Re: I've disappeared from the directory!

2006-03-08 Thread Jan Reister
On 08/03/2006 15:31, Mike Zanker wrote: > My node, flutic, seems to have gone from the directory. Not from mine, I see it: router flutic 195.62.29.176 9001 0 0 platform Tor 0.1.1.14-alpha on Linux i686 published 2006-03-08 14:50:51 etc etc Jan

Re: Using TOR? get lost!

2006-04-07 Thread Jan Reister
On 07/04/2006 09:37, vukki starborn wrote: > 3. Though the people running server is in their rights to refuse any > connection (as mentioned in their disclaimer), to what consequences > may lead widespreading of such policies? If owners of the popular > services will refuse torified users, how one

Re: TorPark mentioned on BoingBoing

2006-05-10 Thread Jan Reister
On 10/05/2006 08:53, Roger Dingledine wrote: > Hi Steve, > > Can you enlighten us about the current status with respect to following > the licenses of Firefox, Portable Firefox, and Tor? Torpark was also featured on Newsforge yesterday: http://business.newsforge.com/article.pl?sid=06/04/05/1657

Re: ISP Policies

2006-05-11 Thread Jan Reister
On 11/05/2006 09:42, Christopher W. wrote: > I'm wondering if anyone has any experience with BellSouth (the > FastAccess DSL service) and their policy towards running an intermediate > (non-exit) node. Perhaps you could check the "Policy Considerations for Choosing an ISP" (also the subject l

Re: Tor,security and web-usability

2006-06-13 Thread Jan Reister
On 13/06/2006 02:56, [EMAIL PROTECTED] wrote: > I have not found the appropriate way to quickly kill Flash, neither in > Firefox Hi Abacus, have you tried the Firefox extension Flashblock? http://flashblock.mozdev.org/ > if I want to create an email-account with any of the big free webbased >

Re: A map of the TOR network (geolocation)

2006-06-13 Thread Jan Reister
On 13/06/2006 01:39, robert schade wrote: > Please take a look at http://www.mitglied.lycos.de/tormap , where you > can find the location of all TOR-Servers on a map. Great map! The Tor website has an open request about geolocation: http://tor.eff.org/volunteer.html.en 4. Speaking of geolocat

Re: Firefox extensions and anonymity, TOR etc

2006-06-13 Thread Jan Reister
On 13/06/2006 11:24, [EMAIL PROTECTED] wrote: > Well, I just installed it, and guess what? In the config box, I read > "Javascript must be enabled for FlashBlock to work" !!! > Uninstalled it... IMO better is to have Flash than JS enabled! Oh well, you're right! The Flashblock faq recommends NoSc

Re: Interestingly enough...

2006-11-07 Thread Jan Reister
On 31/10/2006 03:53, Fergie wrote: > I found it interesting that Cisco added this their most recent IDS > signatures: Bleedingsnort has the following signatures: 2001728 || BLEEDING-EDGE POLICY TOR 1.0 Client Circuit Traffic || url,tor.eff.org 2002950 || BLEEDING-EDGE POLICY TOR 1.0 Server Key Re

Re: court trial against me - the outcome

2007-11-14 Thread Jan Reister
Il 14/11/2007 15:22, Mirko Thiesen ha scritto: > In June the local police informed me about preliminary proceedings against > me by asking me (by mail) to "visit" them. The letter mentioned computer > fraud (actually it was "Computerbetrug in Tateinheit mit Faelschung > beweiserheblicher Daten gem

Re: virtues of middlemen

2008-01-09 Thread Jan Reister
Il 30/12/2007 04:31, F. Fox ha scritto: > > blau wrote: > (snip) >> If you run a service on the public net, say a website, it >> makes sense to run a Tor middleman node on the same host. This way users >> can reach your service anonymously - without the risks of passing >> through an exit relay. >

OSI 1-3 attack on Tor? in it.wikipedia

2008-02-13 Thread Jan Reister
uot;ibridi" come MPLS o lo switching ATM, che possono rompere l'integrità del protocollo, sostituendo un meccanismo di switching al normale routing. Non essendo tale assunzione reale sarebbe errato utilizzare TOR per la protezione di comunicazioni realmente riservate. [end] -- Jan Re

Re: OSI 1-3 attack on Tor? in it.wikipedia

2008-02-13 Thread Jan Reister
Il 13/02/2008 20:55, Marco Bonetti ha scritto: that's the whole point of encrypting the communications and sharing the public keys fingerprints inside tor sources. a man in the middle can reroute traffic through his nodes but it will be useless (except for sending your connections to /dev/null) a

Re: OSI 1-3 attack on Tor? in it.wikipedia

2008-02-14 Thread Jan Reister
Il 14/02/2008 13:36, Anon Mus ha scritto: A. Attacker obtains genuine private keys by, 1. Attacker sets up a number of genuine tor servers 2. Attacker infects genuine tor nodes with spyware Setting up rogue (or compromised) nodes won't work for getting the directory authority private keys. T

Tor Browser web page

2008-03-04 Thread Jan Reister
The Tor Browser Bundle web page could be more explicitly saying that it's a MS Windows application. http://www.torproject.org/torbrowser/ For example, see the diff. Jan Index: index.wml === --- index.wml (revision 13851) +++ in

Re: Torbutton 1.1.17-alpha released

2008-03-18 Thread Jan Reister
Il 18/03/2008 11:31, bao song ha scritto: I downloaded the Tor all-in-one Tor/Privoxy/Torbutton package from torproject.org, but when I checked, I had torbutton 1.04.01 From http://torbutton.torproject.org/ The stable version is: 1.0.4 (01 Jun 2006) From http://torbutton.torproject.org/dev/ Th

Re: [OT] mitigating or defeating syntax analysis

2008-04-18 Thread Jan Reister
Il 18/04/2008 10:12, Vlad "SATtva" Miller ha scritto: One way is to use machine translators: translate your English text to another language, and then back to English. Typing habits are also patterns. Switch the keyboard layout, or use a software keyboard with your mouse, or type with the lit

Re: [Fwd: ESA Foreign Notice (fwd)]

2008-04-29 Thread Jan Reister
Il 29/04/2008 02:13, Roger Dingledine ha scritto: > This is one option -- force them to officially commit to something. > [...] > Another option is to not demand that they make any official statement, and > just try to educate the fellow you're talking to and slowly win advocates A third option i

Re: [Fwd: ESA Foreign Notice (fwd)]

2008-04-29 Thread Jan Reister
Il 29/04/2008 09:30, Marco Bonetti ha scritto: >> ExitPolicy reject *:6881-6999 > http://www.azureuswiki.com/index.php/Port_is_blacklisted > With that line you cut off a lot of bt traffic but not all. That's neat, thanks Marco. Jan

Re: tor legal help in canada

2008-04-29 Thread Jan Reister
Il 30/04/2008 05:50, krishna e bera ha scritto: > i run Tor exit node cyblings01 which is in Canada. > i got a notice of copyright infringement from my ISP Rogers: > http://cyblings.homelinux.net/tor/rogers-abuse-email.txt > i have drafted a reply as follows: > http://pastebin.ca/1001809 > any comm

Re: Exit node connection statistics

2008-07-14 Thread Jan Reister
Il 13/07/2008 17:54, [EMAIL PROTECTED] ha scritto: > I set up a statistics script creating a list of the top 100 hosts each day to > which Tor users connect to over my node (only for ports 80 and 443). > I decided to make this accessible through a hidden service only, You should add your relay ni

Re: How to ban many IPs?

2008-10-30 Thread Jan Reister
Il 29/10/2008 22:18, slush ha scritto: > I know it is solution, but I prefer exit node, because I think it is > more universal (it can be used as middleman and also as exit). > [...] It is only about > people on university, which are against porn and other non-legal > activities. Cant't you just r

Re: any middlemen seeing DoS currently?

2008-11-11 Thread Jan Reister
Il 11/11/2008 15:23, Geoff Down ha scritto: > Crashed again after only 2 hours: I had to shut down my node temporarily due to high load. Jan

Re: two experiments I've done with relays, feedback welcome :)

2009-05-06 Thread Jan Reister
Il 02/05/2009 15:18, Andrew Lewman ha scritto: >> 1) Tunneled TOR > > Interesting. I'm not sure I fully understand the ramifications to > people's tcp traffic in this scenario. Tunneled Tor is, as Andrea built it, a Tor exit relay inside a NAT network. The relay has two network interfaces: the

gettor down?

2009-05-08 Thread Jan Reister
Is gettor having troubles? I got this response using a gmail web account. Jan > This is the mail system at host moria.seul.org. > > I'm sorry to have to inform you that your message could not > be delivered to one or more recipients. It's attached below. > > For further assistance, please send

Re: OT: google cookie

2009-06-05 Thread Jan Reister
Il 05/06/2009 12:42, Karsten N. ha scritto: > In Germany nearly 80% of important websites using Google stuff like > advertisements or google analytics. > [...] > German text about Google: https://www.awxcnx.de/handbuch_12.htm > > Sorry for off-topic post. Not at all, Karsten. Your post is very in

Re: New tor debs repo live

2009-09-16 Thread Jan Reister
Il 16/09/2009 06:11, Roger Dingledine ha scritto: > Peter (our Debian guy) plans to > continue updating the debs at noreply.org for "a while". The current plan > is to do it until the current signing subkey for the noreply repository > expires (another year or so). > > At that point users will thi

Re: minimal traffic footprint Tor on the road

2009-09-28 Thread Jan Reister
Il 28/09/2009 15:02, Eugen Leitl ha scritto: > I've gotten used to connecting to my middleman node on the home LAN > so that I don't even know what's the current proper way to run > a tor/browser bundle or a browsing appliance on Ubuntu on a netbook > (Atom N270) on the road. > > Which packages

Re: minimal traffic footprint Tor on the road

2009-09-28 Thread Jan Reister
Il 28/09/2009 15:25, Eugen Leitl ha scritto: > Why the switch to Polipo from Privoxy? Is Privoxy officially > deprecated now? I just found out today and am wondering myself. From hearsay, Polipo should perform faster and better. > There are no tor/browser appliances for Ubuntu out yet, right? > I

Re: Tor relay security

2010-02-03 Thread Jan Reister
Il 03/02/2010 13:59, onion.s...@nym.hush.com ha scritto: > 1. The article talks about encrypting sensitive information on a > Tor server. Does the author mean that files on hard disk are > obtainable by other Tor users when I run a Tor relay? No, unless a new vulnerability is discovered in Tor.

Re: Tor relay security

2010-02-03 Thread Jan Reister
Il 03/02/2010 16:51, Stephen Carpenter ha scritto: > How does that help? If the machine is compromised, the disk will be > mounted and unencrypted. > Encrypted drives are really only helpfu if A) physical security/theft > is the major concern I am referring to an attacker having a physical access

Re: TOR Blocked at Universities

2010-02-12 Thread Jan Reister
Il 11/02/2010 22:17, Michael Holstein ha scritto: > .. but the above problem is ultimately what forced us to do the same > thing (although we just prohibit the operation of an exit). My university's department of computer sciences stopped an exit node because both a) some DMCA notices for alleged

Re: HTTPS Everywhere Firefox addon

2010-06-01 Thread Jan Reister
This is a great extension. Tested so far and works fine. May I suggest that localized google search engine pages (such as google.it) could be added? Jan *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscr