Re: 3 Hops

2010-11-17 Thread zzzjethro666

 


 Now, what about exiting Hidden Services and then exiting the internet 
connection? Are those in 3's and is there way to exit the internet that is safe 
and a way that isn't recommended?
 Always wondered about that. Once backing out of the Tor network, what is 
revealed? Is my real IP address now in the clear or simply clear for anyone to 
see? I shut down Vidalia, exit and everything goes away.

I don't understand this part of the question.

--Roger


 Sorry. I was wondering if when leaving the internet (closing out the browser), 
is there one way that is safer to do this, meaning not revealing information 
about oneself, as opposed to other ways. Maybe precautions to take? I assumed 
that if I connect to the internet using Tor then I am somewhat anonymous in 
that my IP address shows one that isn't mine and shows it to be in a different 
country altogether. But when I shut down the browser or turn Tor/Vidalia off 
there is a sudden and complete shut down or them. Does this mean there isn't an 
address left hanging out there in the internet somewhere? Sorry I am not more 
computer literate and concise with my language. I keep reading but it just 
doesn't like to stick, unlike my waist.

Something must show the router address shutting off, yes?

I hope this was a bit more clear.

 


 

 

-Original Message-
From: Roger Dingledine a...@mit.edu
To: or-talk@freehaven.net
Sent: Wed, Nov 17, 2010 2:23 am
Subject: Re: 3 Hops


On Tue, Nov 16, 2010 at 04:05:11AM -0500, zzzjethro...@email2me.net wrote:
  Hello to all.
 I use the Tor Browser Bundle on a USB as I can only access the internet from 
cafes in the country in which I live. Using a proxy is now illegal here.
 I have several questions.
  I know that Tor uses three (3) hops once it has accessed the internet. If I 
use Tor to connect to the internet (as I'm assuming the extracted Bundle does) 
is that done in a 3 hop manner?

Yes:

Tor client - entry guard - middle hop - exit relay - website

So your traffic goes through three Tor relays.

 When I am using Tor (in the Tor network), then my IP is shown as something 
other than mine and from a different country. Okay fine, according to 
torcheck.org
 
 But, what if I go directly to Hidden Services (the Hidden Wiki)? Is that done 
in 3 hops and what about inside, where the addresses are all .onion? Are those 
also done in 3's

http://www.torproject.org/docs/hidden-services.html.en

The circuit you use to the hidden service is six hops:

Tor client - entry guard - middle hop - rendezvous point -
middle hop* - middle hop* - entry guard* - Tor client*

And the ones with stars are chosen by the hidden service's Tor, so it
can get its anonymity from you. Basically, the hidden service design
glues two Tor circuits together.

and am I correct to assume that inside those .onion addresses everything is 
encrypted, meaning I am completely  anonymous while in there?

Everything is encrypted between your Tor client and the Tor client
that offers the hidden service. No external parties get to read it.
I wouldn't go so far as to call that completely anonymous, given that
the hidden service gets to read it and you don't know who that is.

 Now, what about exiting Hidden Services and then exiting the internet 
connection? Are those in 3's and is there way to exit the internet that is safe 
and a way that isn't recommended?
 Always wondered about that. Once backing out of the Tor network, what is 
revealed? Is my real IP address now in the clear or simply clear for anyone to 
see? I shut down Vidalia, exit and everything goes away.

I don't understand this part of the question.

--Roger

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

 


Re: IPTables transparent configuration

2010-11-17 Thread alpal.mailingl...@gmail.com
Curt,

I will try and spur some discussion :)

I'm not also sure that forcing connections to the tor port will work. Take for 
example an http request... you are now forcing that to a tor port, which wants 
to talk socks right? I would have thought you would need some sort of 
transparent http proxy setup which was configured to use tor for its external 
comms?

Al


- Reply message -
From: Curt Shaffer cshaf...@gmail.com
Date: Tue, Nov 16, 2010 18:19
Subject: IPTables transparent configuration
To: or-t...@seul.org

I have been searching the documentation and Internet for days on this
setup. Let me give some background first.

In this network (172.16.10.0/24) I have a couple of clients. Their
default gateway is 172.16.10.1. This system is a Linux server.

The Linux server has a LAN IP of 172.16.10.1 and a WAN IP of
10.0.0.23. This server is also running TOR. The WAN IP address of
this system is actually being NATTED again by a firewall to an
external IP address.

I want all traffic on the 172.16.10.0/24 network to use this Linux
server as their default gateway. In that gateway, I want IPTables to
send all of the traffic from that subnet through TOR.

If use IPTables to NAT the addresses like this:

eth0=WAN
eth1=LAN

iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
iptables -A FORWARD -i eth0 -o eth1 -m state --state
RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT


General network connectivity works.

If I introduce TOR with IPTables like this:

iptables -t nat -A OUTPUT -p tcp -m tcp -j REDIRECT --to-ports 9040
iptables -t filter -A OUTPUT -p tcp -m tcp --dport 9040 -j ACCEPT

TOR connectivity works from the Linux server, but all of the clients
on the 172.16.10.0/24 network no longer work at all. No NAT to the
general Internet, no TOR, no nothing.

I'm thinking this may be an IPTables problem, but I wanted to post
this to this list just to see if anyone else has accomplished such a
setup. If you have, please let me know what I may be doing wrong. If
you need more detailed information, please ask.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: IPTables transparent configuration

2010-11-17 Thread Curt Shaffer
Thanks for the input Al. I actually got this to work a little bit after posting 
this. That always seems to be the case :). For the list and anyone else who may 
want to do this, I'm posting my iptables config here.

sudo iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
sudo iptables -A FORWARD -i eth0 -o eth1 -m state --state RELATED,ESTABLISHED 
-j ACCEPT
sudo iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT
sudo iptables -t nat -A PREROUTING -p tcp -s 172.16.10.0/24 -j DNAT 
--to-destination 10.0.0.23:9040
sudo iptables -t nat -A PREROUTING -p icmp -s 172.16.10.0/24 -j DNAT 
--to-destination 10.0.0.23:9040
sudo iptables -t nat -A PREROUTING -p udp -s 172.16.10.0/24 -j DNAT 
--to-destination 10.0.0.23:53


Now I'm not sure I need all of this. I'm going to revisit it later today to 
ensure the best rule set, but I have verified that this works 100%. 

Curt

On Nov 17, 2010, at 4:31 AM, alpal.mailingl...@gmail.com wrote:

 Curt,
 
 I will try and spur some discussion :)
 
 I'm not also sure that forcing connections to the tor port will work. Take 
 for example an http request... you are now forcing that to a tor port, which 
 wants to talk socks right? I would have thought you would need some sort of 
 transparent http proxy setup which was configured to use tor for its external 
 comms?
 
 Al
 
 
 - Reply message -
 From: Curt Shaffer cshaf...@gmail.com
 Date: Tue, Nov 16, 2010 18:19
 Subject: IPTables transparent configuration
 To: or-t...@seul.org
 
 I have been searching the documentation and Internet for days on this
 setup. Let me give some background first.
 
 In this network (172.16.10.0/24) I have a couple of clients. Their
 default gateway is 172.16.10.1. This system is a Linux server.
 
 The Linux server has a LAN IP of 172.16.10.1 and a WAN IP of
 10.0.0.23. This server is also running TOR. The WAN IP address of
 this system is actually being NATTED again by a firewall to an
 external IP address.
 
 I want all traffic on the 172.16.10.0/24 network to use this Linux
 server as their default gateway. In that gateway, I want IPTables to
 send all of the traffic from that subnet through TOR.
 
 If use IPTables to NAT the addresses like this:
 
 eth0=WAN
 eth1=LAN
 
 iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
 iptables -A FORWARD -i eth0 -o eth1 -m state --state
 RELATED,ESTABLISHED -j ACCEPT
 iptables -A FORWARD -i eth1 -o eth0 -j ACCEPT
 
 
 General network connectivity works.
 
 If I introduce TOR with IPTables like this:
 
 iptables -t nat -A OUTPUT -p tcp -m tcp -j REDIRECT --to-ports 9040
 iptables -t filter -A OUTPUT -p tcp -m tcp --dport 9040 -j ACCEPT
 
 TOR connectivity works from the Linux server, but all of the clients
 on the 172.16.10.0/24 network no longer work at all. No NAT to the
 general Internet, no TOR, no nothing.
 
 I'm thinking this may be an IPTables problem, but I wanted to post
 this to this list just to see if anyone else has accomplished such a
 setup. If you have, please let me know what I may be doing wrong. If
 you need more detailed information, please ask.
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 
 



smime.p7s
Description: S/MIME cryptographic signature


Re: Tor 0.2.1.26-1~~lenny+1: segfault with libcryto.so.0.9.8

2010-11-17 Thread Nick Mathewson
On Fri, Nov 12, 2010 at 5:49 PM, Paul Menzel
paulepan...@users.sourceforge.net wrote:
 Dear Tor folks,


 I noticed that Tor had crashed on my system. I am using Debian Lenny
 with Tor 0.2.1.26-1~~lenny+1. The only thing I could find out about this
 crash is the following line running `dmesg`.

        $ dmesg
        […]
        [Several of these Treason uncloaked messages as you can see some 
 seconds before the crash. I obfuscated the IP addresses.]
        [3301769.746795] TCP: Treason uncloaked! Peer 
 xxx.xxx.xxx.xxx:60659/42859 shrinks window 1343914705:1343916145. Repaired.
        [3413085.371871] TCP: Treason uncloaked! Peer 
 yyy.yyy.yyy.yyy:19595/45969 shrinks window 2416591117:2416591857. Repaired.
        [3604257.970658] tor[22506]: segfault at 21d4fc5 ip 7f1e78ba4ea6 sp 
 41188920 error 4 in libcrypto.so.0.9.8[7f1e78b21000+172000]
        [3604257.970707] type=1701 audit(1289305397.030:2): auid=4294967295 
 uid=102 gid=104 ses=4294967295 pid=22506 comm=tor sig=11

 So it could also be libcrypto is the culprit. `libssl0.9.8` is running
 with `0.9.8g-15+lenny8` as version.

 Is that a known problem? What other information can I provide to solve
 that? Unfortunately I have not found out how to reproduce it yet.

Without more information, there's not much info to go on there to
diagnose the problem.  Generally, to debug a segfault, we need a stack
trace.  To get one of those, make sure you're running Tor with
coredumps enabled, and use gdb to get a trace if Tor crashes again.
There are some decent online docs on how to do this; a little
searching should turn them up.

(You can ignore the Treason Uncloaked! junk.  That's the Linux
kernel being overly dramatic about peers that don't do TCP windows
right or something.)

hth,
-- 
Nick
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor 0.2.1.26-1~~lenny+1: segfault with libcryto.so.0.9.8

2010-11-17 Thread Roger Dingledine
On Wed, Nov 17, 2010 at 11:45:32AM -0500, Nick Mathewson wrote:
  I noticed that Tor had crashed on my system. I am using Debian Lenny
  with Tor 0.2.1.26-1~~lenny+1. The only thing I could find out about this
  crash is the following line running `dmesg`.
 
 Without more information, there's not much info to go on there to
 diagnose the problem.  Generally, to debug a segfault, we need a stack
 trace.  To get one of those, make sure you're running Tor with
 coredumps enabled, and use gdb to get a trace if Tor crashes again.

On Debian, you want to apt-get install tor-dbg, so you get the symbols
for the Tor binary.

You might even have a core file already sitting in your datadirectory,
which I think is /var/lib/tor/

--Roger

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: IPTables transparent configuration

2010-11-17 Thread intrigeri
Hi,

Curt Shaffer wrote (17 Nov 2010 12:53:27 GMT) :
 sudo iptables -t nat -A PREROUTING -p tcp -s 172.16.10.0/24 -j DNAT 
 --to-destination
 10.0.0.23:9040
 sudo iptables -t nat -A PREROUTING -p icmp -s 172.16.10.0/24 -j DNAT 
 --to-destination
 10.0.0.23:9040
 sudo iptables -t nat -A PREROUTING -p udp -s 172.16.10.0/24 -j DNAT 
 --to-destination
 10.0.0.23:53

Tor is able to transport TCP only.
If you really want these LAN boxes to *only* access the Internet over
Tor, you have to forbid them anything other than TCP.

If I am not mistaken, the rules you are showing us allow any UDP
traffic to go out (without Tor) unless its destination port is !=53.
I'm not sure this is really what you want to achieve.

Feel free to have a look to the firewall we use in T(A)ILS as a source
of inspiration:


http://git.immerda.ch/?p=amnesia.git;a=blob;f=config/chroot_local-includes/etc/firewall.conf

http://git.immerda.ch/?p=amnesia.git;a=blob;f=config/chroot_local-includes/etc/firewall6.conf

Bye,
--
  intrigeri intrig...@boum.org
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ 
https://gaffer.ptitcanardnoir.org/intrigeri/otr-fingerprint.asc
  | Every now and then I get a little bit restless
  | and I dream of something wild.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: IPTables transparent configuration

2010-11-17 Thread intrigeri
Hi,

alpal.mailingl...@gmail.com wrote (17 Nov 2010 09:31:21 GMT) :
 I'm not also sure that forcing connections to the tor port will
 work. Take for example an http request... you are now forcing that
 to a tor port, which wants to talk socks right?

He seems to be trying to redirect such a connection to the Tor
transparent proxy he seems to have configured to listen on port 9040,
rather than to the Tor Socks proxy that is generally configured on
port 9050.

Bye,
--
  intrigeri intrig...@boum.org
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ 
https://gaffer.ptitcanardnoir.org/intrigeri/otr-fingerprint.asc
  | Then we'll come from the shadows.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: IPTables transparent configuration

2010-11-17 Thread Curt Shaffer
I was looking to send all traffic through Tor. The UDP rule was taken off of 
the Tor Transparent Configuration documentation. I have Tor DNSPorts and 
DNSListenAddress set. I realize this was for DNS requests, but I was kinda 
hoping to pipe everything through. I will look at just dropping all other 
traffic. 

Thanks for sharing your link to your example config as well!

Curt
On Nov 17, 2010, at 12:37 PM, intrigeri wrote:

 Hi,
 
 Curt Shaffer wrote (17 Nov 2010 12:53:27 GMT) :
 sudo iptables -t nat -A PREROUTING -p tcp -s 172.16.10.0/24 -j DNAT 
 --to-destination
 10.0.0.23:9040
 sudo iptables -t nat -A PREROUTING -p icmp -s 172.16.10.0/24 -j DNAT 
 --to-destination
 10.0.0.23:9040
 sudo iptables -t nat -A PREROUTING -p udp -s 172.16.10.0/24 -j DNAT 
 --to-destination
 10.0.0.23:53
 
 Tor is able to transport TCP only.
 If you really want these LAN boxes to *only* access the Internet over
 Tor, you have to forbid them anything other than TCP.
 
 If I am not mistaken, the rules you are showing us allow any UDP
 traffic to go out (without Tor) unless its destination port is !=53.
 I'm not sure this is really what you want to achieve.
 
 Feel free to have a look to the firewall we use in T(A)ILS as a source
 of inspiration:
 

 http://git.immerda.ch/?p=amnesia.git;a=blob;f=config/chroot_local-includes/etc/firewall.conf

 http://git.immerda.ch/?p=amnesia.git;a=blob;f=config/chroot_local-includes/etc/firewall6.conf
 
 Bye,
 --
  intrigeri intrig...@boum.org
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ 
 https://gaffer.ptitcanardnoir.org/intrigeri/otr-fingerprint.asc
  | Every now and then I get a little bit restless
  | and I dream of something wild.
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/



smime.p7s
Description: S/MIME cryptographic signature


Tor 0.2.2.18-alpha is out

2010-11-17 Thread Roger Dingledine
Tor 0.2.2.18-alpha fixes several crash bugs that have been nagging
us lately, makes unpublished bridge relays able to detect their IP
address, and fixes a wide variety of other bugs to get us much closer
to a stable release.

https://www.torproject.org/download/download

Packages will be appearing over the next few days.

Changes in version 0.2.2.18-alpha - 2010-11-16
  o Major bugfixes:
- Do even more to reject (and not just ignore) annotations on
  router descriptors received anywhere but from the cache. Previously
  we would ignore such annotations at first, but cache them to disk
  anyway. Bugfix on 0.2.0.8-alpha. Found by piebeer.
- Do not log messages to the controller while shrinking buffer
  freelists. Doing so would sometimes make the controller connection
  try to allocate a buffer chunk, which would mess up the internals
  of the freelist and cause an assertion failure. Fixes bug 1125;
  fixed by Robert Ransom. Bugfix on 0.2.0.16-alpha.
- Learn our external IP address when we're a relay or bridge, even if
  we set PublishServerDescriptor to 0. Bugfix on 0.2.0.3-alpha,
  where we introduced bridge relays that don't need to publish to
  be useful. Fixes bug 2050.
- Maintain separate TLS contexts and certificates for incoming and
  outgoing connections in bridge relays. Previously we would use the
  same TLS contexts and certs for incoming and outgoing connections.
  Bugfix on 0.2.0.3-alpha; addresses bug 988.
- Maintain separate identity keys for incoming and outgoing TLS
  contexts in bridge relays. Previously we would use the same
  identity keys for incoming and outgoing TLS contexts. Bugfix on
  0.2.0.3-alpha; addresses the other half of bug 988.
- Avoid an assertion failure when we as an authority receive a
  duplicate upload of a router descriptor that we already have,
  but which we previously considered an obsolete descriptor.
  Fixes another case of bug 1776. Bugfix on 0.2.2.16-alpha.
- Avoid a crash bug triggered by looking at a dangling pointer while
  setting the network status consensus. Found by Robert Ransom.
  Bugfix on 0.2.2.17-alpha. Fixes bug 2097.
- Fix a logic error where servers that _didn't_ act as exits would
  try to keep their server lists more aggressively up to date than
  exits, when it was supposed to be the other way around. Bugfix
  on 0.2.2.17-alpha.

  o Minor bugfixes (on Tor 0.2.1.x and earlier):
- When we're trying to guess whether we know our IP address as
  a relay, we would log various ways that we failed to guess
  our address, but never log that we ended up guessing it
  successfully. Now add a log line to help confused and anxious
  relay operators. Bugfix on 0.1.2.1-alpha; fixes bug 1534.
- Bring the logic that gathers routerinfos and assesses the
  acceptability of circuits into line. This prevents a Tor OP from
  getting locked in a cycle of choosing its local OR as an exit for a
  path (due to a .exit request) and then rejecting the circuit because
  its OR is not listed yet. It also prevents Tor clients from using an
  OR running in the same instance as an exit (due to a .exit request)
  if the OR does not meet the same requirements expected of an OR
  running elsewhere. Fixes bug 1859; bugfix on 0.1.0.1-rc.
- Correctly describe errors that occur when generating a TLS object.
  Previously we would attribute them to a failure while generating a
  TLS context. Patch by Robert Ransom. Bugfix on 0.1.0.4-rc; fixes
  bug 1994.
- Enforce multiplicity rules when parsing annotations. Bugfix on
  0.2.0.8-alpha. Found by piebeer.
- Fix warnings that newer versions of autoconf produced during
  ./autogen.sh. These warnings appear to be harmless in our case,
  but they were extremely verbose. Fixes bug 2020.

  o Minor bugfixes (on Tor 0.2.2.x):
- Enable protection of small arrays whenever we build with gcc
  hardening features, not only when also building with warnings
  enabled. Fixes bug 2031; bugfix on 0.2.2.14-alpha. Reported by keb.

  o Minor features:
- Make hidden services work better in private Tor networks by not
  requiring any uptime to join the hidden service descriptor
  DHT. Implements ticket 2088.
- Rate-limit the your application is giving Tor only an IP address
  warning. Addresses bug 2000; bugfix on 0.0.8pre2.
- When AllowSingleHopExits is set, print a warning to explain to the
  relay operator why most clients are avoiding her relay.
- Update to the November 1 2010 Maxmind GeoLite Country database.

  o Code simplifications and refactoring:
- When we fixed bug 1038 we had to put in a restriction not to send
  RELAY_EARLY cells on rend circuits. This was necessary as long
  as relays using Tor 0.2.1.3-alpha through 0.2.1.18-alpha were
  active. Now remove this obsolete 

P2P over Tor [was: Anomos - anonBT]

2010-11-17 Thread grarpamp
 
 It's my understanding that BitTorrent is less of a bandwidth hog as it
 is a connections/circuits hog. These are expensive to create and you
 can't balance your BitTorrenting by hosting a high-bandwidth node
 because to have 0 net effect on the network, you'd have to host a
 circuit's worth of nodes for every circuit you're using for BitTorrent
 connections.
 

 Bandwidth is surely finite but I'd bet safe to calculate. I would think
 it easy to reach zero net, starting at minimally six times your use.

 Circuits are a separate issue. AFAIK, they are just consumers of state
 on the nodes... CPU, RAM, TCP, etc. I can see where adding a node
 [any node] in at 6x [or any x] would help distribute that load as well.

 Other than between the tracker, BT spawns a bunch of bandwith filled
 pipes, up to some number of peers limit in the app. What is, if any, the
 relationship between IPv4 TCP flows and Tor circuit usage? That could
 help calculate the replacement value for non-bandwidth node resources.

 Am I wrong, Tor Old Ones?

 I sure haven't got that far in reading to guess yet, so yeah, if someone
 has a hunch, that would be interesting. Maybe 6 nodes that add up to
 6x bandwidth or something.

 Not sure about anyone else, but I do think that with the way things
 are going on the internet, more people will be looking to anonymous
 systems in general to supplant it for their 'filesharing' and other
 interests. That accumulation might be unstoppable.  So hopefully
 those sorts of uses are being thought after and researched/planned/coded
 for.


Thought about the non-bandwidth parts of the load some more...

There doesn't seem to be a need to quantify it with a numerical
estimate of what amount of resource giveback would yield a zero sum
impact for those parts.

Say you're using 'filesharing' in the form of BitTorrent. Your
single PC, when operating as a non-exit relay [1], can surely handle
many times the trivial sum of all the various non-bandwidth resources
described above that you would use along the way. Think of simulating
a TorNet by running all the needed directories, nodes and operations
bound to IP aliases on one PC. Conservatively say [3] you will have
up to 100 P2P circuits at 6 hops each... Any PC should be able to
handle that entire load with lots of headroom.

So long as users are covering their bandwidth with giveback [1], I
think it's safe to assume the rest of their overhead is also covered
by the addition of that node to the network.

I no longer think the standard reply/FAQ regarding such uses of
Tor, excepting [2], should be an unqualified: Tor can't handle it,
so don't.

The answer should be that... so long as such giveback [1] is:
- understood by users to be a necessary 'techical' condition to
 support their use of Tor for bulk transfer.
- indeed provided back to the network as a 'moral' condition by
 those same users.

... they should then feel free to use Tor for whatever they want.
BitTorrent, P2P, FTP, streaming media, chat, etc. And OnionCat is
the shim that will allow the apps to communicate seamlessly.

Though not as simple a response, and requiring donation by the user,
it seems to be the more reasoned one.

Further thoughts welcomed.


[1] It's already established that in order for your use of Tor
bandwidth to be zero sum (in the Hidden Service -- Hidden Service
case) you need to give back at least 6x your use. So you will already
be running said relay (for the purpose of bandwidth giveback).

[2] Isn't there a proposal out there to better handle magnitudes
more users [and avoid shutdown points] by getting rid of the
directories and self-hosting the TorNet into a DHT or something?

[3] As the average bandwidth that most users [dsl, cable] will be
able to give back is small, transfers will be slow anyways. Which
may limit adoption [P2P peer counts]. Regardless, the limiting
factor is really only bandwidth because (dice up the giveback/6 you
can legitimately use... amongst P2P peer circuits however you want,
ie): dsl/cable = 1 x 256Kb/6 = 10 x 25.6Kb/6 = 100 x 2.56Kb/6
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Scalability and fairness [was: P2P over Tor [was: Anomos - anonBT]]

2010-11-17 Thread coderman
On Wed, Nov 17, 2010 at 3:02 PM, grarpamp grarp...@gmail.com wrote:
 ...
 So long as users are covering their bandwidth with giveback [1], I
 think it's safe to assume the rest of their overhead is also covered
 by the addition of that node to the network.

there's always a catch. ;)


 ...
 [1] It's already established that in order for your use of Tor
 bandwidth to be zero sum (in the Hidden Service -- Hidden Service
 case) you need to give back at least 6x your use. So you will already
 be running said relay (for the purpose of bandwidth giveback).

 [2] Isn't there a proposal out there to better handle magnitudes
 more users [and avoid shutdown points] by getting rid of the
 directories and self-hosting the TorNet into a DHT or something?

Tor would become something else, perhaps UDP Tor.

there has been more written on that subject than i can do justice
here.  i'm fond of DTLS signalling for encapsulated IPsec telescopes
with SFQ and DLP transport for multi-homed SCTP endpoints, but that is
just one of many possibilities.

a grand unified datagram Tor spec has yet to be written...
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor 0.2.2.18-alpha is out

2010-11-17 Thread Geoff Down


On Wed, 17 Nov 2010 17:05 -0500, Roger Dingledine a...@mit.edu
wrote:
 Tor 0.2.2.18-alpha fixes several crash bugs that have been nagging
 us lately, makes unpublished bridge relays able to detect their IP
 address, and fixes a wide variety of other bugs to get us much closer
 to a stable release.
 
 https://www.torproject.org/download/download

Thanks. The Tor-only packages for OSX PPC seem to have disappeared since
the website was revamped (nice look btw).
Is there a more recent version than 0.2.2.15-alpha available to test?
GD

-- 
http://www.fastmail.fm - Accessible with your email software
  or over the web

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor 0.2.2.18-alpha is out

2010-11-17 Thread Justin Aplin


On Nov 17, 2010, at 7:38 PM, Geoff Down wrote:


Is there a more recent version than 0.2.2.15-alpha available to test?
GD


I'm interested in this as well, as issues with (read: nasty emails  
from) one of the net admins at my local ISP have reduced me to running  
only my Orlando-based PPC exit. Normally I'm anal-retentive about  
keeping up with the latest updates, so being passed over by the past  
few releases has made me... twitchy.


~Justin Aplin



Re: Tor 0.2.2.18-alpha is out

2010-11-17 Thread Roger Dingledine
On Wed, Nov 17, 2010 at 07:50:05PM -0500, Roger Dingledine wrote:
 If by Tor-only packages you mean the old expert packages, we decided
 to drop support for them:

For background, see
https://trac.torproject.org/projects/tor/ticket/1274

Sounds like we should do a better job of declaring a policy on what
platforms we're trying to make work, and a better job of getting feedback
from users when we ponder changes in this policy. Last I heard, Nick
was working on a proposed policy draft so we can at least get a handle
on where things stand currently. The challenge is that we have neither
enough developers nor enough (trustworthy) build machines to support
everything out there.

--Roger

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Scalability and fairness [was: P2P over Tor [was: Anomos - anonBT]]

2010-11-17 Thread grarpamp
 So long as users are covering their bandwidth with giveback [1], I
...
 - indeed provided back to the network as a 'moral' condition by
 those same users.
...
 case) you need to give back at least 6x your use. So you will already

 there's always a catch. ;)

Heh, yeah, no one ever suggested this would happen, as the leecher
mindset abounds :) It just seemed useful to actually ask for, examine
and collate the parameters under which it *could* happen successfully.
And the areas where Tor, or any other anonymous system, is permanently
incapable as a limitation of architecture. Or where the system
actually could be enhanced to better support what some users are
already going to use it for regardless of disencouragement.

It should be noted that one reason people ask about using anon
systems for such traffic is because they feel risk when doing so
in the clear. Either as consumer, distributor or participant. Being
anonymous may actually be the key they need that allows them to run
the seed/server/distributor side without fear. In other words...
I'd bet it's called 'filesharing' because most people actually *do*
want to give back and share, albeit safely.

Is anonymity the missing link to the global filesharing utopia
invisioned be all the various sharing systems? Who knows. We'll
find out.

 [2] Isn't there a proposal out there to better handle magnitudes
 more users [and avoid shutdown points] by getting rid of the
 directories and self-hosting the TorNet into a DHT or something?

 Tor would become something else, perhaps UDP Tor.

 there has been more written on that subject than i can do justice

Wish the mbox or maildir archives were available/mirrored for easy
search, reading, reference and reply using native mail clients :)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor 0.2.2.18-alpha is out

2010-11-17 Thread Justin Aplin


On Nov 17, 2010, at 7:55 PM, Roger Dingledine wrote:


On Wed, Nov 17, 2010 at 07:50:05PM -0500, Roger Dingledine wrote:
If by Tor-only packages you mean the old expert packages, we  
decided

to drop support for them:


For background, see
https://trac.torproject.org/projects/tor/ticket/1274

Sounds like we should do a better job of declaring a policy on what
platforms we're trying to make work, and a better job of getting  
feedback

from users when we ponder changes in this policy. Last I heard, Nick
was working on a proposed policy draft so we can at least get a handle
on where things stand currently. The challenge is that we have neither
enough developers nor enough (trustworthy) build machines to support
everything out there.



I missed that line in the OP. Since my particular machine runs a  
single user and is logged in 24/7, I simply run the Vidalia package as  
a relay and set it to start on login. Since this package is the one I  
imagine the majority of Tor users on OSX will be running, it would be  
nice to see it updated to 2.2.18a/0.2.10. Not to mention that the  
switch to Intel processors was a relatively recent one, as far as  
computer turnover goes, and there are still plenty of users out there  
running PPC machines.


I agree that dropping the expert packages might be a good idea, but I  
don't see a reason that the Vidalia bundles should fall behind.


~Justin Aplin
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor 0.2.2.18-alpha is out

2010-11-17 Thread Andrew Lewman
On Wed, 17 Nov 2010 20:11:44 -0500
Justin Aplin jmap...@ufl.edu wrote:
 I agree that dropping the expert packages might be a good idea, but
 I don't see a reason that the Vidalia bundles should fall behind.

The reason for the delay in packages is the powerpc build machine died
a melting death when the internal fan died over a weekend.  A donor gave
us a powerpc mac mini for a build machine running 10.5.  It's in
process of being turned into the powerpc build machine.  Alternatively,
building from source is very easy once the dependencies are installed.

I'm not sure how well 10.5 binaries work on 10.3 and 10.4 (even with
osx compiles set for 10.3 and 10.4 compatibility).  I guess we'll find
out.

-- 
Andrew
pgp 0x31B0974B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Scalability and fairness [was: P2P over Tor [was: Anomos - anonBT]]

2010-11-17 Thread Andrew Lewman
On Wed, 17 Nov 2010 20:03:58 -0500
grarpamp grarp...@gmail.com wrote:

 Wish the mbox or maildir archives were available/mirrored for easy
 search, reading, reference and reply using native mail clients :)

...I wish people would stop cross-posting between -dev and -talk...;)

-- 
Andrew
pgp 0x31B0974B
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Scalability and fairness [was: P2P over Tor [was: Anomos - anonBT]]

2010-11-17 Thread coderman
On Wed, Nov 17, 2010 at 5:20 PM, Andrew Lewman and...@torproject.org wrote:
 ...I wish people would stop cross-posting between -dev and -talk...;)

mea culpa; i shall curb my reply-all enthusiasm!

grarpamp: i'll follow this up with links for  various UDP Tor papers
and discussions. i've got a bunch of bookmarks somewhere...
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Scalability and fairness [was: P2P over Tor [was: Anomos - anonBT]]

2010-11-17 Thread grarpamp
 Wish the mbox or maildir archives were available/mirrored for easy
 search, reading, reference and reply using native mail clients :)

 ...I wish people would stop cross-posting between -dev and -talk...;)

Hey, I might just be inclined to trade detailed examination and separation
of message content, as well as what comes up in 'group reply' to prior
messages, for that ;-) I do miss a handful now and then.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Scalability and fairness [was: P2P over Tor [was: Anomos - anonBT]]

2010-11-17 Thread grarpamp
 grarpamp: i'll follow this up with links for  various UDP Tor papers
 and discussions. i've got a bunch of bookmarks somewhere...

You don't have to or anything like that, or maybe for the wiki. I still
need to check out the project site and AnonBib more and will
probably scrape the web archives into a maildir someday too.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


How to install Tor on iPod touch 4th gen. w/ iOS 4.1?

2010-11-17 Thread Moses
Hi,

I would like to install Tor on my iPod touch 4th gen. with iOS 4.1.

The iPod touch has been jailbreaked with limera1n. After googled on
the web for a while, I found this instruction [0]. but the install
package download link [1] seems is broken now. So is there anyone has
a alternative download link, or, is there any better way to make Tor
running on my iPod touch?

Thanks in advance.

Best Regards.

[0] http://sid77.slackware.it/iphone/howto/
[1] http://sid77.slackware.it/static/sid77.slackware.it_1-2_iphoneos-arm.deb
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/