Re: Tor-ramdisk 20080606 released.

2008-06-11 Thread Marco Bonetti
On Tue, June 10, 2008 20:06, basile wrote:
 We would like to announce a new release of Tor-ramdisk (version
 20080606), an i686 uClibc-based micro Linux distro (about 3.1MB ISO)
from the changleog I've read that you're running an hardened 2.6 kernel,
which is it's size? I think that you can switch to 2.4 (GRSEC/PAX still
supports this tree) to slim it down further.

by the way: really nice project :)

-- 
Marco Bonetti
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
My webstuff: http://sidbox.homelinux.org/

My GnuPG key id: 0x86A91047



Re: Tor-ramdisk 20080606 released.

2008-06-11 Thread basile
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Scott Bennett wrote:
  On Tue, 10 Jun 2008 14:06:57 -0400 basile [EMAIL PROTECTED]
 wrote:
 We would like to announce a new release of Tor-ramdisk (version
 20080606), an i686 uClibc-based micro Linux distro (about 3.1MB ISO)
 whose only purpose is to host a tor server in an environment which
 maximizes security and privacy.  Security is enhanced by employing a
 monolithically compiled GRSEC/PAX patched kernel and hardened system
 tools. Privacy is enhanced by turning off logging at all levels so
 that even the Tor operator only has access to minimal information.
 Finally, since everything runs in ephemeral memory, no information
 survives a reboot, except for the Tor configuration file and the
 private RSA key which may be exported/imported by FTP.

  Just out of curiousity, why did you choose LINUX for this project?
 If security is such a high priority, I would have thought that OpenBSD
 would have been the operating system of choice.


   Scott Bennett, Comm. ASMELG, CFIAG
 **
 * Internet:   bennett at cs.niu.edu  *
 **
 * A well regulated and disciplined militia, is at all times a good  *
 * objection to the introduction of that bane of all free governments *
 * -- a standing army.   *
 *-- Gov. John Hancock, New York Journal, 28 January 1790 *
 **
Hi Scott,

First let me answer a related question which is why security is a high
priority for this project.  We've seen lots of talk on this list about
unscrupulous exit node operators.  I wanted a system for the
conscientious tor operator which would give a minimum amount of
information in order to preserve privacy while at the same time giving
enough that he/she could determine that everything is working ok.
Even an innocent utility like netstat, which can be used to make sure
that connections are being established by the tor server also reveal
what IP addresses are connecting --- my concern may be a bit
exaggerated, but I think you get the point.  But while on the one hand
minimizing information makes me feel good as a tor operator, it makes
me very nervous as a system administrator because I no longer have the
diagnotic tools that would tell me if something fishy is going on.
Its not a guarantee, but hardening the kernel/system tools lets me
sleep better.

Having said that, why GRSEC/PaX Linux over OpenBSD?  I run sereval
OpenBSD and hardened Gentoo servers with GRSEC/PaX Linux and I trust
both.  OpenBSD is impressively secure across the board, but I what I
like about GRSEC is RBAC which, when properly configured, strongly
restricts a daemon's capabilities.  For systems with a narrow goal, I
tend towards GRSEC.  (I haven't enabled RBAC yet in tor-ramdisk, but
that's next.)  I can also assure people that my student (Melissa) and
I keep our eyes on the upstream dependencies for any security issues
and will update tor-ramdisk accordingly.

I don't want to annoy the list, so I think if we want to continue
talking about the relative merits of the varoius hardening techniques
employed by both, stackgaps, ssp, w^x and the like, we should do so
privately.

Anthony G. Basile






-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIUBeAl5yvQNBFVTURAvjtAJ9g8cYxOGQAMdToPf6Fjl4Si+NSqwCeIrtQ
TYhDrrP+KpyOwhTdeBmAdBI=
=Qrlc
-END PGP SIGNATURE-



Re: Tor-ramdisk 20080606 released.

2008-06-11 Thread basile
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Marco Bonetti wrote:
 On Tue, June 10, 2008 20:06, basile wrote:
 We would like to announce a new release of Tor-ramdisk (version
 20080606), an i686 uClibc-based micro Linux distro (about 3.1MB
 ISO)
 from the changleog I've read that you're running an hardened 2.6
 kernel, which is it's size? I think that you can switch to 2.4
 (GRSEC/PAX still supports this tree) to slim it down further.

 by the way: really nice project :)

Ciao Marco, grazie per i complimenti.  (Sono italo-canadese e parlo
italiano.)

The kernel right now is 1.6 MB.  A lot of its size is because we're
supporting all 100MB and 1GB ethernet cards in a monolithic kernel.
Anyhow, that's a good suggestion.  Size isn't the biggest issue, but
if it slims it down, why not.

Anthony G. Basile


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIUBiXl5yvQNBFVTURAugDAJ9Bqw/kkY6D7iE0LGEzWxohgpDdTACfVKf/
QVppKYIfAP+ozlxuDGpTe40=
=BbYt
-END PGP SIGNATURE-



Re: How are hackers breaking Tor and trojan users?

2008-06-11 Thread Kyle Williams
snip


 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0948


snip

It would seem that Windows is the OS that has been the most problematic for
VMWare as a guest OS.
Gotta love Linux!

Also, it seems that the advanced features in VMWare are the points of
failure here.
Advanced/complex features always me nervous.

Coderman and I never trusted VMWare's ability to share a directory from the
host OS to the guest OS.
Now I'm really happy we didn't use that feature in JanusVM.


Re: How are hackers breaking Tor and trojan users?

2008-06-11 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Arrakis wrote:
 Foxyproxy+Polipo+Tor will not be immune.
 xB Machine and JanusVM will be immune to the attack.
 
 Steve
(snip)

Sounds like plain-vanilla proxy circumvention to me. Old news. =:oD

- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node kitsune
http://fenrisfox.livejournal.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=wNIe
-END PGP SIGNATURE-


Re: How are hackers breaking Tor and trojan users?

2008-06-11 Thread Robert Hogan
On Wednesday 11 June 2008 06:17:38 Roger Dingledine wrote:
snip

 He may also be referring to attacks where a local application (like the
 browser, but it doesn't have to be) can be tricked into connecting to
 your local Tor control port, like Kyle's attack from last year:
 http://archives.seul.org/or/announce/Sep-2007/msg0.html
 This was a great attack, but I think the latest versions of Torbutton
 and Vidalia make it a non-issue going forward. I would love to hear if
 you think otherwise.


On a default Tor installation from source, i.e. with no authentication 
mechanism 
enabled, it is still possible successfully to send commands to the controlport 
if the 'authenticate' command is not preceded by any garbage.

If someone were to develop a browser-based exploit that managed to get 
the 'authenticate', with no preceding bytes, to the controlport then they're 
in. 
I believe this is extremely difficult to do, and if such an attack was the 
subject of arrakis' and kyle's paper they would have much bigger fish to fry 
than just Tor.

One way of preventing such an attack, however unlikely, would be to mandate a 
conversation such as:

[EMAIL PROTECTED]:~$ telnet localhost 9051
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
Challenge is: 0a5f37d2edd284cb
0a5f37d2edd284cb
250 OK
authenticate
250 OK

In the above sequence the controller has had to inspect the challenge and 
parrot 
it back in order to be allowed issue an authenticate command.

As far as I'm aware this would defeat a html-form based attack of the sort 
released last year, since such attacks cannot process feedback from the port 
they're attacking. 



signature.asc
Description: This is a digitally signed message part.


Re: Tor-ramdisk 20080606 released.

2008-06-11 Thread Marco Bonetti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

basile wrote:
 Size isn't the biggest issue, but if it slims it down, why not.
I was already dreaming about a floppy sized version :-p

- --
Marco Bonetti
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
My webstuff: http://sidbox.homelinux.org/

My GnuPG key id: 0x86A91047
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIUB5zyPKw+YapEEcRAsSqAJ0XR0ssNNCS1oTAi6BTjKpKna/FNQCgk5jg
PWtxxUnRKiohyK4Gz5MLCU4=
=6jsF
-END PGP SIGNATURE-


Problem w/ Using tor(k) for Geostreaming Live-Videos

2008-06-11 Thread f-ighting . erich

Hi there,

here offers German Tv a live stream for soccer matches of the euro 2008! 

It is shielded by geostreaming! And even more, since due to some
technical stuff on their side, not all German IPs are allowed accidentally..

Thus I need to use tor in order to become another German IP via an exit node, 
so that I can also watch them in real time!

mplayer -playlist 
http_proxy://127.0.0.1:8118/http://wstreaming.zdf.de/zdf/veryhigh/080609_smm.asx

It seems that tor is checking out the url in the playlist file but then goes 
there straight without the proxy? I have tried also regular German
public proxies like http://www.publicproxyservers.com/page1.html but no success 
either.. It is an rtsp stream after all, the live video...

How can I run tor(k) so that I can view the games???

Erich

PS: Please reply to the list and to my email address so that I can read the 
replies before the daily digest with the others topics of this list..


Jetzt komfortabel bei Arcor-Digital TV einsteigen: Mehr Happy Ends, mehr 
Herzschmerz, mehr Fernsehen! Erleben Sie 50 digitale TV Programme und optional 
60 Pay TV Sender, einen elektronischen Programmführer mit Movie Star 
Bewertungen von TV Movie. Außerdem, aktuelle Filmhits und spannende Dokus in 
der Arcor-Videothek. Infos unter www.arcor.de/tv


Re: Problem w/ Using tor(k) for Geostreaming Live-Videos

2008-06-11 Thread Alexander W. Janssen
Works here with torify, though painfully slow. You might chose a stream
which uses less bandwidth:

$ ./torify mplayer -playlist
http://wstreaming.zdf.de/zdf/veryhigh/080609_smm.asx
...
STREAM_ASF, URL:
mms://c36000-o.w.core.cdn.streamfarm.net/36000zdf/ondemand/3546zdf/zdf/zdf/08/06/080609_smm_vh.wmv
Resolving c36000-o.w.core.cdn.streamfarm.net for AF_INET...
Connecting to server c36000-o.w.core.cdn.streamfarm.net[217.243.250.24]:
1755...
Connected
...

By the way, Switzerland-Turkey 1:1 :-)

Have fun,
Alex.

[EMAIL PROTECTED] schrieb:
 Hi there,
 
 here offers German Tv a live stream for soccer matches of the euro 2008! 
 
 It is shielded by geostreaming! And even more, since due to some
 technical stuff on their side, not all German IPs are allowed accidentally..
 
 Thus I need to use tor in order to become another German IP via an exit node, 
 so that I can also watch them in real time!
 
 mplayer -playlist 
 http_proxy://127.0.0.1:8118/http://wstreaming.zdf.de/zdf/veryhigh/080609_smm.asx
 
 It seems that tor is checking out the url in the playlist file but then 
 goes there straight without the proxy? I have tried also regular German
 public proxies like http://www.publicproxyservers.com/page1.html but no 
 success either.. It is an rtsp stream after all, the live video...
 
 How can I run tor(k) so that I can view the games???
 
 Erich
 
 PS: Please reply to the list and to my email address so that I can read the 
 replies before the daily digest with the others topics of this list..
 
 
 Jetzt komfortabel bei Arcor-Digital TV einsteigen: Mehr Happy Ends, mehr 
 Herzschmerz, mehr Fernsehen! Erleben Sie 50 digitale TV Programme und 
 optional 60 Pay TV Sender, einen elektronischen Programmführer mit Movie Star 
 Bewertungen von TV Movie. Außerdem, aktuelle Filmhits und spannende Dokus in 
 der Arcor-Videothek. Infos unter www.arcor.de/tv




signature.asc
Description: OpenPGP digital signature


Aw: Re: Problem w/ Using tor(k) for Geostreaming Live-Videos

2008-06-11 Thread f-ighting . erich
 
Sorry, MY mistake: This is the live stream url: 
http://wgeostreaming.zdf.de/encoder/livestream15_h.asx It also got a Dsl2000 
on www.zdf.de there 2!
the first one is one of their videos and they are not geostream protected! But 
when you use tork with it do you see while it is being streamed that
it is going thru tor or just the initial request! Am I right that when it is 
fully going thru tor one must constantly see the yellow pop-up video that tor 
is in usage..
In my case it seems to start with tor but then goes for the video straight 
there... Hence it does not work with the life video!

Do not the browser also pass on the very url to the extern prgrom like mplayer, 
hence to tor issue ???

@Alex: THX 4 the score, but wished I could see it also NOW!


- Original Nachricht 
Von: Alexander W. Janssen [EMAIL PROTECTED]
An:  or-talk@freehaven.net, [EMAIL PROTECTED]
Datum:   11.06.2008 22:02
Betreff: Re: Problem w/ Using tor(k) for Geostreaming Live-Videos

 Works here with torify, though painfully slow. You might chose a stream
 which uses less bandwidth:
 
 $ ./torify mplayer -playlist
 http://wstreaming.zdf.de/zdf/veryhigh/080609_smm.asx
 ...
 STREAM_ASF, URL:
 mms://c36000-o.w.core.cdn.streamfarm.net/36000zdf/ondemand/3546zdf/zdf/zdf/0
 8/06/080609_smm_vh.wmv
 Resolving c36000-o.w.core.cdn.streamfarm.net for AF_INET...
 Connecting to server c36000-o.w.core.cdn.streamfarm.net[217.243.250.24]:
 1755...
 Connected
 ...
 
 By the way, Switzerland-Turkey 1:1 :-)
 
 Have fun,
 Alex.
 
 [EMAIL PROTECTED] schrieb:
  Hi there,
  
  here offers German Tv a live stream for soccer matches of the euro 2008! 
  
  It is shielded by geostreaming! And even more, since due to some
  technical stuff on their side, not all German IPs are allowed
 accidentally..
  
  Thus I need to use tor in order to become another German IP via an exit
 node, so that I can also watch them in real time!
  
  mplayer -playlist
 http_proxy://127.0.0.1:8118/http://wstreaming.zdf.de/zdf/veryhigh/080609_smm
 .asx
  
  It seems that tor is checking out the url in the playlist file but then
 goes there straight without the proxy? I have tried also regular German
  public proxies like http://www.publicproxyservers.com/page1.html but no
 success either.. It is an rtsp stream after all, the live video...
  
  How can I run tor(k) so that I can view the games???
  
  Erich
  
  PS: Please reply to the list and to my email address so that I can read
 the replies before the daily digest with the others topics of this list..
  
  
  Jetzt komfortabel bei Arcor-Digital TV einsteigen: Mehr Happy Ends, mehr
 Herzschmerz, mehr Fernsehen! Erleben Sie 50 digitale TV Programme und
 optional 60 Pay TV Sender, einen elektronischen Programmführer mit Movie
 Star Bewertungen von TV Movie. Außerdem, aktuelle Filmhits und spannende
 Dokus in der Arcor-Videothek. Infos unter www.arcor.de/tv
 
 
 

Jetzt komfortabel bei Arcor-Digital TV einsteigen: Mehr Happy Ends, mehr 
Herzschmerz, mehr Fernsehen! Erleben Sie 50 digitale TV Programme und optional 
60 Pay TV Sender, einen elektronischen Programmführer mit Movie Star 
Bewertungen von TV Movie. Außerdem, aktuelle Filmhits und spannende Dokus in 
der Arcor-Videothek. Infos unter www.arcor.de/tv


Re: Aw: Re: Problem w/ Using tor(k) for Geostreaming Live-Videos

2008-06-11 Thread Robert Hogan
On Wednesday 11 June 2008 21:16:00 [EMAIL PROTECTED] wrote:
 Sorry, MY mistake: This is the live stream url:
 http://wgeostreaming.zdf.de/encoder/livestream15_h.asx It also got a
 Dsl2000 on www.zdf.de there 2! the first one is one of their videos and
 they are not geostream protected! But when you use tork with it do you see
 while it is being streamed that it is going thru tor or just the initial
 request! Am I right that when it is fully going thru tor one must
 constantly see the yellow pop-up video that tor is in usage.. In my case it
 seems to start with tor but then goes for the video straight there... Hence
 it does not work with the life video!

 Do not the browser also pass on the very url to the extern prgrom like
 mplayer, hence to tor issue ???


Hi Erich,

[EMAIL PROTECTED]:~$ lynx -dump 
http://wgeostreaming.zdf.de/encoder/livestream15_h.asx
ASX version = 3.0
Entry
Ref href 
= 
rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/encoder.geozdf.geoevent_h.wmv
 /
/Entry
/ASX

[EMAIL PROTECTED]:~$ torify mplayer -playlist 
rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/encoder.geozdf.geoevent_h.wmv


Or you can click on the 'Anonymous Telnet Session' entry in the 'Anonymize' 
window and run the last command there.

The last command failed for me because:

rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/encoder.geozdf.geoevent_h.wmv.
Not a Realmedia rtsp url. Trying standard rtsp protocol.
RTSP support requires the LIVE.COM Streaming Media libraries!

which I assume won't be a problem for you.

Robert

 @Alex: THX 4 the score, but wished I could see it also NOW!


 - Original Nachricht 
 Von: Alexander W. Janssen [EMAIL PROTECTED]
 An:  or-talk@freehaven.net, [EMAIL PROTECTED]
 Datum:   11.06.2008 22:02
 Betreff: Re: Problem w/ Using tor(k) for Geostreaming Live-Videos

  Works here with torify, though painfully slow. You might chose a stream
  which uses less bandwidth:
 
  $ ./torify mplayer -playlist
  http://wstreaming.zdf.de/zdf/veryhigh/080609_smm.asx
  ...
  STREAM_ASF, URL:
  mms://c36000-o.w.core.cdn.streamfarm.net/36000zdf/ondemand/3546zdf/zdf/zd
 f/0 8/06/080609_smm_vh.wmv
  Resolving c36000-o.w.core.cdn.streamfarm.net for AF_INET...
  Connecting to server c36000-o.w.core.cdn.streamfarm.net[217.243.250.24]:
  1755...
  Connected
  ...
 
  By the way, Switzerland-Turkey 1:1 :-)
 
  Have fun,
  Alex.
 
  [EMAIL PROTECTED] schrieb:
   Hi there,
  
   here offers German Tv a live stream for soccer matches of the euro
   2008!
  
   It is shielded by geostreaming! And even more, since due to some
   technical stuff on their side, not all German IPs are allowed
 
  accidentally..
 
   Thus I need to use tor in order to become another German IP via an exit
 
  node, so that I can also watch them in real time!
 
   mplayer -playlist
 
  http_proxy://127.0.0.1:8118/http://wstreaming.zdf.de/zdf/veryhigh/080609_
 smm .asx
 
   It seems that tor is checking out the url in the playlist file but
   then
 
  goes there straight without the proxy? I have tried also regular German
 
   public proxies like http://www.publicproxyservers.com/page1.html but no
 
  success either.. It is an rtsp stream after all, the live video...
 
   How can I run tor(k) so that I can view the games???
  
   Erich
  
   PS: Please reply to the list and to my email address so that I can read
 
  the replies before the daily digest with the others topics of this list..
 
   Jetzt komfortabel bei Arcor-Digital TV einsteigen: Mehr Happy Ends,
   mehr
 
  Herzschmerz, mehr Fernsehen! Erleben Sie 50 digitale TV Programme und
  optional 60 Pay TV Sender, einen elektronischen Programmführer mit Movie
  Star Bewertungen von TV Movie. Außerdem, aktuelle Filmhits und spannende
  Dokus in der Arcor-Videothek. Infos unter www.arcor.de/tv

 Jetzt komfortabel bei Arcor-Digital TV einsteigen: Mehr Happy Ends, mehr
 Herzschmerz, mehr Fernsehen! Erleben Sie 50 digitale TV Programme und
 optional 60 Pay TV Sender, einen elektronischen Programmführer mit Movie
 Star Bewertungen von TV Movie. Außerdem, aktuelle Filmhits und spannende
 Dokus in der Arcor-Videothek. Infos unter www.arcor.de/tv




signature.asc
Description: This is a digitally signed message part.


Aw: Re: Aw: Re: Problem w/ Using tor(k) for Geostreaming Live-Videos

2008-06-11 Thread f-ighting . erich
 
Sorry! I get a DNS leaking error during the process, too! Could that kill the 
geostreaming backtor? Where would I fix it? Would tork also tell me if me torrc 
is messed up??? 

I have setup tork as well to have an exit node as German IP!!

YET still:

torify mplayer 
rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/encoder.geozdf.geoevent_h.wmv
MPlayer dev-SVN-r25315

Can't init input joystick
mplayer: could not connect to socket
mplayer: No such file or directory
Failed to open LIRC support. You will not be able to use your remote control.

Playing 
rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/encoder.geozdf.geoevent_h.wmv.
Resolving c36000-ls.w.core.cdn.streamfarm.net for AF_INET...
Connecting to server c36000-ls.w.core.cdn.streamfarm.net[217.243.250.170]: 
554...
STREAM_LIVE555, URL: 
rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/encoder.geozdf.geoevent_h.wmv
Stream not seekable!
 file format detected.
--Unable to determine our source address: This computer has an invalid IP 
address: 0x0 --
Would be that geostreaming blocker, right?!

Erich

PS: This now works, that is the video to go via torify mplayer -playlist 
http://wstreaming.zdf.de/zdf/veryhigh/080609_smm.asx (Sine there is no 
geostreaming checker) Ok, I assume you guys have a well setup tork running, why 
is it not going with you, that you could acces the very live stream with any 
German exit node???  THX 4 all your quick help, guys!! tomorrow is already 
the next pair of games ;)

- Original Nachricht 
Von: Robert Hogan [EMAIL PROTECTED]
An:  or-talk@freehaven.net
Datum:   11.06.2008 22:44
Betreff: Re: Aw: Re: Problem w/ Using tor(k) for Geostreaming Live-Videos

 On Wednesday 11 June 2008 21:16:00 [EMAIL PROTECTED] wrote:
  Sorry, MY mistake: This is the live stream url:
  http://wgeostreaming.zdf.de/encoder/livestream15_h.asx It also got a
  Dsl2000 on www.zdf.de there 2! the first one is one of their videos and
  they are not geostream protected! But when you use tork with it do you
 see
  while it is being streamed that it is going thru tor or just the initial
  request! Am I right that when it is fully going thru tor one must
  constantly see the yellow pop-up video that tor is in usage.. In my case
 it
  seems to start with tor but then goes for the video straight there...
 Hence
  it does not work with the life video!
 
  Do not the browser also pass on the very url to the extern prgrom like
  mplayer, hence to tor issue ???
 
 
 Hi Erich,
 
 [EMAIL PROTECTED]:~$ lynx -dump 
 http://wgeostreaming.zdf.de/encoder/livestream15_h.asx
 ASX version = 3.0
 Entry
 Ref href 
 =
 rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/
 encoder.geozdf.geoevent_h.wmv /
 /Entry
 /ASX
 
 [EMAIL PROTECTED]:~$ torify mplayer -playlist 
 rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/e
 ncoder.geozdf.geoevent_h.wmv
 
 
 Or you can click on the 'Anonymous Telnet Session' entry in the 'Anonymize'
 
 window and run the last command there.
 
 The last command failed for me because:
 
 rtsp://c36000-ls.w.core.cdn.streamfarm.net/2R38HDlo3/36000zdf/live/3546zdf/e
 ncoder.geozdf.geoevent_h.wmv.
 Not a Realmedia rtsp url. Trying standard rtsp protocol.
 RTSP support requires the LIVE.COM Streaming Media libraries!
 
 which I assume won't be a problem for you.
 
 Robert
 
  @Alex: THX 4 the score, but wished I could see it also NOW!
 
 
  - Original Nachricht 
  Von: Alexander W. Janssen [EMAIL PROTECTED]
  An:  or-talk@freehaven.net, [EMAIL PROTECTED]
  Datum:   11.06.2008 22:02
  Betreff: Re: Problem w/ Using tor(k) for Geostreaming Live-Videos
 
   Works here with torify, though painfully slow. You might chose a stream
   which uses less bandwidth:
  
   $ ./torify mplayer -playlist
   http://wstreaming.zdf.de/zdf/veryhigh/080609_smm.asx
   ...
   STREAM_ASF, URL:
  
 mms://c36000-o.w.core.cdn.streamfarm.net/36000zdf/ondemand/3546zdf/zdf/zd
  f/0 8/06/080609_smm_vh.wmv
   Resolving c36000-o.w.core.cdn.streamfarm.net for AF_INET...
   Connecting to server
 c36000-o.w.core.cdn.streamfarm.net[217.243.250.24]:
   1755...
   Connected
   ...
  
   By the way, Switzerland-Turkey 1:1 :-)
  
   Have fun,
   Alex.
  
   [EMAIL PROTECTED] schrieb:
Hi there,
   
here offers German Tv a live stream for soccer matches of the euro
2008!
   
It is shielded by geostreaming! And even more, since due to some
technical stuff on their side, not all German IPs are allowed
  
   accidentally..
  
Thus I need to use tor in order to become another German IP via an
 exit
  
   node, so that I can also watch them in real time!
  
mplayer -playlist
  
  
 http_proxy://127.0.0.1:8118/http://wstreaming.zdf.de/zdf/veryhigh/080609_
  smm .asx
  
It seems that tor is checking out the url in the playlist file but
then
  
   goes there straight without the proxy? I have tried also 

Re: Phish filters on exit nodes

2008-06-11 Thread Geoff Down
The owner of one of the exit nodes has replied to tell me that OpenDNS 
has phish-filtering  on by default but that it is now turned off on 
that node.

Thanks to them and to all who helped me out.
GD
On 10 Jun 2008, at 03:31, downie wrote:



I've done as suggested by OtherGeoff and emailed the addresses found 
in the exit-node descriptions.
One was an abuse@ address though, which may or may not get through to 
the right person.


Thanks,
GD




Re: How are hackers breaking Tor and trojan users?

2008-06-11 Thread scar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Robert Hogan @ 2008/06/11 18:48:
 On Wednesday 11 June 2008 06:17:38 Roger Dingledine wrote:
 snip
 He may also be referring to attacks where a local application (like the
 browser, but it doesn't have to be) can be tricked into connecting to
 your local Tor control port, like Kyle's attack from last year:
 http://archives.seul.org/or/announce/Sep-2007/msg0.html
 This was a great attack, but I think the latest versions of Torbutton
 and Vidalia make it a non-issue going forward. I would love to hear if
 you think otherwise.

 
 On a default Tor installation from source, i.e. with no authentication 
 mechanism 
 enabled, it is still possible successfully to send commands to the 
 controlport 
 if the 'authenticate' command is not preceded by any garbage.
 
 If someone were to develop a browser-based exploit that managed to get 
 the 'authenticate', with no preceding bytes, to the controlport then they're 
 in. 
 I believe this is extremely difficult to do, and if such an attack was the 
 subject of arrakis' and kyle's paper they would have much bigger fish to fry 
 than just Tor.


like this? http://www.janusvm.com/goldy/vuln/tor-controlport.html
(posted earlier in the thread by Kyle Williams)
-BEGIN PGP SIGNATURE-

iD8DBQFIUG9eXhfCJNu98qARCAyvAJ9HaWGB9q/Ad5NLzeiFqROFAo9aqgCguhzw
nHGsyhDctHwJ0yuyjdE47kc=
=9xut
-END PGP SIGNATURE-


Re: How are hackers breaking Tor and trojan users?

2008-06-11 Thread coderman
On Wed, Jun 11, 2008 at 5:35 PM, scar [EMAIL PROTECTED] wrote:
 ...
 If someone were to develop a browser-based exploit that managed to get
 the 'authenticate', with no preceding bytes, to the controlport...

 like this? http://www.janusvm.com/goldy/vuln/tor-controlport.html

that is a standard HTTP post and thus sends HTTP request headers
before the textarea form payload.

what Robert indicated is that he thinks it is highly unlikely that you
could use a browser to connect and send AUTHENTICATE before anything
else, like the request headers.

the challenge / response handshake he suggested is an interesting
option for authenticating to the control port; it would indeed
eliminate any blind injection attacks, while still making it trivial
to use the control port legitimately.

best regards,


SPD talk: Simulating a Global Passive Adversary for Attacking Tor-like Anonymity Systems?

2008-06-11 Thread gojosan
I just noticed this talk at the Security and Privacy Day from May 2008. 
While I understand that Tor's thread model does not defend against a GPA
I am still curious what effect this attack can have against the current,
real Tor network?  

Simulating a Global Passive Adversary for Attacking Tor-like Anonymity
Systems
http://web.crypto.cs.sunysb.edu/spday/

We present a novel, practical, and effective mechanism for identifying
the IP address of Tor clients. We approximate an almost-global passive
adversary (GPA) capable of eavesdropping anywhere in the network by
using LinkWidth, a novel bandwidth-estimation technique. LinkWidth
allows network edge-attached entities to estimate the available
bandwidth in an arbitrary Internet link without a cooperating peer host,
router, or ISP. By modulating the bandwidth of an anonymous connection
(e.g., when the destination server or its router is under our control),
we can observe these fluctuations as they propagate through the Tor
network and the Internet to the end-user's IP address. Our technique
exploits one of the design criteria for Tor (trading off GPA-resistance
for improved latency/bandwidth over MIXes) by allowing well-provisioned
(in terms of bandwidth) adversaries to effectively become GPAs. Although
timing-based attacks have been demonstrated against
non-timing-preserving anonymity networks, they have depended either on a
global passive adversary or on the compromise of a substantial number of
Tor nodes. Our technique does not require compromise of any Tor nodes or
collaboration of the end-server (for some scenarios). We demonstrate the
effectiveness of our approach in tracking the IP address of Tor users in
a series of experiments. Even for an under-provisioned adversary with
only two network vantage points, we can accurately identify the end user
(IP address) in many cases. Furthermore, we show that a well-provisioned
adversary, using a topological map of the network, can trace-back the
path of an anonymous user in under 20 minutes. Finally, we can trace an
anonymous Location Hidden Service in approximately 120 minutes.

-gojosan





-- 
  
  [EMAIL PROTECTED]

-- 
http://www.fastmail.fm - Email service worth paying for. Try it for free