Current state of affairs regarding Torservers.net
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi all, Hi Joseph, On 09.02.2011 01:03, Joseph Lorenzo Hall wrote: At what point can torservers be confident it can support $800/month? It's a very tough decision to make. Our current funds ($2400) mean we would survive 3 months. Three months of beating the drum, incorporation, proper announcement and press release, finally translating the website, plus some nice ticking clocks and bars on the website and Kickstarter fundraising. State of affairs: 100tb doesn't respond 2host doesn't respond evoboxes isn't quite sure yet; cannot SWIP yet Most don't like us Other are too expensive: Professional offers start at ~500 Euro per 200 Mbps at the cheapest (with 100 of that already donated) FDC has a new datacenter in CZ, $300 for unmetered Gbit; not sure they would accept us, waiting on a reply. Mike Perry left and told me to better stay away, but he was at a US datacenter. http://www.webhostingtalk.com/showthread.php?t=1017226 And we don't even know if we can push the server to Gbit anyway. There seem to be some bottlenecks still hidden inside the code. Amunet is at not more than 800 Mbps most of the time. We can: * go with Swiftway in a strategic moment and hope for the best (in terms of bandwidth and publicity) * run the first Icelandic exit for 12€/Mbps * go with a reliable 200 mbps in Germany for ~500 Euro/mnth * try FDC * look/wait for better offers I think we should make a decision before, or, at the latest, at the foundation meeting. I haven't heard back from the tax authorities yet, I expect it to take no longer than one more week. I'm leaving Dresden for two weeks on 22nd, so Feb 19th would be the last possible ad hoc founding date or we'll have to postpone until mid March. If you want to discuss any of this, join us at irc.oftc.net #torservers, or contact me personally on XMPP mor...@torservers.net. - -- Moritz Bartl http://www.torservers.net/ -BEGIN PGP SIGNATURE- iQEcBAEBAgAGBQJNVJJVAAoJEOGPxWJITcUAcvkIALa0NvvPqU9C5hA5OcemYTAk EjREQsuE6L8TpVTN0sp4pTCxk3QJ3RQ0Ygxlz2GKLXWuopOKu8D8mE6yb0IE4WHs 15aPZF1dttyiWEK3FEQb1BAZP2EFdeOin1xHtWmsNJrVUB3C6vim2XjtKLfjhZ75 XBFcfWoCgJ61ck2jWMHpr7LgLZQN7gWvf46HMY7Rxn/wlwJTXTedJ+DcPR4BIJkB 25W7TKm9qvTEl1C0eiYDwboNdzbES77Kzmrgyljk80vZvu/rV5jdQW3K8hasnh3f RIEoD3EJtHrPSi6KZ9H0vj1ysa8UJKg1v6W7FYtc7qel0JT5zojImTsOBk0Gobo= =feyN -END PGP SIGNATURE- *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: I wish to see one video on you tube - question about flash.
Hi, On 09.02.2011 09:13, Matthew wrote: I know that the Metasploit people have a script which checks the IP via Flash. But how common would it be for a commercial provider to do this? Would there be a way of finding out if YouTube of whatever are employing this technique? In this particular case, does it matter? However, can one actually view videos via Tor. Surely they demand too great a level of bandwith? There are several techniques to download videos from Youtube, so bandwidth doesn't matter that much if you can just wait. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Sent e-mails going into spam folders.
On 09.02.2011 10:18, Karsten N. wrote: May be, some mail providers does not add the sender IP address to the mail header? Google Mail does not add it. Any other? Set up your own on a server not running Tor and remove the lines yourself. I have documented the process for Postfix: http://moblog.wiredwings.com/archives/20100501/Remove-IPs-from-Outgoing-Mail-Postfix-SMTP.html My outgoing mails are passed over my small exit anonymizer1.torservers.net, my home IP cleansed, to my ISPs mail server (see my mail headers). I haven't had problems with mail delivery so far. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Test Vidalia Tor Browser Bundles with libevent2
Hi Erinn, This has nothing to do with libevent2, but it would really be nice if the installer would remember the old Vidalia installation directory. Is there anything specific we should look out for? Successfully started it as a relay on Win7 x64, the log looks good so far. Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
IP WHOIS Reassignment (was: Re: cease and desist from my vps provider...)
Hi, On 04.02.2011 16:38, Jordi Espasa Clofent wrote: If you got your own IP space with own ripe contact, all the abuse mails will go to you, so it does not cause trouble to them at all. Maybe this is what is meant with you are responsible. M sorry but ¿do you know exactly what you´re talking about? To get your own IP space isn't a trivial process, nor cheap. Use the next link as a starting point to know something about: http://ripe.net/membership/new-members/index.html You shouldn't confuss the people. Get your own IP space it's only possible for enterprises and even if you´re an enterprise you need a complex network engineering behind you. You can get the PA subnet reallocated to you as a customer of a LIR without additional cost. Examples: ARIN: http://whois.arin.net/rest/net/NET-74-120-15-144-1/pft RIPE: http://www.db.ripe.net/whois?searchtext=79.140.39.227 For ARIN, you have to convince your ISP to submit a reallocation request. The process can be eased as follows: Go to arin.net, create your own POC records and ORG ID. I have attached a template I used to get an IP range reassigned to my OrgID TORSE and attach handle TAD54-ARIN for abuse and TORSE-ARIN for tech. All the ISP has to do is fill out points 20 to 23 with info about the subnet, copy and paste the text-based template into the body of an e-mail and send to hostmas...@arin.net with the subject line REASSIGN DETAILED. The original form including more comments is at https://www.arin.net/resources/templates/reassign-detailed.txt I am not sure how it works for RIPE, but as you can see from the example above, it can be done. -- Moritz Bartl http://www.torservers.net/ Template: ARIN-REASSIGN-DETAILED-4.2 ** As of October 2007 ** Detailed instructions are located below the template. 01. Downstream Org ID: TORSE ** IF DOWNSTREAM ORG ID IS PROVIDED SKIP TO LINE 20. 02. Org Name: 03. Org Address: 03. Org Address: 04. Org City: 05. Org State/Province: 06. Org Postal Code: 07. Org Country Code: 08. Org POC Handle: ** IF POC HANDLE IS PROVIDED SKIP TO LINE 20. 09. Org POC Contact Type (P or R): 10. Org POC Last Name or Role Account: 11. Org POC First Name: 12. Org POC Company Name: 13. Org POC Address: 13. Org POC Address: 14. Org POC City: 15. Org POC State/Province: 16. Org POC Postal Code: 17. Org POC Country Code: 18. Org POC Office Phone Number: 19. Org POC E-mail Address: ** NETWORK SECTION 20. IP Address and Prefix or Range: 21. Network Name: 22. Origin AS: 23. Hostname of DNS Reverse Mapping Nameserver: 23. Hostname of DNS Reverse Mapping Nameserver: ** OPTIONAL RESOURCE CONTACT SECTION 24. Net POC Type (T, AB, or N): AB 25. Net POC Handle: TAD54-ARIN 24. Net POC Type (T, AB, or N): T, N 25. Net POC Handle: TORSE-ARIN ** IF POC HANDLE IS PROVIDED SKIP TO LINE 37. 26. Net POC Contact Type (P or R): 27. Net POC Last Name or Role Account: 28. Net POC First Name: 29. Net POC Company Name: 30. Net POC Address: 30. Net POC Address: 31. Net POC City: 32. Net POC State/Province: 33. Net POC Postal Code: 34. Net POC Country Code: 35. Net POC Office Phone Number: 36. Net POC E-mail Address: ** OTHER OPTIONAL FIELDS 37. Public Comments: --- 37. Public Comments: This network is used for research in 37. Public Comments: anonymization and censorship circumvention 37. Public Comments: and provides Tor exit nodes to end users. 37. Public Comments: 37. Public Comments: http://www.torservers.net/abuse.html 37. Public Comments: Direct abuse issues to ab...@torservers.net 37. Public Comments: --- 38. Additional Information: END OF TEMPLATE
Re: IP WHOIS Reassignment
On 04.02.2011 16:55, Moritz Bartl wrote: I am not sure how it works for RIPE, but as you can see from the example above, it can be done. What you want to ask your ISP for is ASSIGNED PA space. In constrast to provider independent IP space (PI), PA space can only be used within the network of the ISP. Quote http://www.ripe.net/docs/ripe-492.html#9 ASSIGNED PA: This address space has been assigned to an End User for use with services provided by the issuing LIR. It cannot be kept when terminating services provided by the LIR. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: IP WHOIS Reassignment
On 04.02.2011 17:05, morphium wrote: You can get the PA subnet reallocated to you as a customer of a LIR without additional cost. Would that be such a reallocation: http://www.db.ripe.net/whois?searchtext=46.4.237.146 Yes. Because I'm mentioned there first for my /25, but Hetzner is mentioned aswell. That is correct. The difference between the assignment to you by Hetzner and the assignment of 79.140.39.227 to the CCC is that Hetzner attached its ORG handle to the larger netblock, which Vollmar didn't. It would be a good idea to get Hetzner to add an abuse-mailbox and a Fax number to your person object. Police investigators still prefer to use Fax. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: exit node config for egypt IP range
According to some Twitter users, only DNS is down. Third party DNS (or Tor) work. Moritz On 28.01.2011 18:09, Peter Thoenen wrote: All Egypt ISP are offline, the gov has turned the full internet OFF. This isn't true. I have access to some machines in Noor - this is an ISP currently active in Cairo. http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Why so many exit nodes in Absecon, New Jersey?
Hi, On 23.01.2011 21:30, Bobby Butter wrote: Does anyone know why there is such a concentration of nodes in this one small place? linode.com is a pretty well-known vserver provider. As long as the node does not generate too much trouble for them, they can be considered (somewhat) Tor friendly. See http://www.linode.com/forums/viewtopic.php?t=3082 -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Torservers: Update on move to UK on the association
Hi, [ Crossposted to or-talk; if you want to stay informed about torservers.net or discuss specifics, please subscribe to our list: http://www.freelists.org/list/torservers ] * SOFTLAYER/100TB: A few days ago Softlayer nullrouted ONE of our exit IPs, but the other IPs are still up. So much for the 72hr deadline issued on Dec 5th (because of one DMCA complaint). I could just move the one dead exit to one of our unused IPs, but we have used up most of our bandwidth in the current billing period anyway (85TB at the moment, one week to go), so it doesn't hurt that much and I'll let it run with three Tor processes for the next week. BW: http://us1.torservers.net/stats/graphs/graph_6_3.png Every time I ask 100tb about the new server in the UK, they tell me they will get back to me with an offer shortly. * ASSOCIATION: About the association: You know that I am working on setting up a non-profit organization. I have found an excellent privacy lawyer who helps me to set everything up, and the foundation will be based in their offices, which gives the best legal protection we can get. At the moment, I am waiting for the tax authorities to confirm the charitable status of our charter, after that we will hold a founding meeting in Dresden, probably sometime in early February. If you happen to be somewhere near and want to help us get this thing going, you're welcome to join us! I could also use a native speaker for the press release (to hopefully generate a bit of attention to the Tor project). -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Torservers: Update on move to UK on the association
Hi, For the foundation meeting, it is required that all founding members to physically meet. So will be the yearly members meeting. At the moment our goal is to gather all interested German exit operators. Everyone who cannot come to the initial discussion is well invited to *join* the association later! Also it allows those that want to sponsor nodes, but not deal with the tech side of it to contribute. That's been the idea of Torservers from the start. We concentrate on making this possible, but the association also wants to, like you said, get exit operators together. It would be awesome to have a lot of local (ie. country-wide) similar associations pop up, and loosely connect them all through Torservers. If you want to help making this possible, talk to us! You're basically free to contribute anything you'd like to see. -- Moritz Bartl http://www.torservers.net/ On 17.01.2011 23:23, Andrew Lewis wrote: I doubt that I will be able to get to dresden, but is there a chance of some sort of video conference? I like the idea of putting together so sort of official group behind the tor exit node operators. There are a ton of things that this could encompass, and we could roll up a few different efforts under one header. Also it allows those that want to sponsor nodes, but not deal with the tech side of it to contribute. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor relay on vserver exeeding numtcpsock
Hi, You should probably contact the ISP first to see if they will raise the limit. Mine was low on file descriptors and they upped it generously 5 minutes later (on a cheap $20 vserver). Moritz On 12.01.2011 22:02, coderman wrote: Error creating network socket: No buffer space available errors. The numtcpsocks parameter limit is set to 550 on the vserver. 550 is ridiculous. it should be at least 4096, more if they are accomodating. good luck! you may want to update the good / bad ISP entry with your experience. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: geeez...
Hi, On 12.01.2011 22:05, Fabian Keil wrote: Some of my equipment got seized a few months ago. Good luck on getting it back then! I'm also not sure how the police would try to seize equipment and fail (assuming the equipment is actually there). Explosives? ;-) Did you run a Tor exit at home? I'm not sure if they come and seize your home computer if the Tor server is hosted in a data center. Olaf seems not to have run into big trouble yet (or maybe he was quick on replacing the hardware). -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: geeez...
Hi, On top of this, it is *illegal* in Germany to keep user identifiable data unless required for billing purposes. Telemediengesetz §15 Nutzungsdaten http://www.gesetze-im-internet.de/tmg/__15.html Let me translate the first paragraph: §15 Usage Data (1) The service provider may collect personal data of a user and use them only to the extent necessary to enable the use and billing of telemedia. Usage data are particularly 1. Characteristics to identify the user, 2. Information on the beginning and end and the extent of current usage and 3. Details about the used telemedia services. -- Moritz Bartl http://www.torservers.net/ On 13.01.2011 00:33, Mitar wrote: Hi! But I wan't a legally binding statement from a lawyer or an official (BSI) that running TOR exit nodes in germany is legal. In Slovenia there is a law (for Internet commerce) that persons just passing data around, not changing it, choosing destination or source, filter, etc, are not responsible for the data. This even works for the servers. So if you have a server with content you are just storing for somebody else you are not responsible for that. But you have a witness status if they want to prosecute this somebody and have to cooperate. So police will come and talk to you, but not as s suspect but as a witness. Probably this is an EU law. Mitar *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: geeez...
On 13.01.2011 01:01, Mitar wrote: On top of this, it is *illegal* in Germany to keep user identifiable data unless required for billing purposes. I think it is allowed but you have to clearly inform users of this (register this data collection with data privacy agency) and reasons for it and there is then principle of proportionality and subsidiarity so that you have to prove that collecting all this data is really needed for service or something. That is already included in the first paragraph: [...] to the extent necessary to enable the use. It is not defined that a particular service may not require some personal identifiable data over the course of the whole period, but it is only allowed to do so if it is really _required_ for either usage or billing of the service. Maybe in Germany things are more strict? Most services just don't care enough, and apart from areas where you can make a shitload of money by harrassing people it is rarely prosecuted. For example, using Google Analytics was and has always been illegal in Germany, but you still can find hundreds of German sites using it. To make this clear: If you as an operator are based in Germany, you have to follow the German law, even if your server is located in other countries. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: geeez...
Hi Dirk, ok... since this mailing list is not able to give at least some tips for running a tor exit node except: What do you want to know exactly? In many countries, running an anonymizing service is definitely not illegal. Many exit operators run into trouble with their ISP, because they are too easily scared by DMCA complaints and the like. This is especially true for an exit policy that allows arbitrary ports, as your ISP will be flooded with mails from BayTSP/MediaSentry. That's why we have compiled a list of well-known ports. [1] You should find an ISP who explicitly allows you to run a Tor exit, and if you want you can start with an open exit policy. If your ISP complaints and wants to shut you down later, you can switch to the reduced exit policy. Or, you can allow exiting only to a few ports. It's your decision. Try to convince your ISP to SWIP the IP range and attach your personal abuse handle. Example: http://torstatus.blutmagie.de/cgi-bin/whois.pl?ip=79.140.39.227 Most complaints you will have to deal with can be easily solved by telling them about Tor. In extreme cases, the police might come knocking to your door or even try to seize your equipment, but I am only aware of a single case in Germany where that happened some years ago. If you need technical help setting up a node, the comments in torrc and the documentation on the website should help you. If not, join #tor on irc.oftc.net and I'm sure there will be someone to give you a hand. -- Moritz Bartl http://www.torservers.net/ [1] https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment On 12.01.2011 00:28, Dirk wrote: Do it. or We do have a lawyer (how is that supposed to help me?) I will just ask the german Bundesamt für Sicherheit in der Informationstechnik (https://www.bsi.bund.de) howto setup a TOR exit node without ruining my life... :D people here are probably too cool to give noobs instructions... Dirk *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Index of hidden services?
