Re: How can I know my IP address geted by the website?

2007-09-11 Thread coderman
On 9/11/07, LinDu <[EMAIL PROTECTED]> wrote: > Maybe Jeffery Statin's solution is a way that donnot need to request my > public IP from public services. > But how can i get the realtime connection information as vidalia does? you need to listen to asynchronous circuit and stream events. this will

spying on TOR

2007-09-11 Thread Martin Senftleben
Hi, I'm not sure if this has been posted already, so I just put in the URL. It's been more or less in line of the current discussions about censorship and so on. I find the sidenotes interesting, like who is using tor etc. http://www.wired.com/politics/security/news/2007/09/embassy_hacks Mart

Re: How can I know my IP address geted by the website?

2007-09-11 Thread LinDu
Maybe Jeffery Statin's solution is a way that donnot need to request my public IP from public services. But how can i get the realtime connection information as vidalia does? regards On 9/12/07, coderman <[EMAIL PROTECTED]> wrote: > > On 9/11/07, jeffery statin <[EMAIL PROTECTED]> wrote: > > ... >

Re: EU Censorship: "Web search for bomb recipes should be blocked"

2007-09-11 Thread Mike Perry
Thus spake Dave Page ([EMAIL PROTECTED]): > http://www.reuters.com/article/internetNews/idUSL1055133420070910 Hrmm. With this, and the talk of half-baked squid exit filtering, might it be time for a CensoredExit flag (which would do something like allow clients to avoid it for port 80 exits, or a

Re: How can I know my IP address geted by the website?

2007-09-11 Thread coderman
On 9/11/07, jeffery statin <[EMAIL PROTECTED]> wrote: > ... > Run Vidalia and open "Network Map", look under > "Connection" and click on the active circuit. Then, > in the box to the right scroll down and the last node > is your current exit node. The exit node's info > (including IP) is listed.

Re: How can I know my IP address geted by the website?

2007-09-11 Thread coderman
On 9/11/07, LinDu <[EMAIL PROTECTED]> wrote: > ... > My question is,is there any easier way to get the exit node's IP? ok, there is no easier way than to request your public IP from some public service. the reason for this is that there are a number of exit nodes that exit traffic from a differen

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Freemor
Benn reading this thread with some interest and just wanted to add my 2 cents on it.. As anyone who has watched this list for any time should know I'm dead against "filtering" Tor. Not because I like objectionable content but because "filters" are notoriously badly implemented, Subjective, and comp

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Josh McFarlane
On 9/11/07, Torified User <[EMAIL PROTECTED]> wrote: > Dave Page <[EMAIL PROTECTED]> wrote: > My hat off to anyone who still dares to run an exit point. I was running 2, > but until I am given at least some minimal control of whatever passes > through (I don't want to see it, I don't want to sniff

Re: EU Censorship: "Web search for bomb recipes should be blocked"

2007-09-11 Thread Martin Senftleben
Am Dienstag, 11. September 2007 19:30 schrieb Dave Page: > http://www.reuters.com/article/internetNews/idUSL1055133420070910 this is absolutely ridiculous. I shall not be able to research about the terrorist activities (search string "terrorism"), or the effect of the H-Bomb or other Napalm bomb

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Anthony DiPierro
On 9/11/07, Torified User <[EMAIL PROTECTED]> wrote: > > Anthony DiPierro <[EMAIL PROTECTED]> wrote: > > > Or run an exit node which exits only to itself, then run a > > > filtering proxy service which is reachable through that exit node. > > > > > > If enough people did that, we could build a sepa

Re: How can I know my IP address geted by the website?

2007-09-11 Thread jeffery statin
--- LinDu <[EMAIL PROTECTED]> wrote: > Maybe what I have described is not very clear.Sorry > about that. > > "getinfo address",this command is to show my IP,but > I want to get the exit > node's IP while I'm using TOR. > > Trying to visit http://peertech.org/ip/ using a > browser after setting

EU Censorship: "Web search for bomb recipes should be blocked"

2007-09-11 Thread Dave Page
http://www.reuters.com/article/internetNews/idUSL1055133420070910 Dave -- Dave Page <[EMAIL PROTECTED]> Jabber: [EMAIL PROTECTED]

Re: What do you think about this exit policy for germany?

2007-09-11 Thread BlueStar88
Am Dienstag, den 11.09.2007, 19:05 +0200 schrieb [EMAIL PROTECTED]: [...] > Why the police in EU, China, Saudi Arabia and other countries believe > they have the right to monitor people's Internet activities is another > question. To me it's a matter of personal judgment and honesty what [...] ...

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Torified User
Anthony DiPierro <[EMAIL PROTECTED]> wrote: > > Or run an exit node which exits only to itself, then run a > > filtering proxy service which is reachable through that exit node. > > > > If enough people did that, we could build a separately directory of > > such services, and anyone using it would

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Torified User
Dave Page <[EMAIL PROTECTED]> wrote:There's a huge difference between logging and making yourself liable for "illegal" content. True. Point taken. Meanwhile, you're providing the same inconvenience to "legitimate" viewers of "legal" and "moral" content, who may be less technically adept, encourag

Re: What do you think about this exit policy for germany?

2007-09-11 Thread [EMAIL PROTECTED]
Your idea is good. Perhaps EU police also don't have enough time and energy to decrypt SSL traffic. While it's easier for them to monitor non-SSL traffic. But I guess EU police probably will be very interested in IP numbers if they seize a mail server, so they might still get upset if you run an ex

Re: How can I know my IP address geted by the website?

2007-09-11 Thread LinDu
Maybe what I have described is not very clear.Sorry about that. "getinfo address",this command is to show my IP,but I want to get the exit node's IP while I'm using TOR. Trying to visit http://peertech.org/ip/ using a browser after setting it's proxy to privoxy can let me know the answer.I think

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Anthony DiPierro
On 9/11/07, Martin Senftleben <[EMAIL PROTECTED]> wrote: > Am Dienstag, 11. September 2007 13:11 schrieb Anthony DiPierro: > > On 9/11/07, Peter Palfrader <[EMAIL PROTECTED]> wrote: > > > On Mon, 10 Sep 2007, Torified User wrote: > > > > If it is in common agreement that tor should not filter, then

Re: How can I know my IP address geted by the website?

2007-09-11 Thread coderman
On 9/10/07, LinDu <[EMAIL PROTECTED]> wrote: > Thank you for your answer."Control commands" means the command in the file > http://tor.eff.org/svn/trunk/doc/spec/control-spec.txt > I'm writing a script to get control of TOR,so I want to know the information > about my IP address. getinfo address

What do you think about this exit policy for germany?

2007-09-11 Thread Thomas Hluchnik
Last year I was running my torserver (baphomet) as exit for port 80/443. The results were interesting: first a DOS attack, then later my box was seized by the german Staatsanwalt because of childporn. OK, I got my box back from them but this took 3 months. Then I got trouble with my ISP who told me

RE: exit policies (WAS: Re: Filtering traffic from your node)

2007-09-11 Thread Michael Holstein
The only problem I have with the latter is that blocking beyond IP and/or port blocking is not handled by the directories. Not only that, but the directory structure doesn't scale to those of us that need large exit policies. I ran a 10MB/sec exit node at my .edu for a while, and it was

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Michael Holstein
Don't forget the side effect - that the more questionable material we filter the more remains to be used in legal ways. You're missing the point. If you live under a repressive regime whereby you feel legally obligated to filter the exit traffic, you should be using the client, not running

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Dave Page
On Mon, Sep 10, 2007 at 05:54:42PM -0700, Torified User wrote: > Dave Page <[EMAIL PROTECTED]> wrote: > > Bear in mind that there are juristictions where, as soon as you > > begin to filter content, you become liable for all the false > > negatives. > Then again there are jurisdictions (EU) where

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread [EMAIL PROTECTED]
Torified User, It's possible to block certain IP addresses and ports in the torrc. Please continue to run an exit server that blocks certain IPs and ports, that will improve the network as Tor will only rout allowed traffic through your node. But blocking by content without the possibility to conf

Re: Tor at heart of embassy passwo rds leak; "ToR isn't the problem, ju st use it for what it's made for."

2007-09-11 Thread Olaf Selke
BlueStar88 wrote: > > I really do not know, if it can do MITM stuff and if my ISP has such a > box already... maybe we first should try to find a common understanding what MITM means. Is it breaking encrypted sessions in realtime using fake SSL certificates for example, or does it simply mean s

Re: Tor at heart of embassy passwords leak; "ToR isn’t the problem, just use it for what it’s made for."

2007-09-11 Thread BlueStar88
Think on the EFF ./. AT&T/NSA issue, after google'ing i found a firm in cologne/germany who presents NARUS products like cool-nice-to-have cars: "...Diese Lösung analysiert große Datenmengen bei hohen Übertragungsgeschwindigkeiten bis zu OC192 in Echtzeit und schafft so mehr Transparenz..." htt

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Martin Senftleben
Am Dienstag, 11. September 2007 13:11 schrieb Anthony DiPierro: > On 9/11/07, Peter Palfrader <[EMAIL PROTECTED]> wrote: > > On Mon, 10 Sep 2007, Torified User wrote: > > > If it is in common agreement that tor should not filter, then > > > I'm afraid I'd prefer not to run tor at all :( > > > > You

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread icmp30
--- Torified User <[EMAIL PROTECTED]> wrote: > Eugen Leitl <[EMAIL PROTECTED]> wrote: >> Tor users need a diagnostic showing an exit node they're using >> right now, and means to ban that node from future circuits. > The Vidalia bundle (Win32) has the Vidalia Control panel - if you open it, > t

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Anthony DiPierro
On 9/11/07, Peter Palfrader <[EMAIL PROTECTED]> wrote: > On Mon, 10 Sep 2007, Torified User wrote: > > > If it is in common agreement that tor should not filter, then I'm afraid > > I'd prefer not to run tor at all :( > > You could run a non-exit node. That's - imho - preferable to filtering. > O

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Anthony DiPierro
On 9/10/07, Kyle Williams <[EMAIL PROTECTED]> wrote: > So really, what's the difference between blocking websites and blocking > ports? The only problem I have with the latter is that blocking beyond IP and/or port blocking is not handled by the directories.

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Peter Palfrader
On Mon, 10 Sep 2007, Torified User wrote: > If it is in common agreement that tor should not filter, then I'm afraid I'd > prefer not to run tor at all :( You could run a non-exit node. That's - imho - preferable to filtering. -- | .''`. ** Debian GNU/Linux **

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Torified User
Dave Page <[EMAIL PROTECTED]> wrote: On Mon, Sep 10, 2007 at 04:43:17PM -0700, Torified User wrote: Bear in mind that there are juristictions where, as soon as you begin to filter content, you become liable for all the false negatives. Then again there are jurisdictions (EU) where we will have to

Re: a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-11 Thread Dave Page
On Mon, Sep 10, 2007 at 06:16:37PM -0700, coderman wrote: > the spreading popularity of wireless data networks may do more for > protecting Tor users against malicious exit nodes than any other > efforts in progress. perhaps big names pushing the HTTPS message will > help inform and protect users

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Florian Reitmeir
On Mon, 10 Sep 2007, Torified User wrote: > audio/mpeg > audio/x-mpeg > audio/x-pn-realaudio > audio/x-wav > video/mpeg > video/x-mpeg2 > video/x-msvideo > video/msvideo > application/gzip > application/x-gzip > application/zip > application/compress > application/x-compress > #application/java-vm

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Torified User
Eugen Leitl <[EMAIL PROTECTED]> wrote:Tor users need a diagnostic showing an exit node they're using right now, and means to ban that node from future circuits. The Vidalia bundle (Win32) has the Vidalia Control panel - if you open it, there is the "View the Network" button and you can see thro

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Torified User
[EMAIL PROTECTED] wrote: So you decided to filter what is legal or not in WHICH country? In the country where my node sat. You are free to do whatever you want on your computer, but I am free to not use your tor node. What is its name and fingerprint? Won't be running again. Moreover, if it woul

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Torified User
jeffery statin <[EMAIL PROTECTED]> wrote:What is the nic or key of your exit node? I'd like to put it in my excludenodes list. Don't worry. It has been taken offline after I've tested that the setup I've described does work. It seems to me that it will be offline permanently from now on. Per

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Eugen Leitl
On Mon, Sep 10, 2007 at 04:43:17PM -0700, Torified User wrote: >Personally I have decided that I'd rather be investigated because of >filtering illegal materials than to be investigated because I was >helping a criminal. Do whatever you wish with the information Tor users need a diagn

Re: Filtering traffic from your node - for exit points

2007-09-11 Thread Eugen Leitl
On Tue, Sep 11, 2007 at 08:20:38AM +0200, Martin Senftleben wrote: > Agreed. It's impossible to filter out every bad bit, and it will > always hit innocent people. > I had the police in my house for much less than running an exit node, > searching my PC for illegal material, which they didn't f