RE: Wanted feature / option

2007-05-30 Thread Tony
Spammers use other peoples hacked PCs to send messages and the 'reply to' 
addresses are faked. So all in all, rather pointless...
 
 
Regards,
 
Tony.



From: [EMAIL PROTECTED] on behalf of Kyle Williams
Sent: Wed 30/05/2007 04:54
To: or-talk@freehaven.net
Subject: Re: Wanted feature / option


I was testing a spam-reply script and or-talk@freehaven.net got into it somehow.

My bad, sorry.


On 5/29/07, Kyle Williams [EMAIL PROTECTED] wrote: 

FIRST AND FINAL WARNING
You have 48 hours to remove me from your mailing list.
If you do NOT remove me, I will DDOS (Distributed Denial of Service) 
your server until you are broke.

Try me, I got 10 OC192's, 15 OC48's, and 8 OC12's just waiting for shit 
like this...and I'm getting pissed.  If you are working for yourself or some 
spam king, either way the customer who is paying you to advertise will NOT 
be happy when they spent their money to be only be attacked in return.

Remove me or else I remove your source of revenue.

Again, FIRST AND FINAL WARNING

Have a nice day and get a real fucking job. 




On 5/26/07, Michael_google gmail_Gersten  [EMAIL PROTECTED] 
mailto:[EMAIL PROTECTED]  wrote: 

I finally realized what feature I'd like to see. 
CircuitMinimumBandwidth.

Have a config option to tell Tor how much CPU time it can 
expect to
give to processing onions (which will tell it how many active
connections it can handle) (Or tell it directly how many active 
ones
it can handle).

Tor knows the total bandwidth it has to use.
There's good heuristics for telling how much bandwidth a 
connection
will need. (Most will need a high initial push, and then 
occasional, 
intermittent spikes; if a connection needs a lot for more than 
N
seconds, it's likely to need a lot for a while longer. Etc.)
There's a way to tell when the CPU limit will prevent any more 
data
transmission.

Combined, this would allow a node to refuse non-specific node 
requests
(normal circuits would be blocked if the tor server is busy, 
but a
.node.exit would still be allowed).

This would also eliminate any perceived slowness of tor -- no 
longer 
would I see 22 MB nodes in my path, yet dialup users could 
still use
them. If I have a 1300 MB node in my path, I know it can handle 
my 150
request, and not be either so swamped that I'm only seeing 15, 
or so 
overloaded that it's past it's CPU limit. Equally, I know that 
I can
tell tor (without having to use nice) not to steal all my CPU 
while
I'm using my computer.

Potential problems? What would we do if we could not find a 
viable 
circuit? What if every node is asked and reports Busy -- how 
do we
tell the user that Tor is full, or should a lowspeed 
connection be
made anyways?




winmail.dat

RE: Sampled Traffic Analysis by Internet-Exchange-Level Adversaries

2007-05-29 Thread Tony
Windows has offered over 10 Gigabit throughput on a workstation (running 
Windows Server 2003) since 2005...
 
http://www.amd.com/us-en/assets/content_type/DownloadableAssets/AMD_10_GbE_Performance_Paper_August05.pdf
 
 
Regards,
 
Tony.



From: [EMAIL PROTECTED] on behalf of Eugen Leitl
Sent: Mon 28/05/2007 21:22
To: or-talk@freehaven.net
Subject: Re: Sampled Traffic Analysis by Internet-Exchange-Level Adversaries



On Mon, May 28, 2007 at 04:23:51AM -0700, coderman wrote:

 ah, agreed; i was unaware of such a myth, and the thought of someone
 trying to inspect 10GigE with a workstation and wireshark is comical.

Solaris 10 TCP/IP stack rewrite claims 10 GBit/s throughput, but I
have not seen this independentaly corroborated yet.

I presume capture is possible, but just how deep an analysis could
you do on a current quad-core box?

--
Eugen* Leitl a href=http://leitl.org http://leitl.org/ leitl/a 
http://leitl.org http://leitl.org/ 
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://www.ativel.com/  
http://postbiota.org http://postbiota.org/ 
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


winmail.dat

RE: Tor nodes blocked by e-gold

2007-04-27 Thread Tony
No, its just SORBS, thay havnt got a clue. Avoid with long bargepole
 
 
Tony.



From: [EMAIL PROTECTED] on behalf of Karsten N.
Sent: Fri 27/04/2007 09:03
To: or-talk@freehaven.net
Subject: Re: Tor nodes blocked by e-gold



Hi,

I have checked a few long-runnig TOR nodes in the Sorbs SPAM blacklist:

http://www.au.sorbs.net/lookup.shtml

Many of this servers are blacklisted in the database of
vulnerable/hacked servers:

Likely Trojaned Machine, host running unknown trojan

The nodes I checked are mostly well administrated and run actually
software over a time of 1 year. It may be, they are listed in other SPAM
blacklists too.

Karsten N.

[EMAIL PROTECTED] schrieb:
 Hi,

 Since 24 hours, e-gold has decided to block all TOR nodes, and not only. In 
 fact they check 3 spam databases and if the user's IP is in one of them, 
 e-gold just declines any operation, people cannot even login into their 
 accounts.

 There are a few things here:

 It is the first time I see a website blocking IP that appear in SPAM 
 databases! Spam is, as far as I know, an EMAIL problem, so why would a domain 
 block surfing from these IP?

 About TOR particularly, I feel very strange that all exit nodes would be 
 listed in spam databases, as most of them (if not all) don't accept sending 
 mail requests. That is why I rather believe that e-gold in fact fetches the 
 TOR exit nodes list, and directly block their IP addresses.

 A friend, connecting from his home in Germany without TOR, without any proxy, 
 cannot enter his account as his IP address (a dynamic one from a dialup 
 provider) was listed 2 months ago for spam!!!

 A few people are already complaining that they cannot get into their 
 accounts, and so their money seems to be lost! E-gold was already known to 
 block accounts without any warning and explanations, recently blocked 
 accounts of all Iranian people and KEPT their funds, now they automatize the 
 scam process!

 E-gold seems to be the next (or TODAY'S) major scam of the internet!

 F44



winmail.dat

RE: Tor nodes blocked by e-gold

2007-04-27 Thread Tony
SORBS marks TOR servers as zombie spammers I believe.


Regards,

Tony.


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Mike Cardwell
Sent: 27 April 2007 16:23
To: or-talk@freehaven.net
Subject: Re: Tor nodes blocked by e-gold

Really? In which one of the following lists does Sorbs list Tor servers?
And in what way does the description mislead the user as to the purpose
of the listing?

 1.) http.dnsbl.sorbs.net
 2.) socks.dnsbl.sorbs.net
 3.) misc.dnsbl.sorbs.net
 4.) smtp.dnsbl.sorbs.net
 5.) web.dnsbl.sorbs.net
 6.) new.spam.dnsbl.sorbs.net
 7.) recent.spam.dnsbl.sorbs.net
 8.) old.spam.dnsbl.sorbs.net
 9.) spam.dnsbl.sorbs.net
10.) escalations.dnsbl.sorbs.net
11.) block.dnsbl.sorbs.net
12.) zombie.dnsbl.sorbs.net
13.) dul.dnsbl.sorbs.net

They each have very specific listing criteria, but none of them specify
Tor exit node...

Mike

* on the Fri, Apr 27, 2007 at 03:53:31PM +0100, Tony wrote:
 SORBS lists TOR servers as being SPAM related. Which is rather
unlikely to be the case.
  
  
 Regards,
  
 Tony.
 
 
 
 From: [EMAIL PROTECTED] on behalf of Mike Cardwell
 Sent: Fri 27/04/2007 14:42
 To: or-talk@freehaven.net
 Subject: Re: Tor nodes blocked by e-gold
 
 
 
 Sorbs have *many* different lists. They do not just list sources of
spam,
 and nor do they claim to. See http://www.au.sorbs.net/using.shtml
 
 If someone ignorantly decides to start blocking mail or http requests
 based on an IP being listed on the aggregate of all sorbs zones, ie
 dnsbl.sorbs.net then it is they who are at fault, not Sorbs. Sorbs
does
 not tell you what to do with their lists.
 
 Examples:
 
 http.dnsbl.sorbs.net  - List of Open HTTP Proxy Servers.
 socks.dnsbl.sorbs.net - List of Open SOCKS Proxy Servers.
 misc.dnsbl.sorbs.net  - List of open Proxy Servers not
 listed in the SOCKS or HTTP lists.
 
 So... If you're listed in http.dnsbl.sorbs.net, sorbs are saying,
 Last time we checked. There's an open HTTP proxy at IP x. Do
 what you want with this free information. What they're *not*
 saying is Block IP x or you'll get hacked and spammed!!!
 
 So there are three main possibilities as far as E-Golds actions go as
far
 as I can see.
 
 1.) They're ignorantly blocking Tor users without realising.
 2.) They're blocking them on purpose because the collatoral damage is
 worth it to protect their other customers.
 3.) They're ignorantly blocking Tor users without realising, but if
they
 knew about Tor they'd do it on purpose anyway to protect their
service
 and customers.
 
 Sorbs are not doing anything evil, or scamming anyone. They are
publicly
 expressing their opinion and observations of behaviour from IP
 addresses, and letting people do what they want to with that
 information.
 
 The only solution to this problem is to contact E-Gold and try to get
 them to whitelist TOR exit nodes, perhaps using
 ip-port.torhosts.nighteffect.us. They might say yes, they might so no,
 or they might ignore you. You're free to take your business elsewhere
of
 course.
 
 Mike
 
 * on the Fri, Apr 27, 2007 at 04:17:29PM +0300, M wrote:
 
  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
 
  Yeah, SORBS suck a big time.
 
  My Tor exit-node was a couple of years ago listed in SORBS db. Once
I
  changed Tor servers ip to another and closed ports that are commonly
  used to connect to irc servers I got off the list and havent gotten
  relisted since.
 
  What irc has to do with email / smtp? Some ISP's block all incoming
mail
  if smtp server is listed in SORBS. I have contacted couple of
finnish
  ISP's and they all we're very uncooperative.
 
  M
 
 
 
   No, its just SORBS, thay havnt got a clue. Avoid with long
bargepole
   
   
   Tony.
  
   
  
   From: [EMAIL PROTECTED] on behalf of Karsten N.
   Sent: Fri 27/04/2007 09:03
   To: or-talk@freehaven.net
   Subject: Re: Tor nodes blocked by e-gold
  
  
  
   Hi,
  
   I have checked a few long-runnig TOR nodes in the Sorbs SPAM
blacklist:
  
   http://www.au.sorbs.net/lookup.shtml
  
   Many of this servers are blacklisted in the database of
   vulnerable/hacked servers:
  
   Likely Trojaned Machine, host running unknown trojan
  
   The nodes I checked are mostly well administrated and run actually
   software over a time of 1 year. It may be, they are listed in
other SPAM
   blacklists too.
  
   Karsten N.
  
   [EMAIL PROTECTED] schrieb:
   Hi,
  
   Since 24 hours, e-gold has decided to block all TOR nodes, and
not only. In fact they check 3 spam databases and if the user's IP is
in one of them, e-gold just declines any operation, people cannot even
login into their accounts.
  
   There are a few things here:
  
   It is the first time I see a website blocking IP that appear in
SPAM databases! Spam is, as far as I know, an EMAIL problem, so why
would a domain block surfing from these IP?
  
   About TOR particularly, I feel very strange

RE: Tor nodes blocked by e-gold

2007-04-27 Thread Tony
It has changed since SORBS blacklisted my TOR node then. It said it was
Trojan infected or a zombie host at the time. I was told that this was
triggered by just connecting to certain IRC networks.

Maybe they have finally fixed their system.


Regards,

Tony.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Michael Holstein
Sent: 27 April 2007 19:47
To: or-talk@freehaven.net
Subject: Re: Tor nodes blocked by e-gold

 SORBS marks TOR servers as zombie spammers I believe.

Um, in the interest of settling this argument :

grep router cached-routers |grep -v signature |awk -F   '{print host 
$3.dnsbl.sorbs.net}' |sh

(most return NXDOMAIN, meaning not listed by SORBS). The ones that do, 
return the database in which they're listed as the last octet.

  http.dnsbl.sorbs.net127.0.0.2
 socks.dnsbl.sorbs.net127.0.0.3
  misc.dnsbl.sorbs.net127.0.0.4
  smtp.dnsbl.sorbs.net127.0.0.5
   new.spam.dnsbl.sorbs.net127.0.0.6
recent.spam.dnsbl.sorbs.net127.0.0.6
   old.spam.dnsbl.sorbs.net127.0.0.6
  spam.dnsbl.sorbs.net127.0.0.6
escalations.dnsbl.sorbs.net127.0.0.6
   web.dnsbl.sorbs.net127.0.0.7
 block.dnsbl.sorbs.net127.0.0.8
zombie.dnsbl.sorbs.net127.0.0.9
   dul.dnsbl.sorbs.net127.0.0.10
badconf.rhsbl.sorbs.net127.0.0.11
nomail.rhsbl.sorbs.net127.0.0.12

Of the 887 IPs I have in my cached-routers file, 709 return NXDOMAIN. 
The others :

0   http.dnsbl.sorbs.net
0   socks.dnsbl.sorbs.net
0   misc.dnsbl.sorbs.net
0   smtp.dnsbl.sorbs.net
2   *.spam.dnsbl.sorbs.net
0   web.dnsbl.sorbs.net
0   block.dnsbl.sorbs.net
0   zombie.dnsbl.sorbs.net
46  dul.dnsbl.sorbs.net
0   badconf.rhsbl.sorbs.net
0   nomail.rhsbl.sorbs.net

So, according to SORBS, they're blacklisted because they're in dynamic 
IP ranges

Cheers,

Michael Holstein CISSP GCIA
Information Security Administrator
Cleveland State University


RE: Tor server web page?

2007-03-02 Thread Tony
Or http://83.245.15.87/

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Brian C
Sent: 02 March 2007 16:11
To: or-talk@freehaven.net
Subject: Re: Tor server web page?

Another example of what you're looking for:

http://74.0.33.114/

Sam Creasey wrote:
 I know I've seen this discussed on here, and it's pretty much just a
 FAQ at this point, but somehow my google skills are failing me...
 
 Does anyone have a link to some example text to reply to HTTP queries
 for the / page of an ip which runs *only* a tor exit server?
(http://torserver/)
 Something along the lines of Any traffic you've seen from this IP was
 generated by a tor server.  there is nothing to see here.
 
 Thanks.
 
 -- Sam
 
 


RE: Norwegian DNS compromized

2007-02-27 Thread Tony
Erm - isn't that censorship? Surely that defeats one of the main
objectives of TOR.

 

Once you add the capability to do that the Chinese will be blocking
BBC.COM via TOR

 

 

 

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Mr. Blue
Sent: 27 February 2007 20:05
To: or-talk@freehaven.net
Subject: Re: Norwegian DNS compromized

 

I would just like to say that we should report that alolita.com because
it is connected to bunch of PEDOPHILES!!!

Is must be banned from Tor netowork and it should also be reported to
authorities.

Michael_google gmail_Gersten [EMAIL PROTECTED] wrote:

The first test, where alolita.com resolves to different addresses, is
concerning. Did the site just change addresses in the last day or so?
(Those timeout values are one hour, and one-half hour.)

 

  



Don't pick lemons.
See all the new 2007 cars
http://autos.yahoo.com/new_cars.html;_ylc=X3oDMTE0OGRsc3F2BF9TAzk3MTA3M
Dc2BHNlYwNtYWlsdGFncwRzbGsDbmV3Y2Fycw--  at Yahoo! Autos.
http://autos.yahoo.com/new_cars.html;_ylc=X3oDMTE0OGRsc3F2BF9TAzk3MTA3M
Dc2BHNlYwNtYWlsdGFncwRzbGsDbmV3Y2Fycw-- 



RE: ISP controlling entry/exti (Low-Resource Routing Attacks Against Anonymous Systems)

2007-02-26 Thread Tony
http://www.brainfuel.tv/wp-content/uploads/2006/06/argue.jpg

 
winmail.dat

RE: Security concerning Tor, BitTorrent and Firewall

2007-02-19 Thread Tony
For basic anonymity for bit torrent leeching try this https://www.relakks.com/

TOR doesn't have the bandwidth to spare.


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of a a
Sent: 19 February 2007 19:49
To: [EMAIL PROTECTED]
Subject: Security concerning Tor, BitTorrent and Firewall

USING:

Tor  Privoxy  Vidalia bundle 0.1.1.26
Windows XP Home
µTorrent
3com firewall

HAPPENINGS:

I am using Tor behind a 3com firewall, in connection with µTorrent.
Before using Tor I -naturally, having not opened any ports on the
firewall- experienced low connection (updown) rates in µTorrent. However,
after installing the Tor bundle and configuring µTorrent for use with the
Tor proxy server (as described at
http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#head-0d047b05e9b
93c23cec9198550816a114012bde0), I suddenly experienced connection speeds
which would equal those, had I used a normal port forward on my firewall.

QUESTIONS:

Firstly, how does this work?

Secondly -on account of a port forward always being a security risk- Is
this a similar security risk?

And lastly, if it is indeed a security risk (no matter how small), does
this apply to other programs than BitTorrent clients, using the Tor proxy
server?
__

I first inquired with the Privoxy about this issue (presuming that it 
was related to Privoxy) and I recieved the following response: 
 --- Date: 2007-02-19 13:17 Sender: fabiankeil /users/fabiankeil/ --- 
 Are you sure that your provider doesn't throttle BitTorrent traffic? 
 By using Tor you prevent your ISP from knowing which services (other 
 than Tor itself) you're using and this could explain why using Tor 
 speeds up your BitTorrent traffic (it's no longer rate limited by your 
 ISP). Privoxy itself is unlikely to have anything to do with it and I 
 don't think port forwarding has anything to do with it either, but I'm 
 not familiar with BitTorrent. The short answer to your last questions 
 is No, but as it has nothing to do with Privoxy you should checkout 
 the Tor documentation for details and ask again on the or-talk mailing 
 list if you have further questions.
I am fairly certain that my ISP is not the issue here, so I remain 
puzzled... And I've so far not found any answers in the Tor documentation.

Anybody got something on this?

- Arand



RE: Re: PHP coder needs Tor details

2007-02-13 Thread Tony
Actually Windows does exactly the same thing. e.g. the 'Network Service' and 
'Local Service' accounts. See 
http://www.microsoft.com/technet/security/midsizebusiness/topics/networksecurity/securingaccounts.mspx
 
People seem to forget that the original and worst worm outbreak ever - that 
efffectively shut down the internet for days was on UNIX...
 
Windows might have its problems but they are not unique.



From: [EMAIL PROTECTED] on behalf of Juliusz Chroboczek
Sent: Tue 13/02/2007 06:53
To: or-talk@freehaven.net
Subject: Re: PHP coder needs Tor details



 To shorten... How do I allow nobody to utilize Tor (It can already
 do that but I must start it like a root and stop it like a root)

Please don't.

The very reason Unix is more secure than Windows is that Unix actively
uses the permission system to prevent insecure things like PHP from
munging the networking daemons.  By running PHP with higher
privileges, you'll make your Unix system just as insecure as Windows.

Juliusz




winmail.dat

RE: Re: PHP coder needs Tor details

2007-02-13 Thread Tony
Windows hasn't rendered active content by default since XP SP2. It has never 
rendered it by default in Vista or Windows 2003.

Windows also no longer runs as administrator by default (I guess you havnt used 
Vista yet).

Its not just in theory. For instance IIS is now so improved that many sites fed 
up with the constant hacking, exploits, defacements and patching regime 
dependency compatibility issues that they experience on Linux are migrating 
over to Windows server 2003. This has been a consistent trend for some time now 
and Apache just dropped below 60% market share for the first time since 2002 as 
a direct result of cumulative migrations from Linux to Windows.

As you say 'most installations are now secure by default'. Touché. 


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eugen Leitl
Sent: 13 February 2007 10:34
To: or-talk@freehaven.net
Subject: Re: Re: PHP coder needs Tor details

On Tue, Feb 13, 2007 at 10:25:54AM -, Tony wrote:

This is offtopic, but...

 Actually Windows does exactly the same thing. e.g. the 'Network 
 Service' and 'Local Service' accounts. See 
 http://www.microsoft.com/technet/security/midsizebusiness/topics/netwo
 rksecurity/securingaccounts.mspx

The point is that rendering active content is default, and running everything 
as administrator is default (in fact, most Windows userland software needs to 
be installed and run as administrator) -- the technology and the culture 
conspire to give us the 250 Mzombie Internet experience we love.
  
 People seem to forget that the original and worst worm outbreak ever - that 
 efffectively shut down the internet for days was on UNIX...

That was a long time ago. Unix is diverse, and most installations are now 
secure by default. The technology and the culture work together, and lower 
profile is one of the key points that diversity is good, monoculture is bad.
  
 Windows might have its problems but they are not unique.

You're correct only in theory.

--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org 
__
ICBM: 48.07100, 11.36820http://www.ativel.com
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


RE: Some networking questions

2007-02-01 Thread Tony
1. a) Approx 50 metres. Depends on the environment, the cards, the
transmission power and the wireless band / standard being used.
b) No it wont extend it. You need a customised router or software that
behaves as a wireless extender to do that.

2. See www.sveasoft.com for firmware for routers that will do this.

3. a)That would depend on the size of the directory and the load. 
b) Windows XP is not optimised to perform as a server and comes by
default with lots of extra processes and services running. However, If
it is an option then Windows Server usually outperforms Linux at
network, application and fileserver benchmarks on the same hardware. 


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Leelanau Underground Press
Sent: 02 February 2007 00:25
To: or-talk@freehaven.net
Subject: Re: Some networking questions

First off, number 5 should be identities not identitied. I have some
more questions:

1. Does anybody know the range of an ad-hoc wireless network for an
average wireless card? If an ad-hoc network is run and another laptop
connects near the edge of it, does he extend the network range? For
example, Laptop A and B are on a network. Laptop C joins off laptop B's
connection. Laptop A is normally too far away to see laptop C, does the
connection go through B to get there? Will it get there?

2. Has anybody done anything similar? What experiences did you have?

3. How much memory/CPU on average would a all-purpose server and
authoritative directory server take on an XP or Linux box? Is tor more
efficient in XP or Linux (excluding that linux is more efficient in and
of itself)
Thanks for any help you can give.
 Original Message 
From: Leelanau Underground Press [EMAIL PROTECTED]
Apparently from: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Some networking questions
Date: Thu, 1 Feb 2007 19:10:30 -0500

 I have a lot of questions here so please be patient with me. I have
been using and promoting tor for a long time and I'm working on a new
project to create a ready-to-go LAN package of tor (for running tor on a
LAN). Here are my questions.
 
 Example one: I am distributing tor to all the users on a LAN that has
a restrictive firewall blocking access to some internet sites. SOME tor
servers are blocked, others not.
 
 1. If I make an authoritative directory server on the LAN that
excludes non-local IPs from connecting and doesn't advertise to other
directory servers, would it mess with tor connections? The reason I ask
is I think if I have a local directory server it could do all the work
of finding out that certain tor servers are blocked so that the user
doesn't have to go through all the trouble. I'm aware this would lessen
people's anonymity. Is there a way to improve that?
 
 Example two: I am distributing tor to users on a wireless managed or
ad-hoc network. Inside the cache file is a list of lots of IPs where
servers on the network *might* (since IPs are semi-dynamic) be located.
All tor installs by default run servers (middleman, exit, rond. etc.) as
well as an authoritative directory server. Nothing ever exits the
wireless network as it would only serve to help people use
hidden-services.
 
 1. Once connected, how fast will tor transfer data from a hidden
service with unlimited CPU/bandwidth/etc. (assuming normal end-user
machines are all clients and servers and wireless network speed is
around 56 mbps)
 
 2. If the default servers list in the torrc contains the entire IP
subnet (let's say for example's sake, this means 1000 IPs), how many
times will tor try each IP in the list before it is deleted, and will it
be put there again if a local authoiritative directory server suggests
it.
 
 3. How long will an authoritative directory server consider a node
down before it is removed from the list?
 
 4. What would be the best way to make this network work on the managed
wireless network in example one but have a local-only tor network as in
example two in case the filter starts blocking ALL the tor servers on
the external internet.
 
 5. Since we are working on an extremely high-speed link, would it hurt
to run a tor client inside of a tor client to stop adversaries from
finding user identitied (since on a wireless network all data can be
seen by anybody)
 
 I will probably have some more questions once some of these get
clarified. Any other related suggestions are helpful. Any help you can
offer on any of these questions is appreciated.
 Thank you,
 A true tor fan


RE: Relakks

2006-11-30 Thread Tony
I think you are mistaken. Going via an encrypted pipe to a foreign proxy
certainly does not make it easier. 

It is obviously much easier for the US government to observe an
unencrypted USA internet connection and all traffic to and from it than
to observe an encrypted connection that terminates in Sweden - together
with tens of thousands of other similar connections from the same
server.

Sure with analysis and a fair bit of processing power they could
eventually match your output from Relakks to your source IP by a timing
attack. Assuming they can monitor a Swedish ISP at source. However, I
doubt that they have that capability - certainly the Swedish government
is very unlikely to give it to them. Anyway, the next time that you
connect and get a new IP then they have to work from scratch again.

It certainly makes it more difficult and probably out of reach of for
instance the RIAA, MPAA and other such rights restriction organisations
to go after file sharers, DRM hackers and the like.

Possibly if you are a terrorist and the NSA is able to bring all its
resources to bear then it is not enough, but it is probably good enough
for the vast majority that want privacy.



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of coderman
Sent: 30 November 2006 18:29
To: or-talk@freehaven.net
Subject: Re: Relakks

On 11/30/06, Tony [EMAIL PROTECTED] wrote:
 If they use Relakks they they can make it much harder for the US
governement to watch them - and get decent speed too - unlike with TOR!

let me make this really clear:

Relakks and other single hop proxies are trivial to observe for an
adversary correlating traffic.  Such services make it MUCH EASIER, not
harder, for governments to watch.  they also introduce a single point
of failure and require full trust in this third party.

Tor is slower than Relakks because it provides stronger anonymity,
which is a feature, not a bug.

best regards,


RE: Could i use tor to login Paypal?

2006-08-31 Thread Tony
Hi, 

Paypal evaluate the fraud risks of user transactions for obvious
reasons. Using anonymous proxies will be more likely to flag you as a
potential fraudulent transaction or stolen account. I had the same issue
as the below - once cleared they don't seem to flag it again for the
same reason. This seems a sensible policy to protect users bearing in
mind the volume of fraud attempts via Paypal.

This is the same way as most online credit card processing gateway fraud
systems will flag connections via TOR or other known proxies as higher
risk.



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of BlueStar88
Sent: 31 August 2006 22:43
To: or-talk@freehaven.net
Subject: Re: Could i use tor to login Paypal?

Fabian Keil schrieb:
 A month ago PayPal took my account hostage because they fantasised to 
 have reason to believe a third person had access to it.

 There were no unauthorised transactions, therefore I'm sure it's a 
 false alarm.

 Of course they didn't tell me their reason, but I assume it's a stupid

 one. I wouldn't be surprised if it was because a change of exit nodes 
 while I was logged in.

 Fabian
   
My business paypal account is locked to reduced functionality too
directly after loggin in via tor. Now i have to bring additional papers
to proof identity again.

I think they're checking the source ip against the registered home
country. So if i call from Australia (i.e. Exit Node), but i'm
registered to be living in France, they do like this. On one hand a cool
security thing, on the other hand a bad side effect of tor...

Currently i stuck at reduced paypal account.

(There were no transactions in this time)



Greets

Manuel



RE: SHTTPD: Windows web-server, light-weight, stand-alone and multi-platform (Unix, etc)

2006-06-08 Thread Tony
Hi, 
 
If you have already paid to use Windows server, then it is effectively a 'free 
product'. However you need to be specially licensed to see the source code.
 
You also get IIS5 with XP, but I would not recommend using that as it is not as 
secure.
 



From: [EMAIL PROTECTED] on behalf of Anothony Georgeo
Sent: Thu 08/06/2006 12:02
To: or-talk@freehaven.net
Subject: RE: SHTTPD: Windows web-server, light-weight, stand-alone and 
multi-platform (Unix, etc)



Hi,


--- Tony [EMAIL PROTECTED] wrote:

 Windows Server 2003 already comes with IIS6

The Tor team wants 'free software' not Microsoft
products.

Access to source code and ability to modifity source
code is one of the main legs of 'free software' and
not allowed by Microsoft.

Please read this page for a great definition of 'free
software':
http://www.fsf.org/licensing/essays/free-sw.html

From the site:
---
Free software is a matter of the users' freedom to
run, copy, distribute, study, change and improve
the software. More precisely, it refers to four
kinds of freedom, for the users of the software:

* The freedom to run the program, for any purpose
(freedom 0).

* The freedom to study how the program works, and
adapt it to your needs (freedom 1). Access to the
source code is a precondition for this.

* The freedom to redistribute copies so you can
help your neighbor (freedom 2).

* The freedom to improve the program, and release
your improvements to the public, so that the
whole community benefits (freedom 3). Access to
the source code is a precondition for this.
---









__
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around
http://mail.yahoo.com http://mail.yahoo.com/ 


winmail.dat

RE: SHTTPD: Windows web-server, light-weight, stand-alone and multi-platform (Unix, etc)

2006-06-08 Thread Tony
That is simply not true - many people can check and review the source code for 
Microsoft products. You just have to be licenced and have a valid reason to do 
so. e.g. the Chinese government did so to check for backdoors, etc., and so 
have many others including many software developers. 
 
See http://www.microsoft.com/resources/sharedsource/Licensing/default.mspx
 

 


From: [EMAIL PROTECTED] on behalf of Kenneth Loafman
Sent: Thu 08/06/2006 14:05
To: or-talk@freehaven.net
Subject: Re: SHTTPD: Windows web-server, light-weight, stand-alone and 
multi-platform (Unix, etc)



The other freedom that they don't mention is freedom from backdoors.
Since no one can see the MS code and verify that it is free from
government intrusion, there is good reason not to use it in an
environment where such government intrusion could be detrimental.

...Ken

Tony wrote:
 Hi,
 
 If you have already paid to use Windows server, then it is effectively a 
 'free product'. However you need to be specially licensed to see the source 
 code.
 
 You also get IIS5 with XP, but I would not recommend using that as it is not 
 as secure.
 

 

 From: [EMAIL PROTECTED] on behalf of Anothony Georgeo
 Sent: Thu 08/06/2006 12:02
 To: or-talk@freehaven.net
 Subject: RE: SHTTPD: Windows web-server, light-weight, stand-alone and 
 multi-platform (Unix, etc)



 Hi,


 --- Tony [EMAIL PROTECTED] wrote:

 Windows Server 2003 already comes with IIS6

 The Tor team wants 'free software' not Microsoft
 products.

 Access to source code and ability to modifity source
 code is one of the main legs of 'free software' and
 not allowed by Microsoft.

 Please read this page for a great definition of 'free
 software':
 http://www.fsf.org/licensing/essays/free-sw.html

From the site:
 ---
 Free software is a matter of the users' freedom to
 run, copy, distribute, study, change and improve
 the software. More precisely, it refers to four
 kinds of freedom, for the users of the software:

 * The freedom to run the program, for any purpose
 (freedom 0).

 * The freedom to study how the program works, and
 adapt it to your needs (freedom 1). Access to the
 source code is a precondition for this.

 * The freedom to redistribute copies so you can
 help your neighbor (freedom 2).

 * The freedom to improve the program, and release
 your improvements to the public, so that the
 whole community benefits (freedom 3). Access to
 the source code is a precondition for this.
 ---









 __
 Do You Yahoo!?
 Tired of spam?  Yahoo! Mail has the best spam protection around
 http://mail.yahoo.com http://mail.yahoo.com/  http://mail.yahoo.com/




winmail.dat

RE: SHTTPD: Windows web-server, light-weight, stand-alone and multi-platform (Unix, etc)

2006-06-08 Thread Tony
Hi,

What has Code Red to do with this? That was a different webserver
version on a different operating system (IIS5 on Windows 2000 and
earlier). I was recommending the option of IIS6 for those running
Windows server 2003. I remind you that the worst worm infestation in the
history of the internet was actually on UNIX based systems as the 'Great
Worm' of 1988... Should we avoid using Linux because of that?

Microsoft current OS's are certainly not perfect but they are much
improved as regards security from previous versions. If you check recent
defacement statistics or the recent report on the subject from Mi2g you
will see that the most commonly hacked server OS platform on the
internet is currently systems based on Linux by a very wide and growing
margin, even allowing for the fact that there are currently more Linux
based servers out there. 

As regards the source code comment - I cant recall anyone being sued as
you describe anywhere, ever,  except where the person concerned was an
ex-employee of the company in question. Perhaps you could provide a few
examples?



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Watson Ladd
Sent: 09 June 2006 00:08
To: or-talk@freehaven.net
Subject: Re: SHTTPD: Windows web-server, light-weight, stand-alone and
multi-platform (Unix, etc)

And so Code Red never existed?
On Jun 8, 2006, at 10:23 AM, Tony wrote:

 That is simply not true - many people can check and review the  
 source code for Microsoft products. You just have to be licenced  
 and have a valid reason to do so. e.g. the Chinese government did  
 so to check for backdoors, etc., and so have many others including  
 many software developers.

 See http://www.microsoft.com/resources/sharedsource/Licensing/ 
 default.mspx
And never work on GPL code ever again because a lawsuit might be  
made. This is why open source projects should create shell  
corporations that own all the code: When a lawsuit comes, declare  
bankruptcy, give them the rights to the code. Then fork off another  
project and repeat. When they come after you, point out that the  
previous owners waived the rights to prevent a fork.



 

 From: [EMAIL PROTECTED] on behalf of Kenneth Loafman
 Sent: Thu 08/06/2006 14:05
 To: or-talk@freehaven.net
 Subject: Re: SHTTPD: Windows web-server, light-weight, stand- 
 alone and multi-platform (Unix, etc)



 The other freedom that they don't mention is freedom from backdoors.
 Since no one can see the MS code and verify that it is free from
 government intrusion, there is good reason not to use it in an
 environment where such government intrusion could be detrimental.

 ...Ken

 Tony wrote:
 Hi,

 If you have already paid to use Windows server, then it is  
 effectively a 'free product'. However you need to be specially  
 licensed to see the source code.

 You also get IIS5 with XP, but I would not recommend using that as  
 it is not as secure.


 

 From: [EMAIL PROTECTED] on behalf of Anothony Georgeo
 Sent: Thu 08/06/2006 12:02
 To: or-talk@freehaven.net
 Subject: RE: SHTTPD: Windows web-server, light-weight, stand- 
 alone and multi-platform (Unix, etc)



 Hi,


 --- Tony [EMAIL PROTECTED] wrote:

 Windows Server 2003 already comes with IIS6

 The Tor team wants 'free software' not Microsoft
 products.

 Access to source code and ability to modifity source
 code is one of the main legs of 'free software' and
 not allowed by Microsoft.

 Please read this page for a great definition of 'free
 software':
 http://www.fsf.org/licensing/essays/free-sw.html

 From the site:
 ---
 Free software is a matter of the users' freedom to
 run, copy, distribute, study, change and improve
 the software. More precisely, it refers to four
 kinds of freedom, for the users of the software:

 * The freedom to run the program, for any purpose
 (freedom 0).

 * The freedom to study how the program works, and
 adapt it to your needs (freedom 1). Access to the
 source code is a precondition for this.

 * The freedom to redistribute copies so you can
 help your neighbor (freedom 2).

 * The freedom to improve the program, and release
 your improvements to the public, so that the
 whole community benefits (freedom 3). Access to
 the source code is a precondition for this.
 ---









 __
 Do You Yahoo!?
 Tired of spam?  Yahoo! Mail has the best spam protection around
 http://mail.yahoo.com http://mail.yahoo.com/  http:// 
 mail.yahoo.com/




 winmail.dat

Sincerely,
Watson Ladd
---
Those who would give up Essential Liberty to purchase a little  
Temporary Safety deserve neither  Liberty nor Safety.
-- Benjamin Franklin 




RE: Did you see this?

2006-05-19 Thread Tony
Hi.
 
As the RIPA 3 is currently written there seem to be two big holes.
 
1. Destroy the key and retain proof that you destroyed it - eg microwave the 
USB key.
 
It seems that the law is only really designed to cope with keys (passphrases) 
that you can remember. Therefore if you have a physical 'key file' and can 
destroy it then there doesnt seem to be a penalty for that if I read it 
correctly. You can prove that you no longer posess the key - and therefore cant 
be penalised for refusing to reveal it!
 
2. Keep multiple keys (e.g. a dummy volume).
 
The act specifies that if there is more than one key, you can choose which key 
to give up!
 



From: [EMAIL PROTECTED] on behalf of Steve Crook
Sent: Fri 19/05/2006 12:41
To: tor talk
Subject: Re: Did you see this?



On Thu, May 18, 2006 at 07:16:49PM -0700, Eric H. Jung wrote:
 U.K. Government to force handover of encryption keys
 http://news.zdnet.co.uk/0,39020330,39269746,00.htm

Yes, once this is passed encrypting storage with a passphrase becomes a
pointless exercise in the UK unless you are prepared to spend time at
Her Majesty's pleasure in order to protect your data.

I think the best solution is to run privacy services in a different
jurisdiction from where the operator resides.  For example, my Tor node
is located in Texas and runs from encrypted volumes that I manually
mount from the UK after a reboot.  I don't think the special
agreements between these countries currently stretch to international
demands for passphrases.  No doubt this would rapidly change if the
accusation was related to terrorism or possibly one of the other
horsemen of the infocalypse.

I'd be interested to hear other suggestions for circumventing RIPA.


winmail.dat

RE: Did you see this?

2006-05-19 Thread Tony
I didn't say a false key, I said a dummy key. One that will work, but
would unlock a dummy outer volume - but not all data within it. There is
no way of telling the inner contents of such a drive from random data.
There are several products that can do that. The act specifically says
that if there are multiple keys then you can choose which one to
release.

Destroying a false key and claiming you didn't have the key would be
illegal if you still possessed the real key. 


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Jonathan D. Proulx
Sent: 19 May 2006 17:28
To: or-talk@freehaven.net
Subject: Re: Did you see this?

On Fri, May 19, 2006 at 03:11:20PM +0100, Tony wrote:

:2. Keep multiple keys (e.g. a dummy volume).
: 
:The act specifies that if there is more than one key, you can choose
which key to give up!

That just means you can revoke the key when they're done.  Giving a
false key is not giving a key.  

You can play whatever games you want (ie microwave a different USB
frob while shipping the real key to a trusted associate in a country
without an extradition tready), but that isn't a loop hole in the law
that can be legally exploited, it's a dodge that can land you in heaps
more trouble if you're caught.

-Jon




RE: Some legal trouble with TOR in France

2006-05-15 Thread Tony
They send you to prison if you don't give up the information.


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Matej Kovacic
Sent: 15 May 2006 07:57
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France

Hi,

 Under the British Regulation of Investigatory Powers Act, they would
 simply confiscate the entire machine, demand any authentication tokens
 required to access it, and lock you up if you refused to surrender
them.
 I believe similar laws exist in most EU jurisdictions now.

What about the priviledge of non self-accusation?

It is expensive, but you can just piss 'em off and buy new hardware...

bye, Matej


RE: Some legal trouble with TOR in France

2006-05-15 Thread Tony
Yes apparently it's not in force yet. I'm sure its coming though. 

Although as currently written there seem to be a few loop holes - e.g.
you can give up 'any' key and you can choose which key just so long it
meets stated the requirements of the request. There isn't a requirement
to give up 'all keys'. You can also destroy the key before receiving the
request if you think a request is coming. 

Giving up dummy keys that unlock dummy volumes would make it very hard
to prove you didn't meet the request unless the specific information
that they were looking for was already named on the request.

Or as I read it, you can destroy a key even after the request is
received if you can prove you no longer have it in your 'possession'



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Mike Perry
Sent: 15 May 2006 00:16
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France

Thus spake Eric H. Jung ([EMAIL PROTECTED]):

  Tony's point was that you could arrange not to have the 
 authentication
  tokens anymore. You better hope they believe you when you say you
  don't have it, though.
 
 Not having the authentication tokens counts as refusing to surrender
 them.
 
 Per US law, if a judge subpoenas you to hand them over and you refuse
 and/or remain silent, it means indefinite jail time (until you hand
 over the tokens) and/or fines.

Where is your source on this? As I understand it, there are a few
fundamental principles of the US legal system that should render this
statement completely false. One is Habeas Corpus.. You can't just
throw someone in jail indefinitely without a criminal charge and a
trial. http://en.wikipedia.org/wiki/Writ_of_habeas_corpus 

Though it seems BushCo are violating it with enemy combatant
charges, I do not think they have the political power (at least
anymore) to name an anonymity provider as an enemy combatant
(especially if they are a natural born US citizen). The same applies
to the 72 hour warrant deal, at least as far as I can tell from
http://www.fff.org/comment/com0601c.asp

Second, if it is a criminal charge, you are not under any obligation
to testify against yourself in a criminal court of law (5th
ammendment). There are various exceptions to this, main one being if
you are not the person charged of the crime (though I think you can
still claim that such testimony may incriminate you for unrelated
matters). I suppose it could also be argued that the passphrase does
not count as testimony, but it sure seems like it is.

Finally, some googling on subpoena compliance seems to indicate that
punishment for subpoena non-compliance is 'contempt of court' charge
and fines.

http://www.rcfp.org/cgi-local/privilege/item.cgi?i=questions

That page advises you not to answer any subpoenas without challenging
them first, among other things (ie one state's court cannot usually
subpoena someone from another state). Contempt of court charges for
non-compliance may be repeated, but any contempt law I can find on
the web has some form of maximum limit. The longest I've seen so far
is North Carolina, which is a max of 1yr in 90 day increments:
http://www.rosen.com/ppf/cat/statco/laws.asp


Also, dunno how accurate it is, but Wikipedia seems to claim that the
key disclosure provisions of the RIPA (Part III) are not yet in force
in the UK:

http://en.wikipedia.org/wiki/Regulation_of_Investigatory_Powers_Act_2000




We seriously have to watch our paranoia on this one. This is one of
those situations that if we believe we have no rights, it will be very
easy to knock us over, simply by playing off our fears and demanding
keys without any legitimate basis to do so.

If any Tor operator is arrested/detained in the US, they would do well
to refuse to surrender any passphrase until they are actually in court
and ordered to do so by a Judge (and then only after voicing protest,
to allow for clear appeal to a higher court). Cops will probably just
lie to you and try to convince you that you are required on the spot.
Ask for a lawyer immediately. 

This is not just to protect the Tor network either. With computer laws
as crazy as they are, and with the IPPA coming down the road, soon
simply having something like an Open Source DVD player or archiver on
your machine will be enough to land you in jail for a while, if it's
not already...

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


RE: Some legal trouble with TOR in France +

2006-05-15 Thread Tony
Please define 'evil activities'


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Nick Mathewson
Sent: 15 May 2006 23:59
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France +

On Mon, May 15, 2006 at 03:36:59PM -0700, Ben Wilhelm wrote:
 [...]
 The line is drawn. The line is that Tor does not censor. That's the
only 
 line that makes sense, because everything else requires subjective 
 judgement that many would not be able to agree on.

I typically argue this from the can't point of view, not the
won't.  If it were possible detect block evil activities through
programmatic means, I *would* be in favor of blocking them.
Unfortunately, evil-detection isn't automatable (RFC3514
notwithstanding), and most schemes for blocking are both over-broad
_and_ easy to circumvent.

Non-automated schemes, as you say, fall for different reasons: you
can't make one without putting human judgment in the loop, and once
you've done that, you've appointed somebody as a censor, and you've
created a mechanism for someone else to take the reigns of censorship
in the future.

Also, there's the jurisdictional arbitrage problem: which local
standards does your hypothetical censor try to comply with?  China's?
France's?

 If you don't want your internet connection to be used anonymously, for

 *anything*, then don't run a Tor exit node.

Rather, if you're not willing to accept that people may use your
Internet connection to do stuff you don't like, don't run an exit
node.  You don't have to like everything that people do.  I don't
*want* people to use my software for any number of things, but I
believe that the benefits it provides do outweigh the problems.

 It's impossible to block 
 subjects on a case-by-case basis anyway - the exact thing Tor was
built 
 to prove! - and I'd rather not waste our coders' time on that.

Hm?  I don't think Tor was built to prove anything; I think it was
built to further usable online privacy for everyone. :)

As for wasting the coders' time, don't worry.  We have a long history
of ignoring bad ideas. wink

yrs,
-- 
Nick Mathewson


RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Not to mention that under Bush, meeting the requirements of US law is
not required either. And they have certainly never worried about other
countries laws.



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Eric H. Jung
Sent: 14 May 2006 03:33
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France



--- Mike Perry [EMAIL PROTECTED] wrote:
 A US judge exercising proper
 dilligence should be able to realize that the search was not likely
 to
 produce relevant evidence to the case in question, or so one would
 hope.

LOL. Where have you been for the past 6 months with regards to the Bush
administration. Warrants in the US are no longer required.



RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Talking of Microsoft; it is a claimed advantage of the new OS versions
coming out such as Longhorn server - they include 'Bitlocker' encryption
that is apparently highly secure and integrates with motherboard
chipsets (TPM modules) to provide end to end code authentication and
hardware security. If any one thing required to unlock it is missing -
e.g. original hardware, TPM or pass code, USB dongle, etc. then no one
is going to reading your data unless a compromise is found in 256 bit
AES encryption. 

So if for instance they take your disks away as per the French TOR node,
then you could destroy your hardware key (wipe TPM module, destroy
motherboard chipset or USB dongle) and they are not going to be reading
anything, ever. Even if they do take the whole system away then they
wont be able to login to access your data even if they can boot unless
they have your password (and biometrics or USB token, etc.) 

You can login using a USB token and then store the token away from the
PC. If the PC is taken then you can destroy the token (one minute in a
microwave oven is pretty effective). Then even if you are later required
by law to give up your 'passwords' you can show that is no longer
possible.

See http://www.microsoft.com/technet/windowsvista/security/bittech.mspx
and http://www.microsoft.com/technet/windowsvista/security/bitlockr.mspx

Another advantage of this is that they can't easily trojan or root kit
your OS at a low level - it would fail the signed code integrity checks
and would not boot.

I recommend not securing it with your finger prints though.
http://news.bbc.co.uk/1/hi/world/asia-pacific/4396831.stm

I wonder how law enforcement organisations and even organisations that
don't care about international (or even their own) laws such as the US
government will react to the increasing future common use of secure
encryption. Even our phone calls can now be secured from their
monitoring: http://www.philzimmermann.com/EN/zfone/index.html




-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Landorin
Sent: 14 May 2006 01:45
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
I'd say if you can register a server with the required data given you
can unregister it the same way imho. Just contact the adress for
registering.
Speaking of cloned hard drives and having his keys... that's where
Truecrypt kicks in. ;) Nicely encrypted files with hidden volumes
within the file. ;)

By the way, if you even want to melt the hardisk then you need to go
to the Mount Doom and drop it there, that's the safest way and since
you're already on it, that way you can make the Microsoft Tower of
Evil and its virtual armies collapse, too. ;) I doubt the normal
police has such good programs that survive melting and formating. ;)
In the end, it's up to you to decide what is necessary to trust your
hardisks again. Yet if I were the police I wouldn't waste my time on
someone who obviously had nothing to do with the crime, I'd rather
concentrate on finding criminals that can be traced back (and if they
listened to you then they know it's a waste of time in any case
because they can't track anyone back with your PC).

Sincerely,
Landorin

Anthony DiPierro schrieb:
 On 5/13/06, Ringo Kamens [EMAIL PROTECTED] wrote:
 He has a good point. They surely have a clone of your drive which
 means they
 have the private keys to the server which could destroy the user's
 anonymity.

 If I understand things correctly then the name of the node should be
 told to someone who can permanently take it out of the directory
 servers.  Is this possible/necessary?  Or does everyone have to add an
 excludenodes?

 Anthony




- --
Accelerate cancer research with your PC:
http://www.chem.ox.ac.uk/curecancer.html

GPG key ID: 4096R/E9FD5518
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 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=J51j
-END PGP SIGNATURE-



RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Unfortunately you no longer have a right to remain silent in the UK.

Even for general offences they can interpret it as evidence of guilt in
court.

Hopefully EU / Human Rights legislation will resolve that at some point.

You could however find other ways to get round the requirement. For
instance you could provide a USB token that contained the keys, but also
contained a bootable image that on inserting into your PC wiped your TPM
and then wiped the key. You have then met your requirement to provide
the key...



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Lionel Elie Mamane
Sent: 14 May 2006 14:58
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France

On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
 On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote:

 So if for instance they take your disks away as per the French TOR
 node, then you could destroy your hardware key (wipe TPM module,
 destroy motherboard chipset or USB dongle) and they are not going
 to be reading anything, ever. Even if they do take the whole system
 away then they wont be able to login to access your data even if
 they can boot unless they have your password (and biometrics or USB
 token, etc.)

 Under the British Regulation of Investigatory Powers Act, they
 would simply confiscate the entire machine, demand any
 authentication tokens required to access it, and lock you up if you
 refused to surrender them.  I believe similar laws exist in most EU
 jurisdictions now.

Tony's point was that you could arrange not to have the authentication
tokens anymore. You better hope they believe you when you say you
don't have it, though. And under at least some EU registrations, some
people have a right to remain silent. Like the accused person, for
example. And people that have a right to remain silent can refuse to
hand over cryptographic keys.

Not that some powers haven't been known to first interrogate you as
unrelated witness (neither you, nor your family, is accused), where
remaining silent is obstruction of justice and punishable, and _then_
charge you with the information thus gleaned.

-- 
Lionel


RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Not if you didn't have them prior to receiving the notice and can prove
it.

e.g. after taking away your PC and realising it is encrypted they return
with a notice. You then hand over token and say by the way I previously
destroyed the data on it so I don't have the keys. You have met your
legal obligations. There is no offence of 'suspecting a notice might be
served and destroying the keys in advance of receipt' that I am aware
of.


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Dave Page
Sent: 14 May 2006 15:00
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France

On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
 On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:

  Under the British Regulation of Investigatory Powers Act, they
  would simply confiscate the entire machine, demand any
  authentication tokens required to access it, and lock you up if you
  refused to surrender them.  I believe similar laws exist in most EU
  jurisdictions now.

 Tony's point was that you could arrange not to have the authentication
 tokens anymore. You better hope they believe you when you say you
 don't have it, though.

Not having the authentication tokens counts as refusing to surrender
them.

Dave
-- 
Dave Page [EMAIL PROTECTED]
Jabber: [EMAIL PROTECTED]


RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Nb - an interesting question arises with the use of TrueCrypt, etc. that
have passkeys that can unlock different levels of data. If you have
dummy volumes and provide the passkeys to just those have you met your
legal requirements?

The implication under the RIP act is that you have.

 (2) A person subject to a requirement under subsection (1)(b) to
make a disclosure of any information in an intelligible form shall be
taken to have complied with that requirement if- (a) he makes, instead,
a disclosure of any key to the protected information that is in his
possession; and
  
  (b) that disclosure is made, in accordance with the notice imposing
the requirement, to the person to whom, and by the time by which, he was
required to provide the information in that form.


So unless the notice specified exactly what data they wanted access to
(which presumably they would already have a record of to request it),
then providing that the notice only requires access to a specified Disk
or volume then it would seem you have met those obligations by providing
a dummy volume passkey.



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Dave Page
Sent: 14 May 2006 15:00
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France

On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
 On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:

  Under the British Regulation of Investigatory Powers Act, they
  would simply confiscate the entire machine, demand any
  authentication tokens required to access it, and lock you up if you
  refused to surrender them.  I believe similar laws exist in most EU
  jurisdictions now.

 Tony's point was that you could arrange not to have the authentication
 tokens anymore. You better hope they believe you when you say you
 don't have it, though.

Not having the authentication tokens counts as refusing to surrender
them.

Dave
-- 
Dave Page [EMAIL PROTECTED]
Jabber: [EMAIL PROTECTED]


RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
The whole point is that you ensure any keys are destroyed before you
receive a formal request. It not 'evidence' until its requested by the
authorities.

It is believed there is code in all major manufacturer colour copiers
and high end printers that can identify the printer serial number. It is
done via a faint yellow pattern on every print out.

The stated target is currency forgery but of course it has many other
uses.



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Eric H. Jung
Sent: 14 May 2006 16:28
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France


  Before they realise that they need a key you can microwave the
 token.
  You can then surrender it when required and still meet your legal
  obligations... 'It must have been static damage officer...you need
 to
  be more careful with my equipment'
 
 Which in the UK at least could land you in prison for up to 10 years.
 


Evidence tampering is a severe crime in the United States, too.


 I wouldn't be surprised if the US Government at least *mandated*
 TPM-level access.


Don't any of you remember the Xerox scandal?
http://www.schneier.com/blog/archives/2005/10/secret_forensic.html

There's also code in high-end color Xerox copiers which prevents and/or
mangles copying of US currency. This was reported a few years ago IIRC.


Do you think Xerox decided to put these measures into their machinery
themselves? Or do you think they were asked/coaxed into doing it by The
Man


 Tony's point was that you could arrange not to have the 
authentication
 tokens anymore. You better hope they believe you when you say you
 don't have it, though.

Not having the authentication tokens counts as refusing to surrender
them.

Per US law, if a judge subpoenas you to hand them over and you refuse
and/or remain silent, it means indefinite jail time (until you hand
over the tokens) and/or fines.



RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony








2. The restrictions on encryption were
removed some years ago. The best encryption software comes from outside the USA anyway so
it was always a pointless exercise in futility.



Unless a vulnerability is found in 256 bit
AES it would take them longer than the ages of the universe to crack a key by
brute force no matter how many terraflops of power they have to task on your
key (not to mention the many others they might want to crack)



3. Filtering content is not quite the same
as signing code and pretending it comes from Microsoft. Such a piece of code would
have a changed checksum would likely be spotted and then analysed. I cant
see Microsoft doing that unless required by law.



4. TPM is part of the trusted computing
concept. It just makes it much harder. Not impossible.











From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ringo Kamens
Sent: 14 May 2006 18:31
To: or-talk@freehaven.net
Subject: Re: Some legal trouble
with TOR in France







There are a few key points that you are overlooking.











1. In support of the photocopying money scandal, most printers have
yellow dots imprinted on them that track date printed, serial number, etc. 











2. By US
export law, US companies are not allowed to export encryption larger than 56
bit (although it might have jumped to 128 a few years ago), unless it has been certified by the government. That
means unless it has a backdoor. Plus, governments have thousands of teraflops
of idle computer cycles waiting to crack your keys. 











3. How can you honestly think Microsoft wouldn't bend over for the US government.
They bent over for China.
Look at PGP. They moved to closed source after version 6.0 with no valid
reason. The reason is probably the government. 











4. In terms of using checksums to ensure your system hasn't been
tampered with, the computer hardware could have a defense system against that
such as trusted computing.











Ringo Kamens







On 5/14/06, Mike
Zanker [EMAIL PROTECTED]
wrote: 

On 14/5/06 15:10, Tony wrote:

 Nb-
failure to disclose keys is up to two years in prison. Not 10. 

 (5) A person guilty of an offence under this section shall be liable-

 (a) on conviction on indictment, to imprisonment for a term
not
 exceeding two years or to a fine, or to both; 
 (b) on summary conviction, to imprisonment for a term not
exceeding
 six months or to a fine not exceeding the statutory maximum, or to both.

Furthermore, that's part III of RIPA which hasn't been enacted yet. 

Mike.



This message has been scanned for viruses by MailController - www.MailController.altohiway.com












RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony








Again it is very unlikely. There are many options
to get the keys - like forcing you to divulge them or wire tapping your
keyboard.



If such a backdoor was included than it
would likely be spotted. Here are some comments on a similar accusation a few
years ago: http://www.cnn.com/TECH/computing/9909/13/backdoor.idg/













From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ringo Kamens
Sent: 14 May 2006 18:43
To: or-talk@freehaven.net
Subject: Re: Some legal trouble
with TOR in France





I'm not saying the AES is
weak. I'm saying that Microsoft might have implemented a back-door for
governments. They could store the private keys and passwords in videocard
memory or in the boot sector or something like that. 



On 5/14/06, Tony
[EMAIL PROTECTED] wrote:








2. The restrictions on encryption were removed some years
ago. The best encryption software comes from outside the USA anyway so
it was always a pointless exercise in futility. 



Unless a vulnerability is found in 256 bit AES it would take
them longer than the ages of the universe to crack a key by brute force no
matter how many terraflops of power they have to task on your key (not to
mention the many others they might want to crack) 



3. Filtering content is not quite the same as signing code
and pretending it comes from Microsoft. Such a piece of code would have a
changed checksum would likely be spotted and then analysed. I can't see
Microsoft doing that unless required by law. 



4. TPM is part of the trusted computing concept. It just
makes it much harder. Not impossible.











From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]
On Behalf Of Ringo Kamens
Sent: 14 May 2006 18:31






To: or-talk@freehaven.net
Subject: Re: Some
legal trouble with TOR in France







There are
a few key points that you are overlooking.

















1. In
support of the photocopying money scandal, most printers have yellow dots
imprinted on them that track date printed, serial number, etc. 











2. By US export law,
US companies are not allowed to export encryption larger than 56 bit (although
it might have jumped to 128 a few years ago), unless it has been certified by the government. That
means unless it has a backdoor. Plus, governments have thousands of teraflops
of idle computer cycles waiting to crack your keys. 











3. How can
you honestly think Microsoft wouldn't bend over for the US government.
They bent over for China.
Look at PGP. They moved to closed source after version 6.0 with no valid
reason. The reason is probably the government. 











4. In
terms of using checksums to ensure your system hasn't been tampered with, the
computer hardware could have a defense system against that such as trusted
computing. 











Ringo
Kamens







On
5/14/06, Mike Zanker  [EMAIL PROTECTED] wrote: 

On
14/5/06 15:10, Tony wrote:

 Nb-
failure to disclose keys is up to two years in prison. Not 10. 

 (5) A person guilty of an offence under this section shall be liable- 

 (a) on conviction on indictment, to imprisonment for a term
not
 exceeding two years or to a fine, or to both; 
 (b) on summary conviction, to imprisonment for a term not
exceeding
 six months or to a fine not exceeding the statutory maximum, or to both. 

Furthermore, that's part III of RIPA which hasn't been enacted yet. 

Mike.



This message has been scanned for viruses by MailController - www.MailController.altohiway.com