Re: Maintanance of TOR for FreeBSD 6.2

2007-12-01 Thread Fabian Keil
Mr. Blue [EMAIL PROTECTED] wrote:

 Um, lattest TOR port for above platform is 0.1.2.17_1
 In order to install lattest 0.1.2.18, I was forced to
 go and build it from source.

I assume it hasn't been updated yet because the ports
tree is frozen in preparation for the next releases.

Also if the port's Makefile is out of date, it's usually
less work to update it yourself instead of messing with
the source tarballs directly.

 Is anyone maintaining it?

Check the Makefile:
[EMAIL PROTECTED] ~ $grep MAINTAINER /usr/ports/security/tor/Makefile
MAINTAINER= [EMAIL PROTECTED]

Fabian


signature.asc
Description: PGP signature


Re: Maintanance of TOR for FreeBSD 6.2

2007-12-01 Thread Mr. Blue
Ok, thanks Fabian.



- Original Message -
From: Fabian Keil [EMAIL PROTECTED]
To: or-talk@freehaven.net
Date: Sat, 1 Dec 2007 14:50:14 +0100
Subject: Re: Maintanance of TOR for FreeBSD 6.2


 Mr. Blue lt;[EMAIL PROTECTED]gt; wrote:
 
 gt; Um, lattest TOR port for above platform is
0.1.2.17_1
 gt; In order to install lattest 0.1.2.18, I was
forced to
 gt; go and build it from source.
 
 I assume it hasn't been updated yet because the
ports
 tree is frozen in preparation for the next releases.
 
 Also if the port's Makefile is out of date, it's
usually
 less work to update it yourself instead of messing
with
 the source tarballs directly.
 
 gt; Is anyone maintaining it?
 
 Check the Makefile:
 [EMAIL PROTECTED] ~ $grep MAINTAINER
/usr/ports/security/tor/Makefile
 MAINTAINER= [EMAIL PROTECTED]
 
 Fabian


  

Never miss a thing.  Make Yahoo your home page. 
http://www.yahoo.com/r/hs


Re: Nice quiet, private, anonymous life??

2007-12-01 Thread mark485anderson
If I was in your position I might consider putting some bulk
demagnetizers near my hard drives with a panic switch, with backups to a
secure unknown location. Don't know how they work in Canada, but here in
the USA, they keep your equipment once they seize it and build a case
from your hard drives. Better yet increase your RAM and run everything
off a ram drive if possible. If you are already under surveillance, best
to seek legal advice now. Don't know if the Electronic Frontier
Foundation will help or not. You might also get advice on the usenet.
misc.legal, comp.legal(or similar). All depends on what statute and case
law is in Canada and whether or not you have access to good legal
representation. Sounds like they are getting ready to pounce and casing
your house.


On Fri, 30 Nov 2007 20:01:12 +0100, Eugen Leitl [EMAIL PROTECTED]
said:
 On Fri, Nov 30, 2007 at 01:32:40PM -0500, [EMAIL PROTECTED] wrote:
  Not a professional techie, since running an exit node this fall I am 
  being habitually banned from Google, Charter has asked me to stop 
  spamming, and now today the police are at my door looking for Tobias. 
 
 Port 25 open, eh? Not a good idear, and not part of the standard
 exit policy.
 
  Their information says Tobias connected from my home address (provided 
  by Charter I assume) Sept. 27.  They only circled the house a half a 
  dozen times yesterday.   I am a family person not well positioned for
  hassles.  Briefly reading Mirko's note, until more familiar I think 
  shutting down my exit would be wise, no?
 
 Before you shut it down completely, I recommend going middleman.
 Assuming harassment is complaint-driven, it will cease instantly
 (allow 2-3 months for running cases to complete, depending on
 how busy the mounties are).
 
 What did it for me, is allegations of pedophilia trafficking.
 Had no particular incentives to be burned at that particular stake.
 (Of course, assuming you want to get rid of somebody, that's
 just the right accusations to make).
  
  Hope this post goes to list, can't find list post commands.
 
 -- 
 Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
 __
 ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
 8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
-- 
  
  [EMAIL PROTECTED]

-- 
http://www.fastmail.fm - And now for something completely differentÂ…



Re: Nice quiet, private, anonymous life??

2007-12-01 Thread Eugen Leitl
On Sat, Dec 01, 2007 at 02:06:22PM -0700, [EMAIL PROTECTED] wrote:

 If I was in your position I might consider putting some bulk
 demagnetizers near my hard drives with a panic switch, with backups to a

Doesn't work, you'd need too many Teslas. Plastique or thermite would work.
Cryptographic filesystem would work, since you only would have to lose
power for a couple seconds.

 secure unknown location. Don't know how they work in Canada, but here in
 the USA, they keep your equipment once they seize it and build a case

In Germany the hardware is effectively confiscated. You might get your
hardware out earlier (in a couple months) if you have a lawyer, and can
make a case that you're a business.

 from your hard drives. Better yet increase your RAM and run everything
 off a ram drive if possible. If you are already under surveillance, best

I would expect that many of Tor exit node operators have been under
telecommunication surveillance. 

 to seek legal advice now. Don't know if the Electronic Frontier
 Foundation will help or not. You might also get advice on the usenet.
 misc.legal, comp.legal(or similar). All depends on what statute and case
 law is in Canada and whether or not you have access to good legal
 representation. Sounds like they are getting ready to pounce and casing
 your house.

In Bavaria, you only have to criticize the pope while in presence
of a fink. The SWAT will be with you shortly.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


Help me understand tor with SSL?

2007-12-01 Thread Martin Fick
Hi,

After reading the docs I am very confused about how
tor/privoxy deals with https(SSL) connections.  It
sounds like if I use SSL that I will be basically
bypassing privoxy and therefor could leak personal
info?  So what is the alternative if I want to access
a web site that requires https for logging in
anonymously?

Also, what prevents tor users form being susceptible
to simple attacks where an html page embeds an image
that has an https url as its source effectively
bypassing any privacy?

-Martin



  

Be a better pen pal. 
Text or chat with friends inside Yahoo! Mail. See how.  
http://overview.mail.yahoo.com/


Re: Help me understand tor with SSL?

2007-12-01 Thread Kasimir Gabert
On Dec 1, 2007 8:23 PM, Martin Fick [EMAIL PROTECTED] wrote:
 Hi,

 After reading the docs I am very confused about how
 tor/privoxy deals with https(SSL) connections.  It
 sounds like if I use SSL that I will be basically
 bypassing privoxy and therefor could leak personal
 info?  So what is the alternative if I want to access
 a web site that requires https for logging in
 anonymously?

 Also, what prevents tor users form being susceptible
 to simple attacks where an html page embeds an image
 that has an https url as its source effectively
 bypassing any privacy?

 -Martin



   
 
 Be a better pen pal.
 Text or chat with friends inside Yahoo! Mail. See how.  
 http://overview.mail.yahoo.com/


Hello Martin,

What Privoxy will be unable to do is modify the contents of HTTPS
packets.  The packets will still be sent anonymously, so HTTPS
communications can be anonymous (and are preferred because exit nodes
can not steal information), just the ads and scripts will not be
filtered from them through Privoxy.  This filtering should still occur
at some level from your browse (Noscript, Ad blocking extensions,
etc).

Let me know if that clarifies things a bit,

Kasimir

-- 
Kasimir Gabert


Re: Help me understand tor with SSL?

2007-12-01 Thread Martin Fick
--- Roger Dingledine [EMAIL PROTECTED] wrote:
 On Sat, Dec 01, 2007 at 07:42:34PM -0800, Martin
 Fick wrote:
  So, why even bother suggesting privoxy use at all 
  if it can easily be bypassed?  Is this not just
  giving people a false sense of security?
 
 Privoxy doesn't do that much to protect you. 

Hmm, on this page:
http://www.torproject.org/docs/tor-doc-unix.html.en
in the docs it says:

  Using privoxy is necessary because 
  browsers leak your DNS requests when 
  they use a SOCKS proxy directly, 
  which is bad for your anonymity. 
  Privoxy also removes certain 
  dangerous headers from your web 
  requests, and blocks obnoxious ad 
  sites like Doubleclick.

Is that no longer true?  If it is still 
true, is there any way to get privoxy to 
use stunnel for its SSL connections so 
that the SSL connection is only from 
privoxy to the server?

-Martin



  

Be a better sports nut!  Let your teams follow you 
with Yahoo Mobile. Try it now.  
http://mobile.yahoo.com/sports;_ylt=At9_qDKvtAbMuh1G1SQtBI7ntAcJ


Tor/Vidalia sponsorship

2007-12-01 Thread lg2005
Hi,

I am not able to modify the Vidalia source, so I am looking somebody to 
implement new features on Vidalia. The new version would be available to 
everybody of course, maybe under another name if there is a copyright issue on 
the name Vidalia.

For this I will of course pay, as I want something made quickly.

Please contact me by email if you are interested - and able to do such work.

Thank you

LG