Re: eliminating bogus port 43 exits

2009-06-12 Thread Scott Bennett
On Fri, 12 Jun 2009 15:24:33 -0400 grarpamp wrote: >While node operators are certainly welcome to characterize and >define both traffic and policy as deemed fit for their own purposes... > >I might suggest that node operators examine things more fully in >order to make better policy decisions

Re: eliminating bogus port 43 exits

2009-06-12 Thread Scott Bennett
Well. I see that there has been moderately vigorous discussion going on since I posted my new information regarding port 43 exit statistics, which is just what I had hoped for. :-) I don't have responses for all of the points raised in the followups so far, but I can comment on some of them.

Re: eliminating bogus port 43 exits

2009-06-12 Thread grarpamp
Being familiar with ISP practice in this area, it is why you examine the content and what you do with the knowledge of the content observed, be it stored in your head or on disk, that matters. It's pretty well established that one may monitor traffic in a general way in order to figure out what's

Re: eliminating bogus port 43 exits

2009-06-12 Thread Roger Dingledine
On Fri, Jun 12, 2009 at 07:32:24PM -0400, Roger Dingledine wrote: > There are two categories to consider here: wiretapping and pen > registers. I should note that in the previous post I did that thing that EFF lawyers always do that confuses people: I pretended there's only one country in the worl

Re: eliminating bogus port 43 exits

2009-06-12 Thread Roger Dingledine
On Fri, Jun 12, 2009 at 03:51:25PM -0700, Kyle Williams wrote: > I think "snooping" and "statistical information" should be treated > differently. Take Scott's case here. He is making a claim that by using > the exit policy outlined above, it would reduce the amount of traffic on tor > by 70% or

trying to use specific country for node selection in tor

2009-06-12 Thread Sambuddho Chakravarty
Hello All I am trying to use specific country selection in the torrc as per the FAQs in the Tor website. The following is a snippet from my torrc ... EntryNodes {us} ExitNodes {us} StrictEntryNode 1 StrictExitNode 1 However when I run tor - 0.2.1.15 with this configuration , I get the foll

Re: eliminating bogus port 43 exits

2009-06-12 Thread Kyle Williams
On Fri, Jun 12, 2009 at 3:28 PM, Andrew Lewman wrote: > grarpamp wrote: > > 3 - Further, there needs to be an understanding of what the traffic > > ACTUALLY IS. Operators should be using tools such as wireshark, > > tcpdump, bro, etc to determine the content. And if it turns out to > > be encrypt

Re: eliminating bogus port 43 exits

2009-06-12 Thread Andrew Lewman
grarpamp wrote: > 3 - Further, there needs to be an understanding of what the traffic > ACTUALLY IS. Operators should be using tools such as wireshark, > tcpdump, bro, etc to determine the content. And if it turns out to > be encrypted to destinations and services unknown, NO such determination >

Re: JanusVM tests

2009-06-12 Thread Roger Dingledine
On Fri, Jun 12, 2009 at 03:11:39PM -0700, Kyle Williams wrote: > It is a work in progress. Thank you for your feedback. This is meant to > test all anonymity services, not just Tor.That is why I didn't bother to > check to see if they are coming through a Tor router. I guess I could check > that

Re: JanusVM tests

2009-06-12 Thread Kyle Williams
It is a work in progress. Thank you for your feedback. This is meant to test all anonymity services, not just Tor.That is why I didn't bother to check to see if they are coming through a Tor router. I guess I could check that if it would please more people. - Kyle 2009/6/12 Matej Kovacic > Hi

Re: eliminating bogus port 43 exits

2009-06-12 Thread Nils Vogels
Hey Scott, On Fri, Jun 12, 2009 at 9:29 AM, Scott Bennett wrote: >     I replaced the "ExitPolicy accept *:43" in my torrc file with the > following: > > ###---Limited list of allowed whois exit addresses > ExitPolicy accept 192.103.19.12:43      # whois access to whois.6bone.net > ExitPolicy acce

JanusVM tests

2009-06-12 Thread Matej Kovacic
Hi, if I go to the JanusVM deanonimyzer test without being connected through Tor, the test passes (of course), but I get info, that I have very good anonymizer service: If you do not see your real IP address in the report, then CONGRATULATIONS! This means that you have a very good anonymity servi

Re: eliminating bogus port 43 exits

2009-06-12 Thread grarpamp
While node operators are certainly welcome to characterize and define both traffic and policy as deemed fit for their own purposes... I might suggest that node operators examine things more fully in order to make better policy decisions overall. 1 - The use of any given TCP port alone is not suff

Re: Tor bridge not generating any traffic

2009-06-12 Thread Johannes Nitsche
On 2009.06.11 15:19, Scott Bennett wrote: > On Thu, 11 Jun 2009 21:23:33 +0200 Johannes Nitsche > top-posted (please learn not to do that): > > >Thanks for all the answers. > >It seems my view of what a bridge is was > >wrong. I thought a bridge is a link point between tor nodes which > >for

Re: eliminating bogus port 43 exits

2009-06-12 Thread Tim Wilde
On 6/12/2009 3:29 AM, Scott Bennett wrote: > In other words, by restricting just port 43 exits to only the legitimate whois > IP addresses, I eliminated at least 70% of *all* exits through my tor node, > which suggests to me that the vast, overwhelming majority of exits from the > tor network are i

Re: eliminating bogus port 43 exits

2009-06-12 Thread Scott Bennett
On Fri, 12 Jun 2009 00:44:19 -0700 Kyle Williams top-posted: Please stop doing that. It is terribly rude. >Got a couple of questions. > >- Have you looked deeper into the request for port 43, using tcpdump or >Wireshark? No, of course not! >- Do you KNOW that it is a WHOIS requ

Re: eliminating bogus port 43 exits

2009-06-12 Thread Kyle Williams
Hi Scott, Got a couple of questions. - Have you looked deeper into the request for port 43, using tcpdump or Wireshark? - Do you KNOW that it is a WHOIS request, not OpenVPN or something else running on the WHOIS port? - Have you logged what IP's are being connected to? I just curious, as this s

eliminating bogus port 43 exits

2009-06-12 Thread Scott Bennett
A bit over a month ago, I posted here some exit statistics by port number. One major oddity among them was the count of port 43 (whois) exits, which seemed extraordinarily large, especially in relation to the counts for other, more expectedly popular port numbers. Some of the comments I got i