port 53 for dirport for firewalled users?

2006-09-22 Thread glymr
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

I know that many intranet firewalls have bandwidth limiters on port 53,
especially the more severe types of firewalls, but for accessing
directory mirrors this isn't a big deal, I mean sure, it slows down the
process initially but once a cache is built most of the time the speed
will be of little issue.

I think that probably then port port 80 or 443 could then be the ORPort,
with the configuration modification suggested in the tor wiki, one could
then provide a harsh firewall-accessible route to tor access while
running a webserver.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFFJzNGkOzwaes7JsRAxOwAJ9/AWr/0iYAPX2YvDHfSVzFAuZz+QCfajN+
jTixLp3yKDsjn3D3gc6Y0oY=
=7GeE
-END PGP SIGNATURE-


oopsy

2006-09-22 Thread glymr
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

ok, i see what i need to do here now, sorry to ask an faq question
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFFH4pGkOzwaes7JsRAxomAJsH8CHJz6ICR9fge82Iz/AXVuSdHwCeJXZo
JyWQPP0CH7wZYxAFct6G4qY=
=pW07
-END PGP SIGNATURE-


using low ports when running vidalia on gentoo or allowing vidalia to modify configs on init.d configured tor server

2006-09-22 Thread glymr
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160

Hi,

I'm running my tor server  through vidalia so I can more easily monitor
it's bandwidth utilisation and access that neat tor network browser/map
thing, the problem I'm having is that I was unable to get vidalia to do
configuration if I tried to make it connect to a server running via the
standard /etc/init.d script so I've ended up running it under my normal
login, which then makes it impossible for me to run it on low ports.

I presume the simplest solution is getting the config and logging
interfaces from vidalia talking to the tor user owned files, but I'm
buggered if I can figure out how to do it.

Any help would be appreciated.

Glymr
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFFFHzgGkOzwaes7JsRA2KYAKC1d2AMQJeOwNXONzxqjCmUQqYjdgCfQP9k
lV8lY2eVA2eSN1y4eub9TsU=
=W415
-END PGP SIGNATURE-


Tor strange errors

2006-09-22 Thread Arrakistor
Sep 22 13:15:29.515 [notice] Tor 0.1.1.23 opening new log file.
Sep 22 13:15:30.125 [notice] I learned some more directory information, but not 
enough to build a circuit.
Sep 22 13:15:30.312 [warn] connection_dir_client_reached_eof(): Received http 
status code 403 ("Response denied") from server '140.247.60.64:80' while 
fetching 
"/tor/status/fp/FFCB46DB1339DA84674C70D7CB586434C4370441+719BE45DE224B607C53707D0E2143E2D423E74CF+847B1F850344D7876491A54892F904934E4EB85D+38D4F5FCF7B1023228B895EA56EDE7D5CCDCAF32+7EA6EAD6FD83083C538F44038BBFA077587DD755.z".
 I'll try again soon.
Sep 22 13:16:31.312 [warn] connection_dir_client_reached_eof(): Received http 
status code 403 ("Response denied") from server '18.244.0.114:80' while 
fetching 
"/tor/status/fp/FFCB46DB1339DA84674C70D7CB586434C4370441+719BE45DE224B607C53707D0E2143E2D423E74CF+847B1F850344D7876491A54892F904934E4EB85D+38D4F5FCF7B1023228B895EA56EDE7D5CCDCAF32+7EA6EAD6FD83083C538F44038BBFA077587DD755.z".
 I'll try again soon.
Sep 22 13:17:32.421 [warn] connection_dir_client_reached_eof(): Received http 
status code 403 ("Response denied") from server '18.244.0.188:9031' while 
fetching 
"/tor/status/fp/FFCB46DB1339DA84674C70D7CB586434C4370441+719BE45DE224B607C53707D0E2143E2D423E74CF+847B1F850344D7876491A54892F904934E4EB85D+38D4F5FCF7B1023228B895EA56EDE7D5CCDCAF32+7EA6EAD6FD83083C538F44038BBFA077587DD755.z".
 I'll try again soon.


Can anyone decipher what is causing this?




Re: Using Gmail (with Tor) is a bad idea

2006-09-22 Thread Fabian Keil
Fabian Keil <[EMAIL PROTECTED]> wrote:

> [EMAIL PROTECTED] top posted (please don't):
 
> > I'm not quite sure what you are saying?
> > 
> > Are you saying that some info gets leaked if you use
> > unencrypted http to transfer mail with gmail?
> 
> Yes, and some info means everything but your password.
> 
> And even if you enter through https://mail.google.com/,
> a man in the middle can send your browser a redirect to
> http://mail.google.com/, Google then sends your browser
> another redirect to the encrypted login page on another
> server and after the secured login you will get redirected
> back to http://mail.google.com/.
> 
> Firefox/1.5.0.7 honours an unencrypted redirect
> as response for a https connection request.
> You don't get a warning, but of course if you look for it,
> you can see that the connection is unencrypted.

I missed something here: in my test Firefox was already
configured to use Privoxy as SSL proxy, which means
it has to ask the proxy to connect to the SSL server.
As this happens with an unencrypted request,
the client also accepts an unencrypted response.

Most likely the client does not accept an unencrypted
redirect while trying to open a direct SSL connection
(without any proxy involved).

It might not even work, if the man in the middle isn't
already located between SSL proxy and browser. If this
is true, a Tor exit node wouldn't be the right place
to send these bogus redirects.

Fabian
-- 
http://www.fabiankeil.de/


signature.asc
Description: PGP signature