Re: [tor-talk] problem

2015-07-28 Thread l.m
Oh that. Figures. That's always the last thing to notice when Windows doesn't even warn you if it blocks a file. --leeroy -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] tor not running

2015-07-28 Thread l.m
Hi, Maybe also check DEP settings. 1. Click Start, click Control Panel, and then double-click System. (or right-click My Computer and choose Properties) 2. Click the Advanced tab. Then, under Performance, click Settings. 3. Click the Data Execution Prevention tab. 4a. Click, Turn on DEP for

[tor-talk] Amending copyright in license of derivation.

2015-07-25 Thread l.m
Hi, Say I modify some software under Tor Project license. Can I amend/update the copyright to include extra contributors without removing existing content? Is this allowed or would this mean an EFF lawyer is going to be unhappy? thanks --leeroy -- tor-talk mailing list -

Re: [tor-talk] OFTC and Tor

2015-07-15 Thread l.m
Hi, At least for OFTC you should be able to connect using tor if you authenticate. Authenticate during connect [0] and use SSL. Seems to work well. Hope that helps, --leeroy [0] http://www.oftc.net/NickServ/CertFP/ -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or

Re: [tor-talk] Doctor's possible sybil attack report from 2015-07-02 - 'cloudvps' (XL Internet Services)

2015-07-02 Thread l.m
Hi nusenu, I'm glad you asked. Why don't they have the exit flag? It probably has something to do with MinMeasuredBWsForAuthToIgnoreAdvertised being 500 by default. If you look at consensus-health [0] you see much more than 500. This means, and I'm only quoting the spec [1], that these relay need

Re: [tor-talk] Matryoshka: Are TOR holes intentional?

2015-06-18 Thread l.m
To add to what Roger said, Roger Dingledine wrote: But even full scale padding, ignoring the practical side of how to get a Tor network that can afford to waste so much bandwidth, doesn't provide protection in the face of active attacks where you induce a gap on one side and then observe

[tor-talk] ng-rend-spec and very public services

2015-06-02 Thread l.m
Hi, So I was thinking, perhaps incorrectly, that ng-rend-spec doesn't do enough to protect very public onion services. Sure, there are advantages to the proposed changes. What if the adversary is also someone who can derive the credentials? Encrypted descriptors don't do much if you can throw

Re: [tor-talk] TBB does not employ fontconfig settings

2015-05-28 Thread l.m
[0] https://www.torproject.org/projects/torbrowser/design/ -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] TBB does not employ fontconfig settings

2015-05-28 Thread l.m
Hello, To answer your question you might find the Tor Browser design document [0] a useful read. Font support leads to browser/system fingerprinting. Plugins and scripts can extract font support lists, html5 canvas elements can be used together with font support/rendering, and the way fonts are

Re: [tor-talk] [RELEASE] Torsocks 2.1.0

2015-05-28 Thread l.m
Hello, As described on the contact page of torproject.org: If you found a security issue in one of our projects or our infrastructure, please email the respective maintainer. You can find their GPG fingerprint/key on our developer ldap search page. Due to the many different projects we have, we

Re: [tor-talk] SOCKS proxy to sit between user and Tor?

2015-05-26 Thread l.m
I'd like to point out that if you decide to use another SOCKS proxy you may encounter another problem. Suppose I bypass the port assigned to your custom proxy and instead point to the usual tor proxy. This might occur if a user manually configures the proxy and cannot tell the difference between

Re: [tor-talk] SOCKS proxy to sit between user and Tor?

2015-05-26 Thread l.m
everything in the plugin. On 5/26/2015 at 6:40 PM, l.m wrote:I'd like to point out that if you decide to use another SOCKS proxy you may encounter another problem. Suppose I bypass the port assigned to your custom proxy and instead point to the usual tor proxy. This might occur if a user manually

Re: [tor-talk] SOCKS proxy to sit between user and Tor?

2015-05-24 Thread l.m
:o Oh, nevermind I see you're already associated with that team. Cool extension. So why the shift from plugin to proxy? --leeroy -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to

Re: [tor-talk] SOCKS proxy to sit between user and Tor?

2015-05-24 Thread l.m
Hi, Is the Socks-to-Socks proxy absolutely necessary? This could be done as a browser plugin couldn't it? You might find the work of the FreeSpeechMe team interesting. They have the objective of integration with tor which sounds a lot like what you describe. It's probably not vetted to your

Re: [tor-talk] SOCKS proxy to sit between user and Tor?

2015-05-24 Thread l.m
Hi Jeremy, Thank you for the thoughtful and thorough reply! I think the users of your software will appreciate you wanting to minimize attack surface. One thing I've noticed about mitmproxy is that it appears to only support SOCKS upstream proxies *without* authentication. It's also a http

Re: [tor-talk] New Astoria Tor client is said to be better than plain Tor

2015-05-22 Thread l.m
If tor had a more modular path selection system like pluggable transports then work like this would be easier. Instead of forking tor (perfectly fine of course), researchers could propose alternative path selection algorithms. The proposals could go through a review then implementation stage. Then

Re: [tor-talk] Making a Site Available as both a Hidden Service and on the www - thoughts?

2015-05-19 Thread l.m
Ben, No, because, as I've said. Your deployment of www-front induces the same design choices. A HS-front is nothing more than a gloriously encrypted version of the www-front. Same challenges as www-front but more resources, more computation, more headers, more proxying, more concern for latency

Re: [tor-talk] Making a Site Available as both a Hidden Service and on the www - thoughts?

2015-05-19 Thread l.m
Oh, there are many, *many* more reasons to have an onion site for your website than just that. :-) Such as? A hidden service is by definition hidden. So if you're willing to have both a HS-front and www-front, how is it that it's not the only consideration. A tor exit hides the client-origin so

Re: [tor-talk] Making a Site Available as both a Hidden Service and on the www - thoughts?

2015-05-19 Thread l.m
Ben, Oh wondrous challenges-by-example About the https. I would just like to point out that FB using https amounts to nothing more than a glorious kludge to win back people who've moved on due to privacy concerns. So they try to prove identity using a CA-cert, then wrap encrypted onion traffic

Re: [tor-talk] Making a Site Available as both a Hidden Service and on the www - thoughts?

2015-05-19 Thread l.m
If you accept payments by certain methods (non-anonymous) your liability skyrockets when those payments are issued using the onion. There you go, there's a reason against. Incorrect. It's a reason to not accept those payment methods from the onion. I'd be curious whether you can find a

Re: [tor-talk] Making a Site Available as both a Hidden Service and on the www - thoughts?

2015-05-19 Thread l.m
You plan to deploy on a locally run user site yet you claim to be conscious of breaking the production server. It does not follow. More typo. You stated somewhere you intend to deploy to a test site run locally. Something to that effect. I hope I'm not quoting you out of context. Which would mean

Re: [tor-talk] Crasher in tor browser alpha when playing videos

2015-05-18 Thread l.m
Hi Chris, Besides filling out a ticket you might try running TBB in debug mode. Open a terminal and navigate to the folder you extracted TBB. It has a folder called Browser and start-tor-browser.desktop. Now run: ./Browser/start-tor-browser --verbose Which you will see from the script starts

Re: [tor-talk] Making a Site Available as both a Hidden Service and on the www - thoughts?

2015-05-18 Thread l.m
Hi, I think you're putting too much thought into making your site available as both hidden service and on www. It's not about if you can, or should you do it. It can be reduced to one thing: do you want to hide the origin server for the hidden service? If yes, you have to consider the complexity

Re: [tor-talk] send email through the Tor network

2015-05-10 Thread l.m
Hi Cam, What kind of web email? Could you be more specific? --leeroy -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Codename: TorBirdy

2015-05-09 Thread l.m
Hi Vincent, However, how can I validate that the emails were actually sent over the TOR network? If you don't have access to the email on the other end you wont be able to verify the headers. One way you might achieve your goal would be to access the TorBirdy preferences and using the Test

Re: [tor-talk] German University signs up 24 tor relays

2015-05-06 Thread l.m
Pretending an attempt didn't occur to force disclosure doesn't change the fact that it didn't happen. In before Andreas, that should be didn't-did -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to

Re: [tor-talk] German University signs up 24 tor relays

2015-05-06 Thread l.m
The people who operate them are public figures too. You're the only one claiming that. Neither did Roger force the Aachen operator out - nobody except for LE even can do that. I'm pretty sure I defended the researcher's right not to disclose anything. Had nothing been disclosed these relays

Re: [tor-talk] German University signs up 24 tor relays

2015-05-06 Thread l.m
Dodgson, Dodgson, we've got Dodgson here! ... in other words, relays are inherently public. What? did you actually contribute to the conversation? What the hell does that even mean? Fine. Relays are public. The people who operate them are public figures too. To hell with privacy. HS

Re: [tor-talk] German University signs up 24 tor relays

2015-05-05 Thread l.m
I'm not trying to upset anyone but do we really have to stalk every researcher who adds relays? Honestly, does there need to be a report on x-number of relays were added, constituting a spike this month to date? I mean this purely out of respect for tor-related research worldwide. Engaging in

Re: [tor-talk] German University signs up 24 tor relays

2015-05-05 Thread l.m
I didn't say wondering about an anomaly is disrespectful. Assuming you have the right bring their relay's to everyone's attention is disrespectful. This is a network around privacy and anonymity after-all. Isn't there a better way to start a witch hunt? Like discovering relay's that do something

Re: [tor-talk] the privacy of public tor descriptor data

2015-05-05 Thread l.m
Wow. You just blew my mind. So anonymity and privacy for users, but not contributors that make said privacy features possible? By that reasoning ContactInfo would be mandatory, which it's not. It also follows that MyFamily would become a high-priority (mandatory) feature to implement rather than

Re: [tor-talk] the privacy of public tor descriptor data (was: German University signs up 24 tor relays)

2015-05-05 Thread l.m
How hypocritical. You like to change the subject, again. You and Roger crossed the line when you didn't accept the operator's response and leave them alone. They only responded because you *forced* them to. A relay descriptor is not a person. It's a machine processing digital blips on a wire. A

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-27 Thread l.m
Hi Yuri, If this is the concern that request to check.torproject.org might compromise security, this is the clear indication that TorBirdy/TBB aren't adequate for the requirements. Clearly, such people should switch to VM isolation, and there is no need to ever go to check.torproject.org from

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-27 Thread l.m
Hi Sophie, If I would like to suggest to add a warning to the Before using TorBirdy, where would be the right place to do so? If you would like to submit the feature request what you would first do is connect to Tor's bug tracker [0]. From there you can either register for your own account or

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-25 Thread l.m
Hi teor, You could run TorBirdy through its own instance of the tor client software, with a separate socks port. This would avoid many of the issues you're trying to work around in b) and c), as TorBirdy could happily send NEWNYM to its own client instance all it liked. There is a slightly

Re: [tor-talk] Clarification of Tor's involvement with DARPA's Memex

2015-04-25 Thread l.m
Hi, Lodewijk andré de la porte wrote: And just trying not to be dragnetted at all times. It's important to sometimes use Tor, just so that when you actually do (one day, for whatever reason!) it doesn't seem suspicious :) If you're trying to avoid suspicion you should use Tor for *everything*.

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-25 Thread l.m
The ip check hidden behind a warning dialog hinders obtaining useful data. I'll keep that in mind. On second thought there is an advantage to discouraging the use of the check. If something went wrong with the socks port setting using the check would leak the intention to use tor by connecting

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-25 Thread l.m
Hi Sophie, Options b) and c) would be very luxurious, but option a) really solved my problem, and seems quite important for those who come from a different background. There's a strong correlation between the perceived usefulness to end-users and their support for a FOSS project :) A simple

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-23 Thread l.m
Hi Sophie, Hmm...Perhaps Atlas isn't the best choice here. At any given time the exits you can choose from are those you know of locally. It might be better to focus on TorBirdy instead. When using Tor Browser, the tor process is kind enough to take notice when using certain ports

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-16 Thread l.m
Hi again, To demonstrate further the importance of port choice I think a clarification is in order. From tor's spec [0] an exit may specify an accept or reject policy. So the number of exits that may allow your exiting traffic (in this case mail) is those that accept and those that don't reject.

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-13 Thread l.m
Hi Yuri, Yuri wrote: I understand your concerns. But I would also like to point out that New Identity for most implies new identity for everything. This is how, I believe, majority of technically not very savvy mass users thinks. The new identity feature is documented to make *new*

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-13 Thread l.m
Hi Sophie, Sophie Hassfurther wrote: How do I look up which ports work on which exit nodes? I tried searching Atlas, but I didn't find out how to do a reverse search. Glad to see the problem appears sorted. To find exit policies I used the cat and grep commands on microdesc data. This data is

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-13 Thread l.m
Hi Yuri, I, er, don't think what you're proposing is the answer to the OP's problem. If they're using a port which is only supported by 3 exits they'll still have the problem. If one exit is blocked and they choose that one the mail server will see further attempts as possibly malicious. At

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-13 Thread l.m
Hi Yuri, Yuri wrote: I suggested adding new signal to also terminate old connections. https://trac.torproject.org/projects/tor/ticket/15660 The problem of closing the connections gracefully is generally left to the application. In tor's spec it's explicitly stated that it's the responsibility

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-13 Thread l.m
Hi Sophie, Sophie Hassfurther wrote: [...] so far choosing a new identity in Tor did not work for me, but restarting the Tor Browser worked. So maybe some circuits did not close? Just a general question: is it normal to get connected to the same exit node almost all the time, when I start my

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-10 Thread l.m
Hi, I would like to ask if you're using the Tor Browser bundle with or without modification. When the new identity is used in Tor Browser (it's my understanding--please correct if wrong) that the circuits related to open tabs are allowed to close. This is because the NEWNYM signal is issued while

Re: [tor-talk] TorBirdy seems to connect to the same exit node again and again

2015-04-10 Thread l.m
You might also try exiting TorBirdy completely. Then use new identity in Tor Browser. Then reopen TorBirdy and see if it's still reporting the same exit. --leeroy -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to

Re: [tor-talk] Secure DNS Addresses

2015-04-05 Thread l.m
Hi, evervigil...@riseup.net wrote: If anyone has good intel on some really secure DNS addresses that would be great currently I'm using my VPN provider DNS servers and would like to have some more numbers to add to my list. You might consider security and DNS a bit of a joke in that

Re: [tor-talk] Are webmail providers biased against Tor?

2015-03-17 Thread l.m
If you'd quote properly instead of cutting the context [...] To put it bluntly. I read what you typed and saw a justification for blocking tor. Whether you actually ascribe to the tactic is beside the point. You typed: if I have no reason to accept tor on my server then blocking it makes

Re: [tor-talk] Protest Blocking Tor via CloudFlare

2015-03-12 Thread l.m
https://pad.okfn.org/p/cloudflare-tor That's a list of sites that use CF captchas. I meant CF-enabled sites which block Tor access entirely with only a message box for the site-admin. I just figured since the subject was Protest Blocking... that there would be specific sites where this is

Re: [tor-talk] Protest Blocking Tor via CloudFlare

2015-03-12 Thread l.m
On Thu, 12 Mar 2015 14:16:44 +, ma...@wk3.org wrote: On Wed, 11 Mar 2015 12:35:53 -0400 l.m wrote: Which site blocks tor exit entirely? I haven't seen one recently. https://pad.okfn.org/p/cloudflare-tor You apparently don't know the difference between 'needs a captcha solved

Re: [tor-talk] Protest Blocking Tor via CloudFlare

2015-03-11 Thread l.m
Which site blocks tor exit entirely? I haven't seen one recently. Most of the time I just get the copy/paste if Javascript is off. If Javascript is on I either don't get the copy/paste or I get the browser fingerprinting page. If I'm not mistaken the browser fingerprinting site is the only one a

Re: [tor-talk] personal note

2015-03-07 Thread l.m
On 3/5/2015 at 5:41 AM, Dan Cristian Octavian wrote: It's a novel idea to prevent detection of the PT-server by tunneling in some other traffic instead of being sarcastic, maybe you can focus on wording your message better, I find it quite hard to follow what you write :) I don't think it

Re: [tor-talk] Fixing the problem of sending email from Tor: Proof of Work based system

2015-03-02 Thread l.m
ma...@wk3.org wrote: This could be mitigated by configuring the mailserver to require TLS, couldn't it? Hi Malte, It's certainly the case that you can enforce TLS. But which one? SMTPS (TLS Wrapper) depends on the client enforcing and maintaining TLS on port 465 using client-talks-first. It

Re: [tor-talk] Fixing the problem of sending email from Tor: Proof of Work based system

2015-03-02 Thread l.m
Hi, A good try at solving the problem but one which requires all mail server to get onboard in the presence of established alternatives. The proof of work system you propose doesn't address the problem of tampered email contents or if the email was wanted. It *might* prevent exits from being a

Re: [tor-talk] TorBirdy prevents Thunderbird loading multi-OS bug: Is TorBirdy dev. dead?

2015-02-25 Thread l.m
Hi, It would be useful to know how the email account is setup in general. Whether POP, IMAP, SMTP is used. SSL (TLS Wrapper) or STARTTLS. Have any changes been made to default configuration of Torbirdy preferences or non-default tor ports. --leeroy -- tor-talk mailing list -

Re: [tor-talk] Delete certificates

2015-02-25 Thread l.m
Hi Tomas, There are two sources for certificates. The personal db and the hard-coded db. Hard-coded is what TBB uses by default and is located in the libnssckbi module. Also known as Builtin Object Token. This db is read-only which is why those entries come back. The personal db is disabled by

Re: [tor-talk] Tor over SSH (torsocks) (?)

2015-02-18 Thread l.m
Hi, It sounds like you need to do a little introspection on why you want to torify your ssh. You've already confessed to having a lack of faith in your own technical ability. You need to ask yourself the question--what is my threat model? You want to connect to a VPS--how did you pay for this

Re: [tor-talk] Who said it takes hours of latency to fix anonymity?

2015-02-15 Thread l.m
Wouldn't it be more accurate to say it's takes non-deterministic latency and non-deterministic signalling to fix anonymity? Since if either are deterministic by analysis of the application then said anonymity is provably breakable by signals intelligence. So TCP isn't enough, neither is padding or

Re: [tor-talk] Tor over SSH (torsocks) (?)

2015-02-15 Thread l.m
I want to login to my VPS over SSH. Is torsocks still a safe way to do this? A lot of the documentation (such as it is) is several years old. Hi, I cannot comment on using torsocks but you can achieve the same result using netcat and the proxycommand of ssh/ssh_config. I found a Tor Wiki

Re: [tor-talk] Funded search engine for onionspace?

2015-02-13 Thread l.m
Alas no. I'm aware this is suboptimal. I see GOOG search engine as a temporary-ladder just to get the ball rolling. I am open to using any other index. For what it's worth I'm very pleased with GOOG's performance---right now it's searching an index of 650k onion pages and the number grows

Re: [tor-talk] Funded search engine for onionspace?

2015-02-13 Thread l.m
Leeroy, to avoid being indexed by Googlebot et al, place the appropriate /robots.txt at your root. It's described in the FAQ. Yes I'm aware of the faq. It's just that in using google you'll always be incomplete compared to ahmia.fi but thats ok by me. --leeroy -- tor-talk mailing list -

[tor-talk] Funded search engine for onionspace?

2015-02-12 Thread l.m
Hi, Thanks for hosting a Tor2web proxy. I think I'm using the search wrong though. What exactly is it supposed to do? If I type in duckduckgo I don't find a useable link to the hidden service. If I type in the onion for duckduckgo I don't get any indication that the link is, well, duckduckgo. To

Re: [tor-talk] How to make TBB useable as system Tor, as Tor, Vidalia, pluggable transports system level replacement?

2015-02-03 Thread l.m
Patrick Schleizer wrote: Being able to use the tor-launcher graphical user interface is what this proposal is for. You still can. Tor launcher is an extension for firefox. It's not the same as Vidalia. You would still need to launch the tor process separately for system use. You could use Tor

Re: [tor-talk] ISP CenturyLink Blocking Tor?

2015-02-02 Thread l.m
Larry Brandt wrote: If anyone can penetrate their personnel firewall, please disclose to this group. In most on my dealings, CenturyLink was too under-employed to respond to my requests. The problem hasn't even been confirmed as censorship of Tor and you want to dox them publically using

Re: [tor-talk] Tor - VPN Clarification

2015-02-02 Thread l.m
Mirimir wrote: Sorry, I wasn't clear. I meant that nobody here has made an argument that VPN - Tor is definitely not good. I agree that leeroy seems to favor Case 2 aka Using a VPN to connect to Tor. Well lets try to setup an experiment. I'll get you started. It doesn't require you to be NSA :P

Re: [tor-talk] ISP CenturyLink Blocking Tor?

2015-02-02 Thread l.m
Ben Tasker wrote: Leeroy - I think what he meant was that if anyone can actually get through to someone to talk to (and get a response) - as opposed to breaching a real firewall and leaking staff details, at least that's the way I read it. Good point. My apologies if that's the case. I might

Re: [tor-talk] How to make TBB useable as system Tor, as Tor, Vidalia, pluggable transports system level replacement?

2015-02-01 Thread l.m
Actually, my apologies. I forgot that if you use the method I mentioned previously you'll need to issue NEWNYM to the control port and you won't be able to use the improved new identity feature of Tor Browser. A better solution. 1. Use a separate script to launch the tor process as previously

Re: [tor-talk] ISP CenturyLink Blocking Tor?

2015-02-01 Thread l.m
nathan...@moltennetworks.co.uk wrote: [...] I then enabled Pluggable Transports (meet-google or something like that) and now I'm able to connect to Tor without any issues. This really concerns me as I was able to repeat the crash by launching Tor Browser Bundle and crash the router again.

Re: [tor-talk] How to make TBB useable as system Tor, as Tor, Vidalia, pluggable transports system level replacement?

2015-02-01 Thread l.m
Patrick Schleizer wrote: To rephrase this proposal in an alternative way... At the moment, when you download the TBB package, your only chance to use tor-launcher/Tor/pluggable transports is to also start Tor Browser. No way to do that without starting Tor Browser. What is being suggested here,

Re: [tor-talk] Tor - VPN Clarification

2015-02-01 Thread l.m
Joe Btfsplk wrote: This VPN Tor (or Tor VPN) subject - and its discussion here has become complex. Maybe too complex for all but a handful of folks? What's complex? Intelligence agencies are reportedly targeting all VPN providers. Governments are targeting encryption of communications in the

Re: [tor-talk] Tor - VPN Clarification

2015-02-01 Thread l.m
Joe Btfsplk wrote: I gather the one with more variables in my favor is Case 2 - Using VPN to connect to Tor? That is the one (some) have said is definitely not good - yes? Still others may have said that VPN connecting to Tor, isn't as bad as some have indicated? Observation: There are a LOT

Re: [tor-talk] High CPU-usage every hour

2015-01-31 Thread l.m
On 1/31/2015 at 11:13 AM, aka wrote:Hi, I am using multiple Tor instances on the same machine and my CPU-usage goes goes way up for a few seconds in exact one hour intervals. Is this regular behavior (generating new RSA keys?) or is it an anomaly of an ongoing attack? Every hour a new consensus

Re: [tor-talk] How to make TBB useable as system Tor, as Tor, Vidalia, pluggable transports system level replacement?

2015-01-31 Thread l.m
Patrick Schleizer wrote: Being able to use the components, tor-launcher, Tor and pluggable transports that come with the TBB tarball for system use on Debian. For use without or with the Tor Browser. Being able to use these components, without being forced to run Tor Browser. Your main concern,

Re: [tor-talk] ATOMIC BANJO and LEVITATION used by CSE

2015-01-31 Thread l.m
krishna e bera wrote: They are tapping the cables and getting ip addresses of browsers, then sharing that with other intelligence agencies. E.g. you could be stopped at the border if someone in your house clicked on a monitored site. Another reason to use Tor (not an uppercased acronym) all the

Re: [tor-talk] Running TBB with a remote tor process

2015-01-31 Thread l.m
grarpamp wrote: Lara wrote: I have a OpenWRT router. And I can install tor on that. I would like to have a middle relay. Can I hook up my TBB (computer linked over wifi) to that tor session? Is it a bad idea? It would be on the same subnetwork. TBB likely deploys and expects a specific torrc, and

Re: [tor-talk] Fox News bans my Tor Browser

2015-01-17 Thread l.m
Joe Btfsplk wrote: But what I find happens - more than a few times, when a site doesn't like an Tor exit (it's IP, or it's location), using New Identity often selects another circuit *very* similar to the previous; Yes, Tor attempts to reuse known good exits from the past hour. It's because

Re: [tor-talk] What relay does really help the TOR project?

2015-01-16 Thread l.m
Josef 'veloc1ty' Stautner wrote:Long story short: What type of relay helps the TOR project more? Exit-Relay or Middle-relay? Is it really the job from TOR to provide an exit to the normal internet resources or should the focus be on hidden services? First, thank you for operating a Tor node.

Re: [tor-talk] Fox News bans my Tor Browser

2015-01-16 Thread l.m
Joe Btfsplk wrote: I don't know that Vidalia is still considered anonymity safe, in later TBB versions - like 4.02, 4.03. COMMENTS on that? Can someone explain about using the following methods - mentioned earlier? You might try adding TrackHostExits .. You might also try AllowDotExit.

Re: [tor-talk] Fox News bans my Tor Browser

2015-01-15 Thread l.m
You're probably the only one viewing that site using Tor. That would explain why you didn't have any problem at first. Now they've noticed. It might be the changing exit node from new identity. Some exits get listed in well known blacklists. Then the site operators start to pay attention and they

Re: [tor-talk] DNSSEC better protecting users?

2015-01-15 Thread l.m
I know it's off topic but if you do use DNSCrypt by forcing DNS over TCP make sure you don't use OpenDNS servers. If you're familiar with OpenDNS you know they have a control panel where you can admin the service wrt it's external ip relation. DNS based filtering and monitoring of requests. If you

[tor-talk] Where's longclaw

2015-01-15 Thread l.m
After missing signature it's now not listed in current consensus. Did I miss some event? -- leeroy -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] DNSSEC better protecting users?

2015-01-11 Thread l.m
i am concerned about https not being enough to protect tor2web users. In particular, I am concerned about what subdomain a user is visiting being leaked. Are there any established ways of preventing the subdomain from being leaked? Because none spring to my mind. Where might this be a

Re: [tor-talk] new paper on Tor and cryptography

2015-01-10 Thread l.m
Nick Mathewson wrote: Personally, if I were doing something like this, I'd aim closer to Yawning's Basket protocol, which uses an established PQ construction (ntru in Basket's case) rather than trying to invent a novel one. While you're asking -- Isn't that like saying who needs SHA-3

Re: [tor-talk] are there privacy benefits of running a bridge node?

2015-01-10 Thread l.m
Virgil Griffith wrote For example, if you run an exit node, your regular traffic is disguised by exit traffic also coming from your ip# I'm not sure I would call that use case more private. An observer could categorize your traffic incoming from an intermediary relay and time that traffic

Re: [tor-talk] Once again: window size

2014-12-03 Thread l.m
Hi Hartmut, I tried to reproduce your problem on Windows. You may have stumbled onto a bug. Here are my results. Upon loading Tor-Browser, and after automatic resize, the window has an extra large 32 pixel border along the bottom edge. The content area is 1000x600 (for my display). Producing one

Re: [tor-talk] Once again: window size

2014-12-02 Thread l.m
Hi, those are not good results. I recommend trying a couple more tests on panopticlick. 1. After maximizing, then closing, then reopening Tor-Browser, it resizes automatically--after a couple seconds. Test at this window size. 2. Use Tor-Button to change identities. The window should resize

Re: [tor-talk] OpenCart eCommerce CMS HS not working

2014-12-02 Thread l.m
Fine I'll remove the replies. If a normal browser--without Tor works. Then don't worry about the rules I mentioned. If the only problem is you get a broken site using the onion address. Then what is your HiddenServicePort in torrc. Finally. In a normal browser--without Tor. Do you connect using

Re: [tor-talk] (D)DOS over Tor network ? Help !

2014-12-02 Thread l.m
Perhaps the new implementation of the hidden services will be better ? How is it going ? I don't see anything in the improvements suggested for hidden services that would help this situation. Though I would be grateful for being corrected. First, I just want to say I only meant sheep(s) to

Re: [tor-talk] OpenCart eCommerce CMS by public key not working (renamed from Once again: window size)

2014-12-01 Thread l.m
So a normal browser session works. When you try to access the server by SSH key-based auth. you get a broken site-am I correct? How are you redirecting/filtering traffic. It may be you need to adjust your rules. On 11/30/2014 at 5:39 AM, Umair Razzaq wrote:Hi, this is Umair. I've posted my issue

Re: [tor-talk] (D)DOS over Tor network ? Help !

2014-12-01 Thread l.m
To clarify. You have black sheep(s). Look for more than one. -- leeroy bearr On 12/1/2014 at 2:55 AM, Mirimir wrote: In your torrc, create a new test hidden service, and comment out all of the rest. The new hidden service should be accessible. If it's not, you have other problems. If the new

Re: [tor-talk] OpenCart eCommerce CMS by public key not working (renamed from Once again: window size)

2014-12-01 Thread l.m
with .onion address, than only markup loads up, and images also not loading including scripts stylesheets. About rules, what kind of rules do i need to set and how. I also have read Tor Relays Bridges, is that what you're are refering to? Please advise. thanks... On Mon, Dec 1, 2014 at 2:39 PM, l.m

Re: [tor-talk] OpenCart eCommerce CMS HS not working

2014-12-01 Thread l.m
the HiddenServicePort that is.. -- leeroy bearr On 12/1/2014 at 6:59 AM, l.m wrote:A normal browser session (without tor) works? Then don't worry about the rules. When you use the .onion address you have problems? What is your hidden service configuration in torrc? -- leeroy bearr On 12/1

Re: [tor-talk] (D)DOS over Tor network ? Help !

2014-12-01 Thread l.m
I think it's also worth mentioning this may be an attack on your service via your server's service provider. It's not impossible to have one HS work fine but many cause timeouts as you begin to enable all HS. As you begin to increase traffic to guards you give away that your services are

Re: [tor-talk] Once again: window size

2014-11-30 Thread l.m
ändern Sie dann Größe ist gut. dass Sie Maximieren Sie ist schlecht. Ist das besser? -- leeroy bearr [1] https://panopticlick.eff.org On 11/30/2014 at 3:51 PM, l.m wrote:I will try to simplify the explanation. See [1] for more information on browser fingerprinting. Test with Tor Browser resized

Re: [tor-talk] Making Apache server talk to the Tor network?

2014-11-29 Thread l.m
...access to Tor is ambiguous even for a web server. Are you fishing or looking for help with a forward-reverse proxy? I only ask because you leave out what you're trying to achieve and it's a given you've access to the docs. Is your web server a client or server w.r.t Tor? Producer or consumer?

Re: [tor-talk] Once again: window size

2014-11-28 Thread l.m
What do you mean, not really? If you look at number (7) as mentioned you see the Design Goal *and* Implementation Status. Implementation status shows the methods used to reach the goal. Clicking on the links provides all the details you could need to change the behavior. These are modifications to

Re: [tor-talk] So much for using ixquick and Startpage: Now broken w/Tor

2014-11-09 Thread l.m
. --leeroy bearr On 11/8/2014 at 2:00 PM, Soul Plane wrote:On Sat, Nov 8, 2014 at 10:44 AM, l.m wrote: It's not broken. They explain clearly that the concurrent use of ixquick/startpage by multiple Tor users at a given exit relay can trigger automated abuse blocking. They're right. It could

Re: [tor-talk] Darknets/science vs. GPA/LEA/Law, and playing dirty pool

2014-11-09 Thread l.m
bearr On 11/8/2014 at 1:43 PM, Sam Pizzey wrote:On 08/11/2014 16:14, l.m wrote: How's the presence of a darknet running on Tor hidden services supposed to make me feel anyway? That's your freedom being used to poison kids and evade punishment. On the contrary, it makes me feel that my freedom

Re: [tor-talk] So much for using ixquick and Startpage: Now broken w/Tor

2014-11-08 Thread l.m
It's not broken. They explain clearly that the concurrent use of ixquick/startpage by multiple Tor users at a given exit relay can trigger automated abuse blocking. They're right. It could be abuse. The same reason Google does it. Why is this a surprise? The problem with Google is the connection

  1   2   >