Re: Debian/Ubuntu tor users, please check for core files

2010-11-25 Thread Jim McClanahan
Jan Weiher wrote: Hi, no core files on my Ubuntu 8.04 relay. regards, Jan Has anybody checked to see whether the Tor instances running on Ubuntu have the ability to leave core files? I've never delved into the details, but I know on older versions of Ubuntu, running ulimit in a shell

Re: minimal traffic footprint Tor on the road

2009-09-29 Thread Jim McClanahan
grarpamp wrote: Besides plugging DNS leaks, the two programs serve somewhat different purposes. Indeed, however neither program's purpose is to 'plug dns leaks'. They simply feed what connection [dns] requests they receive on towards Tor. I thought the reason you could not send

Re: minimal traffic footprint Tor on the road

2009-09-28 Thread Jim McClanahan
Jan Reister wrote: Il 28/09/2009 15:25, Eugen Leitl ha scritto: Why the switch to Polipo from Privoxy? Is Privoxy officially deprecated now? I just found out today and am wondering myself. From hearsay, Polipo should perform faster and better. There was a somewhat extended discussion

Re: [OT]RE: Unsubscribe

2009-09-23 Thread Jim McClanahan
downie - wrote: You have to send to a different address. Instructions [to unsubscribe] are in the headers. Having seen this situation on this list multiple times, it occurs to me that beyond To, From, and Date, many people have probably never seen the headers. Most non-techies probably don't

Re: seven bloxortsipt* relays ought *not* to be Valid

2009-07-30 Thread Jim McClanahan
Scott Bennett wrote: a) are running an obsolete version of tor (0.1.2.19) under LINUX, which is far enough back to be a security problem due to the SSL key generation bug in LINUX, If the key generation problem refers to what I think, and just for the record, that

Re: Thanks for the inclusion...

2009-07-30 Thread Jim McClanahan
Michael Cozzi wrote: Hello Tor Team. I'm not sure who to thank, but I noticed my suggested text regarding what IT Professionals use Tor for was included whole cloth on the web page. Thank you, that gave me geek-warm-fuzzies. Michael Very nicely done. It has been

Re: .exit handling (was Yahoo Mail and Tor)

2009-07-10 Thread Jim McClanahan
downie - wrote: Date: Fri, 10 Jul 2009 11:15:25 -0400 From: eril...@gmail.com To: or-talk@freehaven.net Subject: Re: Yahoo Mail and Tor If I'm proxying through Tor and I type this into my browser: www.google.com.example.exit My browser asks the proxy for a connection to

Re: Yahoo Mail and Tor

2009-07-10 Thread Jim McClanahan
Andrew Lewman wrote: A) The Privoxies after 3.06 have a local web control interface which we believe is a security risk. We think that remote websites can probably reconfigure your privoxy via that interface, maybe even without your noticing. If newer versions have the ability to disable

Re: Yahoo Mail and Tor

2009-07-09 Thread Jim McClanahan
bao song michaelw...@yahoo.com.au wrote: The standard Tor bundle download for non-Windows still includes Privoxy 3.0.6, which mangles Yahoo mail. I am running privoxy 3.0.6. If you want to email me off-list I will be happy to send you my user.action file which seems to more or less work

Re: Google and Tor

2009-07-08 Thread Jim McClanahan
grarpamp wrote: GMail doesn't do this anymore. You can sign up through Tor just fine. Yes, there was a time years ago where they were invite only :( Then they opened up. This does not refer to that historical thing. I tried making four different acct names over the span of a day

Re: Google and Tor

2009-07-05 Thread Jim McClanahan
James Brown wrote: I use the gmail within Tor very easy but I have some problems sometimes with other services of Google. For maybe I couple of years it has been almost impossible for me to use Google's search via Tor. (It keeps calling me a virus.) Somebody eventually told me about Scroogle

Re: 25 tbreg relays in directory

2009-07-02 Thread Jim McClanahan
Arjan wrote: Jim McClanahan wrote: [...] Certainly, protecting the network is a priority. Protecting uninformed or unsuspecting users gets trickier IMHO. I'll admit this is a bit of a hot-button issue for me and I may have overreacted. But I think care needs to be taken before

Re: 25 tbreg relays in directory

2009-07-01 Thread Jim McClanahan
Scott Bennett wrote: On Mon, 29 Jun 2009 07:13:42 -0600 Jim McClanahan jimmy...@copper.net Scott Bennett wrote: On Mon, 29 Jun 2009 05:14:25 -0600 Jim McClanahan jimmy...@copper.net wrote: Scott Bennett wrote: Ouch. This provides another example in support

Re: 25 tbreg relays in directory

2009-07-01 Thread Jim McClanahan
Edward Langenback wrote: Jim McClanahan wrote: I probably should have canned the sarcasm, but I do think that any disabling of the client from the network should be easily reversible. Part of that is just my philosophy. But it also has a practical element in terms of what is required

@Scott Bennett

2009-06-30 Thread Jim McClanahan
I was trying to email you and it bounced: Final-Recipient: rfc822; benn...@cs.niu.edu Original-Recipient: rfc822;benn...@cs.niu.edu Action: failed Status: 5.7.1 Remote-MTA: dns; mp.cs.niu.edu Diagnostic-Code: smtp; 550 5.7.1 benn...@cs.niu.edu... Access denied

@Scott Bennett

2009-06-30 Thread Jim McClanahan
Ah, I see. It is the duplicate messages from you that were confusing me. Why duplicate messages? As somebody else has pointed out recently, the fact that I can post on or-talk means I am subscribed to or-talk.

Re: 25 tbreg relays in directory

2009-06-29 Thread Jim McClanahan
Scott Bennett wrote: Ouch. This provides another example in support of having a way for the directory authorities to render insecure versions ... and only usable as clients to connect to the tor project's web site to download a current version of tor. This kind of thinking baffles me.

Re: 25 tbreg relays in directory

2009-06-29 Thread Jim McClanahan
Scott, when I did a reply on your email, it (tried to) sent it your personal email account rather than the list. -- Scott Bennett wrote: On Mon, 29 Jun 2009 05:14:25 -0600 Jim McClanahan jimmy...@copper.net wrote: Scott Bennett wrote: Ouch. This provides another example

Question About Security Threat from Tor

2009-06-28 Thread Jim McClanahan
Hi, I have read on this mailing list several times about how some previous versions of Tor contain vulnerabilities that can threaten the host machine itself. I am reminded of this again with Pei Hanru's excellent work tracking down the tbreg mystery. (I too say thank you.) While I understand

Re: Question About Security Threat from Tor

2009-06-28 Thread Jim McClanahan
Michael wrote: Jim McClanahan wrote: Hi, I have read on this mailing list several times about how some previous versions of Tor contain vulnerabilities that can threaten the host machine itself. snip Hi Jim, Not so much related to Tor itself, but more toward general

Re: Lynx leaks DNS

2009-06-27 Thread Jim McClanahan
Phil wrote: I realize this needs a fix not a workaround, but if a workaround is enough for now you could try running lynx via proxychains -- tor Proxychains might grab all the DNS requests. Thanks for your response. Now that I know lynx doesn't leak DNS when the protocol (e.g. http://)

Lynx leaks DNS

2009-06-26 Thread Jim McClanahan
Hi, Quite by accident I discovered that the lynx browser is leaking DNS addresses. I have verified this on: Lynx Version 2.8.4dev.7 (03 Aug 2000) and Lynx Version 2.8.5rel.1 (04 Feb 2004) lynx is called from scripts with the following statements: export

Re: Lynx leaks DNS

2009-06-26 Thread Jim McClanahan
Fabian Keil wrote: Jim McClanahan jimmy...@copper.net wrote: Quite by accident I discovered that the lynx browser is leaking DNS addresses. I have verified this on: Lynx Version 2.8.4dev.7 (03 Aug 2000) and Lynx Version 2.8.5rel.1 (04 Feb 2004) Is there a reason why you

Re: Banners injected in web pages at exit nodes TRHCourtney*

2009-06-02 Thread Jim McClanahan
Strange the the provided link didn't have injection... Adaptation on the nodes part? A few minutes ago I tried http://www.torproject.org.TRHCourtney01.exit/ and got a banner ad. Maybe they do it on a sporadic basis?

Re: GSoC Introduction! (TorButton)

2009-05-31 Thread Jim McClanahan
Chris Humphry wrote: Hi Kroy! snip I informened Tor team how RefContorl will spoof the root of the site you are visiting as the referrer. I will also point out functionality Privoxy has as an option. When you come from another site, it spoofs the referrer as the root of the site being

Re: TOR and HADOPI

2009-05-29 Thread Jim McClanahan
Freemor wrote: On Thu, 28 May 2009 22:25:49 -0700 (PDT) Curious Kid letsshareinformat...@yahoo.com wrote: This policy model, applied globally, may put and end to Tor. Imagine if exit nodes in every country were shut down, yet their operators were still required to pay for an Internet

Re: Iptables configuration for a transparent proxy for a singleuser

2009-05-16 Thread Jim McClanahan
unknown wrote: INET_IFACE=eth0 #our internet interface $IPTABLES -A INPUT -i $INET_IFACE -p TCP --dport 9050 -j DROP $IPTABLES -A INPUT -i $INET_IFACE -p TCP --dport 9040 -j DROP $IPTABLES -A INPUT -i $INET_IFACE -p TCP --dport 53 -j DROP $IPTABLES -A INPUT -i $INET_IFACE -p UDP --dport

Re: Version checking (was Re: 25 tbreg relays in directory)

2009-04-29 Thread Jim McClanahan
Tripple Moon wrote: IMHO, all and i mean *all* modifications of the original code and/or design should be committed to the development-tree, that's how things get improved and fixed etc by the community that maintains the development of the project. The problem with your logic (leaving

Re: Version checking (was Re: 25 tbreg relays in directory)

2009-04-28 Thread Jim McClanahan
 By remotely calculated CRC-value of the client i mean that the destination does the CRC calculation of the connecting client. Yes this means the client needs to send all of its binary-self to the destination. That would be a pretty big upload for a dial-up user! I am also wondering what