[tor-talk] (no subject)

2014-10-01 Thread peterholy SARRIS
SARRIS good day I need help . running tor onion  browser bundle on a
Panasonic Toughbook cf-29  running on 32bit 14.04 Ubuntu oS only  .
Microsoft  windows has been removed out of the thoughbook . like you to
send to me a how to run tor onion browser via command prompt  on a
Panasonic thoughbook cf-29 running only on a 32 bit 14.04 Ubuntu operating
system .
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor in the media

2014-10-01 Thread Patrick
Hi everyone,

Over the past few weeks, I've talked with a number of Tor people about how
the project is portrayed in the media. As a reporter on this beat, the many
legitimate criticisms the community have had strike pretty close to home
for me. I don't think I need to tell this list why Tor's portrayal in the
media is important, now more than ever. So, with the blessing and
encouragement of a couple of official Tor people, I've got a question to
ask of tor-talk (secure contact info follows at the bottom of the message):

-- What untold but important stories about Tor are you willing to share?

When writing about Tor, it's relatively easy to write about, for instance,
popular hidden services (and I've admittedly done it plenty). The drug
markets that advertise themselves and run a business are often more than
willing to talk to reporters. They're even proactive about it.

It's much tougher for a reporter to nail down important Tor stories about,
as another example, domestic abuse victims using the software or political
activists protecting their lives with it. That makes perfect sense, those
people rely on anonymity in a much different way than enterprising drug
dealers, but this reality makes it trickier for reporters to tell the full
story when it comes to Tor. The trick, then, is to be proactive as well.

I recently took a swing at writing precisely the kind of article I'm
talking about--an untold but important story about how Tor is used in the
wild--here:
http://kernelmag.dailydot.com/issue-sections/features-issue-sections/10393/tor-transgender-military-service/
... I was inspired in large part by articles like this:
http://betaboston.com/news/2014/05/07/as-domestic-abuse-goes-digital-shelters-turn-to-counter-surveillance-with-tor/.
The BetaBoston article is very good, obviously, but it's a too-rare breed.

I'd like to hear from anyone who might be willing to talk about (on the
record or off) untold but important Tor stories that can shed light on the
way the software serves its users. By design, I'll never get the full
picture, but we can surely do more than surface scratching.

If you have a story to tell, if you know someone who might, if you can
think of others who I should be talking to, or if you have a good direction
to point me in, I would love to hear from you. Or if you just want to talk
more about Tor in the media, that's a topic I'm really interested in as
well to be honest, so I'm happy to talk about that.

If you're interested in talking (again, on the record or off, it's still
valuable to hear stories I won't write about), you can find my contact info
and PGP key at http://www.patrickhowelloneill.com/contact , you can email
me here (my personal email), or at p...@dailydot.com. Obviously we can also
work out other ways of communicating if need be.

Thanks!
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Ted Smith
On Wed, 2014-10-01 at 16:33 -0400, Derric Atzrott wrote:
> > So then blocking Tor is intended to block people that temporarily have
> > access to large amounts of unblocked IP addresses, but usually are IP
> > blocked?
> > 
> > Who does this apply to? If a vandal has access to unblocked IP addresses
> > to make accounts, they can just use those to edit or sockpuppet.
> 
> So I don't actually administer blocks on English Wikipedia, and I am not
> an editor on any other language Wikipedias, but on English Wikipedia this
> is what I understand the process to be.
> 
> When a user acts up and has an account we temporarily block that account.
> If they decided to create another account we usually block the new account
> permanently and hard-block the IP address that they are accessing the site
> from.  This prevent them from making a new account or sockpuppeting while
> logged out.  Most users don't evade blocks, so this tends to work pretty
> well.
> 
> With Tor unblocked a significant minority of those users who had their
> IP
> address hard-blocked will use Tor to create new accounts and continue
> to cause problems.  With Tor blocked they have to find another means.
> Some of them do, but most of them give up.  Its a war of attrition.
> We know that problematic people /will/ find a way to cause a problem,
> we just make it expensive enough that they get bored and don't bother.

With Tor soft-blocked, this problem goes away. What am I missing?

-- 
Sent from Ubuntu


signature.asc
Description: This is a digitally signed message part
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Derric Atzrott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> So then blocking Tor is intended to block people that temporarily have
> access to large amounts of unblocked IP addresses, but usually are IP
> blocked?
> 
> Who does this apply to? If a vandal has access to unblocked IP addresses
> to make accounts, they can just use those to edit or sockpuppet.

So I don't actually administer blocks on English Wikipedia, and I am not
an editor on any other language Wikipedias, but on English Wikipedia this
is what I understand the process to be.

When a user acts up and has an account we temporarily block that account.
If they decided to create another account we usually block the new account
permanently and hard-block the IP address that they are accessing the site
from.  This prevent them from making a new account or sockpuppeting while
logged out.  Most users don't evade blocks, so this tends to work pretty
well.

With Tor unblocked a significant minority of those users who had their IP
address hard-blocked will use Tor to create new accounts and continue
to cause problems.  With Tor blocked they have to find another means.
Some of them do, but most of them give up.  Its a war of attrition.
We know that problematic people /will/ find a way to cause a problem,
we just make it expensive enough that they get bored and don't bother.

We block all proxies that we know of for the same reason.  Apparently
that significant minority of folks that would abuse Tor seems to
outnumber those who legitimately use Tor, or at least that is the
impression those who have to clean up the mess have.

The point of an IP Block Exemption (IPBE) is to give an especially
trusted user the ability to login and edit even if they are doing
so from a hard-blocked IP address.  All administrators automatically
have this flag.

As far as I know the reason why it is not given out easily is that
in the past some users would create extra accounts before they were
blocked, and make some constructive edits with those accounts.  Then
when their main account was blocked, they would wait long enough for
the IP addresses on the sleeper accounts to be removed from our logs
and then request IP Block Exemptions via email.  This is also why
you can't just email in and say "Hey, can you make me an account
please and give it an IPBE? kthxby"

Personally I think the policy for IPBEs has swung too far in the
direction of never-give-them-out, but I don't think I will have
any luck changing that unless I can find some way to help assure
that it is still very expensive for vandals and sockpuppets to
use Tor and proxies to evade blocks.

Does that answer the question?  Or am I still unclear?

Thank you,
Derric Atzrott
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFULGUERHoDdZBwKDgRAiBUAJ43QbhZXedzO0RFOkKQNdo+C/f2DACfXcL7
7wsoZQWU1x4egsKhYfmINQM=
=u9uT
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Derric Atzrott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> it did. very clear now. sorry for not grokking it better first time
> around.

No worries.  Such things happen; I could have been more clear.

> Thanks for bringing this up once more! The topic seems to recur even 
> more frequently than once a year around here.

I'm glad to hear that!

> Two recent and relevant discussions:
> 
> Your colleague Lane Rasberry started a similar thread earlier this year 
> and an accompanying IdeaLab page, read more here:
> https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-february-19th-2014 
> (third item down) and 
>
https://meta.wikimedia.org/wiki/Grants:IdeaLab/Partnership_between_Wikimedia_com
munity_and_Tor_community

I'll read those and see what I can get out of them.  I'm
glad that Lane has been involved in trying to work on this as 
well.  A while back he offered to work with me on a project if I wanted
to.  Perhaps this would be the oppurtunity to take him up on that as
we seem to have similar goals here.

> Not Wikimedia-specific, but Roger Dingledine recently wrote about paths 
> to letting web services feel they can accept anonymous users, and 
> mentioned an upcoming project on Wikipedia at the end:
>
https://blog.torproject.org/blog/call-arms-helping-internet-services-accept-anon
ymous-users

This was actually one of the posts that inspired me to try to take some
action on this.  See [1] for my original post on Wikitech-l where I
mention that very blog post.  Roger mentions Wikimedia several times
in his blog post.

> It would be good if the experience of these and other previous 
> discussions could be built upon, otherwise I fear this topic will 
> continue to circle morosely on the luggage carousel of things that ought 
> to be done, with no takers.

I've tried to do that with the Wikitech-l discussions.  I tried to read
through all of the previous discussions on the topic and sum up their
contents so that everyone was up to speed and could quickly figure
out what had been discussed before and why it didn't work.

You can see that post here: [2].  It might actually be worth giving
a look over even as this is a topic that has been discussed at least
a few times already in the Wikimedia Technical community.

> Thank you for running an exit relay!

You're welcome! Hopefully I can keep it online.  I went with Leaseweb
as they seem to be pretty friendly to relays.  I'm in talks with a
local datacentre here in my city in the United States to see if they'll
let me run a relay out of there as well.

Also I appologise to everyone for my long posts. I know that they are
a lot to read.

Thank you,
Derric Atzrott

[1]: https://www.mail-archive.com/wikitech-l@lists.wikimedia.org/msg78218.html
[2]: https://www.mail-archive.com/wikitech-l@lists.wikimedia.org/msg78225.html
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFULGFnRHoDdZBwKDgRAoVhAJ4zYajyCg8O1yF1LtB7/AHbE4kJbwCdHbPg
MOplkqKNYYbRxw6/wjlCHhs=
=PvHP
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Ted Smith
On Wed, 2014-10-01 at 15:50 -0400, Derric Atzrott wrote:
> > this is extremely interesting--thank you! but would this work for Tor,
> > since presumably the IPs that are blocked are those of the exit relays?
> > 
> > I am proposing keeping the IPs blocked but opening them up for certain
> > logged-in accounts--I don't know if that is technically possible, but it
> > seems like a narrower solution, and also theoretically less open to
> > abuse/spoofing than unblocking entire IP addresses. (maybe.)
> 
> I think you may have misunderstood.  An IP Block Exemption is a flag
> applied to a specific account that allows it to ignore IP blocks.
> 
> There are two types of blocks that we use for IP addresses, hard blocks
> and soft blocks.  A hard block means that if you are using that IP address
> you cannot edit Wikipedia.  A soft block means that if you are using that
> IP address, you can edit Wikipedia, but only if logged in, and you cannot
> make an account.  Many highschools are soft-blocked.  All of Tor is hard-
> blocked.  Having the IPBE flag on your account allows you to treat all
> hard-blocks as though they are soft-blocks.

So then blocking Tor is intended to block people that temporarily have
access to large amounts of unblocked IP addresses, but usually are IP
blocked?

Who does this apply to? If a vandal has access to unblocked IP addresses
to make accounts, they can just use those to edit or sockpuppet.

-- 
Sent from Ubuntu


signature.asc
Description: This is a digitally signed message part
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread z9wahqvh
On Wed, Oct 1, 2014 at 3:50 PM, Derric Atzrott  wrote:

>
> Did that explain it any better?
>

it did. very clear now. sorry for not grokking it better first time
around.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread harmony

On 2014-10-01 13:57, Derric Atzrott wrote:

Good day all,


Hi,

Thanks for bringing this up once more! The topic seems to recur even 
more frequently than once a year around here.


Two recent and relevant discussions:

Your colleague Lane Rasberry started a similar thread earlier this year 
and an accompanying IdeaLab page, read more here:
https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-february-19th-2014 
(third item down) and 
https://meta.wikimedia.org/wiki/Grants:IdeaLab/Partnership_between_Wikimedia_community_and_Tor_community


Not Wikimedia-specific, but Roger Dingledine recently wrote about paths 
to letting web services feel they can accept anonymous users, and 
mentioned an upcoming project on Wikipedia at the end:

https://blog.torproject.org/blog/call-arms-helping-internet-services-accept-anonymous-users

It would be good if the experience of these and other previous 
discussions could be built upon, otherwise I fear this topic will 
continue to circle morosely on the luggage carousel of things that ought 
to be done, with no takers.


Additionally it should be noted that I have a passing familiarity with 
Tor as
both a user and recently became an exit relay operator, though if I 
missed

something blindly obvious, definitely please point it out to me!


Thank you for running an exit relay!
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Derric Atzrott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> this is extremely interesting--thank you! but would this work for Tor,
> since presumably the IPs that are blocked are those of the exit relays?
> 
> I am proposing keeping the IPs blocked but opening them up for certain
> logged-in accounts--I don't know if that is technically possible, but it
> seems like a narrower solution, and also theoretically less open to
> abuse/spoofing than unblocking entire IP addresses. (maybe.)

I think you may have misunderstood.  An IP Block Exemption is a flag
applied to a specific account that allows it to ignore IP blocks.

