[tor-talk] about tor entry node
I have some questions about tor entry node when a Tor node is used by a Tor client as entry node, how can this node know that it is used as an entry node? besides, why do Tor designers want to let the entry node know that it is an entry node? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] about tor entry node
2012/12/7 Sebastian G. bastik.tor bastik@googlemail.com esolve esolve: I have some questions about tor entry node when a Tor node is used by a Tor client as entry node, how can this node know that it is used as an entry node? I would have said because of the cells a client sends, but I couldn't find a document to verify my claim. (I'm not reading the specs very often) besides, why do Tor designers want to let the entry node know that it is an entry node? Generally: Entry nodes get the Guard flag so clients know among which nodes they can pick as their entry points. (Currently three entry guards, that might change in the future) - you meant each client can only have 3 entry guard candidates? how many entry guards are there in the whole tor network and how are they allocated? can entry guards be used as normal relay nodes? On each case: The Tor network is public (beside the bridges) so you know every node and therefor their IP addresses. Every IP that connects to you, which is not in the list of IP addresses you know, has to be either a client or a bridge. actually there are many good conference papers presume that the attacker takes control of an entry node and exit node, then blabla. so maybe their assumptions are just wrong at the beginning!? Regards, Sebastian (bastik_tor) ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] about tor entry node
what I meant is: Let me say that an attacker controls some nodes. At a certain time, one of the controlled nodes is used as entry node by a tor client, if the attacker doesn't know that the node is used as entry node, then the attacker can't identify the client. Even if it examines the IP addresses of the lists of relays, the suspicious IP may belong to a client or a bridge. so why tor designer let the attacker know when a controlled node is used as entry node? 2012/12/7 Sebastian G. bastik.tor bastik@googlemail.com esolve esolve: besides, why do Tor designers want to let the entry node know that it is an entry node? Generally: Entry nodes get the Guard flag so clients know among which nodes they can pick as their entry points. (Currently three entry guards, that might change in the future) - you meant each client can only have 3 entry guard candidates? A tor client picks three entry guards from the list of relays which got the guard flag. The client sets an expiry time from 30-60 days; after which it picks again. (It may do that earlier if Guards go down) how many entry guards are there in the whole tor network and how are they allocated? Around 900 entry guards out of 3000 relays. See this graph: https://metrics.torproject.org/network.html?graph=relayflagsstart=2012-09-08end=2012-12-07flag=Runningflag=Guardgranularity=day#relayflags can entry guards be used as normal relay nodes? Yes entry guards can be at any position in a circuit (if it also got the exit flag). (Middle relays are just relays without guard and exit flags) On each case: The Tor network is public (beside the bridges) so you know every node and therefor their IP addresses. Every IP that connects to you, which is not in the list of IP addresses you know, has to be either a client or a bridge. actually there are many good conference papers presume that the attacker takes control of an entry node and exit node, then blabla. so maybe their assumptions are just wrong at the beginning!? As much as I hope that they would be wrong... they are not. At least not to my understanding. If someone, that might be the relay operator that controls both entry and exit of a given circuit, or an adversary that can look at the traffic of them, can see both ends he can correlate the traffic. Based on timing information and traffic volume, for example. Low latency networks such as Tor suffer from traffic correlation, which has not been defeated yet. As far as I know this would be very hard to accomplish, if at all.. (I'm not experienced enough with this topic.) Entry Guards are one attempt to minimize the risk of being exposed to traffic correlation. If the client picks three guards that are honest (good guards), an attacker won't be able to correlate traffic, while it would be more likely to pick a bad entry point if entry guards wouldn't have been invented/introduced. (While there still is the case that a client can pick bad guards) To avoid building circuits over nodes that are controlled by the same operator, operators can set a Family for their nodes, so the Tor client would not pick them for the same circuit (also everything in the same /16 IP block). Obviously the relay operators have to be honest as this is an optional torrc setting and if your are a bad guy I guess you wouldn't set it. (The other way around is not true; if it is not set although it would be correct doesn't mean the relay operator is a bad guy) ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Tor souce codes
I'm doing research on Tor and I want to modify the tor exit node functions. I downloaded the source codes from this link https://gitweb.torproject.org/tor.git/tree/b13c6becc892d9716d8645f16b5d03bdb0b34651:/src but I can't find the modules/files which are related to tor exit functions(like receive cells from previous relay router, send HTTP/TCP connection request to webserver/remote_host, buffer management) can anyone give some hints? thanks! ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Tor souce codes
I want to look at the exit node buffer management, like: how is the buffer when the exit node is receiving packets from a remote webserver 2012/11/28 Fabio Pietrosanti (naif) li...@infosecurity.ch On 11/28/12 9:58 AM, esolve esolve wrote: I'm doing research on Tor and I want to modify the tor exit node functions. Which goal do you have for your research requiring modification to that part of Tor code? Regards, Fabio ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] details about Tor's packaging window and delivery window
thanks, however, the description is still too simple and obscure and in the spec, it also says: [this stuff is badly worded; copy in the tor-design section -RD] so actually, my understanding is: in the OR, the packaging window is for limiting the cells that are sent to the OP and it can be incremented when the OR receives a SENDME cell from OP. then how about the delivery window? it is for limiting the cells that are sent to a remote host(like webserver)? so how is it incremented? and what is the function of the packaging window and delivery window on the OP? 2012/11/23 Nick Mathewson ni...@alum.mit.edu On Thu, Nov 22, 2012 at 9:55 AM, esolve esolve esolvepol...@gmail.com wrote: [...] where can I find more details about these two windows? Try the specification document, tor-spec.txt. You can get it from the torspec git repository, or read it on the web at https://gitweb.torproject.org/torspec.git/blob/HEAD:/tor-spec.txt . I think the flow-control stuff should be in section 7. -- Nick ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] details about Tor's packaging window and delivery window
On the paper: Tor: The Second-Generation Onion Router there are two paragraphs about Tor's packaging window and delivery window, but the description is too simple and obscure especially the delivery windows and these two windows on the OP where can I find more details about these two windows? thanks! ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] threat imposed by flash my be dealt with
while many of us think that flash plugin may compromise the anonymity the following page tells us that it is possible the defeat the vulnerabilities through configuring proxy so that the flash can't bypass the proxy setting https://anonymous-proxy-servers.net/en/help/flash-applets.html ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] how to make firefox transmit dns query to tor
Hi, I'm using firefox with Tor for some tests work( can't use TBB because it doesn't allow me to keep cookies the next time it opens). I set the firefox proxy port to 9050, so firefox is using Tor for network access, however, DNS queries are bypassing the proxy. How can I make the DNS query transit the tor network, as TBB does. How TBB make the DNS query enter the Tor network? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Help with Tor and Flash Player plugin struggle
lunch your normal FireFox then set its Socks section of proxy settings to 127.0.0.1 port 9050 --- after setting this, why my firefox can only allow https traffic? are there any ways to make it allow non-https traffic? thanks! 2012/10/11 Kamtarin Sorood kamtarinsor...@gmail.com * Hello I don't know what is the reason for your insistence on using FireFox bundled into Tor browser package while privacy and maximum security is not the case. After lunching bundled FireFox and showing welcome screen you can minimize that and lunch your normal FireFox then set its Socks section of proxy settings to 127.0.0.1 port 9050 and see and play all restricted medias such as flash videos. This is my shortest and easiest method to resolve that problem * On Fri, Oct 5, 2012 at 7:30 AM, k e bera k...@cyblings.on.ca wrote: On Thu, 4 Oct 2012 16:37:00 -0700 numetro nume...@live.com wrote: I've now tried everything and I cannot get ANY Flash content to play in this Tor-Firefox ESR web browser, even though I've tried installing the Flash player plugin that this browser asks for when I'm on a YouTube page (and even though this computer already had a current Flash Player plugin installed previously). Let me make it clear that privacy is not important to me _/*right now*/_ during this quest to make the Flash Player plugin work with this Tor browser... I can reset any settings for maximum privacy later when I go back to that purpose for using Tor... right now, I'm just trying to make the Tor browser play Flash content. i have gotten Flash content to play on Youtube with the Gnash player plugin (using RequestPolicy to restrict who gets to see my requests) but it is necessary to enable plugins and 3rd party cookies for the session. even then it doesnt work for all videos. you can bypass Flash on Youtube if you enable HTML5 enabled or manually add webm=1 to the url, but it doesnt work for all videos especially for those that interact with doubleclick.net(i wouldnt be sad if someone nuked those parasites). So even though I've /*UNCHECKED*/ the /*TorbuttonPreferencesSecurity SettingsDisable plugin during Tor usage*/ box, and I installed a new Flash player plugin /*THROUGH*/ this browser, and I even set it to allow all scripts because I thought maybe that was complicating things, /*IT STILL WILL NOT PLAY FLASH CONTENT OF ANY TYPE*/. /*Now, this, explained below, could be part of the problem that I'd like to ask for your help with...*/ If I go to the Tor Browser folder on my hard drive at /*C:Tor BrowserFirefoxPortableDataplugins*/ there are NO Flash plugin files that show up in that folder even after I install a new Flash Player plugin THROUGH this browser... I believe that is why it will not play Flash content. It is very helpful to set the save folder in Gnash, so you can use another player to view vids later. Not useful for you on Windows. Maybe time to switch to gnu/linux? ;) ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] tor browser closes automatically, saying the version is out of date
I noticed that when I use TBB, it prompts: The currently installed version of Tor is out of date or no longer recommended. Please visit the Tor website to download the latest version. and I have to download the new version: *Version 2.2.39-5 - Linux, Unix, BSD (64-Bit)* *but this problem is still there, and the browser automatically closes* *do you guys have the same problem or not?* *how to deal with this? * ** ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] tor browser closes automatically, saying the version is out of date
2012/11/5 Andreas Krey a.k...@gmx.de On Mon, 05 Nov 2012 17:00:32 +, esolve esolve wrote: ... and I have to download the new version: *Version 2.2.39-5 - Linux, Unix, BSD (64-Bit)* *but this problem is still there, and the browser automatically closes* Which problem? The 'please update' or the crash? For the latter part I suspect that the browser crashes on your system rather than closing voluntarily. --- the TBB prompts 'please update ' and the browser closes automatically and suddenly Are you sure you actually started the new version and did install it cleanly (not unpacking it over the old directory)? I'm sure I started the new version, since it is a linux version, I don't need to install it just uncompress it and cd into the directory and run command like ./start-tor-browser *do you guys have the same problem or not?* I had cases where I had problems with either the 64 or 32 bit version (can't remember which one, not that the alternatively crashed). Andreas -- Totally trivial. Famous last words. From: Linus Torvalds torvalds@*.org Date: Fri, 22 Jan 2010 07:29:21 -0800 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] tor browser closes automatically, saying the version is out of date
2012/11/5 Andreas Krey a.k...@gmx.de On Mon, 05 Nov 2012 20:22:05 +, esolve esolve wrote: 2012/11/5 Andreas Krey a.k...@gmx.de ... --- the TBB prompts 'please update ' and the browser closes automatically and suddenly You mean the dialog box from vidalia or the browser window showing the update announcement - the dialog box from vidalia shows the update announcement ... I'm sure I started the new version, since it is a linux version, I don't need to install it just uncompress it and cd into the directory and run command like ./start-tor-browser My bad for naming that 'install'; but still: There may be unexpected things happening if you unpack the tar file over an existing directory (and I didn't try to see what tar actually does or refuses to do in that case). - no, I removed the previous TBB and unpack it in another directory Andreas -- Totally trivial. Famous last words. From: Linus Torvalds torvalds@*.org Date: Fri, 22 Jan 2010 07:29:21 -0800 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] are there anyways to configure number of tor relay nodes from client
I'm wondering whether it is possible to configure number of tor relay nodes from client now , the default number is 3, is it possible to make it 2? thanks! ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] how to access http://localhost/test.php through TBB
thanks! I don't care the anoymity at the moment, just for some tests! 127.0.0.1 is fine! 2012/10/24 adrelanos adrela...@riseup.net esolve esolve: hi, I know this question may seems strange, but I have some tests to do over tor I set up a LAMP, php webserver and I want to access html pages on this server locally but it seems to me that TBB can't connect to localhost, the error information is as below: Unable to connect Firefox can't establish a connection to the server at localhost. how can I deal with this problem? thanks! ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk As Julian Yon already pointed out, you can not connect to localhost over Tor. You can either directly connect to 127.0.0.1 (localhost) with Tor Browser or you can connect to your local webserver over Tor using a hidden service. Just set up a hidden service for your local webserver. Of course you can access your own hidden domain with Tor Browser. The outgoing Tor connection doesn't mind coming back again from the Tor network as hidden service connection. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] how to access http://localhost/test.php through TBB
hi, I know this question may seems strange, but I have some tests to do over tor I set up a LAMP, php webserver and I want to access html pages on this server locally but it seems to me that TBB can't connect to localhost, the error information is as below: Unable to connect Firefox can't establish a connection to the server at localhost. how can I deal with this problem? thanks! ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] what is the current flow control and congestion control mechanism of Tor?
the paper *Tor: The Second*-*Generation Onion Router*http://www.usenix.org/event/sec04/tech/dingledine.html talked about flow control and congestion control of Tor, but it may have been out-dated. are there any articles or papers detailing the current flow control and congestion control mechanisms? besides, do anybody has any idea on how is Tor's flow control mechanism interact with Firefox's application flow control ? thanks! ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] decrypt tor packets
HI, I capture packets on the tor client using tcpdump and I want to decrypt the captured packets for analysis. I think there are two steps 1 obtain the session keys 2 use some tools to decrypt the packets Are there any ways, tools, methodology to decrypt the packets? thanks! ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] how to save html5 cookies on TBB
I noticed that there is a “cookie protection” feature in TorButton, I tried that to save youtube html5 join cookies, but that doesn't work what is this feature used for? besides, I noticed that there are some discussions on permanently support youtube html5 cookies from the following two links https://trac.torproject.org/projects/tor/ticket/3347 https://trac.torproject.org/projects/tor/ticket/2832 however, it seems there are no results for this? 2012/10/7 esolve esolve esolvepol...@gmail.com TBB will delete all cookies when it is closed however, in youtube, html5 can be enabled by join the html5 trial through this page: http://www.youtube.com/html5, which will save a cookie on TBB can this cookie be kept on TBB? like configuration file? thanks ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] how to save html5 cookies on TBB
TBB will delete all cookies when it is closed however, in youtube, html5 can be enabled by join the html5 trial through this page: http://www.youtube.com/html5, which will save a cookie on TBB can this cookie be kept on TBB? like configuration file? thanks ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] install adobe flash player on TBB
yes, it is disabled in some TBB package but it is absent in other TBB package, how can I install adobe flash on those TBB package? 2012/10/4 and...@torproject.is On Wed, Oct 03, 2012 at 10:20:26PM +0200, esolvepol...@gmail.com wrote 0.5K bytes in 13 lines about: : I noticed that for some TBB packages on linux, the browser are with : shockwave flash plugin, while in some other TBB packages, there is no flash : plugin? We don't ship TBB with flash on any OS. If you already have Flash installed, TBB may find it but leave it disabled by default. -- Andrew http://tpo.is/contact pgp 0x6B4D6475 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] install adobe flash player on TBB
no, in some package, flash plugin is not enabled in TBB by default but in some packages, flash plugin is missing I'm just wondering how to install the flash plugin 2012/10/4 and...@torproject.is On Thu, Oct 04, 2012 at 11:53:25AM +0200, esolvepol...@gmail.com wrote 0.9K bytes in 30 lines about: : yes, it is disabled in some TBB package : but it is absent in other TBB package, how can I install adobe flash on : those TBB package? Please detail which packages TBB has enabled Flash. It should be disabled in all packages on all operating systems all the time. And frankly, if you want to shoot yourself in the foot, just enable the plugin in TBB. -- Andrew http://tpo.is/contact pgp 0x6B4D6475 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] install adobe flash player on TBB
2012/10/4 Andrew Lewman and...@torproject.is On Thu, 4 Oct 2012 14:15:51 +0200 esolve esolve esolvepol...@gmail.com wrote: no, in some package, flash plugin is not enabled in TBB by default but in some packages, flash plugin is missing I'm just wondering how to install the flash plugin In all packages we create/provide, flash is disabled by default. Again, please detail the operating system, tbb version, and which packages have flash enabled by default. --- I don't know in which packages the flash is enabled, I didn't say that flash is enabled on any package I just mentioned that in some package I can find the plugin, through Tools-add on-plugin although it is disabled but in some packages I can't find the plugin through Tools-add on-plugin I tried windows 64bit, linux 32 bit and 64 bit The flash plugin appearing or not is dependent upon adobe flash being installed in the operating system. If flash is installed in the operating system already, then you start tbb, it is possible to enable the flash plugin in tbb. I have all my system installed with flash, but on linux 64bit machine, flash plugin is in firefox but not in TBB browser. If you enable flash in tbb, you may lose all of your anonymity, data, and your milk may be sour as a result of a rogue flash application exfiltrating all of your identity and data from your system over tor or not. thanks for the information. I don't mind that at the moment. and when viewing youtube, I captured packets on the network interface, I noticed that all traffic is through the Tor node so it seems that flash doesn't bypass the proxy setting at all. -- Andrew http://tpo.is/contact pgp 0x6B4D6475 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] How do I change tor's outgoing IP address?
is there any command line or script that can show the current entry, middle and exit node in use ? 2012/10/1 Arsen Zahray menk...@gmail.com I'm experimenting with tor command protocol, and I've found a command, which seems to be able to designed for changing IPs: `SIGNAL NEWNYM`. I'm sending this to tor via tor's command port, and I'm getting `OK` in response. However, when I test tor's outgoing ip several seconds and minutes afterwards, it does not change. I'm doing the testing via a proxyjudge script located on an external server. Why? Is it possible to change the outgoing ip? And if yes, how do I do that? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] How do I change tor's outgoing IP address?
thanks, actually I'm thinking of how to use command line or scripts to get this information not through manual operation 2012/10/2 Arsen Zahray menk...@gmail.com The exit node is easy. The simplest way to test it is by googling through tor what is my ip. That's your exit node. Not sure about the rest On Tue, Oct 2, 2012 at 5:59 PM, esolve esolve esolvepol...@gmail.com wrote: is there any command line or script that can show the current entry, middle and exit node in use ? 2012/10/1 Arsen Zahray menk...@gmail.com I'm experimenting with tor command protocol, and I've found a command, which seems to be able to designed for changing IPs: `SIGNAL NEWNYM`. I'm sending this to tor via tor's command port, and I'm getting `OK` in response. However, when I test tor's outgoing ip several seconds and minutes afterwards, it does not change. I'm doing the testing via a proxyjudge script located on an external server. Why? Is it possible to change the outgoing ip? And if yes, how do I do that? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] flash and tor
but I used tcpdump to capture packets and noticed that the video packets are sent through tor nodes, not directly to the web site so for the website, it should regard the connection is from an IP of exit node. what you meant is the adobe flash will also use the real IP to connect to that website by bypassing tor? 2012/9/28 adrelanos adrela...@riseup.net esolve esolve: I notice that if you watch video using Tor, since flash is a third-party tool, that will ruin your anonymity. I think even if the plugin flash may use the real IP for communication, it may not reveal what content you are accessing but it just shows that a user on that IP is using flash. Or it just expose itself to adobe company, other entities, like government, other companies can't know about you. Am I wrong or not? are there any paper, articles about this? When using TBB and flash the problem is, that flash will not honor proxy settings, thus sending traffic in the clear. Website can see: - your real IP address - what you view Other companies: - will know what the website is sharing with them ISP can see: - you are connected to website ip - content: depends if the flash connection to the website is encrypted or not Government: - I don't like to go into that, but there are no differences. Your ISP can see it and government can see as much as always for non-Tor connections. I am not aware of any papers, but I wrote a Whonix specific chapter about Flash and other browser plugins. https://sourceforge.net/p/whonix/wiki/Applications/#browser-plugins (Summary: IP/location is safe when using Whonix, there are loads of flash alternatives; even if IP/location is safe, flash is not recommend anyway) ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] flash and tor
Hi, all: I notice that if you watch video using Tor, since flash is a third-party tool, that will ruin your anonymity. I think even if the plugin flash may use the real IP for communication, it may not reveal what content you are accessing but it just shows that a user on that IP is using flash. Or it just expose itself to adobe company, other entities, like government, other companies can't know about you. Am I wrong or not? are there any paper, articles about this? Thanks! ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] how to know which IP(host) a TOR client is using as tor nodes?
ah,below the connection-status there are usually 5 items, and when I click on one item, the details will be shown on the right, the details usually include 3 hosts. so this means the items are actually circuits and the 3 hosts are the entry, middle and exit node respectively? is it right? when I open the TBB, a page show that my ip address appears to be 77.109.139.87 but I cant find this ip address in the details of all circuits, what is wrong with this? besides, I enabled the function of exit node to make my machine as an exit relay, how can I find the connections that use my machine as exit relay? 2012/9/25 Sebastian G. bastik.tor bastik@googlemail.com esolve esolve: Generally there are three TOR nodes are being used by a TOR client, entry, middle and the exit where can I find the IPs of these three TOR nodes In the case you want to know what IP addresses you connected to to build a circuit. you can do this: Open Vidalia, then click on View the Network. You should see Connection and Status below a map. Click on any circuit to see their properties, which includes their IPs. (Please note that there's a bug that makes Vidalia report the same uptime for all relays) On the left you should see a relay list, where you can see where your client could potentially connect to; in the case you are interested in learning about the network in general. Regards, Sebastian ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] how to know which IP(host) a TOR client is using as tor nodes?
Generally there are three TOR nodes are being used by a TOR client, entry, middle and the exit where can I find the IPs of these three TOR nodes ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] About path selection (or node selection) strategy in Tor
Hi, all: I notice that there are some papers/articles on path selection algorithms/strategies. But currently what is the path/node selection mechanism implemented in Tor? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk