to get some idea of what i am up against*
jon smith wrote:
--- glymr [EMAIL PROTECTED] wrote:
i'm pretty sure someone has written some dns proxy
that queries through
tor, i have a vague memory that it was only
implemented in windows
however. i'm going to look into this because i think
it'd
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
I am not adding anything useful, but I wish to add my feeling about this
situation that people are so rapidly responding to a threat so early.
:) tor will never die if people like you all are on it. (which reminds
me i've blathered about writing
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
i'm pretty sure someone has written some dns proxy that queries through
tor, i have a vague memory that it was only implemented in windows
however. i'm going to look into this because i think it'd be rather cool
to actually resolve all dns
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
are you running vidalia? vidalia manages starting up tor. obviously you
have got privoxy auto-starting, so that's not at issue. you could always
go without vidalia but then you miss out on all the neat interface
features in vidalia like watching
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
I'm rather puzzled why tor proxies every other protocol but refuses ftp
and says it isn't a http proxy. ftp != http. why is this error coming up?
i grepped the source for ftp and 21 and came up with nothing telling me
why it was refusing to talk
server (LC_TIME=C)
PASV
227 Entering Passive Mode (203,16,234,85,184,221).
Cannot create a data connection: No route to host
Disconnecting from site localhost
- --8--snip--8--
Jay Goodman Tamboli wrote:
On Oct 4, 2006, at 06:54:56, glymr wrote:
I'm rather puzzled why tor proxies every other
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Spin Doctor wrote:
I've been trying to connect to various web sites through Tor on
Firefox 1.5.0.6 on Mac OS X, but it no longer works for any site. I
get the error page saying that Tor is enabled on port 8118 but it
Tor does not operate on
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
jon smith wrote:
Hi,
I'd installed the vidalia-bundle-0.1.1.23-0.0.7-tiger
and set up Firefox 1.5.0.6 (Mac) exactly as shown
here:
http://tor.eff.org/docs/tor-doc-web.html.en
i.e. the first four set to localhost Port: 8118,
and
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
i get this at some exits when i go to thinkgeek.com, so it's happened to
me too.
is there a way to find out what the current exit node is so it can be
blacklisted when it redirects like this?
nile wrote:
On Tue, Oct 03, 2006 at 03:31:18PM
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Perhaps changing the number of seconds for MaxCircuitDirtiness may help
reduce the unpleasant effect of slow circuits by shortening circuit
lifespan? have you installed fasterfox? I personally find tor is more
than adequately fast with the
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
iptraf doesn't do anything other than inspect the stack. whether that is
insecure or not i guess would be something to do with whether you log,
but even then your isp could have a box doing that anyway. watching
traffic in only useful to a snoop
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
vidalia uses geoip too. i'm not sure, it was during a time my server was
up and down, maybe the directory that site uses had my server registered
as offline and thus didn't show it
Christoph Sieghart wrote:
[glymr wrote]
the vidalia client has
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
running your own bind does not eliminate dns leaks, out of your node
will still emerge dns requests and that's all that's needed to do the
time-correlation.
It should be possible, however, to proxy bind through tor, but only
through a
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
the vidalia client has a map on it too. strangely i couldn't find my tor
node on that map on that page but it is definitely up and vidalia can
see it too.
Christoph Sieghart wrote:
Hello,
I just skimmed through the or-talk archives and found
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Roger, what do you think of the idea of having /dev/urandom as an
alternative rng for embedded devices as a build option?
News Assi wrote:
Hi,
perhaps openwrt hasn't got urandom? urandom is pretty intensive as
far as i know, it'd
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
perhaps openwrt hasn't got urandom? urandom is pretty intensive as far
as i know, it'd definitely load the little router hard. i'd say the devs
will be able to tell you if there's anything that can be done. my
initial thought is edit the source
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
if you can point me at the right gentoo software packages to compile it
i could do that
News Assi wrote:
Hello,
I want to use openwrt [http://openwrt.org/], that is an open source
firmware for linksys router. It use a special package system
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Unfortunately I haven't been able to find any information about how to
do this, but the last two modem/routers I have used for my dsl
connection have both had linux software running them... I was just
reading today about the netcomm nb5, which is
user owned files, but I'm
buggered if I can figure out how to do it.
Any help would be appreciated.
Glymr
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFFHzgGkOzwaes7JsRA2KYAKC1d2AMQJeOwNXONzxqjCmUQqYjdgCfQP9k
lV8lY2eVA2eSN1y4eub9TsU=
=W415
-END PGP SIGNATURE-
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
ok, i see what i need to do here now, sorry to ask an faq question
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFFH4pGkOzwaes7JsRAxomAJsH8CHJz6ICR9fge82Iz/AXVuSdHwCeJXZo
JyWQPP0CH7wZYxAFct6G4qY=
=pW07
-END PGP
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
I know that many intranet firewalls have bandwidth limiters on port 53,
especially the more severe types of firewalls, but for accessing
directory mirrors this isn't a big deal, I mean sure, it slows down the
process initially but once a cache is
why not just use your own client with the socks proxy turned on and
access gmail via the pop and smtp they provide (both of which are
encrypted, one ssl, the other tls)?
Anthony DiPierro wrote:
On 9/18/06, Fabian Keil [EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] top posted (please don't):
Are
DiPierro wrote:
On 9/21/06, glymr [EMAIL PROTECTED] wrote:
why not just use your own client with the socks proxy turned on and
access gmail via the pop and smtp they provide (both of which are
encrypted, one ssl, the other tls)?
I haven't really found any (gratis) clients I like that well
I don't know if this is a correction but the tor hidden service system
is client AND server anonymising, tor itself is client anonymising, and
the hidden services are server anonymising.
It boggles my mind that anyone committed to anonymity would not see the
sense of not using a proprietary
i personally don't like the ajax interface, fancy as it might be,
javascript is full of holes and to be honest it's slower than a direct
pop access.
in case anyone reading this mailing list didn't know, you can access
gmail via pop and they also have an smtp server (altho it rewrites the
sender
yes, port 25 is blocked by most tor exit nodes. however, some webmail
services (notably gmail) use different ports and are usable from tor.
Watson Ladd wrote:
Total Privacy wrote:
Thank you very much, that will do the trick I think, but still; have to
get an email accout somewhere to put into
you can replace i2p for services with tor hidden services quite easily,
and as far as content retrieval, which part of the process is your focus
when ascribing insecurity? storage or transit? TOR sorts out transit,
and the server operator using a decently strongly encrypted storage
would keep the
unless i'm mistaken, for the average adsl/cable user, this means some
meaningless number like 10.0.0.2 or 192.168.0.4
Andrew Del Vecchio wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Very true. Add to this the use of secure apps. This means no Skype,
which codes your local IP into
I see that on the main site and from reading various thingies that there
is some confusion about why some server operators were searched but
didn't have their machines subpoenaed. I think that kinda explicitly
says that the law enforcement in germany realise that tor nodes are
useless as evidence.
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
most current adsl2/2+ modems now have full configurable firewalls and
QoS and IDS and ICMP ping on or off. sygate is better for a free
firewall than zonealarm
Kees Vonk wrote:
Arrakistor wrote:
'real firewall' as in something physical
Just what exactly is insecure about being 100% vigilant about never
accessing any random (eg hotmail, gmail, yahoo mail) mail server with tor?
Well the main problem is in password recovery. Unfortunately most ...
well any website ... has not got best practise cryptographic techniques
for ensuring
I may be mistaken, but just as is the practise with the linux kernel, it
is not permissible to mix licenses when only interfaces are used, mixing
licenses within a gpl licensed software unit is tainting the license but
using an exported interface is not. The only thing that would be
required would
This incident in germany just highlights something which I think that I
would like to raise to the forefront of the tor community's mind, and in
fact perhaps this would be well advanced in the entire open source
community as a whole.
This is a war. We are fighting at the highest level, and this
hehe
i was so emphatic! anyway, it still is valid what i said
but if i'd realised that CCC meant the chaos computer club i'd have said
'oh wait, i saw that one in my vidalia network viewer app just this morning'
BlueStar88 wrote:
I would say: up and running
router chaoscomputerclub
. I think perhaps that better would be to get people to sign
on for being part of the class action defense group as a part of running
a server. I'm sure this would bring a lot of the broader civil liberties
people into the fold.
Anothony Georgeo wrote:
*/glymr [EMAIL PROTECTED]/* wrote
traffic (and incoming in
the case of hidden services).
EXIT servers (according to their tested EXIT bandwidth) get First
Class, ENTRY Middleman servers get Second Class and Non-server Clients
ONLY get Third class.
Its an incentive!
Would that help you glymr?
what would help me is if i could run
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Anthony DiPierro wrote:
On 5/15/06, Mike Perry [EMAIL PROTECTED] wrote:
Thus spake Ringo Kamens ([EMAIL PROTECTED]):
Also, they can put you on grand jury and give you obstruction of
justice for
refusing to talk.
According to wikipedia
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Tony wrote:
just wanted to suggest that biometrics are not wise for encryption
whatsoever. for one thing, they use a software mechanism to 'unlock'
and this lock can be bypassed. voiceprint, retina/iris scan,
fingerprints, dna, all of these
glymr
Ringo Kamens wrote:
Also, they can put you on grand jury and give you obstruction of justice
for refusing to talk.
On 5/14/06, *Eric H. Jung* [EMAIL PROTECTED]
mailto:[EMAIL PROTECTED] wrote:
Mike,
I don't have the time to respond to all the points of your email except
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
yeah, i think if i were you, i'd sell all of the hardware they had
their hands on for that time asap and get new hardware. there's way
too many routes that could be used to compromise the server once it's
been in the hands of untrusted people. A
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Mike Perry wrote:
Thus spake Eric H. Jung ([EMAIL PROTECTED]):
Hello Michaels,
I apologize for the delayed reply. Please don't interpret the
delay as a lack of interest--it surely isn't.
Quoting Mike Perry:
Just clearing cookies every
41 matches
Mail list logo