Re: [tor-talk] GEOIP's

2014-09-05 Thread eliaz
Karsten Loesing:
> On 05/09/14 19:00, Mike Fikuart wrote:
>> Hi Group,
>>
>> I am looking into the various files used by the OR’s and OP’s and
>> would like to know more about the GEOIP file and use.
[snip]
> You can find the current geoip file here:
> 
> https://gitweb.torproject.org/tor.git/blob/HEAD:/src/config/geoip
[snip]

Are geoip and geoip6 updated in the background or should bridge
operators fetch updates periodically? Does the difference between the
Jul 14 2014 update (2,231 KB, currently in my bridge data folder) and
the current (Aug 7 2014, 2,290 KB) update warrant replacing the older
file? - eliaz

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] DB fix

2014-09-16 Thread eliaz
I've been testing out various tor browser & bridge configurations and
have been hampered by the bridge DB being down the last bunch of days. I
see it's up again: Thanks, whoever did that work! - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Assange and Ghomeshi on Google

2014-09-29 Thread eliaz
I found this quite interesting. It's only ignorance of alternatives that
keep people tied to google.

cbc.ca/news/world/wikileaks-founder-julian-assange-tackles-google-dispels-health-rumours-1.2779189

orbooks.com points to lots of other reaction to the publication.

- eliaz


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] obfsproxy and windows

2014-10-07 Thread eliaz
Though AFAICT my bridge is configured correctly, it appears to carry
very little traffic. This has raised a number of questions regarding the
use of vanilla and obfuscated clients & bridges in windows.

I run a bridge on Win 7, with Tor 0.2.4.24 (git-a8a38e5dd1fbb67a) in its
own folder, with standalone Vidalia running off a USB stick. I have the
same setup for a Tor client on a different machine on the same LAN. I
configure the client as obfsproxy-capable or plain as a way to teach
myself about obfuscated clients. Once the Tor circuits come up, I open
torbirdied thunderbird for e-mail.

The Client: I've been surprised to see that messages under obfsproxy
generally go about as fast as plain ones. Are there enough obfsproxy
servers that my mail isn't slowing things down for people who really
need obfuscation? I guess another way of asking this would be, Is Tor
obfuscation now robust enough so that everyone may as well use it?

If the client is configured to be obfsproxy-capable, can it still avail
itself of vanilla bridges?

The Bridge: I'm currently running it as what I take to be
obfsproxy-aware. That is, after rummaging around the sparse windows
documentation, I've written

"ClientTransportPlugin obfs2,obfs3 exec
Tor\PluggableTransports\obfsproxy managed"

into the torrc. AFAIK this is all one must do to change a vanilla bridge
into an obfsproxy-aware one. Is that correct?

Will the obfsproxy-aware bridge also accept traffic from non-obfuscated
clients? In other words, does  it make sense to write something like

Bridge obfs3 w.x.y.z:80 ...
Bridge a.b.c.d:443 ...

into torrc of obfsproxy-configured clients?

I realize one wouldn't ordinarily want to do this; one either needs
obfuscation or one does not. I ask the question because I'm trying to
understand how obfuscation works. I would've tried setting up such a
client myself, except that I've lost access to the remote-ISP client
that I had used to test such ideas.

These days I'm lucky if "Who has used my bridge?" shows one or two 1-8
entries once every two weeks or so. Looking at Globe/Onionoo and the
relay DBs, I see that though the bridge's advertized BW runs between 20
and 40 kB/s, the actually used mean written/mean read traffic is in the
100s/10s-Byte range. for either my vanilla or obfsproxy-aware
configurations. Does this simply mean that there are enough bridges so
that any particular one isn't called on too often? That is, is the
behavior I'm seeing typical? Or am I doing some thing(s) wrong? I'd be
much obliged for any feedback. - eliaz



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Darknets/science vs. GPA/LEA/Law, and playing dirty pool

2014-11-08 Thread eliaz

> On 11/8/2014 1:43:29 PM, Sam Pizzey (s...@pizzey.me) wrote:
> > On 08/11/2014 16:14, l.m wrote:
> > How's the presence of a
> > darknet running on Tor hidden services supposed to make me feel
> > anyway? That's your freedom being used to poison kids and evade
> > punishment.
> >
> On the contrary, it makes me feel that my freedom is being used to
> provide an environment where some of the damage done by people with your
> misguided viewpoint can be mitigated.

I can appreciate both views, but I wonder if it helps our understanding
of the problem to glom onto only one of these opposites. On the one hand
participating in Tor gives anonymity/freedom to people (many, I hope)
who use it for communal/good ends. But it also allows a few (I hope)
people to abuse it. Tor's a carrier, it's not its place to censor/judge
traffic. That's a is a function of the cops/courts and of society at
large. If by some horrible chance Tor had an internal monitoring
function, I don't know that I'd opt into judging any HS or user - I'd
probably end up obsessing over each individual case. I'd much rather
spend my time helping to make Tor more anonymous and free, leaving it to
the cops to chase those they think are miscreants. Of course I also have
to fight against the illegitimate use of police/state power. Such is
life. Just MO. - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] documentation for Windows users

2015-01-10 Thread eliaz
I began using Tor a couple of years ago, not so much because I needed a
secure client as because I wanted to help the network by running a
bridge. At the time I jumped in I was running Windows. I'm still running
Tor on that OS.

It was very easy to set up a bridge. However it was a long struggle to
understand how the bridge was supposed to be working and how I might
track its behavior. Vidalia is no longer integrated into the browser,
and portable transports & different tracking mechanisms have come in.

I think my difficulties arose mostly because (1) the documentation is
oriented toward linux users, and (2) some of the documentation hasn't
yet caught up with the improvements and elaborations. For a while I've
been wanting to review the documentation and propose some changes.

I have a day job, and though the documentation has been nagging at me
I'm not sure when I'll be able to get to it. But the first thing would
be to ascertain whether there are enough Windows client/bridge users to
make the project worthwhile. So I'm here are asking for any of the
following stats:

1. What percentage of Tor users are running it on Windows?

2. What percentage of the Windows users run a client only?

3. What percentage run solely or mostly a bridge or bridges?

(That is, in 2 & 3 I'm trying to get a sense of the overlap of Windows
clients and bridges, which would influence any documentation I might
come up with.)

Thanks for any help and comments - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] torifying TB

2011-11-20 Thread eliaz
Following the instructions in the "Configure Thunderbird to work through 
Tor" help file. I've successfully set up tormail in Thunderbird. 
However, I don't know what the "No Proxy for" field on the TB Network & 
Disk Space > Settings tab is supposed to mean. Whether I leave 
"Localhost, 127.0.0.1" (as shown in the screen grab in the help file) or 
delete it altogether, the configured mail seems to work as well. Can 
some one fill me in on this? Is the field irrelevant to the manual proxy 
configuration? Apologies for a newbie question, & thanks eli


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] torifying TB

2011-11-21 Thread eliaz
Yah - When I reload tormail, I get a complaint that Network & Disk Space 
is misconfigured until I  put "localhost,127,0.0.1" back in the "No 
Proxy for" field. Of course: "localhost,127,0.0.1" was still in memory 
until I reloaded. The name of that field could've been clearer, after 
all the point of manual config. is to set up new http & ssl proxies. 
Anyway, I  know how to set it up to work, if not quite why.


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] keyserver not responding

2012-01-06 Thread eliaz
Sometimes when I try to import a key as per the TBB download 
instructions the process works fine; but at other times the transaction 
goes as follows:


C:\"Program Files (x86)"\Gnu\GnuPg\gpg2.exe --keyserver 
x-hkp://pool.sks-keyservers.net --recv-keys 0x63FEE659

gpg: requesting key 63FEE659 from hkp server pool.sks-keyservers.net
gpg: no valid OpenPGP data found.
gpg: Total number processed: 0

I'm doing this from an elevated Vista 64 prompt. I've tried unloading 
the associated certificate from Kleopatra, and also cold-booted my 
machine, to no avail. After backing up to a previous restore point (done 
for other reasons), the import works fine, but only the first time. I've 
not found the string 63FEE659 in the OS registry. Can anyone tell me 
what I'm doing wrong, and how I can clean up what's blocking the import? 
Thanks, eli



___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] keyserver not responding

2012-01-13 Thread eliaz
This is interesting, maybe. I found that I can get to sks-keyservers.net
over Tor or from my SSH shell account, but not over untorified firefox.
Once there I searched for the sig. in question & C&P'd this into an asc
file & imported to Kleopatra. Then I could verify the fingerprint &
authenticate the browser bundle. I'm still mystified why I can't rouse
the keyserver from a command prompt, but will let that problem go for
now. - eli
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] where did Aurora go?

2012-02-10 Thread eliaz
Upon the last TBB update, Aurora 9 was replaced by FFox 10, the same
FFox that I use for my clear browsing. Both have the same icon, which
makes it a bother to be sure I'm in the correct browser (while I'm still
running Vidalia from the same HD as I run the regular FFox). Things
would be a little easier to have a different icon for the TBB
implementation of the browser. Can that be done? - eliaz
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] where did Aurora go

2012-02-12 Thread eliaz
On Fri Feb 10 21:05:59 UTC 2012 Sebastian Hahn wrote:
> On Feb 10, 2012, at 9:47 PM, eliaz wrote:
> > Upon the last TBB update, Aurora 9 was replaced by FFox 10, the same
> > FFox that I use for my clear browsing. Both have the same icon,
> > which makes it a bother to be sure I'm in the correct browser
> >(while I'm still running Vidalia from the same HD as I run the
> >regular FFox). Things would be a little easier to have a different
> >icon for the TBB implementation of the browser. Can that be done? - >
>eliaz
>
> That's a bug that we're attempting to fix soon.

Ok, thanks. For now if I leave the tor check tab up I can easily keep
track of which browser I'm in.



___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] bridge up & down times

2012-02-12 Thread eliaz
I have a few novice questions about a normal bridge I've set up. I've
not found answers in the documentation.

* Opposite the one country that's so far listed in the usage summary,
the #Client column shows "1-8". What does this mean exactly? 1 client?
eight? 1 client eight times?

* When I do have to shut down my machine or stop Tor I'd like to do it
when no clients are using the bridge. The bandwidth graph spikes every
few minutes, hard to predict from it when there might be no traffic. Is
there an app from which over time I could get an idea of when it's least
disruptive to stop Tor? Can't use Arm; I'm running on windows. I can log
onto shell accounts via ssh in PuTTY/pageant, if that's any help. Thanks
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] bridge up & down times

2012-02-13 Thread eliaz
On Feb 12, 2012, at 11:38 PM, eliaz wrote:
> * When I do have to shut down my machine or stop Tor I'd like to do it
> when no clients are using the bridge.
> Is there an app from which over time I could get an idea of when it's
> least disruptive to stop Tor?

You can set the ShutdownWaitLength tor configuration option to something
very high, like half an hour or so. That means Tor will continue
servicing ongoing connections, but not accept new ones. Once there are
no more ongoing connections or 30 minutes are up, Tor will exit.

Cool, thanks. What's the unit for ShutdownWaitLength? (seconds, ms, ...?)

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] bridge up & down times

2012-02-13 Thread eliaz
Yup, thanks. I've finally found my way to the Tor manual, so maybe will
not have to ask so many dumb questions.

On 2/13/2012 1:59 PM, Sebastian G.  wrote:
> eliaz, 13.02.2012 15:17:
>> Cool, thanks. What's the unit for ShutdownWaitLength? (seconds, ms, ...?)
> 
> It's seconds.
> 
> Regards,
> bastik_tor
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] shutdown latencies

2012-02-15 Thread eliaz
I'm currently maintaining a (normal) bridge from a machine running
Vista.  I've set ShutdownWaitLength to 30 minutes in  torrc. When for
some reason I have to press "Stop Tor" and get the message "Would you
like to shut down gracefully and give clients time to find a new relay?"
along with the red onion icon, what exactly does this mean? The icon
seems to sit there forever, and I'm loath to evoke Stop Tor again if it
means killing the connection in the middle of someone's conversation. So
I'm asking, When the red onion is up does it mean that people are
actually still using my bridge, or that Vidalia's just waiting for the
shutdown timeout to run its course?

I suppose I can figure this out by some experimentation. But I'd rather
not muck about locally to get a mental picture of what's going on in the
network while someone out there is in the middle of using it.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] shutdown latencies

2012-02-15 Thread eliaz
Thanks, this gives me someplace to start.

On 2/15/2012 1:52 PM, Justin Aplin wrote:
> On Feb 15, 2012, at 12:48 PM, eliaz wrote:
>> I've set ShutdownWaitLength to 30 minutes in  torrc.
> 
> If this is actually set to 30 minutes, and not 30 seconds, I believe
> that's your problem

I do other things besides maintain a bridge on this machine; I've set a
half-hr timeout so that I can shut down when necessary & then restart
before the bridge goes down. I thought this would make it easier on the
network & the people using the bridge.

>> When for some reason I have to press "Stop Tor" and get the message 
>> "Would you like to shut down gracefully and give clients time to find a
>> new relay?" along with the red onion icon, what exactly does
>> this mean?
> 
> It signals your node to stop accepting new connections, and not
> renew existing ones when they end. This allows those clients who were
> connected through your node to smoothly transition to a new node without
> interruption. At the end of the ShutdownWaitLength timeout, all
> connections are killed regardless, and the node shuts down.

I think I understand you to mean that the clients (nodes) are talking
code to each other, and the actual users don't even notice that the
bridge is gone & they're on a new path. Is this correct?

