Re: [tor-talk] Pirate Linux 1.5
The clock is fine on Pirate Linux. I've been writing my emails with another OS, and now I think I fixed it :) On Thu, May 31, 2012 at 9:44 AM, Pascal wrote: > Looks like the first bug you need to fix is with NTP. Your clock is not > even close to right. > > -Pascal > > > > On 5/31/2012 2:07 PM, Andrew K wrote: >> >> But now, until probably October, I'll be too busy to add new features, >> so I'll just focus on maintaining bugs and important updates. > > ___ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] How to Control middle Nodes?
> windows... VoIP clients I use Phonerlite, it use UDP. > because of TOR is TCP based, I will use openvpn to > transferring udp packet through TOR network. > ... > I will use tor network only without hidden services. For hidden to hidden, consider using onioncat. > to connect openvpn and tor i use privoxy as socks5 proxy. Tor provides a SOCKS5 proxy on port 9050 by default, so using privoxy just increases latency and config, it is not needed. > I need tor bandwidth constantly about 30-34 kbps There are lower speed codecs in G.723.1 and G.729(A). Maybe Ogg has plugins too. > I got 2 calling test with latency less than 400 ms Latency is the larger problem and testing it is hard since isolating a single node for through Tor testing can only be done on the average after discounting the other nodes in the path. Easier would be doing some GeoLocation and try to ping prospective nodes in the clear. > try to find nodes with high bandwidth and low user. High bandwidth or low user rarely equals low latency. > I don't know how to set it up. > in windows, is there TorCtl file? You will need to create your own circuits using the Tor Control Protocol on port 9051. Read the man page and: https://gitweb.torproject.org/torspec.git/tree control-spec, socks-extensions, etc. You will need to write test and circuit building scripts. Might as well post them when you're done. Maybe no one has done this yet...? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] How to Control middle Nodes?
> My test, based on windows, so for VoIP clients I use Phonerlite, it use > UDP. because of TOR is TCP based, I will use openvpn to transferring udp > > packet through TOR network. You should look around, if you can find a voice client supporting TCP. Tunneling Voip-UDP with OpenVPN over Tor-TCP does not work well, even without Tor. __ powered by Secure-Mail.biz - anonymous and secure e-mail accounts. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
Looks like the first bug you need to fix is with NTP. Your clock is not even close to right. -Pascal On 5/31/2012 2:07 PM, Andrew K wrote: But now, until probably October, I'll be too busy to add new features, so I'll just focus on maintaining bugs and important updates. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] How to Control middle Nodes?
On 31/05/12 16:29, Maimun Rizal wrote: > My test, based on windows, so for VoIP clients I use Phonerlite, it use > UDP. because of TOR is TCP based, I will use openvpn to transferring udp > packet through TOR network. > Caller and Callee know each other. so this concept will anonymous to > third party only. > I will use tor network only without hidden services. > > I have make calling test with default tor configuration, from 10 calling > test, I got 2 calling test with latency less than 400 ms. so, in my > mind, there is possibility to transfer voice packets through tor network. > in this test, I need tor bandwidth constantly about 30-34 kbps. and > then, I configure Entry and Exit Nodes with high bandwidth. I did > calling test for this configuration. but did not calculate yet the result. > > for Entry and Exit Nodes, we can configure in torrc files, > we can use "EntryNodes $fingerprint,$fingerprint,$..." for specific > entry nodes and "ExitNodes $fingerprint,$fingerprint,..." for specific > exit nodes. but for middle nodes, I don't know how to set it up. > Reducing latency in this case, I should configure all nodes > (entry,middle,exit) in same Continent and try to find nodes with high > bandwidth and low user. to connect openvpn and tor i use privoxy as > socks5 proxy. > > in windows, is there TorCtl file? You may get better results by dropping the middle nodes altogether and just using two hop circuits. Depends on your anonymity requirements. Here's an old blog post I wrote to explain how to do it: https://grepular.com/Tor_Circuits_with_Two_Hops_on_Ubuntu -- Mike Cardwell https://grepular.com/ http://cardwellit.com/ OpenPGP Key35BC AF1D 3AA2 1F84 3DC3 B0CF 70A5 F512 0018 461F XMPP OTR Key 8924 B06A 7917 AAF3 DBB1 BF1B 295C 3C78 3EF1 46B4 signature.asc Description: OpenPGP digital signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
> Was it your answer to my question about upgrading Tails? Yes. I'm not sure exactly how the Tails upgrade system works, but I think it requires one to download a tails ISO and either burn it to DVD or install it to usb using the USB installer in tails or in another OS. If someone is using Tails booted from Pirate Linux, they can download the ISO from the Tails website, and use the USB installer there, it should work as long as they have enough RAM to store the ISO. If you have more detailed questions, feel free to ask me on IRC (akarmn, irc.oftc.net). On Thu, May 31, 2012 at 8:33 AM, intrigeri wrote: > Hi, > > AK wrote (31 May 2012 14:00:17 GMT) : >> From what I tested, no security feature is broken. > > Great. > >> It's meant to easily allow people to try Tails, an if they like it >> and they want the official version, they can go to the Tails website >> and download the latest ISO. > > Was it your answer to my question about upgrading Tails? > ___ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] How to Control middle Nodes?
Hi, My test, based on windows, so for VoIP clients I use Phonerlite, it use UDP. because of TOR is TCP based, I will use openvpn to transferring udp packet through TOR network. Caller and Callee know each other. so this concept will anonymous to third party only. I will use tor network only without hidden services. I have make calling test with default tor configuration, from 10 calling test, I got 2 calling test with latency less than 400 ms. so, in my mind, there is possibility to transfer voice packets through tor network. in this test, I need tor bandwidth constantly about 30-34 kbps. and then, I configure Entry and Exit Nodes with high bandwidth. I did calling test for this configuration. but did not calculate yet the result. for Entry and Exit Nodes, we can configure in torrc files, we can use "EntryNodes $fingerprint,$fingerprint,$..." for specific entry nodes and "ExitNodes $fingerprint,$fingerprint,..." for specific exit nodes. but for middle nodes, I don't know how to set it up. Reducing latency in this case, I should configure all nodes (entry,middle,exit) in same Continent and try to find nodes with high bandwidth and low user. to connect openvpn and tor i use privoxy as socks5 proxy. in windows, is there TorCtl file? Best regards, Maimun On 5/31/12 12:27 PM, Fabio Pietrosanti (naif) wrote: On 5/31/12 12:21 PM, Maimun Rizal wrote: Hi all, I want to know how to control middle nodes in TOR? Currently, I want to do voip through Tor network, i have tried make 10 test call, but only 2 test call with latency less than 400 ms, so, my plan to control nodes in tor which through by voice packet. - Which kind of software are you trying to use for such VoIP? - Which protocol does it uses? - Are you trying to achieve mutual-anonimity, so communicating with Tor Hidden Services or going with/trough an Internet peer? In order to control the middle node i would suggest you to create a code that, via Tor Control Protocol, establish manually Tor Circuits, Measure the latency. Then by default Circuit change every 10 minutes. You need to put it to an higher value, so that when you find a circuit that have the latency caracteristics that you need, you can use this. But you probably need to make some manual scripting/hacking trough TorCtl/Tor Control Protocol. -naif ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
Hi, AK wrote (31 May 2012 14:00:17 GMT) : > From what I tested, no security feature is broken. Great. > It's meant to easily allow people to try Tails, an if they like it > and they want the official version, they can go to the Tails website > and download the latest ISO. Was it your answer to my question about upgrading Tails? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
>From what I tested, no security feature is broken. The system is booted in the standard way, and all the log messages on bootup and startup look the same. The reason the USB installer doesn't work is because it relies on the filesystem mounted to /live/image, which includes some non tails files, and causes it to think there's not enough space. It's meant to easily allow people to try Tails, an if they like it and they want the official version, they can go to the Tails website and download the latest ISO. On Thu, May 31, 2012 at 7:46 AM, intrigeri wrote: > Hi, > > Andrew K wrote (31 May 2012 19:07:54 GMT) : >> - Convenient access from the boot menu to the Tails Amnesic Incognito >> Live System (This method of using Tails is not officially supported >> by the Tails developers, and some features such as the USB installer >> may not work). > > It always feels good to see Tails spread around, but given the > non-standard way this one is installed, I feel compelled to ask: > > Is any security feature of Tails known to be broken? > How are users supposed to upgrade the Tails provided by Pirate Linux? > ___ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Pirate Linux 1.5
Hi, Andrew K wrote (31 May 2012 19:07:54 GMT) : > - Convenient access from the boot menu to the Tails Amnesic Incognito > Live System (This method of using Tails is not officially supported > by the Tails developers, and some features such as the USB installer > may not work). It always feels good to see Tails spread around, but given the non-standard way this one is installed, I feel compelled to ask: Is any security feature of Tails known to be broken? How are users supposed to upgrade the Tails provided by Pirate Linux? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Pirate Linux 1.5
Pirate Linux 1.5 has just been released. The main OS in the ISO is based off Ubuntu 12.04. You can also just download piratepack, which is a DEB package which installs essentially the same features and has been tested on Ubuntu 10+ and Debian 6. Download page: http://piratelinux.org/?page_id=2 Features page: http://piratelinux.org/?page_id=15 Get started with this Guide: http://piratelinux.org/?page_id=275 Notable Tor features: - Tor Web Browser that uses your default Firefox. (Contains the addons Bloody Vikings, HTTPS-Everywhere, NoScript, Torbutton, websocket disabled). - Tor IRC. (pidgin with OTR connected to Tor with a random username and some relevant chat rooms added to list) - Easily create multiple Tor (Vidalia) instances. - Convenient access from the boot menu to the Tails Amnesic Incognito Live System (This method of using Tails is not officially supported by the Tails developers, and some features such as the USB installer may not work). Some future plans: - Only updates get compiled. - Gentoo package. - Pirate Linux Server Edition. But now, until probably October, I'll be too busy to add new features, so I'll just focus on maintaining bugs and important updates. signature.asc Description: OpenPGP digital signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] How to Control middle Nodes?
On 5/31/12 12:21 PM, Maimun Rizal wrote: > Hi all, > I want to know how to control middle nodes in TOR? > > Currently, I want to do voip through Tor network, i have tried make 10 > test call, but only 2 test call with latency less than 400 ms, so, my > plan to control nodes in tor which through by voice packet. - Which kind of software are you trying to use for such VoIP? - Which protocol does it uses? - Are you trying to achieve mutual-anonimity, so communicating with Tor Hidden Services or going with/trough an Internet peer? In order to control the middle node i would suggest you to create a code that, via Tor Control Protocol, establish manually Tor Circuits, Measure the latency. Then by default Circuit change every 10 minutes. You need to put it to an higher value, so that when you find a circuit that have the latency caracteristics that you need, you can use this. But you probably need to make some manual scripting/hacking trough TorCtl/Tor Control Protocol. -naif ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] How to Control middle Nodes?
Hi all, I want to know how to control middle nodes in TOR? Currently, I want to do voip through Tor network, i have tried make 10 test call, but only 2 test call with latency less than 400 ms, so, my plan to control nodes in tor which through by voice packet. I did "EntryNodes $fingerprint,..." and "ExitNodes $fingerprint,..." in Torrc to control entry and exit node. But i can not control middle node. So I want to know, is there a way to control middle nodes? If so, how?. Perhaps, with control all nodes, i can decrease latency. I am looking forward to hear from all of you, Thanks, Best Regards, Maimun ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk