Balancing?

2011-02-15 Thread Jon
With the latest TOR version and the increased in nodes, with the new
balancing in the new version, does it mean that it would be possible
that the volume load would have been decrease from what it was on some
of the nodes?

Maybe a better explanation I am trying to ask is before the updated
version, the amt of band usage was a lot higher than it is now. I
suspect with the more nodes we have n ow that might explain some of us
not being used like we were, but does the new balancing be making that
adjustment also by distributing the users thru out the nodes better?.

Hopefully that explains it better what I am trying to ask.

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Sent e-mails going into spam folders.

2011-02-08 Thread Jon
On Tue, Feb 8, 2011 at 2:07 AM, Matthew pump...@cotse.net wrote:




 I didn't explain myself very well.

 I meant that if matt...@yahoo.com or matt...@hotmail.com or
 matt...@gmail.com or matt...@aol.com sends an e-mail to da...@yahoo.com or
 da...@gmail.com or da...@aol.com or da...@hotmail.com does the fact that the
 sending IP will be an exit node affect the likelihood that the e-mail will
 end up in the spam folder rather than the inbox?

 IOW: are webmail providers assuming that in some cases tor nodes are spammy?
 ***

The only time I have any  somthing end up in the spam folder from any
of those emial ip addys, is if something in the body is considered
spam. Which is set up thru the spam filters. other wise everything
gets thru. I have a lot of email coming thru from all those email ip
addys. tho aol is a lot lower.

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Could not rotate onionkey

2011-02-08 Thread Jon
Sometime earlier this morning, in checking the logs, I notice that I
am suddenly getting the following error and warnings.:

error: Couldn't write generated onion key to :  c\\secret_onion_key
warning: couldn't open c:\***\secret_onion_key.tmp
warning: couldn't rotate onion key

any  ideas or is this a possible bug?
I am running the latest Tor v0.2.1.29

In trying to reboot, it appears that It has gotten corrupted:

Videlia would even start, showing the errors on startup:

warning: error creating directory c\*\cached-status: No such
file or directory
warning: failed to parse/validate config: couldn't access/create
private data directory c:\**\cached-status
error: reading config file failed

I am going to do a clean install and see what happens. The previous up
time was almost 10 days without any problems.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: I wish to see one video on you tube

2011-02-08 Thread Jon
On Tue, Feb 8, 2011 at 3:49 PM, Martino Papesso mart...@papesso.com wrote:
 Hallo I live in Italy.
 I have firefox portable version with tor download from here :
 http://www.torproject.org/dist/torbrowser/tor-browser-1.3.17_it.exe .
 I wish to see this video
 http://www.youtube.com/watch?v=AmhApE1kIgAfeature=player_embedded.
 In Italy is not possible.
 For one friend in Romania is possible to see this
 video(http://img806.imageshack.us/img806/7321/31962895.png).
 I tried to watch the video using tor but did not succeed.
 I'm not very handy when using tor.
 Could you help me for to see this video please.
 Is there one person who speak Italian?
 Many thanks.
 Ciao.
 Martino


 Clicking the link you post for the video,
http://www.youtube.com/watch?v=AmhApE1kIgAfeature=player_embedded,
this is what I get here in the USA.

This video contains content from Sony Music Entertainment. It is not
available in your country.

Which tells me it is not available here either. Makes me wonder which
country's are allowed to watch it.

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Sent e-mails going into spam folders.

2011-02-07 Thread Jon
On Mon, Feb 7, 2011 at 1:00 PM, Matthew pump...@cotse.net wrote:
 I am wondering to what degree people on this list have problems with e-mails
 going into spam folders because they are using tor nodes.

 I refer to sending from a webmail (Hotmail, Yahoo, Gmail, AOL, etc) to
 another webmail.

 It seems to me that e-mails sent from Yahoo will end up as spam.

 Any other experiences or opinions would be interesting.


I don't have any problems generally. It depends on what is in the body
of the email and what one's filters are.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: torr file question...

2011-02-04 Thread Jon
On Fri, Feb 4, 2011 at 4:20 AM, Zaher F. the_one_man...@hotmail.com wrote:
 is it going to be like that ??

 This file was generated by Tor; if you edit it, comments will not be
 preserved
 # The old torrc file was renamed to torrc.orig.1 or similar, and Tor will
 ignore it

 # If set, Tor will accept connections from the same machine (localhost only)
 # on this port, and allow those connections to control the Tor process using
 # the Tor Control Protocol (described in control-spec.txt).
 ControlPort 9051
 # Where to send logging messages. Format is minSeverity[-maxSeverity]
 # (stderr|stdout|syslog|file FILENAME).
 Log notice stdout
 # Bind to this address to listen to connections from SOCKS-speaking
 # applications.
 SocksListenAddress 127.0.0.1

 StrictExitNodes 1
 ExitNodes name_of_node or fingerprint (no spaces in fingerprint).



 or should i delete something from the torrc file above...???

 


 Don't delete anything , just add your

StrictExitNodes 1
ExitNodes name_of_node or fingerprint (no spaces in fingerprint).

you should be good to go  :)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Jon
On Sat, Jan 29, 2011 at 12:46 PM, Jan Weiher j...@buksy.de wrote:
 Hi,

 while scrolling through the tor status page (torstatus.blutmagie.de), I
 stumpled upon the following node (the reason why it came to my eye was
 the long uptime):

 gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2 2A70 654D 3B92

 This node looks suspicious to me, because there is no contact info given
 and the exit policy allows only unencrypted traffic:

 reject 0.0.0.0/8:*
 reject 169.254.0.0/16:*
 reject 127.0.0.0/8:*
 reject 192.168.0.0/16:*
 reject 10.0.0.0/8:*
 reject 172.16.0.0/12:*
 reject 194.154.227.109:*
 accept *:21
 accept *:80
 accept *:110
 accept *:143
 reject *:*

 Am I missing something? I'm wondering why the status page lists this
 node as non-exit, because it clearly allows outgoing traffic on ports
 21,80,110 and 143?
 I'm aware of the fact that it is not recommended to use tor without
 additional encryption, but some users do. And I dont see any reason for
 only allowing unencrypted traffic than snooping?
 Can anyone clearify this? If the admin of this node is on the list,
 would he please explain this situation?

 best regards,
 Jan


It may possible be a middle node instead of an exit node.

As for lack of contact info, can't answer that.  I know there have
been several other nodes in past without a contact info.

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: update message...

2011-01-26 Thread Jon
On Wed, Jan 26, 2011 at 2:30 PM, Zaher F. the_one_man...@hotmail.com wrote:
 so...what is the meaning of the version i have now


 vidalia 0.2.10
 Tor 0.2.2.21-alfa (git-5f63f0d6312d9f0d)
 QT 4.6.2


 and i have downloaded it from toe website


 


 The current stable version of Tor for Windows is 0.2.1.29

The current stable version of Tor for OS X is 0.2.1.29.

The current stable source version of Tor is 0.2.1.29

Vidalia current stable version is 0.2.10

I believe you need to update ur Tor Version

ie: https://www.torproject.org/download/download.html.en

 Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Email?

2010-12-29 Thread Jon
On Wed, Dec 29, 2010 at 11:34 AM, Moritz Bartl mor...@torservers.net wrote:
 Hi,

 The Tor Hidden Wiki lists a few other free email services offering HTTPS at:
 http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email

 --
 Moritz
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/


I got this to work with out any problems also  :)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Fwd: Re: DMCA Infringement Notification: Copies of 14 complaints

2010-12-20 Thread Jon
On Mon, Dec 20, 2010 at 12:54 AM, grarpamp grarp...@gmail.com wrote:
 your residential DSL service
 is only for the use of your  pcs
 within your home.


SCAR:  I believe the bottom line here is the  DSL is only for the use
of ' your ' pc . I never had that issue with DSL, but Cable I did and
I had to go to a business account in order to run Tor. Reason was
servers are not allowed to run an a residential account. This is also
mention in the contract.

As with Mike Perry's post, I would also suggests to run a middle node
instead of an exit node and see what happens. I suspect you probably
won't have any more issues and should resolve QWest problems.

I also when I was called about the ' illegal ' stuff going thru my
computer, I just asked the ISP what port it was and then blocked the
port. Some users have found ways to use other ports that are different
than what we would block for exits. To get around that I just blocked
those ports. No more problems.

I have not had any complaints on DMCA for over a year now. ( fingers crossed ).

Hope some of theses posts will help you, Scar.

Jonj
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: U.S. begins censoring Internet at U.K.'s request

2010-11-07 Thread Jon
On Sat, Nov 6, 2010 at 1:02 PM, Scott Bennett benn...@cs.niu.edu wrote:
     I wrote:
http://news.antiwar.com/2010/11/05/us-censors-muslim-websites-list-of-british-mps-who-supported-iraq-war/

     Using exit chuckthecanuck gives a Google (!) error page, saying URL
not found.  I'll add that exit to my ExcludeExitNodes list with a comment
that the reason is due to DNS hijacking that is probably related to U.S.
censorship.

     I changed my mind.  I'm adding {ca},{uk},{us} to my ExcludeExitNodes
 list with an appropriate comment for later removal in case the U.S. ever
 calls off its War on the Internet. :-(


 I don't understand why excluding all exit nodes from the US, CA, and
UK, especially if you have only one exit node showing the error?
Altho, I may not understand or I misinterpreted your email

I had no issues with getting the website on google. I had to copy and
paste the url as it would not go directly from the email. Actually,
almost all the url's lately from the email;s don't go directly, I have
to cut and paste to get to them.

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Excessive scrubs

2010-10-15 Thread Jon
TorOp

Thanks, I did upgrade Vidalia separately. It appears that it was
upgraded, but Tor has not been yet. Tho I believe it will be shortly.
However, it did resolve the issue.

Jon


On Thu, Oct 14, 2010 at 5:39 PM, TorOp to...@optonline.net wrote:
 Upgrade Vidalia to 0.2.10 and the problem will go away.

 On 10/14/2010 6:20 PM, Jon wrote:

 Justin,

 The first of the scrubs have now showed for the past 4 hrs. Once an
 hour. It is now showing the address and it is the same address. It is
 a ' geoips vidalia ' address ( am not showing complete addy ).
 Apparently for some reason it is not resolving or connecting to
 address. I did attempt to try directly, with a couple of different
 ways and was not able to access the site.

 If you want the complete address, I will put in later.

 Will see if it is the only one that shows up over the next 12 hrs.

 Jon


 On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplinjmap...@ufl.edu  wrote:

 On Oct 14, 2010, at 9:04 AM, Jon wrote:



 I had added the ' SafeLogging 0 ' to the file as per Tor-ops
 message/reply. Twenty four hours later when I saw that it had not
 removed the ' scrubbed ' and replaced it with the node/address, I
 checked the file again and it was not in the file where I put it.

 Was Vidalia running when you edited the torrc? Vidalia (on Windows, at
 least) has a bad habit of overwriting changes to the torrc that it isn't
 aware of. Personally I think there should be a Confirm before modifying
 torrc checkbox in Vidalia.


 I just checked it now, It is still in the file, but the logs still
 show the ' scubbed' and not the address as supposedly the '
 SafeLogging 0 ' was to replace. Time wise it appears to be at a
 minimum of once an hour. Which makes me believe it is the same address
 that is being scrubbed.

 Try shutting down both Tor and Vidalia, making your edits, restarting
 both,
 and rechecking your torrc/logs. If you've done all this, please let us
 know.

 ~Justin Aplin

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Excessive scrubs

2010-10-15 Thread Jon
Justin,

Thanks, followup it is running properly now. I did an upgrade to
Vidalia only and it resolved the issue. There have been no more
scrubs.

Jon



On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplin jmap...@ufl.edu wrote:
 On Oct 14, 2010, at 9:04 AM, Jon wrote:

 Yes, I did the save the file. This is a given, sorry.

 This may also be a given, but did you restart Tor after doing this? AFAIK
 (and I may be wrong), Tor does not read changes made to the torrc after
 initialization.

 I had added the ' SafeLogging 0 ' to the file as per Tor-ops
 message/reply. Twenty four hours later when I saw that it had not
 removed the ' scrubbed ' and replaced it with the node/address, I
 checked the file again and it was not in the file where I put it.

 Was Vidalia running when you edited the torrc? Vidalia (on Windows, at
 least) has a bad habit of overwriting changes to the torrc that it isn't
 aware of. Personally I think there should be a Confirm before modifying
 torrc checkbox in Vidalia.


 I just checked it now, It is still in the file, but the logs still
 show the ' scubbed' and not the address as supposedly the '
 SafeLogging 0 ' was to replace. Time wise it appears to be at a
 minimum of once an hour. Which makes me believe it is the same address
 that is being scrubbed.

 Try shutting down both Tor and Vidalia, making your edits, restarting both,
 and rechecking your torrc/logs. If you've done all this, please let us know.

 ~Justin Aplin



 OS is WIndows

 Jon


 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?


 -
 On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com
 wrote:

 On Wed, 13 Oct 2010 09:02:20 -0500
 Jon torance...@gmail.com wrote:

 I saw a message from Tor-op in reference to a similar problem and his
 solution was:

 Add the below line to your torrc and the scrubbed will be replaced by
 the domain in question.

 SafeLogging 0

 of which I tried, but it would not stay in the torrc file. It seems to
 remove it self at some point.

 As far as I can tell it never worked, but unknown how long after I
 placed it before it got removed.

 Jon

 On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote:

 I have noticed over the past 2 weeks, I have been getting an unusual
 amount of scrubs. It doesn't tell me which addresses are being
 scrubbed, so I don't know if they are the same or different ones. It
 does not affect the operation of Tor. Just fills up the logs.

 Is there a way to have the '[scrubbed]' removed and the address put
 in its place?

 Thanks,

 Jon

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?

 --
 more than just a leitmotif
 PGP Key ID: 33E22AB1

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/


 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Excessive scrubs

2010-10-14 Thread Jon
Yes, I did the save the file. This is a given, sorry.

I had added the ' SafeLogging 0 ' to the file as per Tor-ops
message/reply. Twenty four hours later when I saw that it had not
removed the ' scrubbed ' and replaced it with the node/address, I
checked the file again and it was not in the file where I put it.

I just checked it now, It is still in the file, but the logs still
show the ' scubbed' and not the address as supposedly the '
SafeLogging 0 ' was to replace. Time wise it appears to be at a
minimum of once an hour. Which makes me believe it is the same address
that is being scrubbed.

OS is WIndows

Jon


 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?
-
On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com wrote:
 On Wed, 13 Oct 2010 09:02:20 -0500
 Jon torance...@gmail.com wrote:

 I saw a message from Tor-op in reference to a similar problem and his
 solution was:

 Add the below line to your torrc and the scrubbed will be replaced by
 the domain in question.

 SafeLogging 0

 of which I tried, but it would not stay in the torrc file. It seems to
 remove it self at some point.

 As far as I can tell it never worked, but unknown how long after I
 placed it before it got removed.

 Jon

 On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote:
  I have noticed over the past 2 weeks, I have been getting an unusual
  amount of scrubs. It doesn't tell me which addresses are being
  scrubbed, so I don't know if they are the same or different ones. It
  does not affect the operation of Tor. Just fills up the logs.
 
  Is there a way to have the '[scrubbed]' removed and the address put
  in its place?
 
  Thanks,
 
  Jon
 
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?

 --
 more than just a leitmotif
 PGP Key ID: 33E22AB1

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Excessive scrubs

2010-10-14 Thread Jon
Ok, I just checked the torrc file and my last entry was still there. I
updated the OS and rebooted and rechecked the file and nothing has
been removed. Will see now on the new logs if it changes or if it
still shows ' scrubbed '

Jon

On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplin jmap...@ufl.edu wrote:
 On Oct 14, 2010, at 9:04 AM, Jon wrote:

 Yes, I did the save the file. This is a given, sorry.

 This may also be a given, but did you restart Tor after doing this? AFAIK
 (and I may be wrong), Tor does not read changes made to the torrc after
 initialization.

 I had added the ' SafeLogging 0 ' to the file as per Tor-ops
 message/reply. Twenty four hours later when I saw that it had not
 removed the ' scrubbed ' and replaced it with the node/address, I
 checked the file again and it was not in the file where I put it.

 Was Vidalia running when you edited the torrc? Vidalia (on Windows, at
 least) has a bad habit of overwriting changes to the torrc that it isn't
 aware of. Personally I think there should be a Confirm before modifying
 torrc checkbox in Vidalia.


 I just checked it now, It is still in the file, but the logs still
 show the ' scubbed' and not the address as supposedly the '
 SafeLogging 0 ' was to replace. Time wise it appears to be at a
 minimum of once an hour. Which makes me believe it is the same address
 that is being scrubbed.

 Try shutting down both Tor and Vidalia, making your edits, restarting both,
 and rechecking your torrc/logs. If you've done all this, please let us know.

 ~Justin Aplin



 OS is WIndows

 Jon


 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?


 -
 On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com
 wrote:

 On Wed, 13 Oct 2010 09:02:20 -0500
 Jon torance...@gmail.com wrote:

 I saw a message from Tor-op in reference to a similar problem and his
 solution was:

 Add the below line to your torrc and the scrubbed will be replaced by
 the domain in question.

 SafeLogging 0

 of which I tried, but it would not stay in the torrc file. It seems to
 remove it self at some point.

 As far as I can tell it never worked, but unknown how long after I
 placed it before it got removed.

 Jon

 On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote:

 I have noticed over the past 2 weeks, I have been getting an unusual
 amount of scrubs. It doesn't tell me which addresses are being
 scrubbed, so I don't know if they are the same or different ones. It
 does not affect the operation of Tor. Just fills up the logs.

 Is there a way to have the '[scrubbed]' removed and the address put
 in its place?

 Thanks,

 Jon

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?

 --
 more than just a leitmotif
 PGP Key ID: 33E22AB1

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/


 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Excessive scrubs

2010-10-14 Thread Jon
Justin,

Ok, I just checked the torrc file and my last entry was still there. I just
updated the OS and rebooted and rechecked the file and nothing has
been removed.

Will see now on the new logs if it changes or if it
still shows ' scrubbed ' . I will let you know within 24hrs either way.

Jon

On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplin jmap...@ufl.edu wrote:
 On Oct 14, 2010, at 9:04 AM, Jon wrote:

 Yes, I did the save the file. This is a given, sorry.

 This may also be a given, but did you restart Tor after doing this? AFAIK
 (and I may be wrong), Tor does not read changes made to the torrc after
 initialization.

 I had added the ' SafeLogging 0 ' to the file as per Tor-ops
 message/reply. Twenty four hours later when I saw that it had not
 removed the ' scrubbed ' and replaced it with the node/address, I
 checked the file again and it was not in the file where I put it.

 Was Vidalia running when you edited the torrc? Vidalia (on Windows, at
 least) has a bad habit of overwriting changes to the torrc that it isn't
 aware of. Personally I think there should be a Confirm before modifying
 torrc checkbox in Vidalia.


 I just checked it now, It is still in the file, but the logs still
 show the ' scubbed' and not the address as supposedly the '
 SafeLogging 0 ' was to replace. Time wise it appears to be at a
 minimum of once an hour. Which makes me believe it is the same address
 that is being scrubbed.

 Try shutting down both Tor and Vidalia, making your edits, restarting both,
 and rechecking your torrc/logs. If you've done all this, please let us know.

 ~Justin Aplin



 OS is WIndows

 Jon


 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?


 -
 On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com
 wrote:

 On Wed, 13 Oct 2010 09:02:20 -0500
 Jon torance...@gmail.com wrote:

 I saw a message from Tor-op in reference to a similar problem and his
 solution was:

 Add the below line to your torrc and the scrubbed will be replaced by
 the domain in question.

 SafeLogging 0

 of which I tried, but it would not stay in the torrc file. It seems to
 remove it self at some point.

 As far as I can tell it never worked, but unknown how long after I
 placed it before it got removed.

 Jon

 On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote:

 I have noticed over the past 2 weeks, I have been getting an unusual
 amount of scrubs. It doesn't tell me which addresses are being
 scrubbed, so I don't know if they are the same or different ones. It
 does not affect the operation of Tor. Just fills up the logs.

 Is there a way to have the '[scrubbed]' removed and the address put
 in its place?

 Thanks,

 Jon

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?

 --
 more than just a leitmotif
 PGP Key ID: 33E22AB1

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/


 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Excessive scrubs

2010-10-14 Thread Jon
Justin,

The first of the scrubs have now showed for the past 4 hrs. Once an
hour. It is now showing the address and it is the same address. It is
a ' geoips vidalia ' address ( am not showing complete addy ).
Apparently for some reason it is not resolving or connecting to
address. I did attempt to try directly, with a couple of different
ways and was not able to access the site.

If you want the complete address, I will put in later.

Will see if it is the only one that shows up over the next 12 hrs.

Jon


On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplin jmap...@ufl.edu wrote:
 On Oct 14, 2010, at 9:04 AM, Jon wrote:



 I had added the ' SafeLogging 0 ' to the file as per Tor-ops
 message/reply. Twenty four hours later when I saw that it had not
 removed the ' scrubbed ' and replaced it with the node/address, I
 checked the file again and it was not in the file where I put it.

 Was Vidalia running when you edited the torrc? Vidalia (on Windows, at
 least) has a bad habit of overwriting changes to the torrc that it isn't
 aware of. Personally I think there should be a Confirm before modifying
 torrc checkbox in Vidalia.


 I just checked it now, It is still in the file, but the logs still
 show the ' scubbed' and not the address as supposedly the '
 SafeLogging 0 ' was to replace. Time wise it appears to be at a
 minimum of once an hour. Which makes me believe it is the same address
 that is being scrubbed.

 Try shutting down both Tor and Vidalia, making your edits, restarting both,
 and rechecking your torrc/logs. If you've done all this, please let us know.

 ~Justin Aplin



 OS is WIndows

 Jon


 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?


 -
 On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com
 wrote:

 On Wed, 13 Oct 2010 09:02:20 -0500
 Jon torance...@gmail.com wrote:

 I saw a message from Tor-op in reference to a similar problem and his
 solution was:

 Add the below line to your torrc and the scrubbed will be replaced by
 the domain in question.

 SafeLogging 0

 of which I tried, but it would not stay in the torrc file. It seems to
 remove it self at some point.

 As far as I can tell it never worked, but unknown how long after I
 placed it before it got removed.

 Jon

 On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote:

 I have noticed over the past 2 weeks, I have been getting an unusual
 amount of scrubs. It doesn't tell me which addresses are being
 scrubbed, so I don't know if they are the same or different ones. It
 does not affect the operation of Tor. Just fills up the logs.

 Is there a way to have the '[scrubbed]' removed and the address put
 in its place?

 Thanks,

 Jon

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

 What do you mean by 'removed itself'? Was the file never saved, or was
 there a point at which something else reverted it, or was it something
 else entirely?

 Also, which operating system are you using?

 --
 more than just a leitmotif
 PGP Key ID: 33E22AB1

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/


 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor network connections constantly building / failing

2010-10-13 Thread Jon
That is normal right after you start Tor up. What your seeing is Tor
is still building circuits. After a short period, it does level out,
then you should only be showing several circuits. Your dl/up speeds
will vary during this and will level off shortly after.

After your connection has been up for a while ie: several days, your
speeds will pick up as the other nodes get to know your node.
Everything is normal of what your seeing.  :)

Thanks for running Tor.

Jon

On Wed, Oct 13, 2010 at 6:39 AM, Joe Btfsplk joebtfs...@gmx.com wrote:
  Recently noticed Tor being slower than usual  network map shows MANY new
 connections building, then failing VERY quickly. (within a sec or so).  Does
 this constantly - one connection after another.  Using Vidalia
 0.2.1.26-0.2.9;  Torbutton 1.2.5.

 Sometimes there are at least 3 connections open - sometimes not.  1st time
 I've seen this.

 Did close Vidalia / Tor, Polipo, Firefox 3.6.10  Torbutton, the restart -
 couple of times - no change.
 During the connection, for brief times, D/L speeds may get up to normal
 for me - but not for long.

 Anyone noticed this or have suggestions?  Thanks.
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Full bandwidth is not used.

2010-10-13 Thread Jon
Not sure, but mine goes up and down all the time. I am not on a
allocation or accounting like you, but I check several times a day
generally, but at least once a day the bandwidth usage is different
than before.

It may still be re-balancing, but I also notice that the mode nodes
that are running, the lower usage of bandwidth. The less nodes
running, my bandwidth has more usage. Just a thought.

Jon

On Wed, Oct 13, 2010 at 7:47 AM, Paul Menzel
paulepan...@users.sourceforge.net wrote:
 Dear Tor folks,


 I am still seeing the same problem [1]. In April it used the whole limit
 of 1 TB and hibernated after the limit was reached, but afterward it
 only came back to around 100 GB per month.

 Fast IT is not limiting the bandwidth in any way. I tested that. CPU and
 memory are not utilized completely either.

 Here is the output from arm.

        arm - anonymisierungsdienst (Linux...)     Tor 0.2.1.26 (recommended)
        anonymisierungsdien - 0.0.0.0:9090, Dir Port: 80, Control Port (open): 
 9051
        cpu: 0.5%    mem: 92 MB (13.0%)   pid: 1186    uptime: 14-15:11:11
        fingerprint: B3EC1BF5D7F7D724BA634D91BE5D22D2D7A70160
        flags: Exit, Fast, Guard, Named, Running, Stable, Valid

 I only have

        AccountingMax 500 GB

 set in `/etc/tor/torrc`.

 So it must be a Tor problem. As you can see from the graphs the
 bandwidth usage goes up and down quite often. What might be the reason?
 Besides it is still below the available 100 Mbit/s.

 So does rebalancing still have problems as indicated in Andrew’s answer
 [3]?


 Thanks,

 Paul


 [1] http://archives.seul.org/or/talk/Mar-2010/msg00010.html
 [2] http://www.atagar.com/arm/
 [3] http://archives.seul.org/or/talk/Apr-2010/msg00140.html

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Excessive scrubs

2010-10-13 Thread Jon
I have noticed over the past 2 weeks, I have been getting an unusual
amount of scrubs. It doesn't tell me which addresses are being
scrubbed, so I don't know if they are the same or different ones. It
does not affect the operation of Tor. Just fills up the logs.

Is there a way to have the '[scrubbed]' removed and the address put in
its place?

Thanks,

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Excessive scrubs

2010-10-13 Thread Jon
I saw a message from Tor-op in reference to a similar problem and his
solution was:

Add the below line to your torrc and the scrubbed will be replaced by
the domain in question.

SafeLogging 0

of which I tried, but it would not stay in the torrc file. It seems to
remove it self at some point.

As far as I can tell it never worked, but unknown how long after I
placed it before it got removed.

Jon

On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote:
 I have noticed over the past 2 weeks, I have been getting an unusual
 amount of scrubs. It doesn't tell me which addresses are being
 scrubbed, so I don't know if they are the same or different ones. It
 does not affect the operation of Tor. Just fills up the logs.

 Is there a way to have the '[scrubbed]' removed and the address put in
 its place?

 Thanks,

 Jon

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: The team of PayPal is a band of pigs and cads!

2010-08-23 Thread Jon
Hm, I use Top almost every time I use pay pay, Especially if I am
on a site I do Not trust well or its the first time I been on the
site. So far, I have never had an issue other than occasionally
locking my account.

Jon

On Mon, Aug 23, 2010 at 11:48 AM, James Brown jbrownfi...@gmail.com wrote:
 They block accounts of their user if users ised the Tor or another
 anonymous proxy!!!
 ***
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: The team of PayPal is a band of pigs and cads!

2010-08-23 Thread Jon
Hm, I use TOR almost every time I use paypal, especially if I am
on a site I do not trust well or its the first time I been on the
site. So far, I have never had an issue other than occasionally
locking my account.

On Mon, Aug 23, 2010 at 11:48 AM, James Brown jbrownfi...@gmail.com wrote:
 They block accounts of their user if users ised the Tor or another
 anonymous proxy!!!
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: My relay never shows up

2010-08-11 Thread Jon
On Wed, Aug 11, 2010 at 8:20 AM, Praedor Atrebates prae...@yahoo.com wrote:
 I am running a tor relay called Stonekeep.  I have port forwarding set on 
 my firewall/router and my personal system firewall permits connections to the 
 tor ports.  I am also running Vidalia (Vidalia 0.1.15, tor 0.2.1.26).  My 
 relay never shows up in the list of servers/relays and doesn't show up on the 
 various tor network status pages.  Why not?  I cannot find anything amiss to 
 render my system invisible or unusable to the network.  I have no trouble 
 using the tor myself.

 praedor
 --

 How many days is your relay up and running with out going down and/or
having to reboot? I have found that if one keeps rebooting or the
relay keeps going down, it takes a while for it to be recognized.

Also I have seen where it may take several minutes for the network
status to populate before a relay shows up. The biggest issue I
personally have seen is if one can't stay on line for any length of
time, the relay probably will not show up.

I am sure there may be other reasons, but this has been my observation .
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Tor on a live disk

2010-08-09 Thread Jon Cosby

I'm trying to run Tor on a live disk, but keep seeing the warning user
tor not found. Tor fails to start. It looks like I just need to add a
user, but which groups would this user need to belong to?


linux-rvcp:~ # /etc/init.d/tor start
Starting tor daemon
 done
linux-rvcp:~ # Aug 09 14:07:09.186 [notice] Tor v0.2.1.26. This is
experimental software. Do not rely on it for strong anonymity. (Running on
Linux i686)
Aug 09 14:07:09.276 [notice] Initialized libevent version 1.4.12-stable
using method epoll. Good.
Aug 09 14:07:09.276 [notice] Opening Socks listener on 127.0.0.1:9050
Aug 09 14:07:09.277 [warn] Error setting configured user: tor not found
Aug 09 14:07:09.277 [warn] Failed to parse/validate config: Problem with
User value. See logs for details.
Aug 09 14:07:09.277 [err] Reading config failed--see warnings above.
/usr/bin/torctl start: tor could not be started
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Legal response to real abuse

2010-08-07 Thread Jon
On Sat, Aug 7, 2010 at 8:50 AM, Moritz Bartl t...@wiredwings.com wrote:
 Hi,


 This is considered the first strike of three -- the third resulting in the
 termination of your account.


And that is providing your ISP even lets you get to 3 strikes. From my
phone experience. tho it was not a letter DMCA and probably just a
scare tactic, but was told if I didn't resolve the problem of the
server being used for copyright infringements, etc, my account would
be terminated.

Even with the explanation, they didn't care cause of the complaints.
However, I said I would take care of the problem if you give me the
ports this was allegedly happening on. I then just blocked them and
have had no issues since then. By doing this, I still have a full exit
server running, and didnt lose the account and the ISP was happy.

Personally I don't trust the 3 strikes your out syndrome. Unless its
in the contract, I believe most ISP's can cancel the contract if they
believe their subscriber does not seem to want to take care of the
problem and the ISP has the paper work with the allegations, etc. But
I am not a lawyer.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


US Seeks Access to More Internet Data Without Court Order

2010-07-29 Thread Jon Cosby

The Washington Post reports that the Obama administration is seeking to
make it easier for the FBI to obtain internet records of users without a
court order. If Congress approves the plan, the FBI would be able to
secretly issue a National Security Letter to an internet provider and
obtain who users send email to, the times and dates of e-mails sent and
received, and possibly a log of every website visited. Kevin Bankston of
the Electronic Frontier Foundation said, Our biggest concern is that an
expanded [National Security Letter] power might be used to obtain Internet
search queries and Web histories detailing every Web site visited and every
file downloaded.

http://www.democracynow.org/2010/7/29/headlines#2

This makes me wonder, what information could an ISP provide about Internet
activity through Tor? My provider is more trustworthy than most, but this
would give me cause for concern.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: US Seeks Access to More Internet Data Without Court Order

2010-07-29 Thread Jon Cosby

On Thu, 29 Jul 2010 17:22:59 -0700, coderman coder...@gmail.com wrote:
 
 they don't give out NSL's for just any whim or fancy after all...
 

We already know what happens when we have lax standards. There is no
oversight, and administration is the discretion of a disgruntled agent or
greedy vendor.

http://seattletimes.nwsource.com/html/nationworld/2008245641_eavesdrop10.html
http://www.securityfocus.com/brief/181



***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: New Tor Relay: Help!!!!!

2010-06-28 Thread Jon
On Mon, Jun 28, 2010 at 11:22 AM,  torh...@safe-mail.net wrote:
 Hello all.

 I just upgraded my internet speed and have been running a Tor Relay for 
 around two days or so.

 I have set up 2-3 tor relays before so I understand (I think) how to set one 
 up.

 Here's the problem:

 In the past two days, Vidalia says I've received 200MBs of data and sent 
 around 500MBs of data. My relay has almost NO traffic compared to the other 
 relays I've had.

 I'm supposed to have upwards of 3MBS up and .73 MBs down. In Vadalia, I have 
 the Bandwidth Limits set to 512 Kbps.

 Why is there almost no traffic? Please HELP

  In my past experience with setting up several relays, both exit and
non exit, it takes awhile, especially with a new relay for it to be
recognized by the other servers on the list. You should notice an
increase gradually in several days, providing you have everything set
up properly.

One thing I have noticed in the past is making sure the firewall is
set up so TOR can be accessed.  That will cause you a slow down. Being
that you are a former TOR server, I would just wait it out and give it
several days for the others to know your out there and will get used
to accessing you.

I am a little concerned tho about the DNS hijackings, which is not
good. This may or may not also be interfering with the server working
properly. Might consider looking at changing to a different DNS server
or changing IP providers.  With that being said, maybe someone with
more experience can give you some ideas on how to go about and
correcting the possible DNS issues.

Welcome back as a TOR relay.


Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Browser Bundle for Windows contains Firefox 3.5.9?

2010-06-25 Thread Jon
On Fri, Jun 25, 2010 at 2:48 AM, judaiko judaiko siriu81...@gmail.com wrote:
 Why does the Tor Browser Bundle for Windows contain Firefox 3.5.9 and NOT
 the latest Firefox 3.6.4 or 3.6.3?

 The 3.6 version of Firefox has more Bugs fixed than the 3.5 version.


23 June 2010, 11:28
Firefox 3.6.4 adds crash protection, fixes vulnerabilities - Update
More info at following addy:

http://www.h-online.com/security/news/item/Firefox-3-6-4-adds-crash-protection-fixes-vulnerabilities-Update-1027586.html

( was not able to find a secure site, tho )

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-23 Thread Jon
On Wed, Jun 23, 2010 at 5:49 AM, Moritz Bartl t...@wiredwings.com wrote:
 Hi,

 Out of curiosity, what exit policy are you now using? Perhaps we want
 to standardize on a policy that is effective at reducing these
 complaints.

 At the moment, I allow ports 20-22,53,79-81,110,143,443,706,873,993,
 995,8008,8080,. Feel free to suggest others.


 I don't know if this will help or not, but in the states, my ISP
provider calls me when they get a complaint. They tell me what the
complaint was about, I get the ports the issues came thru and what
they were. All except the last one were Torrents. The last one was
allegedly email spamming.

I started to explain, but realized that they would just turn off my
service for not correcting the problem. In my case the EFF legal
notice didn't work as they didn't care about it. Their main concern
wee the complaints recieved from my ip addy. ( It could also just be
their way of intimidation ).

What I did on the Torrents was to turn off the ' misc services exit '
( tho I would have liked to keep it running there and may try again
and see how many if any complants come thru with the ports blocked )
and block the specific ports that were reported. On the email, I just
blocked the specific port. That so far has taken care of those issues.
( fingers crossed )

I have yet to receive an actual abuse notice in the mail or via email.
Like I said not sure if this will help in your case, but it has worked
for me.

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Network Map showing a major difference in public relays

2010-06-11 Thread Jon
On Fri, Jun 11, 2010 at 1:12 AM, Roger Dingledine a...@mit.edu wrote:

 Tor relays that haven't seen any client requests lately (and by client
 requests I mean requests using that Tor as a client) and don't have
 an advertised DirPort will stop fetching descriptors after a while,
 to save bandwidth.

 --Roger

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/


Ok, That makes sense. Just have not noticed it in the past.

Thanks Roger

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Network Map showing a major difference in public relays

2010-06-08 Thread Jon
I was wondering why on a windows os, the network map shows only 681
relays on one system and on another system, it shows 1853 relays. This
seems to be a major difference, which is also above a previous message
about only 80+ relay differences.

The one running an exit relay is showing the lesser of the relays. The
non exit relay is showing the higher number of relays.

Any ideas or opinions?

Thanks,

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: HTTPS Everywhere Firefox addon

2010-05-27 Thread Jon Cosby

On Thu, 27 May 2010 19:34:01 -0700, Mike Perry mikepe...@fscked.org
wrote:
 Peter Eckersley of the EFF and I wrote this addon this past week
 to make it easier to use Google's SSL search feature, among other
 mixed-mode SSL sites:
 
 https://www.eff.org/https-everywhere/
 
 The addon is based on the NoScript STS/HTTPS forcing engine, with
 improvements in how rules are specified. Rules for our addon are
 specified as XML files that allow arbitrary URL rewrite substitution
 via regular expressions and exclude patterns. This allows us to write
 more complete and less error-prone rules than NoScript's
 include/exclude model allows.
 
 The eventual idea is to allow an Adblock Plus style model, where users
 can submit and exchange rule files and eventually create subscriptions
 for the sites they use that partially support SSL.
 
 We also hope that NoScript will share our rule format and update
 mechanisms, so that our rulesets will be interchangeable.
 
 Please give it a try and give us feedback. We also will be including
 the addon in the next alpha release of the Tor Browser Bundle.


Very interesting. How will other sites be added?


Jon

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: HTTPS Everywhere Firefox addon

2010-05-27 Thread Jon Cosby

On Thu, 27 May 2010 21:07:42 -0700, Mike Perry mikepe...@fscked.org
wrote:
 
 Very interesting. How will other sites be added?
 
 The rule files exist in two locations - the addon installed set, and
 the user installed set. The addon installed set are in your Firefox
 profile directory under the following path:
 ./extensions/https-everywh...@eff.org/chrome/content/rules
 
 User supplied files live in ./HTTPSEverywhereUserRules/ in the Firefox
 profile directory.
 
 We plan to have some form of UI to automatically install filters to
 the user directory from the web, similar to the Adblock Plus
 subscription list.
 
 In the meantime, we'll gladly accept submissions as xml files for
 inclusion in the extension itself.

How would I find the rules for the NYT blogs (*.blogs.nytimes.com)? These
don't seem to be supported by the addon at this point.



Jon

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: When can I get TOR for mobile?

2010-05-24 Thread Jon
On Mon, May 24, 2010 at 4:50 PM, Michael Gomboc
michael.gom...@gmail.com wrote:
 Is there a working TOR version for the IPOD touch?


 2010/5/24 Nathan Freitas nat...@freitas.net

 Sorry, there is no version of Tor available for that class of Java phone
 currently. .

You need to upgrade to an Android, Windows Mobile, Nokia N900 or
 iPhone device.


 I believe the way I read it, Nathan answered your question in the
previous post.

Tho he may mean it only refers to the Java class of phones. However I
am understanding that at the present the phones listed at the only
ones that have a TOR working version. He is still working on getting
others to work with TOR. Slow process, but he has made excellent
headway.  :)..

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Network Status Reports

2010-05-13 Thread Jon
On Thu, May 13, 2010 at 2:58 AM, Olaf Selke olaf.se...@blutmagie.de wrote:

 you are right. Blutmagie uses a different bandwidth calculation using
 average bandwidth values instead of peak load. I've adopted some code
 written by Kasimir Gabert from his tns 4.0 trunk version.

 Btw Kasimir's trunk tns site http://trunk.torstatus.kgprog.com uses the
 same calculation like blutmagie.

 This algorithm fulfilled Roger's wish #2 from his wishlist posted on
 this list two years ago:
 http://archives.seul.org/or/talk/Jan-2008/msg00300.html

 There are two other non standard tns 3.6.1 gimmicks introduced on Blutmagie.
 1.) Hovering mouse pointer over the a flag shows the city as a tool tip
 and clicking on a flag opens router's location in Openstreetmap.

 2.) In table Aggregate Network Statistic Summary at page's bottom
 there's a row Total Bandwidth of displayed Routers. If you narrow down
 your choice of displayed routers for example by required flags exit=yes
 it will display the total sum of last 24 hour average sustained exit loads.

 Olaf


Thanks for the info Olaf. I thought I was seeing things:)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node Sponsorship - looking for partners

2010-05-13 Thread Jon
--- On Thu, 5/13/10, W waterwai...@gmx.com  wrote:

 I'm not necessarily suggesting nagware
 pop-ups, but I am talking about something like, perhaps, a
 splash screen with a reminder -- and a button -- upon
 launch.


 I can not speak for everyone else, but for my self, if I read this
right, imo, there is no difference or very little difference between
nagware popups and splash screens that have reminders or ads on them.

There is enough ' crap '  ware out there with those pop ups, etc. As a
relay operator, if i had to see this everytime an upgrade was done or
had to reboot for whatever reason, those screens/popups would be
enough after a while to stop being a relay.

I am not in the ' technically-minded ' user base, but I am among the
relay user database that donates time, bandwidth, money to the cause
here. As just like several hundred others.

Again, imo, I get the feeling beginning from the topic, that it
appears to be more to this then meets the eye. It seems to me that
some one other than TOR is going to benefit more from this.

I may be wrong in the way I am reading this, but sure seems like to me
that this is an entrepreneur proposition for some one to make money
on/with.

Jon

PS: Hopefully some one from the Developing and Admin side will comment
on this topic and give their opinions.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Network Status Reports

2010-05-12 Thread Jon
I am just curious as to why of the known mirror's that show the
network status reports, why there is such a discrepancy between
blutmagie reports and the others?

Is  blutmagie  using a different config in reporting than the others?
It appears  blutmagie  numbers are a lot lower than the other mirror
reports as far as I can tell.


Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: help: Firefox is configured to use a proxy server that is refusing connections

2010-05-11 Thread Jon
On Tue, May 11, 2010 at 4:04 AM, Lefcoe Yaacov yaaco...@gmail.com wrote

I recently installed Tor onto Firefox 3.5.9 on a PowerPC Mac Powerbook running 
OSX 10.5.8.
 It worked fine for about 5 days  then starting giving
 me the message on the subject line

It might be easier to help you if we know what the message was that
was on the subject line.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Connection refused

2010-04-30 Thread Jon Cosby


I'm getting frequent 504: Connection refused errors on a few sites.
This usually happens when I've been logged onto the site for an hour or
two. Restarting Firefox doesn't fix the problem, the only thing that seems
to work is restarting the Tor and Polipo daemons. Does anyone know what
might trigger this? 

Jon 

 

Re: Declining traffic

2010-04-23 Thread Jon
I came across this info which may be related or not about the possible
botnets. There is a new P2P botnet forming. The Trojan it uses is '
Heloag ' .

this is the url that gives info about it:

http://threatpost.com/en_us/blogs/new-p2p-botnet-forming-041310?utm_source=Threatpost+Spotlight+Emailutm_medium=Email+Marketing+-+CRM+Listutm_campaign=Threatpost+SpotlightCID=


this is the short url:   http://threatpost.com/en_us/OTQ

FYI

On Fri, Apr 23, 2010 at 10:14 AM, Scott Bennett benn...@cs.niu.edu wrote:
     On Fri, 23 Apr 2010 15:51:59 +0200 Sebastian Hahn m...@sebastianhahn.net
 wrote:
On Apr 23, 2010, at 3:21 PM, Timo Schoeler wrote:
 thus Brian Mearns spake:
 Any chance your ISP is throttling you?

 100% *not*.

Another possibility would be that your relay is heavily
overloaded. See the big thread on tor-relays about
the problems and potential solutions [0].

     Sebastian, there was something that looked very much like a botnet
 attack running for two or three hours this a.m.  It seems to have stopped
 now.  I had shut down my machine to install operating system updates.
 When all that was finished and I finally brought the system back up, for
 some unknown reason, pf did not start.  (As if there were not going to be
 enough confusion as things already were.  Sigh.)  As soon as I noticed pf
 wasn't running, I started it manually and loaded a block list.  But pftop
 continued to pour forth log entries of illicit connection attempts from
 untold numbers of IP addresses and to scads of different TCP port numbers.
 I kept stopping and starting the logging, so that I could see the log
 entries long enough to add the addresses to that block list.  I eventually
 got crosseyed from adding somewhere between 200 and 300 IP addresses to
 the list. :-(  When I then let the logging continue, it had stopped
 getting any new stuff to log.
     It was very intense while it lasted, but in the larger scheme of
 things, it was of very short duration for a coordinated attack.  I doubt
 that my system was the onlyt tor relay being attacked.  In fact, I think
 the attack began a short time after my node appeared in the consensus,
 although at this point I can't prove it.
     What I would like to know is how many systems were attacked this
 a.m. in that manner,  were only systems running tor relays attacked,
 who shut it off, etc.  If anyone else on this list noticed anything between
 5:00 a.m. CDT and 8:00 a.m. CDT, please post the details here.  Thanks!

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Eventdns: All name servers have failed

2010-04-16 Thread Jon
After several hours of searching thru the archives, googling, etc;
trying to find answers for what is causing this error and what to do
about it.

I could find a lot of bug tickets, and a lot of issues about it, but
didn't seem to locate a fix for it except there were several for the
Linux OS.

I did not find anything on the Windows Svr side of the problem. I had
this issues with Win Xp, but did not have it with Win 7. Now I am
having it with WIn Svr 2008.

Was there a fix or a solution for it, or was it determined that it was
not important enough to worry about at the time, since generally it
would correct it self with in less than a second most of the time and
continue to work till it happened again?

I have had 5 of these warnings now in 12 hrs today. To me that seems
kind of excessive, but maybe its just me.

The last 2 warnings were exactly 1 hour apart. But as I mentioned
earlier, it lasts for last than a second.

Any ideas or solutions?

Thanks for the help and assistance.


Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Problems with Vidalia freezing up

2010-04-13 Thread Jon
This has just started in the past 3 days. I first had a network drop
signal. Called the ip provider and they came out a did a signal test
and found it was low and fixed that.

However it did not fix my problem. Vidalia has been freezing up
several times in the past 4 days. With it progressively getting worse.
I have had to reboot the computer 2 times so far today and reboot
vidalia 4 times today.

In checking the logs, am not able to find any reason for it to
lock/freeze up. Naturally it has been frustration since it keeps me
from staying online. On the tor logs, there is a number of eventdns
issues, but that is not unusual as it corrects it self generally with
in less than a couple of seconds.

I have run out of ideas. Any ideas on what to look for?

I did notice that my inbound and outbound connections have increased a
lot and am not sure if that may be the issue causing the freeze.

I am on Win Svr 2008rc.  Also running Tor ver. 0.2.1.25  and Vidalia
ver 0.2.7 . Not sure what else info one might need.

Any ideas on what to do next?

Thanks,

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Anti-Virus software for windows server

2010-03-21 Thread Jon
Seems to me I saw in one of the messages awhile back about anti-virus
software for servers. I cant seem to locate it in the archives. What
anti-virus programs are being used for windows servers?

Specifically, win 2003 or win 2008 ?

Thanks.

Jon
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Switching from windows to linux - config problems

2010-03-16 Thread Jon
I wish I knew. I first thought after all the help that maybe i missed
a number in the key. That wasn't it, so I changed Virtual drives to
see if if a different drive would make a difference. Theoretically, i
would not think so. However, it seems to work ok on the other Virtual
drive. It was really weird.

On Mon, Mar 15, 2010 at 8:10 PM, Michael Gomboc
michael.gom...@gmail.com wrote:
 I'm curious, what was the problem?

 2010/3/15 Jon torance...@gmail.com

 Thanks,, the key issue has been resolved. Appreciate all the help  :)

 On Mon, Mar 15, 2010 at 5:50 PM, Michael Gomboc
 michael.gom...@gmail.com wrote:
  For more help, please post the exact output of the first and the second
  command.
 
  regards,
  Michael
 
  2010/3/12 Jon torance...@gmail.com
 
  I followed the instructions on the Debian/Ubuntu web page.
 
   Please show what you added to your sources.list.
   deb     http://deb.torproject.org/torproject.org lenny main
 
  What distro are you running? Debian 5.03 and 5.04, Unbuntu server 9.10
   and desktop Unbuntu 9.10
 
   Is your Internet connection configured?
  yes, I can get out with no problems
 
   What is the output of:
  
  
   gpg --keyserver keys.gnupg.net --recv 886DDD89
  
  
   After
  
   gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key
   add
   -
  
 
  everything works fine except when the export line is put in. I end up
  with an error saying something to the effect that the public key is
  invalid. ( i dont have a c/p of it, I am trying to remember from
  memory )
 
  Just like you did, getting it right, the guys on IRC channel went thru
  it with me also and did some little tricks and they all came out
  exactly. But when I still added the last line, same thing happened.
 
  The only thing I can think of is I am using a Virtual drive, and that
  last  line breaks. But my gut tells me that is not the problem. I may
  have to dig in the celler and bring out some old box's and trying it
  in a Hard Drive straight and see if the same issue happens.
 
  I am hoping to be able to use it thru a Virtual Drive if I can.
 
  Thanks
 
  On Fri, Mar 12, 2010 at 4:10 PM, Michael Gomboc
  michael.gom...@gmail.com wrote:
   What distro are you running?
  
   Please show what you added to your sources.list.
  
   Is your Internet connection configured?
  
   What is the output of:
  
  
   gpg --keyserver keys.gnupg.net --recv 886DDD89
  
  
   After
  
   gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key
   add
   -
  
   you should see that:
  
   OK
  
   I tested it right now with Ubuntu and there is no problem.
  
   Regards,
   Michael
  
  
   2010/3/12 Jon torance...@gmail.com
  
   I am in the process now of wanting to move up to linux for my main
   relay OS. I have been running windows xp and 7. I have tried on 3
   different distros with the config for TOR and keep coming up with
   the
   same problem.
  
   a) on the page for    Debian  Unbuntu Instructions  under Option
   #2, after the deb line is put into the   /etc/apt/sources.list  
   file
  
   b) it then says to run the lines to get the gpg key ie: gpg
   --keyserver keys.gnupg.net --recv 886DDD89
  
    and then
  
   c)gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo
   apt-key
   add
   -
  
   this is where my problem lies. I can not get the 2nd line to work. I
   keep getting an error say  no keys available or this is not a
   public
   key.
  
   It is the same, no matter which distro I tried on. Obviously, I am
   unable to go any further to install Tor.
  
   I got on IRC and asked in the Tor channel and tried to get help.
   They
   tried several different things to check it out and see if they could
   get it to work. In following there checks, it checked out and they
   could not understand either why it would not work.
  
  
   Any ideas and/or help appreciated.
  
   Thanks.
  
   ***
   To unsubscribe, send an e-mail to majord...@torproject.org with
   unsubscribe or-talk    in the body.
   http://archives.seul.org/or/talk/
  
  
  
   --
   Michael Gomboc
   www.viajando.at
   pgp-id: 0x5D41FDF8
  
  ***
  To unsubscribe, send an e-mail to majord...@torproject.org with
  unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/
 
 
 
  --
  Michael Gomboc
  www.viajando.at
  pgp-id: 0x5D41FDF8
 
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



 --
 Michael Gomboc
 www.viajando.at
 pgp-id: 0x5D41FDF8

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Full bandwidth is not used.

2010-03-16 Thread Jon
Paul, I am not savy enough to explain on the ins and outs of tor, etc.
But what I can tell you, with both my servers running, I have yet
reached my full bandwidth. I read someplace when I was researching on
routers, that some routers actually had reduced the amt of bandwidth
going thru them. ie: person was paying for 10 mbps and was only
getting ( showing ) less than 5mps after going thru the router.

I suspect that if your full bandwidth was being used, your system
would possibly freeze cause of a burst of speed, etc., there would be
no more room for more bandwidth. IMO, i don't think one would really
want to be using it to the max. ex: you buy a car and want to see how
it runs, so you take it out on the road and open it up as fast as it
will go. To get the full usage out of the car, one would have to run
it wide open, which of course could cause problems and would be hard
on the car if done for any length of time.


Also in another message, it was brought up that if a server is turned
on and off a number of times and often, the user count of users using
your bandwidth would be down until it became stable again. Time wise ,
if I remember right, is a 24-48 hour period.

Jon

On Tue, Mar 16, 2010 at 4:38 AM, Paul Menzel
paulepan...@users.sourceforge.net wrote:
 Am Freitag, den 12.03.2010, 11:40 +0100 schrieb Paul Menzel:
 Am Dienstag, den 09.03.2010, 14:01 +0100 schrieb Paul Menzel:
  Am Dienstag, den 09.03.2010, 07:40 -0500 schrieb and...@torproject.org:
   On Mon, Mar 08, 2010 at 10:21:29AM +0100, 
   paulepan...@users.sourceforge.net wrote 1.6K bytes in 52 lines about:
   : I now increased the RAM too and restarted the server to no avail. It is
   : still below 100 KB/s.
  
   What is the network configuration?
 
          $ more /etc/tor/torrc
          SocksPort 0 # what port to open for local application
          connections
          ControlPort 9051
          ORPort 443
          ORListenAddress 0.0.0.0:9090
          Address 62.141.42.186
          ContactInfo 1024D/6C0E1D58 Paul Menzel p...@gw90.de
          DirPort 80 # what port to advertise for directory connections
          DirListenAddress 0.0.0.0:9091

 I implemented the changes suggested by arma on IRC (due to Exit and
 Guard flag [1]) to configure my server as non-exit relay, so I added the
 following line.

         ExitPolicy reject *:*

  It is a virtual machine and connections to port 80 and 443 are forwarded
  by an IPtables entry in the nat table with DNAT to the virtual host. On
  the virtual host using IPtables ports 80 and 443 are forwarded to 9090
  and 9091.
 
  Sebastian on IRC helped me to gather more data. In `cached-descriptors`
  I have the following.
 
          bandwidth 5242880 10485760 155910
 
  There are more entries for my IP address when I restarted and upgraded
  Tor.
 
  In `cached-consensus` (from 12:28 UTC) there is
 
          r anonymisierungsdien s+wb9df31yS6Y02Rvl0i0tenAWA 
  vyRDgH2XTP6Tn1MPiJkWE0Yk9e8 2010-03-08 18:05:07 62.141.42.186 443 80
          s Exit Fast HSDir Running Stable V2Dir Valid
          v Tor 0.2.1.23
          w Bandwidth=61
          p reject 
  25,119,135-139,445,563,1214,4661-4666,6346-6429,6699,6881-6999
 
  and Bandwidth even decreased by 1 (from 62) compared to the value before
  the update (11:14 UTC).

 Unfortunately changing the server to a non-exit relay on 2010-03-10
 09:28:25 UTC did not change anything. Although looking at my logs and
 the data on [2] I would say it differs a bit. According to my logs I
 would say, that traffic even decreased.

         $ grep -A 6 62.141.42.186 cached-descriptors | grep -E 
 'published|bandwidth'
         published 2010-03-07 17:51:12
         bandwidth 5242880 10485760 55006
         published 2010-03-08 00:05:02
         bandwidth 5242880 10485760 155910
         $ grep -A 6 62.141.42.186 cached-descriptors | grep bandwidth
         bandwidth 5242880 10485760 214272
         bandwidth 5242880 10485760 141962
         $ LANG=C date  grep -A 6 62.141.42.186 cached-descriptors | grep 
 bandwidth
         Thu Mar 11 10:30:02 UTC 2010
         bandwidth 5242880 10485760 181555
         $ LANG=C date  grep -A 6 62.141.42.186 cached-descriptors | grep 
 -E 'published|bandwidth'
         Fri Mar 12 09:46:43 UTC 2010
         published 2010-03-10 09:28:24
         bandwidth 5242880 10485760 181555
         published 2010-03-11 03:28:50
         bandwidth 5242880 10485760 178964
         published 2010-03-11 21:29:37
         bandwidth 5242880 10485760 143546

 The value displayed on [2] seems to be more up to date.

 Here are some compiled values from `cached-consensus`.

         $ grep -A4 62.141.42 cached-consensus # adapted the output.
         r anonymisierungsdien s+wb9df31yS6Y02Rvl0i0tenAWA 
 QvLgYWR3HuX0DKMSPBCwzjIVpCk 2010-03-09 12:05:55 62.141.42.186 443 80
         s Exit Fast HSDir Running Stable V2Dir Valid
         w Bandwidth=63
         $ ls -al (adapted)
         384600  9. Mär 21:27 cached-consensus
         w Bandwidth=102

Re: Switching from windows to linux - config problems

2010-03-15 Thread Jon
Thanks,, the key issue has been resolved. Appreciate all the help  :)

On Mon, Mar 15, 2010 at 5:50 PM, Michael Gomboc
michael.gom...@gmail.com wrote:
 For more help, please post the exact output of the first and the second
 command.

 regards,
 Michael

 2010/3/12 Jon torance...@gmail.com

 I followed the instructions on the Debian/Ubuntu web page.

  Please show what you added to your sources.list.
  deb     http://deb.torproject.org/torproject.org lenny main

 What distro are you running? Debian 5.03 and 5.04, Unbuntu server 9.10
  and desktop Unbuntu 9.10

  Is your Internet connection configured?
 yes, I can get out with no problems

  What is the output of:
 
 
  gpg --keyserver keys.gnupg.net --recv 886DDD89
 
 
  After
 
  gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add
  -
 

 everything works fine except when the export line is put in. I end up
 with an error saying something to the effect that the public key is
 invalid. ( i dont have a c/p of it, I am trying to remember from
 memory )

 Just like you did, getting it right, the guys on IRC channel went thru
 it with me also and did some little tricks and they all came out
 exactly. But when I still added the last line, same thing happened.

 The only thing I can think of is I am using a Virtual drive, and that
 last  line breaks. But my gut tells me that is not the problem. I may
 have to dig in the celler and bring out some old box's and trying it
 in a Hard Drive straight and see if the same issue happens.

 I am hoping to be able to use it thru a Virtual Drive if I can.

 Thanks

 On Fri, Mar 12, 2010 at 4:10 PM, Michael Gomboc
 michael.gom...@gmail.com wrote:
  What distro are you running?
 
  Please show what you added to your sources.list.
 
  Is your Internet connection configured?
 
  What is the output of:
 
 
  gpg --keyserver keys.gnupg.net --recv 886DDD89
 
 
  After
 
  gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add
  -
 
  you should see that:
 
  OK
 
  I tested it right now with Ubuntu and there is no problem.
 
  Regards,
  Michael
 
 
  2010/3/12 Jon torance...@gmail.com
 
  I am in the process now of wanting to move up to linux for my main
  relay OS. I have been running windows xp and 7. I have tried on 3
  different distros with the config for TOR and keep coming up with the
  same problem.
 
  a) on the page for    Debian  Unbuntu Instructions  under Option
  #2, after the deb line is put into the   /etc/apt/sources.list  
  file
 
  b) it then says to run the lines to get the gpg key ie: gpg
  --keyserver keys.gnupg.net --recv 886DDD89
 
   and then
 
  c)gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key
  add
  -
 
  this is where my problem lies. I can not get the 2nd line to work. I
  keep getting an error say  no keys available or this is not a public
  key.
 
  It is the same, no matter which distro I tried on. Obviously, I am
  unable to go any further to install Tor.
 
  I got on IRC and asked in the Tor channel and tried to get help. They
  tried several different things to check it out and see if they could
  get it to work. In following there checks, it checked out and they
  could not understand either why it would not work.
 
 
  Any ideas and/or help appreciated.
 
  Thanks.
  ***
  To unsubscribe, send an e-mail to majord...@torproject.org with
  unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/
 
 
 
  --
  Michael Gomboc
  www.viajando.at
  pgp-id: 0x5D41FDF8
 
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



 --
 Michael Gomboc
 www.viajando.at
 pgp-id: 0x5D41FDF8

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Switching from windows to linux - config problems

2010-03-12 Thread Jon
I am in the process now of wanting to move up to linux for my main
relay OS. I have been running windows xp and 7. I have tried on 3
different distros with the config for TOR and keep coming up with the
same problem.

a) on the page forDebian  Unbuntu Instructions  under Option
#2, after the deb line is put into the   /etc/apt/sources.list  
file

b) it then says to run the lines to get the gpg key ie: gpg
--keyserver keys.gnupg.net --recv 886DDD89

 and then

c)gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -

this is where my problem lies. I can not get the 2nd line to work. I
keep getting an error say  no keys available or this is not a public
key.

It is the same, no matter which distro I tried on. Obviously, I am
unable to go any further to install Tor.

I got on IRC and asked in the Tor channel and tried to get help. They
tried several different things to check it out and see if they could
get it to work. In following there checks, it checked out and they
could not understand either why it would not work.


Any ideas and/or help appreciated.

Thanks.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Switching from windows to linux - config problems

2010-03-12 Thread Jon
I followed the instructions on the Debian/Ubuntu web page.

 Please show what you added to your sources.list.
 deb http://deb.torproject.org/torproject.org lenny main

What distro are you running? Debian 5.03 and 5.04, Unbuntu server 9.10 and 
desktop Unbuntu 9.10

 Is your Internet connection configured?
yes, I can get out with no problems

 What is the output of:


 gpg --keyserver keys.gnupg.net --recv 886DDD89


 After

 gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -


everything works fine except when the export line is put in. I end up
with an error saying something to the effect that the public key is
invalid. ( i dont have a c/p of it, I am trying to remember from
memory )

Just like you did, getting it right, the guys on IRC channel went thru
it with me also and did some little tricks and they all came out
exactly. But when I still added the last line, same thing happened.

The only thing I can think of is I am using a Virtual drive, and that
last  line breaks. But my gut tells me that is not the problem. I may
have to dig in the celler and bring out some old box's and trying it
in a Hard Drive straight and see if the same issue happens.

I am hoping to be able to use it thru a Virtual Drive if I can.

Thanks

On Fri, Mar 12, 2010 at 4:10 PM, Michael Gomboc
michael.gom...@gmail.com wrote:
 What distro are you running?

 Please show what you added to your sources.list.

 Is your Internet connection configured?

 What is the output of:


 gpg --keyserver keys.gnupg.net --recv 886DDD89


 After

 gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -

 you should see that:

 OK

 I tested it right now with Ubuntu and there is no problem.

 Regards,
 Michael


 2010/3/12 Jon torance...@gmail.com

 I am in the process now of wanting to move up to linux for my main
 relay OS. I have been running windows xp and 7. I have tried on 3
 different distros with the config for TOR and keep coming up with the
 same problem.

 a) on the page for    Debian  Unbuntu Instructions  under Option
 #2, after the deb line is put into the   /etc/apt/sources.list  
 file

 b) it then says to run the lines to get the gpg key ie: gpg
 --keyserver keys.gnupg.net --recv 886DDD89

  and then

 c)gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add
 -

 this is where my problem lies. I can not get the 2nd line to work. I
 keep getting an error say  no keys available or this is not a public
 key.

 It is the same, no matter which distro I tried on. Obviously, I am
 unable to go any further to install Tor.

 I got on IRC and asked in the Tor channel and tried to get help. They
 tried several different things to check it out and see if they could
 get it to work. In following there checks, it checked out and they
 could not understand either why it would not work.


 Any ideas and/or help appreciated.

 Thanks.
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



 --
 Michael Gomboc
 www.viajando.at
 pgp-id: 0x5D41FDF8

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Error / bug on latest Ver 0.2.1.24

2010-03-06 Thread Jon
I have been getting this error:

Mar 07 10:12:03.984 [Warning] router_orport_found_reachable(): Bug:
ORPort found reachable, but I have no routerinfo yet. Failing to
inform controller of success.

[10:12:03] Tor Software Error - The Tor software encountered an
internal bug. Please report the following error message to the Tor
developers at bugs.torproject.org: 


The 1st time was right after it came out. I had to reboot and the
error showed up again. I have made no changes. I have notice that it
has drastically slowed down the amount of user access. It all happened
after the install. right now Ver .23 was performing better than this
new one. Any ideas?

This is being run on Win 2k. I am kind of afraid to install on my exit
server until there is fix, if needed.

Any Ideas?

I have made a report to the bug tracker - Task #1268

Thanks  :)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Access from a local file

2010-02-18 Thread Jon Cosby

On Wed, 17 Feb 2010 11:18:03 -0800 (PST), Martin Fick mogul...@yahoo.com
wrote:
 --- On Wed, 2/17/10, Jon Cosby j...@jcosby.com wrote:
 
 I'm referring to links from file:// urls. By default,
 Torbutton blocks this, and has it recommended.
 
 Ah, you mean the file protocol.  Firefox itself tends to have this
 disabled by default also.  One of the reasons is to prevent malicious
users
 from including file:// urls in an external webpage.  With file:// urls,
a
 webpage could be designed to test for the existence of local files on
your
 computer.  From an anonymity standpoint, if I can run a test that
verifies
 the existence of a specific file on your computer, one that I can prove
 only you would have on your computer, then I might be able to prove that
 you loaded my webpage.  
 
 I suspect there are also ways potentially execute some local code on
your
 computer by accessing local files (depending on the OS, this might be
 harder or easier to achieve).  If that's the case, perhaps depending on
the
 program, by executing it locally, I might be able to detect this
remotely. 
 Maybe the program does something as simple as a DNS lookup that I can
sniff
 and then correlate to you...
 
 And, finally, just because a file is accessed via a file:// url does not
 mean it is actually accessing a file locally.  It is accessing a file
via
 your local file system namespace, but this might be on a remotely
mounted
 drive/share making the remote server able to detect/prove this access,
once
 again, exposing your access of a webpage by at least the owner of the
 remote server/share.
 
 I suspect that there are many more attacks based on this, that I have
only
 touched the tip of the iceberg...  Hope that helps,
 

The only time I can ever recall coming across the protocol is in opening
files on my computer, and this has never been disabled. To fool somebody
into opening this file on a remote server, the cracker would need a copy of
the file, which would essentially require prior access to the computer. Or
am I missing something here?


Jon



***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Google cookies

2010-02-13 Thread Jon Cosby
On Fri, 2010-02-12 at 23:45 -0500, and...@torproject.org wrote:
 On Wed, Feb 10, 2010 at 11:27:26AM -0800, j...@jcosby.com wrote 0.3K bytes in 
 10 lines about:
 : I just noticed that on closing a Firefox session, google cookies are not
 : removed. I have to toggle Tor to remove them. Is this normal?
 
 Do you mean toggle torbutton?  It depends what you have told torbutton
 to do or how you have setup firefox to manage cookies.
 

Yes, I'm using the Torbutton, with the default cookie settings (clear on
toggle, etc.) The google cookies are the only ones that require a manual
click to clear. All others are removed on closing and resetting Firefox.



Jon


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Google cookies

2010-02-13 Thread jon


On Sat, 13 Feb 2010 15:03:28 -0500, Flamsmark  wrote:  On 13 February
2010 14:16, Jon Cosby  wrote:
  On Fri, 2010-02-12 at 23:45 -0500,
and...@torproject.org [2] wrote:
  On Wed, Feb 10, 2010 at 11:27:26AM
-0800, j...@jcosby.com [3] wrote 0.3K bytes in 10 lines about:
  : I just
noticed that on closing a Firefox session, google cookies are not
  :
removed. I have to toggle Tor to remove them. Is this normal?
 
  Do you
mean toggle torbutton? It depends what you have told torbutton
  to do or
how you have setup firefox to manage cookies.
 

 Yes, I'm using the
Torbutton, with the default cookie settings (clear on
 toggle, etc.) The
google cookies are the only ones that require a manual
 click to clear. All
others are removed on closing and resetting Firefox.

 Are you referring to
the Google cookies that Torbutton uses to avoid having to fill in CAPTCHAs
every time you load a Google page? Those are the same across Torbutton
users, so they won't identify you.   

Now that you mention it, I haven't
seen that in a while. Nice feature, I wasn't aware of it.


Jon

Links:
--
[1] mailto:j...@jcosby.com
[2]
mailto:and...@torproject.org
[3] mailto:j...@jcosby.com


Google cookies

2010-02-10 Thread Jon Cosby
I just noticed that on closing a Firefox session, google cookies are not
removed. I have to toggle Tor to remove them. Is this normal?


Jon


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor in China

2010-02-09 Thread Jon
Am not sure if they are still blocking, but I presume there are some
blocks still on, as the bridge usage is very high for users from
there.

On Tue, Feb 9, 2010 at 6:36 PM,  onion.s...@nym.hush.com wrote:
 Does anyone know if China is currently blocking Tor? Does the
 situation described below persist?

 https://blog.torproject.org/blog/picturing-tor-censorship-in-china

 https://blog.torproject.org/blog/tor-partially-blocked-china

 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Ypops with TOR

2010-02-02 Thread Jon
 Ypops: http://ypopsemail.com/  FYI - this page may have an Trojan in it. 
 My Avast AV went off and FF would not reload cause of the alert. It may be a 
 false alert, but thought I should pass it on:

2/2/2010 8:12:37 AM Object: http://hustov-steps.biz/  Infection:
HTML:IFrame-KP [Trj]

On Tue, Feb 2, 2010 at 2:52 AM, M moeedsa...@gmail.com wrote:
 Hey guys  I wanted to check my yahoo acct via thunderbird, and i found a
 program called ypops that allows you to do so. Can some explain to me or
 know of a links which explains how to torrify it?

 Ypops: http://ypopsemail.com/
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Need for sane ISP's?

2010-01-25 Thread Jon
I do not know if this will help or not. After I got my server up and
running, approx 10 days later i got a call from my IP
provider that they had received several complaints about illegal
downloading of copyright material. Shocked the hell out of me. I
figured if it was going to happen, it would happen later than sooner.

I did not receive a DMCA per say, but I was told that they had 7
notices and the issues needed to be take care of.

I explained what I was doing, but they, at least from tier 2 I think,
had no clue about TOR nodes. So Instead of
trying to act like an expert and they didn't know what was going on, I
asked about what ports this was happening
on and they told me and they slipped as to who the complainant was. I
told them I would take care of the problem and to let me know if any
more complaints came in.

So far as of this writing, I have received no more complaints. I had
to uncheck the Misc box in the exit node, which would cover the ports
the
complaint was on. Now if this would happen again, They may get a
little stronger action or force full about it. I will have to verify
this, but I believe according to the TOS of the provider, If I did not
comply and attempt to correct the problem , they would pull my
contract. I have not at this time sent a letter to them using the
template.

Like I said earlier, the problem has been resolved as far as I know at
this time.

Jon

On Mon, Jan 25, 2010 at 5:56 AM, grarpamp grarp...@gmail.com wrote:
 Hi. In regard to the current general discussion regarding Tor
 operators who are getting disconnected for DMCA reports, etc...

 Is there a need for a 'by the books' ISP/hoster based in the USA?

 By 'by the books' (btb), I mean... one who isn't just going to kill
 your node, blog, files, etc... because someone complained and the
 ISP doesn't happen to like complaints or you... but will just claim
 common carrier immunity as provided for in usa law. Note that, in
 the usa, this generally means that if the subscriber does not step
 up to deal with the issue, that the isp is then forced to act to
 avoid becoming a conspirator or facilitator... often due to legal
 verbage in their contracts leading all the way back to the Tier-1's.
 Except I'm curious to get a handle on whether even that is the real
 world case... ie: the provider continuing to claim immunity even
 if the subscriber fails to stand or be reachable vs. the isp losing
 their pipe because of it.

 But overall, is there a need for a usa ISP who won't kneel to silly
 inquiries unless the law requires them to do so. And certainly won't
 do it because they take some lame moral sides to whatever the issue
 of the day is. aka: btb.

 Having one in the usa may not be good in relation to DMCA issues
 but surely also may be good for foreign entities to safely host
 what wouldn't be welcome in their own country. But would surely be
 ok as free speech in the usa.

 And other variations on this theme. Discussion as to such need?
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Call for volunteers

2009-11-27 Thread jon
Hi,

I'm Jon.  I do some of the mirror coordination work for
http://www.torproject.org/

I'm in need of a quick and good tutorial for those mirror operators who
are interested in running with HTTPS capability.  So basically, openssl
(or generating a self signed cert) and how to configure Apache to work
with that.

If you are interested in writing this tutorial (or adapting an existing
tutorial), please contact me off list.  Thank you in advance for what
you do.

-- 
Best,

Jon


--- --- --- ---

PGP key located at http://www.nonvocalscream.com/key.txt

PGP encrypted mail preferred.

PGP Key ID: 6F19ED63

Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Microsoft .NET Add-on

2009-11-22 Thread Jon Cosby
On Mon, 2009-11-23 at 02:15 +0800, Koh Choon Lin wrote:
 Dear all
 
 I noticed that on Windows, Microsoft .NET Framework Assistant Add-on
 is installed and enabled for all Firefox installation (portable or
 not), i.e. including the Tor Browser Bundle 1.2.10. Would this add-on
 be a security risk to anonymity?
 
 
 

This appears to be provided in a service pack by Microsoft, and I would
not trust them for this purpose. Remember, this is the same company that
forced Genuine Advantage their users.



***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Tracing internal errors

2009-11-14 Thread Jon Cosby
I'm trying to get Tor working in Firefox/Torbutton on openSUSE 11.2.
There's something about the privoxy settings that it doesn't seem to
like. In the privoxy config, I've tried

forward-socks4a / localhost:9050 . (internal error)
forward-socks4a / 127.0.0.1:9050 . (check settings)
forward-socks5  / localhost:9050 . (internal error)
forward-socks5  / 127.0.0.1:9050 . (check settings)

Internal error is kind of vague. There's nothing in the privoxy log. I
seem to remember running into this when there was an issue with the
system time, but that's not the case here. What's the next place to
look?


Jon


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Random chaff [was: more work for Grobbages]

2009-09-23 Thread Jon McLachlan

*sigh*

See below :)


On Sep 23, 2009, at 8:29 AM, Paul Syverson wrote:


On Wed, Sep 23, 2009 at 11:11:29AM -0400, Praedor Atrebates wrote:

It would appear that the tor network should include some timing
randomization and reordering of packets to thwart such analysis.
Not so much to really slow things down but enough to throw up
uncertainty in the packet analyses.



You're trying to turn it into a mix network.


That's something that exists in that box over there, not Tor's  
box ;)



The order uncertainty
doesn't matter at this level of latency.


AKA, as little of latency as possible... which is still quite a bit  
actually, thank you bittorrent :(



The Bauer et al. research I
mentioned showed how to do timing attacks based just on setting
up the circuit. You don't even need to send any data.


*shrugs*

If all clients in the network created Tor circuits of the same length,  
all at the same time, wouldn't that mangle that analysis of who's  
telescoping circuit-extension request is who's?  I know that's not  
what cover traffic does... but if Tor has some sort of heart beat  
that would make it more difficult to distinguish between which circuit- 
extension request is who's... that's only feasible because all clients  
have a stake in circuits, not the same for external-to-to requests,  
like webpages etc etc...




Whatever solution (if one even exists) is out there, most of
the straightforward ideas and many of the not so straightforward
ideas have already been extensively researched.


But not necessarily tested in the wild... Even the Bauer et al.  
demonstrates those ideas in a fake Tor network, yes, on recommendation  
from Tor not to do the experiment in Tor, but still.  And on PL, the  
VM environment is particularly prone to latency, so of course timing  
analysis attacks will stick out like a sore thumb...


so there might actually be something to deploying that exp on the real  
network...



Cf.


what does that mean?  :)


the papers
Nick and I mentioned before and others in the Freehaven anonbib.

aloha,
Paul




Re: The Register article about making online anonymity illegal in Australia

2009-09-09 Thread Jon McLachlan

I figure it's an arms race between those seeking control and those
valuing freedom.



I disagree. I'd say that valuing control and seeking freedom more  
accurately describe the actual state of affairs.


Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

2009-08-23 Thread Jon Cosby
On Wed, 2009-08-19 at 02:12 -0400, Ringo wrote:
 I would appreciate any feedback people have on this. This is just an
 idea and it's kind of beta, so don't use this unless you know what
 you're doing. PGP key at bottom of message
 
 
 
 
 More Secure Tor Browsing Through A Virtual Machine in Ubuntu
 


I've been trying to get Tor/Privoxy to work on an openSUSE guest in
VirtualBox. I have the Tor and the Privoxy daemon running, but get and
internal error in the Torbutton test, and a 503 error trying to access
a Web page. It's actually working in the factory guest. I don't have a
clue what's different. Firewall is the same, so are the config files. It
also works on the host. Do you have any guess what I'm overlooking?


Jon




Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

2009-08-23 Thread Jon Cosby
On Sun, 2009-08-23 at 21:13 -0700, Jon Cosby wrote:
 On Wed, 2009-08-19 at 02:12 -0400, Ringo wrote:
  I would appreciate any feedback people have on this. This is just an
  idea and it's kind of beta, so don't use this unless you know what
  you're doing. PGP key at bottom of message
  
  
  
  
  More Secure Tor Browsing Through A Virtual Machine in Ubuntu
  
 
 
 I've been trying to get Tor/Privoxy to work on an openSUSE guest in
 VirtualBox. I have the Tor and the Privoxy daemon running, but get and
 internal error in the Torbutton test, and a 503 error trying to access
 a Web page. It's actually working in the factory guest. I don't have a
 clue what's different. Firewall is the same, so are the config files. It
 also works on the host. Do you have any guess what I'm overlooking?
 
 

Checking the tor log, I'm getting warnings that my clock is behind the
time. My clocks are set correctly. Anyone know what this is about?


Jon




Re: Numbers of police-raids ?

2009-08-16 Thread jon
Attac Heidenheim wrote:
 Hi everybody,
 I think everybody who plans to become an exit-node is frightened
 of being raided by the police (even in Germany) because of the server.
 Are there any numbers of police-searches available, especially for Germany ? 

 Greetings,
 Niklas
   
I don't know of any in the U.S. however, I will search public records
for anything.  Data won't be available for searches and seizures if a
prosecution did not result, due to the government protecting the
innocent. (which incidentally, might mean no data, I don't think laws
would permit successful prosecution of exit nodes here).

-- 
Best,

Jon


--- --- --- ---

PGP key located at http://www.nonvocalscream.com/key.txt

PGP encrypted mail preferred.

PGP Key ID: 6F19ED63

Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63




Re: Comcast throws down gauntlet to residential accounts

2009-08-11 Thread Jon Cosby
On Tue, 2009-08-11 at 12:38 +0200, Niels Elgaard Larsen wrote:
 Scott Bennett wrote:
   On Tue, 11 Aug 2009 01:10:41 -0400 Ted Smith ted...@gmail.com
  wrote:
 
  You're conveniently ignoring countries like Sweden, Iceland, Estonia,
  where socialist Internet policies have resulted in some of the best
  environments of digital freedom. In fact, your list appears only to
  
   Am I, indeed?  Let me see now...would that Sweden and Estonia happen
  to be the same Sweden and Estonia that are members of the European Union,
  that lovely organization issuing various directives requiring member states
  to institute legislation and regulation inimical to freedom on the Internet?
 
 It is even worse than that. In Sweeden ISP's are forced to hand over a copy 
 of every
 single byte that crosses state borders to the state. The FRA law:
 https://secure.wikimedia.org/wikipedia/en/wiki/FRA_law
 
 
 

Yet you trust companies in this country who will engage in warrantless
wiretapping for a fee?


Jon




Re: Comcast throws down gauntlet to residential accounts

2009-08-10 Thread Jon Cosby
On Mon, 2009-08-10 at 13:22 -0700, Martin Fick wrote:
 A right is something someone should not be able to 
 prevent you from doing, not something that should be 
 provided to you.  I believe that you have the right 
 to be a space tourist if you want to be, but, of
 course, that does not imply that I believe that you 
 should be able to become a space tourist for $10 
 (unless someone offers it to you at this price 
 voluntarily).  The right to do something and the 
 means to do it are two completely separate issues.
 

We aren't talking about the net a source of amusement. It is an
essential means for news, information, communication and political
speech. Consider what some people use Tor for. As it is, access in the
US is controlled by a few powerful telecoms, and if one of them
arbitrarily decides to preclude Tor or other anonymity programs, it will
have wide effects.

I would not use Comcast, wouldn't trust them given their history (e.g.,
BitTorrent). They're under-handed, lying and basically corrupt. To the
OP, consider changing services. 


Jon




Re: Download history

2009-07-31 Thread Jon Cosby
On Fri, 2009-07-31 at 12:14 -0700, Jon Cosby wrote:
 When I switch to Tor via the TorButton, I'm given a fresh cookies cache
 but my download history is intact. Downloads in anon mode are not added
 to the history. Is this by design?
 
 


Ignore. Checking the preferences, I guess I need to specify clearing the
history.


Jon Cosby




Re: Uzbl browser

2009-07-21 Thread Jon Cosby
On Tue, 2009-07-21 at 10:55 +0200, Marco Bonetti wrote:
 Uzbl looks like a nice browser but I don't think it will be good for Tor
 usage: anonymous surfing is not just a matter of enabling a proxy setting.
 The user has to secure the code which arrives to his browser, either
 turning javascript completely off or using TorButton selective killing,
 then he has to look for those html tags which could do nasty things like
 opening side channels and when he thinks it's all over he should start
 looking at which informations he send to the web server, in order to blend
 in the crowd, either stripping them off or changing his settings
 accordingly (like the user agent or the program's window size).

What's this about selective killing? I don't find any mention of it in
the TorButton preferences, or on google for that matter.


Jon




Request for volunteers

2009-07-18 Thread jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello,


It seems that our mirror updating script is a little outdated.  It is
located at

https://svn.torproject.org/cgi-bin/viewvc.cgi/website/trunk/update-mirrors.pl?view=log

and is a perl script.

Basically, it checks to see if a mirror has been updated and if even
slightly out of date, it will report the mirror as out of date.  We
would like to have mirrors that have are out of date more than 24
hours being reported Out of Date, those updated within 24 hours,
current... however I'm not sure how to code this.

Any pl guru out there who is inclined to help, please submit new code
to me off list, and thank you for your help!

- --
Best,

Jon


- --- --- --- ---

PGP key located at http://www.nonvocalscream.com/key.txt

PGP encrypted mail preferred.

PGP Key ID: 6F19ED63

Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkpiMioACgkQxlOuhm8Z7WPpNwCePK479qY4m9/x6+Z19nPJt1nH
gjgAn3YJK8qDvUyZ2ADGZSUE78p6Oy9U
=Z8rD
-END PGP SIGNATURE-



Re: tor-mirrors (mirrors of the Tor Project website)

2009-07-04 Thread jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

leandro noferini wrote:
 jon ha scritto:

 Just a couple of notes, since some Tor Project website mirror
 operators may be subscribed to this list:

 I would like  to setup a mirror for  tor website but I need  to know how
 much disk space needs.

 [...]


Should be 15 GB for the website and dist, and 4 GB for just the dist.
Thank you for your interest!

Links you should see...

http://archives.seul.org/tor/mirrors/

and

http://www.torproject.org/running-a-mirror.html.en

- --
Best,

Jon


- --- --- --- ---

PGP key located at http://www.nonvocalscream.com/key.txt

PGP encrypted mail preferred.

PGP Key ID: 6F19ED63

Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkpP0m8ACgkQxlOuhm8Z7WOHpwCeOpgmghGvCR99SslohHk6Ib2a
j4IAni51sMlByx/my9NYg/r0yYMnt3Gz
=43+e
-END PGP SIGNATURE-



Re: tor-mirrors (mirrors of the Tor Project website)

2009-06-24 Thread jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

jon wrote:
 Greetings,

 Just a couple of notes, since some Tor Project website mirror
 operators may be subscribed to this list:


 Recently there was some discussion regarding a discussion list for
 mirror operators.  This has recently been brought to fruition.
 Instructions on subscription are located here...

 http://archives.seul.org/tor/mirrors/


 Some details regarding the list may be found on the first post to
 the list...

 http://archives.seul.org/tor/mirrors/Jun-2009/msg0.html


 One key change is that mirror changes/additions are now posted to
 this list.  In the past, changes/additions were sent to
 tor-webmaster


 Something that is also desired, is the admin contact for the mirror
  operators.  Preferably stated in an introduction to the list.
 Alternatively, you can send me the contact directly, if you please
 :) A good email address is all that is requested.  This information
 will help to better contact those operators whose mirrors are out
 of date, or otherwise not working.  This way, we can let mirror
 operators know when their mirror *may* be misconfigured or
 non-updated.


 Also, if you host a mirror, and you notice that your organization
 is missing, or inaccurate, and you would like to update it, please
 also post that to the list.  Alternatively, let me know directly.

 Thank you for supporting Tor!

 Very best,

 Jon

... and /dist mirrors also.

The mirror list is on the website at:
http://www.torproject.org/mirrors.html.en

I apologize for the two emails instead of one.

Regards,
Jon


- --
PGP Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63
PGP ID 0x6F19ED63

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkpBxFoACgkQxlOuhm8Z7WNaWgCfR8UKkHCe39KEn149EEaYxJMk
mEgAnRPzMRjyIK9DZd0Ytk76r9urnIOv
=RgF9
-END PGP SIGNATURE-



tor-mirrors (mirrors of the Tor Project website)

2009-06-24 Thread jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Greetings,

Just a couple of notes, since some Tor Project website mirror
operators may be subscribed to this list:


Recently there was some discussion regarding a discussion list for
mirror operators.  This has recently been brought to fruition.
Instructions on subscription are located here...

http://archives.seul.org/tor/mirrors/


Some details regarding the list may be found on the first post to the
list...

http://archives.seul.org/tor/mirrors/Jun-2009/msg0.html


One key change is that mirror changes/additions are now posted to this
list.  In the past, changes/additions were sent to tor-webmaster


Something that is also desired, is the admin contact for the mirror
operators.  Preferably stated in an introduction to the list.
Alternatively, you can send me the contact directly, if you please :)
A good email address is all that is requested.  This information will
help to better contact those operators whose mirrors are out of date,
or otherwise not working.  This way, we can let mirror operators know
when their mirror *may* be misconfigured or non-updated.


Also, if you host a mirror, and you notice that your organization is
missing, or inaccurate, and you would like to update it, please also
post that to the list.  Alternatively, let me know directly.

Thank you for supporting Tor!

Very best,

Jon

- --
PGP Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63
PGP ID 0x6F19ED63

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkpBwlcACgkQxlOuhm8Z7WO9agCfe8sj/mdTQv3genjvKiNM9RJd
ml8An0Tq31o+zjCfWJKjYIbjnOYu1uJ8
=77SE
-END PGP SIGNATURE-



Re: Help Iranian dissidents

2009-06-21 Thread jon

linux wrote:

On Sunday 21 June 2009, Chris Humphry wrote:


[snip]


i will keep my server running even I know some guys I dont like are 
using it.





Regards
Robert

I don't know who is using mine. :)

Jon


Re: Help Iranian dissidents

2009-06-20 Thread Jon
Karsten N. wrote:
 I saw coloured revolutions in Georgia, Ukraine and Kirgisia. After
 successfull revolution these countries got corrupt regimes. I hope,
 iran will not go this way.

 And I hope, tor will stay political neutral.

 Karsten N.
   
Political neutral... yes, I think that is important for a project such
as this.


Jon


Re: eliminating bogus port 43 exits

2009-06-13 Thread Jon
I've read the entire thread and I still have one persisting question in
my mind...


Why are bogus port exists bad, and why should I eliminate them form my
exit policy?

*if* I want to keep the type of traffic somewhat also anonymous
(assuming the operator is not looking at the content) then I might use a
separate port to communicate my information.  I don't know if I totally
feel comfortable in this, most especially when we start talking about
peering into the content.  And even looking to see what the protocol
actually is, is peering.  That should be private, as an ethical
consideration for all operators.

Jon


Re: eliminating bogus port 43 exits

2009-06-13 Thread Jon
grarpamp wrote:
 One person's legit is another's bogus. It's always been that way.
 Other than routing, the use of the internet is partly chaos and
 it's not changing any time soon. Packets found on an internet,
 they exist, therefore they are, deal with it. So let's forget about
 this port number legitimacy thing.

 Further, some of us are real world network operators. We routinely
 sniff and record traffic as part of our jobs. In fact, if we did
 not, we would be very ineffective in our positions. Sniff if you
 want, don't if you don't. So we can also throw this argument out
 the window as to each their own.

 What we really want to know as network operators is what exactly
 IS going on in this case. And a simple count of SYN's is not enough
 for some operators to make a decision regarding their rulesets.

 Because for all they know, that traffic may indeed be diplomatic
 communications with the Borg that are keeping our planet from being
 assimilated. And well, unless you're Borg, or wish to become one,
 that's pretty legitimate :)

 Sniff that thing out, bring the full stats, write a whitepaper.
 Operators will look at it and make their own choices.

 Storing/grokking a days worth of tcp/43 sessions to find what percent
 of them have whois strings should be easy. As should tallying up
 the top ten whois queries and a distribution curve. That could help
 determine if it's some clients gone haywire or normal. Though
 somewhat like a ping someone left running, over Tor you'd just have
 to wait it out. Classifying and counting the non whois sessions
 would be harder but definitely interesting.

 If I was running an exit I would have already done and posted this
 for you all, but I'm not at the moment, so I can't. I yield the
 podium to my esteemed and valued peers on this list :)
   
I can not agree.  Sniffing the traffic at the exit node actually does
jeopardize the reason people are using this software in the first place.

Jon


Re: eliminating bogus port 43 exits

2009-06-13 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ted Smith wrote:
 On Sat, 2009-06-13 at 13:48 -0600, Jon wrote:
 grarpamp wrote:
 One person's legit is another's bogus. It's always been that way.
 Other than routing, the use of the internet is partly chaos and
 it's not changing any time soon. Packets found on an internet,
 they exist, therefore they are, deal with it. So let's forget about
 this port number legitimacy thing.

 Further, some of us are real world network operators. We routinely
 sniff and record traffic as part of our jobs. In fact, if we did
 not, we would be very ineffective in our positions. Sniff if you
 want, don't if you don't. So we can also throw this argument out
 the window as to each their own.

 What we really want to know as network operators is what exactly
 IS going on in this case. And a simple count of SYN's is not enough
 for some operators to make a decision regarding their rulesets.

 Because for all they know, that traffic may indeed be diplomatic
 communications with the Borg that are keeping our planet from being
 assimilated. And well, unless you're Borg, or wish to become one,
 that's pretty legitimate :)

 Sniff that thing out, bring the full stats, write a whitepaper.
 Operators will look at it and make their own choices.

 Storing/grokking a days worth of tcp/43 sessions to find what percent
 of them have whois strings should be easy. As should tallying up
 the top ten whois queries and a distribution curve. That could help
 determine if it's some clients gone haywire or normal. Though
 somewhat like a ping someone left running, over Tor you'd just have
 to wait it out. Classifying and counting the non whois sessions
 would be harder but definitely interesting.

 If I was running an exit I would have already done and posted this
 for you all, but I'm not at the moment, so I can't. I yield the
 podium to my esteemed and valued peers on this list :)
  
 I can not agree.  Sniffing the traffic at the exit node actually does
 jeopardize the reason people are using this software in the first place.

 Jon

 My understanding is that the Tor network provides some measure of
 *anonymity* regardless of whether the exit node listens to traffic.
 Certainly the reason for using Tor is not to magically protect your
 traffic from every being eavesdropped upon -- only end-to-end crypto can
 do that.

 Is this false? I ask out of genuine concern, because if exit nodes have
 to be trusted not to snoop on data for Tor to work properly (providing
 anonymity), Tor is not what I thought it was.
The tor network can not encrypt data leaving the edge of tor.  That is
to say, once data has left it's last hop, towards the site (or
service) the data is in the clear.  There is no way for Tor to
magically protect your data from eavesdropping.  I am however,
attempting to discourage eavesdropping by operators.

Just because you can do something, does not always mean you should, is
my thought.  We should also encourage end to end encryption.

Jon

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEUEARECAAYFAko0Eu0ACgkQR7/9CWL6/5g4KwCYkSP51UI7jhquc3Iil/uzYbeX
IwCdH4FvNZBlwn3jVU3a5YojEX8psYc=
=x1Ko
-END PGP SIGNATURE-



Re: eliminating bogus port 43 exits

2009-06-13 Thread Jon
Tor Fox wrote:
 Jon wrote:
  I am however, attempting to discourage eavesdropping by operators.

 That seems pointless. Anyone that's thoughtful enough to listen to
 your ethical consternation will also be thoughtful enough not to do
 anything intentionally malicious. It's the same reason why the police
 don't make public service announcements requesting that people not rob
 banks. Pleading with people intent on doing wrong is not going to
 change anything. The most you can do is educate people and let them
 make their own choices. Give us some hard facts about why it's a bad
 idea to sniff exit traffic but don't just emote.
You've lost the context.


Re: eliminating bogus port 43 exits

2009-06-13 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Tor Fox wrote:
 Jon wrote:
  You've lost the context.

 I don't know, maybe I have. It seemed that you were pleading with us
 not to ruin Tor by peeking at exit traffic and I was just explaining
 that Tor exit nodes can be operated by anyone, even less than
 scrupulous individuals. So, we're probably the last people that Tor
 users need to be worried about. If that's not what you were doing
 then I have no idea. You've only told me I'm wrong but have
 refrained from explaining why or giving any helpful clues at all.
There was no pleading.  There is no ruining of Tor.  That is hyperbole.


I got it that operators will snoop.  But if you can't read the
documentation, and get the grok the gist of the idea behind Tor...

You want me to provide hard facts?  It does not take a whitepaper to
inform me that peering at traffic leaving the border is A Good Thing TM.

Jon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAko0KE8ACgkQR7/9CWL6/5jhCQCgrDSNI0qKi2txbmB7Q5JhDfb7
Ql0Ani5lBrbKSd02lQY0B1I/Z+BikudI
=LLxG
-END PGP SIGNATURE-



Re: unable to submit bug report

2009-06-05 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Scott Bennett wrote:
  Well, I *intended* to submit a bug report, but appear to be unable
to log
 into the bugs.torproject.org web site to do so.  I tried all sorts of
things,
 including temporarily enabling JavaScript, which I really hate to do. 
If there
 is someone willing to submit the bug report for me, please let me know
where
 to send the information.
  Thanks!


   Scott Bennett, Comm. ASMELG, CFIAG
 **
 * Internet:   bennett at cs.niu.edu  *
 **
 * A well regulated and disciplined militia, is at all times a good  *
 * objection to the introduction of that bane of all free governments *
 * -- a standing army.   *
 *-- Gov. John Hancock, New York Journal, 28 January 1790 *
 **
You can send it to me.  I've also included my PGP for your use if you
so desire.

Jon



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkoovu0ACgkQR7/9CWL6/5jjPwCeLzPuZJJk+uQ0fOubCOIwNioY
suUAoJCIKR9knNfl8GEXr3tffz7b9C0I
=oJfB
-END PGP SIGNATURE-



pgpkeys.asc
Description: application/pgp-keys


Re: GSoC Introduction!

2009-05-22 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Kory Kirk wrote:
 Hello everyone,
  
 I am a little late on my introduction, but this tardiness won't
 be reflected in any of my work - don't worry. My name is Kory Kirk,
 I just graduated with a Bachelors in Computer Science from Villanova
 University (outside of Philadelphia, PA) last weekend. In the fall I
 will be returning to Villanova to complete my Masters, I am in a
 5-year BS/MS program. This summer I will be working with my mentor,
 Mike Perry, on adding some features to the TorButton Firefox
 extension. I am really excited to get back into programming Firefox
 extensions. The main features of Torbutton that I plan to work on
 are : tor://  tors:// protocol handling, better respoofing, and
 precise cookie control, more details can be found here
 http://korykirk.com/GSoC/tor_app.html . I would highly appreciate
 any ideas or feedback you want to shoot my way.
  
This is my first year participating in Google Summer of Code, and
 I am really happy to be with the Tor Project. I don't know what else
 goes in an introduction, so here are a few things about me that
 might be relevant: I am almost always on IRC - on my computer and
 sometimes on my phone (nick: koryk). I am from Dallas, TX, USA and
 will be spending my summer there, and will be in Central Standard
 Time (UTC - 6). I stay up late. I love reddit.

 I am looking forward to contributing to the community.

 -KK
Welcome.

Jon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkoXHpEACgkQR7/9CWL6/5gFJgCgnfvJc9AAWsQ69FrtUAQED0RN
+pEAn2nYXzBEyoE6JCYlvLexyI1+5EsM
=FxdW
-END PGP SIGNATURE-



[Fwd: New mirror]

2009-05-10 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Ok, the new mirror now has https on both the website and dist
directories.  Will be adding ftp support soon, yes, that is on the list.

Since not everyone everywhere can get on torproject to see the
mirrors, please feel free to publicize, or send me an encrypted email
let me know where or who I can tell so we can get this software out.


http://www.nonvocalscream.com has links to the mirror as well.

Best,

Jon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkoG+DEACgkQR7/9CWL6/5hdCQCdHr6+PqpcjsawGoGbLaTNAltg
vIoAoIHSDE/9o8UzM4WBvmi6KOx+q5D4
=EUpW
-END PGP SIGNATURE-

---BeginMessage---
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I've added a new mirror

http://tor.nonvocalscream.com

No https capability yet, but soon.  For now, just http.  This is a
full mirror.

Very best,

Jon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkoEyLQACgkQR7/9CWL6/5h6fgCfVES7wiJrXUk0/8XkZeInKUap
OBgAn1lxFgWEXw38JK+seuinKddbWC4c
=D62+
-END PGP SIGNATURE-


---End Message---


New mirror

2009-05-08 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I've added a new mirror

http://tor.nonvocalscream.com

No https capability yet, but soon.  For now, just http.  This is a
full mirror.

Very best,

Jon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkoEyLQACgkQR7/9CWL6/5h6fgCfVES7wiJrXUk0/8XkZeInKUap
OBgAn1lxFgWEXw38JK+seuinKddbWC4c
=D62+
-END PGP SIGNATURE-



Bittorrent

2009-02-15 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I had a thought.  Now we know that

1) Bittorrent traffic across the network is not preferable.

2) Bittorrent traffic does transit the network.

3) Currently, any protocol level filtering within Tor is not preferable.



We also know that some of the major developers of the bittorrent
platforms have coded some blocklist ip filtering for the actual
bittorrent platforms.

Have we thought of engaging the bittorrent community on blocking the
tor nodes themselves.  This would disrupt the BT traffic transiting
the Tor network.

Thoughts?

Jon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkmY2dgACgkQ6+ro8Pm1AtVq5gCfRY3qyohyu57aJd4DCnV260gP
CaoAoKvciBSEDrD3kkZ2DBTgf/BCLwlW
=6Qg/
-END PGP SIGNATURE-



Re: Bittorrent

2009-02-15 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Drake Wilson wrote:
 Quoth Jon scr...@datascreamer.com, on 2009-02-15 20:13:37 -0700:
 Have we thought of engaging the bittorrent community on blocking the
 tor nodes themselves.  This would disrupt the BT traffic transiting
 the Tor network.

 I started running a Tor relay and all my torrents immediately started
 failing.  Now I'm not going to run a relay anymore.

 No?

 Jon

--- Drake Wilson
Makes sense.  Is there a workaround?

Jon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkmY74sACgkQ6+ro8Pm1AtVx5QCghbiCoXeo1v0f1ENtCNrQKRZD
RIgAnA7+/vAEaE6lUFjS1OXUGtnD2ONv
=dhK5
-END PGP SIGNATURE-



Re: Some Bones to Pick with Tor Admins

2009-02-10 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Michael G. Reed wrote:
 On Tue, 10 Feb 2009 mark485ander...@eml.cc wrote:
 | no need also to upgrade from 98se, except tor developers are too lazy to
 | code properly.

 You know, Tor is open sourceyou can go fix the damn bugs yourself
 if they are so important to you and your antiquated setup.  If you
 weren't being such an ass-hat in the way you are DEMANDING support
 while insulting the developers and not even so much as filing a
 quasi-readable bug report, people might actually be willing to help
 you.  I tend to bet that most folks on this list wrote you off with
 your very first email...and with good reason.  Just my $0.02.

 -Michael



I tend to bet that most folks on this list wrote you off with
your very first email..



I know I did.

Jon
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkmSSRgACgkQ6+ro8Pm1AtWlKACgiD8iQrTrRa1sOI6EfgyPrcAH
Go0AoK6akFB6gs86uviFVWuWWXqYEns/
=MH84
-END PGP SIGNATURE-



Re: Failed to hand off onionskin

2008-12-16 Thread Jon
Mitar wrote:
 Hi!

 From time to time I am getting this warning:

 Failed to hand off onionskin. Closing.
 Your computer is too slow to handle this many circuit creation
 requests! Please consider using the MaxAdvertisedBandwidth config
 option or choosing a more restricted exit policy.

 I have been monitoring the system and while it is true that sometimes
 it tops one processor, it occupies most of the time just 50 % of one
 processor. I have also configured Tor daemon to use two threads so
 even if it tops one it could still switch to another. But it rarely
 passes 100 % (that is, it rarely really uses two processors). The
 system as a whole has also not topped its CPU power. And while load
 does not seem to be so high I get at the same time this errors. Is
 there some other system bound which would be causing this and not CPU?
 Are there some other performance tweaks I could try?

 I am using Tor 0.2.0.31 (r16744) on FreeBSD amd64. Should I maybe
 upgrade to devel version?


 Mitar
   
What is your CPU speed, total RAM, total H.D.D?


PGP keys

2008-12-16 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Just a quick note, I've revoked the key I've been using to sign
messages on this list in favor of an older key I use.  The current and
valid public key is 0xF9B502D5 also located on pgp.mit.edu also pasted
below:



- -BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.4.9 (GNU/Linux)

mQGiBEgWdGMRBADXoyJ689okhwqOPm5b0RP5l7lSBhCjhSJxgLUqlt7WYwoHhudr
D+EqUkVKkdTeIYM6v5zj2zSAZ9tpIts9ICiHdGJHlUijI0z+JqgatZLfFkxZFOs7
zr37RHwUf6TkL/uA1C268nLT8PkE13qsn8mxH3oGis6bjXNOOVKKjxbY1wCgxVpb
QrLiEe623tCZC8JiI5WRH1EEAIvMWsKeawDYS88g2BhybiK+PEt5NzdL8KfuwX+1
WGXt45/5KXOj5Vv5ougpRf7b2x33F4l+nejz15pyATwioOqIBIqJjzEmKtqFocK6
LDMTSQlrqUzKvazIlrF8t57ZjcZJum1/Dj/nsvMg/WVvZC1gG6vLTaGORiJZs7yU
m5j8BAC3wyq6THEEBdJDE0BSeGT55X3I/53hECdDbMzNWYB/u/TwfpxmTUkONjiJ
3fTpPiiMhQXjPMyeqRq8yauWbrEpoK1dn+gja6L96FOqqhBMED45AJ8FVrs0s8MI
ZBM7qiPWnKuwVIMOQNz3vDVL08HNXrG9WNNlueLMB8c1lTAsKrQdSm9uIDxzY3Jl
YW1AZGF0YXNjcmVhbWVyLmNvbT6IZgQTEQIAJgUCSBZ0YwIbIwUJCWYBgAYLCQgH
AwIEFQIIAwQWAgMBAh4BAheAAAoJEOvq6PD5tQLVw/cAn3k3rbDJBvXE1RLJpPyu
rRiTdVWAAJsG/csS30qAWwAjWAbPEaGlfRNUWohGBBMRAgAGBQJIF10sAAoJEMkI
OCUspg2JwZAAoLASZ3CrmvNxe1DHsh1s+nLqu5VOAKDCGqSWrfkPeSR6Z2zxxy8/
KIoVhIhMBBARAgAMBQJIGPRuBYMJY4F1AAoJEMugP0Z4XqIp9y4AnAzttgwC6Mvv
kKj3D7G3orM2hs52AJ4/ETbBl9Jm8V8XxKw4/H5OQsK3c4hGBBARAgAGBQJIPxwg
AAoJEE7zQ8pDSjxrzZUAn0sjQrfZIVMcFsYnnfa8VvGdmvkHAKCFKgx/BvW8RPeI
mT4ipocIhoMnhYhGBBARAgAGBQJIQzTLAAoJEJSO+o1gkCxK2nkAn0IG/Igd+LoA
9OkEkvG1x1xSCLyAAJ9Kq9cMyWJsBWLHS7uD5+3KPKhRwohGBBMRAgAGBQJJRdJf
AAoJEJPI6eWVcYpiOnQAniXtDw2wW7FF8GdLKs/XM1ML3qARAKCUU3KKkggzmgPs
/2VEraINid/m+7kCDQRIFnRjEAgA5s5lcAwAegWhsVBfzqi3UnoRejrZo30qWLPf
beXtuza1zsbG3j92r/5kjqirNyftVtY0VA8dQ60WLPqsB1xrQVYEK+jqH4LM90e/
rEJxugQnjXDXPQEqEdcwUUT9GQR0gpMHrNIuCT2aCkgX17OGpM4kxtGH13i3ygjN
rw4ebI57CJr4oQXaFIM2AT82s9aQgjWhDJBDvpC59as7hg2ZCcLZrRg0nSgnmGFs
qo2t+BL/GH+FDEjGPbsptZaQ7Ov+c1uBJhhRRE8v7Yg5/ETH4sz+ynEvMhJkKggg
yYp07/rhnoiJPQd2Fiyq0ofXmcmYqRSWHRg5HSgzzAYebqoAvwAFHQgAps/wut1G
1fTU1Az8Xp0M8Kp4q1ix7kPlVPEQQjYAg5eHIq/M62ZIa0V4pfpxUby0nnmXAzN1
Hjs1qG9E6Jk/2UbxVppZf4yfBD/CcT3ItXwk6/ZxxQz9IpZm20BpzMvq4sFsia0z
v674LhxFynJOMYKFWnh1pIg5Kaimy4nENk/PNAg4WojYx32b1lHL2wiXc8tyIpIM
nlm7H/JyUhJhWdpa1Ya13qYUOKv0b+qzq2iELmimQycIADqh2UWsBHvn9ZIoXLfL
yfpVOqbqlgyIsnjeq6RJjlbZWfpI3Aur1/xdfomXd3qCeDvNzb1z41EecPykbp+5
VdFT5qP4cz2BEIhPBBgRAgAPBQJIFnRjAhsMBQkJZgGAAAoJEOvq6PD5tQLV9W4A
n0MDol5fMjxU5nJtGjNwh5ZZleINAJ0dWz9jvC+53OIVnwCPd4XG2iS/gA==
=nvGD
- -END PGP PUBLIC KEY BLOCK-


Best,
Jon-
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAklIgHQACgkQ6+ro8Pm1AtXpRwCeLDRl1RYNfK5GWqY6Wn5Ns2LT
4CYAnRVmDY2x0mwPaB0HzTzO4WMEYhZN
=o4BH
-END PGP SIGNATURE-



Re: Metasploit Decloak Project v2

2008-12-14 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Roc Admin wrote:
 I just noticed that HDMoore re-released his decloak engine.

 http://metasploit.com/data/decloak

 He's improved some of the attacks from before like java, flash, and
 DNS in pretty interesting ways.  There's also a test for Microsoft
 Office documents which I thought was interesting.  From the page:

 When Microsoft Office is installed and configured to
 automatically open documents, a file can be returned which
 automatically downloads an image from the internet. This can
 bypass proxy settings and expose the real DNS servers of the user.


 It doesn't seem like there are any new attack vectors but I wanted
 to pass it along to see if anyone had comments.

 -ROC Tor Admin
Seems the way to guard against this is to reconfigure the DNS lookup
to execute via tor at a system level.  Easily done with the network
configuration tools of Windows and Linux flavors.

Jon-
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAklFucoACgkQk8jp5ZVximL+fACgnTijon0ymXpas8d5EpGZ68/K
XbIAn21naTJaCf7fQ8vWTxhq1/ES7+oL
=qCXm
-END PGP SIGNATURE-



Re: Bittorrent packets

2008-12-14 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Justin Coffi wrote:
 Mitar wrote:
 Hi!

 I noticed that on a machine where I am running a Tor node I am
 getting a lot of invalid HTTP requests to my 80 port. In Apache
 logs I saw that they are Bittorrent packets and not HTTP
 requests. So I was wondering if anybody else has been noticing
 this? Why exactly is this happening?


 Mitar

 If you're an exit node, I imagine someone was seeding a torrent
 through your relay.
Incidentally, I'll note that on the azureuswiki...
http://www.azureuswiki.com/index.php/Avoid_traffic_shaping#Disguising_tracker_traffic


there is encouragement to use Tor for BitTorrent.  Personally, the
practice should be discouraged... and before anyone calls me pro
censorship... can anyone think of a good reason to Seed or leach via
Tor?


I have a mini spec prop regarding Tor and Torrent that I'll propose
once I have it worded correctly.

Jon-
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAklF6A0ACgkQk8jp5ZVximKHPgCfVX/tDahl/U5DTp4UXbSmlchq
ws8An1EVxcjZiJFq5p3mM5+qqwwyiDR7
=IRIZ
-END PGP SIGNATURE-



Re: Need help with MPAA threats

2008-12-13 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Nicky van Etten wrote:
 The MPAA still has to prove you realy have the content which they
 claim you downloaded stored on your computer or any other storage
 device afaik.



 On Sat, Dec 13, 2008 at 4:34 PM, Matthew McCabe
 mate...@mrmccabe.com mailto:mate...@mrmccabe.com wrote:

 Hello-

 Time Warner shut off my connection again last night due to a
 complaint from the MPAA.  They claim that I downloaded 2 movies
 and 1 TV show.  This traffic, in fact, must have come through my
 Tor exit node.

 I explained to the customer service agent that I am running a
 Tor exit node and that the traffic must have come through the
 Tor network.  He said that because this is the 3rd complaint,
 the MPAA may take me to court and sue me for $100,000 per
 violation.  He also claimed that others in similar situations
 have lost in court...whatever that means.

 Here is where I need your help.  First, is there a good way to
 filter out torrents in my exit policy?

 Second, have any exit node operators in the US had similar
 complaints from the MPAA?  If so, how did you handle the complaints?

 Lastly, has anyone in the US gone to court as a result of using
 Tor?  If so, do you have a reference for a good lawyer?  At this
 point, I want to continue running a Tor exit node but also want
 to investigate my legal options if the MPAA takes me to court.

 Thank you for your help!

 -Matt




 --
 Ciphered/Signed email preferred!
 GnuPG KeyID: 0x42435F30
 GnuPG DSA2 KeyID: 0x23286031
http://www.torproject.org/eff/tor-legal-faq.html.en
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEUEARECAAYFAklD6RgACgkQk8jp5ZVximJAXACfb1GtHoOwTKdDYG0TVKYZKQh+
PVAAmPpl8vtWXNKo7LPab9115pkev/Y=
=s9ZJ
-END PGP SIGNATURE-



Re: Need help with MPAA threats

2008-12-13 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

krishna e bera wrote:
 It is unlikely that the content in question was ever on your computer
at all,
 because Tor does not transfer UDP packets (used by bittorrent for data)
and
 the default exit policy rejects the common bittorrent ports.
 The MPAA investigators are likely seeing the Tor users' access to the
tracker website
 which is done via http.

 However, imo your best legal course in USA is as phobos suggested.

 I'm in Canada, where the DMCA does not really apply,
 but my network provider was getting annoyed receiving DMCA notices
every day
 and threatening to cut off my server. 
 The template letter i adapted from Torproject and
 was sending to the DMCA complainants (cc my network provider) was not
enough
 because it did not stem the tide of notices.
 I thought about getting a cease-and-desist order against the complainants
 but i have no idea how (and no money) to go about international legal
actions.

 After looking at several dozen automated DMCA letters,
 i noticed that all but a few point to tracker websites for ThePirateBay.
 I decided to add the ip addresses for those tracker websites to my
reject list
 and have not received a DMCA notice for a few weeks now.
 Although this technically rejects some web (http) traffic,
 it seems to me just an extension of the exit policy rejecting
bittorrent ports
 because those tracker ip addresses are primarily used for setting up
p2p transfers.
 I'm paying $100 a month in bandwidth fees to facilitate anonymous
communication
 for activists etc - not to subsidize consumption of games and movies.
 Yes i know p2p can carry all sorts of content;
 if there is lots of legitimate stuff available via ThePirateBay my
attitude could change.
 Feedback on this is welcome.


Your attitude I think is correct.  I mean to say, yes, your intent for
your relay is for censorship frustration, not games, movies, et
cetera.  I think your implementation is correct also.  I run a relay
without any exit permitted.  The only reason I do this, is because I
do not want to deal with any complaints ranging from DMCA, hacking,
child exploitation transiting my link.  If I ever decide to permit
exiting, it will be on a dedicated server that I would pay for,
located elsewhere.  I just wish there were a better way to inspect the
traffic and disallow certain traffic.  Don't get me wrong, I'm not
advocating that any relay inspect any traffic, just that illegal
traffic transiting outside my link could land me in trouble.  Perhaps
thoughtworthy.

Jon-
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAklEHw0ACgkQk8jp5ZVximJ5NACeKtO5gwrLs1MkpnY3EDl4Nw9D
QxAAoJFMaihbTM8tTb0XEV3kAV3kDFON
=Ag5A
-END PGP SIGNATURE-



Re: Tor-Vidalia communication

2008-12-12 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Geoff Down wrote:
 Should I raise this as a bug at Flyspray? Vidalia can see relay
 status etc, and shut down Tor without the password being entered.
 They are both running as the same user however. GD On 8 Dec 2008,
 at 12:26, Geoff Down wrote:

 OSX10.3.9 , and yes, I was able to change identity, see the
 network map etc. GD On 8 Dec 2008, at 06:51, Jon wrote:

 Geoff Down wrote:
 Hi, previously, if I started Vidalia when Tor was already
 running, I would be asked for the password. Has this
 changed in 0.2.0.32 ? The torrc's I use for Vidalia or for
 the command line are different (and therefore the passwords
 are different).

 GD

 What operating system, and is vidalia successfully communicating
 with one instance or the other when you are *not* prompted for the
 pass?

 Jon-
It might do in the bug system yes, but I'm not actually sure if it
goes into trac or flyspray actually.  I wanted to help localize it
first.  Actually, I thought you were running two tor processes at the
same time, and I was wondering which one it connected?

Jon-

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEUEARECAAYFAklDF7EACgkQk8jp5ZVximLgFwCgjAoW7figucer0USMxS46mAPK
PMoAmJbt0AvzrpmTSo09NnaeS8CS4BY=
=0mgb
-END PGP SIGNATURE-



Re: UK internet filtering

2008-12-07 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Curious Kid wrote:
 I saw nothing about this on the OpenNet Initiative website at
http://opennet.net/ . Perhaps someone should tell them.

 Not to stray too far off topic, this should be of interest to Tor node
operators worldwide:


 Berlusconi plans to use G8 presidency to 'regulate the internet'
 http://opennet.net/news/berlusconi-plans-use-g8-presidency-regulate-internet

 The article describes him as a media baron. That could be bad news
for anonymity advocates.



 - Original Message 
 From: Gregory Maxwell [EMAIL PROTECTED]
 To: or-talk@freehaven.net
 Sent: Saturday, December 6, 2008 7:49:58 PM
 Subject: UK internet filtering


http://community.zdnet.co.uk/blog/0,100567,10009938o-2000331777b,00.htm?new_comment

 I've confirmed the reports of UK ISPs censoring Wikipedia using some
 UK tor exists.



  
Opennet, interesting site.  Most especially the part where I learned
that a Turkish prosecutor seeks to identify a youtube poster.   Had
this video been posted via Tor, the prosecutor will be unsuccessful.
Censorship of opinions suck.

Respectfully,
Jon-
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkk8kWYACgkQk8jp5ZVximKSYACgk7o7f+4gQMUANNzQnyLaTtqh
ZD4An01mFS5MnDOoDi+2vmC2SJck8XQ4
=3foc
-END PGP SIGNATURE-



Re: UK internet filtering

2008-12-07 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1



 Opennet, interesting site.  Most especially the part where I
 learned that a Turkish prosecutor seeks to identify a youtube
 poster.   Had this video been posted via Tor, the prosecutor will
 be unsuccessful. Censorship of opinions suck.

 Respectfully, Jon-
It would be prudent of me to reference the note...

http://opennet.net/news/turkish-prosecutor-seeks-id-youtube-posters

Jon-
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkk8kbEACgkQk8jp5ZVximK23gCbBL1ep/J/gVOnR/IrwGT8N7S3
2LAAn3CoSz2xQVP/pTL44QBJBZqGp1f7
=0jmk
-END PGP SIGNATURE-



Re: Tor-Vidalia communication

2008-12-07 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Geoff Down wrote:
 Hi,
 previously, if I started Vidalia when Tor was already running, I
 would be asked for the password.
 Has this changed in 0.2.0.32 ? The torrc's I use for Vidalia or for
 the command line are different (and therefore the passwords are
 different).

 GD

What operating system, and is vidalia successfully communicating with
one instance or the other when you are *not* prompted for the pass?

Jon-
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkk8w/EACgkQk8jp5ZVximL7DgCghwbh96IklKHHMOBRy6kTpZLU
A7QAn2w5s0qkS8jBGPr+heSk4ZskVyl8
=5HLm
-END PGP SIGNATURE-



Tor bridges email discovery...

2008-12-04 Thread Jon McLachlan

Hey everyone,

  Is the email based bridge discovery mechanism described here* not  
functional?  I've tried from a few valid gmail accounts but have  
received no responses.


* https://www.torproject.org/bridges#FindingMore


Re: not in the list. Not in the tor network map.

2008-11-22 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Is there more information you could give.  For example, are you saying
that the nodes you are connected to are not in your network viewer list?

jed c wrote:
 Looking at my connections I noticed some are not in the list. Is
 this normal?



 --


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkkos1gACgkQk8jp5ZVximI4LACfSPC9+JeA7wUuf12vtOXxlLv+
r60AnA/Tu/ZL8jZBpJ+SbisM2UgxtNc/
=rNzv
-END PGP SIGNATURE-



  1   2   >