On 9/11/07, LinDu <[EMAIL PROTECTED]> wrote:
> Maybe Jeffery Statin's solution is a way that donnot need to request my
> public IP from public services.
> But how can i get the realtime connection information as vidalia does?
you need to listen to asynchronous circuit and stream events.
this will
Hi,
I'm not sure if this has been posted already, so I just put in the
URL. It's been more or less in line of the current discussions about
censorship and so on. I find the sidenotes interesting, like who is
using tor etc.
http://www.wired.com/politics/security/news/2007/09/embassy_hacks
Mart
Maybe Jeffery Statin's solution is a way that donnot need to request my
public IP from public services.
But how can i get the realtime connection information as vidalia does?
regards
On 9/12/07, coderman <[EMAIL PROTECTED]> wrote:
>
> On 9/11/07, jeffery statin <[EMAIL PROTECTED]> wrote:
> > ...
>
Thus spake Dave Page ([EMAIL PROTECTED]):
> http://www.reuters.com/article/internetNews/idUSL1055133420070910
Hrmm. With this, and the talk of half-baked squid exit filtering,
might it be time for a CensoredExit flag (which would do something
like allow clients to avoid it for port 80 exits, or a
On 9/11/07, jeffery statin <[EMAIL PROTECTED]> wrote:
> ...
> Run Vidalia and open "Network Map", look under
> "Connection" and click on the active circuit. Then,
> in the box to the right scroll down and the last node
> is your current exit node. The exit node's info
> (including IP) is listed.
On 9/11/07, LinDu <[EMAIL PROTECTED]> wrote:
> ...
> My question is,is there any easier way to get the exit node's IP?
ok, there is no easier way than to request your public IP from some
public service. the reason for this is that there are a number of
exit nodes that exit traffic from a differen
Benn reading this thread with some interest and just wanted to add my 2
cents on it.. As anyone who has watched this list for any time should
know I'm dead against "filtering" Tor. Not because I like objectionable
content but because "filters" are notoriously badly implemented,
Subjective, and comp
On 9/11/07, Torified User <[EMAIL PROTECTED]> wrote:
> Dave Page <[EMAIL PROTECTED]> wrote:
> My hat off to anyone who still dares to run an exit point. I was running 2,
> but until I am given at least some minimal control of whatever passes
> through (I don't want to see it, I don't want to sniff
Am Dienstag, 11. September 2007 19:30 schrieb Dave Page:
> http://www.reuters.com/article/internetNews/idUSL1055133420070910
this is absolutely ridiculous. I shall not be able to research about
the terrorist activities (search string "terrorism"), or the effect
of the H-Bomb or other Napalm bomb
On 9/11/07, Torified User <[EMAIL PROTECTED]> wrote:
>
> Anthony DiPierro <[EMAIL PROTECTED]> wrote:
> > > Or run an exit node which exits only to itself, then run a
> > > filtering proxy service which is reachable through that exit node.
> > >
> > > If enough people did that, we could build a sepa
--- LinDu <[EMAIL PROTECTED]> wrote:
> Maybe what I have described is not very clear.Sorry
> about that.
>
> "getinfo address",this command is to show my IP,but
> I want to get the exit
> node's IP while I'm using TOR.
>
> Trying to visit http://peertech.org/ip/ using a
> browser after setting
http://www.reuters.com/article/internetNews/idUSL1055133420070910
Dave
--
Dave Page <[EMAIL PROTECTED]>
Jabber: [EMAIL PROTECTED]
Am Dienstag, den 11.09.2007, 19:05 +0200 schrieb [EMAIL PROTECTED]:
[...]
> Why the police in EU, China, Saudi Arabia and other countries believe
> they have the right to monitor people's Internet activities is another
> question. To me it's a matter of personal judgment and honesty what
[...]
...
Anthony DiPierro <[EMAIL PROTECTED]> wrote:
> > Or run an exit node which exits only to itself, then run a
> > filtering proxy service which is reachable through that exit node.
> >
> > If enough people did that, we could build a separately directory of
> > such services, and anyone using it would
Dave Page <[EMAIL PROTECTED]> wrote:There's a huge difference between logging
and making yourself liable for
"illegal" content.
True. Point taken.
Meanwhile, you're providing the same inconvenience to "legitimate"
viewers of "legal" and "moral" content, who may be less technically
adept, encourag
Your idea is good. Perhaps EU police also don't have enough time and
energy to decrypt SSL traffic. While it's easier for them to monitor
non-SSL traffic. But I guess EU police probably will be very interested
in IP numbers if they seize a mail server, so they might still get upset
if you run an ex
Maybe what I have described is not very clear.Sorry about that.
"getinfo address",this command is to show my IP,but I want to get the exit
node's IP while I'm using TOR.
Trying to visit http://peertech.org/ip/ using a browser after setting it's
proxy to privoxy can let me know the answer.I think
On 9/11/07, Martin Senftleben <[EMAIL PROTECTED]> wrote:
> Am Dienstag, 11. September 2007 13:11 schrieb Anthony DiPierro:
> > On 9/11/07, Peter Palfrader <[EMAIL PROTECTED]> wrote:
> > > On Mon, 10 Sep 2007, Torified User wrote:
> > > > If it is in common agreement that tor should not filter, then
On 9/10/07, LinDu <[EMAIL PROTECTED]> wrote:
> Thank you for your answer."Control commands" means the command in the file
> http://tor.eff.org/svn/trunk/doc/spec/control-spec.txt
> I'm writing a script to get control of TOR,so I want to know the information
> about my IP address.
getinfo address
Last year I was running my torserver (baphomet) as exit for port 80/443. The
results were interesting: first a DOS attack, then later my box was seized by
the german Staatsanwalt because of childporn. OK, I got my box back from them
but this took 3 months. Then I got trouble with my ISP who told me
The only problem I have with the latter is that blocking beyond IP
and/or port blocking is not handled by the directories.
Not only that, but the directory structure doesn't scale to those of us
that need large exit policies.
I ran a 10MB/sec exit node at my .edu for a while, and it was
Don't forget the side effect - that the more questionable material we
filter the more remains to be used in legal ways.
You're missing the point.
If you live under a repressive regime whereby you feel legally obligated
to filter the exit traffic, you should be using the client, not running
On Mon, Sep 10, 2007 at 05:54:42PM -0700, Torified User wrote:
> Dave Page <[EMAIL PROTECTED]> wrote:
> > Bear in mind that there are juristictions where, as soon as you
> > begin to filter content, you become liable for all the false
> > negatives.
> Then again there are jurisdictions (EU) where
Torified User,
It's possible to block certain IP addresses and ports in the torrc.
Please continue to run an exit server that blocks certain IPs and ports,
that will improve the network as Tor will only rout allowed traffic
through your node.
But blocking by content without the possibility to conf
BlueStar88 wrote:
>
> I really do not know, if it can do MITM stuff and if my ISP has such a
> box already...
maybe we first should try to find a common understanding what MITM means. Is it
breaking
encrypted sessions in realtime using fake SSL certificates for example, or does
it simply
mean s
Think on the EFF ./. AT&T/NSA issue,
after google'ing i found a firm in cologne/germany who presents NARUS
products like cool-nice-to-have cars:
"...Diese Lösung analysiert große Datenmengen bei hohen
Übertragungsgeschwindigkeiten bis zu OC192 in Echtzeit und schafft so
mehr Transparenz..."
htt
Am Dienstag, 11. September 2007 13:11 schrieb Anthony DiPierro:
> On 9/11/07, Peter Palfrader <[EMAIL PROTECTED]> wrote:
> > On Mon, 10 Sep 2007, Torified User wrote:
> > > If it is in common agreement that tor should not filter, then
> > > I'm afraid I'd prefer not to run tor at all :(
> >
> > You
--- Torified User <[EMAIL PROTECTED]> wrote:
> Eugen Leitl <[EMAIL PROTECTED]> wrote:
>> Tor users need a diagnostic showing an exit node they're using
>> right now, and means to ban that node from future circuits.
> The Vidalia bundle (Win32) has the Vidalia Control panel - if you open it,
> t
On 9/11/07, Peter Palfrader <[EMAIL PROTECTED]> wrote:
> On Mon, 10 Sep 2007, Torified User wrote:
>
> > If it is in common agreement that tor should not filter, then I'm afraid
> > I'd prefer not to run tor at all :(
>
> You could run a non-exit node. That's - imho - preferable to filtering.
>
O
On 9/10/07, Kyle Williams <[EMAIL PROTECTED]> wrote:
> So really, what's the difference between blocking websites and blocking
> ports?
The only problem I have with the latter is that blocking beyond IP
and/or port blocking is not handled by the directories.
On Mon, 10 Sep 2007, Torified User wrote:
> If it is in common agreement that tor should not filter, then I'm afraid I'd
> prefer not to run tor at all :(
You could run a non-exit node. That's - imho - preferable to filtering.
--
| .''`. ** Debian GNU/Linux **
Dave Page <[EMAIL PROTECTED]> wrote: On Mon, Sep 10, 2007 at 04:43:17PM -0700,
Torified User wrote:
Bear in mind that there are juristictions where, as soon as you begin to
filter content, you become liable for all the false negatives.
Then again there are jurisdictions (EU) where we will have to
On Mon, Sep 10, 2007 at 06:16:37PM -0700, coderman wrote:
> the spreading popularity of wireless data networks may do more for
> protecting Tor users against malicious exit nodes than any other
> efforts in progress. perhaps big names pushing the HTTPS message will
> help inform and protect users
On Mon, 10 Sep 2007, Torified User wrote:
> audio/mpeg
> audio/x-mpeg
> audio/x-pn-realaudio
> audio/x-wav
> video/mpeg
> video/x-mpeg2
> video/x-msvideo
> video/msvideo
> application/gzip
> application/x-gzip
> application/zip
> application/compress
> application/x-compress
> #application/java-vm
Eugen Leitl <[EMAIL PROTECTED]> wrote:Tor users need a diagnostic showing an
exit node they're using
right now, and means to ban that node from future circuits.
The Vidalia bundle (Win32) has the Vidalia Control panel - if you open it,
there is the "View the Network" button and you can see thro
[EMAIL PROTECTED] wrote: So you decided to filter what is legal or not in WHICH
country?
In the country where my node sat.
You are free to do whatever you want on your computer, but I am free to not use
your tor node. What is its name and fingerprint?
Won't be running again.
Moreover, if it woul
jeffery statin <[EMAIL PROTECTED]> wrote:What is the nic or key of your exit
node? I'd like to
put it in my excludenodes list.
Don't worry. It has been taken offline after I've tested that the setup I've
described does work. It seems to me that it will be offline permanently from
now on.
Per
On Mon, Sep 10, 2007 at 04:43:17PM -0700, Torified User wrote:
>Personally I have decided that I'd rather be investigated because of
>filtering illegal materials than to be investigated because I was
>helping a criminal. Do whatever you wish with the information
Tor users need a diagn
On Tue, Sep 11, 2007 at 08:20:38AM +0200, Martin Senftleben wrote:
> Agreed. It's impossible to filter out every bad bit, and it will
> always hit innocent people.
> I had the police in my house for much less than running an exit node,
> searching my PC for illegal material, which they didn't f
39 matches
Mail list logo