Supercookies

2009-08-19 Thread Matej Kovacic
Hi, I am not sure if this was on this list, but it is an interesting information: http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/ it seems cookies could be "respawned"... And there is a plugin to remove this LSO's: https://addons.mozilla.org/en-US/firefox/addon/6623

Re: bad exit node

2009-08-19 Thread grarpamp
>>Node 446E29C6F3D47C315B78EBB1BAC62C241C9F992 [1] completely > The above is not a valid identifier. It appears to be missing one I'm sure anyone interested would look up a substring in the descriptors, tack on an A and be done with it.

Re: Scott made me do it.

2009-08-19 Thread Scott Bennett
Hmmm...I'm not too sure that I should be blamed for this, but nevertheless... On Tue, 18 Aug 2009 23:26:44 -0400 Andrew Lewman wrote: >A while ago there was a thread that devolved into "why does Tor still >ship ancient privoxy?" and "why are you shipping polipo with the Tor >Browser Bund

Re: Archive crypto sigs [was: copy abuse]

2009-08-19 Thread Andrew Lewman
On 08/01/2009 02:03 PM, grarpamp wrote: > For this and other purposes, all the files under that directory should > also be signed with the release or other suitable key. Good idea. It's done. -- Andrew Lewman The Tor Project pgp 0x31B0974B Website: https://torproject.org/ Blog: https://blog.t

Re: bad exit node

2009-08-19 Thread Scott Bennett
On Wed, 19 Aug 2009 23:54:01 +0100 KT wrote: >Node 446E29C6F3D47C315B78EBB1BAC62C241C9F992 [1] completely overwrites The above is not a valid identifier. It appears to be missing one character. >response body [2] when UA is IE. FYI. > >KT > >[1] http://tinyurl.com/nxfvux >[2] http://p

Tor Browser Bundle 1.2.8 released

2009-08-19 Thread Andrew Lewman
Tor Browser Bundle 1.2.8 is released. The big changes are the inclusion of statically linked openssl dlls to resolve a few geoip lookup and functionality issues with Vidalia, and the upgrade to the new Vidalia 0.2.2. Available at https://torproject.org/torbrowser The full list of updates and fixe

Re: Tor/Iptables Question

2009-08-19 Thread Kyle Williams
I believe if you just remove --dport, then everything (all ports) are assumed. On Wed, Aug 19, 2009 at 1:01 PM, Ringo <2600den...@gmail.com> wrote: > "I prevent all users other than root from connecting to the Tor Control > port with an > > iptables rule which looks like this: > > > > iptables -A

bad exit node

2009-08-19 Thread KT
Node 446E29C6F3D47C315B78EBB1BAC62C241C9F992 [1] completely overwrites response body [2] when UA is IE. FYI. KT [1] http://tinyurl.com/nxfvux [2] http://paste.ubuntu.com/255997/

Re: Roger's HAR2009 talk on Tor performance

2009-08-19 Thread Ringo
Well given this, I've added a few other trackers, file at the same spot: http://www.johntowery.com/har2009_Why_Tor_is_slow.mp4.torrent Ringo The Hidden Tracker wrote: >> It uses the hidden tracker and should work for Tor users and non-tor >> users. It actually appears to be down right now but it'

Re: Roger's HAR2009 talk on Tor performance

2009-08-19 Thread The Hidden Tracker
> It uses the hidden tracker and should work for Tor users and non-tor > users. It actually appears to be down right now but it'll come up > eventually. It has both the regular .onion and the tor2web url in it. Yep, we're down right now. Sorry about the inconvenience. We're expecting to be up and

Re: Roger's HAR2009 talk on Tor performance

2009-08-19 Thread Roger Dingledine
On Wed, Aug 19, 2009 at 05:19:20PM -0400, Ringo wrote: > Jake, Mike, Karsten, Sebastian, and I attended Hacking at Random last > week in The Netherlands. I did a talk on Tor performance challenges ? > basically walking through the key pieces of the "Why Tor is Slow" > document that we wrote in Marc

Roger's HAR2009 talk on Tor performance

2009-08-19 Thread Ringo
>From Tor Blog | Jake, Mike, Karsten, Sebastian, and I attended Hacking at Random last week in The Netherlands. I did a talk on Tor performance challenges — basically walking through the key pieces of the "Why Tor is Slow" document that we wrote in March. As usual with European hacking cons, the

Re: Tor/Iptables Question

2009-08-19 Thread Ringo
"I prevent all users other than root from connecting to the Tor Control port with an > iptables rule which looks like this: > > iptables -A OUTPUT -o lo -p tcp --dport 9051 -m owner ! --uid-owner root -j REJECT" Thanks! That should work perfectly. Is there any way to make dport a wildcard? Ringo

Re: Tor/Iptables Question

2009-08-19 Thread Erilenz
* on the Wed, Aug 19, 2009 at 02:00:01AM -0400, Ringo wrote: > One problem I've continually run into while trying to setup a secure tor > virtual machine for browsing is that I have to allow it access to > localhost (to connect to Tor). Is there a way in iptables to say "deny > localhost access to

Re: Scott made me do it.

2009-08-19 Thread Karsten N.
Andrew Lewman schrieb: > I tested a few scenarios: The access to hidden service is important too (in my opinion). I have good experience using privoxy with: forwarded-connect-retries 3 Access to hidden services with socks5 in Firefox gives sometimes a timeout first. After 1-2 retries, the page

Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

2009-08-19 Thread Ringo
When I started working on this, I knew that projects like TorVM and incognito existed, but I wanted to try something different. The problem being that if an attacker is able to compromise the browser, the http proxy, or Tor, the user could have their IP revealed, or at least that was my understandi