Re: Tor meetup in San Francisco this Thursday

2008-01-22 Thread Jacob Appelbaum
Nick Mathewson wrote:
 Hi, all!
 
 I'll be in San Francisco for most of this week, and I thought it would
 be neat to have a Tor Folks meetup on Thursday, probably in the late
 afternoon or early evening.  Let me know (off-list) if there's any
 interest, and I'll figure out where -- probably a coffee shop or
 something.
 

I, as well as others, certainly have an interest. I'd vote for somewhere
near the EFF, if the EFF itself isn't an option.

-jake


compile issue on Solaris with tor-0.2.0.16-alpha and tor-0.2.0.17-alpha

2008-01-22 Thread otto otto

All,
 
I could build tor-0.2.0.15-alpha without any issue. With tor-0.2.0.16-alpha and
tor-0.2.0.17-alpha I'm getting the following error when compiling tortls.c:
(I'm runnung Solaris 10 x86)
 
make 
make  all-recursive
Making all in src
Making all in common
gcc -DHAVE_CONFIG_H -I. -I../..-I../common -I/opt/csw/include 
-I/usr/local/ssl/include  -g -O2 -Wall -g -O2 -W -Wfloat-equal -Wundef 
-Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wwrite-strings 
-Wredundant-decls -Wchar-subscripts -Wcomment -Wformat=2 -Wwrite-strings 
-Wmissing-declarations -Wredundant-decls -Wnested-externs -Wbad-function-cast 
-Wswitch-enum -Werror -MT tortls.o -MD -MP -MF .deps/tortls.Tpo -c -o tortls.o 
tortls.c
tortls.c: In function `tor_tls_new':
tortls.c:701: error: `TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA' undeclared 
(first use in this function)
tortls.c:701: error: (Each undeclared identifier is reported only once
tortls.c:701: error: for each function it appears in.)
tortls.c:701: error: syntax error before string constant
*** Error code 1
make: Fatal error: Command failed for target `tortls.o'
Current working directory /usr/local/lib/tor-0.2.0.17-alpha/src/common
*** Error code 1
The following command caused the error:
failcom='exit 1'; \
for f in x $MAKEFLAGS; do \
  case $f in \
*=* | --[!k]*);; \
*k*) failcom='fail=yes';; \
  esac; \
done; \
dot_seen=no; \
target=`echo all-recursive | sed s/-recursive//`; \
list='common or tools win32 config'; for subdir in $list; do \
  echo Making $target in $subdir; \
  if test $subdir = .; then \
dot_seen=yes; \
local_target=$target-am; \
  else \
local_target=$target; \
  fi; \
  (cd $subdir  make  $local_target) \
  || eval $failcom; \
done; \
if test $dot_seen = no; then \
  make  $target-am || exit 1; \
fi; test -z $fail
make: Fatal error: Command failed for target `all-recursive'
Current working directory /usr/local/lib/tor-0.2.0.17-alpha/src
*** Error code 1
The following command caused the error:
failcom='exit 1'; \
for f in x $MAKEFLAGS; do \
  case $f in \
*=* | --[!k]*);; \
*k*) failcom='fail=yes';; \
  esac; \
done; \
dot_seen=no; \
target=`echo all-recursive | sed s/-recursive//`; \
list='src doc contrib'; for subdir in $list; do \
  echo Making $target in $subdir; \
  if test $subdir = .; then \
dot_seen=yes; \
local_target=$target-am; \
  else \
local_target=$target; \
  fi; \
  (cd $subdir  make  $local_target) \
  || eval $failcom; \
done; \
if test $dot_seen = no; then \
  make  $target-am || exit 1; \
fi; test -z $fail
make: Fatal error: Command failed for target `all-recursive'
Current working directory /usr/local/lib/tor-0.2.0.17-alpha
*** Error code 1
make: Fatal error: Command failed for target `all'
 
(I'm runnung Solaris 10 x86)
 
Any help is welcome.
 
Thanks
otto
_
Testen Sie Live.com - das Zentrum Ihrer Online-Welt, das Sie mit aktuellen 
Nachrichten, Sport- und Wetterinfos und vielem mehr versorgt.
http://www.live.com/getstarted

Re: TorStatus version 4 has been released

2008-01-22 Thread Noiano
Kasimir Gabert wrote:
 Hello all [especially TorStatus mirror operators],

 A new version of TorStatus (http://torstatus.kgprog.com) has been
 released.  More information can be found at
 http://project.torstatus.kgprog.com, and any comments are greatly
 welcome.

 Thanks,
 Kasimir

In my *very humble opinion* I think the web page is a bit too heavy for
two reasons:

· it takes a bit too much to load because it contains a lot of data.
Perhaps it should be cut at some point and should be put something like
«show all exit nodes» especially because usually surfing through tor
isn't fast.

· it takes a bit too much to process the whole pages: Firefox freezes
for some moments...maybe for non-fast computer this can be a problem.

I am no web developer so, again, this comments are IMVHO.

Noiano



signature.asc
Description: OpenPGP digital signature


Re: TorStatus version 4 has been released

2008-01-22 Thread anonym
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 21/01/08 23:59, Kasimir Gabert wrote:
 Hello all [especially TorStatus mirror operators],
 
 A new version of TorStatus (http://torstatus.kgprog.com) has been
 released.  More information can be found at
 http://project.torstatus.kgprog.com, and any comments are greatly
 welcome.

I think it's very useful. The only things I lack is the ability in the
advanced search for all exit node with certain exit policies. Except for
that it fulfills all my needs and more.

 Thanks,
 Kasimir
 

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.7 (GNU/Linux)

iD8DBQFHlkohp8EswdDmSVgRAi72AJ9ERg+8oUYSZbkmHv2CFWGt7VTgYgCgxOtF
XCw2dIpo6YwGQmUZGwvanZk=
=YUnE
-END PGP SIGNATURE-



Re: TorStatus version 4 has been released

2008-01-22 Thread Fabian Keil
Noiano [EMAIL PROTECTED] wrote:

 Kasimir Gabert wrote:

  A new version of TorStatus (http://torstatus.kgprog.com) has been
  released.  More information can be found at
  http://project.torstatus.kgprog.com, and any comments are greatly
  welcome.

 In my *very humble opinion* I think the web page is a bit too heavy for
 two reasons:
 
 · it takes a bit too much to load because it contains a lot of data.

At least it compresses quite well:
21:28:27.567 283b5400 Re-Filter: Decompression successful. Old size: 230926, 
new size: 2642640. (saved: 91.26%)

Of course if you'd be using Privoxy 3.0.6 or earlier with
filtering enabled, you'd download the whole two megs ...

Fabian


signature.asc
Description: PGP signature


Hostname

2008-01-22 Thread Khaled Moussa
Is there a way for hiding the IP of host and ISP name from Tor network 
and TorStatus for security reasons?


Re: Hostname

2008-01-22 Thread Drake Wilson
Quoth Khaled Moussa [EMAIL PROTECTED], on 2008-01-22 23:42:33 +0200:
 Is there a way for hiding the IP of host and ISP name from Tor network  
 and TorStatus for security reasons?

That's an extremely vague question.  IP of _what_ host, and for _what_
reasons?

Anyway, based on my predicted disambiguation of your question, the answer
is generally no, Tor clients and relays cannot easily hide themselves
from the Tor network.

   --- Drake Wilson


Re: Hostname

2008-01-22 Thread Jon McLachlan
In fact, autonomous system diversity in a Tor circuit is a wonderful 
thing, for better anonymity against pseudo-global adversaries (such as 
ISP's).  Then, different ISP's would have to collude to short circuit a 
Tor tunnel.  Just be careful of those Internet eXchanges, as IX level 
adversaries can [probabilistically]  short circuit Tor's tunnels.

~Jon

Drake Wilson wrote:

Quoth Khaled Moussa [EMAIL PROTECTED], on 2008-01-22 23:42:33 +0200:
  
Is there a way for hiding the IP of host and ISP name from Tor network  
and TorStatus for security reasons?



That's an extremely vague question.  IP of _what_ host, and for _what_
reasons?

Anyway, based on my predicted disambiguation of your question, the answer
is generally no, Tor clients and relays cannot easily hide themselves
from the Tor network.

   --- Drake Wilson
  




Re: Hostname

2008-01-22 Thread Hans Schnehl
On Tue, Jan 22, 2008 at 03:57:46PM -0600, Drake Wilson wrote:
 Quoth Khaled Moussa [EMAIL PROTECTED], on 2008-01-22 23:42:33 +0200:
  Is there a way for hiding the IP of host and ISP name from Tor network  
  and TorStatus for security reasons?
 
 That's an extremely vague question.  IP of _what_ host, and for _what_
 reasons?

I believe this is about not to show up in the publicly available lists
(TorStatus) on blutmagie, kprog and others. 

 
 Anyway, based on my predicted disambiguation of your question, the answer
 is generally no, Tor clients and relays cannot easily hide themselves
 from the Tor network.


Of course the network must know 'itself', so there is no point in hiding from 
the Tor network and in the same time being a member.

But if my assumption is correct, you might want to set up your node as a bridge.
These are not listed in the mentioned status lists. 

http://archives.seul.org/or/talk/Dec-2007/msg00268.html
http://archives.seul.org/or/talk/Dec-2007/msg00269.html

give hints how to do this.


 
--- Drake Wilson


Regards

Hans 


RE: Tor meetup in San Francisco this Thursday

2008-01-22 Thread Steve Southam
Hi again Nick,

Just a thought, how about meeting at the pub instead of coffee??

Steve




-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Nick Mathewson
Sent: Monday, January 21, 2008 10:13 PM
To: or-talk@freehaven.net
Subject: Tor meetup in San Francisco this Thursday

Hi, all!

I'll be in San Francisco for most of this week, and I thought it would be
neat to have a Tor Folks meetup on Thursday, probably in the late afternoon
or early evening.  Let me know (off-list) if there's any interest, and I'll
figure out where -- probably a coffee shop or something.

yrs,
--
Nick Mathewson


smime.p7s
Description: S/MIME cryptographic signature


Re: Hostname

2008-01-22 Thread F. Fox

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Khaled Moussa wrote:
| Is there a way for hiding the IP of host and ISP name from Tor network
| and TorStatus for security reasons?
|

Clients do not show up in TorStatus, that's for servers; however, an
observer could tell you're connecting to the Tor network. They could
not, however, tell what you're doing through your connection to the Tor
network (that's the whole idea).

Servers cannot hide from the Tor network or TorStatus, with the
exception of the bridge servers mentioned by Hans Schnehl (these are not
listed in TorStatus, but can be determined by looking at your connection).

- --
F. Fox: A+, Network+, Security+
Owner of Tor node kitsune
http://fenrisfox.livejournal.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHlovrbgkxCAzYBCMRCFxhAJ9uNry5zIAFwqFJajGboBpUDMMHsQCfZNWx
ORDAodC9A9sJDjAYyDRkavM=
=k1G7
-END PGP SIGNATURE-