Re: Tor server for port 443

2008-05-22 Thread Mike Cardwell
Scott Bennett wrote: While port 587 is the official standard port for email submission, it doesn't *require* the usage of SSL. GMail does however have this requirement. Also, I'd still personally prefer to use port 465 over port 587 for mail submission when both are available, purely because

Re: Tor server for port 443

2008-05-21 Thread Mike Cardwell
Scott Bennett wrote: The standardised port for SMTP submission is 587. See http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol specifically "Although some servers support port 465 for legacy secure SMTP in violation of the specifications" Huh. Guess I'll have to look it up somew

Re: Tor server for port 443

2008-05-21 Thread Mike Cardwell
Scott Bennett wrote: Can I get some feedback regarding the deployment of an exit node restricted to port 443? My rationale is fairly simple, I believe in free speech and want to help make it available to everyone, especially those whose governments criminalize certain kinds of speech. I am a

Re: Gmail/SSL

2008-03-10 Thread Mike Cardwell
defcon wrote: whatever you do, while in gmail dont exit gmail without logging off, if you simply go to any non-ssl google site your cookie will be exposed ፡( These repeated discussions about gmail and ssl make me wary of ever using their webmail service, or for that matter any other webmail

Re: SORBS vs Tor and the world

2008-01-07 Thread Mike Cardwell
Nick Mathewson wrote: On the other hand, if your only goal is to block anonymous SMTP, and you agree that blocking all Tor servers is very overreaching, you might instead try looking at the more targetted DNSEL service available at http://exitlist.torproject.org/ It lets you block _exactly_ t

Re: Proper TOR DNS Configuration Testing Help

2008-01-01 Thread Mike Cardwell
Mark Manning wrote: That's awesome! That's exactly how I was thinking but to be honest I wasn't sure how to implement the background service that ties the query logs to the web server. If it wouldn't take too long, do you think you could talk about the specifics a little bit more? 1.) You

Re: Proper TOR DNS Configuration Testing Help

2007-12-30 Thread Mike Cardwell
Mark Manning wrote: Hello - I'm just starting to pay attention to this mailing list so forgive me if this subject has been brought up before. I'm interested in setting up a [or using an existing] service that could test for a proper DNS configuration [among other things]. The goal being that

Re: Proper TOR DNS Configuration Testing Help

2007-12-30 Thread Mike Cardwell
Mark Manning wrote: Hello - I'm just starting to pay attention to this mailing list so forgive me if this subject has been brought up before. I'm interested in setting up a [or using an existing] service that could test for a proper DNS configuration [among other things]. The goal being that

Re: another seeming attack on my server's DirPort

2007-12-20 Thread Mike Cardwell
Kyle Williams wrote: This is just a theory, no hard facts to back it up. When I'm messing around with Tor's ControlPort, I've noticed that my Tor traffic just hangs until whatever I'm doing on the ControlPort stops. There have been a couple of times where I do something very wrong on the con

Re: Spam over Tor

2007-10-29 Thread Mike Cardwell
* on the Mon, Oct 29, 2007 at 01:11:06PM +0100, Lexi Pimenidis wrote: >> I disagree with that. There still has been no spam over Tor in the >> scenario you described. Rather someone has logged into a system over >> Tor and used _that_ system to send spam. I'm not saying Tor would not >> have been

Re: Leopard Vidalia

2007-10-28 Thread Mike Cardwell
* on the Fri, Oct 26, 2007 at 03:50:44PM -0400, [EMAIL PROTECTED] wrote: >> In case anyone's interested, I just installed the Tiger version of >> Vidalia under Leopard and it works fine > Was this the vidalia bundle? If so, great. Thanks for the confirmation > it works. It was the bundle yes.

Leopard Vidalia

2007-10-26 Thread Mike Cardwell
Hi, In case anyone's interested, I just installed the Tiger version of Vidalia under Leopard and it works fine Mike

Re: Spam over Tor

2007-10-26 Thread Mike Cardwell
Lexi Pimenidis wrote: I don't see how this is any different than the "pwned" calls We also don't see any technical chance to stop this. However we just wanted to announce that at least the statement that there is no spam over Tor is history... If I write a web based application that sends ou

Re: Spam over Tor

2007-10-26 Thread Mike Cardwell
Michael Holstein wrote: What exactly is happening? Somebody is using your Tor exit node to access a website (yahoo mail) and using that to send spam? And this is being traced back to you by the spam being traced back to Yahoo, and Yahoo checking their webmail logs and finding your exit node's IP

Re: headers in email

2007-10-08 Thread Mike Cardwell
Gregory Maxwell wrote: You could set up a gmail account via tor. Then point a stunnel at smtp.gmail.com port 465 over Tor using tsocks or something. Making sure you have a copy of their public cert first and that the stunnel validates it. I set this up and pointed my MTA (Exim) at it just for a

Re: headers in email

2007-10-08 Thread Mike Cardwell
Florian Reitmeir wrote: The better way(tm) to do this would be to just run an open SMTP server as a hidden service, and run spam filtering, hashacash proof-of-work challenge, whatever anti-abuse stuff you want, along with header munging and striping, ... and advertise this server for people to s

Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Mike Cardwell
Scott Bennett wrote: 1.) People that can perform these attacks if you just use a normal Internet connection: Governments, people working for ISPs ...and anyone running a destination site being accessed with or without tor, and anyone with a wireless card in a laptop in the same public loc

Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Mike Cardwell
Scott Bennett wrote: If they use an Internet cafe, their traffic is subject to being monitored. If they use Tor it is *also* subject to being modified. If they go to a coffee shop or other location with free wireless access, their traffic is also subject to being modified, but at *any and

Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Mike Cardwell
Scott Bennett wrote: If you set up something like that you're opening up all sorts of attacks against the people who use your service. If they don't know that all of their plain text traffic can be read and modified by, "dodgy," exit nodes, and almost certainly *will* be at some point...

Re: funneling a wireless net's outbound connections through tor

2007-10-01 Thread Mike Cardwell
Scott Bennett wrote: I'm trying to set up a free wireless service for those of my neighbors within range of a little wireless router I have. To keep things safe for me and at least somewhat safer for them, I want to route all the outbound connections from that router through tor using pf under

Re: Maximum num ExitPolicy

2007-09-18 Thread Mike Cardwell
Peter Palfrader wrote: Is there a maximum number of ExitPolicy entries you can have for a node? Probably not, but remember that all the Tor clients will have to download it, and all the Tor directory servers will have to serve it, so it probably shouldn't be more than a dozen or so lines. So

Maximum num ExitPolicy

2007-09-18 Thread Mike Cardwell
Hi, Is there a maximum number of ExitPolicy entries you can have for a node? Mike

Re: I break the silence: My arrest

2007-09-16 Thread Mike Cardwell
Ringo Kamens wrote: I'm using gmail which doesn't give me an option unless I'm using a pop3 client. Comrade Ringo Kamens When you hit reply. Your cursor is at the top of the message. There's nothing stopping you moving the cursor down. In fact, a quick google shows that if you're using Fire

Re: Privoxy usage?

2007-08-18 Thread Mike Cardwell
[EMAIL PROTECTED] wrote: I have heard of the "TCP over TCP" issue but have not had any bad experiences so far. I am currently using both TCP and UDP-based VPN systems and while the TCP-based one is a bit slower, it still seems very stable for applications such as Terminal Services, FTP, http(

Re: ModSecurity v2 Apache rules for directory servers

2007-08-14 Thread Mike Cardwell
Florian Reitmeir wrote: >>> "Please don't do stuff like this." >> Why not? I don't see any problem in validating/checking the behavior >> or request/fingerprints of incoming connections to Tor, so long as it >> doesn't break Tor (hence QA testing after R&D). Why would checking >> input be a bad

Re: Directory issues

2007-08-13 Thread Mike Cardwell
* on the Mon, Aug 13, 2007 at 01:10:01AM -0700, coderman wrote: > On 8/13/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: >> >> I have the same problem. 3 days of "not enough to build a circuit". >> Server: Viking, WinXp Vidalia 0.0.13 Tor 0.2.0.4 >> >> But right now Tor seems to work again...

ModSecurity v2 Apache rules for directory servers

2007-08-11 Thread Mike Cardwell
On http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerForFirewalledClients one of the suggested methods to get your Directory service on port 80 if Apache is in the way is to use mod_proxy. Personally I think sticking tors directory service behind Apache so it's not exposed to the wider

Re: Warning to NoReply.org DEB Package Users

2007-08-11 Thread Mike Cardwell
* on the Fri, Aug 10, 2007 at 04:12:21PM -0400, Ringo Kamens wrote: > As you know, a major security vulnerability was just patched with the > 0.1.2.16 release. I have been using the noreply.org deb packages but > they didn't update to the newest version (at least not under amd64 > feisty). If you

Re: Exiting only port 80

2007-05-05 Thread Mike Cardwell
Juliusz Chroboczek wrote: If I am right, wouldn't the majority of the tor user base be better served if a collection of exit nodes only exited port 80 and 443 traffic? Please add port 22 (ssh). I think you sort of missed my point. I'm aware there are lots of protocols and ports used on tor a

Re: Exiting only port 80

2007-05-01 Thread Mike Cardwell
* on the Tue, May 01, 2007 at 11:33:30AM +0200, Karsten N. wrote: >> Am I right in thinking that most people use Tor for web browsing, over >> ports 80 and 443? And am I right in thinking that most of tors bandwidth >> is used up by a minority of users, using services that require much >> higher a

Exiting only port 80

2007-04-30 Thread Mike Cardwell
Hi, Am I right in thinking that most people use Tor for web browsing, over ports 80 and 443? And am I right in thinking that most of tors bandwidth is used up by a minority of users, using services that require much higher amounts of bandwidth, such as ptp traffic? These are just guesses, but I c

Re: Tor nodes blocked by e-gold

2007-04-27 Thread Mike Cardwell
"Tor exit node"... Mike * on the Fri, Apr 27, 2007 at 03:53:31PM +0100, Tony wrote: > SORBS lists TOR servers as being SPAM related. Which is rather unlikely to be > the case. > > > Regards, > > Tony. > > > >

Re: Tor nodes blocked by e-gold

2007-04-27 Thread Mike Cardwell
Sorbs have *many* different lists. They do not just list sources of spam, and nor do they claim to. See http://www.au.sorbs.net/using.shtml If someone ignorantly decides to start blocking mail or http requests based on an IP being listed on the aggregate of all sorbs zones, ie dnsbl.sorbs.net then

Re: Accept-encoding: gzip

2007-04-27 Thread Mike Cardwell
* on the Thu, Apr 26, 2007 at 02:06:57PM -0400, Roger Dingledine wrote: >> As a directory mirror, current requests for the mirror data cause about >> 2.7MB of data transfer. If the data could be delivered compressed with >> gzip that could significantly reduce the transfered data... > Agreed. Tha

Re: bandwidth limit strangeness

2007-04-27 Thread Mike Cardwell
* on the Thu, Apr 26, 2007 at 05:01:10PM -0400, Roger Dingledine wrote: > [snip] >> BandwidthRate 64KB >> BandwidthBurst 64KB >> MaxAdvertisedBandwidth 64KB > [snip] >> With the bandwidth limits set as they are, why is tor using up nearly >> 1 Megabit per second? I thought it mig

ip-port.torhosts.nighteffect.us and exim

2007-04-26 Thread Mike Cardwell
I've been looking into how to use this with Exim4. I just thought I'd share it here for the benefit of the archives. warn dnslists= $interface_port.${sg{$interface_address}{\N^(\d+)\.(\d+)\.(\d+)\.(\d+)$\N}{\$4\.\$3\.\$2\.\$1}}.ip-port.torhosts.nighteffect.us log_message = This connectio

Re: Behaviour of "Address" on a multi-ip server

2007-04-26 Thread Mike Cardwell
* on the Thu, Apr 26, 2007 at 09:49:39AM -0400, [EMAIL PROTECTED] wrote: > : Where 'debian-tor' is the user my tor process runs as, and > : 85.234.136.20 is the IP I want all tor outgoing connections to appear > : from. > : > : My question is. Is this a waste of time? Does tor already originate >

Behaviour of "Address" on a multi-ip server

2007-04-26 Thread Mike Cardwell
Hi, My server has many IP addresses. I was paranoid that even though I set "Address" in my configuration, outgoing connections might originate from one of the other IP 's on the server. So to combat this I use the following iptables rule: iptables -t nat -A POSTROUTING -s ! 85.234.136.20 -m owner

Accept-encoding: gzip

2007-04-26 Thread Mike Cardwell
As a directory mirror, current requests for the mirror data cause about 2.7MB of data transfer. If the data could be delivered compressed with gzip that could significantly reduce the transfered data... The main benefit of this being more bandwidth available for routing instead of directory transf

bandwidth limit strangeness

2007-04-26 Thread Mike Cardwell
Hi, I'm running a tor server called 'Grepular'. At the moment it's a "partial" exit node in that it only exits a few specific ports. It's also a directory mirror. I'm running version 0.1.2.13, with this config: SocksPort 9050 SocksListenAddress 0.0.0.0 RunAsDaemon 1 DataDirectory /var/li

Re: Example hidden service issue

2007-04-23 Thread Mike Cardwell
Roger Dingledine wrote: Yes, you're absolutely right. Oops. Thanks for pointing it out. *snip option two* Just a reminder as it's been a few weeks since this discussion. The "bad" hidden service instructions are still up in the online documentation. I left option one above as I think that sho

Re: Example hidden service issue

2007-04-23 Thread Mike Cardwell
Roger Dingledine wrote: Wont that give google a map of Real IP -> Hidden service name? Yes, you're absolutely right. Oops. Thanks for pointing it out. I originally split the setup instructions into two steps because people had a lot of trouble distinguishing whether they had screwed up editing

Re: Open DNS

2007-04-23 Thread Mike Cardwell
xiando wrote: I read an article from LH this morning about the OpenDNS service. http://tinyurl.com/24y2cn http://www.opendns.com/ Can I use this with Tor? Will that void any anonymity provided by Tor? Forgive me if this is a stupid question. > I call SCAM. Yes. SCAM, I tell you. This isn't re

Re: Example hidden service issue

2007-03-31 Thread Mike Cardwell
* on the Sat, Mar 31, 2007 at 07:30:26PM +0200, Karsten Loesing wrote: >> Further to this, there is still a problem even if you *do* change the >> onion address after doing the test. The fact that google can see that >> someone was testing setting up a hidden tor service from a particular IP >> on

Re: Example hidden service issue

2007-03-31 Thread Mike Cardwell
* on the Sat, Mar 31, 2007 at 05:49:53PM +0100, Mike Cardwell wrote: > That's exactly the way I should have described the issue in my original > post. I didn't think I'd need to spell it out in so much detail. :) > > If you assume that everyone that has set up a hi

Re: Example hidden service issue

2007-03-31 Thread Mike Cardwell
* on the Sat, Mar 31, 2007 at 11:38:47AM -0500, Drake Wilson wrote: > By my understanding, here's the chain of reasoning and action: > > 1. Someone sets up a foobarbazqux.onion hidden service with the example > given. They type in http://foobarbazqux.onion/ to see whether it works. > 2.

Example hidden service issue

2007-03-31 Thread Mike Cardwell
In the documentation it tells you to set up an example hidden service pointing at google.com, eg: HiddenServicePort 80 www.google.com:80 I've just started looking at hidden services so I'm not exactly sure how they work yet, but if I'm correct, by setting that up and testing it surely you'll be c

Re: Forwarding email ports

2007-02-05 Thread Mike Cardwell
* on the Mon, Feb 05, 2007 at 09:45:20AM -0800, Michael_google gmail_Gersten wrote: >> Nope .. 587 is an alternative to 25. Unlike the other two, it's not >> encrypted. > Whoops! I've taken that one off my list of ports then. I'm not sure what was suggested is actually correct. Port 25 is for SM