Problem with Tor on an 1.1 USB-Stick

2006-09-11 Thread Axel Rüweler
Hi, i am looking forward to use TorPark on an 1.1 USB-Stick since some weeks now. The Problem I found while trying this is, that Tor has got a Problem with the very slow read/write speed, i think. Since Tor 1.1.8-alpha it takes very long (5 min.) to build a circuit when starting tor from that slow

Re: Protecting exit-nodes by GeoIP based policy

2006-09-11 Thread Lexi Pimenidis
On Sun, Sep 10, 2006 at 11:58:11PM CEST, Enrico Scholz wrote: > A. On client side > > 1. add a new option, e.g. 'Jurisdiction' with possible values of > * 'other' ... when set, do not use an exit-node when it is the same >jurisdiction as the target-ip; this should be the

Re: Protecting exit-nodes by GeoIP based policy

2006-09-11 Thread glymr
I may be mistaken, but just as is the practise with the linux kernel, it is not permissible to mix licenses when only interfaces are used, mixing licenses within a gpl licensed software unit is tainting the license but using an exported interface is not. The only thing that would be required would

Re: Protecting exit-nodes by GeoIP based policy

2006-09-11 Thread glymr
oh dear, that did not parse correctly. If the licenses are different, the gpl permits the use of interfaces of the softawre to be exported as such, this is for the neccessary reason that it is, for example, possible to use a closed source scripting system with the apache web server. The http protoc

Re: confiscating middleman-tor-nodes

2006-09-11 Thread Matthias Fischmann
here is another interesting comment, linking the campaign against TOR with another one against ANON/JAP: http://www.etc-network.de/blog/mel/misc/tor-bust-connecting-some-dots.html all operators affected: please keep us posted with new details! the public discussion here may yield valuable snip

Re: torrc Clientonly

2006-09-11 Thread Fabian Keil
Arrakistor <[EMAIL PROTECTED]> wrote: > I would like some clarification regarding the "Clientonly" setting. > Does this explicitly mean you do not participate in any circuits, or > that you are not running as an entrance/exit node but may still run > mitm. Perhaps it means what the man page says

Re: Protecting exit-nodes by GeoIP based policy

2006-09-11 Thread Lexi Pimenidis
On Mon, Sep 11, 2006 at 10:15:56AM CEST, glymr wrote: Anyway, I've written the script, but I won't release it, since it creates a vast amount of exit policy rules, which (I guess) would not be acceptable :-/ In the native variant excluding all german subnets would be something like 7000 lines of

Re: Tor Defense Fund...an idea.

2006-09-11 Thread Juliusz Chroboczek
> Well, I know Roger, Nick, etc are against it but making Tor run as a > server by default may be worth more consideration (I2P does this). What about people behind NAT/firewalls that they don't control? What about people with battery-powered devices? Juli

Re: Tor Defense Fund...an idea.

2006-09-11 Thread Jonathan D. Proulx
On Mon, Sep 11, 2006 at 03:32:26PM +0200, Juliusz Chroboczek wrote: :> Well, I know Roger, Nick, etc are against it but making Tor run as a :> server by default may be worth more consideration (I2P does this). : :What about people behind NAT/firewalls that they don't control? : :What about people w

Re: Protecting exit-nodes by GeoIP based policy

2006-09-11 Thread Enrico Scholz
[EMAIL PROTECTED] (Lexi Pimenidis) writes: >> A. On client side > ... > Relying on the client side doesn't help the exit node operators much. yes; first step still allows malicious clients to bring certain exit-nodes in trouble. But I guess/hope, that most clients are interested in an operationa

Re[2]: torrc Clientonly

2006-09-11 Thread Arrakistor
Fabian, I'm familiar with the man page. That didn't answer my question at all. Regards, Arrakistor Monday, September 11, 2006, 5:39:30 AM, you wrote: > Arrakistor <[EMAIL PROTECTED]> wrote: >> I would like some clarification regarding the "Clientonly" setting. >> Does this explicitly mean you

Re: Tor Defense Fund...an idea.

2006-09-11 Thread Michael Holstein
I agree that being behind someone else's firewall is a problem as the user may not understand the implications of this and thus advertise an impossible exit policy. Suggestion for the coders .. make the client test itself and adjust the exit policy on the fly.

Re: Protecting exit-nodes by GeoIP based policy

2006-09-11 Thread Enrico Scholz
[EMAIL PROTECTED] (numE) writes: > The investigations will be harder for a foreign country public > prosecutor / police department, but beeing jailed on your next travel > to the unites states (just an example) could be even worse than > having investigations in your own country (which you are at

Re: Protecting exit-nodes by GeoIP based policy

2006-09-11 Thread Lexi Pimenidis
On Mon, Sep 11, 2006 at 04:17:40PM CEST, numE wrote: > But maybe this could be a bad idea anyway. > The investigations will be harder for a foreign country public > prosecutor / police department, but beeing jailed on your next travel > to the unites states (just an example) could be even worse th

Re: torrc Clientonly

2006-09-11 Thread Jonathan D. Proulx
On Mon, Sep 11, 2006 at 09:20:44AM -0500, Arrakistor wrote: :Fabian, : :I'm familiar with the man page. That didn't answer my question at all. entry, middleman, and exit are all server functions, if you aren't running a server you will not be acting in any of those capacities. -Jon : :Regards, :

Re: Tor Defense Fund...an idea.

2006-09-11 Thread Anothony Georgeo
Michael Holstein <[EMAIL PROTECTED]> wrote: > I agree that being behind someone else's firewall is a problem as the> user may not understand the implications of this and thus advertise an> impossible exit policy.Suggestion for the coders .. make the client test itself and adjust the exit policy on

Re: hidden services spoof

2006-09-11 Thread Nick Mathewson
On Mon, Sep 11, 2006 at 04:10:27PM -0500, Arrakistor wrote: > I am writing an updater for tor to automatically grab the latest > version. One problem I am coming across is where to host it so they > cannot be spoofed. I was thinking of putting it at a server in a > .onion address.

Re: confiscating middleman-tor-nodes

2006-09-11 Thread Roger Dingledine
On Mon, Sep 11, 2006 at 12:12:53PM +0200, Matthias Fischmann wrote: > i am also wondering whether there should be more dialogue between the > ANON lawyers and the TOR lawyers. or perhaps there already is? I'm doing my best to leave actual strategy to the Tor operators and advocates in Germany, si

Re[2]: hidden services spoof

2006-09-11 Thread Arrakistor
Nick, Yes but the sig is only as good as the person you trust. That is why I haven't released Torpark 2.0b2 with 0.1.2.1-a, I simply don't have a trusted binary. I don't think they yet have a pgp plugin for NSIS language yet. I'll see what else can be done for verifying sigs. Regards, Arr

Re: hidden services spoof

2006-09-11 Thread Jacob Appelbaum
Arrakistor wrote: > Nick, > > Yes but the sig is only as good as the person you trust. That is why I > haven't released Torpark 2.0b2 with 0.1.2.1-a, I simply don't have a > trusted binary. I don't think they yet have a pgp plugin for NSIS > language yet. I'll see what else can be done for

Re[2]: hidden services spoof

2006-09-11 Thread Arrakistor
Yes, I am building an updater. If phobos finishes the manual on how to get it to compile under mingw, I will compile, sign, and release them myself. And yes, I am verifying the sigs I use in the release. Regards, Arrakistor Monday, September 11, 2006, 6:27:38 PM, you wrote: > Arrakistor wrote: