Admins
Bit of a problem there (with long text lines). If I want to be able to send http links to friends/ colleagues/family, I have to turn off the new line feature in my email client and allow end-user email clients deal with formatting (all too often, if you have auto-formatting/new lines setup, you will totally bork http links). What client are you using that is causing a problem? Mutt? On Wednesday 11 February 2009 19:48:41 Scott Bennett wrote: > On Wed, 11 Feb 2009 07:49:05 -0500 Praedor Atrebates > top-posted: > >Looks like I may have to create a procmail filter to pre-dump posts. > > > >Money may be tight now (for lots of peeps) but one should be able to acquire > >a much more modern windoze for virtually nothing. SE? SE?!!! Why not run > >win95? Or 3.5? > > > >If you are REALLY hurting for money: LINUX! Download and install a free > >version - pick a distro. ANY modern linux will do much more than SE can, > >you wont miss anything but viruses and trojans (though anyone foolish enough > >to still run SE doesn't give a f*ck about the trojans and other hacks part > >of the equation). If you have SE on something, it is sure as hell you aren't > >running anything demanding on it (by modern Homo sapiens standards). SE > >dates back to the Homo erectus period. > > Do you suppose you could avoid putting entire paragraphs onto single > lines of text? > LINUX is certainly an option, but don't forget the BSDs. FreeBSD 7, for > example, is very fast. For those with multi-CPU or multi-cored CPUs, FreeBSD > 7 > and 8-CURRENT have the *only* efficient kernels for heavy CPU loads. (See > http://www.freebsd.org.) PC-BSD 7 is a particular packaging of FreeBSD 7 that > is especially designed to be newbie-friendly. (See www.pcbsd.org.) > In any case, there is simply no excuse for running tor on unsafe > operating > systems that no longer get security updates. If the OP would identify his > tor relay by nickname or key fingerprint, I would be happy to add it to my > ExcludeNodes list for my own protection. Also, a machine like the one > described by the OP cannot contribute much data rate capacity to the tor > network anyway, so if he were to take it offline permanently, it would be no > great loss to the tor community and would have the benefit of removing an > unsafe relay from the network. > > > Scott Bennett, Comm. ASMELG, CFIAG > ** > * Internet: bennett at cs.niu.edu * > ** > * "A well regulated and disciplined militia, is at all times a good * > * objection to the introduction of that bane of all free governments * > * -- a standing army." * > *-- Gov. John Hancock, New York Journal, 28 January 1790 * > ** > > -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch
Re: Some Bones to Pick with Tor Admins
Looks like I may have to create a procmail filter to pre-dump posts. Money may be tight now (for lots of peeps) but one should be able to acquire a much more modern windoze for virtually nothing. SE? SE?!!! Why not run win95? Or 3.5? If you are REALLY hurting for money: LINUX! Download and install a free version - pick a distro. ANY modern linux will do much more than SE can, you wont miss anything but viruses and trojans (though anyone foolish enough to still run SE doesn't give a f*ck about the trojans and other hacks part of the equation). If you have SE on something, it is sure as hell you aren't running anything demanding on it (by modern Homo sapiens standards). SE dates back to the Homo erectus period. On Tuesday 10 February 2009 20:42:27 Ringo Kamens wrote: > Don't feed the trolls people. > > Michael G. Reed wrote: > > On Tue, 10 Feb 2009 mark485ander...@eml.cc wrote: > > |> no need also to upgrade from 98se, except tor developers are too lazy to > > |> code properly. > > > > You know, Tor is open sourceyou can go fix the damn bugs yourself > > if they are so important to you and your antiquated setup. If you > > weren't being such an ass-hat in the way you are DEMANDING support > > while insulting the developers and not even so much as filing a > > quasi-readable bug report, people might actually be willing to help > > you. I tend to bet that most folks on this list wrote you off with > > your very first email...and with good reason. Just my $0.02. > > > > -Michael > > > > > > -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch
Re: Time Warner bad / VPS recommendations
On Thursday 05 February 2009 16:03:52 Mitar wrote: > Hi! > > On Thu, Feb 5, 2009 at 9:52 PM, slush wrote: > > Although Im big Tor fan, I think it is better idea to run Tor in unused > > bandwith (like me) on plenty of computers rather than pay together few big > > centralized servers (like you offer). Firstly, using unused bandwidth is for > > free. And it is also more secure. > > I agree and this is also the way I am using "my" bandwidth. > > But on the other hand I am seeing many e-mails like "I would like to > contribute to Tor but my ISP/university/mom does not allow me/has > blocked me/does not want to hassle". So maybe those could cooperate in > a way of putting together such nodes. I've sometimes wondered about the whether it would be possible to alter tor a bit, or place another app between tor and the net (perl script or something) that would work with a tor exit. In cases where someone would like to run a tor exit node but gets into trouble with their ISP, might it be possible to add a script that might take at least the web traffic from a tor exit node in question and package it up and send it to anonymizer or kaxy or some other web anonymity proxy on the net? It would be equivalent to adding a 4th, external node to the 3 official tor nodes... This is a variation of a way I have considered for doing some extra anonymizing: use tor to connect to a web anonymizing proxy and browse from there. It would offload complaints about "inappropriate" acts by tor users away from the exit node and to the anonymizer service, which I am sure can take it because it is what they DO. praedor -- There is danger from all men. The only maxim of a free government ought to be to trust no man living with power to endanger the public liberty. - John Adams [1772]
Re: another BADEXIT found $8424E8653469B1EFF87E79E8599933A3BAF8FDB2
Another option would be for users to block any and all S. Korean nodes as exits. Exclude any S. Korean exit nodes and no matter what "apple" does, you wont get caught. On Monday 09 February 2009 16:42:56 Scott Bennett wrote: > On Mon, 9 Feb 2009 19:23:36 +0100 Ansgar Wiechers > wrote: > >On 2009-02-09 pho...@rootme.org wrote: > >> On Mon, Feb 09, 2009 at 09:07:15AM -0600, benn...@cs.niu.edu wrote 1.4K > >> bytes in 26 lines about: > >> : An unnamed exit with fingerprint > >> $8424E8653469B1EFF87E79E8599933A3BAF8FDB2 > >> : is redirecting HTTP port 80 to > >> > >> Ah, 'apple'. Again they try this exact same tactic. Silly people. > > > >Please elaborate, because I have no idea what you're referring to? Feel > >free to e-mail me in private should this be old news for the rest of the > >list. > > > Some time ago, a tor relay called "apple" appeared. "apple" was found > to be a crooked exit relay in that it was replacing the URLs of its exiting > traffic with URLs of the form > > https://kangnam.megapass.net:7003/index.html?sso=121.138.5.103&no=8403&origin=OriginalURL > > where "OriginalURL" was the URL requested by whatever tor client built the > circuit using "apple" as its exit relay. "apple" frequently restarted under > different IP addresses. Its perfidy was reported here, and eventually > [*ahem*] > the directory authority operators flagged it as a BADEXIT, so that tor clients > around the globe would avoid using "apple" as an exit. > "apple" disappeared after that for a time, but now it's back. It still > uses varying IP addresses, but has changed its private OR key, perhaps to > avoid > recognition as a bad exit. Unfortunately, there is no good way for the > software to recognize a corrupt tor operator, but it should be given a BADEXIT > flag for its *name*, as well as its new key, to force "apple"'s crooked > operator to change his/her relay's torrc file next time. It isn't much, but > anything is a help. -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Re: Time Warner bad / VPS recommendations
On Wednesday 04 February 2009 10:23:50 Matthew McCabe wrote: > Yup, I restricted my exit node policy in hopes that it would limit > torrent traffic and it seemed to work. However, the last "hacking" > complaint was the result of someone making excessive or inappropriate > postings on a newsgroup or website. So while the torrent/DMCA > complaints stopped, the "hacking" complaints continued. So...now simply leaving undesirable or unwelcome comments on a site that takes comments is "hacking"? Annoyance factor aside - what a load of crap. -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Re: Here we go again...tor just stops
On Thursday 22 January 2009 02:04:49 pho...@rootme.org wrote: > On Wed, Jan 21, 2009 at 04:22:53PM -0500, prae...@yahoo.com wrote 1.5K bytes in 48 lines about: > : As of this morning I had been running tor-0.2.0.32 through Tork 0.29.2 > : without hitch (Mandriva linux 2009.0). Any time I have tried to progress > : to anything beyond this version I run into the same problem every time: > : tor will either not run or, more likely, will run for some period of time > : and then simply stop without any error messages to explain the > : termination. > > Have you run tor with info loglevel yet? Have you run tor inside gdb? > Have you enabled ulimit -c unlimited for core dumps? My ulimit has long since been set at unlimited. As for logging, I had it set to debug but nothing came of it. I have since gone to 0.2.0.33 and am running it at this time. If it craps out like any and all attempts to run 0.2.1.x-alpha versions since 0.2.0.32 stable, I will try running it in gdb. -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Here we go again...tor just stops
This is getting annoying to point of wanting to simply drop tor. As of this morning I had been running tor-0.2.0.32 through Tork 0.29.2 without hitch (Mandriva linux 2009.0). Any time I have tried to progress to anything beyond this version I run into the same problem every time: tor will either not run or, more likely, will run for some period of time and then simply stop without any error messages to explain the termination. This morning, I decided to give tor-0.2.1.11-alpha a try. Built and installed just fine and started up just fine. It was running for at least several hours without hitch but then I had to leave for a meeting. I'm gone for 2 1/2 hours only to come back and find that tor has stopped without so much as a single message anywhere on the system. Nothing in the tork logs either. What the heck is going on? -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Re: redirect to meagpass.net while using Tor
On Tuesday 13 January 2009 14:58:19 Adlesshaven wrote: > I was redirected on several slashdot pages I was trying to view. > Wait...you anonymously browse slashdot? Why? Just curious. -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Re: redirect to meagpass.net while using Tor
Hmpf. I'll do a little tor-based browsing and keep an eye on my tork window and identify any exit that redirects me - unless someone beats me to the info. On Tuesday 13 January 2009 14:58:19 Adlesshaven wrote: > I was redirected on several slashdot pages I was trying to view. > > Praedor Atrebates wrote: > > Is this occurring while you are trying to go to torcheck > > (torcheck.xenobite.eu)? > > > > praedor > > > > On Tuesday 13 January 2009 14:10:36 Adlesshaven wrote: > >> KT wrote: > >>> On 1/13/09, Roger Dingledine wrote: > >>>> On Tue, Jan 13, 2009 at 05:06:37PM +, KT wrote: > >>>>> On 1/13/09, John Brooks wrote: > >>>>>> Figure out what exit is doing this (visit > >>>>>> http://torcheck.xenobite.eu/ while > >>>>>> it's happening) > >>>>> > >>>>> Thanks for reply. I tried exactly that but that request was > >>>>> redirected > > > > [...] > > > >> I just got this redirection too! Unfortunately I was running log notice > >> and no Vidalia so I couldn't see what exit I was using. I'll work on > >> setting it up so I can tell what exit I was using. -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Re: redirect to meagpass.net while using Tor
Is this occurring while you are trying to go to torcheck (torcheck.xenobite.eu)? praedor On Tuesday 13 January 2009 14:10:36 Adlesshaven wrote: > KT wrote: > > On 1/13/09, Roger Dingledine wrote: > >> On Tue, Jan 13, 2009 at 05:06:37PM +, KT wrote: > >>> On 1/13/09, John Brooks wrote: > Figure out what exit is doing this (visit http://torcheck.xenobite.eu/ > while > it's happening) > >>> > >>> Thanks for reply. I tried exactly that but that request was redirected [...] > I just got this redirection too! Unfortunately I was running log notice > and no Vidalia so I couldn't see what exit I was using. I'll work on > setting it up so I can tell what exit I was using. -- "An imbalance between rich and poor is the oldest and most fatal ailment of all republics." --Plutarch signature.asc Description: This is a digitally signed message part.
Re: Tor 0.2.1.9-alpha STILL BROKEN
On Monday 05 January 2009 13:31:06 Roger Dingledine wrote: > On Mon, Jan 05, 2009 at 01:24:44PM -0500, Praedor Atrebates wrote: > > I have not been able to continuously run tor since 0.2.0.31. EVERY > > version since fails to run continuously (0.2.1.7, 0.2.1.8, and now > > 0.2.1.9). It starts fine, it runs for a while, then simply stops running > > without any error messages, nothing. It just stops. > > You might find > https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#ReportBug > to be useful for tracking down the issue. Thanks for the info/link. No core but possible reference to a segfault from dmesg. Waiting now for the current instance to crash out. praedor -- "Moral indignation is jealousy with a halo." --H.G. Wells signature.asc Description: This is a digitally signed message part.
Tor 0.2.1.9-alpha STILL BROKEN
I have not been able to continuously run tor since 0.2.0.31. EVERY version since fails to run continuously (0.2.1.7, 0.2.1.8, and now 0.2.1.9). It starts fine, it runs for a while, then simply stops running without any error messages, nothing. It just stops. What the hell has been changed in tor to so totally wreck it? Perhaps core parts of it should be left as they were in 0.2.0.31 since that works flawlessly. I cannot detail the problem since there are no log entries to show why it is failing. I am running Mandriva linux 2009.0, kernel 2.6.27. Tor builds without hitch and installs without issue. It simply will not run continuously and will not produce any log messages as to why. praedor -- "Moral indignation is jealousy with a halo." --H.G. Wells signature.asc Description: This is a digitally signed message part.
Re: another tor issue...? (irc...)
I rather suspect that you are not going to be able to resolve the issue so long as you run an exit. It doesn't matter what sort of traffic you block, all that matters is that your ip will appear in the list of published exit nodes shortly after you start it up and that list will lead to you being blocked by other sites. You will either need to operate an exit node from a separate IP than the computer (physically or via a separate proxy) you wish to connect to freenode with (or use their hidden service) and Slashdot or you will need to forego running an exit, no matter how configured (I suppose if you personally knew someone at Slashdot or one of the admins of freenode you might finangle a personal exception...). Most of these sites have this policy because of actual past abuses rather than a general philosophical dislike of anonymity or tor. On Monday 05 January 2009 12:03:55 Udo van den Heuvel wrote: > Praedor Atrebates wrote: > > To regain normal access, you have to ensure you are not running a tor > > exit AND you need to contact the freenode operators and request you be > > unblocked, explaining that you are not running (or are no longer running) > > a tor exit node. > > I did so, thanks. (worked OK) > So how can I open exit ports without fearing (too much) abuse or bad > response from otherwise OK services? > (even slashdot has tor issues!) -- "Moral indignation is jealousy with a halo." --H.G. Wells signature.asc Description: This is a digitally signed message part.
Re: another tor issue...? (irc...)
I have periodically been blocked from freenode (and then run into problems when trying to use the freenode onion service). This has usually happened when/if I run tor, even briefly, as an exit node. Freenode (and others) checks the exit node list and if it sees your IP there, you are blocked from normal access. To regain normal access, you have to ensure you are not running a tor exit AND you need to contact the freenode operators and request you be unblocked, explaining that you are not running (or are no longer running) a tor exit node. praedor On Wednesday 31 December 2008 07:47:39 Udo van den Heuvel wrote: > Ted Smith wrote: > > Freenode also has no way of knowing if you're connecting from your > > machine, or from your exit node. All the traffic from your exit node is > > "in the clear". > > They can know that it is me when I authenticate my account. > I can't even get to that point. > When I disable my exitpolicy it makes no difference. > > So that's a very nice feature indeed. Not. > > What's the most effective way to regain Freenode irc access? > > Kind regards, > Udo -- "Moral indignation is jealousy with a halo." --H.G. Wells signature.asc Description: This is a digitally signed message part.
Re: Metasploit Decloak Project v2
It works against me running linux, tor, and using firefox IF I elect to open the document directly via Openoffice. praedor On Sunday 14 December 2008 21:08:45 Freemor wrote: > On Sun, 14 Dec 2008 18:57:18 -0600 > > "Roc Admin" wrote: > > I just noticed that HDMoore re-released his decloak engine. > > > > http://metasploit.com/data/decloak > > > > He's improved some of the attacks from before like java, flash, and > > DNS in pretty interesting ways. There's also a test for Microsoft > > Office documents which I thought was interesting. From the page: > > > > When Microsoft Office is installed and configured to automatically > > open > > > > > documents, a file can be returned which automatically downloads an > > > image from the internet. This can bypass proxy settings and expose > > > the real DNS servers of the user. > > > > It doesn't seem like there are any new attack vectors but I wanted to > > pass it along to see if anyone had comments. > > > > -ROC Tor Admin > > Well I must be doing something right... > the only IP it showed for me was: > > External Address 204.13.236.244 > > all the rest showed as "unknown". and the above is definitely not my IP > > Still good to have something to test my config against tho. -- "Moral indignation is jealousy with a halo." --H.G. Wells signature.asc Description: This is a digitally signed message part.
Re: Need help with MPAA threats
In another vein, being an exit for even a brief period of time puts your IP on a website identifying you as such and you will find yourself banned from some (many?) irc servers and/or banned from posting at certain blogs. Irritating but there you go. On Saturday 13 December 2008 15:46:14 Jon wrote: > krishna e bera wrote: > > It is unlikely that the content in question was ever on your computer > >at all, because Tor does not transfer UDP packets (used by bittorrent for data) [...] > > After looking at several dozen automated DMCA letters, > > i noticed that all but a few point to tracker websites for ThePirateBay. > > I decided to add the ip addresses for those tracker websites to my reject list > > > and have not received a DMCA notice for a few weeks now. > > Although this technically rejects some web (http) traffic, > > it seems to me just an extension of the exit policy rejecting > > bittorrent ports > > > because those tracker ip addresses are primarily used for setting up > > p2p transfers. > > > I'm paying $100 a month in bandwidth fees to facilitate anonymous > > communication > > > for activists etc - not to subsidize consumption of games and movies. > > Yes i know p2p can carry all sorts of content; > > if there is lots of "legitimate" stuff available via ThePirateBay my > > attitude could change. > > > Feedback on this is welcome. > > Your attitude I think is correct. I mean to say, yes, your intent for > your relay is for censorship frustration, not games, movies, et > cetera. I think your implementation is correct also. I run a relay > without any exit permitted. The only reason I do this, is because I > do not want to deal with any complaints ranging from DMCA, hacking, > child exploitation transiting my link. If I ever decide to permit > exiting, it will be on a dedicated server that I would pay for, > located elsewhere. I just wish there were a better way to inspect the > traffic and disallow certain traffic. Don't get me wrong, I'm not > advocating that any relay inspect any traffic, just that illegal > traffic transiting outside my link could land me in trouble. Perhaps > thoughtworthy. -- "Moral indignation is jealousy with a halo." --H.G. Wells
Re: Need help with MPAA threats
Could I not simply remap unwanted services (by you) to different ports and skip through? I mean, I can run an ssh tunnel through any port, and probably set up at least some of the file sharing apps to work on different ports than the default...or am I missing something? praedor On Saturday 13 December 2008 15:30:18 David Kammering wrote: > Matthew McCabe schrieb: > > Here is where I need your help. First, is there a good way to filter > > out torrents in my exit policy? > > I tried out some different exit policies after getting a big load of > DMCA notices. My provider didn't really mind forwarding them to me but > it got me started playing with the exit policies as I don't see any > reason for me donating (expensive) bandwith for filesharing over Tor. I > am currently running the exit policy pasted below on my exit node: > > ExitPolicy accept *:20-23 # FTP,SSH,TELNET > ExitPolicy accept *:53 # DNS > ExitPolicy accept *:80-82 # HTTP > ExitPolicy accept *:110-119 # POP3/NNTP > ExitPolicy accept *:143 # IMAP > ExitPolicy accept *:443 # HTTPS > ExitPolicy accept *:465 # MAIL > ExitPolicy accept *:587 # MAIL > ExitPolicy accept *:993 # IMAPS > ExitPolicy accept *:1194# OPENVPN > ExitPolicy accept *:1720# H.323 > ExitPolicy accept *:1731# Netmeeting Audio Control > ExitPolicy accept *:5050-5061 # YAHOO MESSENGER, SIP > ExitPolicy accept *:5190# ICQ > ExitPolicy accept *:5222-5223 # JABBER > ExitPolicy accept *:3128# Proxy > ExitPolicy accept *:8080# Proxy > ExitPolicy reject *:* # Disallow everything else > > I think most needed protocols are included but I got my copyright > infringements down to zero. > > Maybe redefining your policy would anticipate further problems with your > provider but still keep your exit node quite useful to most of the users. > > YT, > David -- "Moral indignation is jealousy with a halo." --H.G. Wells
Slight correction Konversation, NOT Kopete: Troubles getting on IRC now
I had been connecting to the irc.freenode.org server but recently, while running tor I am no longer allowed to connect even though I am not trying to connect anonymously with tor. I know there are a couple hidden service versions for freenode but neither of them work for me either. I enter their *.onion address and my client (Konversation, KDE 4.1.3, Mandriva linux) SEES them but it never actually succeeds in connecting. I get: [...] What is it about running tor, even as a relay, that prevents me from connecting at all to freenode? I can connect to undernet but it doesn't have the chat rooms I seek/need. praedor signature.asc Description: This is a digitally signed message part.
Troubles getting on IRC now
I had been connecting to the irc.freenode.org server but recently, while running tor I am no longer allowed to connect even though I am not trying to connect anonymously with tor. I know there are a couple hidden service versions for freenode but neither of them work for me either. I enter their *.onion address and my client (Kopete) SEES them but it never actually succeeds in connecting. I get: [08:57] [Info] Looking for server mejokbp2brhw4omd.onion:6667... [08:57] [Info] Server found, connecting... [09:00] [Error] Connection to Server mejokbp2brhw4omd.onion lost: operation is not supported. [09:00] [Info] Trying to reconnect to mejokbp2brhw4omd.onion in 20 seconds. [09:01] [Info] Looking for server mejokbp2brhw4omd.onion:6667... [09:01] [Info] Server found, connecting... over and over and over. The other freenode hidden service is authenticated by pgp key but I cannot connect to that because I would first have to connect to the regular server, or the non-authenticated hidden service above to generate a hash, etc. What is it about running tor, even as a relay, that prevents me from connecting at all to freenode? I can connect to undernet but it doesn't have the chat rooms I seek/need. praedor signature.asc Description: This is a digitally signed message part.
Re: Tork - all tor versions lead to 0.2.1.7-alpha?
OK, and thanks...I posted here because I was wondering if the two tors had merged (development and stable) for the moment or if there was something I was unaware of in tor world (perhaps a fork or a weird new naming convention). praedor On Monday 08 December 2008 14:01:51 Robert Hogan wrote: > On Monday 08 December 2008 15:19:39 Praedor Atrebates wrote: > > I am wondering if anyone knows why Tork (0.29.2) seeks to download > > tor-0.2.1.7-alpha regardless of whether one asks it to check for the > > latest "stable" tor instead of the latest "experimental" tor. I see > > that the latest STABLE tor release appears to be 0.2.0.32, not > > 0.2.1.7-alpha. > > > > What gives? > > > > praedor > > a bug in the code. thanks for pointing it out. for future reference you can > contact me directly with tork bugs/issues or use [EMAIL PROTECTED] > I know that you've done both before, so just a reminder.
Tork - all tor versions lead to 0.2.1.7-alpha?
I am wondering if anyone knows why Tork (0.29.2) seeks to download tor-0.2.1.7-alpha regardless of whether one asks it to check for the latest "stable" tor instead of the latest "experimental" tor. I see that the latest STABLE tor release appears to be 0.2.0.32, not 0.2.1.7-alpha. What gives? praedor
Re: More info on my own tor problems - Fixed? NOT
Tor 0.2.1.7 just died on me with a message about a dns failure and now I cannot restart it. No error messages (in Tork). Firing up vidalia...I get this AGAIN: Dec 05 12:27:41.833 [Notice] Tor v0.2.1.7-alpha (r17216). This is experimental software. Do not rely on it for strong anonymity. (Running on Linux i686) Dec 05 12:27:41.847 [Warning] Linelist option '__HashedControlSessionPassword' has no value. Skipping. Dec 05 12:27:41.849 [Warning] Skipping obsolete configuration option 'Group' Dec 05 12:27:41.850 [Warning] ControlPort is open, but no authentication method has been configured. This means that any program on your computer can reconfigure your Tor. That's bad! You should upgrade your Tor controller as soon as possible. Dec 05 12:27:41.851 [Notice] Initialized libevent version 1.4.7-stable using method epoll. Good. Dec 05 12:27:41.852 [Notice] Opening OR listener on 0.0.0.0:9001 Dec 05 12:27:41.854 [Notice] Opening Directory listener on 0.0.0.0:9030 Dec 05 12:27:41.855 [Notice] Opening Socks listener on 127.0.0.1:9050 Dec 05 12:27:41.856 [Notice] Opening Control listener on 127.0.0.1:9051 Dec 05 12:27:41.857 [Warning] Error setting configured groups: Operation not permitted Dec 05 12:27:41.859 [Warning] Failed to parse/validate config: Problem with User value. See logs for details. Dec 05 12:27:41.860 [Error] Reading config failed--see warnings above. Back to 0.2.0.31 or so. Tor-0.2.1.7-alpha IS broken. praedor On Friday 05 December 2008 08:42:30 Praedor Atrebates wrote: > For the second day now I have been successful (finally) at operating > tor-0.2.1.7-alpha via Tork (0.29.2). > > The "fix" for me was to manually edit the torrc.sample and save it as torrc > in /etc/tor and then search out any and all other torrc files on my system > and link them all to the base torrc I placed in /etc/tor. After doing > this, I was still unable to start tor so I deleted my ~/.tor directory and > tried again by starting it from the CLI. This did get tor started and it > ran for a while until I killed it. I was then able to start tor from Tork > and it remained stable. This morning I started it again from Tork and it > is (so far) still operating. > > Up to this point, neither Tork nor Vidalia was able to configure or run > tor. > > praedor > > On Thursday 04 December 2008 08:25:26 Praedor Atrebates wrote: > > Forgot to add: I saw the "unable to open /etc/tor/torrc" message and > > fixed that and tried again. I get essentially the same messages except > > lacking the above statement: > > > > Dec 04 08:13:34.430 [Notice] Tor v0.2.1.7-alpha (r17216). This is > > experimental software. Do not rely on it for strong anonymity. (Running > > on Linux i686) Dec 04 08:13:34.431 [Warning] Linelist option > > '__HashedControlSessionPassword' has no value. Skipping. > > Dec 04 08:13:34.432 [Warning] Skipping obsolete configuration option > > 'Group' Dec 04 08:13:34.432 [Warning] ControlPort is open, but no > > authentication method has been configured. This means that any program > > on your computer can reconfigure your Tor. That's bad! You should > > upgrade your Tor controller as soon as possible. > > Dec 04 08:13:34.433 [Notice] Initialized libevent version 1.4.7-stable > > using method epoll. Good. > > Dec 04 08:13:34.433 [Notice] Opening OR listener on 0.0.0.0:9001 > > Dec 04 08:13:34.434 [Notice] Opening Socks listener on 127.0.0.1:9050 > > Dec 04 08:13:34.434 [Notice] Opening Control listener on 127.0.0.1:9051 > > Dec 04 08:13:34.434 [Warning] Error setting configured groups: Operation > > not permitted > > Dec 04 08:13:34.435 [Warning] Failed to parse/validate config: Problem > > with User value. See logs for details. > > Dec 04 08:13:34.435 [Error] Reading config failed--see warnings above. > > > > On Thursday 04 December 2008 08:17:18 Praedor Atrebates wrote: > > > I have had a long-running problem upgrading to tor-0.2.1.7-alpha. I > > > usually use Tork as my tor manager (version 0.29.2 rpm - I can't build > > > the latest because I am using kde 4 and it wont build on such a system) > > > and run the configuation wizard after every tor upgrade. This has > > > worked perfectly up until 0.2.1.7-alpha. > > > > > > The problem is that no matter what I do, be it configure tor via Tork > > > or do it manually with a text editor, I cannot get tor to run. It > > > crashes very quickly and, from Tork, produces no useful log > > > information. It just stops. > > > > > > I have now tried with vidalia and I am still unable to run tor but I am > > > getting useful log data: > > > &g
Re: More info on my own tor problems - Fixed?
For the second day now I have been successful (finally) at operating tor-0.2.1.7-alpha via Tork (0.29.2). The "fix" for me was to manually edit the torrc.sample and save it as torrc in /etc/tor and then search out any and all other torrc files on my system and link them all to the base torrc I placed in /etc/tor. After doing this, I was still unable to start tor so I deleted my ~/.tor directory and tried again by starting it from the CLI. This did get tor started and it ran for a while until I killed it. I was then able to start tor from Tork and it remained stable. This morning I started it again from Tork and it is (so far) still operating. Up to this point, neither Tork nor Vidalia was able to configure or run tor. praedor On Thursday 04 December 2008 08:25:26 Praedor Atrebates wrote: > Forgot to add: I saw the "unable to open /etc/tor/torrc" message and fixed > that and tried again. I get essentially the same messages except lacking > the above statement: > > Dec 04 08:13:34.430 [Notice] Tor v0.2.1.7-alpha (r17216). This is > experimental software. Do not rely on it for strong anonymity. (Running on > Linux i686) Dec 04 08:13:34.431 [Warning] Linelist option > '__HashedControlSessionPassword' has no value. Skipping. > Dec 04 08:13:34.432 [Warning] Skipping obsolete configuration option > 'Group' Dec 04 08:13:34.432 [Warning] ControlPort is open, but no > authentication method has been configured. This means that any program on > your computer can reconfigure your Tor. That's bad! You should upgrade > your Tor controller as soon as possible. > Dec 04 08:13:34.433 [Notice] Initialized libevent version 1.4.7-stable > using method epoll. Good. > Dec 04 08:13:34.433 [Notice] Opening OR listener on 0.0.0.0:9001 > Dec 04 08:13:34.434 [Notice] Opening Socks listener on 127.0.0.1:9050 > Dec 04 08:13:34.434 [Notice] Opening Control listener on 127.0.0.1:9051 > Dec 04 08:13:34.434 [Warning] Error setting configured groups: Operation > not permitted > Dec 04 08:13:34.435 [Warning] Failed to parse/validate config: Problem with > User value. See logs for details. > Dec 04 08:13:34.435 [Error] Reading config failed--see warnings above. > > On Thursday 04 December 2008 08:17:18 Praedor Atrebates wrote: > > I have had a long-running problem upgrading to tor-0.2.1.7-alpha. I > > usually use Tork as my tor manager (version 0.29.2 rpm - I can't build > > the latest because I am using kde 4 and it wont build on such a system) > > and run the configuation wizard after every tor upgrade. This has worked > > perfectly up until 0.2.1.7-alpha. > > > > The problem is that no matter what I do, be it configure tor via Tork or > > do it manually with a text editor, I cannot get tor to run. It crashes > > very quickly and, from Tork, produces no useful log information. It just > > stops. > > > > I have now tried with vidalia and I am still unable to run tor but I am > > getting useful log data: > > > > Dec 04 08:05:41.407 [Notice] Tor v0.2.1.7-alpha (r17216). This is > > experimental software. Do not rely on it for strong anonymity. (Running > > on Linux i686) Dec 04 08:05:41.409 [Warning] Unable to open configuration > > file "/etc/tor/torrc". > > Dec 04 08:05:41.410 [Error] Reading config failed--see warnings above. > > Dec 04 08:06:24.666 [Notice] Tor v0.2.1.7-alpha (r17216). This is > > experimental software. Do not rely on it for strong anonymity. (Running > > on Linux i686) Dec 04 08:06:24.669 [Warning] Skipping obsolete > > configuration option 'Group' Dec 04 08:06:24.673 [Notice] Initialized > > libevent version 1.4.7-stable using method epoll. Good. > > Dec 04 08:06:24.675 [Notice] Opening OR listener on 0.0.0.0:9001 > > Dec 04 08:06:24.679 [Notice] Opening Socks listener on 127.0.0.1:9050 > > Dec 04 08:06:24.682 [Notice] Opening Control listener on 127.0.0.1:9051 > > Dec 04 08:06:24.686 [Warning] Error setting configured groups: Operation > > not permitted > > Dec 04 08:06:24.689 [Warning] Failed to parse/validate config: Problem > > with User value. See logs for details. > > Dec 04 08:06:24.693 [Error] Reading config failed--see warnings above. > > > > > > I have no idea what the problem is with the torrc file. I merely took > > the sample provided with the software and uncommented the applicable > > parts (after Tork failed to configure it) and copy it to torrc. What is > > the deal with tor-0.2.1.7? What has changed vis a vis configuration that > > appears to break it compared to the any and all of the previous versions? > > Most important of all, how do I get past this so I can start running tor > > again? > > > > praedor
Re: Commercial tor offering?
That point was just an extra. The major problem would be, as others chimed in about too, that you (person charging) would be royally screwed when the Feds decide to go on a witch hunt. You (the potential person charging for service) and all your paying customers would be, as stated previously, on the short list for investigation. You would definitely go on a watch list. praedor On Thursday 04 December 2008 13:00:44 OgnenD wrote: > On Thursday 04 December 2008 12:21:04 Praedor Atrebates wrote: > > The point of tor isn't to lock people out by charging for service, it is > > to act as a totally open access system for ALL people regardless of > > economic status. Charging locks out a lot of people, especially in > > foreign countries with naughty governments and shitty economic > > situations. > > Thanks. You could still use the free infrastructure if you chose to do so. > This would be an extra offering for people who want both anonymity and > speed for a fee. > Thanks for replying, it is not my intention to defend such an idea, just to > see if it has been entertained before and if so, what was the conclusion. > > Ognen
Re: More info on my own tor problems
I can look but don't think that could be the issue. I don't start tor as a service when I boot, I manually start it (via Tork or Vidalia). If I don't start tor up via script in the rc directories, how could such a script have any effect on tor started on command? praedor On Thursday 04 December 2008 12:27:50 Scott Bennett wrote: > > > >I have no idea what the problem is with the torrc file. I merely took the > >sample provided with the software and uncommented the applicable parts > > (after Tork failed to configure it) and copy it to torrc. What is the > > deal with tor-0.2.1.7? What has changed vis a vis configuration that > > appears to break it compared to the any and all of the previous versions? > > Most important of all, how do I get past this so I can start running tor > > again? > > The problem may not actually be in the torrc file. Check to see > whether you have a startup/shutdown script, perhaps run by /etc/rc on your > system, that specifies --user and --group. If you do, try removing those > arguments from the command line that starts tor in the script. > The error messages could be more accurate.
Re: Commercial tor offering?
On Thursday 04 December 2008 11:54:51 OgnenD wrote: > Hello, > > I am sure someone had digested this before but what would be some issues > with purchasing (say) twenty different boxes around the USA with good pipes > and allowing people to use them as tor relays/exit nodes (while charging a > monthly fee for it)? The way I see it, greatest obstacle to using tor every > day is speed, but I might be wrong. A couple things: such KNOWN and set boxes would be subject to taps (probably wouldn't matter much if they are relays but it becomes a potential problem if they are exits). Second, I believe (correct if wrong) that if you, a private citizen, are donating your system for use as a relay/tor server you have no real or even potential legal "obligation" to keep logs for presentation to authorities when they ask for them (with a bogus non-warrant FBI "National Security Letter" for instance). If you are now a fee-for-use entity (basically commercial) you are potentially subject to such nonsense. The point of tor isn't to lock people out by charging for service, it is to act as a totally open access system for ALL people regardless of economic status. Charging locks out a lot of people, especially in foreign countries with naughty governments and shitty economic situations.
Re: More info on my own tor problems
Forgot to add: I saw the "unable to open /etc/tor/torrc" message and fixed that and tried again. I get essentially the same messages except lacking the above statement: Dec 04 08:13:34.430 [Notice] Tor v0.2.1.7-alpha (r17216). This is experimental software. Do not rely on it for strong anonymity. (Running on Linux i686) Dec 04 08:13:34.431 [Warning] Linelist option '__HashedControlSessionPassword' has no value. Skipping. Dec 04 08:13:34.432 [Warning] Skipping obsolete configuration option 'Group' Dec 04 08:13:34.432 [Warning] ControlPort is open, but no authentication method has been configured. This means that any program on your computer can reconfigure your Tor. That's bad! You should upgrade your Tor controller as soon as possible. Dec 04 08:13:34.433 [Notice] Initialized libevent version 1.4.7-stable using method epoll. Good. Dec 04 08:13:34.433 [Notice] Opening OR listener on 0.0.0.0:9001 Dec 04 08:13:34.434 [Notice] Opening Socks listener on 127.0.0.1:9050 Dec 04 08:13:34.434 [Notice] Opening Control listener on 127.0.0.1:9051 Dec 04 08:13:34.434 [Warning] Error setting configured groups: Operation not permitted Dec 04 08:13:34.435 [Warning] Failed to parse/validate config: Problem with User value. See logs for details. Dec 04 08:13:34.435 [Error] Reading config failed--see warnings above. On Thursday 04 December 2008 08:17:18 Praedor Atrebates wrote: > I have had a long-running problem upgrading to tor-0.2.1.7-alpha. I > usually use Tork as my tor manager (version 0.29.2 rpm - I can't build the > latest because I am using kde 4 and it wont build on such a system) and run > the configuation wizard after every tor upgrade. This has worked perfectly > up until 0.2.1.7-alpha. > > The problem is that no matter what I do, be it configure tor via Tork or do > it manually with a text editor, I cannot get tor to run. It crashes very > quickly and, from Tork, produces no useful log information. It just stops. > > I have now tried with vidalia and I am still unable to run tor but I am > getting useful log data: > > Dec 04 08:05:41.407 [Notice] Tor v0.2.1.7-alpha (r17216). This is > experimental software. Do not rely on it for strong anonymity. (Running on > Linux i686) Dec 04 08:05:41.409 [Warning] Unable to open configuration file > "/etc/tor/torrc". > Dec 04 08:05:41.410 [Error] Reading config failed--see warnings above. > Dec 04 08:06:24.666 [Notice] Tor v0.2.1.7-alpha (r17216). This is > experimental software. Do not rely on it for strong anonymity. (Running on > Linux i686) Dec 04 08:06:24.669 [Warning] Skipping obsolete configuration > option 'Group' Dec 04 08:06:24.673 [Notice] Initialized libevent version > 1.4.7-stable using method epoll. Good. > Dec 04 08:06:24.675 [Notice] Opening OR listener on 0.0.0.0:9001 > Dec 04 08:06:24.679 [Notice] Opening Socks listener on 127.0.0.1:9050 > Dec 04 08:06:24.682 [Notice] Opening Control listener on 127.0.0.1:9051 > Dec 04 08:06:24.686 [Warning] Error setting configured groups: Operation > not permitted > Dec 04 08:06:24.689 [Warning] Failed to parse/validate config: Problem with > User value. See logs for details. > Dec 04 08:06:24.693 [Error] Reading config failed--see warnings above. > > > I have no idea what the problem is with the torrc file. I merely took the > sample provided with the software and uncommented the applicable parts > (after Tork failed to configure it) and copy it to torrc. What is the deal > with tor-0.2.1.7? What has changed vis a vis configuration that appears to > break it compared to the any and all of the previous versions? Most > important of all, how do I get past this so I can start running tor again? > > praedor
More info on my own tor problems
I have had a long-running problem upgrading to tor-0.2.1.7-alpha. I usually use Tork as my tor manager (version 0.29.2 rpm - I can't build the latest because I am using kde 4 and it wont build on such a system) and run the configuation wizard after every tor upgrade. This has worked perfectly up until 0.2.1.7-alpha. The problem is that no matter what I do, be it configure tor via Tork or do it manually with a text editor, I cannot get tor to run. It crashes very quickly and, from Tork, produces no useful log information. It just stops. I have now tried with vidalia and I am still unable to run tor but I am getting useful log data: Dec 04 08:05:41.407 [Notice] Tor v0.2.1.7-alpha (r17216). This is experimental software. Do not rely on it for strong anonymity. (Running on Linux i686) Dec 04 08:05:41.409 [Warning] Unable to open configuration file "/etc/tor/torrc". Dec 04 08:05:41.410 [Error] Reading config failed--see warnings above. Dec 04 08:06:24.666 [Notice] Tor v0.2.1.7-alpha (r17216). This is experimental software. Do not rely on it for strong anonymity. (Running on Linux i686) Dec 04 08:06:24.669 [Warning] Skipping obsolete configuration option 'Group' Dec 04 08:06:24.673 [Notice] Initialized libevent version 1.4.7-stable using method epoll. Good. Dec 04 08:06:24.675 [Notice] Opening OR listener on 0.0.0.0:9001 Dec 04 08:06:24.679 [Notice] Opening Socks listener on 127.0.0.1:9050 Dec 04 08:06:24.682 [Notice] Opening Control listener on 127.0.0.1:9051 Dec 04 08:06:24.686 [Warning] Error setting configured groups: Operation not permitted Dec 04 08:06:24.689 [Warning] Failed to parse/validate config: Problem with User value. See logs for details. Dec 04 08:06:24.693 [Error] Reading config failed--see warnings above. I have no idea what the problem is with the torrc file. I merely took the sample provided with the software and uncommented the applicable parts (after Tork failed to configure it) and copy it to torrc. What is the deal with tor-0.2.1.7? What has changed vis a vis configuration that appears to break it compared to the any and all of the previous versions? Most important of all, how do I get past this so I can start running tor again? praedor
Tried one last time, giving up on 0.2.1.7-alpha
I went ahead and tried to use tor-0.2.1.7 again and again it has failed without any debug information or error messages or anything else to explain why it refuses to run. If I totally delete my ~/.tor directory and start tor from the CLI, it will start and run for a little while (say less than a minute) and then just quit. If I then try to start it again, it is an IMMEDIATE fail without any messages to explain why. Using Tork, I use the First Run Wizard to try to get tor and tork setup and then hit the "start tor" button. It starts out as if it is going to work, usually doing the "bootstrapping" thing until about 90%, then POOF, no more tor and any attempt to start it again immediately fails. Can someone please supply me with a torrc file that actually works with 0.2.1.7-alpha (with your own personal settings altered) so I can try that? The torrc.sample that comes with the 0.2.1.7 install doesn't work when I try to manually edit it instead of using Tork. praedor
Re: [Fwd: (Probably) a known problem?] - cant run a relay node
I erred. I am no longer using 0.2.1.7. I had to give up because I could not get it working properly. Doing what I mention below allowed me to run tor via Vidalia but not via Tork (my preferred tor manager). There was an issue with the config file that I could never figure out so I went back to a previous version of tor that worked (currently that is 0.2.0.31. Don't think I will mess with 0.2.1.7 again. Since you use Vidalia, you might manage to get it working more than temporarily. praedor On Wednesday 03 December 2008 12:26:51 Praedor Atrebates wrote: > I had horrible troubles getting the latest tor 0.2.1.7 working after > upgrading. I use Tork, not Vidalia, but I suspect the problem is likely > the same. > > I deleted my existing tor directory (in linux, that is in /home/ directory>/.tor - I have no idea if there is an equivalent windows setup to > this - the directory that contains your tor configuration file) and started > tor up again and it worked fine. I then had to manually edit the config > file to add my server name, contact info, etc. Since then, it has worked. > > praedor > > On Wednesday 03 December 2008 12:15:50 Alessandro Donnini wrote: > > Thanks for the response. I understand. Below, you will find the copy of > > the Vidalia generated torrc. > > > > The problem is occurring on a system running MS Windows XP SP2. > > > > Note that prior to the upgrade from 0.2.0.31 to 0.2.1.7 I had no > > problems. The problems started occurring as soon as I started Tor again > > via Vidalia after the upgrade. Also note that I do not have any problems > > running the Tor client. > > > > Thanks > > > > > > torrc from Document and Settings\\Application Data\Vidalia > > == > > # This file was generated by Tor; if you edit it, comments will not be > > preserved # The old torrc file was renamed to torrc.orig.1 or similar, > > and Tor will ignore it > > > > # If set, Tor will accept connections from the same machine (localhost > > only) # on this port, and allow those connections to control the Tor > > process using # the Tor Control Protocol (described in control-spec.txt). > > ControlPort 9051 > > # Where to send logging messages. Format is minSeverity[-maxSeverity] > > # (stderr|stdout|syslog|file FILENAME). > > Log notice stdout > > > > [EMAIL PROTECTED] wrote: > > > On Wed, Dec 03, 2008 at 09:34:40AM -0500, [EMAIL PROTECTED] wrote > > > 2.1K > > bytes in 74 lines about: > > > : I would like to continue to run a Tor relay node but am unable to do > > > : so until I resolve the problem described below, and I need help in > > > : order to do that. > > > : > > > : > I just upgraded to versions > > > : > > > > : > 0.1.10 of Vidalia > > > : > and > > > : > 0.2.1.7 of Tor > > > : > > > > : > Vidalia is able to run Tor as a client without any problems. > > > : > > > > : > Nov 30 22:02:52.906 [Error] set_options(): Bug: Acting on config > > > : > options left us in a broken state. Dying. > > > : > Nov 30 22:02:52.906 [Warning] eventdns: Didn't find any > > > : > nameservers. Nov 30 22:02:52.906 [Warning] Could not config > > > : > nameservers. Nov 30 22:02:52.906 [Error] set_options(): Bug: Acting > > > : > on config options left us in a broken state. Dying. > > > > > > A few things, you probably haven't received a response because no one > > > has a good idea how to fix it. You may have 2 issues, one is that > > > libevent can't find nameservers, and the other is that the config > > > options are broken. > > > > > > As for the dns issues: > > > > > > https://bugs.torproject.org/flyspray/index.php?do=details&id=813 > > > > > > or > > > > > > https://bugs.torproject.org/flyspray/index.php?do=details&id=868 > > > > > > Are you running Windows? > > > > > > For the config issues, which may be related to the dns issues, do you > > > have a copy of the torrc that's generated by Vidalia? > > > > gpgkeys: key DE3BBB9A8C295FD5 not found on keyserver
Re: Exceeding connection limit
On Wednesday 03 December 2008 15:47:17 Praedor Atrebates wrote: > I don't understand this message. My tor log (in tork) is full of > repetitive messages: > > 2008-12-03 15:42:38 WARN (1 of 1) Failing because we have 1004 > connections > already. Please raise your ulimit -n. > > Over and over (with variable numbers of connections around 1000. Forgot: using tor-0.2.1.7 as a relay server. praedor
Exceeding connection limit
I don't understand this message. My tor log (in tork) is full of repetitive messages: 2008-12-03 15:42:38 WARN(1 of 1) Failing because we have 1004 connections already. Please raise your ulimit -n. Over and over (with variable numbers of connections around 1000. What is this talking about? If it is a limit, how is it being exceeded? How do I make this go away? Is this signs of another tor network attack? praedor
Re: [Fwd: (Probably) a known problem?] - cant run a relay node
I had horrible troubles getting the latest tor 0.2.1.7 working after upgrading. I use Tork, not Vidalia, but I suspect the problem is likely the same. I deleted my existing tor directory (in linux, that is in /home//.tor - I have no idea if there is an equivalent windows setup to this - the directory that contains your tor configuration file) and started tor up again and it worked fine. I then had to manually edit the config file to add my server name, contact info, etc. Since then, it has worked. praedor On Wednesday 03 December 2008 12:15:50 Alessandro Donnini wrote: > Thanks for the response. I understand. Below, you will find the copy of the > Vidalia generated torrc. > > The problem is occurring on a system running MS Windows XP SP2. > > Note that prior to the upgrade from 0.2.0.31 to 0.2.1.7 I had no problems. > The problems started occurring as soon as I started Tor again via Vidalia > after the upgrade. Also note that I do not have any problems running the > Tor client. > > Thanks > > > torrc from Document and Settings\\Application Data\Vidalia > == > # This file was generated by Tor; if you edit it, comments will not be > preserved # The old torrc file was renamed to torrc.orig.1 or similar, and > Tor will ignore it > > # If set, Tor will accept connections from the same machine (localhost > only) # on this port, and allow those connections to control the Tor > process using # the Tor Control Protocol (described in control-spec.txt). > ControlPort 9051 > # Where to send logging messages. Format is minSeverity[-maxSeverity] > # (stderr|stdout|syslog|file FILENAME). > Log notice stdout > > [EMAIL PROTECTED] wrote: > > On Wed, Dec 03, 2008 at 09:34:40AM -0500, [EMAIL PROTECTED] wrote 2.1K bytes in 74 lines about: > > : I would like to continue to run a Tor relay node but am unable to do so > > : until I resolve the problem described below, and I need help in order > > : to do that. > > : > > : > I just upgraded to versions > > : > > > : > 0.1.10 of Vidalia > > : > and > > : > 0.2.1.7 of Tor > > : > > > : > Vidalia is able to run Tor as a client without any problems. > > : > > > : > Nov 30 22:02:52.906 [Error] set_options(): Bug: Acting on config > > : > options left us in a broken state. Dying. > > : > Nov 30 22:02:52.906 [Warning] eventdns: Didn't find any nameservers. > > : > Nov 30 22:02:52.906 [Warning] Could not config nameservers. > > : > Nov 30 22:02:52.906 [Error] set_options(): Bug: Acting on config > > : > options left us in a broken state. Dying. > > > > A few things, you probably haven't received a response because no one > > has a good idea how to fix it. You may have 2 issues, one is that > > libevent can't find nameservers, and the other is that the config > > options are broken. > > > > As for the dns issues: > > > > https://bugs.torproject.org/flyspray/index.php?do=details&id=813 > > > > or > > > > https://bugs.torproject.org/flyspray/index.php?do=details&id=868 > > > > Are you running Windows? > > > > For the config issues, which may be related to the dns issues, do you > > have a copy of the torrc that's generated by Vidalia? > > gpgkeys: key DE3BBB9A8C295FD5 not found on keyserver
Re: Problems with irc because of tor?
I run a relay server only. Never an exit (at least, not for about a year) On Thursday 20 November 2008 16:37:29 Robert Hogan wrote: > On Thursday 20 November 2008 21:25:46 Praedor Atrebates wrote: > > Now I'm really lost on this. Tor quit running (I cannot run > > tor-0.2.1.7-alpha for more than a couple minutes, so it seems. It just > > suddenly quits without any errors. It's running then suddenly it isn't. > > > > Looks like it is back to the previous version again... > > > > That said, tor is down/off and I STILL get the same messages for my IRC > > client. It seems that simply running tor briefly is enough to bork my > > IRC client from then on (at least until I reboot)? > > Do you run a server yourself? If so, your real IP may be on the irc > server's 'tor blocklist'. > I keep seeing the "127.0.0.1 banned" message and wonder where this address is coming from to be mispresented to any outside server or computer. Why is my REAL IP address be sidestepped and my localhost overriding it? I am wondering if there is a tor configuration setting I am missing to prevent tor from "presenting" 127.0.0.1 as my address.
Re: Problems with irc because of tor?
ov 20 16:21:54.720 [debug] _connection_free(): closing fd 52. Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 61. Nov 20 16:21:54.721 [info] _connection_free(): Freeing linked Directory connection [client reading] with 0 bytes on inbuf, 0 on outbuf. Nov 20 16:21:54.721 [info] _connection_free(): Freeing linked Socks connection [open] with 0 bytes on inbuf, 0 on outbuf. Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 53. Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 56. Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 54. Nov 20 16:21:54.721 [debug] _connection_free(): closing fd 55. Nov 20 16:21:54.722 [debug] _connection_free(): closing fd 57. Nov 20 16:21:54.722 [debug] _connection_free(): closing fd 58. Nov 20 16:21:54.723 [debug] _connection_free(): closing fd 59. Nov 20 16:21:54.723 [info] buf_shrink_freelists(): Cleaning freelist for 4096- byte chunks: keeping 0, dropping 18. Nov 20 16:21:54.723 [info] buf_shrink_freelists(): Cleaning freelist for 8192- byte chunks: keeping 0, dropping 61. Nov 20 16:21:54.724 [info] buf_shrink_freelists(): Cleaning freelist for 16384-byte chunks: keeping 0, dropping 2. Nov 20 16:21:54.724 [info] buf_shrink_freelists(): Cleaning freelist for 32768-byte chunks: keeping 0, dropping 1. I have now uninstalled (again) tor-0.2.1.7-alpha and installed the 2009.0 package for tor instead, tor-0.2.0.31, and it is (and has been) working without hitch since I started it. There appears to be something about 0.2.1.7 specifically that causes problems. Prior to upgrading to it I was running tor-0.2.1.6, also without problem. praedor On Thursday 20 November 2008 16:35:04 Alexander W. Janssen wrote: > Praedor Atrebates wrote: > > Now I'm really lost on this. Tor quit running (I cannot run > > tor-0.2.1.7-alpha for more than a couple minutes, so it seems. It just > > suddenly quits without any errors. It's running then suddenly it isn't. > > OK, that's another thing. > > > Looks like it is back to the previous version again... > > > > That said, tor is down/off and I STILL get the same messages for my IRC > > client. It seems that simply running tor briefly is enough to bork my > > IRC client from then on (at least until I reboot)? > > N, no way. A couple of questions: > > 1) You run some kind of transparent proxy? > 2) If not, check if Tor is really disabled. Use ps in UNIX or the > Windows Taskmanager to check. Shut down Tor. > 3) Check all your IRC-client's settings. > > To be more precise: > 4) What operating system are you using? > 5) What IRC-Client are you using? > > The error-message you're describing is hand-crafted for people who want > to use the Freenode-network with Tor. It wouldn't appear for any other > users (unless Freenode borked up their scanners). > > By the way, the message "Closing Link: 127.0.0.1 (Banned)" seems to > indicate that you're using some kind of proxy. > > If you give us more details, we might be able to help. > > Alex.
Re: Problems with irc because of tor?
Now I'm really lost on this. Tor quit running (I cannot run tor-0.2.1.7-alpha for more than a couple minutes, so it seems. It just suddenly quits without any errors. It's running then suddenly it isn't. Looks like it is back to the previous version again... That said, tor is down/off and I STILL get the same messages for my IRC client. It seems that simply running tor briefly is enough to bork my IRC client from then on (at least until I reboot)? On Thursday 20 November 2008 16:12:42 Alexander W. Janssen wrote: > Sebastian Hahn wrote: > >> -Ursprüngliche Nachricht----- Von: "Praedor Atrebates" > >> <[EMAIL PROTECTED]> Gesendet: 20.11.08 21:10:08 An: > >> or-talk@freehaven.net Betreff: Problems with irc because of tor? > >> Why does running tor suddenly cause me to be unable to connect to > >> freenode? I am NOT running a torified irc client. Also, where's > >> the address 127.0.0.1 coming from? Why is my REAL IP address now > >> invisible (apparently) and tor causing sites to think I am trying > >> to use the localhost IP? > >> > >> praedor > > > > Unfortunately, some service providers choose to not accept Tor users > > as part of their userbase and block connections from exit nodes. > > That wasn't the question, he was wondering why he was using Tor at all > though he told his client not to use it. > > Praedor: Sure you don't use a proxy in your IRC-client? Also, check - if > you're using some flavour of UNIX - if you have some variable like > http_proxy set. > > Alex.
Problems with irc because of tor?
I have been fighting to get tor-0.2.1.7-alpha working on my system for a while and finally appear to have it working now. Now I find that trying to connect to IRC servers fails: [15:06] [Info] Trying to reconnect to irc.freenode.org in 20 seconds. [15:06] [Info] Looking for server irc.freenode.org:6667... [15:06] [Info] Server found, connecting... [15:06] [Info] Connected; logging in... [15:06] [Notice] -- *** Looking up your hostname... [15:06] [Notice] -- *** Checking ident [15:06] [Notice] -- *** Couldn't look up your hostname [15:06] [Notice] -- *** No identd (auth) response [15:06] [Notice] -zelazny.freenode.net- *** Banned: Tor freenode is hidden- service-only (mejokbp2brhw4omd.onion) - see freenode.net/irc_servers.shtml. (2008/11/18 21.17) [15:06] [error] Closing Link: 127.0.0.1 (Banned) Why does running tor suddenly cause me to be unable to connect to freenode? I am NOT running a torified irc client. Also, where's the address 127.0.0.1 coming from? Why is my REAL IP address now invisible (apparently) and tor causing sites to think I am trying to use the localhost IP? praedor
Re: Absolutely cannot run tor 0.2.1.7-alpha
There! FINALLY seem to have a working tor 0.2.1.7-alpha. I went down the requisite lines in the config one by one, uncommenting the minimum needed and finally got it working. SOMETHING must have changed from 0.2.1.6-alpha or the previous config would have worked fine with the new one...it didn't (on my system at least). praedor On Thursday 13 November 2008 15:06:19 [EMAIL PROTECTED] wrote: > On Thu, Nov 13, 2008 at 02:53:27PM -0500, [EMAIL PROTECTED] wrote 0.7K bytes in 14 lines about: > : This is driving me nuts. I have repeatedly tried to upgrade to the > : latest tor with no success. If I build and install it without doing any > : configuration, it will run with the builtin defaults (including the > : default server name) but if I try to create a torrc file, no matter what > : I do with it (using torrc.sample as a template) tor fails to run. No > : error messages at all. > : > : What the hell is it with the latest tor and its config file? Did > : something drastic change? Why is the torrc.sample unusable as a simple > : template? I've tried simply uncommenting a few of the basic settings > : (ORPort, etc) and changing the server name but this alone is enough to > : prevent tor from running. > > Can you post your torrc somewhere? 0.2.1.7-alpha runs well for me.
Re: Absolutely cannot run tor 0.2.1.7-alpha
Here's the torrc as it now stands. I thought I managed to get it working because it started up and had bootstrapped a circuit and was then Self- testing...and then suddenly and without any error messages just quit. I've been trying to go through and simply uncomment lines one by one to see when it quits dying but haven't yet succeeded, so I am starting again. torrc: ## Replace this with "SocksPort 0" if you plan to run Tor only as a ## server, and not make any local application connections yourself. SocksPort 9050 # what port to open for local application connections SocksListenAddress 127.0.0.1 # accept connections only from localhost #SocksListenAddress 192.168.0.1:9100 # listen on this IP:port also ## Entry policies to allow/deny SOCKS requests based on IP address. ## First entry that matches wins. If no SocksPolicy is set, we accept ## all (and only) requests from SocksListenAddress. #SocksPolicy accept 192.168.0.0/16 #SocksPolicy reject * ## Logs go to stdout at level "notice" unless redirected by something ## else, like one of the below lines. You can have as many Log lines as ## you want. ## ## We advise using "notice" in most cases, since anything more verbose ## may provide sensitive information to an attacker who obtains the logs. ## ## Send all messages of level 'notice' or higher to /usr/local/var/log/tor/notices.log #Log notice file /usr/local/var/log/tor/notices.log ## Send every possible message to /usr/local/var/log/tor/debug.log #Log debug file /usr/local/var/log/tor/debug.log ## Use the system log instead of Tor's logfiles Log notice syslog ## To send all messages to stderr: #Log debug stderr ## Uncomment this to start the process in the background... or use ## --runasdaemon 1 on the command line. This is ignored on Windows; ## see the FAQ entry if you want Tor to run as an NT service. #RunAsDaemon 1 ## The directory for keeping all the keys/etc. By default, we store ## things in $HOME/.tor on Unix, and in Application Data\tor on Windows. #DataDirectory /usr/local/var/lib/tor ## The port on which Tor will listen for local connections from Tor ## controller applications, as documented in control-spec.txt. ControlPort 9051 ### This section is just for location-hidden services ### ## Once you have configured a hidden service, you can look at the ## contents of the file ".../hidden_service/hostname" for the address ## to tell people. ## ## HiddenServicePort x y:z says to redirect requests on port x to the ## address y:z. #HiddenServiceDir /usr/local/var/lib/tor/hidden_service/ #HiddenServicePort 80 127.0.0.1:80 #HiddenServiceDir /usr/local/var/lib/tor/other_hidden_service/ #HiddenServicePort 80 127.0.0.1:80 #HiddenServicePort 22 127.0.0.1:22 This section is just for relays # # ## See https://www.torproject.org/docs/tor-doc-relay for details. ## A unique handle for your server. Nickname Lapdog ## The IP or FQDN for your server. Leave commented out and Tor will guess. #Address noname.example.com ## Define these to limit the bandwidth usage of relayed (server) ## traffic. Your own traffic is still unthrottled. ## Note that RelayBandwidthRate must be at least 20 KB. #RelayBandwidthRate 100 KBytes # Throttle traffic to 100KB/s (800Kbps) #RelayBandwidthBurst 200 KBytes # But allow bursts up to 200KB/s (1600Kbps) ## Contact info to be published in the directory, so we can contact you ## if your server is misconfigured or something else goes wrong. #ContactInfo Random Person ## You might also include your PGP or GPG fingerprint if you have one: #ContactInfo 1234D/ Random Person ## Required: what port to advertise for Tor connections. ORPort 9001 ## If you need to listen on a port other than the one advertised ## in ORPort (e.g. to advertise 443 but bind to 9090), uncomment the ## line below too. You'll need to do ipchains or other port forwarding ## yourself to make this work. #ORListenAddress 0.0.0.0:9090 ## Uncomment this to mirror directory information for others. Please do ## if you have enough bandwidth. #DirPort 9030 # what port to advertise for directory connections ## If you need to listen on a port other than the one advertised ## in DirPort (e.g. to advertise 80 but bind to 9091), uncomment the line ## below too. You'll need to do ipchains or other port forwarding yourself ## to make this work. #DirListenAddress 0.0.0.0:9091 On Thursday 13 November 2008 15:06:19 [EMAIL PROTECTED] wrote: > On Thu, Nov 13, 2008 at 02:53:27PM -0500, [EMAIL PROTECTED] wrote 0.7K bytes in 14 lines about: > : This is driving me nuts. I have repeatedly tried to upgrade to the > : latest tor with no success. If I build and install it without doing any > : configuration, it will run with the builtin defaults (including the > : default server name) but if I try to create a torrc file, no matter what > : I do with it (using torrc.sample as a template) tor fails to run. No > : error messages at all. > : > : What the hell is it wit
Absolutely cannot run tor 0.2.1.7-alpha
This is driving me nuts. I have repeatedly tried to upgrade to the latest tor with no success. If I build and install it without doing any configuration, it will run with the builtin defaults (including the default server name) but if I try to create a torrc file, no matter what I do with it (using torrc.sample as a template) tor fails to run. No error messages at all. What the hell is it with the latest tor and its config file? Did something drastic change? Why is the torrc.sample unusable as a simple template? I've tried simply uncommenting a few of the basic settings (ORPort, etc) and changing the server name but this alone is enough to prevent tor from running. For now it looks like I'm back to tor-0.2.1.6-alpha AGAIN. praedor
Re: Any plans to fix tor for OpenDNS?
Nevermind. I setup an account and changed the settings and will deal with the laptop issue later. I do see a message from tor (tork, actually, but it is a tor message): "Recently exceeded local connection limit. Check local system." Huh? WHAT connection limit? I don't recall seeing anything about that in the tor config. praedor On Thursday 13 November 2008 13:48:23 Praedor Atrebates wrote: > Thanks. > > What about this: I run a relay server on my laptop and my home desktop. > My laptop can end up on whatever network I connect to (obviously). I DO > have my own registered domain name and use it no matter what network I > connect to, so my IP for my laptop can vary a lot. Can OpenDNS settings > still be set to hold in this circumstance (tie it to a domain name)? > > On Thursday 13 November 2008 13:04:05 Sven Anderson wrote: > > Am 13.11.2008 um 17:17 schrieb Praedor Atrebates: > > > I use OpenDNS servers and tor messages always contain a message that > > > my > > > service provider "may be hijacking DNS requests". It isn't a > > > problem for > > > functionality of tor but it is somewhat annoying to see that warning > > > all the > > > time. Is there any plan to make tor fully friendly with OpenDNS so > > > these > > > messages can go away? > > > > Go to the OpenDNS website, create an account, add a network for your > > IP and then uncheck options in "advanced settings". Then the warnings > > will go away. > > > > Sven
Re: Any plans to fix tor for OpenDNS?
Thanks. What about this: I run a relay server on my laptop and my home desktop. My laptop can end up on whatever network I connect to (obviously). I DO have my own registered domain name and use it no matter what network I connect to, so my IP for my laptop can vary a lot. Can OpenDNS settings still be set to hold in this circumstance (tie it to a domain name)? On Thursday 13 November 2008 13:04:05 Sven Anderson wrote: > Am 13.11.2008 um 17:17 schrieb Praedor Atrebates: > > I use OpenDNS servers and tor messages always contain a message that > > my > > service provider "may be hijacking DNS requests". It isn't a > > problem for > > functionality of tor but it is somewhat annoying to see that warning > > all the > > time. Is there any plan to make tor fully friendly with OpenDNS so > > these > > messages can go away? > > Go to the OpenDNS website, create an account, add a network for your > IP and then uncheck options in "advanced settings". Then the warnings > will go away. > > Sven
Re: Any plans to fix tor for OpenDNS?
Not until you just asked. I have no idea what is involved in running one, having never configured/setup one before. Would it consume lots of harddrive realestate? Consume lots of swap or RAM? praedor On Thursday 13 November 2008 12:01:34 Eugen Leitl wrote: > On Thu, Nov 13, 2008 at 11:58:51AM -0500, Praedor Atrebates wrote: > > Thanks for the link. I had switched to OpenDNS to avoid some of the > > critical problems recently with "normal" DNS servers. > > Have you considered running your own (caching) DNS server?
Re: Any plans to fix tor for OpenDNS?
Thanks for the link. I had switched to OpenDNS to avoid some of the critical problems recently with "normal" DNS servers. On another note, every time I post to this list, soon after I get a message from typepad asking me to confirm my post by replying to the typepad message. Can this be turned off somewhere? I've never seen this before with any other mailing list I've ever belonged to. praedor On Thursday 13 November 2008 11:26:53 Matt LaPlante wrote: > On Thu, Nov 13, 2008 at 10:17 AM, Praedor Atrebates <[EMAIL PROTECTED]> wrote: > > I use OpenDNS servers and tor messages always contain a message that my > > service provider "may be hijacking DNS requests". It isn't a problem for > > functionality of tor but it is somewhat annoying to see that warning all > > the time. Is there any plan to make tor fully friendly with OpenDNS so > > these messages can go away? > > The very nature of OpenDNS conflicts with the concept of anonymity and > privacy. By using the service, you're not only giving them the > opportunity to track your requests, you're also allowing them to > redirect your lookups to third parties at will. >matlab.mat > http://en.wikipedia.org/wiki/OpenDNS#Privacy_issues_and_covert_redirection
Any plans to fix tor for OpenDNS?
I use OpenDNS servers and tor messages always contain a message that my service provider "may be hijacking DNS requests". It isn't a problem for functionality of tor but it is somewhat annoying to see that warning all the time. Is there any plan to make tor fully friendly with OpenDNS so these messages can go away?
Re: problems with 0.2.1.7-alpha
On Monday 10 November 2008 16:48:46 [EMAIL PROTECTED] wrote: > On Mon, Nov 10, 2008 at 03:38:01PM -0500, [EMAIL PROTECTED] wrote 0.7K bytes in 12 lines about: > : When I build and install the latest 0.2.1.7-alpha tor, it refuses to run: > : > : Nov 10 15:30:25.383 [notice] Tor v0.2.1.6-alpha (r17011). This is > : experimental software. Do not rely on it for strong anonymity. (Running > : on Linux i686) > > You aren't running 0.2.1.7-alpha here. Oops. I got this after trying to run 0.2.1.7-alpha and getting the same output, then I went back to 0.2.1.6-alpha but didn't go through the tork wizard process to set up tor, so I got the same thing with 0.2.1.6-alpha. Upon re-running the setup wizard, tor-0.2.1.6-alpha (unlike 0.2.1.7-alpha) worked fine...but I am nervous about running this one because of the problems I was having over the last week with RAM and CPU consumption. praedor
problems with 0.2.1.7-alpha
When I build and install the latest 0.2.1.7-alpha tor, it refuses to run: Nov 10 15:30:25.383 [notice] Tor v0.2.1.6-alpha (r17011). This is experimental software. Do not rely on it for strong anonymity. (Running on Linux i686) Nov 10 15:30:25.385 [warn] Failed to parse/validate config: Servers must be able to freely connect to the rest of the Internet, so they must not set Reachable*Addresses or FascistFirewall. Nov 10 15:30:25.385 [err] Reading config failed--see warnings above. When I go back to 0.2.1.6-alpha, it works fine. What has changed in the latest to break it in this fashion? Is there some new magical setting that needs to be made in the config?