Nick Mathewson schrieb:
> It's your server. But the last time I looked, the SORBS Tor list
> tried to include _all_ Tor servers, not just the ones that are
> configured to relay SMTP.
Not all Tor servers are listed in SORBS. I believe, the listing in
SORBS depends not on SMTP exit rules. The list
Hi onion-folks,
shinjiru is under pressure of spamhaus.org and others, to close
malware infected servers. I know about problems of no-tor-servers,
which have to migrate, because some IP-ranges of shinjiru were blocked
by SORBS and spamhaus.org. So shinjiru is closing all servers, which
seems to i
Drake Wilson schrieb:
> The obvious way to handle this, if you have iptables available, is
> probably to run the Tor server on some other port (say, 1443) and then
> use iptables to redirect incoming connections on port 443 to port 1443
> instead. Something like (untested):
>
> iptables -t nat
Eugen Leitl schrieb:
> Log-free? If Tor doesn't log, your firewall'd better. You want
> to be your nodes not attributable to you, wait until 20090101,
> then go malware. I mean, if running Tor without logs after 20090101
> is illegal, then what else do you have to lose? You're a criminal
> already
Olaf Selke schrieb:
> TOR-Admin (gpfTOR1) wrote:
>> But first I hope, we do not have to log!!!
>
> although I still believe data retention doesn't apply to tor operators, I
> would rather shut
> down my node than equipping it with lawful interception functionality.
Ful
anon ymous schrieb:
>> Server Traffic: 2.000 KB/s im Durchschnitt
>> Logdaten für eine Woche: 200 GByte
>> Logdaten nach Entfernung nicht benötigter Inhalte: 120 GByte
>> Logdaten komprimiert und verschlüsselt: 20 GByte
>> Logdaten für 26 Wochen: 500 GByte im Durchschnitt
>>
> I have some question
[EMAIL PROTECTED] schrieb:
> Experten erwarten durch die Neuregelung der
> Telekommunikationsüberwachung gravierende Auswirkungen auf
> Anonymisierungsdienste. "180 von 200 deutschen TOR-Servern gehen
> offline", kündigte Karsten Neß an, der für die Gesellschaft zur
> Förderung angewandter Informat
Hi onion guys,
we want to write about a few points of the European Cybercrime
Convention, which became real by law in Germany last time.
Sorry - we didnt read the or-talk very carefully last time. May be, it
was always discussed here.
By the European Cybercrime Convention anon servers are someth
kazaam schrieb:
> Hi,
> because in germany fascist laws will force tor-nodes to log their connections
> I'm looking for a way to blog german tor-nodes.
I believe, the GUI TorK can blog all nodes of a country, but this way is
not a solution.
Alexander W. Janssen schrieb:
> Am Donnerstag, den 15.11.2007, 01:19 +0100 schrieb [EMAIL PROTECTED]:
>> [... Privacy Foundation ...]
>
> Ich habe gerade eine Anfrage an die Privacy Foundation geschickt und sie
> gebeten, mir zur erklären, was folgender Passus[1] bedeutet:
>
> "In Ausnahmefällen
Thomas Hluchnik schrieb:
> Has anyone ever tried to speak with the guys from SPIEGEL, FAZ, Sueddeutsche
> and so on that they drive own tor nodes? This would be good PR for tor.
>
Heise and ZEIT will not run tor node, I asked them 2 month ago. May be,
they will change the opinion next time.
The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Mirko,
1: by German law a Tor node admin is something like an access provider.
You are not responsible for your traffic. If the court have only an IP
address and you have a tor status log, they have nothing.
2: Tor is a legal service in Germany (t
Matej Kovacic schrieb:
> I agree. But what about building Tor server and client into popular P2P
> clients?
There is a project to spread out Tor by pre-configured
DSL-modem/WLAN-router.
http://wiki.freunde-der-freiheit.de/index.php/TOR-Campaign
They have a mailing list. I do not know, if a route
Paolo Amoroso schrieb:
> On Sun, 11 Nov 2007 09:03:19 +
> Smuggler <[EMAIL PROTECTED]> wrote:
>
>> It says: Store these specific datasets
>
> since i'm italian and i don't know your language, i'm curious about
> which data must be retained by each service.
> Could you list them, in english?
>
Our measurement for space of log data:
(because there was a question for it)
server traffic (mean): 2.000 KB/s
log data for one week: 200 GByte
after remove of some useless strings: 120 GByte
compressed and encrypted: 20 GByte
for 26 weeks: approx. 500 GByte
This is very much for our s
[EMAIL PROTECTED] schrieb:
The cert doesn't automatically validate in any browser I've tried.
We use a StartCom.org certificate, because we have no more money for
thawte or something else. StartCom.org is trusted by Firefox/Iceweasel
and Konqueror by default. Sorry.
Other comments:
I lik
Ringo Kamens schrieb:
It might help to make links to certain sites in this list topic so
that google will index them. For instance:
awxcnx dotde/tor-i2p-proxy-en.htm?JASDJHSDF.ONION
Nice idea, we have done the job and hope, google will like our links.
That way, google gets to them and can do
Hi,
we like the idea of https://tor-proxy.net and we setup an other
TOR-proxy and an I2P-proxy, see:
https://www.awxcnx.de/tor-i2p-proxy-en.htm
or for german people:
https://www.awxcnx.de/tor-i2p-proxy.htm
The main goal of our proxy is, to make hidden services (TOR) and
eepsites (I2P
Ben Wilhelm schrieb:
> Pick the most common user-agent and use it. That's probably whatever the
> latest version of Firefox returns.
Ok, I use (only a few examples):
Mozilla/5.0 (Macintosh; U; PPC Mac OS X; sk-SK; rv:1.8.1.6)
Gecko/20070824 Firefox/2.0.0.6
Mozilla/5.0 (X11; U; Linux i586; de-DE
Robert Hogan schrieb:
> Do:
> Spoof user-agent (is this necessary even with javascript disabled?) (browser)
I think, it is nessecary. Do this job in browser, because no proxy can
do it for SSL-encrypted stuff. And change the fake time by time.
You may try showmyip with and without javascript. In
BlueStar88 schrieb:
> "...On the 24th of December we updated our Intermediate CA certificates
> and added a few needed extension to the original certificate. The public
> key however did not change and all subscriber certificates are perfectly
> valid. Please follow the instructions below to update
BlueStar88 schrieb:
>> or you may try the free SSL-service at
>>
>> http://cert.startcom.org/
>>
>> It is accepted by Mozilla browsers by default.
>
> "Wow", was my first thought, "a free certificate already integrated into
> current browsers", but where is the crux?
>
> What's about the StartCom
BlueStar88 schrieb:
>
> Ricky, you should try
>
> http://www.cacert.org/
>
or you may try the free SSL-service at
http://cert.startcom.org/
It is accepted by Mozilla browsers by default.
Your proxy may became a nice service for some users.
Greetings
Hi,
> Can you give me a list of URLs, where I can find a
> list of tor nodes?
https://torstat.xenobite.eu/
http://torstatus.blutmagie.de/
http://tns.hermetix.org/
May be, some more are online, but I use the 3 above.
Greeting
I tried to run a tor node on a Strato vserver 1 year ago.
It did not work, because the max. connections were limited to 145
TCP-connection IN and 145 TCP-connections OUT. A TOR server needs at
least 1024 connections. See:
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#head-f3a370dd3c42d82a
> Last not least: how great, do you think, is the danger of
supporting spammers
> when setting up my node for 465,993,995?
>
The SSL-encrypted SMTP-ports are using SMTP-Auth (mostly). The
support of spammer is very low (in my opinion).
By the way, I have the same problems like you since Nov.2006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello german guys,
Der Druck erhöht sich:
"wormhole" ist bereits offline und braucht evtl. Hilfe, "knuffel" ist
unter neuem Namen wieder online, jetzt "morphium".
Als mein Server vor 8 Wochen offline ging habe ich erfahren, dass der
Republikanische
27 matches
Mail list logo