>> The icon seems to sit there forever

I exaggerated; I guess I've been too busy (aka too damned impatient) to
wait more than 30 minutes... Thanks again - eliaz
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What is the new signature of new TBB?

2012-02-21 Thread eliaz
I just went through this. You have to import Erin's key into your
certificate handler (Kleopatra or whatever), and then verify the browser
.gz.asc file against that. HTH eliaz

On 2/20/2012 11:55 AM, James Brown wrote:
> Hello, friends!
> 
> I have got a new TBB file
> tor-browser-gnu-linux-x86_64-2.2.35-7.2-dev-en-US.tar.gz for the site of
> the Torproject and have tried to verify it.
> I have had the next result:
> $  gpg --verify
> tor-browser-gnu-linux-x86_64-2.2.35-7.2-dev-en-US.tar.gz.asc
> tor-browser-gnu-linux-x86_64-2.2.35-7.2-dev-en-US.tar.gz
> gpg: Signature made Mon Feb 20 12:45:15 2012 UTC using RSA key ID 140C961B
> gpg: Can't check signature: public key not found
> 
> As I can the the previous version was signed by Erinn Clark:
>  gpg --verify tor-browser-gnu-linux-x86_64-2.2.35-7-dev-en-US.tar.gz.asc
> tor-browser-gnu-linux-x86_64-2.2.35-7-dev-en-US.tar.gz
> gpg: Signature made Sat Feb 18 19:53:24 2012 UTC using RSA key ID 63FEE659
> gpg: Good signature from "Erinn Clark "
> gpg: aka "Erinn Clark "
> gpg: aka "Erinn Clark "
> 
> 
> Is the sign of tor-browser-gnu-linux-x86_64-2.2.35-7.2-dev-en-US.tar.gz
> right sing?
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Let's make Onion Addresses Meaningful To Humans

2012-02-25 Thread eliaz

Why not just collect onion addresses in an encrypted file? ...

On 2/24/2012 5:36 AM, Ahmed Hassan wrote:
> Hello Folks,
> 
> I have a cool idea to make onion addresses memorable. That will have no
> effect on its authenticity and security.
[snip]
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] log notice & warn

2012-02-25 Thread eliaz
[TBB -7.1 on Vista x64] When I overwrite log notice in torrc to warn, I
get only info lines, no others. My reading of the manual is that with
log warn I should get only warn & err lines. Am I missing something or
is this a bug?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Let's make Onion Addresses Meaningful To Humans

2012-02-25 Thread eliaz
Where all the other sensitive files are, and updated as needed. I'm do
see how the dictionary scheme might be helpful in some instances, though
for some users it might be another complication. But I'm no expert in
these matters, just a user.

On 2/25/2012 4:12 AM, Ahmed Hassan wrote:
> and store that file where?
> How that encrypted file will be updated?
> 
> On Sat, 2012-02-25 at 04:09 -0500, eliaz wrote:
>> Why not just collect onion addresses in an encrypted file? ...
>>
>> On 2/24/2012 5:36 AM, Ahmed Hassan wrote:
>>> Hello Folks,
>>>
>>> I have a cool idea to make onion addresses memorable. That will have no
>>> effect on its authenticity and security.
>> [snip]
>> ___
>> tor-talk mailing list
>> tor-talk@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
> 
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] log notice & warn

2012-02-25 Thread eliaz
Thanks. I've found my way, & asked the question there as you suggest.

On 2/25/2012 6:38 AM, Robert Ransom wrote:
> Please open a Trac ticket.
> 
> On 2012-02-25, eliaz  wrote:
>> [TBB -7.1 on Vista x64] When I overwrite log notice in torrc to warn, I
>> get only info lines, no others. My reading of the manual is that with
>> log warn I should get only warn & err lines. Am I missing something or
>> is this a bug?
>> ___
>> tor-talk mailing list
>> tor-talk@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] ? A1

2012-02-28 Thread eliaz
Besides the usual countries, my Bridge Usage Summary now shows "A1" with
 no flag ("?" in the leftmost column). What does A1 mean?
 - eliaz
   ID: C3E1E38D


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] node depictions in network map

2012-03-02 Thread eliaz
I've recently started seeing pairs of in-country nodes in the network
map. I recall reading that that for security reasons only one node in
each country would be indicated, except when a circuit

(node1 country A) -> (country B) -> (node 2 country A)

was being depicted.

Do the depictions of wholly in-country circuits

(node1 country A) -> (node 2 country A)

indicate a problem?

I believe I've started seeing these after starting to run a (normal)
bridge. - eliaz
-- 
gpg ID: C3E1E38D
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] number of relays by country?

2012-03-02 Thread eliaz
Partly as a way of learning more about my normal bridge works I'm
thinking of asking a friend of mine in a far country to set up a tor
client. There are no relays in his country as far as I can tell from the
Network Map & listing, since I can't arrange the listing completely
alphabetically by clicking on the flag column & I'm going blind
scrolling thru it.

Is there somewhere a list of the number of relays by country?

Also, I suppose I should warn my friend not to set up his client as an
exit node if it's to be the only one in his country. But would he be
less than normally anonymous (that is, subject to discovery at other
than entry & exit nodes) just by connecting via my bridge? I hope these
questions make sense. - eliaz
-- 
gpg ID: C3E1E38D
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Best practice yet again

2012-03-14 Thread eliaz
So my bridge relay has been running fine in the weeks since I set it up,
the usage summary is showing up to eight or nine different countries, no
trouble is showing up in the logs. Memory usage seems a little high
running on Vista_ x64 but I can live with it. I still have a little
concern that some bad actors are walking across the bridge, but I guess
there's nothing to do about that. The problem is that I'm doing
everything on one machine and have to stop Tor for 20 minutes or an hour
every four days or so to do some housekeeping, and I'm not sure if the
disruption that may be causing warrants my putting in a dedicated
machine. I've written ShutdownWaitLength 40 into torrc; since I mostly
run the bridge but don't log onto the network much myself, I've also set
KeepalivePeriod 7200 (2 hours). Are there are other torrc options that
will help mitigate the effect of the shutdowns? I also reboot my gateway
(the router/modem firewall) once every day or two and I don't know how
disruptive the resulting change in bridge address is. Any advice as to
best practice would be appreciated. - eliaz
-- 
gpg: 0xC3E1E38D
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] A "paranoid" question

2012-03-17 Thread eliaz
On Mar 16, 2012, at 11:42 PM, Raynald wrote:
[snip]
> Well, one good way would be to run a fast relay yourself, have it join
> the network, and see if it gets advertised as a fast relay.

