[tor-talk] Tor-ramdisk 20170130 released

2017-02-12 Thread Anthony G. Basile
Hi everyone,

I want to announce that a new release of tor-ramdisk is out. Tor-ramdisk
is a uClibc-based micro Linux distribution whose only purpose is to host
a Tor server in an environment that maximizes security and privacy.
Security is enhanced by hardening the kernel and binaries, and privacy
is enhanced by forcing logging to be off at all levels so that even the
Tor operator only has access to minimal information. Finally, since
everything runs in ephemeral memory, no information survives a reboot,
except for the Tor configuration file and the private RSA key, which may
be exported/imported by FTP or SCP.


ChangeLog:

The following were updated: tor-0.2.9.9, busybox-1.26.2, openssh-7.4_p1,
linux-4.8.17 +
hardened-patches-4.8.17-3.extra.

Download:

https://people.torproject.org/~blueness/tor-ramdisk

https://people.torproject.org/~blueness/tor-x86_64-ramdisk

-- 
Anthony G. Basile, Ph.D.
Gentoo Linux Developer [Hardened]
E-Mail: bas...@freeharbor.net
GnuPG FP  : 1FED FAD9 D82C 52A5 3BAB  DC79 9384 FA6E F52D 4BBA
GnuPG ID  : F52D4BBA

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20160925 released

2016-10-11 Thread Anthony G. Basile
Hi everyone,

I want to announce that a new release of tor-ramdisk is out. Tor-ramdisk
is a uClibc-based micro Linux distribution whose only purpose is to host
a Tor server in an environment that maximizes security and privacy.
Security is enhanced by hardening the kernel and binaries, and privacy
is enhanced by forcing logging to be off at all levels so that even the
Tor operator only has access to minimal information. Finally, since
everything runs in ephemeral memory, no information survives a reboot,
except for the Tor configuration file and the private RSA key, which may
be exported/imported by FTP or SCP.


ChangeLog:

Tor was updated to 0.2.8.8 and the kernel was bumped to linux-4.7.4 +
Gentoo's hardened-patches-4.7.4-2.extras.


i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: https://people.torproject.org/~blueness/tor-ramdisk

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: https://people.torproject.org/~blueness/tor-x86_64-ramdisk

-- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20151215 released

2015-12-15 Thread Anthony G. Basile
Hi everyone,

I want to announce that a new release of tor-ramdisk is out.
Tor-ramdisk is a uClibc-based micro Linux distribution whose only
purpose is to host a Tor server in an environment that maximizes
security and privacy.  Security is enhanced by hardening the kernel and
binaries, and privacy is enhanced by forcing logging to be off at all
levels so that even the Tor operator only has access to minimal
information.  Finally, since everything runs in ephemeral memory, no
information survives a reboot, except for the Tor configuration file and
the private RSA key, which may be exported/imported by FTP or SCP.


Changelog:
Tor was updated to version 0.2.7.6, busybox to 1.24.1, openssh to
7.4_p1, and the kernel to 4.2.6 plus Gentoo's
hardened-patches-4.2.6-8.extras.  We also switched from openssl to
libressl 2.2.5.

i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


-- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] [Tor-ramdisk] Tor-ramdisk 20150714 released

2015-07-21 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information. Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

Tor was updated to 0.2.6.10, openssl updated to 1.0.1p and the kernel 
updated to 4.0.8 + Gentoo's hardened-patches-4.0.8-1.extras.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor-ramdisk 20150616 released

2015-06-23 Thread Anthony G. Basile

On 6/23/15 3:46 PM, Mirimir wrote:

On 06/22/2015 08:58 AM, Anthony G. Basile wrote:

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out.
Tor-ramdisk is a uClibc-based micro Linux distribution whose only
purpose is to host a Tor server in an environment that maximizes
security and privacy. Security is enhanced by hardening the kernel and
binaries, and privacy is enhanced by forcing logging to be off at all
levels so that even the Tor operator only has access to minimal
information. Finally, since everything runs in ephemeral memory, no
information survives a reboot, except for the Tor configuration file and
the private RSA key, which may be exported/imported by FTP or SCP.


Will this work on micro PCs like Raspberry Pi2, Banana Pi, etc?


I don't have a *pi so I haven't been able to target one, but there's no 
reason I can't target arm.  I used to target mips routers (the mikrotik 
450G's), but there were no users and so I stopped.





Changelog:

Tor was updated to 0.2.6.9, openssl to 1.0.1o and the kernel to 4.0.5 +
Gentoo's hardened-patches-4.0.5-1.extras.


i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads





--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor-ramdisk 20150616 released

2015-06-23 Thread Anthony G. Basile

On 6/23/15 12:03 AM, Çağıl P. Şesto wrote:



Aren't you worried about GPL violation? Since the school were you
distribute the images has no sources. Some of your components are
LGPL/GPL. First thought was, ah thats the school were all the embedded
engineers learn to properly violate the L/GPL and distribute binary only. :)



fud.  The source code is available on any gentoo mirror.


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor-ramdisk 20150616 released

2015-06-22 Thread Anthony G. Basile

On 6/22/15 2:43 PM, Çağıl P. Şesto wrote:

On Mon, Jun 22, 2015 at 10:58:44AM -0400, Anthony G. Basile wrote:

operator only has access to minimal information. Finally, since everything
runs in ephemeral memory, no information survives a reboot, except for the
Tor configuration file and the private RSA key, which may be
exported/imported by FTP or SCP.


Is source available, or is that binary only? Couldn't find any on the
site.


Built on a uclibc system using the build scripts at

https://gitweb.torproject.org/tor-ramdisk.git/

You can use the stage3 uclibc tarballs at

http://distfiles.gentoo.org/releases/amd64/autobuilds/current-stage3-amd64-uclibc-hardened/

http://distfiles.gentoo.org/releases/x86/autobuilds/current-stage3-i686-uclibc-hardened/

I am also responsible for those tarballs.  The hardened uclibc webpage 
is at the following link


https://wiki.gentoo.org/wiki/Project:Hardened_uClibc

and gives more information about what goes into them.



And I actually really doubt that no infomation survives a reboot, but I
can't tell without the source.


Are you referring to cold boot attack?



If its run inside a vm, it's worse. :)


Yes, all well known issues.



Just my five euro-cent. I can't tell more, my gentoo box got a
heatstroke.






--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20150616 released

2015-06-22 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information. Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

Tor was updated to 0.2.6.9, openssl to 1.0.1o and the kernel to 4.0.5 + 
Gentoo's hardened-patches-4.0.5-1.extras.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20150531 released

2015-06-02 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information. Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

Tor was updated to 0.2.6.8, busybox to 1.23.2, openssh to 6.8p1, openssl 
to 1.0.1m, and the kernel to linux-4.0.4 + Gentoo's 
hardened-patches-4.0.4-3.extras.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20150411 released

2015-04-15 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is an i686 or x86_64 uClibc-based micro Linux distribution 
whose only purpose is to host a Tor server in an environment that 
maximizes security and privacy. Security is enhanced by hardening the 
kernel and binaries, and privacy is enhanced by forcing logging to be 
off at all levels so that even the Tor operator only has access to 
minimal information. Finally, since everything runs in ephemeral memory, 
no information survives a reboot, except for the Tor configuration file 
and the private RSA key, which may be exported/imported by FTP or SCP.


Changelog:

Tor was updated to 0.2.6.7 and the kernel was updated to 3.19.3 + 
Gentoo's hardened-patches-3.19.3-2.extras.  All other components remain 
the same as in the previous release.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20150322 released

2015-03-29 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
 Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy.  Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information.  Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by ftp or scp.


Changelog:

Tor was updated to 0.2.5.11, busybox to 1.23.1, openssl to 1.0.1l, and 
the kernel to 3.19.2 + Gentoo's hardened-patches-3.19.2-2.extras.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20150114 released

2015-01-19 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information. Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

Tor was updated to 0.2.5.10, libevent to 2.0.22 (addresses 
CVE-2014-6272), busybox to 1.23.0, openssl to 1.0.1k, and the kernel to 
3.17.7 + Gentoo's hardened-patches-3.17.7-2.extras.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor-ramdisk: ARM Porting, other options?, and automation. (silence_eternal)

2014-12-12 Thread Anthony G. Basile

On 12/12/14 13:27, silence_eter...@hush.ai wrote:

​I have been looking lately ​at the possibility of running a Tor
server on a Raspberry Pi. I would love to use Tor-ramdisk for this,
but unfortunately tor-ramdisk currently is only supported by i686,
x86_64, and MIPS, where the Raspberry Pi has an ARM processor. Does
someone know enough about this or is interested enough to do this? I
would assist with this but I honestly do not know enough about it to
know where to start. If not, does anyone know something else I could
use for this? I would love to have an image I just put on a micro sd
card, simply just plug in a headless Raspberry Pi, and have it set up
a Tor relay or exit without any input required by me. This wouldn't
have to run solely in RAM. If possible, it would also be nice to have
it search all ports for an open port to use, since on most networks I
use I don't have permission to port-forward.
Thanks, silence_eternal



I need a ras pi and then I can build it.  I guess I can build it without 
a ras pi, but I'd be building blindly.


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20141022 released

2014-10-23 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
 Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information.  Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

We updated tor to 0.2.4.25 and openssl to 1.0.1j.  This addresses 
CVE-2014-3566, aka the POODLE issue.  We also update the kernel to 
3.17.1 + Gentoo's hardened-patches-3.17.1-1.extras.  All other 
components remain the same as in previous releases.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20140925 released

2014-09-27 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information. Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

Tor was updated to 0.2.4.24, BusyBox to 1.22.1, OpenSSL to 1.0.1i, and 
the kernel to 3.16.3 + Gentoo's hardened-patches-3.16.3-1.extras.  Other 
packages remain at the same version as the pervious release.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20140801 released

2014-08-01 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is an i686 or x86_64 uClibc-based micro Linux distribution 
whose only purpose is to host a Tor server in an environment that 
maximizes security and privacy. Security is enhanced by hardening the 
kernel and binaries, and privacy is enhanced by forcing logging to be 
off at all levels so that even the Tor operator only has access to 
minimal information. Finally, since everything runs in ephemeral memory, 
no information survives a reboot, except for the Tor configuration file 
and the private RSA key, which may be exported/imported by FTP or SCP.


Changelog:

tor was updated to 0.2.4.23 which addresses CVE-2014-5117.  The kernel 
was updated to 3.15.7+ Gentoo's hardened-patches-3.15.7-1.extras.  All 
other packages are the same as the previous release.  It is recommended 
that users upgrade immediately.  For more information see 
https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20140520 released

2014-05-21 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux 
distribution whose only purpose is to host a Tor server in an 
environment that maximizes security and privacy. Security is enhanced by 
hardening the kernel and binaries, and privacy is enhanced by forcing 
logging to be off at all levels so that even the Tor operator only has 
access to minimal information. Finally, since everything runs in 
ephemeral memory, no information survives a reboot, except for the Tor 
configuration file and the private RSA key, which may be 
exported/imported by FTP or SCP.


Changelog:

This release updates tor to version 0.2.4.22, the kernel to 3.14.4 plus 
Gentoo's hardened-patches, and openssh to 6.6p1. The bump in tor adds an 
important block to authority signing keys that were used on authorities 
vulnerable to the heartbleed bug in OpenSSL, CVE-2014-0160. The bump 
in the kernel addresses the pty layer race condition memory corruption, 
CVE-2014-0196. Upgrading is strongly recommended.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20140409 released

2014-04-10 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux 
distribution whose only purpose is to host a Tor server in an 
environment that maximizes security and privacy. Security is enhanced by 
hardening the kernel and binaries, and privacy is enhanced by forcing 
logging to be off at all levels so that even the Tor operator only has 
access to minimal information. Finally, since everything runs in 
ephemeral memory, no information survives a reboot, except for the Tor 
configuration file and the private RSA key, which may be 
exported/imported by FTP or SCP.


Changelog:

This release addresses CVE-2014-0160 in openssl which was bumped to 
version 1.0.1g. The kernel was also bumped to 3.13.8 plus Gentoo's 
hardened-patches, but all other packages remain at the same versions as 
the previous release. Upgrading is strongly recommended.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

MIPS:
Homepage: http://opensource.dyc.edu/tor-mips-ramdisk
Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads

--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Tor-ramdisk] Tor-ramdisk 2014 20140309 released

2014-03-22 Thread Anthony G. Basile

On 03/22/2014 04:17 PM, Matthew Finkel wrote:

On Sun, Mar 09, 2014 at 06:38:23PM -0400, Anthony G. Basile wrote:

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out.
Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux
distribution whose only purpose is to host a Tor server in an
environment that maximizes security and privacy. Security is enhanced by
hardening the kernel and binaries, and privacy is enhanced by forcing
logging to be off at all levels so that even the Tor operator only has
access to minimal information. Finally, since everything runs in
ephemeral memory, no information survives a reboot, except for the Tor
configuration file and the private RSA key, which may be
exported/imported by FTP or SCP.

Changelog:

This release bumps tor to version 0.2.4.21 and the kernel to 3.13.5 plus
Gentoo's hardened-patches.  All other components are kept at the same
versions as the previous release.   We also add haveged, a daemon to
help generate entropy on diskless systems, for a more cryptographically
sound system.  Testing shows that previous versions of tor-ramdisk were
operating at near zero entropy, while haveged easily keeps the available
entropy close to 9000 bits. Upgrading is strongly encouraged.



Hi!

Is there a good way to send you suggestions for the build script? There
isn't a trac component for tor-ramdisk, should one be created for this?

Thanks,
Matt
___
Tor-ramdisk mailing list
tor-ramd...@opensource.dyc.edu
http://opensource.dyc.edu/mailman/listinfo/tor-ramdisk



Hi Matt,

Easiest way is to 1) join the tor-ramdisk list [1], 2) submit patches to 
that list.


Thanks!

--Tony

Ref.
[1] Instructions at http://opensource.dyc.edu/tor-ramdisk-mailinglists


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20131230 released

2014-01-05 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information. Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

This release of tor-ramdisk follows upstream's release of tor-0.2.4.20. 
The kernel was also updated to Linux-3.12.6 plus Gentoo's 
hardened-patches-3.12.4-3.extras, but all other components were kept at 
the same version as the 20131216 release.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] best distro to use Tor

2013-10-06 Thread Anthony G. Basile

On 10/05/2013 11:21 PM, grarpamp wrote:

While everyone runs on about this or that Linux distro,
don't forget there are very good Unix'es to be found in
both FreeBSD and OpenBSD. Unlike the typical Linux
distro, BSD doesn't have layer upon layer of system to
user abstraction and bling. Their model is central and
simple. If you're tired of dealing with distro of the day
and the Linux s/n ratio, and want something stable and
secure and focused... give them a look.

I'd never use Ubuntu, maybe Debian or likely Arch.
I don't really have time for them, BSD just works.



Is there a BSD based liveCD desktop?

--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20121127 released

2012-11-28 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux 
distribution whose only purpose is to host a Tor server in an 
environment that maximizes security and privacy. Security is enhanced by 
hardening the kernel and binaries, and privacy is enhanced by forcing 
logging to be off at all levels so that even the Tor operator only has 
access to minimal information. Finally, since everything runs in 
ephemeral memory, no information survives a reboot, except for the Tor 
configuration file and the private RSA key, which may be 
exported/imported by FTP or SCP.


Changelog:

For the i686 and x86_64 ports, Tor was updated to 0.2.3.25, libevent to 
2.0.20 and the kernel to 3.6.7 plus Gentoo's hardened-patches 
3.6.7-1.extras. The MIPS port also incorporates these changes, but for 
this architecture, libevent was updated to 2.0.21, while the kernel was 
kept at vanilla 3.2.5.




i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

MIPS:
Homepage: http://opensource.dyc.edu/tor-mips-ramdisk
Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20120924 released

2012-09-23 Thread Anthony G. Basile

Hi everyone,

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information. Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

For the i686 and x86_64 ports, Tor was updated to 0.2.2.39, openssh to 
6.1p1, and the kernel to 3.4.7 plus Gentoo's hardened-patches 
3.4.7-1.extras. The MIPS port also incorporates these changes, but for 
this architecture, we updated libevent to 2.0.20, while the kernel was 
kept at vanilla 3.2.5



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

MIPS:
Homepage: http://opensource.dyc.edu/tor-mips-ramdisk
Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Tor-ramdisk] Tor-ramdisk 20120924 released

2012-09-23 Thread Anthony G. Basile
I should never make announcements without drinking coffee first.  The 
release number is 20120923.  Off by 1 error :(


Sorry for the spamminess.

--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20120827 released

2012-08-27 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is a uClibc-based micro Linux distribution whose only 
purpose is to host a Tor server in an environment that maximizes 
security and privacy. Security is enhanced by hardening the kernel and 
binaries, and privacy is enhanced by forcing logging to be off at all 
levels so that even the Tor operator only has access to minimal 
information. Finally, since everything runs in ephemeral memory, no 
information survives a reboot, except for the Tor configuration file and 
the private RSA key, which may be exported/imported by FTP or SCP.



Changelog:

Tor was updated to 0.2.2.38, BusyBox to 1.20.2, and the kernel to 3.4.5 
plus Gentoo's hardened-patches-3.4.5-1.extras. The MIPS port also 
incorporates these changes, but for this architecture the kernel was 
kept at vanilla 3.2.5



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

MIPS:
Homepage: http://opensource.dyc.edu/tor-mips-ramdisk
Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor-ramdisk 20120622 released

2012-06-23 Thread Anthony G. Basile

On 06/22/2012 10:03 AM, MacLemon wrote:

On 22 Jun 2012, at 15:03, Anthony G. Basile wrote:

Tor-Ramdisk: i686, x86_64, MIPS


* Have you thought about an ARM port, for example for the Raspberry Pi?


I mostly do gentoo development where I bring kernel and toolchain 
hardening to uclibc systems.  arm is definitely in sight.  I'm working 
on the beagleboard and Genesi.



* Could I use Tor-Ramdisk to run a node on rackmount but diskless x86_64 
hardware and boot from a hardware read-only USB stick?


Boot the vps from the iso image as if you're doing an install.  I don't 
know how rackmount nodes work, but I assume you can do something like that.



* Have you tried running Tor-Ramdisk from a USB stick/CF card on  an ALIX 
board? http://pcengines.ch/alix3d2.htm


I can write scripts for transferring the iso to usb or sd/micro sd card. 
 Thanks for that link to a amd driven board.



In general, if I have (or were given) access to hardware or 
virtualization env, I can make a targeted image.



--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-ramdisk 20120622 released

2012-06-22 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux 
distribution whose only purpose is to host a Tor server in an 
environment that maximizes security and privacy. Security is enhanced by 
hardening the kernel and binaries, and privacy is enhanced by forcing 
logging to be off at all levels so that even the Tor operator only has 
access to minimal information. Finally, since everything runs in 
ephemeral memory, no information survives a reboot, except for the Tor 
configuration file and the private RSA key, which may be 
exported/imported by FTP or SCP.


Changelog:

Tor was updated to 0.2.2.37, BusyBox to 1.20.1 and the kernel to 3.4.2 
plus Gentoo's hardened-patches-3.4.2-2.extras. The MIPS port also 
incorporated these changes, but for this architecture the kernel was 
kept at vanilla 3.2.5.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

MIPS:
Homepage: http://opensource.dyc.edu/tor-mips-ramdisk
Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] tor-ramdisk 20120601 released

2012-06-01 Thread Anthony G. Basile

Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out. 
Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux 
distribution whose only purpose is to host a Tor server in an 
environment that maximizes security and privacy. Security is enhanced by 
hardening the kernel and binaries, and privacy is enhanced by forcing 
logging to be off at all levels so that even the Tor operator only has 
access to minimal information. Finally, since everything runs in 
ephemeral memory, no information survives a reboot, except for the Tor 
configuration file and the private RSA key, which may be 
exported/imported by FTP or SCP.


Changelog:

This release incorporates major changes from upstream to all components 
of tor-ramdisk: tor was updated to 0.2.2.36, libevent to 2.0.18, openssh 
to 6.0p1, busybox to 1.20.0, uclibc to 0.9.33.2 and the kernel was 
updated to 3.2.11 plus Gentoo's hardened-patches-3.2.11-1.extras. The 
MIPS port also incorporated these changes, but only for this 
architecture was libevent update to 2.0.19 and the kernel to 3.2.5.



i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

MIPS:
Homepage: http://opensource.dyc.edu/tor-mips-ramdisk
Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads


--
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] tor-ramdisk 20111225

2011-12-26 Thread Anthony G. Basile
Hi everyone,

I want to announce to the list that a new release of tor-ramdisk is out.
Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux
distribution whose only purpose is to host a Tor server in an
environment that maximizes security and privacy. Security is enhanced by
hardening the kernel and binaries, and privacy is enhanced by forcing
logging to be off at all levels so that even the Tor operator only has
access to minimal information. Finally, since everything runs in
ephemeral memory, no information survives a reboot, except for the Tor
configuration file and the private RSA key, which may be
exported/imported by FTP or SCP.

Changelog:

This release incorporates an important security fix from upstream and an
upgrade is recommended.  Tor was updated to 0.2.2.35, libevent to 2.0.16
and the kernel to 2.6.32.50 plus Gentoo's hardened-patches-2.6.32-83.extras.


i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

MIPS:
Homepage: http://opensource.dyc.edu/tor-mips-ramdisk
Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads


-- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Revoking your secret_id_key

2011-09-28 Thread Anthony G. Basile
Hi everyone,

Is there a way of revoking your tor relay's secret_id_key?  For
instance, suppose your server is compromised and you want to tell the
world, don't trust this node anymore as a relay and/or exit, how would
you do that?  The question occurred to me as I working with gpg.

-- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] tor-ramdisk 20110915 released

2011-09-26 Thread Anthony G. Basile
Hi everyone

I want to announce to the list that a new release of tor-ramdisk is out.
Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux
distribution whose only purpose is to host a Tor server in an
environment that maximizes security and privacy. Security is enhanced by
hardening the kernel and binaries, and privacy is enhanced by forcing
logging to be off at all levels so that even the Tor operator only has
access to minimal information. Finally, since everything runs in
ephemeral memory, no information survives a reboot, except for the Tor
configuration file and the private RSA key, which may be
exported/imported by FTP or SCP.

Changelog:

Tor was bumped to the most recent stable version 0.2.2.33, busybox was
bumped to 1.19.2 and the kernel to 2.6.32.46 plus Gentoo's
hardened-patches 2.6.32-69.extras.


i686:
Homepage: http://opensource.dyc.edu/tor-ramdisk
Download: http://opensource.dyc.edu/tor-ramdisk-downloads

x86_64:
Homepage: http://opensource.dyc.edu/tor-x86_64-ramdisk
Download: http://opensource.dyc.edu/tor-x86_64-ramdisk-downloads

MIPS:
Homepage: http://opensource.dyc.edu/tor-mips-ramdisk
Download: http://opensource.dyc.edu/tor-mips-ramdisk-downloads


-- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor banned in Pakistan.

2011-09-09 Thread Anthony G. Basile
On 09/08/2011 08:02 PM, David H. Lipman wrote:
 From: Anthony G. Basile bas...@opensource.dyc.edu
 
 On 09/08/2011 05:23 PM, Matthew wrote:

 http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software



 Very disturbing.   I wonder if its possible to hide encrypted traffic as
 seemingly unencrypted http traffic in much the same way as a gpg key is
 rendered as ascii armored, or stenographically inside images.  Although
 such methods may be inefficient, they may be good enough for some purposes.

 It would be good to know what technologies these ISPs will implement to
 do the packet inspection for encrypted tunnels.  Half the problem is you
 don't really know what they'll be looking for and so you don't know how
 to circumvent.

 
 LOL
 
 Steganography not stenography.  ;-)
 
 They are vastly different concepts.
 

Yeah!  The hand is faster than the brain.

-- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor banned in Pakistan.

2011-09-08 Thread Anthony G. Basile
On 09/08/2011 05:23 PM, Matthew wrote:
 
 http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
 
 

Very disturbing.   I wonder if its possible to hide encrypted traffic as
seemingly unencrypted http traffic in much the same way as a gpg key is
rendered as ascii armored, or stenographically inside images.  Although
such methods may be inefficient, they may be good enough for some purposes.

It would be good to know what technologies these ISPs will implement to
do the packet inspection for encrypted tunnels.  Half the problem is you
don't really know what they'll be looking for and so you don't know how
to circumvent.

-- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Is tor-announce still being used?

2011-02-28 Thread Anthony G. Basile
Hi all,

Is tor-annou...@lists.torproject.org in use?  There's not archive listed
when I navigate to the mailman page and I haven't received anything in a
long time.


-- 
Anthony G. Basile, Ph. D.
Chair of Information Technology
D'Youville College
Buffalo, NY 14201
(716) 829-8197
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk