On Fri, Jan 07, 2011 at 03:21:22PM -0800, travis+ml-tor-t...@subspacefield.org
wrote 15K bytes in 259 lines about:
: I've advertised this a few times, to virtually no response. The
: tor-assistants mlist has been confused, with people telling me they
: weren't sure what their ubuntu strategy was,
On Mon, Jan 03, 2011 at 04:06:44PM +0100, anonym wrote:
> Hi list,
>
> Liberté Linux has a novel solution to this problem[4] -- it sets the
> system time according to the Tor consensus' valid-after/until values,
> which essentially removes Tor's time skew check. We T(A)ILS developers
> are tempted
On Mon, Jan 03, 2011 at 04:06:44PM +0100, anonym wrote:
> One issue for anonymity-oriented LiveCDs (such as T(A)ILS[1] and Liberté
> Linux[2]) is the system time. Tor requires a reasonably correct system
> time, otherwise no circuits will be opened. This is a major problem for
> these LiveCDs since
On Jan 12, 2011, at 9:01 PM, Roger Dingledine wrote:
> On Thu, Jan 13, 2011 at 01:17:33AM +0100, Mitar wrote:
>> On Wed, Jan 12, 2011 at 6:26 AM, Mike Perry wrote:
>>> and to suggest
>>> solutions for their security problems that involve improving their
>>> computer security for the Internet at
On Wed, Jan 12, 2011 at 09:01:34PM -0500, Roger Dingledine wrote:
> For more on this topic, I'd point you to a short article a few years
> ago by Goodell and Syverson called "The Right Place at the Right Time:
> Examining the Use of Network Location in Authentication and Abuse
> Prevention" -- but
On Thu, Jan 13, 2011 at 01:17:33AM +0100, Mitar wrote:
> On Wed, Jan 12, 2011 at 6:26 AM, Mike Perry wrote:
> > and to suggest
> > solutions for their security problems that involve improving their
> > computer security for the Internet at large (open wifi, open proxies,
> > botnets),
>
> I am no
On 13.01.2011 01:01, Mitar wrote:
>> On top of this, it is *illegal* in Germany to keep user identifiable
>> data unless required for billing purposes.
> I think it is allowed but you have to clearly inform users of this
> (register this data collection with data privacy agency) and reasons
> for i
Hi!
On Wed, Jan 12, 2011 at 6:26 AM, Mike Perry wrote:
> and to suggest
> solutions for their security problems that involve improving their
> computer security for the Internet at large (open wifi, open proxies,
> botnets),
I am not sure what you mean by that? That there should not be open
WiFi
I believe that Klaus is already planning to contact his ISP, and was
seeking to learn more about reasonable values for numtcpsock.
Unfortunately different ISPs do this in different ways, and some
cannot easily change just that parameter in isolation. Before paying
much money for a numtcpsock incre
Hi!
On Thu, Jan 13, 2011 at 12:46 AM, Moritz Bartl wrote:
> On top of this, it is *illegal* in Germany to keep user identifiable
> data unless required for billing purposes.
I think it is allowed but you have to clearly inform users of this
(register this data collection with data privacy agency
Hi,
On top of this, it is *illegal* in Germany to keep user identifiable
data unless required for billing purposes.
Telemediengesetz §15 Nutzungsdaten
http://www.gesetze-im-internet.de/tmg/__15.html
Let me translate the first paragraph:
§15 Usage Data
(1) The service provider may collect person
Hi!
> But I wan't a legally binding statement from a lawyer or an official (BSI)
> that running TOR exit nodes
> in germany is legal.
In Slovenia there is a law (for Internet commerce) that persons just
passing data around, not changing it, choosing destination or source,
filter, etc, are not re
Klaus,
My relay (also Virtuozzo based) has a similar problem. Have you tried
running with the "ConstrainedSockets 1" option set in your torrc?
This may solve your problem.
You may want to experiment with different rate limits to tune your
relay to your available resources. I have to continually
Hi!
On Wed, Jan 12, 2011 at 12:52 AM, Moritz Bartl wrote:
> Most complaints you will have to deal with can be easily solved by
> telling them about Tor. In extreme cases, the police might come knocking
> to your door or even try to seize your equipment, but I am only aware of
> a single case in G
Am 12.01.2011 22:48, schrieb Moritz Bartl:
> Did you run a Tor exit at home? I'm not sure if they come and seize your
> home computer if the Tor server is hosted in a data center. Olaf seems
> not to have run into big trouble yet (or maybe he was quick on replacing
> the hardware).
running an exi
Hi,
On 12.01.2011 22:05, Fabian Keil wrote:
> Some of my equipment got seized a few months ago.
Good luck on getting it back then!
> I'm also not sure how the police would try to seize equipment
> and fail (assuming the equipment is actually there).
Explosives? ;-)
Did you run a Tor exit at ho
Hi,
You should probably contact the ISP first to see if they will raise the
limit. Mine was low on file descriptors and they upped it generously 5
minutes later (on a cheap $20 vserver).
Moritz
On 12.01.2011 22:02, coderman wrote:
>> "Error creating network socket: No buffer space available"
>>
On Wed, Jan 12, 2011 at 5:44 AM, wrote:
> ...
>> explicit ordered zeroisation is handy. (starting with keys and key
>> schedules, working cipher state, then on to user data, before
>> completing a full pass or three. this takes a smart kexec or other ham
>> fisted - still worth the effort.)
>
> T
> git clone git://git.wifi.pps.jussieu.fr/polipo
Do you have a gitweb? That would be nice.
> Chris's old branch is called polipo-chrisd
Oh, meaning 'chrisd/polipo' @ 20100113
193d95e3906967433081e0b10626a67c075ac131
> and his last tree is tagged ``polipo-chrisd-20100330''.
Oh, meaning 'polipo'
On Wed, Jan 12, 2011 at 7:57 AM, Klaus Layer wrote:
> ...
> "Error creating network socket: No buffer space available"
>
> errors. The numtcpsocks parameter limit is set to 550 on the vserver. Before
> asking the ISP to increase the value I would like to ask you what a reasonable
> value of this
Moritz Bartl wrote:
> > ok... since this mailing list is not able to give at least some tips
> > for running a tor exit node except:
>
> What do you want to know exactly? In many countries, running an
> anonymizing service is definitely not illegal. Many exit operators run
> into trouble with th
--- Begin Message ---
Dear all,
I've just moved the Polipo repository back to PPS. In order to get the
upstream Polipo sources, you now need to do
git clone git://git.wifi.pps.jussieu.fr/polipo
My branch is called ``master''; Chris's old branch is called
``polipo-chrisd'', and his last tree i
On Wed, 12 Jan 2011 10:49:25 -0500
Praedor Atrebates wrote:
> OK, great. I hadn't run into this issue until very recently so had no reason
> to follow anything having to do with it. Now the question is...where does
> one go to change this hidden setting? Where is the hidden setting hidden?
Hi all,
after running 2 tor relays over dialup connections for several weeks, I
recently ordered a vserver (Hosteurope Virtual Server Linux L 4.0) and setup a
middleman tor relay. Very fast the vserver run into shortage of tcp sockets
which indicate lots of
"Error creating network socket: No b
The BSI comment had me rolling on the floor. Could you imagine the
paperwork? If you're going to RSA, they'll be there.
On Tue, Jan 11, 2011 at 3:28 PM, Dirk wrote:
> ok... since this mailing list is not able to give at least some tips for
> running a tor exit node except:
>
> "Do it." or "We
Does anybody describe their expirience in using nokia n900 and Tor under it?
Is it possible to make more than one ordinary users on it? Is the
iptables of it fully functionary? Is it possible transparently torify
such users via iptables on it?
Is it possible to change by software mac-address, IMEI
Hi,
On Wed, Jan 12, 2011 at 04:06:05AM -0800, coderman wrote:
> On Wed, Jan 12, 2011 at 3:11 AM, intrigeri wrote:
> > ...
> >> (do Tor Live CDs need a new kexec target for memtest sweeps / ram
> >> zeroisation? :)
> >
> > As far as I understand, this seems like enhancements over the cold
> > boot
On Wed, Jan 12, 2011 at 3:11 AM, intrigeri wrote:
> ...
>> (do Tor Live CDs need a new kexec target for memtest sweeps / ram
>> zeroisation? :)
>
> As far as I understand, this seems like enhancements over the cold
> boot attack, and one more reason why Tor Live CDs should wipe the
> system memory
Thus spake Praedor Atrebates (prae...@yahoo.com):
> I am using my usual tor button + firefox to access a gmail account.
> I have generally had no problems but lately I try to log in and get
> a "cookies are turned off" and that I need to turn them on.
>
> Cookies are NOT turned off, they are se
Hi,
coderman wrote (11 Jan 2011 20:21:13 GMT) :
In order to
> solve this problem, we present a number of techniques that allow for
> complete recovery of a live CD’s in-memory filesystem and partial
> recovery of its previously deleted contents. We also present memory
> analysis of the popular Tor
Thus spake Mike Perry (mikepe...@fscked.org):
> > Is there any place (e.g. in a wiki) where one could find or even upload
> > his own 'response template', as I might assume that they will be very
> > specific to the country's law they're issued?
>
> Here's the (freshly updated) set of abuse compl
Am 12.01.2011 09:32, schrieb Timo Schoeler:
> thus Mike Perry spake:
>
>> Some of us are also compiling abuse response templates. The goal for
>> abuse responses is to inform people about Tor, and to suggest
>> solutions for their security problems that involve improving their
>> computer securi
Thus spake Timo Schoeler (timo.schoe...@riscworks.net):
> > Some of us are also compiling abuse response templates. The goal for
> > abuse responses is to inform people about Tor, and to suggest
> > solutions for their security problems that involve improving their
> > computer security for the In
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
thus Mike Perry spake:
> Some of us are also compiling abuse response templates. The goal for
> abuse responses is to inform people about Tor, and to suggest
> solutions for their security problems that involve improving their
> computer security for
34 matches
Mail list logo