There are two types of blocks that we use for IP addresses, hard blocks
and soft blocks.  A hard block means that if you are using that IP address
you cannot edit Wikipedia.  A soft block means that if you are using that
IP address, you can edit Wikipedia, but only if logged in, and you cannot
make an account.  Many highschools are soft-blocked.  All of Tor is hard-
blocked.  Having the IPBE flag on your account allows you to treat all
hard-blocks as though they are soft-blocks.

Did that explain it any better?

Thank you,
Derric Atzrott
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFULFsORHoDdZBwKDgRAhRPAJ4q+f6M9/KkZ1YvRjJ8hVXJI/a3QACeNCI6
13cqgBU6HIW2jwrKNTti0Yk=
=PMxs
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Derric Atzrott
> hi people
> i am unfamiliar with this stuff. how many people can see/ read this here?

The logs for this mailing list are publicly available.

Don't say anything you don't want the world to know.

Thank you,
Derric Atzrott

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread z9wahqvh
On Wed, Oct 1, 2014 at 2:42 PM, Derric Atzrott  wrote:

>
> There is a mechanism for this.  It is called an IP Block Exemption (IPBE),
> sadly it is very hard to get because people fear its abuse so much.  I have
> actually only just got it after I brought up the topic of Tor and talked
> to some folks off-list about why Tor matters to me.  I've been editing
> Wikipedia for over five years now.
>
>
this is extremely interesting--thank you! but would this work for Tor,
since presumably the IPs that are blocked are those of the exit relays?

I am proposing keeping the IPs blocked but opening them up for certain
logged-in accounts--I don't know if that is technically possible, but it
seems like a narrower solution, and also theoretically less open to
abuse/spoofing than unblocking entire IP addresses. (maybe.)
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Greg Curcio
hi people
i am unfamiliar with this stuff. how many people can see/ read this here?

Greg Curcio

On Wed, Oct 1, 2014 at 11:34 AM, Mirimir  wrote:

> On 10/01/2014 12:10 PM, Derric Atzrott wrote:
>
> 
>
> >> Even imposing a nontrivial cost for creating accounts (say 10 BTC) would
> >> not help. Determined adversaries would pay it. And of course, that would
> >> exclude numerous innocents who wouldn't or couldn't pay.
> >
> > Yeah, I was just listing off some items that we came up with
> brainstorming
> > over the past few years.  Clearly that item was cut fairly quickly.  Some
> > type of proof of work might work, so long as it was expensive enough to
> > deter attackers after the first few times while still cheap enough to
> > generate just once for well behaved actors.
>
> Wikimedia could authenticate users with GnuPG keys. As part of the
> process of creating a new account, Wikimedia could randomly specify the
> key ID (or even a longer piece of the fingerprint) of the key that the
> user needs to generate. Generating the key would require arbitrarily
> great effort, but would impose negligible cost on Wikimedia or users
> during subsequent use. Although there's nothing special about such GnuPG
> keys as proof of work, they're more generally useful.
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How does Tor help abuse victims?

2014-10-01 Thread Mirimir
On 10/01/2014 12:21 PM, Sebastian G.  wrote:
> Mimir:
>> Tor can provide anonymity, including location anonymity, for victims of
>> offline abuse, who have perhaps relocated for protection. Even for
>> victims of online abuse, Tor can help protect against doxing.
> 
> I hadn't imagined that victims keep in contact with their abusers or
> have their communication data exposed to their abusers.

Often there are associations through family, mutual friends, etc. Errors
of judgment are not uncommon. For example, it's trivial to learn
someone's IP address using an image tag in email, forum post, etc.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Derric Atzrott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> Is there any mechanism available by which, e.g., known & trusted editors
> could request Tor access for specific login credentials/accounts, and Tor
> only allowed for those accounts? This would also help to address Derric's
> interest in allowing users from repressive regimes without allowing the
> vast amounts of destructive edits that have so far come from Tor. Since
> Wikimedia accounts are designed to be at least quasi-anonymous, placing a
> request for Tor access through the Wikimedia messaging system should not in
> itself reveal one's identity.
> 
> so one way to get one of these accounts would be, as many of us do, create
> a regular (non-Tor) account, perform a good number of simple,
> non-destructive edits (cleaning up already-marked items on WP pages, for
> example), and then to request a special Tor account.

There is a mechanism for this.  It is called an IP Block Exemption (IPBE),
sadly it is very hard to get because people fear its abuse so much.  I have
actually only just got it after I brought up the topic of Tor and talked
to some folks off-list about why Tor matters to me.  I've been editing
Wikipedia for over five years now.

Generally they point to the fact that you can just turn off Tor when you
want to edit Wikipedia, which misses the point, but is still the general
response.  Erik Moller, Deputy Director, at the Wikimedia Foundation,
actually tested the system for getting an IPBE once a few years ago and
it failed his test miserably.  The criteria are too high for most users,
even established ones.

> maybe if this works for established editors, a trial could be run to allow
> a limited number of new accounts through Tor to be set up, again by
> personal request, and edits allowed only through those approved accounts,
> allowing the Wikimedia software to carefully watch over these accounts for
> destructive editing and blocking them if this happens. People would
> therefore not be allowed to automatically create accounts in Tor in
> Wikimedia projects, nor to edit without logging in, but if the method
> works, a certain amount of editing over Tor could be possible.

Anyone can email in to get an account made, its getting the IPBE that is
hard.

> the overhead in approving accounts would be relatively low, and a limited
> number could be created, so that not a great deal of oversight would be
> necessary. Perhaps even a secure messaging facility could be created to
> request such accounts (if it doesn't exist already).

We have a system for handling emailed in requests of all sorts.  We make
use of OTRS to handle the sites email inboxes and have a limited number
of highly trusted volunteers that handle answering mail and making sure
requests, like account creation, get directed to the proper people.

> I would presume that a Tor-based Wikimedia account opened solely by
> messaging Wikimedia securely would be relatively hard to track down to a
> specific individual (especially if it eventually becomes possible to
> request these without first becoming a trusted editor), but I may not be
> thinking through all the possibilities.

Definitely.  And the system you describe in your email is basically the
status-quo.  Tor and all other proxies we can find are blocked unless you
have an IP Block Exemption on your account, in which case you are good to
go.  The problem is that getting an IP Block Exemption is so difficult
for a variety of social and policy reasons.

I'm hoping that if some sort of technical solution can be come up with
that would allow us to reduce the risk of abuse to the level that we have
with non-anonymous IP users editing (so blocks work in most cases, except
for that odd guy who knows how to set up a proxy themselves, or is willing
to drive to 15 different Wi-fi hotspots around town) that I will have
more luck in changing the attitudes and policy towards Tor.  The end
goal is to either have Tor completely unblocked or have the process
for getting an IPBE made significantly easier.

A few folks pointed out on the Wikimedia technical mailing list that the
problem is more of a social issue, that appears like it could have a
clever technical solution, but is really just a social problem.
Personally I believe that while it is partially a social problem, a clever
technical solution might alleviate that some and help change attitudes.

Thank you,
Derric Atzrott
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFULEr0RHoDdZBwKDgRAr1jAKCvSdfu2TS7TnGry1HUEcUmO0l/EwCgl6HP
RRM2CfqewksCboVz/lPBq78=
=XA+w
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Mirimir
On 10/01/2014 12:10 PM, Derric Atzrott wrote:



>> Even imposing a nontrivial cost for creating accounts (say 10 BTC) would
>> not help. Determined adversaries would pay it. And of course, that would
>> exclude numerous innocents who wouldn't or couldn't pay.
> 
> Yeah, I was just listing off some items that we came up with brainstorming
> over the past few years.  Clearly that item was cut fairly quickly.  Some
> type of proof of work might work, so long as it was expensive enough to
> deter attackers after the first few times while still cheap enough to
> generate just once for well behaved actors.

Wikimedia could authenticate users with GnuPG keys. As part of the
process of creating a new account, Wikimedia could randomly specify the
key ID (or even a longer piece of the fingerprint) of the key that the
user needs to generate. Generating the key would require arbitrarily
great effort, but would impose negligible cost on Wikimedia or users
during subsequent use. Although there's nothing special about such GnuPG
keys as proof of work, they're more generally useful.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How does Tor help abuse victims?

2014-10-01 Thread Sebastian G.
Mimir:
> Tor can provide anonymity, including location anonymity, for victims of
> offline abuse, who have perhaps relocated for protection. Even for
> victims of online abuse, Tor can help protect against doxing.

I hadn't imagined that victims keep in contact with their abusers or
have their communication data exposed to their abusers.

01.10.2014, 19:49 Derric Atzrott:
>> I appear to lack imagination on how Tor helps abuse victims. Since some
>> of you are involved with some organizations working in that field, I
>> hope you give some insight.
>>
>> Personally I see no benefit in using Tor from the point of view of an
>> abuse victim. Beside the properties why anyone could use Tor.
>>
>> Quite the opposite, the abuser seems to gain more by using Tor, if
>> he/she (mostly he) is anonymous in the first place.
> 
> I know of at least one use case that I have personally seen.
> 
> A lot of abuse victims have never told anyone or have told very few
> folks that they are victims of abuse.  It's one of those things that
> people just don't feel comfortable talking about, and for a good
> reason, as abuse victims are often stigmatised by our society and
> there is a great deal of victim blaming that happens. [break]

Unfortunately that appears to be true in some cases, for whatever amount
of 'some'.

> There exists
> online a number of websites where victims of abuse can privately
> get together to discuss their past or current abuse and find ways
> to either get out of the situation or move on with life.

I see that this holds a higher risk of being exposed than just visiting
a website dealing with abuse.

> These sorts of things are a godsend for such people.

Indeed, I think it is.

Up to this point there is nothing I would have not claimed to be Tor not
being useful for, it's just that I'd recommend people to look up or
discuss their medical conditions for the same reasons.

> Another use-case would be the anonymous reporting of abusers.  In
> this case someone who is not the abuse victim, but knows of the
> abuse can report it without fearing reprisal from the abuser.  This
> is the same sort of logic that led to anonymous tip lines for police
> stations.

That is something I had not imagined for abuse cases. I'm familiar with
this being useful for dissidents or leaking of documents about war
crimes, environmental issues, corruption and such things.

> Thank you,
> Derric Atzrott
> 

Thank you both. To avoid overloading tor-talk, I consider myself
satisfied with the replies I got (because I am), if however others want
to add something, because it is good to have success stories of Tor on
tor-talk, then please add what you think.

Regards,
Sebastian G. bastik
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How does Tor help abuse victims?

2014-10-01 Thread Lluís
I have been a victim of discrimination, for political issues,
for some time.

The anonymity Tor offers may improve the victim's life
in many things, from finding a job to communicate to
others, completely free from their abusers. They
may even set up blogs or web pages to expose the
ones who harass them.

Lluis Sala
Spain

On 10/01/2014 07:49 PM, Derric Atzrott wrote:
>> I appear to lack imagination on how Tor helps abuse victims. Since some
>> of you are involved with some organizations working in that field, I
>> hope you give some insight.
>>
>> Personally I see no benefit in using Tor from the point of view of an
>> abuse victim. Beside the properties why anyone could use Tor.
>>
>> Quite the opposite, the abuser seems to gain more by using Tor, if
>> he/she (mostly he) is anonymous in the first place.
> 
> I know of at least one use case that I have personally seen.
> 
> A lot of abuse victims have never told anyone or have told very few
> folks that they are victims of abuse.  It's one of those things that
> people just don't feel comfortable talking about, and for a good
> reason, as abuse victims are often stigmatised by our society and
> there is a great deal of victim blaming that happens.  There exists
> online a number of websites where victims of abuse can privately
> get together to discuss their past or current abuse and find ways
> to either get out of the situation or move on with life.
> 
> These sorts of things are a godsend for such people.
> 
> Another use-case would be the anonymous reporting of abusers.  In
> this case someone who is not the abuse victim, but knows of the
> abuse can report it without fearing reprisal from the abuser.  This
> is the same sort of logic that led to anonymous tip lines for police
> stations.
> 
> Thank you,
> Derric Atzrott
> 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Derric Atzrott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> You can't reliably block by IP address. It's unfair, because numerous
> users behind a NAT router will have the same public IP address. And it's
> also trivial to evade using proxies, with or without Tor. Blocking Tor
> (or even all known proxies) only stops the clueless. Anyone serious
> about evading a block could just use a private proxy on AWS (via Tor).

We do not usually permanently block IP addresses, and blocking them
only prevents editing not reading.  The purpose of a block is not
punitive, but to prevent abuse long enough that the attacker gives
up and moves on with life.

Blocking an IP address for a week to a couple of months and working
to identify IP addresses that permanently belong to organisations
such as schools or libraries stops the vast majority of abuse.  We
also work with Sysadmins at schools and libraries to get them to
pass XFF headers through their proxies so that we can block
individuals on their networks rather than the entire network.

I agree that blocking Tor or proxies is a pointless exercise, but I
can't argue with the folks that say that most of what comes from Tor
is abuse.  This is why I want to try to find a better way to solve
the problem than just blocking Tor (or for that matter proxies in
general as any solution to this should work pretty well for them).

> Even imposing a nontrivial cost for creating accounts (say 10 BTC) would
> not help. Determined adversaries would pay it. And of course, that would
> exclude numerous innocents who wouldn't or couldn't pay.

Yeah, I was just listing off some items that we came up with brainstorming
over the past few years.  Clearly that item was cut fairly quickly.  Some
type of proof of work might work, so long as it was expensive enough to
deter attackers after the first few times while still cheap enough to
generate just once for well behaved actors.

> That would exclude numerous users living under repressive regimes. But
> then, Wikimedia is already doing that by blocking edits by Tor users.

Indeed.  In some parts of China and Iran Tor is one of the only ways to
even read Wikipedia.

> The bottom line is that blocking Tor harms numerous innocent users, and
> by no means excludes seriously malicious users.

I agree that it harms numerous innocent users, but it does stop those
wish to hurt Wikipedia's content or community who are savvy enough to
know how to evade a simple IP block, but not savvy enough to know
how to set up their own proxy server.  This is apparently a surprisingly
large set of people.

Just a note.  I've never had to stop abuse from Tor and the only evidence
I have for the abuse is ancedotal stories from those who have.  It is
those people though that I have to convince to allow Tor because without
their support I stand no chance of getting it unblocked.  I am working on
trying to get together an idea for a limited trial with Tor unblocked
to see what happens, but I will be able to convince folks to unblock
Tor for a few days to gather data.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFULEORRHoDdZBwKDgRAgGFAKCOrrCiNfs32ilAbjKgCJv1e2Q0xACeN5KS
BSnOaHjpbuXU0R/zw2ypH1o=
=81Ch
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How does Tor help abuse victims?

2014-10-01 Thread Derric Atzrott
> I appear to lack imagination on how Tor helps abuse victims. Since some
> of you are involved with some organizations working in that field, I
> hope you give some insight.
>
> Personally I see no benefit in using Tor from the point of view of an
> abuse victim. Beside the properties why anyone could use Tor.
>
> Quite the opposite, the abuser seems to gain more by using Tor, if
> he/she (mostly he) is anonymous in the first place.

I know of at least one use case that I have personally seen.

A lot of abuse victims have never told anyone or have told very few
folks that they are victims of abuse.  It's one of those things that
people just don't feel comfortable talking about, and for a good
reason, as abuse victims are often stigmatised by our society and
there is a great deal of victim blaming that happens.  There exists
online a number of websites where victims of abuse can privately
get together to discuss their past or current abuse and find ways
to either get out of the situation or move on with life.

These sorts of things are a godsend for such people.

Another use-case would be the anonymous reporting of abusers.  In
this case someone who is not the abuse victim, but knows of the
abuse can report it without fearing reprisal from the abuser.  This
is the same sort of logic that led to anonymous tip lines for police
stations.

Thank you,
Derric Atzrott

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How does Tor help abuse victims?

2014-10-01 Thread Mirimir
On 10/01/2014 11:20 AM, Sebastian G.  wrote:
> I appear to lack imagination on how Tor helps abuse victims. Since some
> of you are involved with some organizations working in that field, I
> hope you give some insight.
> 
> Personally I see no benefit in using Tor from the point of view of an
> abuse victim. Beside the properties why anyone could use Tor.
> 
> Quite the opposite, the abuser seems to gain more by using Tor, if
> he/she (mostly he) is anonymous in the first place.

Tor can provide anonymity, including location anonymity, for victims of
offline abuse, who have perhaps relocated for protection. Even for
victims of online abuse, Tor can help protect against doxing.

> Thank you for anything I must be missing here.
> 
> Regards,
> Sebastian G. bastik
> 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] How does Tor help abuse victims?

2014-10-01 Thread Sebastian G.
I appear to lack imagination on how Tor helps abuse victims. Since some
of you are involved with some organizations working in that field, I
hope you give some insight.

Personally I see no benefit in using Tor from the point of view of an
abuse victim. Beside the properties why anyone could use Tor.

Quite the opposite, the abuser seems to gain more by using Tor, if
he/she (mostly he) is anonymous in the first place.

Thank you for anything I must be missing here.

Regards,
Sebastian G. bastik
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Hidden Services - Access control.

2014-10-01 Thread Griffin Boyce

Sebastian G.  wrote:


How does that hide the existence of the hidden-service?


  It shouldn't actually resolve if you don't have the authorization 
details in your torrc file.


~Griffin
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Hidden Services - Access control.

2014-10-01 Thread Sebastian G.
01.10.2014, 15:41 Lunar:
> coderman:
>> On 9/30/14, Lluís  wrote:
>>> ...
>>> I didn't find anything about access control,
>>> is there anyway of doing this ?
>>> Can I hide the *.onion address to anyone, but me ?
>>
>> you cannot hide the existence of the *.onion, as these are "location
>> hidden" not "existence hidden".
> 
> I believe you are mistaken. Quoting tor manpage:
> 
>HiddenServiceAuthorizeClient auth-type client-name,client-name,...
>If configured, the hidden service is accessible for
>authorized clients only. The auth-type can either be
>'basic' for a general-purpose authorization protocol or
>'stealth' for a less scalable protocol that also hides
>service activity from unauthorized clients. Only clients
>that are listed here are authorized to access the hidden
>service. Valid client names are 1 to 16 characters long
>and only use characters in A-Za-z0-9+-_ (no spaces). If
>this option is set, the hidden service is not accessible
>for clients without authorization any more. Generated
>authorization data can be found in the hostname file.
>Clients need to put this authorization data in their
>configuration file using HidServAuth.
> 
> 
> 

How does that hide the existence of the hidden-service?

Regards,
Sebastian G. bastik
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread z9wahqvh
On Wed, Oct 1, 2014 at 9:57 AM, Derric Atzrott  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> I was curious if any of you here might have any ideas?  How can we verify
> that
> a person is who they say they are, and block them if they are abusive in
> such
> a way that it is at least difficult for them to evade the block, but that
> does
> not impose a requirement so high as to be prohibitive to those who aren't
> causing issues?
>

Is there any mechanism available by which, e.g., known & trusted editors
could request Tor access for specific login credentials/accounts, and Tor
only allowed for those accounts? This would also help to address Derric's
interest in allowing users from repressive regimes without allowing the
vast amounts of destructive edits that have so far come from Tor. Since
Wikimedia accounts are designed to be at least quasi-anonymous, placing a
request for Tor access through the Wikimedia messaging system should not in
itself reveal one's identity.

so one way to get one of these accounts would be, as many of us do, create
a regular (non-Tor) account, perform a good number of simple,
non-destructive edits (cleaning up already-marked items on WP pages, for
example), and then to request a special Tor account.

maybe if this works for established editors, a trial could be run to allow
a limited number of new accounts through Tor to be set up, again by
personal request, and edits allowed only through those approved accounts,
allowing the Wikimedia software to carefully watch over these accounts for
destructive editing and blocking them if this happens. People would
therefore not be allowed to automatically create accounts in Tor in
Wikimedia projects, nor to edit without logging in, but if the method
works, a certain amount of editing over Tor could be possible.

the overhead in approving accounts would be relatively low, and a limited
number could be created, so that not a great deal of oversight would be
necessary. Perhaps even a secure messaging facility could be created to
request such accounts (if it doesn't exist already).

As long as the basic mechanism is to allow only certain accounts to use
Tor, I presume that Tor itself would make spoofing those accounts
difficult.

I would presume that a Tor-based Wikimedia account opened solely by
messaging Wikimedia securely would be relatively hard to track down to a
specific individual (especially if it eventually becomes possible to
request these without first becoming a trusted editor), but I may not be
thinking through all the possibilities.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Hidden Services - Access control.

2014-10-01 Thread L. Blissett
On Tue, Sep 30, 2014 at 06:59:20PM +0200, Lluís wrote:
> I am trying to setup a hidden webserver, only for
> testing at the moment.
> 
> After reading the hidden services howto here:
> 
> https://www.torproject.org/docs/tor-hidden-service.html.en
> 
> I didn't find anything about access control,
> is there anyway of doing this ?
> Can I hide the *.onion address to anyone, but me ?
> Where can I found more information ?

To anyone I would say no, but I think IFRAME + tor2web might do the
trick if you just wish to avoid having your users remembering the onion
address.

But this would be also a step back on the safeguards of the hidden
service model, since you would need to register the domain somewhere
outside tor network.



signature.asc
Description: Digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wikimedia and Tor

2014-10-01 Thread Mirimir
On 10/01/2014 07:57 AM, Derric Atzrott wrote:
> Good day all,
> 
> About once a year the topic of Tor comes up on Wikimedia's technical mailing
> list.  I recently raised the topic again.  For those who aren't aware of the
> situation, currently Wikimedia blocks all edits from Tor users.  We are trying
> to find a way that it might be possible for us to lift that block, while not
> exposing ourselves to the abuse that seems to inevitably come from Tor and
> other proxy services.
> 
> The biggest concern that I have seen is how do we prevent sock puppets.  It
> seems that when Tor was unblocked it was regularly used by people who had been
> blocked from editing to evade those blocks.  There have been a couple of ideas
> thrown around in the past, but most of them have some sort of objection.
> 
> I was curious if any of you here might have any ideas?  How can we verify that
> a person is who they say they are, and block them if they are abusive in such
> a way that it is at least difficult for them to evade the block, but that does
> not impose a requirement so high as to be prohibitive to those who aren't
> causing issues?

You can't reliably block by IP address. It's unfair, because numerous
users behind a NAT router will have the same public IP address. And it's
also trivial to evade using proxies, with or without Tor. Blocking Tor
(or even all known proxies) only stops the clueless. Anyone serious
about evading a block could just use a private proxy on AWS (via Tor).

> We've thought about setting up infrastructure for Nymble, but that would
> require Tor users to expose their IP address in order to get a Nymble token.
> We have also thought about blind signing certificates which are then used to
> verify a person is the same as before, but it would be trivially easy for
> someone to get a new one.  We've thought about putting all Tor edits into a
> review queue, but that imposes too high a cost on our other volunteers.
> Fingerprinting Tor users seems both unethical and difficult, requiring some
> form of donation seems unethical, difficult, and possibly illegal, and
> requiring accounts to be created without Tor exposes Tor user's IP addresses.

Even imposing a nontrivial cost for creating accounts (say 10 BTC) would
not help. Determined adversaries would pay it. And of course, that would
exclude numerous innocents who wouldn't or couldn't pay.

> We really don't want to collect private information from Tor users like phone
> numbers, government IDs, etc. as that information isn't collected for anyone
> else and seems especially sensitive for Tor users.

That would exclude numerous users living under repressive regimes. But
then, Wikimedia is already doing that by blocking edits by Tor users.

> A more personal note, this email is being sent from my work email address as
> I use it for list subscriptions (I spent 12 hours a day at work or commuting
> so this makes lists much easier to keep up on), but I will be signing my 
> emails
> with my personal PGP key and any off-list messages to me should probably be
> directed there.
> 
> Additionally it should be noted that I have a passing familiarity with Tor as
> both a user and recently became an exit relay operator, though if I missed
> something blindly obvious, definitely please point it out to me!

The bottom line is that blocking Tor harms numerous innocent users, and
by no means excludes seriously malicious users.

> Thank you,
> Derric Atzrott
> User:Zellfaze on English Wikipedia
> 
> -BEGIN PGP PUBLIC KEY BLOCK-
> Version: GnuPG v1.4.2 (MingW32)
> 
> mQGiBFQZiyYRBACLtvclV0jwo/9suqLjfAQZNRD6wUSxBG+7WDXsFUH8lqkZvW3G
> y/NvBUzHhBzyCAYvtISANk3d9MX+zjd7moSFDLmqe/bGcjBP/2v2bnQYtPUzVyCl
> vBUUnSxk9Ike9irS9TBCa13Chr1/DMVS8K1AWtboFjU2lTnbIGwWLrZ8ywCguXSe
> S34fksoMEdozjhz3GMz3Kn8D/3U0IpNu4cu+SYpmwGUO6pFgwa5LiR98HmoXONhC
> 0I9Vz1i6yiro2+t/VAIx7F6k+/nBJ4uJcVQ/RG0BZv+oDK+avcRu9i8ReV6e6kJc
> gFYOCR/yrT4UNkr33XpI6T7B4xu8dZJriAVHDhRJlbdz49bZs+9U7w4xSqdudV42
> ritVA/oCQ3tGtenR+9S2ukxz2h1y8qBTtvCgRhKpbY7elXRcEaULpyg6Lb3iZhPd
> NL82ypNmHPMJtS2K5Th49o4HoAfCXvW3DdTTddpk/ga8fia28KPqbvHbtoCTBe+7
> ObQlMC6IRro6UzSTjdf5t3Ftvmxs5Ro1j7EP5z/cs5CWr+MSQrQmRGVycmljIEF0
> enJvdHQgPHplbGxmYXplQHplbGxmYXplLm9yZz6IYwQTEQIAIwUCVBmLJgUJAeCv
> nAYLCQgHAwIEFQIIAwQWAgMBAh4BAheAAAoJEER6A3WQcCg4a20AoKp9hGsfG/ig
> 9LJ0LKnoZ68lOJuNAJ0W6GmuKMFTTvYQFM58Eqwt7ye1I4hGBBARAgAGBQJUGYwE
> AAoJEIYsJh133xw698YAnRhbb6Bur9XGQg8hmvxysK2HfbnOAJ0QA1gEjRkihn2I
> YUo6KGHYEp/pg7kBDQRUGYsnEAQAurNRbriy6Skx3QdvpXuqs+MHTzxFdf3p2gOe
> R/7Z2Uw5ufJI6fmW5S+altaaGS48YiW9pCxmSEGZi0aPV+3scLrUVMiYOE0v/kRG
> rrhYSV4onnDb0Okr4vDj5EZJxYEVKu/XXve6RrEXUHmiwZxmT8LFErmtTcNK1p2W
> kfn8zzMAAwUD/3yQHJr0a29D7AXnezVH9iOPm0uQv80LBTTcLIErboltt+C3rNNN
> HkhlCHFDz85Sd2ZZ+yAH7Zep5Mt1SC1dj1mWMCzi8zFn6zSYxCbQfvTIoKsTxD/X
> G8ATkzXDfLJAQ/WasQHZzC734XpJpb8l+B89SKx66BXqDux/D16spvBYiEwEGBEC
> AAwFAlQZiycFCQHgr5wACgkQRHoDdZBwKDijhwCeLzma3BX6Ax8PLyV7wN7lMO/q
> /XoAnRv2sTX1mT4tvO1k/a3FxEPWHN9o
> =/It2
> -END PGP PUBLIC KEY BLOCK---

[tor-talk] Wikimedia and Tor

2014-10-01 Thread Derric Atzrott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Good day all,

About once a year the topic of Tor comes up on Wikimedia's technical mailing
list.  I recently raised the topic again.  For those who aren't aware of the
situation, currently Wikimedia blocks all edits from Tor users.  We are trying
to find a way that it might be possible for us to lift that block, while not
exposing ourselves to the abuse that seems to inevitably come from Tor and
other proxy services.

The biggest concern that I have seen is how do we prevent sock puppets.  It
seems that when Tor was unblocked it was regularly used by people who had been
blocked from editing to evade those blocks.  There have been a couple of ideas
thrown around in the past, but most of them have some sort of objection.

I was curious if any of you here might have any ideas?  How can we verify that
a person is who they say they are, and block them if they are abusive in such
a way that it is at least difficult for them to evade the block, but that does
not impose a requirement so high as to be prohibitive to those who aren't
causing issues?

We've thought about setting up infrastructure for Nymble, but that would
require Tor users to expose their IP address in order to get a Nymble token.
We have also thought about blind signing certificates which are then used to
verify a person is the same as before, but it would be trivially easy for
someone to get a new one.  We've thought about putting all Tor edits into a
review queue, but that imposes too high a cost on our other volunteers.
Fingerprinting Tor users seems both unethical and difficult, requiring some
form of donation seems unethical, difficult, and possibly illegal, and
requiring accounts to be created without Tor exposes Tor user's IP addresses.

We really don't want to collect private information from Tor users like phone
numbers, government IDs, etc. as that information isn't collected for anyone
else and seems especially sensitive for Tor users.

A more personal note, this email is being sent from my work email address as
I use it for list subscriptions (I spent 12 hours a day at work or commuting
so this makes lists much easier to keep up on), but I will be signing my emails
with my personal PGP key and any off-list messages to me should probably be
directed there.

Additionally it should be noted that I have a passing familiarity with Tor as
both a user and recently became an exit relay operator, though if I missed
something blindly obvious, definitely please point it out to me!

Thank you,
Derric Atzrott
User:Zellfaze on English Wikipedia
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFULAfzRHoDdZBwKDgRAp8NAJ9H9Ap6BRVhpLr0TOS5Nf2gGAkBKgCeMiUX
mPgZEd/DXE876lE0l6nmTIM=
=Gavh
-END PGP SIGNATURE-

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.4.2 (MingW32)
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=/It2
-END PGP PUBLIC KEY BLOCK-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Hidden Services - Access control.

2014-10-01 Thread Lunar
coderman:
> On 9/30/14, Lluís  wrote:
> > ...
> > I didn't find anything about access control,
> > is there anyway of doing this ?
> > Can I hide the *.onion address to anyone, but me ?
> 
> you cannot hide the existence of the *.onion, as these are "location
> hidden" not "existence hidden".

I believe you are mistaken. Quoting tor manpage:

   HiddenServiceAuthorizeClient auth-type client-name,client-name,...
   If configured, the hidden service is accessible for
   authorized clients only. The auth-type can either be
   'basic' for a general-purpose authorization protocol or
   'stealth' for a less scalable protocol that also hides
   service activity from unauthorized clients. Only clients
   that are listed here are authorized to access the hidden
   service. Valid client names are 1 to 16 characters long
   and only use characters in A-Za-z0-9+-_ (no spaces). If
   this option is set, the hidden service is not accessible
   for clients without authorization any more. Generated
   authorization data can be found in the hostname file.
   Clients need to put this authorization data in their
   configuration file using HidServAuth.

-- 
Lunar 


signature.asc
Description: Digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor Weekly News — October 1st, 2014

2014-10-01 Thread harmony

Tor Weekly NewsOctober 1st, 2014


Welcome to the thirty-ninth issue in 2014 of Tor Weekly News, the weekly
newsletter that covers what’s happening in the Tor community.

Tor 0.2.4.24 and 0.2.5.8-rc are out
---

Roger Dingledine announced [1] new releases in both the stable and the
alpha branches of the core Tor software. Clients accessing hidden
services should experience faster and more robust connections as they
will now send the correct rendezvous point address. “They used to send
the wrong address, which would still work some of the time because they
also sent the identity digest of the rendezvous point, and if the hidden
service happened to try connecting to the rendezvous point from a relay
that already had a connection open to it, the relay would reuse that
connection”. This fix also prevents the endianness [2] of the client’s
system from being leaked to the hidden service.

The only other changes in these releases are an update of the geoip
databases and the location of the gabelmoo directory authority [3]. As
usual, you can download the source code from the Tor distribution
directory [4].

  [1]: 
https://lists.torproject.org/pipermail/tor-talk/2014-September/034937.html
  [2]: https://en.wikipedia.org/wiki/Endianness
  [3]: 
https://lists.torproject.org/pipermail/tor-talk/2014-September/034898.html
  [4]: https://www.torproject.org/dist/

Tor Browser 3.6.6 and 4.0-alpha-3 are out
-

Mike Perry announced two new releases by the Tor Browser team. Tor
Browser 3.6.6 [5] includes a workaround for the bug [6] that has
sometimes been preventing the browser window from opening after an
apparently successful connection to the Tor network; it also stops
intermediate SSL certificates from being written to disk. In addition to
these fixes, Tor Browser 4.0-alpha-3 [7] resolves a number of issues to
do with the upcoming Tor Browser updater, including the mistaken upgrade
of non-English Tor Browsers to the English-language version. As this bug
is only fixed in the new release, users upgrading from 4.0-alpha-2 will
still experience this issue during the process. Furthermore, “meek
transport users will need to restart their browser a second time after
upgrade if they use the in-browser updater. We are still trying to get
to the bottom of this issue [8]”, wrote Mike.

Both releases also include important Firefox security updates, so all
users should upgrade as soon as possible. See Mike’s announcements for
full details, and get your copy from the project page [9] or the
distribution directory [10].

  [5]: https://blog.torproject.org/blog/tor-browser-366-released
  [6]: https://bugs.torproject.org/10804
  [7]: https://blog.torproject.org/blog/tor-browser-40-alpha-3-released
  [8]: https://bugs.torproject.org/13247
  [9]: https://www.torproject.org/projects/torbrowser.html
 [10]: https://www.torproject.org/dist/torbrowser/

Tails 1.1.2 is out
--

The second point release in the Tails 1.1.x series was put out [11] by
the Tails team, “mainly to fix a serious flaw in the Network Security
Services (NSS) library used by Firefox and other products that allows
attackers to create forged RSA certificates. Before this release, users
on a compromised network could be directed to sites using a fraudulent
certificate and mistake them for legitimate sites.”

Other packages affected by recently-disclosed security flaws and updated
in this version include APT, bash, and GnuPG, so all Tails users should
make sure to upgrade as soon as possible. If you have a running copy of
Tails, you can make use of the incremental upgrades system; otherwise,
head to the download page [12] for more information.

 [11]: https://tails.boum.org/news/version_1.1.2/
 [12]: https://tails.boum.org/download/index

obfs4 is ready for general deployment: bridge operators needed!
---

Pluggable transports [13], the circumvention techniques which allow
users to access the Tor network from censored areas by disguising the
fact that the Tor protocol is being used, are about to take another step
forward with the release of obfs4, and Yawning Angel sent out [14] a
brief discussion of this new protocol.

obfs4 offers a number of developments over the obfs3 and ScrambleSuit
protocols, until now the most sophisticated pluggable transports in use
on the Tor network. Like ScrambleSuit, obfs4 improves on obfs3 to
“provide resilience against active attackers and to disguise flow
signatures” [15], while a safer and more efficient key-exchange process
than ScrambleSuit’s should make it impossible for attackers to launch
man-in-the-middle attacks based on the client/bridge shared secret.

Like its predecessors in the obfsproxy series, obfs4 is 

Re: [tor-talk] Fwd: IP Banned for running a non-exit relay from home?

2014-10-01 Thread Virgil Griffith
I actually always figured the opposite---that knowing someone was Tor
user was surprisingly quite valuable for advertisers.  You know the
viewer is technically literate and interested in security and privacy.
I don't study ads or anything, but this sounds like a target
demographic to me.  If nothing else show the ads for Barracuda
Networks' spam firewall that I always see in SFO/SJC.

-V

On Tue, Sep 30, 2014 at 6:20 PM, Joe Btfsplk  wrote:
> Tor / TBB doesn't exactly lend itself to that business model.  Maybe some
> have heard, gathering personal data on internet users is now big business.
> No?
> Tor thwarts that objective.  The trackers (who pay many site owners) say,
> "We don't need no stinking Tor Browsers."
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Fwd: IP Banned for running a non-exit relay from home?

2014-10-01 Thread Virgil Griffith
Well now that it's been mentioned in tor-talk maybe it'll appear next
time Mr. DANIEL AUSTIN MBCS Googles himself.

-V
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Hidden Services - how to implement something like Round Robin DNS?

2014-10-01 Thread grarpamp
If all you want to do is load share right now today,
you can set the main onion to 302 all traffic amongst
an onion farm. It's only for http and isn't perfect but
it does spread the traffic around.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk