Re: beneficia versus maleficia

2010-10-03 Thread Wesley Kenzie
y can learn more about how these important issues of privacy, anonymity, security etc are evolving before us. It takes courage and conviction, to both believe and to act according to your beliefs. Making intelligent choices fits in there somewhere too. But in the end we all define our own lives in our own ways. -- Wesley Kenzie gpg 0x4C945266

Re: Tor server "nami" taken by the German Police

2009-09-29 Thread Wesley Kenzie
On Tue, Sep 29, 2009 at 1:06 PM, grarpamp wrote: > > > They took the machine running Tor exit node called "nami". > > > Well, sorry to hear that. > > Good luck with the police. :-( > > Actually, I think people will be just fine if their systems are > free/encrypted of 'interesting' content, and t

Re: Why you need balls of steel to operate a Tor exit node

2009-09-09 Thread Wesley Kenzie
> > --- On Wed, 9/9/09, Eugen Leitl wrote: > > Perhaps this should be reason enough TO run a tor node? Not for > Burma/Iran... but for those of us in the "first world" who are threatened by > police states ourselves? It sometimes takes an unfortunate rude awakening > to realize this, but unfortu

Re: Scott made me do it.

2009-08-18 Thread Wesley Kenzie
On Tue, Aug 18, 2009 at 8:26 PM, Andrew Lewman wrote: > [snip] > > The summary of results: > > 1) Native polipo is 54.5% faster on average than native privoxy. This > could be due to polipo's caching, http 1.1 pipelining, and it can serve > bits as fast as they come in from the network. Privoxy

Re: google cookie

2009-06-04 Thread Wesley Kenzie
In a similar vein, I used to wonder how google would send out probes to all the web sites that I visited - usually within a few minutes of my going to these web sites. I eventually realized it was the google toolbar watching my hopping habits and telling the master google bots to chase along after

Re: Increasing Polipo Portability for GSoC 2009

2009-05-06 Thread Wesley Kenzie
, 0 cmpAll --29798-- errormgr: 11 supplist searches, 363 comparisons during search --29798-- errormgr: 11 errlist searches, 55 comparisons during search . . . . . Wesley On Wed, May 6, 2009 at 2:50 PM, Christopher Davis wrote: > On Tue, May 05, 2009 at 08:37:28AM -0700, Wesley Kenzie wrote

Re: Increasing Polipo Portability for GSoC 2009

2009-05-05 Thread Wesley Kenzie
Hi, Christopher. If you could also solve the known instability issues with polipo that Juliusz has not had time to resolve in the past year, then many would be grateful. I cannot get polipo to run for more than about an hour without it crashing. . . . . . Wesley On Tue, May 5, 2009 at 12:10 AM,

DNSPort and DNSListenAddress and SocksPolicy

2009-02-05 Thread Wesley Kenzie
I see that the Tor client settings for DNSPort and DNSListenAddress (as are SocksPort and SocksListenAddress) are subject to the SocksPolicy setting, but this is only an entrance policy. What is the default exit policy then? Is it the same as the ExitPolicy setting? And do the ExitNodes, StrictEx

Re: php hex code for cookie authentication to controller?

2008-10-21 Thread Wesley Kenzie
don't know PHP so well, but maybe you should specify 'rb' >>instead of 'r'. I do not see that 'rb' is an option in php for the fopen() function ... . . . . . Wesley On Tue, Oct 21, 2008 at 2:57 PM, Nick Mathewson <[EMAIL PROTECTED]> wrote: > On Tue

php hex code for cookie authentication to controller?

2008-10-21 Thread Wesley Kenzie
per 5.1 Authentication in control-spec.txt: "To authenticate, the controller must send the contents of this file, encoded in hexadecimal." Fine, but when using the following in PHP: $ch = fopen('cookiefilename', 'r'); $auth_value = fread($ch, 128); $send_auth_value = "AUTHENTICATE \"". bin2hex($a

RE: Re: Aw: Re: Aw: Re: Problem w/ Using tor(k) for Geostreaming Live-Videos

2008-06-12 Thread Wesley Kenzie
> > Can sombody beat this system :) :) -> > http://wgeostreaming.zdf.de/encoder/livestream15_h.asx > > I just set my proxy to de.pickaproxy.com:8133 and it worked (slowly) from my Windows Vista machine. I reside in Canada. Wesley

RE: How do we defeat exit node sniffing?

2008-06-05 Thread Wesley Kenzie
I think you could make a case for trusting 1 or a handful of exit nodes, and use ExitNodes abc and StrictExitNodes 1 to make sure you only use those for sensitive authentication connections like you are asking about. For example, do you think blutmagie is sniffing? When it is trusted as a V2 and

OpenSolaris?

2008-06-04 Thread Wesley Kenzie
Is anyone running Tor on OpenSolaris? I'm investigating using Amazon EC2 and OpenSolaris on my server to address scalability. http://www.sun.com/third-party/global/amazon/index.jsp Wesley

RE: relay tidbits...

2008-06-02 Thread Wesley Kenzie
> If I believe that the majority of POP3 traffic over tor is > performed by > unauthorised parties, and as an exit node admin I'm someway > helping this > access, then is there not a moral argument for exit node admins to > detect the abuse of tor and alert the people affected? to go > fur

RE: bridge relays and bridge directories

2008-05-29 Thread Wesley Kenzie
> > If I set "BridgeRelay" for my Tor server to 1, then must I have an > > "ExitPolicy" to accept at least 1 port or 1 IP address/range? If > > ExitPolicy is reject *:* does this mean the bridge relay will not > > work? > > No, you're confusing ExitPolicy with ExtendPolicy. (And > ExtendPolic

bridge relays and bridge directories

2008-05-29 Thread Wesley Kenzie
I am having problems fully understanding bridges and would appreciate some guidance or pointers to where I can learn more. If I set "UseBridges" for my Tor client to 1, can I specify any relay(s) in the "Bridge" configuration setting, or must I only specify a relay that is expecting to be used as

RE: controller GETINFO ns/id/fingerprint "s" record

2008-05-29 Thread Wesley Kenzie
> On Tue, May 27, 2008 at 02:19:22PM -0700, Wesley Kenzie wrote: > > >"where does the data originate from when the controller GETINFO > > >command is used? Does it just grab data out of the > cached* files on > > >disk? Or poll one of the direct

Tor network status

2008-05-29 Thread Wesley Kenzie
pickaproxy.com has today started flagging the Tor network as either Ok, Use With Caution or Not Considered Safe. "Ok" is initially defined to mean that there are at least 525 running, not hibernating, valid, not bad exit nodes; 500 running, not hibernating, valid relays; 300 running, valid, not hi

RE: controller GETINFO ns/id/fingerprint "s" record

2008-05-27 Thread Wesley Kenzie
> > On Tue, May 27, 2008 at 02:19:22PM -0700, Wesley Kenzie wrote: > > >"where does the data originate from when the controller GETINFO > > >command is used? Does it just grab data out of the > cached* files on > > >disk? Or poll one of the dir

FW: controller GETINFO ns/id/fingerprint "s" record

2008-05-27 Thread Wesley Kenzie
> On Wed, May 21, 2008 at 09:21:20PM -0400, BarkerJr wrote: > > > What is the criteria for getting listed as an "Exit" node in the "s" > > > record for the controller interface's GETINFO /ns/id/fingerprint? > > > > You need to have two of these three ports wide open: 80, 443, 6667. > > No, I don't

RE: moria1 and moria2 still on 0.2.0.25?

2008-05-23 Thread Wesley Kenzie
> On Sat, May 17, 2008 at 09:57:41AM -0700, Wesley Kenzie wrote: > > > Answer two: moria2 isn't a v3 directory authority (though it > > > is a v1, v2, and hidserv directory authority). > > > > GETINFO ns/name/moria2 shows the following: > > r moria2 c

RE: controller GETINFO ns/id/fingerprint "s" record

2008-05-22 Thread Wesley Kenzie
> > On Wed, May 21, 2008 at 09:21:20PM -0400, BarkerJr wrote: > > > What is the criteria for getting listed as an "Exit" node > in the "s" > > > record for the controller interface's GETINFO /ns/id/fingerprint? > > > > You need to have two of these three ports wide open: 80, 443, 6667. > > No,

controller GETINFO ns/id/fingerprint "s" record

2008-05-21 Thread Wesley Kenzie
What is the criteria for getting listed as an "Exit" node in the "s" record for the controller interface's GETINFO /ns/id/fingerprint? I recently added accept *:443 to my ExitPolicy setting in torrc but it is not listed as an Exit node, and am wondering why not. The new ExitPolicy setting does sh

RE: most nodes now "not running" ?

2008-05-19 Thread Wesley Kenzie
etween 7am EST and 3pm EST today? Wesley > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Wesley Kenzie > Sent: May 19, 2008 1:05 PM > To: or-talk@freehaven.net > Subject: RE: most nodes now "not running" ? > >

RE: most nodes now "not running" ?

2008-05-19 Thread Wesley Kenzie
ECTED] On Behalf Of Roger Dingledine > Sent: May 19, 2008 12:24 PM > To: or-talk@freehaven.net > Subject: Re: most nodes now "not running" ? > > > On Mon, May 19, 2008 at 12:19:46PM -0700, Wesley Kenzie wrote: > > Anyone know why of the nearly 2,000 current

most nodes now "not running" ?

2008-05-19 Thread Wesley Kenzie
Anyone know why of the nearly 2,000 current nodes, only 407 are flagged as "running" and the others are not? This does not seem normal to me. Wesley <>

RE: Tor security advisory: Debian flaw causes weak identity keys [off topic]

2008-05-14 Thread Wesley Kenzie
I would rather not get involved in this spat, but I believe that we are all better off if bullying behaviour is outed. And yes it is bullying to assume you know another person's motivations and behave in a demeaning, derogatory way towards them. Whoever is administering this list, can you please

exit nodes earn money?

2008-05-06 Thread Wesley Kenzie
With regards to the pickaproxy.com service we are setting up, I am interested in feedback from current Tor users and developers on the possibility of sharing earned subscription revenues with both the Tor project and exit node operators. There are costs associated with operating our service and se

RE: Spoofing location - possible?

2008-05-06 Thread Wesley Kenzie
Alec, we have setup pickaproxy.com specifically for this purpose - to geospoof your location and to eliminate the need to install and maintain Tor and Vidalia. Check it out. Essentially we run (at present) a bunch of Tor clients on our server that have strict exit nodes for a specific country, so

RE: Exclude nodes from certain countries

2007-09-15 Thread Wesley Kenzie
>On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote: > > www.pickaproxy.com > > So your server can see all the traffic in cleartext before it enters Tor network AND where the traffic is coming from. In > other words users do not have any protection from your server. > &

RE: Exclude nodes from certain countries

2007-09-15 Thread Wesley Kenzie
Fyi, what you are asking for is exactly what we are working towards with http://pickaproxy.com - allowing you to pick or exclude exit nodes by Country - where Tor is setup on our server as a client to your workstation. We are calling this "geospoofing". . . . Wesley -Original Message- Fr

RE: tor 0.1.2.17 server died after only a few hours

2007-09-05 Thread Wesley Kenzie
@freehaven.net Subject: Re: tor 0.1.2.17 server died after only a few hours On Tue, Sep 04, 2007 at 08:27:08PM -0700, Wesley Kenzie wrote: > I am not, but I fail the "make test" on 0.1.2.17 as follows: > > v3_networkstatus > ... &g

re: tor 0.1.2.17 server died after only a few hours

2007-09-04 Thread Wesley Kenzie
I am not, but I fail the "make test" on 0.1.2.17 as follows: v3_networkstatus ... File test.c: line 2548 (test_v3_networkstatus): Assertion failed: (v1->published==vote->published) 1188938513!=1188938536 Because of this I have not yet done a "make inst

RE: Choose exitnodes in country x

2007-07-04 Thread Wesley Kenzie
to run all of the user traffic through your server, and then through the Tor network? A comment on the implications of using a caching web proxy for Tor users on your server would be interesting as well. cheers! On Wed, 4 Jul 2007, Wesley Kenzie wrote: > pickaproxy.com and geospoofing.com wi

RE: Choose exitnodes in country x

2007-07-04 Thread Wesley Kenzie
server (your proxy). And we're looking at using polipo (on the server) to speed things up. We have multiple sources of geolocation data so they will be more accurate than the open source GeoIP library - we pay for them where the license requires us to. . . . Wesley Kenzie WebMaster, showmyi

FW: Tor server monitoring and notification service?

2007-05-06 Thread Wesley Kenzie
up and running any server operators wanting to participate could go to something like http://www.pickaproxy.com/tor/servermonitoring/optin/ and let me know. Will that work, do you think? . . . Wesley Kenzie -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of

RE: suggestion for 'is my installation of tor working?' page

2007-02-04 Thread Wesley Kenzie
is - maybe something like http://www.showmyip.com/torstatus/ > > with just the relevant data for new Tor users. > > > > . . . > > Wesley Kenzie > > WebMaster > > http://www.showmyip.com/ > > http://www.privacy-ecosystem.com/ > > Sounds great, looking fo

re: suggestion for 'is my installation of tor working?' page

2006-12-20 Thread Wesley Kenzie
Good idea. We will work on getting a page available on showmyip.com to do this - maybe something like http://www.showmyip.com/torstatus/ with just the relevant data for new Tor users. . . . Wesley Kenzie WebMaster http://www.showmyip.com/ http://www.privacy-ecosystem.com/ -Original

RE: Tor and NNTP

2006-11-03 Thread Wesley Kenzie
here 123.456.789.001 is the IP address of your visitor. We will have a simple text and SOAP interface available soon. You can add other &get= parameter values besides "tor" such as country, host, isp, org, state, reverse_host, etc. . . . . . Wesley Kenzie WebMaster https://www.ippages