What's a"fast" relay? Does "fast" have anything to do with bridges? - eliaz
-- 
gpg ID: C3E1E38D
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] high memory usage

2012-03-17 Thread eliaz
The only problem I have with the bridge I'm running is that for some
reason the memory used keeps climbing up, so that after three or four
days I have to reboot the machine. AFAICT rebooting doesn't affect the
bridge's usefulness much, but I can't do much else when the mem use
reaches 2.9 G. I recall seeing some discussion of this way back in
tor-talk, but can't find it. Can someone point me to it? [Running on
Vistax64 2.5 GHz dual core cpu, 4 G RAM] Thanks - eliaz
-- 
gpg ID: C3E1E38D
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] high memory usage

2012-03-18 Thread eliaz
Is it possible that someone using my bridge dropped something into my
system?

Thanks Jude. I don't think anonymity has been compromised, while running
the bridge I haven't used the client, being busy with other things. I
haven't had time yet for *nix. I've run VirtualBox for a couple of
years. (For the devil of it I've run Vidalia successfully in Win2K in
the VM, and also off a flash drive, but don't have any reason to think
those two ways would be any more secure than running off the Vista host
machine.)

Thanks too for Jon's & Robert Ransom's replies. I was running no extra
apps when this problem started. I'm using TBB 2.2.35-7.1, it's clean.
Looking at processes, I see way too many new svchosts. I'm running
tasklists in a batch file for the next few days to see what the svchosts
are carrying & what changes as the memory use rises. So far no malware
reported by AVG, I'll run a full system scan tonight. After that I'll
recheck my local & modem/router ports. The bridge has been carrying
traffic from up to 14 countries according to the bandwidth usage,
sometimes it's quite heavy. AFAICT the message log doesn't show anything
amiss. - eliaz | gpg ID: C3E1E38D

On 3/19/2012 12:40 AM, Jude Young wrote:
> On 03/18/2012 12:35 AM, eliaz wrote:
>> The only problem I have with the bridge I'm running is that for some
>> reason the memory used keeps climbing up, so that after three or four
>> days I have to reboot the machine. AFAICT rebooting doesn't affect the
>> bridge's usefulness much[snip][Running on Vistax64 2.5 GHz dual core
>> cpu, 4 G RAM] Thanks - eliaz
> 
> Weell, there's your problem.
> Your using windows.
> 
> That right there is enough to kill any anonymity even if your using Tor.
> Personally I have seen Windows machines become infected when:
> It wasn't being used except once a week,
> The user was one who had a reasonable knowledge of security (Me)
> Anti-Virus (actually did not detect it..)
> Incoming connections where heavily blocked (related,established)
> 
> 
> You have plenty of RAM, run a virtual machine (virtualbox works great)
> install debian on it (my personal choice) no gui.
> give it 256MB of ram, no swap. (that's a LOT for this setup...swap off
> so that instead of freezing it just kills the process)
> run Tor inside the VM.
> 
> Voila, ram usage will now NEVER exceed the size of the VM, and it's
> relatively easy to set up.
> CPU usage for the VM will also be really low.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Where to advertise bridges?

2012-03-19 Thread eliaz
On 3/18/2012 11:45 PM, bordergu...@riseup.net wrote:
> Where are some good places to advertise tor bridges?

I'm also interested in the question. It might better be phrased "How do
we inform people of our bridges who can use them?"

If the following is off the wall I'll be glad to be corrected.

I hang out in emigre & exile communities; sometimes I'll invite myself
to a meeting of a group I know nothing about except that comms to the
home country has been blocked. Most of the people I meet have other
things on their minds besides installing & managing Vidalia, or the
knowledge & equipment to do so. I don't feel confident myself to engage
in training. But I wear a tee with the Tor onion in the expectation that
if someone recognizes it, he or she will remark on it, and then I can
offer the existence of the bridge. I do the same thing when I meet with
peace-activist or humanitarian-aid groups. so far I haven't had any
takers, but this seems like a simple way of spreading the word to those
who can use it.- eliaz
-- 
gpg ID: C3E1E38D
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What happened to the list of active nodes?

2012-03-21 Thread eliaz
I also get errors at the Atlas. Wen entering my bridge's IP address or
anything else I get:

Backend error!

The backend server replied with an error to your query. This probably
means that you did not properly format your query. Or that you just are
trying to fuzz my web app hoping to pwn me. Good luck! ;)

On 3/21/2012 11:33 AM, Karsten Loesing wrote:
> On 3/21/12 4:04 PM, David Carlson wrote:
>> Last night I tried to find the list of active nodes and it was gone.
>> There was link to something called atlas, but it simply had a box marked
>> search.  I tried to enter the name of my relay and I got an error.
> 
> What error did you get?
> 
>> What about all the nodes that do not have names?
> 
> Atlas allows you to search by nickname, fingerprint, or IP address.
> 
> Best,
> Karsten
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 

-- 
gpg ID: C3E1E38D
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] testing, please ignore

2012-04-21 Thread eliaz
This is just a test; please ignore it. Since I changed my tormail
address from .net to .org & resubscribed to tor-talk from the new
address I'm not getting tor-talk mail in my TBird client.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] testing, please ignore

2012-04-21 Thread eliaz
On 4/21/2012 3:55 PM, eliaz wrote:
> This is just a test; please ignore it. Since I changed my tormail
> address from .net to .org & resubscribed to tor-talk from the new
> address I'm not getting tor-talk mail in my TBird client.

Joe Btfsplk wrote
>>>Make sure it's not getting filtered as spam by your ISP.  That
happened to me.  I just added Tor-talk to my address book.<<<

Thanks, but that wasn't the problem here. In any case, earlier today I
sent a query to the tormail admins, and now the mail is coming through.
I guess the admins fixed something... - eli
-- 
gpg ID: 0xC3E1E38D
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] No Browser, ContactInfo rewrites?

2012-04-23 Thread eliaz
[TBB 2.2.35-8 running on Vistax64, with bridge enabled] So, earlier I
noticed a lot of continuous traffic in the Bandwidth Graph, and
ContactInfo in torrc being rewritten periodically:
"ContactInfo  gpg 0x" going to variations of

ContactInfo "\"\\\"\\\" gpg 0x\\\"\""

The other thing that's happened is that the browser has disappeared, but
vidalia is still running, and the Message Log shows nothing amiss.

All this during the last 8 hrs or so when the only country reported in
the Bridge Usage Summary was China. (Which I'm suspicious of; usually
over 8 hrs a lot of countries show up in the summary.)

I didn't see any new processes running; cpu load was normal. netstat and
the security log of my browser/router don't show any alarms, not that
I'm very good at recognizing problems there. A partial scan of my
machine (haven't had time to run a full) shows nothing.

Unless I'm misreading a coincidence, I finally stopped the rewriting of
torrc and the high BW use by rebooting the modem gateway, but the
browser is still gone.

I'm going to restart Tor; in the meanwhile, has anyone seen this sort of
disappearance of the browser in TBB? Does the rewriting of ContactInfo
indicate intrusion, or just some screw-up of my own doing? - eliaz

gpg: 0xE498E90D


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] how bridges work

2012-05-06 Thread eliaz
Of what use is a bridge working off an IP address of a provider located
in, say, the US, to a client in, say, Syria? Sorry for the elementary
question. - eli
-- 
gpg: 0xE498E90D

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] how bridges work

2012-05-07 Thread eliaz
On 5/7/2012 2:20 AM, Roger Dingledine wrote:
> On Sun, May 06, 2012 at 05:07:26AM -0400, eliaz wrote:
>> Of what use is a bridge working off an IP address of a provider located
>> in, say, the US, to a client in, say, Syria? Sorry for the elementary
>> question. - eli
> 
> The client in Syria can connect through the bridge in the US to reach
> the Tor network. Simplifying a bit, the bridge provides the reachability,
> and the Tor network provides the anonymity.
> 
> See also https://www.torproject.org/docs/bridges

Thanks for the reassurance about the process. While I accept the
free-speech basis of Tor (that "bad" as well as "good" guys can use it)
and the assumption that the network is overall doing more good than bad,
I've been concerned at the high usage that my bridge seems to be getting
from Syria (& China) when, as you say, at least for Syria it's not
necessary to hop all the way to the US to reach an entry node. Maybe I
worry too much, since it's neither here nor there to digital comms how
geographically far away an entry node is from a client machine.
-- 
gpg: 0xE498E90D

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] how bridges work

2012-05-10 Thread eliaz
On 5/8/2012 11:40 AM, Xinwen Fu wrote:
> This paper may help http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf.

Thanks for the analysis, it's very useful. It raises some questions that
the programmers may want to shed light on.

Based upon my reading of the report, bridge usage greater than the norm
can be due to bridge-harvesting as well as to an increase in legitimate
traffic. Since the Bridge Usage Summary isn't in real time, there's no
point in my changing the bridge address (rebooting gateway) when I see a
bump in the Summary.

But if I ran a dummy client on a different machine, would I be able to
identify harvesters from the message logs? And would it be useful to
then reassign the bridge address?

The other thing and get from the report is that while the harvesters can
identify bridges, they can't uncover the identity the clients using
those bridges. Assuming that the routing algorithm keeps clients
attached to bridges during a IP address change (that is, if it connects
clients to bridge names rather than IP addresses), wouldn't it be useful
for me to reassign my bridge address randomly, without trying to
synchronize with the harvesters? - eli
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] apparent error in TBB 2.2..38-2

2012-09-11 Thread eliaz
Since loading TBB ver. 2.2.38-2, I notice that when I open & then try to
close torrc in Vidalia I get an 'Error at line one: "" ' message. This
only happens when I attempt to close the editing window by clicking on
OK; when I click on the upper right 'x' the editing window closes as it
should. The contents of the bridge torrc are exactly the same as when I
ran the bridge in previous versions of the TBB and previous
configurations of my machine. The bundle runs fine as a client, but I
still get the annoying error msg when inspecting torrc. I've downloaded,
verified, and run the setup program twice. Running on Vista x64. Can
anyone give advice on how to deal with this error? - eliaz
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] apparent error in TBB 2.2..38-2

2012-09-12 Thread eliaz
Thanks, Sebastian. Yes, editing the comment lines out in notepad
eliminates the error msg. Should have thought to try that myself.
 - eliaz

On 9/12/2012 1:41 PM, Sebastian G.  wrote:
> eliaz:
>> Since loading TBB ver. 2.2.38-2, I notice that when I open & then try to
>> close torrc in Vidalia I get an 'Error at line one: "" ' message. This
>> only happens when I attempt to close the editing window by clicking on
>> OK; when I click on the upper right 'x' the editing window closes as it
>> should. The contents of the bridge torrc are exactly the same as when I
>> ran the bridge in previous versions of the TBB and previous
>> configurations of my machine. The bundle runs fine as a client, but I
>> still get the annoying error msg when inspecting torrc. I've downloaded,
>> verified, and run the setup program twice. Running on Vista x64. Can
>> anyone give advice on how to deal with this error? - eliaz
> 
> Hi,
> 
> please see bug 6147
> 
> https://trac.torproject.org/projects/tor/ticket/6147
> 
> You still can edit the torrc manually (with notepad/editor).
> 
> You can remove all comment lines from (lines starting with #) the torrc
> to save it from within Vidalia.
> 
> There's a patch already. With status "needs-review". I'm not able to
> understand it nor am I in the position to update/change the status even
> if I would be able to review the patch.
> 
> I assume waiting for
> a) patch getting reviewed (or knowing some who does that)
> b) getting merged into Vidalia (hopefully 0.2.19)
> c) bundles get updated and include the patched Vidalia
> is the only way to deal with it.
> 
> Regards,
> bastik.tor
> 
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 

-- 
gpg: 0x3E346824

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Legitimate list?

2012-10-09 Thread eliaz
I hope tor-talk is an appropriate place to post this query.

I've been invited to a mailing list that is purportedly for bridge
runners.  The introduction to the list states:

>>>
This list will be devoted to providing TOR bridges to help people in
censored areas reach the free internet. Subscribers to this list can
submit ip addresses and once a week, a limited list of bridges will be
released to subscribers to help people (such as Syrians, Chinese,
Iranian etc reach for these bridges to access the internet.
<<<

I know and trust the folks who administer the list server software, but
have no idea who is managing the particular mailing list. I've posted a
query to the list requesting some sort of authentication, but so far
have received no reply.

Should I trust this list with my bridge details?  Can anyone suggest a
method of authentication, other than a facemeet, that I can suggest on
the list?  Finally, if anyone here recognizes the list I'm talking
about, please post your experiences.  Thanks, eliaz

pgp: E498E90D
-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v2.0.17 (MingW32)
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=n4/m
-END PGP PUBLIC KEY BLOCK-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Legitimate list?

2012-10-10 Thread eliaz

Runa A. Sandvik:
> This list is not run by anyone at the Tor Project.

SiNA Rabbani
> Can you post the invitation email with full headers?

Thanks, it's helpful to know they're not of the Tor Project. Still, they 
may be people like me, interested in distributing our bridge addressess 
safely to those who can use them well. The admins at the host have high 
standards of safety and use for good purposes (or at least purposes that 
I can agree with). But AFAICT the admins pretty much let anyone set up a 
list without supplying bona fides (whatever they're worth, on the 
internet) in advance. I intend to get back to the admins with this 
question about the list. But before I get ahead of myself & aggravate 
them, I'd like to be a little more confident that this may be a real 
problem rather than my overactive imagination. I'll be glad to send Runa 
the hdr info by PM as SiNA suggests. Let me know if that will be a help. 
- eliaz


thread:

On Wed, Oct 10, 2012 at 5:48 AM, eliaz  wrote:

I hope tor-talk is an appropriate place to post this query.

I've been invited to a mailing list that is purportedly for bridge
runners.  The introduction to the list states:




This list will be devoted to providing TOR bridges to help people in
censored areas reach the free internet. Subscribers to this list can
submit ip addresses and once a week, a limited list of bridges will be
released to subscribers to help people (such as Syrians, Chinese,
Iranian etc reach for these bridges to access the internet.
<<<

I know and trust the folks who administer the list server software, but
have no idea who is managing the particular mailing list. I've posted a
query to the list requesting some sort of authentication, but so far
have received no reply.

Should I trust this list with my bridge details?  Can anyone suggest a
method of authentication, other than a facemeet, that I can suggest on
the list?  Finally, if anyone here recognizes the list I'm talking
about, please post your experiences.  Thanks, eliaz


--
gpg: E498E90D


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Vista DEP and TBB

2013-03-07 Thread eliaz
I'm writing to ask if there's been some network or server problem the
last few days?  I've run into a variety of error msgs & non-reproducible
difficulties, and before I tear my system apart I want to be sure that's
what I need to do.  Details:

All night the TBB hasn't been able to raise check.torproject.org as it
usually can on startup.  I finally got a couple of other sites up in
other tor browser tabs, along with spurious unsafe-site & other
warnings.  I would assume the problem was at the torproject servers,
except that I've gotten various error messages at various attempts to
log on that say that the problem might be a proxy error in my TBB
configuration, although I'm using the default installation unchanged.  I
still wouldn't worry except that Vista's Data Execution Prevention is
giving me warnings.  Also, the last couple of days my tor e-mail client
(thunderbird) wouldn't send or receive, leading me to think that
something was broken here; but tonight thunderbird has on its own accord
begun behaving as it should. - eli

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Vista DEP and TBB

2013-03-07 Thread eliaz
Thanks, Krishna & Fabian - Yes, it looks like what I thought were
symptoms of a local problem were in fact hiccups in the network. Both
torbrowser & the TB email client have begun to work properly on their
own. My local testing shos nothing amiss. - eliaz

On 3/7/2013 10:52 AM, Fabian Keil wrote:
> I don't use TBB or Vista, but I've recently started getting
> "SOCKS5 TTL expired" errors (Privoxy's translation for SOCKS5
> error code 6) that seemed to survive circuit changes and
> persisted until tor got a SIGHUP or was restarted.
>
> If you just refreshed the page a bunch of times but didn't actually
> restart tor, this could explain the check.torproject.org issue.
>
> Note that I haven't correlated my logs yet to verify that this is
> a real issue and not just a bunch of coincidences that looked like
> a Tor problem.

On 3/7/2013 8:08 AM, krishna e bera wrote:> On Thu, 07 Mar 2013 05:59:01
-0500
> Tor has been fine for me the whole week.
> Suggestion: basic Windows diagnostics
> 1) boot from cd ; memtest
> 2) boot from cd ; chkdsk /r
> 3) cmd ; sfc /scannow
> 4) malwarebytes.org quickscan
> 5) Windows updates

> eliaz  wrote:
>
>> I'm writing to ask if there's been some network or server problem the
>> last few days?  I've run into a variety of error msgs & non-reproducible
>> difficulties, and before I tear my system apart I want to be sure that's
>> what I need to do.
-- 
gpg: E498E90D


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TBB ver. 2.3.25-5 install

2013-03-20 Thread eliaz
[this in Vista x64] I haven't been able to install TBB ver. 2.3.25-5 
successfully. The browser comes up but doesn't connect; instead it gives 
me an error message that it can't find the server. I've had to drop back 
to 2.3.25-4. The interesting thing is that when check.torproject.org 
comes up in -4, it doesn't complain about -4 being out of date.


I've had the same results with two separate downloads of the new 
version. Before I spend more time messing with my setup, I'm wondering 
if anyone else has run across this problem? - Thanks, eliaz


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB ver. 2.3.25-5 install

2013-03-25 Thread eliaz
Thanks, that's a help. I've loaded it successfully on a remote machine.
Won't try it just now on my main machine as I've got a bridge running.

> Hi, Eliaz. After reading this message, I tried 2.3.25-5 in my Windows 8
> x64
> and it worked fine. Sorry for not helping with your problem, I'm new at
> Tor, it's just to let you know it's not a general problem in Windows.
>
> Rodolfo Ferraz
>
>
> 2013/3/20 eliaz 
>
>> [this in Vista x64] I haven't been able to install TBB ver. 2.3.25-5
>> successfully. The browser comes up but doesn't connect; instead it gives
>> me
>> an error message that it can't find the server. I've had to drop back to
>> 2.3.25-4. The interesting thing is that when check.torproject.org comes
>> up in -4, it doesn't complain about -4 being out of date.
>>
>> I've had the same results with two separate downloads of the new
>> version.
>> Before I spend more time messing with my setup, I'm wondering if anyone
>> else has run across this problem? - Thanks, eliaz
>>
>> __**_
>> tor-talk mailing list
>> tor-talk@lists.torproject.org
>> https://lists.torproject.org/**cgi-bin/mailman/listinfo/tor-**talk<https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>
>>
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] geoip6

2013-04-11 Thread eliaz
Can someone tell me if I have to do something about geoip6 warnings?

I've got a bridge relay running from a vista x64 machine. As with the
past few TBB versions I'm still getting occasional message-log warnings:

"Failed to open GEOIP file C:\Users\,\AppData\Roaming
\tor\geoip6."

\AppData\Roaming\tor doesn't exist, nor does the subfolder
\geoip6, as I'm running the bridge from from TBB installed on a USB
stick. The installation seems correct, my geoip is in the data
directory as usual. As far as I can tell the bridge is connecting to
circuits as it should (though it's not carrying as much traffic as
previously).

I did find some discussion in bug tracker, but it's months old and
doesn't suggest anything that I can do.

So, do these warnings even apply to my relay installation? Can I
just ignore them?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] SafeLogging

2013-11-06 Thread eliaz
I'm running Tor v0.2.3.25 in bridge mode on Win 7. I can write
SafeLogging 1 | relay into torrc, but SafeLogging 0 doesn't take (I
write it into torrc, but then when I go look at the running torrc from
vidalia, it's not there), and the Message Log records [scrubbed]. This
didn't happen - I was able to see all the nodes - in previous versions.
I'm curious: is the info for SafeLogging in tor-manual.html.en out of date?

If this is not the sort of question to discuss in the clear forum, I'll
be glad to send it encrypted to Support.

Much obliged, eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is it possible to access healthcare.gov through Tor?

2013-11-12 Thread eliaz
On 11/12/2013 4:57:09 AM, bao song (michaelw...@yahoo.com.au) wrote:
> In order to minimise the information I give away when shopping on
> healthcare.gov (before actually buying),
> I'd like to use Tor to access the website, but I keep getting 'Forbidden.'

You don't need Tor to do this. Load HTTPS Everywhere into our open
Firefox or Chrome, and use the private or incognito mode.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Vidalia.

2014-01-04 Thread eliaz
On 1/4/2014 1:28 PM, Артур Истомин wrote:
> On Sat, Jan 04, 2014 at 09:57:19AM -0800, Bobby Brewster wrote:
>> I see that Vidalia is no longer part of the TBB.
>>
>> What is the best way to monitor bandwith throughput?  I always found this 
>> helpful when assessing the quality of the connection.
>
> It can be installed separately from
> https://people.torproject.org/~erinn/vidalia-standalone-bundles/
> See answer to question "Where did the world map (Vidalia) go?" from
> https://trac.torproject.org/projects/tor/wiki/doc/TorBrowserBundle3FAQ
> 

Thanks for the post & reply, I too was wondering about the absence of
vidalia in 3.5. I find the BW graph useful in picking quiet times to
unload the bridge without inconveniencing clients. Does that make sense?
Or is it enough to stop tor nicely?

---
This email is free from viruses and malware because avast! Antivirus protection 
is active.
http://www.avast.com

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] startpage and ixquick

2014-01-14 Thread eliaz
Are there security issus in using ixquick https instead of startpage in
Tor 3.5 (Windows)? I'm finding startpage a bit cranky; sometimes it
complains about "too many simultaneous connection," but at those times
ixquick works fine.

---
This email is free from viruses and malware because avast! Antivirus protection 
is active.
http://www.avast.com

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Vidalia Log 404 msgs

2014-01-14 Thread eliaz
Running a bridge relay with standalone Vidalia 0.2.21 and Tor 3.5:
Occasionally I'm getting '[Warning] Received http status code 404 ("Not
found") from server xxx' (for guard relays, I presume; see the log lines
below.) These are immediately followed by normal log entries, and other
checking shows the circuits working fine. Are these warnings important?
What am I supposed to do about them?
-
--extracted from Vidalia Message Log:
Jan 14 04:37:42.350 [Warning] Received http status code 404 ("Not
found") from server '83.212.99.68:9010' while fetching
"/tor/keys/fp-sk/14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4-98CC82342DE8D298CF99D3F1A396475901E0D38E".
Jan 14 04:47:53.388 [Warning] Received http status code 404 ("Not
found") from server '83.212.99.68:9010' while fetching
"/tor/keys/fp-sk/14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4-98CC82342DE8D298CF99D3F1A396475901E0D38E".
Jan 14 05:22:54.372 [Notice] Heartbeat: Tor's uptime is 3 days 5:57
hours, with 3 circuits open. I've sent 10.28 MB and received 79.27 MB.

---
This email is free from viruses and malware because avast! Antivirus protection 
is active.
http://www.avast.com

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Vidalia Log 404 msgs

2014-01-14 Thread eliaz
> On 15/01/2014 2:55 AM, eliaz wrote:
>> Running a bridge relay with standalone Vidalia 0.2.21 and Tor 3.5:
Occasionally I'm getting '[Warning] Received http status code 404 ("Not
found") from server xxx' (for guard relays, I presume; see the log
lines
>> below.) These are immediately followed by normal log entries, and other
checking shows the circuits working fine. Are these warnings important?
What am I supposed to do about them?
>> -
>> --extracted from Vidalia Message Log:
>> Jan 14 04:47:53.388 [Warning] Received http status code 404 ("Not
found") from server '83.212.99.68:9010' while fetching
>> "/tor/keys/fp-sk/14C131DFC5C6F93646BE72FA1401C02A8DF2E8B4-98CC82342DE8D298CF99D3F1A396475901E0D38E".
> See: [tor-relays] 404: /tor/keys/fp-sk/print-print not found

Thanks, nano. I missed that thread in tor-relays.- eliaz




-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TBird & torbirdy

2019-11-17 Thread eliaz
I just installed Thunderbird 68.22 on a new machine and find out that 
the torbirdy extension cannot be installed in versions above 60. I've 
been running Thunderbird with the -p flag so that when I run over the 
Tor Browser Bundle 9.01 I can use the torbirdied instance. Does TBird 
68.22 no longer need to be torified? Thanks for any enlightenment. - eli


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Fwd: Cryptopolitik and the Darknet

2016-02-25 Thread eliaz
grarpamp:
> -- Forwarded message --
> From: Steve Kinney 
> Date: Mon, 15 Feb 2016 08:59:32 -0500
> Subject: Cryptopolitik and the Darknet
> To: cypherpu...@cpunks.org
> 
> Cryptopolitik and the Darknet

As an erstwhile bridge operator & also one who's put a lot of thought
into the possibilities of abuse of the network, and also never quite
believing that "there are more good than bad people," I found the
article extremely useful.  Two passages from the summary:

"Proponents of hidden services argue that the cryptographic
protocols that power the internet today were at the fringe
of software development and considered a threat as late as
1995. Hidden services, they argue, are what https was 20
years prior: the future of security, not a threat to
security. These arguments are strong, and cannot be
dismissed; the technology may well mature and move into the
mainstream in the future. But the crypto purists, Tor's
developers among them, often fail to acknowledge an even
more fundamental point, one that is deeply rooted in the
recent history of cryptography: enhanced privacy, enhanced
authentication and enhanced user anonymity are not tied to
the service or content provider remaining anonymous and
unregistered. Our first four properties – security,
authentication, user anonymity and cash (or blockchains) –
are entirely disconnected from the fifth: unidentified
hidden exchanges. These issues are conceptually, politically and
technically distinct. "

"End-to-end encryption will therefore always be available to
a determined, capable user. Moreover, at present, the
powerful dynamics of open markets for communication
services do not favour end-to-end encryption among
individuals at a large scale, thus limiting the
technology's wider appeal and uptake. Any attempt to
systematically undermine end-to-end encryption – through
legislation requiring service providers to retain the
option of removing encryption for any given user – will
likely strengthen more secure implementations by creating
more demand for them, and thus help criminals and
militants. We believe it should be a political no-go area
for democratically elected governments to pursue such a
path."

So if it's possible to retain the desirable aspects of onion services
while also abandoning unidentifiability of content providers, why not do
it?  Tor operators and users could then join the rest a progressive
society, no?

I hope everyone takes time to read the article.  Then it would be
interesting to take a poll or vote here to see how the Tor community
feels about this. - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Fwd: Cryptopolitik and the Darknet

2016-02-25 Thread eliaz
Elaboration: I said in my previous post that I never quite believed that
"there are more good than bad people."  I think it's more to the point
of upgrading tor architecture to say that I don't feel comfortable
relying on "there are more good than bad people" as a justification for
the Tor Project's laudable aims. Regardless of numbers there *are*
people who will misuse tor, and the article gives good evidence that
those people are the ones who employ anonymous content platforms. - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Fwd: Cryptopolitik and the Darknet

2016-02-25 Thread eliaz
> On 2/25/2016 5:13:34 PM, Zenaan Harkness (z...@freedbms.net) wrote:
> > On 2/25/16, eliaz  wrote:
> > Elaboration: I said in my previous post that I never quite believed that
> > "there are more good than bad people."  I think it's more to the point
> > of upgrading tor architecture to say that I don't feel comfortable
> > relying on "there are more good than bad people" as a justification for
> > the Tor Project's laudable aims. Regardless of numbers there *are*
> > people who will misuse tor, and the article gives good evidence that
> > those people are the ones who employ anonymous content platforms. - eliaz
> 
> There is a principle: to give up anonymous publishing for the ~2% of
> bad actors, you will give up that right for the rest of us as well.
> 
> Same goes for other rights, not just anonymity.
> 
> By allowing people to drive on public roads, we accept that
> occasionally some nutcase will also drive on the roads, run down a
> pedestrian or cop and or cause a lot of damage to property. It's part
> of the bargain.
> 
> Then some people will suggest "time for full time GPS tracking of all
> vehicles, you know, to stop the crazies", thereby giving up our right
> to anonymous travel.
[snip]
I still don't get it. If one believes in something, why not publish it
non-anonymously? Most of the examples given for anonymous publication
speak of small percentages of crazies. The Cryptopolitik article doesn't
show a small percentage of illicit hidden services. Of the 2,723 hidden
cervices that unambiguously met the taxa used, ~57% were illicit.
Analogies to crazies on the roads, etc., take on a different complexion
with such numbers. Gun violence in this country is pretty bad, but 57%?

It's easy to be a libertarian or anarchist at home. These perspectives
have contributed a lot to society; at the same time there's good reason
why they don't work as sole governing principles. For even
self-governance to work, liberty has to entertain constraints. The
Cryptopolitik study & article attempts to set the groundwork for a
non-bureaucratic, non-centralized but purely architectural way this
might be done.

That some people might have a non-criminal reason to host anonymous
sites is a valid concern. But, if "anonymous publication" isn't an
oxymoron, those folks will surely find ways to do it.

Maybe tor-talk isn't the place to talk about these issues. Thanks for
the opposite viewpoints. I'll shut up now, but will be interested to
follow any dialogue that ensues by folks who have waded thru the whole
article. - eliaz



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] "Sorry. You are not using Tor."

2016-05-05 Thread eliaz
I'm currently running a bridge via torbrowser (I know, it's not
recommended. Indulge me). When I checked torbrowser tonight, trying to
open check.torproject.org  I got me an error "Sorry. You are not using
Tor" and an apparent IPv6 address. But the path dropdown still gives the
expected 2nd nodde & full IPv4 path. I've not gotten this behavior
before. Why do I get  the error msg? What gives? - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] "Sorry. You are not using Tor."

2016-05-05 Thread eliaz

> On 5/5/2016 3:47:08 AM, eliaz (el...@riseup.net) wrote:
> > I'm currently running a bridge via torbrowser (I know, it's not
> recommended. Indulge me). When I checked torbrowser tonight, trying to
> open check.torproject.org  I got me an error "Sorry. You are not using
> Tor" and an apparent IPv6 address. But the path dropdown still gives the
> expected 2nd nodde & full IPv4 path. I've not gotten this behavior
> before. Why do I get  the error msg? What gives?

Ah, forget it - the browser GUI is behaving this morning. - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] 'Refresh tor browser' - and then it wasn't one anymore.

2016-05-05 Thread eliaz
> On 5/4/2016 1:00:36 AM, Andreas Krey (a.k...@gmx.de) wrote:
> > Hi all,
> 
> I just had the TBB ask me something to the lines
> of 'refresh tor browser?', and I sleepily said
> yes, and now the browser apparently has lost
> the addon that is the tor process underneath,
> and just says 'the proxy server is refusing
> connections'.
> 
> (I was already annoyed often enough by
> this 'feature' in plain firefox, but
> here it seems that it might leave
> users without connectivity.)

I have that problem too, with a bridge running in the tor browser under
windows. I have to is to save the torrc,  delete the tor browser,
reinstall it anew, replace torrc, and restart. This is really a pain, I
lose bridge flags whenever I install a browser or OS update.

This doesn't happen when I run a tor client. There the browser updates
go fine, the browser restarts itself as expected. - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] New relays and bridges.

2016-08-24 Thread eliaz

> On 8/21/2016 3:59:42 PM, laurelai bailey (laurelaist...@gmail.com) wrote:
> > Since some folks have declined to offer their services in this department i
> thought it might be a good idea to start outreach to get more bridges and
> relays setup. Ill be setting one up myself and encouraging others to do the
> same across various platforms.

Good luck.  the Tor Browser is a very user friendly *client* interface.
But when tor.exe got integrated into the Tor browser, windows users (at
least me) have not been able to set up relays. It seems that Tor
developers have abandoned the windows OS, and so made it impossible for
the community of windows users to contribute bridges, let alone relays.

I'd attempt to volunteer for that work, but I'm not a programmer.
 - eliaz
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] New relays and bridges.

2016-08-25 Thread eliaz
kl:
> On 8/21/2016 3:59:42 PM, laurelai bailey (laurelaist...@gmail.com) wrote:
>> But when tor.exe got integrated into the Tor browser, windows users (at
>> least me) have not been able to set up relays.
> 
> From what I understand it is better if Tor relays and Bridges have
> longer term availability.
> 
> It could be that only running a Relay for the 2 hours you are browsing
> the web and then cutting off all the connections that have been made
> through your Relay when you powerdown your desktop Windows PC and go to
> bed might not be desirable.

Your assumption is incorrect.  I invested in a dedicated box, which I
ran 24/7.  Unfortunately that CPU (embedded Atom 2550) turned out not to
be able to run *nix.
> 
> I think it is rare for a desktop Windows machine to stay running 24/7.
> So don't feel too bad about it.

I don't feel bad.  Just annoyed that that Tor developers abandoned
windows support without letting anyone know that windows users would
henceforth be limited to clients, not relays.  I actually don't need it
for client, but was enthusiastic to contribute to the network by running
a bridge at least.

> [snip]
> A download for just the Tor Browser without all the other crap mixed in
> would be nice but it's not a big deal. Having sane defaults for
> unsophisticated users is more important.

I agree with that.  But the Tor project should keep us informed on
developments or lack thereof, so we don't waste our time trying to setup
bridges in windows when it's no longer possible. - eliaz

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] New relays and bridges.

2016-08-30 Thread eliaz
> On 8/26/2016 10:13:39 AM, Jon Tullett (jon.tull...@gmail.com) wrote:
> > On 26 August 2016 at 06:53, eliaz  wrote:
> >>> But when tor.exe got integrated into the Tor browser, windows users (at
> >>> least me) have not been able to set up relays.
[SNIP]
> Would you be able to run a small headless Linux VM, with a Tor relay?
> That should be very low in resource overhead, and it wouldn't conflict
> with your desktop Tor browser.

A good idea, thanks.  Apologies for this tardy reply, I've been offline.
- eliaz

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk