Balancing?
With the latest TOR version and the increased in nodes, with the new balancing in the new version, does it mean that it would be possible that the volume load would have been decrease from what it was on some of the nodes? Maybe a better explanation I am trying to ask is before the updated version, the amt of band usage was a lot higher than it is now. I suspect with the more nodes we have n ow that might explain some of us not being used like we were, but does the new balancing be making that adjustment also by distributing the users thru out the nodes better?. Hopefully that explains it better what I am trying to ask. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Sent e-mails going into spam folders.
On Tue, Feb 8, 2011 at 2:07 AM, Matthew pump...@cotse.net wrote: I didn't explain myself very well. I meant that if matt...@yahoo.com or matt...@hotmail.com or matt...@gmail.com or matt...@aol.com sends an e-mail to da...@yahoo.com or da...@gmail.com or da...@aol.com or da...@hotmail.com does the fact that the sending IP will be an exit node affect the likelihood that the e-mail will end up in the spam folder rather than the inbox? IOW: are webmail providers assuming that in some cases tor nodes are spammy? *** The only time I have any somthing end up in the spam folder from any of those emial ip addys, is if something in the body is considered spam. Which is set up thru the spam filters. other wise everything gets thru. I have a lot of email coming thru from all those email ip addys. tho aol is a lot lower. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Could not rotate onionkey
Sometime earlier this morning, in checking the logs, I notice that I am suddenly getting the following error and warnings.: error: Couldn't write generated onion key to : c\\secret_onion_key warning: couldn't open c:\***\secret_onion_key.tmp warning: couldn't rotate onion key any ideas or is this a possible bug? I am running the latest Tor v0.2.1.29 In trying to reboot, it appears that It has gotten corrupted: Videlia would even start, showing the errors on startup: warning: error creating directory c\*\cached-status: No such file or directory warning: failed to parse/validate config: couldn't access/create private data directory c:\**\cached-status error: reading config file failed I am going to do a clean install and see what happens. The previous up time was almost 10 days without any problems. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: I wish to see one video on you tube
On Tue, Feb 8, 2011 at 3:49 PM, Martino Papesso mart...@papesso.com wrote: Hallo I live in Italy. I have firefox portable version with tor download from here : http://www.torproject.org/dist/torbrowser/tor-browser-1.3.17_it.exe . I wish to see this video http://www.youtube.com/watch?v=AmhApE1kIgAfeature=player_embedded. In Italy is not possible. For one friend in Romania is possible to see this video(http://img806.imageshack.us/img806/7321/31962895.png). I tried to watch the video using tor but did not succeed. I'm not very handy when using tor. Could you help me for to see this video please. Is there one person who speak Italian? Many thanks. Ciao. Martino Clicking the link you post for the video, http://www.youtube.com/watch?v=AmhApE1kIgAfeature=player_embedded, this is what I get here in the USA. This video contains content from Sony Music Entertainment. It is not available in your country. Which tells me it is not available here either. Makes me wonder which country's are allowed to watch it. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Sent e-mails going into spam folders.
On Mon, Feb 7, 2011 at 1:00 PM, Matthew pump...@cotse.net wrote: I am wondering to what degree people on this list have problems with e-mails going into spam folders because they are using tor nodes. I refer to sending from a webmail (Hotmail, Yahoo, Gmail, AOL, etc) to another webmail. It seems to me that e-mails sent from Yahoo will end up as spam. Any other experiences or opinions would be interesting. I don't have any problems generally. It depends on what is in the body of the email and what one's filters are. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: torr file question...
On Fri, Feb 4, 2011 at 4:20 AM, Zaher F. the_one_man...@hotmail.com wrote: is it going to be like that ?? This file was generated by Tor; if you edit it, comments will not be preserved # The old torrc file was renamed to torrc.orig.1 or similar, and Tor will ignore it # If set, Tor will accept connections from the same machine (localhost only) # on this port, and allow those connections to control the Tor process using # the Tor Control Protocol (described in control-spec.txt). ControlPort 9051 # Where to send logging messages. Format is minSeverity[-maxSeverity] # (stderr|stdout|syslog|file FILENAME). Log notice stdout # Bind to this address to listen to connections from SOCKS-speaking # applications. SocksListenAddress 127.0.0.1 StrictExitNodes 1 ExitNodes name_of_node or fingerprint (no spaces in fingerprint). or should i delete something from the torrc file above...??? Don't delete anything , just add your StrictExitNodes 1 ExitNodes name_of_node or fingerprint (no spaces in fingerprint). you should be good to go :) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Is gatereloaded a Bad Exit?
On Sat, Jan 29, 2011 at 12:46 PM, Jan Weiher j...@buksy.de wrote: Hi, while scrolling through the tor status page (torstatus.blutmagie.de), I stumpled upon the following node (the reason why it came to my eye was the long uptime): gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2 2A70 654D 3B92 This node looks suspicious to me, because there is no contact info given and the exit policy allows only unencrypted traffic: reject 0.0.0.0/8:* reject 169.254.0.0/16:* reject 127.0.0.0/8:* reject 192.168.0.0/16:* reject 10.0.0.0/8:* reject 172.16.0.0/12:* reject 194.154.227.109:* accept *:21 accept *:80 accept *:110 accept *:143 reject *:* Am I missing something? I'm wondering why the status page lists this node as non-exit, because it clearly allows outgoing traffic on ports 21,80,110 and 143? I'm aware of the fact that it is not recommended to use tor without additional encryption, but some users do. And I dont see any reason for only allowing unencrypted traffic than snooping? Can anyone clearify this? If the admin of this node is on the list, would he please explain this situation? best regards, Jan It may possible be a middle node instead of an exit node. As for lack of contact info, can't answer that. I know there have been several other nodes in past without a contact info. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: update message...
On Wed, Jan 26, 2011 at 2:30 PM, Zaher F. the_one_man...@hotmail.com wrote: so...what is the meaning of the version i have now vidalia 0.2.10 Tor 0.2.2.21-alfa (git-5f63f0d6312d9f0d) QT 4.6.2 and i have downloaded it from toe website The current stable version of Tor for Windows is 0.2.1.29 The current stable version of Tor for OS X is 0.2.1.29. The current stable source version of Tor is 0.2.1.29 Vidalia current stable version is 0.2.10 I believe you need to update ur Tor Version ie: https://www.torproject.org/download/download.html.en Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Email?
On Wed, Dec 29, 2010 at 11:34 AM, Moritz Bartl mor...@torservers.net wrote: Hi, The Tor Hidden Wiki lists a few other free email services offering HTTPS at: http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email -- Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ I got this to work with out any problems also :) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Fwd: Re: DMCA Infringement Notification: Copies of 14 complaints
On Mon, Dec 20, 2010 at 12:54 AM, grarpamp grarp...@gmail.com wrote: your residential DSL service is only for the use of your pcs within your home. SCAR: I believe the bottom line here is the DSL is only for the use of ' your ' pc . I never had that issue with DSL, but Cable I did and I had to go to a business account in order to run Tor. Reason was servers are not allowed to run an a residential account. This is also mention in the contract. As with Mike Perry's post, I would also suggests to run a middle node instead of an exit node and see what happens. I suspect you probably won't have any more issues and should resolve QWest problems. I also when I was called about the ' illegal ' stuff going thru my computer, I just asked the ISP what port it was and then blocked the port. Some users have found ways to use other ports that are different than what we would block for exits. To get around that I just blocked those ports. No more problems. I have not had any complaints on DMCA for over a year now. ( fingers crossed ). Hope some of theses posts will help you, Scar. Jonj *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: U.S. begins censoring Internet at U.K.'s request
On Sat, Nov 6, 2010 at 1:02 PM, Scott Bennett benn...@cs.niu.edu wrote: I wrote: http://news.antiwar.com/2010/11/05/us-censors-muslim-websites-list-of-british-mps-who-supported-iraq-war/ Using exit chuckthecanuck gives a Google (!) error page, saying URL not found. I'll add that exit to my ExcludeExitNodes list with a comment that the reason is due to DNS hijacking that is probably related to U.S. censorship. I changed my mind. I'm adding {ca},{uk},{us} to my ExcludeExitNodes list with an appropriate comment for later removal in case the U.S. ever calls off its War on the Internet. :-( I don't understand why excluding all exit nodes from the US, CA, and UK, especially if you have only one exit node showing the error? Altho, I may not understand or I misinterpreted your email I had no issues with getting the website on google. I had to copy and paste the url as it would not go directly from the email. Actually, almost all the url's lately from the email;s don't go directly, I have to cut and paste to get to them. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Excessive scrubs
TorOp Thanks, I did upgrade Vidalia separately. It appears that it was upgraded, but Tor has not been yet. Tho I believe it will be shortly. However, it did resolve the issue. Jon On Thu, Oct 14, 2010 at 5:39 PM, TorOp to...@optonline.net wrote: Upgrade Vidalia to 0.2.10 and the problem will go away. On 10/14/2010 6:20 PM, Jon wrote: Justin, The first of the scrubs have now showed for the past 4 hrs. Once an hour. It is now showing the address and it is the same address. It is a ' geoips vidalia ' address ( am not showing complete addy ). Apparently for some reason it is not resolving or connecting to address. I did attempt to try directly, with a couple of different ways and was not able to access the site. If you want the complete address, I will put in later. Will see if it is the only one that shows up over the next 12 hrs. Jon On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplinjmap...@ufl.edu wrote: On Oct 14, 2010, at 9:04 AM, Jon wrote: I had added the ' SafeLogging 0 ' to the file as per Tor-ops message/reply. Twenty four hours later when I saw that it had not removed the ' scrubbed ' and replaced it with the node/address, I checked the file again and it was not in the file where I put it. Was Vidalia running when you edited the torrc? Vidalia (on Windows, at least) has a bad habit of overwriting changes to the torrc that it isn't aware of. Personally I think there should be a Confirm before modifying torrc checkbox in Vidalia. I just checked it now, It is still in the file, but the logs still show the ' scubbed' and not the address as supposedly the ' SafeLogging 0 ' was to replace. Time wise it appears to be at a minimum of once an hour. Which makes me believe it is the same address that is being scrubbed. Try shutting down both Tor and Vidalia, making your edits, restarting both, and rechecking your torrc/logs. If you've done all this, please let us know. ~Justin Aplin *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Excessive scrubs
Justin, Thanks, followup it is running properly now. I did an upgrade to Vidalia only and it resolved the issue. There have been no more scrubs. Jon On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplin jmap...@ufl.edu wrote: On Oct 14, 2010, at 9:04 AM, Jon wrote: Yes, I did the save the file. This is a given, sorry. This may also be a given, but did you restart Tor after doing this? AFAIK (and I may be wrong), Tor does not read changes made to the torrc after initialization. I had added the ' SafeLogging 0 ' to the file as per Tor-ops message/reply. Twenty four hours later when I saw that it had not removed the ' scrubbed ' and replaced it with the node/address, I checked the file again and it was not in the file where I put it. Was Vidalia running when you edited the torrc? Vidalia (on Windows, at least) has a bad habit of overwriting changes to the torrc that it isn't aware of. Personally I think there should be a Confirm before modifying torrc checkbox in Vidalia. I just checked it now, It is still in the file, but the logs still show the ' scubbed' and not the address as supposedly the ' SafeLogging 0 ' was to replace. Time wise it appears to be at a minimum of once an hour. Which makes me believe it is the same address that is being scrubbed. Try shutting down both Tor and Vidalia, making your edits, restarting both, and rechecking your torrc/logs. If you've done all this, please let us know. ~Justin Aplin OS is WIndows Jon What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? - On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com wrote: On Wed, 13 Oct 2010 09:02:20 -0500 Jon torance...@gmail.com wrote: I saw a message from Tor-op in reference to a similar problem and his solution was: Add the below line to your torrc and the scrubbed will be replaced by the domain in question. SafeLogging 0 of which I tried, but it would not stay in the torrc file. It seems to remove it self at some point. As far as I can tell it never worked, but unknown how long after I placed it before it got removed. Jon On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote: I have noticed over the past 2 weeks, I have been getting an unusual amount of scrubs. It doesn't tell me which addresses are being scrubbed, so I don't know if they are the same or different ones. It does not affect the operation of Tor. Just fills up the logs. Is there a way to have the '[scrubbed]' removed and the address put in its place? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? -- more than just a leitmotif PGP Key ID: 33E22AB1 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Excessive scrubs
Yes, I did the save the file. This is a given, sorry. I had added the ' SafeLogging 0 ' to the file as per Tor-ops message/reply. Twenty four hours later when I saw that it had not removed the ' scrubbed ' and replaced it with the node/address, I checked the file again and it was not in the file where I put it. I just checked it now, It is still in the file, but the logs still show the ' scubbed' and not the address as supposedly the ' SafeLogging 0 ' was to replace. Time wise it appears to be at a minimum of once an hour. Which makes me believe it is the same address that is being scrubbed. OS is WIndows Jon What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? - On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com wrote: On Wed, 13 Oct 2010 09:02:20 -0500 Jon torance...@gmail.com wrote: I saw a message from Tor-op in reference to a similar problem and his solution was: Add the below line to your torrc and the scrubbed will be replaced by the domain in question. SafeLogging 0 of which I tried, but it would not stay in the torrc file. It seems to remove it self at some point. As far as I can tell it never worked, but unknown how long after I placed it before it got removed. Jon On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote: I have noticed over the past 2 weeks, I have been getting an unusual amount of scrubs. It doesn't tell me which addresses are being scrubbed, so I don't know if they are the same or different ones. It does not affect the operation of Tor. Just fills up the logs. Is there a way to have the '[scrubbed]' removed and the address put in its place? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? -- more than just a leitmotif PGP Key ID: 33E22AB1 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Excessive scrubs
Ok, I just checked the torrc file and my last entry was still there. I updated the OS and rebooted and rechecked the file and nothing has been removed. Will see now on the new logs if it changes or if it still shows ' scrubbed ' Jon On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplin jmap...@ufl.edu wrote: On Oct 14, 2010, at 9:04 AM, Jon wrote: Yes, I did the save the file. This is a given, sorry. This may also be a given, but did you restart Tor after doing this? AFAIK (and I may be wrong), Tor does not read changes made to the torrc after initialization. I had added the ' SafeLogging 0 ' to the file as per Tor-ops message/reply. Twenty four hours later when I saw that it had not removed the ' scrubbed ' and replaced it with the node/address, I checked the file again and it was not in the file where I put it. Was Vidalia running when you edited the torrc? Vidalia (on Windows, at least) has a bad habit of overwriting changes to the torrc that it isn't aware of. Personally I think there should be a Confirm before modifying torrc checkbox in Vidalia. I just checked it now, It is still in the file, but the logs still show the ' scubbed' and not the address as supposedly the ' SafeLogging 0 ' was to replace. Time wise it appears to be at a minimum of once an hour. Which makes me believe it is the same address that is being scrubbed. Try shutting down both Tor and Vidalia, making your edits, restarting both, and rechecking your torrc/logs. If you've done all this, please let us know. ~Justin Aplin OS is WIndows Jon What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? - On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com wrote: On Wed, 13 Oct 2010 09:02:20 -0500 Jon torance...@gmail.com wrote: I saw a message from Tor-op in reference to a similar problem and his solution was: Add the below line to your torrc and the scrubbed will be replaced by the domain in question. SafeLogging 0 of which I tried, but it would not stay in the torrc file. It seems to remove it self at some point. As far as I can tell it never worked, but unknown how long after I placed it before it got removed. Jon On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote: I have noticed over the past 2 weeks, I have been getting an unusual amount of scrubs. It doesn't tell me which addresses are being scrubbed, so I don't know if they are the same or different ones. It does not affect the operation of Tor. Just fills up the logs. Is there a way to have the '[scrubbed]' removed and the address put in its place? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? -- more than just a leitmotif PGP Key ID: 33E22AB1 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Excessive scrubs
Justin, Ok, I just checked the torrc file and my last entry was still there. I just updated the OS and rebooted and rechecked the file and nothing has been removed. Will see now on the new logs if it changes or if it still shows ' scrubbed ' . I will let you know within 24hrs either way. Jon On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplin jmap...@ufl.edu wrote: On Oct 14, 2010, at 9:04 AM, Jon wrote: Yes, I did the save the file. This is a given, sorry. This may also be a given, but did you restart Tor after doing this? AFAIK (and I may be wrong), Tor does not read changes made to the torrc after initialization. I had added the ' SafeLogging 0 ' to the file as per Tor-ops message/reply. Twenty four hours later when I saw that it had not removed the ' scrubbed ' and replaced it with the node/address, I checked the file again and it was not in the file where I put it. Was Vidalia running when you edited the torrc? Vidalia (on Windows, at least) has a bad habit of overwriting changes to the torrc that it isn't aware of. Personally I think there should be a Confirm before modifying torrc checkbox in Vidalia. I just checked it now, It is still in the file, but the logs still show the ' scubbed' and not the address as supposedly the ' SafeLogging 0 ' was to replace. Time wise it appears to be at a minimum of once an hour. Which makes me believe it is the same address that is being scrubbed. Try shutting down both Tor and Vidalia, making your edits, restarting both, and rechecking your torrc/logs. If you've done all this, please let us know. ~Justin Aplin OS is WIndows Jon What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? - On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com wrote: On Wed, 13 Oct 2010 09:02:20 -0500 Jon torance...@gmail.com wrote: I saw a message from Tor-op in reference to a similar problem and his solution was: Add the below line to your torrc and the scrubbed will be replaced by the domain in question. SafeLogging 0 of which I tried, but it would not stay in the torrc file. It seems to remove it self at some point. As far as I can tell it never worked, but unknown how long after I placed it before it got removed. Jon On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote: I have noticed over the past 2 weeks, I have been getting an unusual amount of scrubs. It doesn't tell me which addresses are being scrubbed, so I don't know if they are the same or different ones. It does not affect the operation of Tor. Just fills up the logs. Is there a way to have the '[scrubbed]' removed and the address put in its place? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? -- more than just a leitmotif PGP Key ID: 33E22AB1 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Excessive scrubs
Justin, The first of the scrubs have now showed for the past 4 hrs. Once an hour. It is now showing the address and it is the same address. It is a ' geoips vidalia ' address ( am not showing complete addy ). Apparently for some reason it is not resolving or connecting to address. I did attempt to try directly, with a couple of different ways and was not able to access the site. If you want the complete address, I will put in later. Will see if it is the only one that shows up over the next 12 hrs. Jon On Thu, Oct 14, 2010 at 9:44 AM, Justin Aplin jmap...@ufl.edu wrote: On Oct 14, 2010, at 9:04 AM, Jon wrote: I had added the ' SafeLogging 0 ' to the file as per Tor-ops message/reply. Twenty four hours later when I saw that it had not removed the ' scrubbed ' and replaced it with the node/address, I checked the file again and it was not in the file where I put it. Was Vidalia running when you edited the torrc? Vidalia (on Windows, at least) has a bad habit of overwriting changes to the torrc that it isn't aware of. Personally I think there should be a Confirm before modifying torrc checkbox in Vidalia. I just checked it now, It is still in the file, but the logs still show the ' scubbed' and not the address as supposedly the ' SafeLogging 0 ' was to replace. Time wise it appears to be at a minimum of once an hour. Which makes me believe it is the same address that is being scrubbed. Try shutting down both Tor and Vidalia, making your edits, restarting both, and rechecking your torrc/logs. If you've done all this, please let us know. ~Justin Aplin OS is WIndows Jon What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? - On Wed, Oct 13, 2010 at 6:59 PM, katmagic the.magical@gmail.com wrote: On Wed, 13 Oct 2010 09:02:20 -0500 Jon torance...@gmail.com wrote: I saw a message from Tor-op in reference to a similar problem and his solution was: Add the below line to your torrc and the scrubbed will be replaced by the domain in question. SafeLogging 0 of which I tried, but it would not stay in the torrc file. It seems to remove it self at some point. As far as I can tell it never worked, but unknown how long after I placed it before it got removed. Jon On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote: I have noticed over the past 2 weeks, I have been getting an unusual amount of scrubs. It doesn't tell me which addresses are being scrubbed, so I don't know if they are the same or different ones. It does not affect the operation of Tor. Just fills up the logs. Is there a way to have the '[scrubbed]' removed and the address put in its place? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ What do you mean by 'removed itself'? Was the file never saved, or was there a point at which something else reverted it, or was it something else entirely? Also, which operating system are you using? -- more than just a leitmotif PGP Key ID: 33E22AB1 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor network connections constantly building / failing
That is normal right after you start Tor up. What your seeing is Tor is still building circuits. After a short period, it does level out, then you should only be showing several circuits. Your dl/up speeds will vary during this and will level off shortly after. After your connection has been up for a while ie: several days, your speeds will pick up as the other nodes get to know your node. Everything is normal of what your seeing. :) Thanks for running Tor. Jon On Wed, Oct 13, 2010 at 6:39 AM, Joe Btfsplk joebtfs...@gmx.com wrote: Recently noticed Tor being slower than usual network map shows MANY new connections building, then failing VERY quickly. (within a sec or so). Does this constantly - one connection after another. Using Vidalia 0.2.1.26-0.2.9; Torbutton 1.2.5. Sometimes there are at least 3 connections open - sometimes not. 1st time I've seen this. Did close Vidalia / Tor, Polipo, Firefox 3.6.10 Torbutton, the restart - couple of times - no change. During the connection, for brief times, D/L speeds may get up to normal for me - but not for long. Anyone noticed this or have suggestions? Thanks. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Full bandwidth is not used.
Not sure, but mine goes up and down all the time. I am not on a allocation or accounting like you, but I check several times a day generally, but at least once a day the bandwidth usage is different than before. It may still be re-balancing, but I also notice that the mode nodes that are running, the lower usage of bandwidth. The less nodes running, my bandwidth has more usage. Just a thought. Jon On Wed, Oct 13, 2010 at 7:47 AM, Paul Menzel paulepan...@users.sourceforge.net wrote: Dear Tor folks, I am still seeing the same problem [1]. In April it used the whole limit of 1 TB and hibernated after the limit was reached, but afterward it only came back to around 100 GB per month. Fast IT is not limiting the bandwidth in any way. I tested that. CPU and memory are not utilized completely either. Here is the output from arm. arm - anonymisierungsdienst (Linux...) Tor 0.2.1.26 (recommended) anonymisierungsdien - 0.0.0.0:9090, Dir Port: 80, Control Port (open): 9051 cpu: 0.5% mem: 92 MB (13.0%) pid: 1186 uptime: 14-15:11:11 fingerprint: B3EC1BF5D7F7D724BA634D91BE5D22D2D7A70160 flags: Exit, Fast, Guard, Named, Running, Stable, Valid I only have AccountingMax 500 GB set in `/etc/tor/torrc`. So it must be a Tor problem. As you can see from the graphs the bandwidth usage goes up and down quite often. What might be the reason? Besides it is still below the available 100 Mbit/s. So does rebalancing still have problems as indicated in Andrew’s answer [3]? Thanks, Paul [1] http://archives.seul.org/or/talk/Mar-2010/msg00010.html [2] http://www.atagar.com/arm/ [3] http://archives.seul.org/or/talk/Apr-2010/msg00140.html *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Excessive scrubs
I have noticed over the past 2 weeks, I have been getting an unusual amount of scrubs. It doesn't tell me which addresses are being scrubbed, so I don't know if they are the same or different ones. It does not affect the operation of Tor. Just fills up the logs. Is there a way to have the '[scrubbed]' removed and the address put in its place? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Excessive scrubs
I saw a message from Tor-op in reference to a similar problem and his solution was: Add the below line to your torrc and the scrubbed will be replaced by the domain in question. SafeLogging 0 of which I tried, but it would not stay in the torrc file. It seems to remove it self at some point. As far as I can tell it never worked, but unknown how long after I placed it before it got removed. Jon On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote: I have noticed over the past 2 weeks, I have been getting an unusual amount of scrubs. It doesn't tell me which addresses are being scrubbed, so I don't know if they are the same or different ones. It does not affect the operation of Tor. Just fills up the logs. Is there a way to have the '[scrubbed]' removed and the address put in its place? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: The team of PayPal is a band of pigs and cads!
Hm, I use Top almost every time I use pay pay, Especially if I am on a site I do Not trust well or its the first time I been on the site. So far, I have never had an issue other than occasionally locking my account. Jon On Mon, Aug 23, 2010 at 11:48 AM, James Brown jbrownfi...@gmail.com wrote: They block accounts of their user if users ised the Tor or another anonymous proxy!!! *** *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: The team of PayPal is a band of pigs and cads!
Hm, I use TOR almost every time I use paypal, especially if I am on a site I do not trust well or its the first time I been on the site. So far, I have never had an issue other than occasionally locking my account. On Mon, Aug 23, 2010 at 11:48 AM, James Brown jbrownfi...@gmail.com wrote: They block accounts of their user if users ised the Tor or another anonymous proxy!!! *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: My relay never shows up
On Wed, Aug 11, 2010 at 8:20 AM, Praedor Atrebates prae...@yahoo.com wrote: I am running a tor relay called Stonekeep. I have port forwarding set on my firewall/router and my personal system firewall permits connections to the tor ports. I am also running Vidalia (Vidalia 0.1.15, tor 0.2.1.26). My relay never shows up in the list of servers/relays and doesn't show up on the various tor network status pages. Why not? I cannot find anything amiss to render my system invisible or unusable to the network. I have no trouble using the tor myself. praedor -- How many days is your relay up and running with out going down and/or having to reboot? I have found that if one keeps rebooting or the relay keeps going down, it takes a while for it to be recognized. Also I have seen where it may take several minutes for the network status to populate before a relay shows up. The biggest issue I personally have seen is if one can't stay on line for any length of time, the relay probably will not show up. I am sure there may be other reasons, but this has been my observation . *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Tor on a live disk
I'm trying to run Tor on a live disk, but keep seeing the warning user tor not found. Tor fails to start. It looks like I just need to add a user, but which groups would this user need to belong to? linux-rvcp:~ # /etc/init.d/tor start Starting tor daemon done linux-rvcp:~ # Aug 09 14:07:09.186 [notice] Tor v0.2.1.26. This is experimental software. Do not rely on it for strong anonymity. (Running on Linux i686) Aug 09 14:07:09.276 [notice] Initialized libevent version 1.4.12-stable using method epoll. Good. Aug 09 14:07:09.276 [notice] Opening Socks listener on 127.0.0.1:9050 Aug 09 14:07:09.277 [warn] Error setting configured user: tor not found Aug 09 14:07:09.277 [warn] Failed to parse/validate config: Problem with User value. See logs for details. Aug 09 14:07:09.277 [err] Reading config failed--see warnings above. /usr/bin/torctl start: tor could not be started *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Legal response to real abuse
On Sat, Aug 7, 2010 at 8:50 AM, Moritz Bartl t...@wiredwings.com wrote: Hi, This is considered the first strike of three -- the third resulting in the termination of your account. And that is providing your ISP even lets you get to 3 strikes. From my phone experience. tho it was not a letter DMCA and probably just a scare tactic, but was told if I didn't resolve the problem of the server being used for copyright infringements, etc, my account would be terminated. Even with the explanation, they didn't care cause of the complaints. However, I said I would take care of the problem if you give me the ports this was allegedly happening on. I then just blocked them and have had no issues since then. By doing this, I still have a full exit server running, and didnt lose the account and the ISP was happy. Personally I don't trust the 3 strikes your out syndrome. Unless its in the contract, I believe most ISP's can cancel the contract if they believe their subscriber does not seem to want to take care of the problem and the ISP has the paper work with the allegations, etc. But I am not a lawyer. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
US Seeks Access to More Internet Data Without Court Order
The Washington Post reports that the Obama administration is seeking to make it easier for the FBI to obtain internet records of users without a court order. If Congress approves the plan, the FBI would be able to secretly issue a National Security Letter to an internet provider and obtain who users send email to, the times and dates of e-mails sent and received, and possibly a log of every website visited. Kevin Bankston of the Electronic Frontier Foundation said, Our biggest concern is that an expanded [National Security Letter] power might be used to obtain Internet search queries and Web histories detailing every Web site visited and every file downloaded. http://www.democracynow.org/2010/7/29/headlines#2 This makes me wonder, what information could an ISP provide about Internet activity through Tor? My provider is more trustworthy than most, but this would give me cause for concern. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: US Seeks Access to More Internet Data Without Court Order
On Thu, 29 Jul 2010 17:22:59 -0700, coderman coder...@gmail.com wrote: they don't give out NSL's for just any whim or fancy after all... We already know what happens when we have lax standards. There is no oversight, and administration is the discretion of a disgruntled agent or greedy vendor. http://seattletimes.nwsource.com/html/nationworld/2008245641_eavesdrop10.html http://www.securityfocus.com/brief/181 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: New Tor Relay: Help!!!!!
On Mon, Jun 28, 2010 at 11:22 AM, torh...@safe-mail.net wrote: Hello all. I just upgraded my internet speed and have been running a Tor Relay for around two days or so. I have set up 2-3 tor relays before so I understand (I think) how to set one up. Here's the problem: In the past two days, Vidalia says I've received 200MBs of data and sent around 500MBs of data. My relay has almost NO traffic compared to the other relays I've had. I'm supposed to have upwards of 3MBS up and .73 MBs down. In Vadalia, I have the Bandwidth Limits set to 512 Kbps. Why is there almost no traffic? Please HELP In my past experience with setting up several relays, both exit and non exit, it takes awhile, especially with a new relay for it to be recognized by the other servers on the list. You should notice an increase gradually in several days, providing you have everything set up properly. One thing I have noticed in the past is making sure the firewall is set up so TOR can be accessed. That will cause you a slow down. Being that you are a former TOR server, I would just wait it out and give it several days for the others to know your out there and will get used to accessing you. I am a little concerned tho about the DNS hijackings, which is not good. This may or may not also be interfering with the server working properly. Might consider looking at changing to a different DNS server or changing IP providers. With that being said, maybe someone with more experience can give you some ideas on how to go about and correcting the possible DNS issues. Welcome back as a TOR relay. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Browser Bundle for Windows contains Firefox 3.5.9?
On Fri, Jun 25, 2010 at 2:48 AM, judaiko judaiko siriu81...@gmail.com wrote: Why does the Tor Browser Bundle for Windows contain Firefox 3.5.9 and NOT the latest Firefox 3.6.4 or 3.6.3? The 3.6 version of Firefox has more Bugs fixed than the 3.5 version. 23 June 2010, 11:28 Firefox 3.6.4 adds crash protection, fixes vulnerabilities - Update More info at following addy: http://www.h-online.com/security/news/item/Firefox-3-6-4-adds-crash-protection-fixes-vulnerabilities-Update-1027586.html ( was not able to find a secure site, tho ) Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Automated threat messages force limitation of Exit Policy (Softlayer)
On Wed, Jun 23, 2010 at 5:49 AM, Moritz Bartl t...@wiredwings.com wrote: Hi, Out of curiosity, what exit policy are you now using? Perhaps we want to standardize on a policy that is effective at reducing these complaints. At the moment, I allow ports 20-22,53,79-81,110,143,443,706,873,993, 995,8008,8080,. Feel free to suggest others. I don't know if this will help or not, but in the states, my ISP provider calls me when they get a complaint. They tell me what the complaint was about, I get the ports the issues came thru and what they were. All except the last one were Torrents. The last one was allegedly email spamming. I started to explain, but realized that they would just turn off my service for not correcting the problem. In my case the EFF legal notice didn't work as they didn't care about it. Their main concern wee the complaints recieved from my ip addy. ( It could also just be their way of intimidation ). What I did on the Torrents was to turn off the ' misc services exit ' ( tho I would have liked to keep it running there and may try again and see how many if any complants come thru with the ports blocked ) and block the specific ports that were reported. On the email, I just blocked the specific port. That so far has taken care of those issues. ( fingers crossed ) I have yet to receive an actual abuse notice in the mail or via email. Like I said not sure if this will help in your case, but it has worked for me. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Network Map showing a major difference in public relays
On Fri, Jun 11, 2010 at 1:12 AM, Roger Dingledine a...@mit.edu wrote: Tor relays that haven't seen any client requests lately (and by client requests I mean requests using that Tor as a client) and don't have an advertised DirPort will stop fetching descriptors after a while, to save bandwidth. --Roger *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ Ok, That makes sense. Just have not noticed it in the past. Thanks Roger Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Network Map showing a major difference in public relays
I was wondering why on a windows os, the network map shows only 681 relays on one system and on another system, it shows 1853 relays. This seems to be a major difference, which is also above a previous message about only 80+ relay differences. The one running an exit relay is showing the lesser of the relays. The non exit relay is showing the higher number of relays. Any ideas or opinions? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: HTTPS Everywhere Firefox addon
On Thu, 27 May 2010 19:34:01 -0700, Mike Perry mikepe...@fscked.org wrote: Peter Eckersley of the EFF and I wrote this addon this past week to make it easier to use Google's SSL search feature, among other mixed-mode SSL sites: https://www.eff.org/https-everywhere/ The addon is based on the NoScript STS/HTTPS forcing engine, with improvements in how rules are specified. Rules for our addon are specified as XML files that allow arbitrary URL rewrite substitution via regular expressions and exclude patterns. This allows us to write more complete and less error-prone rules than NoScript's include/exclude model allows. The eventual idea is to allow an Adblock Plus style model, where users can submit and exchange rule files and eventually create subscriptions for the sites they use that partially support SSL. We also hope that NoScript will share our rule format and update mechanisms, so that our rulesets will be interchangeable. Please give it a try and give us feedback. We also will be including the addon in the next alpha release of the Tor Browser Bundle. Very interesting. How will other sites be added? Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: HTTPS Everywhere Firefox addon
On Thu, 27 May 2010 21:07:42 -0700, Mike Perry mikepe...@fscked.org wrote: Very interesting. How will other sites be added? The rule files exist in two locations - the addon installed set, and the user installed set. The addon installed set are in your Firefox profile directory under the following path: ./extensions/https-everywh...@eff.org/chrome/content/rules User supplied files live in ./HTTPSEverywhereUserRules/ in the Firefox profile directory. We plan to have some form of UI to automatically install filters to the user directory from the web, similar to the Adblock Plus subscription list. In the meantime, we'll gladly accept submissions as xml files for inclusion in the extension itself. How would I find the rules for the NYT blogs (*.blogs.nytimes.com)? These don't seem to be supported by the addon at this point. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: When can I get TOR for mobile?
On Mon, May 24, 2010 at 4:50 PM, Michael Gomboc michael.gom...@gmail.com wrote: Is there a working TOR version for the IPOD touch? 2010/5/24 Nathan Freitas nat...@freitas.net Sorry, there is no version of Tor available for that class of Java phone currently. . You need to upgrade to an Android, Windows Mobile, Nokia N900 or iPhone device. I believe the way I read it, Nathan answered your question in the previous post. Tho he may mean it only refers to the Java class of phones. However I am understanding that at the present the phones listed at the only ones that have a TOR working version. He is still working on getting others to work with TOR. Slow process, but he has made excellent headway. :).. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Network Status Reports
On Thu, May 13, 2010 at 2:58 AM, Olaf Selke olaf.se...@blutmagie.de wrote: you are right. Blutmagie uses a different bandwidth calculation using average bandwidth values instead of peak load. I've adopted some code written by Kasimir Gabert from his tns 4.0 trunk version. Btw Kasimir's trunk tns site http://trunk.torstatus.kgprog.com uses the same calculation like blutmagie. This algorithm fulfilled Roger's wish #2 from his wishlist posted on this list two years ago: http://archives.seul.org/or/talk/Jan-2008/msg00300.html There are two other non standard tns 3.6.1 gimmicks introduced on Blutmagie. 1.) Hovering mouse pointer over the a flag shows the city as a tool tip and clicking on a flag opens router's location in Openstreetmap. 2.) In table Aggregate Network Statistic Summary at page's bottom there's a row Total Bandwidth of displayed Routers. If you narrow down your choice of displayed routers for example by required flags exit=yes it will display the total sum of last 24 hour average sustained exit loads. Olaf Thanks for the info Olaf. I thought I was seeing things:) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node Sponsorship - looking for partners
--- On Thu, 5/13/10, W waterwai...@gmx.com wrote: I'm not necessarily suggesting nagware pop-ups, but I am talking about something like, perhaps, a splash screen with a reminder -- and a button -- upon launch. I can not speak for everyone else, but for my self, if I read this right, imo, there is no difference or very little difference between nagware popups and splash screens that have reminders or ads on them. There is enough ' crap ' ware out there with those pop ups, etc. As a relay operator, if i had to see this everytime an upgrade was done or had to reboot for whatever reason, those screens/popups would be enough after a while to stop being a relay. I am not in the ' technically-minded ' user base, but I am among the relay user database that donates time, bandwidth, money to the cause here. As just like several hundred others. Again, imo, I get the feeling beginning from the topic, that it appears to be more to this then meets the eye. It seems to me that some one other than TOR is going to benefit more from this. I may be wrong in the way I am reading this, but sure seems like to me that this is an entrepreneur proposition for some one to make money on/with. Jon PS: Hopefully some one from the Developing and Admin side will comment on this topic and give their opinions. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Network Status Reports
I am just curious as to why of the known mirror's that show the network status reports, why there is such a discrepancy between blutmagie reports and the others? Is blutmagie using a different config in reporting than the others? It appears blutmagie numbers are a lot lower than the other mirror reports as far as I can tell. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: help: Firefox is configured to use a proxy server that is refusing connections
On Tue, May 11, 2010 at 4:04 AM, Lefcoe Yaacov yaaco...@gmail.com wrote I recently installed Tor onto Firefox 3.5.9 on a PowerPC Mac Powerbook running OSX 10.5.8. It worked fine for about 5 days then starting giving me the message on the subject line It might be easier to help you if we know what the message was that was on the subject line. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Connection refused
I'm getting frequent 504: Connection refused errors on a few sites. This usually happens when I've been logged onto the site for an hour or two. Restarting Firefox doesn't fix the problem, the only thing that seems to work is restarting the Tor and Polipo daemons. Does anyone know what might trigger this? Jon
Re: Declining traffic
I came across this info which may be related or not about the possible botnets. There is a new P2P botnet forming. The Trojan it uses is ' Heloag ' . this is the url that gives info about it: http://threatpost.com/en_us/blogs/new-p2p-botnet-forming-041310?utm_source=Threatpost+Spotlight+Emailutm_medium=Email+Marketing+-+CRM+Listutm_campaign=Threatpost+SpotlightCID= this is the short url: http://threatpost.com/en_us/OTQ FYI On Fri, Apr 23, 2010 at 10:14 AM, Scott Bennett benn...@cs.niu.edu wrote: On Fri, 23 Apr 2010 15:51:59 +0200 Sebastian Hahn m...@sebastianhahn.net wrote: On Apr 23, 2010, at 3:21 PM, Timo Schoeler wrote: thus Brian Mearns spake: Any chance your ISP is throttling you? 100% *not*. Another possibility would be that your relay is heavily overloaded. See the big thread on tor-relays about the problems and potential solutions [0]. Sebastian, there was something that looked very much like a botnet attack running for two or three hours this a.m. It seems to have stopped now. I had shut down my machine to install operating system updates. When all that was finished and I finally brought the system back up, for some unknown reason, pf did not start. (As if there were not going to be enough confusion as things already were. Sigh.) As soon as I noticed pf wasn't running, I started it manually and loaded a block list. But pftop continued to pour forth log entries of illicit connection attempts from untold numbers of IP addresses and to scads of different TCP port numbers. I kept stopping and starting the logging, so that I could see the log entries long enough to add the addresses to that block list. I eventually got crosseyed from adding somewhere between 200 and 300 IP addresses to the list. :-( When I then let the logging continue, it had stopped getting any new stuff to log. It was very intense while it lasted, but in the larger scheme of things, it was of very short duration for a coordinated attack. I doubt that my system was the onlyt tor relay being attacked. In fact, I think the attack began a short time after my node appeared in the consensus, although at this point I can't prove it. What I would like to know is how many systems were attacked this a.m. in that manner, were only systems running tor relays attacked, who shut it off, etc. If anyone else on this list noticed anything between 5:00 a.m. CDT and 8:00 a.m. CDT, please post the details here. Thanks! *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Eventdns: All name servers have failed
After several hours of searching thru the archives, googling, etc; trying to find answers for what is causing this error and what to do about it. I could find a lot of bug tickets, and a lot of issues about it, but didn't seem to locate a fix for it except there were several for the Linux OS. I did not find anything on the Windows Svr side of the problem. I had this issues with Win Xp, but did not have it with Win 7. Now I am having it with WIn Svr 2008. Was there a fix or a solution for it, or was it determined that it was not important enough to worry about at the time, since generally it would correct it self with in less than a second most of the time and continue to work till it happened again? I have had 5 of these warnings now in 12 hrs today. To me that seems kind of excessive, but maybe its just me. The last 2 warnings were exactly 1 hour apart. But as I mentioned earlier, it lasts for last than a second. Any ideas or solutions? Thanks for the help and assistance. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Problems with Vidalia freezing up
This has just started in the past 3 days. I first had a network drop signal. Called the ip provider and they came out a did a signal test and found it was low and fixed that. However it did not fix my problem. Vidalia has been freezing up several times in the past 4 days. With it progressively getting worse. I have had to reboot the computer 2 times so far today and reboot vidalia 4 times today. In checking the logs, am not able to find any reason for it to lock/freeze up. Naturally it has been frustration since it keeps me from staying online. On the tor logs, there is a number of eventdns issues, but that is not unusual as it corrects it self generally with in less than a couple of seconds. I have run out of ideas. Any ideas on what to look for? I did notice that my inbound and outbound connections have increased a lot and am not sure if that may be the issue causing the freeze. I am on Win Svr 2008rc. Also running Tor ver. 0.2.1.25 and Vidalia ver 0.2.7 . Not sure what else info one might need. Any ideas on what to do next? Thanks, Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Anti-Virus software for windows server
Seems to me I saw in one of the messages awhile back about anti-virus software for servers. I cant seem to locate it in the archives. What anti-virus programs are being used for windows servers? Specifically, win 2003 or win 2008 ? Thanks. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Switching from windows to linux - config problems
I wish I knew. I first thought after all the help that maybe i missed a number in the key. That wasn't it, so I changed Virtual drives to see if if a different drive would make a difference. Theoretically, i would not think so. However, it seems to work ok on the other Virtual drive. It was really weird. On Mon, Mar 15, 2010 at 8:10 PM, Michael Gomboc michael.gom...@gmail.com wrote: I'm curious, what was the problem? 2010/3/15 Jon torance...@gmail.com Thanks,, the key issue has been resolved. Appreciate all the help :) On Mon, Mar 15, 2010 at 5:50 PM, Michael Gomboc michael.gom...@gmail.com wrote: For more help, please post the exact output of the first and the second command. regards, Michael 2010/3/12 Jon torance...@gmail.com I followed the instructions on the Debian/Ubuntu web page. Please show what you added to your sources.list. deb http://deb.torproject.org/torproject.org lenny main What distro are you running? Debian 5.03 and 5.04, Unbuntu server 9.10 and desktop Unbuntu 9.10 Is your Internet connection configured? yes, I can get out with no problems What is the output of: gpg --keyserver keys.gnupg.net --recv 886DDD89 After gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - everything works fine except when the export line is put in. I end up with an error saying something to the effect that the public key is invalid. ( i dont have a c/p of it, I am trying to remember from memory ) Just like you did, getting it right, the guys on IRC channel went thru it with me also and did some little tricks and they all came out exactly. But when I still added the last line, same thing happened. The only thing I can think of is I am using a Virtual drive, and that last line breaks. But my gut tells me that is not the problem. I may have to dig in the celler and bring out some old box's and trying it in a Hard Drive straight and see if the same issue happens. I am hoping to be able to use it thru a Virtual Drive if I can. Thanks On Fri, Mar 12, 2010 at 4:10 PM, Michael Gomboc michael.gom...@gmail.com wrote: What distro are you running? Please show what you added to your sources.list. Is your Internet connection configured? What is the output of: gpg --keyserver keys.gnupg.net --recv 886DDD89 After gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - you should see that: OK I tested it right now with Ubuntu and there is no problem. Regards, Michael 2010/3/12 Jon torance...@gmail.com I am in the process now of wanting to move up to linux for my main relay OS. I have been running windows xp and 7. I have tried on 3 different distros with the config for TOR and keep coming up with the same problem. a) on the page for Debian Unbuntu Instructions under Option #2, after the deb line is put into the /etc/apt/sources.list file b) it then says to run the lines to get the gpg key ie: gpg --keyserver keys.gnupg.net --recv 886DDD89 and then c)gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - this is where my problem lies. I can not get the 2nd line to work. I keep getting an error say no keys available or this is not a public key. It is the same, no matter which distro I tried on. Obviously, I am unable to go any further to install Tor. I got on IRC and asked in the Tor channel and tried to get help. They tried several different things to check it out and see if they could get it to work. In following there checks, it checked out and they could not understand either why it would not work. Any ideas and/or help appreciated. Thanks. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ -- Michael Gomboc www.viajando.at pgp-id: 0x5D41FDF8 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ -- Michael Gomboc www.viajando.at pgp-id: 0x5D41FDF8 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ -- Michael Gomboc www.viajando.at pgp-id: 0x5D41FDF8 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Full bandwidth is not used.
Paul, I am not savy enough to explain on the ins and outs of tor, etc. But what I can tell you, with both my servers running, I have yet reached my full bandwidth. I read someplace when I was researching on routers, that some routers actually had reduced the amt of bandwidth going thru them. ie: person was paying for 10 mbps and was only getting ( showing ) less than 5mps after going thru the router. I suspect that if your full bandwidth was being used, your system would possibly freeze cause of a burst of speed, etc., there would be no more room for more bandwidth. IMO, i don't think one would really want to be using it to the max. ex: you buy a car and want to see how it runs, so you take it out on the road and open it up as fast as it will go. To get the full usage out of the car, one would have to run it wide open, which of course could cause problems and would be hard on the car if done for any length of time. Also in another message, it was brought up that if a server is turned on and off a number of times and often, the user count of users using your bandwidth would be down until it became stable again. Time wise , if I remember right, is a 24-48 hour period. Jon On Tue, Mar 16, 2010 at 4:38 AM, Paul Menzel paulepan...@users.sourceforge.net wrote: Am Freitag, den 12.03.2010, 11:40 +0100 schrieb Paul Menzel: Am Dienstag, den 09.03.2010, 14:01 +0100 schrieb Paul Menzel: Am Dienstag, den 09.03.2010, 07:40 -0500 schrieb and...@torproject.org: On Mon, Mar 08, 2010 at 10:21:29AM +0100, paulepan...@users.sourceforge.net wrote 1.6K bytes in 52 lines about: : I now increased the RAM too and restarted the server to no avail. It is : still below 100 KB/s. What is the network configuration? $ more /etc/tor/torrc SocksPort 0 # what port to open for local application connections ControlPort 9051 ORPort 443 ORListenAddress 0.0.0.0:9090 Address 62.141.42.186 ContactInfo 1024D/6C0E1D58 Paul Menzel p...@gw90.de DirPort 80 # what port to advertise for directory connections DirListenAddress 0.0.0.0:9091 I implemented the changes suggested by arma on IRC (due to Exit and Guard flag [1]) to configure my server as non-exit relay, so I added the following line. ExitPolicy reject *:* It is a virtual machine and connections to port 80 and 443 are forwarded by an IPtables entry in the nat table with DNAT to the virtual host. On the virtual host using IPtables ports 80 and 443 are forwarded to 9090 and 9091. Sebastian on IRC helped me to gather more data. In `cached-descriptors` I have the following. bandwidth 5242880 10485760 155910 There are more entries for my IP address when I restarted and upgraded Tor. In `cached-consensus` (from 12:28 UTC) there is r anonymisierungsdien s+wb9df31yS6Y02Rvl0i0tenAWA vyRDgH2XTP6Tn1MPiJkWE0Yk9e8 2010-03-08 18:05:07 62.141.42.186 443 80 s Exit Fast HSDir Running Stable V2Dir Valid v Tor 0.2.1.23 w Bandwidth=61 p reject 25,119,135-139,445,563,1214,4661-4666,6346-6429,6699,6881-6999 and Bandwidth even decreased by 1 (from 62) compared to the value before the update (11:14 UTC). Unfortunately changing the server to a non-exit relay on 2010-03-10 09:28:25 UTC did not change anything. Although looking at my logs and the data on [2] I would say it differs a bit. According to my logs I would say, that traffic even decreased. $ grep -A 6 62.141.42.186 cached-descriptors | grep -E 'published|bandwidth' published 2010-03-07 17:51:12 bandwidth 5242880 10485760 55006 published 2010-03-08 00:05:02 bandwidth 5242880 10485760 155910 $ grep -A 6 62.141.42.186 cached-descriptors | grep bandwidth bandwidth 5242880 10485760 214272 bandwidth 5242880 10485760 141962 $ LANG=C date grep -A 6 62.141.42.186 cached-descriptors | grep bandwidth Thu Mar 11 10:30:02 UTC 2010 bandwidth 5242880 10485760 181555 $ LANG=C date grep -A 6 62.141.42.186 cached-descriptors | grep -E 'published|bandwidth' Fri Mar 12 09:46:43 UTC 2010 published 2010-03-10 09:28:24 bandwidth 5242880 10485760 181555 published 2010-03-11 03:28:50 bandwidth 5242880 10485760 178964 published 2010-03-11 21:29:37 bandwidth 5242880 10485760 143546 The value displayed on [2] seems to be more up to date. Here are some compiled values from `cached-consensus`. $ grep -A4 62.141.42 cached-consensus # adapted the output. r anonymisierungsdien s+wb9df31yS6Y02Rvl0i0tenAWA QvLgYWR3HuX0DKMSPBCwzjIVpCk 2010-03-09 12:05:55 62.141.42.186 443 80 s Exit Fast HSDir Running Stable V2Dir Valid w Bandwidth=63 $ ls -al (adapted) 384600 9. Mär 21:27 cached-consensus w Bandwidth=102
Re: Switching from windows to linux - config problems
Thanks,, the key issue has been resolved. Appreciate all the help :) On Mon, Mar 15, 2010 at 5:50 PM, Michael Gomboc michael.gom...@gmail.com wrote: For more help, please post the exact output of the first and the second command. regards, Michael 2010/3/12 Jon torance...@gmail.com I followed the instructions on the Debian/Ubuntu web page. Please show what you added to your sources.list. deb http://deb.torproject.org/torproject.org lenny main What distro are you running? Debian 5.03 and 5.04, Unbuntu server 9.10 and desktop Unbuntu 9.10 Is your Internet connection configured? yes, I can get out with no problems What is the output of: gpg --keyserver keys.gnupg.net --recv 886DDD89 After gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - everything works fine except when the export line is put in. I end up with an error saying something to the effect that the public key is invalid. ( i dont have a c/p of it, I am trying to remember from memory ) Just like you did, getting it right, the guys on IRC channel went thru it with me also and did some little tricks and they all came out exactly. But when I still added the last line, same thing happened. The only thing I can think of is I am using a Virtual drive, and that last line breaks. But my gut tells me that is not the problem. I may have to dig in the celler and bring out some old box's and trying it in a Hard Drive straight and see if the same issue happens. I am hoping to be able to use it thru a Virtual Drive if I can. Thanks On Fri, Mar 12, 2010 at 4:10 PM, Michael Gomboc michael.gom...@gmail.com wrote: What distro are you running? Please show what you added to your sources.list. Is your Internet connection configured? What is the output of: gpg --keyserver keys.gnupg.net --recv 886DDD89 After gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - you should see that: OK I tested it right now with Ubuntu and there is no problem. Regards, Michael 2010/3/12 Jon torance...@gmail.com I am in the process now of wanting to move up to linux for my main relay OS. I have been running windows xp and 7. I have tried on 3 different distros with the config for TOR and keep coming up with the same problem. a) on the page for Debian Unbuntu Instructions under Option #2, after the deb line is put into the /etc/apt/sources.list file b) it then says to run the lines to get the gpg key ie: gpg --keyserver keys.gnupg.net --recv 886DDD89 and then c)gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - this is where my problem lies. I can not get the 2nd line to work. I keep getting an error say no keys available or this is not a public key. It is the same, no matter which distro I tried on. Obviously, I am unable to go any further to install Tor. I got on IRC and asked in the Tor channel and tried to get help. They tried several different things to check it out and see if they could get it to work. In following there checks, it checked out and they could not understand either why it would not work. Any ideas and/or help appreciated. Thanks. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ -- Michael Gomboc www.viajando.at pgp-id: 0x5D41FDF8 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ -- Michael Gomboc www.viajando.at pgp-id: 0x5D41FDF8 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Switching from windows to linux - config problems
I am in the process now of wanting to move up to linux for my main relay OS. I have been running windows xp and 7. I have tried on 3 different distros with the config for TOR and keep coming up with the same problem. a) on the page forDebian Unbuntu Instructions under Option #2, after the deb line is put into the /etc/apt/sources.list file b) it then says to run the lines to get the gpg key ie: gpg --keyserver keys.gnupg.net --recv 886DDD89 and then c)gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - this is where my problem lies. I can not get the 2nd line to work. I keep getting an error say no keys available or this is not a public key. It is the same, no matter which distro I tried on. Obviously, I am unable to go any further to install Tor. I got on IRC and asked in the Tor channel and tried to get help. They tried several different things to check it out and see if they could get it to work. In following there checks, it checked out and they could not understand either why it would not work. Any ideas and/or help appreciated. Thanks. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Switching from windows to linux - config problems
I followed the instructions on the Debian/Ubuntu web page. Please show what you added to your sources.list. deb http://deb.torproject.org/torproject.org lenny main What distro are you running? Debian 5.03 and 5.04, Unbuntu server 9.10 and desktop Unbuntu 9.10 Is your Internet connection configured? yes, I can get out with no problems What is the output of: gpg --keyserver keys.gnupg.net --recv 886DDD89 After gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - everything works fine except when the export line is put in. I end up with an error saying something to the effect that the public key is invalid. ( i dont have a c/p of it, I am trying to remember from memory ) Just like you did, getting it right, the guys on IRC channel went thru it with me also and did some little tricks and they all came out exactly. But when I still added the last line, same thing happened. The only thing I can think of is I am using a Virtual drive, and that last line breaks. But my gut tells me that is not the problem. I may have to dig in the celler and bring out some old box's and trying it in a Hard Drive straight and see if the same issue happens. I am hoping to be able to use it thru a Virtual Drive if I can. Thanks On Fri, Mar 12, 2010 at 4:10 PM, Michael Gomboc michael.gom...@gmail.com wrote: What distro are you running? Please show what you added to your sources.list. Is your Internet connection configured? What is the output of: gpg --keyserver keys.gnupg.net --recv 886DDD89 After gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - you should see that: OK I tested it right now with Ubuntu and there is no problem. Regards, Michael 2010/3/12 Jon torance...@gmail.com I am in the process now of wanting to move up to linux for my main relay OS. I have been running windows xp and 7. I have tried on 3 different distros with the config for TOR and keep coming up with the same problem. a) on the page for Debian Unbuntu Instructions under Option #2, after the deb line is put into the /etc/apt/sources.list file b) it then says to run the lines to get the gpg key ie: gpg --keyserver keys.gnupg.net --recv 886DDD89 and then c)gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add - this is where my problem lies. I can not get the 2nd line to work. I keep getting an error say no keys available or this is not a public key. It is the same, no matter which distro I tried on. Obviously, I am unable to go any further to install Tor. I got on IRC and asked in the Tor channel and tried to get help. They tried several different things to check it out and see if they could get it to work. In following there checks, it checked out and they could not understand either why it would not work. Any ideas and/or help appreciated. Thanks. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ -- Michael Gomboc www.viajando.at pgp-id: 0x5D41FDF8 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Error / bug on latest Ver 0.2.1.24
I have been getting this error: Mar 07 10:12:03.984 [Warning] router_orport_found_reachable(): Bug: ORPort found reachable, but I have no routerinfo yet. Failing to inform controller of success. [10:12:03] Tor Software Error - The Tor software encountered an internal bug. Please report the following error message to the Tor developers at bugs.torproject.org: The 1st time was right after it came out. I had to reboot and the error showed up again. I have made no changes. I have notice that it has drastically slowed down the amount of user access. It all happened after the install. right now Ver .23 was performing better than this new one. Any ideas? This is being run on Win 2k. I am kind of afraid to install on my exit server until there is fix, if needed. Any Ideas? I have made a report to the bug tracker - Task #1268 Thanks :) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Access from a local file
On Wed, 17 Feb 2010 11:18:03 -0800 (PST), Martin Fick mogul...@yahoo.com wrote: --- On Wed, 2/17/10, Jon Cosby j...@jcosby.com wrote: I'm referring to links from file:// urls. By default, Torbutton blocks this, and has it recommended. Ah, you mean the file protocol. Firefox itself tends to have this disabled by default also. One of the reasons is to prevent malicious users from including file:// urls in an external webpage. With file:// urls, a webpage could be designed to test for the existence of local files on your computer. From an anonymity standpoint, if I can run a test that verifies the existence of a specific file on your computer, one that I can prove only you would have on your computer, then I might be able to prove that you loaded my webpage. I suspect there are also ways potentially execute some local code on your computer by accessing local files (depending on the OS, this might be harder or easier to achieve). If that's the case, perhaps depending on the program, by executing it locally, I might be able to detect this remotely. Maybe the program does something as simple as a DNS lookup that I can sniff and then correlate to you... And, finally, just because a file is accessed via a file:// url does not mean it is actually accessing a file locally. It is accessing a file via your local file system namespace, but this might be on a remotely mounted drive/share making the remote server able to detect/prove this access, once again, exposing your access of a webpage by at least the owner of the remote server/share. I suspect that there are many more attacks based on this, that I have only touched the tip of the iceberg... Hope that helps, The only time I can ever recall coming across the protocol is in opening files on my computer, and this has never been disabled. To fool somebody into opening this file on a remote server, the cracker would need a copy of the file, which would essentially require prior access to the computer. Or am I missing something here? Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Google cookies
On Fri, 2010-02-12 at 23:45 -0500, and...@torproject.org wrote: On Wed, Feb 10, 2010 at 11:27:26AM -0800, j...@jcosby.com wrote 0.3K bytes in 10 lines about: : I just noticed that on closing a Firefox session, google cookies are not : removed. I have to toggle Tor to remove them. Is this normal? Do you mean toggle torbutton? It depends what you have told torbutton to do or how you have setup firefox to manage cookies. Yes, I'm using the Torbutton, with the default cookie settings (clear on toggle, etc.) The google cookies are the only ones that require a manual click to clear. All others are removed on closing and resetting Firefox. Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Google cookies
On Sat, 13 Feb 2010 15:03:28 -0500, Flamsmark wrote: On 13 February 2010 14:16, Jon Cosby wrote: On Fri, 2010-02-12 at 23:45 -0500, and...@torproject.org [2] wrote: On Wed, Feb 10, 2010 at 11:27:26AM -0800, j...@jcosby.com [3] wrote 0.3K bytes in 10 lines about: : I just noticed that on closing a Firefox session, google cookies are not : removed. I have to toggle Tor to remove them. Is this normal? Do you mean toggle torbutton? It depends what you have told torbutton to do or how you have setup firefox to manage cookies. Yes, I'm using the Torbutton, with the default cookie settings (clear on toggle, etc.) The google cookies are the only ones that require a manual click to clear. All others are removed on closing and resetting Firefox. Are you referring to the Google cookies that Torbutton uses to avoid having to fill in CAPTCHAs every time you load a Google page? Those are the same across Torbutton users, so they won't identify you. Now that you mention it, I haven't seen that in a while. Nice feature, I wasn't aware of it. Jon Links: -- [1] mailto:j...@jcosby.com [2] mailto:and...@torproject.org [3] mailto:j...@jcosby.com
Google cookies
I just noticed that on closing a Firefox session, google cookies are not removed. I have to toggle Tor to remove them. Is this normal? Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor in China
Am not sure if they are still blocking, but I presume there are some blocks still on, as the bridge usage is very high for users from there. On Tue, Feb 9, 2010 at 6:36 PM, onion.s...@nym.hush.com wrote: Does anyone know if China is currently blocking Tor? Does the situation described below persist? https://blog.torproject.org/blog/picturing-tor-censorship-in-china https://blog.torproject.org/blog/tor-partially-blocked-china *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Ypops with TOR
Ypops: http://ypopsemail.com/ FYI - this page may have an Trojan in it. My Avast AV went off and FF would not reload cause of the alert. It may be a false alert, but thought I should pass it on: 2/2/2010 8:12:37 AM Object: http://hustov-steps.biz/ Infection: HTML:IFrame-KP [Trj] On Tue, Feb 2, 2010 at 2:52 AM, M moeedsa...@gmail.com wrote: Hey guys I wanted to check my yahoo acct via thunderbird, and i found a program called ypops that allows you to do so. Can some explain to me or know of a links which explains how to torrify it? Ypops: http://ypopsemail.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Need for sane ISP's?
I do not know if this will help or not. After I got my server up and running, approx 10 days later i got a call from my IP provider that they had received several complaints about illegal downloading of copyright material. Shocked the hell out of me. I figured if it was going to happen, it would happen later than sooner. I did not receive a DMCA per say, but I was told that they had 7 notices and the issues needed to be take care of. I explained what I was doing, but they, at least from tier 2 I think, had no clue about TOR nodes. So Instead of trying to act like an expert and they didn't know what was going on, I asked about what ports this was happening on and they told me and they slipped as to who the complainant was. I told them I would take care of the problem and to let me know if any more complaints came in. So far as of this writing, I have received no more complaints. I had to uncheck the Misc box in the exit node, which would cover the ports the complaint was on. Now if this would happen again, They may get a little stronger action or force full about it. I will have to verify this, but I believe according to the TOS of the provider, If I did not comply and attempt to correct the problem , they would pull my contract. I have not at this time sent a letter to them using the template. Like I said earlier, the problem has been resolved as far as I know at this time. Jon On Mon, Jan 25, 2010 at 5:56 AM, grarpamp grarp...@gmail.com wrote: Hi. In regard to the current general discussion regarding Tor operators who are getting disconnected for DMCA reports, etc... Is there a need for a 'by the books' ISP/hoster based in the USA? By 'by the books' (btb), I mean... one who isn't just going to kill your node, blog, files, etc... because someone complained and the ISP doesn't happen to like complaints or you... but will just claim common carrier immunity as provided for in usa law. Note that, in the usa, this generally means that if the subscriber does not step up to deal with the issue, that the isp is then forced to act to avoid becoming a conspirator or facilitator... often due to legal verbage in their contracts leading all the way back to the Tier-1's. Except I'm curious to get a handle on whether even that is the real world case... ie: the provider continuing to claim immunity even if the subscriber fails to stand or be reachable vs. the isp losing their pipe because of it. But overall, is there a need for a usa ISP who won't kneel to silly inquiries unless the law requires them to do so. And certainly won't do it because they take some lame moral sides to whatever the issue of the day is. aka: btb. Having one in the usa may not be good in relation to DMCA issues but surely also may be good for foreign entities to safely host what wouldn't be welcome in their own country. But would surely be ok as free speech in the usa. And other variations on this theme. Discussion as to such need? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Call for volunteers
Hi, I'm Jon. I do some of the mirror coordination work for http://www.torproject.org/ I'm in need of a quick and good tutorial for those mirror operators who are interested in running with HTTPS capability. So basically, openssl (or generating a self signed cert) and how to configure Apache to work with that. If you are interested in writing this tutorial (or adapting an existing tutorial), please contact me off list. Thank you in advance for what you do. -- Best, Jon --- --- --- --- PGP key located at http://www.nonvocalscream.com/key.txt PGP encrypted mail preferred. PGP Key ID: 6F19ED63 Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63 *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Microsoft .NET Add-on
On Mon, 2009-11-23 at 02:15 +0800, Koh Choon Lin wrote: Dear all I noticed that on Windows, Microsoft .NET Framework Assistant Add-on is installed and enabled for all Firefox installation (portable or not), i.e. including the Tor Browser Bundle 1.2.10. Would this add-on be a security risk to anonymity? This appears to be provided in a service pack by Microsoft, and I would not trust them for this purpose. Remember, this is the same company that forced Genuine Advantage their users. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Tracing internal errors
I'm trying to get Tor working in Firefox/Torbutton on openSUSE 11.2. There's something about the privoxy settings that it doesn't seem to like. In the privoxy config, I've tried forward-socks4a / localhost:9050 . (internal error) forward-socks4a / 127.0.0.1:9050 . (check settings) forward-socks5 / localhost:9050 . (internal error) forward-socks5 / 127.0.0.1:9050 . (check settings) Internal error is kind of vague. There's nothing in the privoxy log. I seem to remember running into this when there was an issue with the system time, but that's not the case here. What's the next place to look? Jon *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Random chaff [was: more work for Grobbages]
*sigh* See below :) On Sep 23, 2009, at 8:29 AM, Paul Syverson wrote: On Wed, Sep 23, 2009 at 11:11:29AM -0400, Praedor Atrebates wrote: It would appear that the tor network should include some timing randomization and reordering of packets to thwart such analysis. Not so much to really slow things down but enough to throw up uncertainty in the packet analyses. You're trying to turn it into a mix network. That's something that exists in that box over there, not Tor's box ;) The order uncertainty doesn't matter at this level of latency. AKA, as little of latency as possible... which is still quite a bit actually, thank you bittorrent :( The Bauer et al. research I mentioned showed how to do timing attacks based just on setting up the circuit. You don't even need to send any data. *shrugs* If all clients in the network created Tor circuits of the same length, all at the same time, wouldn't that mangle that analysis of who's telescoping circuit-extension request is who's? I know that's not what cover traffic does... but if Tor has some sort of heart beat that would make it more difficult to distinguish between which circuit- extension request is who's... that's only feasible because all clients have a stake in circuits, not the same for external-to-to requests, like webpages etc etc... Whatever solution (if one even exists) is out there, most of the straightforward ideas and many of the not so straightforward ideas have already been extensively researched. But not necessarily tested in the wild... Even the Bauer et al. demonstrates those ideas in a fake Tor network, yes, on recommendation from Tor not to do the experiment in Tor, but still. And on PL, the VM environment is particularly prone to latency, so of course timing analysis attacks will stick out like a sore thumb... so there might actually be something to deploying that exp on the real network... Cf. what does that mean? :) the papers Nick and I mentioned before and others in the Freehaven anonbib. aloha, Paul
Re: The Register article about making online anonymity illegal in Australia
I figure it's an arms race between those seeking control and those valuing freedom. I disagree. I'd say that valuing control and seeking freedom more accurately describe the actual state of affairs.
Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu
On Wed, 2009-08-19 at 02:12 -0400, Ringo wrote: I would appreciate any feedback people have on this. This is just an idea and it's kind of beta, so don't use this unless you know what you're doing. PGP key at bottom of message More Secure Tor Browsing Through A Virtual Machine in Ubuntu I've been trying to get Tor/Privoxy to work on an openSUSE guest in VirtualBox. I have the Tor and the Privoxy daemon running, but get and internal error in the Torbutton test, and a 503 error trying to access a Web page. It's actually working in the factory guest. I don't have a clue what's different. Firewall is the same, so are the config files. It also works on the host. Do you have any guess what I'm overlooking? Jon
Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu
On Sun, 2009-08-23 at 21:13 -0700, Jon Cosby wrote: On Wed, 2009-08-19 at 02:12 -0400, Ringo wrote: I would appreciate any feedback people have on this. This is just an idea and it's kind of beta, so don't use this unless you know what you're doing. PGP key at bottom of message More Secure Tor Browsing Through A Virtual Machine in Ubuntu I've been trying to get Tor/Privoxy to work on an openSUSE guest in VirtualBox. I have the Tor and the Privoxy daemon running, but get and internal error in the Torbutton test, and a 503 error trying to access a Web page. It's actually working in the factory guest. I don't have a clue what's different. Firewall is the same, so are the config files. It also works on the host. Do you have any guess what I'm overlooking? Checking the tor log, I'm getting warnings that my clock is behind the time. My clocks are set correctly. Anyone know what this is about? Jon
Re: Numbers of police-raids ?
Attac Heidenheim wrote: Hi everybody, I think everybody who plans to become an exit-node is frightened of being raided by the police (even in Germany) because of the server. Are there any numbers of police-searches available, especially for Germany ? Greetings, Niklas I don't know of any in the U.S. however, I will search public records for anything. Data won't be available for searches and seizures if a prosecution did not result, due to the government protecting the innocent. (which incidentally, might mean no data, I don't think laws would permit successful prosecution of exit nodes here). -- Best, Jon --- --- --- --- PGP key located at http://www.nonvocalscream.com/key.txt PGP encrypted mail preferred. PGP Key ID: 6F19ED63 Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63
Re: Comcast throws down gauntlet to residential accounts
On Tue, 2009-08-11 at 12:38 +0200, Niels Elgaard Larsen wrote: Scott Bennett wrote: On Tue, 11 Aug 2009 01:10:41 -0400 Ted Smith ted...@gmail.com wrote: You're conveniently ignoring countries like Sweden, Iceland, Estonia, where socialist Internet policies have resulted in some of the best environments of digital freedom. In fact, your list appears only to Am I, indeed? Let me see now...would that Sweden and Estonia happen to be the same Sweden and Estonia that are members of the European Union, that lovely organization issuing various directives requiring member states to institute legislation and regulation inimical to freedom on the Internet? It is even worse than that. In Sweeden ISP's are forced to hand over a copy of every single byte that crosses state borders to the state. The FRA law: https://secure.wikimedia.org/wikipedia/en/wiki/FRA_law Yet you trust companies in this country who will engage in warrantless wiretapping for a fee? Jon
Re: Comcast throws down gauntlet to residential accounts
On Mon, 2009-08-10 at 13:22 -0700, Martin Fick wrote: A right is something someone should not be able to prevent you from doing, not something that should be provided to you. I believe that you have the right to be a space tourist if you want to be, but, of course, that does not imply that I believe that you should be able to become a space tourist for $10 (unless someone offers it to you at this price voluntarily). The right to do something and the means to do it are two completely separate issues. We aren't talking about the net a source of amusement. It is an essential means for news, information, communication and political speech. Consider what some people use Tor for. As it is, access in the US is controlled by a few powerful telecoms, and if one of them arbitrarily decides to preclude Tor or other anonymity programs, it will have wide effects. I would not use Comcast, wouldn't trust them given their history (e.g., BitTorrent). They're under-handed, lying and basically corrupt. To the OP, consider changing services. Jon
Re: Download history
On Fri, 2009-07-31 at 12:14 -0700, Jon Cosby wrote: When I switch to Tor via the TorButton, I'm given a fresh cookies cache but my download history is intact. Downloads in anon mode are not added to the history. Is this by design? Ignore. Checking the preferences, I guess I need to specify clearing the history. Jon Cosby
Re: Uzbl browser
On Tue, 2009-07-21 at 10:55 +0200, Marco Bonetti wrote: Uzbl looks like a nice browser but I don't think it will be good for Tor usage: anonymous surfing is not just a matter of enabling a proxy setting. The user has to secure the code which arrives to his browser, either turning javascript completely off or using TorButton selective killing, then he has to look for those html tags which could do nasty things like opening side channels and when he thinks it's all over he should start looking at which informations he send to the web server, in order to blend in the crowd, either stripping them off or changing his settings accordingly (like the user agent or the program's window size). What's this about selective killing? I don't find any mention of it in the TorButton preferences, or on google for that matter. Jon
Request for volunteers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, It seems that our mirror updating script is a little outdated. It is located at https://svn.torproject.org/cgi-bin/viewvc.cgi/website/trunk/update-mirrors.pl?view=log and is a perl script. Basically, it checks to see if a mirror has been updated and if even slightly out of date, it will report the mirror as out of date. We would like to have mirrors that have are out of date more than 24 hours being reported Out of Date, those updated within 24 hours, current... however I'm not sure how to code this. Any pl guru out there who is inclined to help, please submit new code to me off list, and thank you for your help! - -- Best, Jon - --- --- --- --- PGP key located at http://www.nonvocalscream.com/key.txt PGP encrypted mail preferred. PGP Key ID: 6F19ED63 Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkpiMioACgkQxlOuhm8Z7WPpNwCePK479qY4m9/x6+Z19nPJt1nH gjgAn3YJK8qDvUyZ2ADGZSUE78p6Oy9U =Z8rD -END PGP SIGNATURE-
Re: tor-mirrors (mirrors of the Tor Project website)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 leandro noferini wrote: jon ha scritto: Just a couple of notes, since some Tor Project website mirror operators may be subscribed to this list: I would like to setup a mirror for tor website but I need to know how much disk space needs. [...] Should be 15 GB for the website and dist, and 4 GB for just the dist. Thank you for your interest! Links you should see... http://archives.seul.org/tor/mirrors/ and http://www.torproject.org/running-a-mirror.html.en - -- Best, Jon - --- --- --- --- PGP key located at http://www.nonvocalscream.com/key.txt PGP encrypted mail preferred. PGP Key ID: 6F19ED63 Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkpP0m8ACgkQxlOuhm8Z7WOHpwCeOpgmghGvCR99SslohHk6Ib2a j4IAni51sMlByx/my9NYg/r0yYMnt3Gz =43+e -END PGP SIGNATURE-
Re: tor-mirrors (mirrors of the Tor Project website)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 jon wrote: Greetings, Just a couple of notes, since some Tor Project website mirror operators may be subscribed to this list: Recently there was some discussion regarding a discussion list for mirror operators. This has recently been brought to fruition. Instructions on subscription are located here... http://archives.seul.org/tor/mirrors/ Some details regarding the list may be found on the first post to the list... http://archives.seul.org/tor/mirrors/Jun-2009/msg0.html One key change is that mirror changes/additions are now posted to this list. In the past, changes/additions were sent to tor-webmaster Something that is also desired, is the admin contact for the mirror operators. Preferably stated in an introduction to the list. Alternatively, you can send me the contact directly, if you please :) A good email address is all that is requested. This information will help to better contact those operators whose mirrors are out of date, or otherwise not working. This way, we can let mirror operators know when their mirror *may* be misconfigured or non-updated. Also, if you host a mirror, and you notice that your organization is missing, or inaccurate, and you would like to update it, please also post that to the list. Alternatively, let me know directly. Thank you for supporting Tor! Very best, Jon ... and /dist mirrors also. The mirror list is on the website at: http://www.torproject.org/mirrors.html.en I apologize for the two emails instead of one. Regards, Jon - -- PGP Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63 PGP ID 0x6F19ED63 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkpBxFoACgkQxlOuhm8Z7WNaWgCfR8UKkHCe39KEn149EEaYxJMk mEgAnRPzMRjyIK9DZd0Ytk76r9urnIOv =RgF9 -END PGP SIGNATURE-
tor-mirrors (mirrors of the Tor Project website)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Greetings, Just a couple of notes, since some Tor Project website mirror operators may be subscribed to this list: Recently there was some discussion regarding a discussion list for mirror operators. This has recently been brought to fruition. Instructions on subscription are located here... http://archives.seul.org/tor/mirrors/ Some details regarding the list may be found on the first post to the list... http://archives.seul.org/tor/mirrors/Jun-2009/msg0.html One key change is that mirror changes/additions are now posted to this list. In the past, changes/additions were sent to tor-webmaster Something that is also desired, is the admin contact for the mirror operators. Preferably stated in an introduction to the list. Alternatively, you can send me the contact directly, if you please :) A good email address is all that is requested. This information will help to better contact those operators whose mirrors are out of date, or otherwise not working. This way, we can let mirror operators know when their mirror *may* be misconfigured or non-updated. Also, if you host a mirror, and you notice that your organization is missing, or inaccurate, and you would like to update it, please also post that to the list. Alternatively, let me know directly. Thank you for supporting Tor! Very best, Jon - -- PGP Fingerprint: 8397 9B96 6518 5A90 10CA F3C1 C653 AE86 6F19 ED63 PGP ID 0x6F19ED63 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkpBwlcACgkQxlOuhm8Z7WO9agCfe8sj/mdTQv3genjvKiNM9RJd ml8An0Tq31o+zjCfWJKjYIbjnOYu1uJ8 =77SE -END PGP SIGNATURE-
Re: Help Iranian dissidents
linux wrote: On Sunday 21 June 2009, Chris Humphry wrote: [snip] i will keep my server running even I know some guys I dont like are using it. Regards Robert I don't know who is using mine. :) Jon
Re: Help Iranian dissidents
Karsten N. wrote: I saw coloured revolutions in Georgia, Ukraine and Kirgisia. After successfull revolution these countries got corrupt regimes. I hope, iran will not go this way. And I hope, tor will stay political neutral. Karsten N. Political neutral... yes, I think that is important for a project such as this. Jon
Re: eliminating bogus port 43 exits
I've read the entire thread and I still have one persisting question in my mind... Why are bogus port exists bad, and why should I eliminate them form my exit policy? *if* I want to keep the type of traffic somewhat also anonymous (assuming the operator is not looking at the content) then I might use a separate port to communicate my information. I don't know if I totally feel comfortable in this, most especially when we start talking about peering into the content. And even looking to see what the protocol actually is, is peering. That should be private, as an ethical consideration for all operators. Jon
Re: eliminating bogus port 43 exits
grarpamp wrote: One person's legit is another's bogus. It's always been that way. Other than routing, the use of the internet is partly chaos and it's not changing any time soon. Packets found on an internet, they exist, therefore they are, deal with it. So let's forget about this port number legitimacy thing. Further, some of us are real world network operators. We routinely sniff and record traffic as part of our jobs. In fact, if we did not, we would be very ineffective in our positions. Sniff if you want, don't if you don't. So we can also throw this argument out the window as to each their own. What we really want to know as network operators is what exactly IS going on in this case. And a simple count of SYN's is not enough for some operators to make a decision regarding their rulesets. Because for all they know, that traffic may indeed be diplomatic communications with the Borg that are keeping our planet from being assimilated. And well, unless you're Borg, or wish to become one, that's pretty legitimate :) Sniff that thing out, bring the full stats, write a whitepaper. Operators will look at it and make their own choices. Storing/grokking a days worth of tcp/43 sessions to find what percent of them have whois strings should be easy. As should tallying up the top ten whois queries and a distribution curve. That could help determine if it's some clients gone haywire or normal. Though somewhat like a ping someone left running, over Tor you'd just have to wait it out. Classifying and counting the non whois sessions would be harder but definitely interesting. If I was running an exit I would have already done and posted this for you all, but I'm not at the moment, so I can't. I yield the podium to my esteemed and valued peers on this list :) I can not agree. Sniffing the traffic at the exit node actually does jeopardize the reason people are using this software in the first place. Jon
Re: eliminating bogus port 43 exits
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ted Smith wrote: On Sat, 2009-06-13 at 13:48 -0600, Jon wrote: grarpamp wrote: One person's legit is another's bogus. It's always been that way. Other than routing, the use of the internet is partly chaos and it's not changing any time soon. Packets found on an internet, they exist, therefore they are, deal with it. So let's forget about this port number legitimacy thing. Further, some of us are real world network operators. We routinely sniff and record traffic as part of our jobs. In fact, if we did not, we would be very ineffective in our positions. Sniff if you want, don't if you don't. So we can also throw this argument out the window as to each their own. What we really want to know as network operators is what exactly IS going on in this case. And a simple count of SYN's is not enough for some operators to make a decision regarding their rulesets. Because for all they know, that traffic may indeed be diplomatic communications with the Borg that are keeping our planet from being assimilated. And well, unless you're Borg, or wish to become one, that's pretty legitimate :) Sniff that thing out, bring the full stats, write a whitepaper. Operators will look at it and make their own choices. Storing/grokking a days worth of tcp/43 sessions to find what percent of them have whois strings should be easy. As should tallying up the top ten whois queries and a distribution curve. That could help determine if it's some clients gone haywire or normal. Though somewhat like a ping someone left running, over Tor you'd just have to wait it out. Classifying and counting the non whois sessions would be harder but definitely interesting. If I was running an exit I would have already done and posted this for you all, but I'm not at the moment, so I can't. I yield the podium to my esteemed and valued peers on this list :) I can not agree. Sniffing the traffic at the exit node actually does jeopardize the reason people are using this software in the first place. Jon My understanding is that the Tor network provides some measure of *anonymity* regardless of whether the exit node listens to traffic. Certainly the reason for using Tor is not to magically protect your traffic from every being eavesdropped upon -- only end-to-end crypto can do that. Is this false? I ask out of genuine concern, because if exit nodes have to be trusted not to snoop on data for Tor to work properly (providing anonymity), Tor is not what I thought it was. The tor network can not encrypt data leaving the edge of tor. That is to say, once data has left it's last hop, towards the site (or service) the data is in the clear. There is no way for Tor to magically protect your data from eavesdropping. I am however, attempting to discourage eavesdropping by operators. Just because you can do something, does not always mean you should, is my thought. We should also encourage end to end encryption. Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEUEARECAAYFAko0Eu0ACgkQR7/9CWL6/5g4KwCYkSP51UI7jhquc3Iil/uzYbeX IwCdH4FvNZBlwn3jVU3a5YojEX8psYc= =x1Ko -END PGP SIGNATURE-
Re: eliminating bogus port 43 exits
Tor Fox wrote: Jon wrote: I am however, attempting to discourage eavesdropping by operators. That seems pointless. Anyone that's thoughtful enough to listen to your ethical consternation will also be thoughtful enough not to do anything intentionally malicious. It's the same reason why the police don't make public service announcements requesting that people not rob banks. Pleading with people intent on doing wrong is not going to change anything. The most you can do is educate people and let them make their own choices. Give us some hard facts about why it's a bad idea to sniff exit traffic but don't just emote. You've lost the context.
Re: eliminating bogus port 43 exits
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Tor Fox wrote: Jon wrote: You've lost the context. I don't know, maybe I have. It seemed that you were pleading with us not to ruin Tor by peeking at exit traffic and I was just explaining that Tor exit nodes can be operated by anyone, even less than scrupulous individuals. So, we're probably the last people that Tor users need to be worried about. If that's not what you were doing then I have no idea. You've only told me I'm wrong but have refrained from explaining why or giving any helpful clues at all. There was no pleading. There is no ruining of Tor. That is hyperbole. I got it that operators will snoop. But if you can't read the documentation, and get the grok the gist of the idea behind Tor... You want me to provide hard facts? It does not take a whitepaper to inform me that peering at traffic leaving the border is A Good Thing TM. Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAko0KE8ACgkQR7/9CWL6/5jhCQCgrDSNI0qKi2txbmB7Q5JhDfb7 Ql0Ani5lBrbKSd02lQY0B1I/Z+BikudI =LLxG -END PGP SIGNATURE-
Re: unable to submit bug report
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Scott Bennett wrote: Well, I *intended* to submit a bug report, but appear to be unable to log into the bugs.torproject.org web site to do so. I tried all sorts of things, including temporarily enabling JavaScript, which I really hate to do. If there is someone willing to submit the bug report for me, please let me know where to send the information. Thanks! Scott Bennett, Comm. ASMELG, CFIAG ** * Internet: bennett at cs.niu.edu * ** * A well regulated and disciplined militia, is at all times a good * * objection to the introduction of that bane of all free governments * * -- a standing army. * *-- Gov. John Hancock, New York Journal, 28 January 1790 * ** You can send it to me. I've also included my PGP for your use if you so desire. Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkoovu0ACgkQR7/9CWL6/5jjPwCeLzPuZJJk+uQ0fOubCOIwNioY suUAoJCIKR9knNfl8GEXr3tffz7b9C0I =oJfB -END PGP SIGNATURE- pgpkeys.asc Description: application/pgp-keys
Re: GSoC Introduction!
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Kory Kirk wrote: Hello everyone, I am a little late on my introduction, but this tardiness won't be reflected in any of my work - don't worry. My name is Kory Kirk, I just graduated with a Bachelors in Computer Science from Villanova University (outside of Philadelphia, PA) last weekend. In the fall I will be returning to Villanova to complete my Masters, I am in a 5-year BS/MS program. This summer I will be working with my mentor, Mike Perry, on adding some features to the TorButton Firefox extension. I am really excited to get back into programming Firefox extensions. The main features of Torbutton that I plan to work on are : tor:// tors:// protocol handling, better respoofing, and precise cookie control, more details can be found here http://korykirk.com/GSoC/tor_app.html . I would highly appreciate any ideas or feedback you want to shoot my way. This is my first year participating in Google Summer of Code, and I am really happy to be with the Tor Project. I don't know what else goes in an introduction, so here are a few things about me that might be relevant: I am almost always on IRC - on my computer and sometimes on my phone (nick: koryk). I am from Dallas, TX, USA and will be spending my summer there, and will be in Central Standard Time (UTC - 6). I stay up late. I love reddit. I am looking forward to contributing to the community. -KK Welcome. Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkoXHpEACgkQR7/9CWL6/5gFJgCgnfvJc9AAWsQ69FrtUAQED0RN +pEAn2nYXzBEyoE6JCYlvLexyI1+5EsM =FxdW -END PGP SIGNATURE-
[Fwd: New mirror]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ok, the new mirror now has https on both the website and dist directories. Will be adding ftp support soon, yes, that is on the list. Since not everyone everywhere can get on torproject to see the mirrors, please feel free to publicize, or send me an encrypted email let me know where or who I can tell so we can get this software out. http://www.nonvocalscream.com has links to the mirror as well. Best, Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkoG+DEACgkQR7/9CWL6/5hdCQCdHr6+PqpcjsawGoGbLaTNAltg vIoAoIHSDE/9o8UzM4WBvmi6KOx+q5D4 =EUpW -END PGP SIGNATURE- ---BeginMessage--- -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I've added a new mirror http://tor.nonvocalscream.com No https capability yet, but soon. For now, just http. This is a full mirror. Very best, Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkoEyLQACgkQR7/9CWL6/5h6fgCfVES7wiJrXUk0/8XkZeInKUap OBgAn1lxFgWEXw38JK+seuinKddbWC4c =D62+ -END PGP SIGNATURE- ---End Message---
New mirror
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I've added a new mirror http://tor.nonvocalscream.com No https capability yet, but soon. For now, just http. This is a full mirror. Very best, Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkoEyLQACgkQR7/9CWL6/5h6fgCfVES7wiJrXUk0/8XkZeInKUap OBgAn1lxFgWEXw38JK+seuinKddbWC4c =D62+ -END PGP SIGNATURE-
Bittorrent
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I had a thought. Now we know that 1) Bittorrent traffic across the network is not preferable. 2) Bittorrent traffic does transit the network. 3) Currently, any protocol level filtering within Tor is not preferable. We also know that some of the major developers of the bittorrent platforms have coded some blocklist ip filtering for the actual bittorrent platforms. Have we thought of engaging the bittorrent community on blocking the tor nodes themselves. This would disrupt the BT traffic transiting the Tor network. Thoughts? Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkmY2dgACgkQ6+ro8Pm1AtVq5gCfRY3qyohyu57aJd4DCnV260gP CaoAoKvciBSEDrD3kkZ2DBTgf/BCLwlW =6Qg/ -END PGP SIGNATURE-
Re: Bittorrent
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Drake Wilson wrote: Quoth Jon scr...@datascreamer.com, on 2009-02-15 20:13:37 -0700: Have we thought of engaging the bittorrent community on blocking the tor nodes themselves. This would disrupt the BT traffic transiting the Tor network. I started running a Tor relay and all my torrents immediately started failing. Now I'm not going to run a relay anymore. No? Jon --- Drake Wilson Makes sense. Is there a workaround? Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkmY74sACgkQ6+ro8Pm1AtVx5QCghbiCoXeo1v0f1ENtCNrQKRZD RIgAnA7+/vAEaE6lUFjS1OXUGtnD2ONv =dhK5 -END PGP SIGNATURE-
Re: Some Bones to Pick with Tor Admins
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michael G. Reed wrote: On Tue, 10 Feb 2009 mark485ander...@eml.cc wrote: | no need also to upgrade from 98se, except tor developers are too lazy to | code properly. You know, Tor is open sourceyou can go fix the damn bugs yourself if they are so important to you and your antiquated setup. If you weren't being such an ass-hat in the way you are DEMANDING support while insulting the developers and not even so much as filing a quasi-readable bug report, people might actually be willing to help you. I tend to bet that most folks on this list wrote you off with your very first email...and with good reason. Just my $0.02. -Michael I tend to bet that most folks on this list wrote you off with your very first email.. I know I did. Jon -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkmSSRgACgkQ6+ro8Pm1AtWlKACgiD8iQrTrRa1sOI6EfgyPrcAH Go0AoK6akFB6gs86uviFVWuWWXqYEns/ =MH84 -END PGP SIGNATURE-
Re: Failed to hand off onionskin
Mitar wrote: Hi! From time to time I am getting this warning: Failed to hand off onionskin. Closing. Your computer is too slow to handle this many circuit creation requests! Please consider using the MaxAdvertisedBandwidth config option or choosing a more restricted exit policy. I have been monitoring the system and while it is true that sometimes it tops one processor, it occupies most of the time just 50 % of one processor. I have also configured Tor daemon to use two threads so even if it tops one it could still switch to another. But it rarely passes 100 % (that is, it rarely really uses two processors). The system as a whole has also not topped its CPU power. And while load does not seem to be so high I get at the same time this errors. Is there some other system bound which would be causing this and not CPU? Are there some other performance tweaks I could try? I am using Tor 0.2.0.31 (r16744) on FreeBSD amd64. Should I maybe upgrade to devel version? Mitar What is your CPU speed, total RAM, total H.D.D?
PGP keys
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Just a quick note, I've revoked the key I've been using to sign messages on this list in favor of an older key I use. The current and valid public key is 0xF9B502D5 also located on pgp.mit.edu also pasted below: - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.4.9 (GNU/Linux) mQGiBEgWdGMRBADXoyJ689okhwqOPm5b0RP5l7lSBhCjhSJxgLUqlt7WYwoHhudr D+EqUkVKkdTeIYM6v5zj2zSAZ9tpIts9ICiHdGJHlUijI0z+JqgatZLfFkxZFOs7 zr37RHwUf6TkL/uA1C268nLT8PkE13qsn8mxH3oGis6bjXNOOVKKjxbY1wCgxVpb QrLiEe623tCZC8JiI5WRH1EEAIvMWsKeawDYS88g2BhybiK+PEt5NzdL8KfuwX+1 WGXt45/5KXOj5Vv5ougpRf7b2x33F4l+nejz15pyATwioOqIBIqJjzEmKtqFocK6 LDMTSQlrqUzKvazIlrF8t57ZjcZJum1/Dj/nsvMg/WVvZC1gG6vLTaGORiJZs7yU m5j8BAC3wyq6THEEBdJDE0BSeGT55X3I/53hECdDbMzNWYB/u/TwfpxmTUkONjiJ 3fTpPiiMhQXjPMyeqRq8yauWbrEpoK1dn+gja6L96FOqqhBMED45AJ8FVrs0s8MI ZBM7qiPWnKuwVIMOQNz3vDVL08HNXrG9WNNlueLMB8c1lTAsKrQdSm9uIDxzY3Jl YW1AZGF0YXNjcmVhbWVyLmNvbT6IZgQTEQIAJgUCSBZ0YwIbIwUJCWYBgAYLCQgH AwIEFQIIAwQWAgMBAh4BAheAAAoJEOvq6PD5tQLVw/cAn3k3rbDJBvXE1RLJpPyu rRiTdVWAAJsG/csS30qAWwAjWAbPEaGlfRNUWohGBBMRAgAGBQJIF10sAAoJEMkI OCUspg2JwZAAoLASZ3CrmvNxe1DHsh1s+nLqu5VOAKDCGqSWrfkPeSR6Z2zxxy8/ KIoVhIhMBBARAgAMBQJIGPRuBYMJY4F1AAoJEMugP0Z4XqIp9y4AnAzttgwC6Mvv kKj3D7G3orM2hs52AJ4/ETbBl9Jm8V8XxKw4/H5OQsK3c4hGBBARAgAGBQJIPxwg AAoJEE7zQ8pDSjxrzZUAn0sjQrfZIVMcFsYnnfa8VvGdmvkHAKCFKgx/BvW8RPeI mT4ipocIhoMnhYhGBBARAgAGBQJIQzTLAAoJEJSO+o1gkCxK2nkAn0IG/Igd+LoA 9OkEkvG1x1xSCLyAAJ9Kq9cMyWJsBWLHS7uD5+3KPKhRwohGBBMRAgAGBQJJRdJf AAoJEJPI6eWVcYpiOnQAniXtDw2wW7FF8GdLKs/XM1ML3qARAKCUU3KKkggzmgPs /2VEraINid/m+7kCDQRIFnRjEAgA5s5lcAwAegWhsVBfzqi3UnoRejrZo30qWLPf beXtuza1zsbG3j92r/5kjqirNyftVtY0VA8dQ60WLPqsB1xrQVYEK+jqH4LM90e/ rEJxugQnjXDXPQEqEdcwUUT9GQR0gpMHrNIuCT2aCkgX17OGpM4kxtGH13i3ygjN rw4ebI57CJr4oQXaFIM2AT82s9aQgjWhDJBDvpC59as7hg2ZCcLZrRg0nSgnmGFs qo2t+BL/GH+FDEjGPbsptZaQ7Ov+c1uBJhhRRE8v7Yg5/ETH4sz+ynEvMhJkKggg yYp07/rhnoiJPQd2Fiyq0ofXmcmYqRSWHRg5HSgzzAYebqoAvwAFHQgAps/wut1G 1fTU1Az8Xp0M8Kp4q1ix7kPlVPEQQjYAg5eHIq/M62ZIa0V4pfpxUby0nnmXAzN1 Hjs1qG9E6Jk/2UbxVppZf4yfBD/CcT3ItXwk6/ZxxQz9IpZm20BpzMvq4sFsia0z v674LhxFynJOMYKFWnh1pIg5Kaimy4nENk/PNAg4WojYx32b1lHL2wiXc8tyIpIM nlm7H/JyUhJhWdpa1Ya13qYUOKv0b+qzq2iELmimQycIADqh2UWsBHvn9ZIoXLfL yfpVOqbqlgyIsnjeq6RJjlbZWfpI3Aur1/xdfomXd3qCeDvNzb1z41EecPykbp+5 VdFT5qP4cz2BEIhPBBgRAgAPBQJIFnRjAhsMBQkJZgGAAAoJEOvq6PD5tQLV9W4A n0MDol5fMjxU5nJtGjNwh5ZZleINAJ0dWz9jvC+53OIVnwCPd4XG2iS/gA== =nvGD - -END PGP PUBLIC KEY BLOCK- Best, Jon- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAklIgHQACgkQ6+ro8Pm1AtXpRwCeLDRl1RYNfK5GWqY6Wn5Ns2LT 4CYAnRVmDY2x0mwPaB0HzTzO4WMEYhZN =o4BH -END PGP SIGNATURE-
Re: Metasploit Decloak Project v2
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Roc Admin wrote: I just noticed that HDMoore re-released his decloak engine. http://metasploit.com/data/decloak He's improved some of the attacks from before like java, flash, and DNS in pretty interesting ways. There's also a test for Microsoft Office documents which I thought was interesting. From the page: When Microsoft Office is installed and configured to automatically open documents, a file can be returned which automatically downloads an image from the internet. This can bypass proxy settings and expose the real DNS servers of the user. It doesn't seem like there are any new attack vectors but I wanted to pass it along to see if anyone had comments. -ROC Tor Admin Seems the way to guard against this is to reconfigure the DNS lookup to execute via tor at a system level. Easily done with the network configuration tools of Windows and Linux flavors. Jon- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAklFucoACgkQk8jp5ZVximL+fACgnTijon0ymXpas8d5EpGZ68/K XbIAn21naTJaCf7fQ8vWTxhq1/ES7+oL =qCXm -END PGP SIGNATURE-
Re: Bittorrent packets
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Justin Coffi wrote: Mitar wrote: Hi! I noticed that on a machine where I am running a Tor node I am getting a lot of invalid HTTP requests to my 80 port. In Apache logs I saw that they are Bittorrent packets and not HTTP requests. So I was wondering if anybody else has been noticing this? Why exactly is this happening? Mitar If you're an exit node, I imagine someone was seeding a torrent through your relay. Incidentally, I'll note that on the azureuswiki... http://www.azureuswiki.com/index.php/Avoid_traffic_shaping#Disguising_tracker_traffic there is encouragement to use Tor for BitTorrent. Personally, the practice should be discouraged... and before anyone calls me pro censorship... can anyone think of a good reason to Seed or leach via Tor? I have a mini spec prop regarding Tor and Torrent that I'll propose once I have it worded correctly. Jon- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAklF6A0ACgkQk8jp5ZVximKHPgCfVX/tDahl/U5DTp4UXbSmlchq ws8An1EVxcjZiJFq5p3mM5+qqwwyiDR7 =IRIZ -END PGP SIGNATURE-
Re: Need help with MPAA threats
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Nicky van Etten wrote: The MPAA still has to prove you realy have the content which they claim you downloaded stored on your computer or any other storage device afaik. On Sat, Dec 13, 2008 at 4:34 PM, Matthew McCabe mate...@mrmccabe.com mailto:mate...@mrmccabe.com wrote: Hello- Time Warner shut off my connection again last night due to a complaint from the MPAA. They claim that I downloaded 2 movies and 1 TV show. This traffic, in fact, must have come through my Tor exit node. I explained to the customer service agent that I am running a Tor exit node and that the traffic must have come through the Tor network. He said that because this is the 3rd complaint, the MPAA may take me to court and sue me for $100,000 per violation. He also claimed that others in similar situations have lost in court...whatever that means. Here is where I need your help. First, is there a good way to filter out torrents in my exit policy? Second, have any exit node operators in the US had similar complaints from the MPAA? If so, how did you handle the complaints? Lastly, has anyone in the US gone to court as a result of using Tor? If so, do you have a reference for a good lawyer? At this point, I want to continue running a Tor exit node but also want to investigate my legal options if the MPAA takes me to court. Thank you for your help! -Matt -- Ciphered/Signed email preferred! GnuPG KeyID: 0x42435F30 GnuPG DSA2 KeyID: 0x23286031 http://www.torproject.org/eff/tor-legal-faq.html.en -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEUEARECAAYFAklD6RgACgkQk8jp5ZVximJAXACfb1GtHoOwTKdDYG0TVKYZKQh+ PVAAmPpl8vtWXNKo7LPab9115pkev/Y= =s9ZJ -END PGP SIGNATURE-
Re: Need help with MPAA threats
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 krishna e bera wrote: It is unlikely that the content in question was ever on your computer at all, because Tor does not transfer UDP packets (used by bittorrent for data) and the default exit policy rejects the common bittorrent ports. The MPAA investigators are likely seeing the Tor users' access to the tracker website which is done via http. However, imo your best legal course in USA is as phobos suggested. I'm in Canada, where the DMCA does not really apply, but my network provider was getting annoyed receiving DMCA notices every day and threatening to cut off my server. The template letter i adapted from Torproject and was sending to the DMCA complainants (cc my network provider) was not enough because it did not stem the tide of notices. I thought about getting a cease-and-desist order against the complainants but i have no idea how (and no money) to go about international legal actions. After looking at several dozen automated DMCA letters, i noticed that all but a few point to tracker websites for ThePirateBay. I decided to add the ip addresses for those tracker websites to my reject list and have not received a DMCA notice for a few weeks now. Although this technically rejects some web (http) traffic, it seems to me just an extension of the exit policy rejecting bittorrent ports because those tracker ip addresses are primarily used for setting up p2p transfers. I'm paying $100 a month in bandwidth fees to facilitate anonymous communication for activists etc - not to subsidize consumption of games and movies. Yes i know p2p can carry all sorts of content; if there is lots of legitimate stuff available via ThePirateBay my attitude could change. Feedback on this is welcome. Your attitude I think is correct. I mean to say, yes, your intent for your relay is for censorship frustration, not games, movies, et cetera. I think your implementation is correct also. I run a relay without any exit permitted. The only reason I do this, is because I do not want to deal with any complaints ranging from DMCA, hacking, child exploitation transiting my link. If I ever decide to permit exiting, it will be on a dedicated server that I would pay for, located elsewhere. I just wish there were a better way to inspect the traffic and disallow certain traffic. Don't get me wrong, I'm not advocating that any relay inspect any traffic, just that illegal traffic transiting outside my link could land me in trouble. Perhaps thoughtworthy. Jon- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAklEHw0ACgkQk8jp5ZVximJ5NACeKtO5gwrLs1MkpnY3EDl4Nw9D QxAAoJFMaihbTM8tTb0XEV3kAV3kDFON =Ag5A -END PGP SIGNATURE-
Re: Tor-Vidalia communication
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Geoff Down wrote: Should I raise this as a bug at Flyspray? Vidalia can see relay status etc, and shut down Tor without the password being entered. They are both running as the same user however. GD On 8 Dec 2008, at 12:26, Geoff Down wrote: OSX10.3.9 , and yes, I was able to change identity, see the network map etc. GD On 8 Dec 2008, at 06:51, Jon wrote: Geoff Down wrote: Hi, previously, if I started Vidalia when Tor was already running, I would be asked for the password. Has this changed in 0.2.0.32 ? The torrc's I use for Vidalia or for the command line are different (and therefore the passwords are different). GD What operating system, and is vidalia successfully communicating with one instance or the other when you are *not* prompted for the pass? Jon- It might do in the bug system yes, but I'm not actually sure if it goes into trac or flyspray actually. I wanted to help localize it first. Actually, I thought you were running two tor processes at the same time, and I was wondering which one it connected? Jon- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEUEARECAAYFAklDF7EACgkQk8jp5ZVximLgFwCgjAoW7figucer0USMxS46mAPK PMoAmJbt0AvzrpmTSo09NnaeS8CS4BY= =0mgb -END PGP SIGNATURE-
Re: UK internet filtering
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Curious Kid wrote: I saw nothing about this on the OpenNet Initiative website at http://opennet.net/ . Perhaps someone should tell them. Not to stray too far off topic, this should be of interest to Tor node operators worldwide: Berlusconi plans to use G8 presidency to 'regulate the internet' http://opennet.net/news/berlusconi-plans-use-g8-presidency-regulate-internet The article describes him as a media baron. That could be bad news for anonymity advocates. - Original Message From: Gregory Maxwell [EMAIL PROTECTED] To: or-talk@freehaven.net Sent: Saturday, December 6, 2008 7:49:58 PM Subject: UK internet filtering http://community.zdnet.co.uk/blog/0,100567,10009938o-2000331777b,00.htm?new_comment I've confirmed the reports of UK ISPs censoring Wikipedia using some UK tor exists. Opennet, interesting site. Most especially the part where I learned that a Turkish prosecutor seeks to identify a youtube poster. Had this video been posted via Tor, the prosecutor will be unsuccessful. Censorship of opinions suck. Respectfully, Jon- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkk8kWYACgkQk8jp5ZVximKSYACgk7o7f+4gQMUANNzQnyLaTtqh ZD4An01mFS5MnDOoDi+2vmC2SJck8XQ4 =3foc -END PGP SIGNATURE-
Re: UK internet filtering
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Opennet, interesting site. Most especially the part where I learned that a Turkish prosecutor seeks to identify a youtube poster. Had this video been posted via Tor, the prosecutor will be unsuccessful. Censorship of opinions suck. Respectfully, Jon- It would be prudent of me to reference the note... http://opennet.net/news/turkish-prosecutor-seeks-id-youtube-posters Jon- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkk8kbEACgkQk8jp5ZVximK23gCbBL1ep/J/gVOnR/IrwGT8N7S3 2LAAn3CoSz2xQVP/pTL44QBJBZqGp1f7 =0jmk -END PGP SIGNATURE-
Re: Tor-Vidalia communication
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Geoff Down wrote: Hi, previously, if I started Vidalia when Tor was already running, I would be asked for the password. Has this changed in 0.2.0.32 ? The torrc's I use for Vidalia or for the command line are different (and therefore the passwords are different). GD What operating system, and is vidalia successfully communicating with one instance or the other when you are *not* prompted for the pass? Jon- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkk8w/EACgkQk8jp5ZVximL7DgCghwbh96IklKHHMOBRy6kTpZLU A7QAn2w5s0qkS8jBGPr+heSk4ZskVyl8 =5HLm -END PGP SIGNATURE-
Tor bridges email discovery...
Hey everyone, Is the email based bridge discovery mechanism described here* not functional? I've tried from a few valid gmail accounts but have received no responses. * https://www.torproject.org/bridges#FindingMore
Re: not in the list. Not in the tor network map.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Is there more information you could give. For example, are you saying that the nodes you are connected to are not in your network viewer list? jed c wrote: Looking at my connections I noticed some are not in the list. Is this normal? -- -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkkos1gACgkQk8jp5ZVximI4LACfSPC9+JeA7wUuf12vtOXxlLv+ r60AnA/Tu/ZL8jZBpJ+SbisM2UgxtNc/ =rNzv -END PGP SIGNATURE-