exitnodes

2010-01-09 Thread Seth Ness
Hi, I'm using the lates stable release for Mac Os X I always restricted my exitnode to the UK, by setting strictexitnodes and having an exitnodes line followed by a list of UK exit nodes names and that works fine. Recently I tried exitnodes {gb} and Tor cannot connect. Shouldn&#

Re: exitnodes

2010-01-10 Thread Andrew Lewman
On 01/09/2010 10:27 PM, Seth Ness wrote: > I always restricted my exitnode to the UK, by setting strictexitnodes > and having an exitnodes line followed by a list of UK exit nodes > names and that works fine. It should, there are 24 exit nodes in the UK at last check. > Also, wher

Re: exitnodes

2010-01-10 Thread Seth Ness
Thanks. But is… exitnodes {gb} supposed to work also? Because it is not for me. On Jan 10, 2010, at 9:32 AM, Andrew Lewman wrote: > On 01/09/2010 10:27 PM, Seth Ness wrote: >> I always restricted my exitnode to the UK, by setting strictexitnodes >> and having an exitnodes lin

Analyzing TOR-exitnodes for anomalies

2006-10-04 Thread Alexander W. Janssen
Hi all, considering that I heard from several people that they notice strange sideeffects since a couple of days - altered webpage, advertisement where no ads should be - I started a little investigation if there are any obviously bogus exitnodes in the wild: http://itnomad.wordpress.com/2006/10

RE: Analyzing TOR-exitnodes for anomalies

2006-10-04 Thread Chris Willis
configure & let er run. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Alexander W. Janssen Sent: Wednesday, October 04, 2006 9:33 AM To: or-talk@freehaven.net Subject: Analyzing TOR-exitnodes for anomalies Hi all, considering that I heard from

Re: Analyzing TOR-exitnodes for anomalies

2006-10-04 Thread Claude LaFrenière
Hi *Alexander W. Janssen* : > Hi all, > > considering that I heard from several people that they notice strange > sideeffects since a couple of days - altered webpage, advertisement where no > ads should be - I started a little investigation if there are any obviously > bogu

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread glymr
e investigation if there are any obviously >> bogus exitnodes in the wild: >> >> http://itnomad.wordpress.com/2006/10/04/analyzing-tor-exitnodes-for-anomalies/ >> >> I welcome you to start your own investigation; if there are really bogus >> exitnodes we should be a

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Alexander W. Janssen
uot; must be based on facts > so I suggest to collect information about this issue here. My first run during the night was not very successful, most of the exitnodes refused to talk to me. I'm in timezone GMT+2 and that's pretty normal for that time of the day, I started anothe

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread BlueStar88
Currently i'm improving my torstat page to mark nodes with bad http-behavior, using automatic http-throughput comparison of every http-servicing exit-node against a reference exit-node. Then it's up to the users to add a ExcludeNodes statement in torrc using this information. Greets Alexand

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Claude LaFrenière
ons about "bogus exit nodes" must be based on facts >> so I suggest to collect information about this issue here. > > My first run during the night was not very successful, most of the exitnodes > refused to talk to me. I'm in timezone GMT+2 and that's pretty norm

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Claude LaFrenière
Hi *glymr* : > I am not adding anything useful, but I wish to add my feeling about this > situation that people are so rapidly responding to a threat so early. > > :) tor will never die if people like you all are on it. (which reminds > me i've blathered about writing a dns proxy patch for to

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Deephay
- I started a little investigation if there are any obviously > bogus exitnodes in the wild: > > http://itnomad.wordpress.com/2006/10/04/analyzing-tor-exitnodes-for-anomalies/ > > I welcome you to start your own investigation; if there are really bogus > exitnodes we should be aware o

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Alexander W. Janssen
On Thu, Oct 05, 2006 at 09:31:47PM +0800, Deephay wrote: > Also, the logo "linux-magazine.com what you need, when you > need it" is a image or just text? Exactly the same page is at http://www.wdr.tv/. The content of that page is (gathered with tcpdump): http://searchportal.information.com/?a_id

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Claude LaFrenière
Hi *Alexander W. Janssen* : Got it ! I was going to this web site: http://www.iamaphex.net (This is the web site for Torcap, a program to socksify application in Windows O.S.) with the exit node exit node: whistlermother Info: http://node2.xenobite.eu/torstat.php 1195whistlersmother

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Alexander W. Janssen
Hi Claude! On Thu, Oct 05, 2006 at 11:29:22AM -0400, Claude LaFrenière wrote: > Got it ! Aha? I'm still scanning with no result so far, although i found a couple of exitnodes which have misconfigured local proxies... [...snip...] OK, well, i checked that whistlersmother as well and

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Stephen
Greetings! Been experiencing this particular issue since Sunday & following the topic here. >From 05-Oct: exiting from hotmail account redirected link: http://g.msn.com/frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com%3fa_id%3d1637%26domainname%3dmsn.com%26adultfilter%3doff%26popunder%3doff

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Claude LaFrenière
Hi *Stephen* : > Greetings! > > Been experiencing this particular issue since Sunday & following the topic > here. > > From 05-Oct: > > exiting from hotmail account > > redirected link: > http://g.msn.com/frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com%3fa_id%3d1637%26domainname%3dmsn

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread M
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi How can I see which exit node is using? http://www.debian-administration.org/ was mutilated by exit node into something similar that you are reporting. Quite alarming trend. I think that badly behaving exit nodes should be excluded automagically.

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Robert Hogan
> > Hmmm... I had this problem with Whistlemother exit node and this site: > http://www.iamaphex.net with the same > "frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com "blah blah blah" > filter ... =SUSPECTED+UNDESIRABLE+BOT" > i have the same experience using whistlersmother for the same site.

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Robert Hogan
On Friday 06 October 2006 19:21, Robert Hogan wrote: > > Hmmm... I had this problem with Whistlemother exit node and this site: > > http://www.iamaphex.net with the same > > "frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com "blah blah blah" > > filter ... =SUSPECTED+UNDESIRABLE+BOT" > > i have t

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Claude LaFrenière
Hi *Robert Hogan* : > On Friday 06 October 2006 19:21, Robert Hogan wrote: >>> Hmmm... I had this problem with Whistlemother exit node and this site: >>> http://www.iamaphex.net with the same >>> "frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com "blah blah blah" >>> filter ... =SUSPECTED+UND

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Claude LaFrenière
Hi *M* : > How can I see which exit node is using? Check this with Vidalia ... > > http://www.debian-administration.org/ was mutilated by exit node into > something similar that you are reporting. Quite alarming trend. Please let us remain calm like Norwegian sailors in the storm. > >

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread bagelcat
or advertising. The exitnodes wich connect to domainsponsor.com are always locate in US (all US nodes I have seen are located in texas or US without a more exact description). One Time the exit node was located in DK. Ive got "url not found" messages with every DE and UK nodes I have t

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread bagelcat
ok i have played now for more than an half hour with nonsense domainnames. every time the connection goes through an exit node located in texas, one time in the state new york and one time in denver i have got the advertising page. maybe it will be a nice test, that someone unsing the same

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread missi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Maybe a problem with a DNS- Server? Greetz Missi Eben(am 6. 10. 2006 um 22:26 Uhr)hast du eingetippt: > ok i have played now for more than an half hour with nonsense > domainnames. every time the connection goes through an exit node > located in texa

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread M
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 >> How can I see which exit node is using? > > Check this with Vidalia ... Thanks for the info. >> I think that badly behaving exit nodes should be excluded automagically. >> How, I dont know =). > > For the moment nothings prove that any exit no

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Tim McCormack
bagelcat wrote: > ok i have played now for more than an half hour with nonsense > domainnames. every time the connection goes through an exit node located > in texas, one time in the state new york and one time in denver i have > got the advertising page. I remember something about a major DNS ser

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread George Shaffer
On Thu, 2006-10-05 at 11:41, Alexander W. Janssen wrote: > OK, well, i checked that whistlersmother as well and got this picture: > http://cjoint.com/data/kfr4jmDAsY.htm I've read or skimmed the entire thread which seems to have ended midday Thu, 10-5. Friday morning I clicked on a Cnet newslette

Re: Analyzing TOR-exitnodes for anomalies

2006-10-07 Thread clifnor
Yesterday, I linked to Slashdot and got a bogus page in German. Restarting my Tor client (i.e., getting a new set of circuits) got me to the real Slashdot page. ??? Clifnor -- http://www.fastmail.fm - Choose from over 50 domains or use your own

Re: Analyzing TOR-exitnodes for anomalies

2006-10-07 Thread Jan Stolzenburg
Hello, I don't have Vidalia, so I wasn't able to find out which exit-node I used, but I found something really interesting. "wiki.noreply.org" and "wiki.ubuntuusers.de" got replaced by "http://wiki.noreply.org/frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com%3fa_id%3d1637%26domainname%3dnoreply.

Re: Analyzing TOR-exitnodes for anomalies

2006-10-07 Thread Tim McCormack
Jan Stolzenburg wrote: > Hello, > I don't have Vidalia, so I wasn't able to find out which exit-node I > used, but I found something really interesting. "wiki.noreply.org" > and "wiki.ubuntuusers.de" got replaced by > "http://wiki.noreply.org/frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com%3fa_

Re: Analyzing TOR-exitnodes for anomalies

2006-10-07 Thread bagelcat
yes. I have made more test an seen via vidalia, that the advertising pages came up when the exit node uses the dns-server NS1 or NS2.oversee.net (mostly 204.13.161.20 seen). I´ve made a break now for myself in privoxy, reconfigure it to use socks4 forwarding instaed of 4a. So I have to live

Re: Analyzing TOR-exitnodes for anomalies

2006-10-08 Thread Taka Khumbartha
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Claude LaFrenière @ 2006/10/06 12:24: > For the moment nothings prove that any exit nodes are responsibles for this. > We have to do somethings based on facts not fears... > How about this then? when navigating to www.ezboard.com the proper page

Re: Analyzing TOR-exitnodes for anomalies

2006-10-08 Thread Claude LaFrenière
Hi *Taka Khumbartha* : > Claude LaFrenière @ 2006/10/06 12:24: >> For the moment nothings prove that any exit nodes are responsibles for this. >> We have to do somethings based on facts not fears... >> > > How about this then? when navigating to www.ezboard.com the proper page > is loa

RE: Choose exitnodes in country x

2007-07-04 Thread Wesley Kenzie
p.com, etc. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Robert Hogan Sent: July 3, 2007 12:58 PM To: [EMAIL PROTECTED] Subject: Re: Choose exitnodes in country x On Tuesday 03 July 2007 15:35:21 you wrote: > Hello, > > it would be ni

RE: Choose exitnodes in country x

2007-07-04 Thread Cat Okita
ter, showmyip.com, etc. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Robert Hogan Sent: July 3, 2007 12:58 PM To: [EMAIL PROTECTED] Subject: Re: Choose exitnodes in country x On Tuesday 03 July 2007 15:35:21 you wrote: Hello, it would be nice to have

RE: Choose exitnodes in country x

2007-07-04 Thread Wesley Kenzie
s and cat calls :) . . . Wesley -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Cat Okita Sent: July 4, 2007 4:22 PM To: [EMAIL PROTECTED] Cc: or-talk@freehaven.net Subject: RE: Choose exitnodes in country x Hi Wesley - I'm going to presume that your ema

Re: Choose exitnodes in country x

2007-07-05 Thread Robert Hogan
On Thursday 05 July 2007 10:32:15 yousifnet wrote: > > How are you proposing to detect country? > > > > no automatic, add an additional entry to the tor directory. > > For a human there is no problem to get the country out of traceroute. > > For new tornodes it can be asked direct within the regist

When will be "ExitNodes {...}" feature be released ?

2009-03-15 Thread Ben Stover
As far as I know the ExitNodes {..} feature for determining the countrys exit nationality is currently in alpha stage. When will it be stable and released (approx)? Is it a matter of days/weeks/month/years? Thank you Ben

ExitNodes for encrypted connects only are not possible. Why?

2009-05-09 Thread Gitano
In 'git.torproject.org/checkout/tor/master/doc/spec/dir-spec.txt' ExitNodes are defined as: "Exit" -- A router is called an 'Exit' iff it allows exits to at least two of the ports 80, 443, and 6667 and allows exits to at least one /8 address space. I w

Re: ExitNodes for encrypted connects only are not possible. Why?

2009-05-09 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/09/2009 11:19 AM, Gitano wrote: > In 'git.torproject.org/checkout/tor/master/doc/spec/dir-spec.txt' > ExitNodes are defined as: > >"Exit" -- A router is called an 'Exit' iff it allows exits to at

Re: ExitNodes for encrypted connects only are not possible. Why?

2009-05-09 Thread Gitano
Karsten Loesing wrote: > Feel free to configure your node to exit to those 5 ports only. That > makes your node an exit node for connections to those ports. > > Your node won't get the Exit flag, though, but that's not required for > being an exit node. The Exit flag is used by clients for path s

Re: ExitNodes for encrypted connects only are not possible. Why?

2009-05-09 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/09/2009 01:38 PM, Gitano wrote: >> It's unlikely that the criteria you pasted above will be changed. There >> need to be some criteria, and if almost every node matches them, the >> flag would be useless. > > Ok, but adding one more 'secure' por