Hi, Am 07.01.2011 22:26, schrieb Andrew Lewman: It's possible one could create a search engine that crawls every possible .onion hostname on common tcp ports (80, 443, 8080, 8443). Over long periods of time, this may find many hidden services. I haven't given it much thought yet, but I like the idea of a central index and an option in torrc that publishes my .onion to this index (and maybe even push website changes/locally crawl the site). -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Home Internet with Anonymity Built In
On 06.01.2011 16:43, Trystero Lot wrote: The software will also be made available for people to install on routers they have bought themselves, Appelbaum says. hopefully this version will work specially with ATA specially the ones with builtin routers. https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/Torouter -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor and google groups
Hi, On 05.01.2011 20:18, Orionjur Tor-admin wrote: Is it very difficult to buy a SIM without showing ID in the USA or countries of Western Europe? Sorry for such off topic but it is very interesting to know are there any countries in Western Europe or states of the USA when it is possible to buy a SIM without showing your ID with accordance to local law? At least in Germany, you can buy SIMs not activated in a lot of shops without showing ID. It is an open secret that you can activate many of them using a(ny) correct address without further verification. Also off topic: For example, UKash vouchers are being sold across Europe and can be used to buy prepaid Mastercards online using a service called UKash Neo, using SMS as owner verification. I can confirm that the CCs work even with Paypal. In the US, a lot of shops sell prepaid CCs (gift cards). To use online, they also require some sort of address verification, which is probably hard to do in a country where there is no ID or residency register. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor and google groups
Hi, Am 05.01.2011 20:37, schrieb Matthew: Have you tried this in Spain? In Madrid the shop photocopied the back page of my passport. Germany introduced an electronic ID recently. In the revised laws they made clear that leaving the ID as deposit, or having it photocopied, is illegal. The new ID carries a personal identifier printed on it that should only be known to the bearer. [Source: http://www.heise.de/newsticker/meldung/Deine-wichtigste-Karte-Vom-Umgang-mit-dem-neuen-Personalausweis-1133588.html ] -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Tor in German media (27c3)
Hi, FYI: The German public radio network Deutschlandfunk put up an interview with Julius Mittenzwei, the Chaos Computer Club lawyer, about Tor. http://vimeo.com/18267378 (german only) -- Moritz http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: The Skype begin refusing payments making on their site through the Tor
Hi, On 04.01.2011 14:02, Praedor Atrebates wrote: Am I missing something? Anonymous credit cards? -- Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor in German media (27c3)
Hi, On 04.01.2011 17:46, Dirk wrote: So all I need is a competent lawyer to run as many exit nodes as I want in Germany? Most people run as many exit nodes as they want without even having a lawyer in the first place. It is not an illegal service at all. For the future, it might be a good idea to form a lose network of lawyers/funds that openly promise legal help to ANY Tor node operator. In Germany, both Chaos Computer Club and German Privacy Foundation promise to fight for the right of Tor node operators in case something big hits them. In the US, EFF made a similar promise. -- Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Exit node and datacenter
Hi, Contact your ISP and tell them what you want to do. Ask if it's possible to SWIP your IP range and attach your own abuse handle (email address). If your ISP is okay with it, I think it's worth trying the open exit policy first, and only limit it later in case you run into trouble with your ISP. For a suggestion on a limited policy, see [1]. -- Moritz [1] https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment Am 04.01.2011 19:12, schrieb forc...@safe-mail.net: Hello! Since about 18 months I am hosting a Tor relay middleman on a dedicated box rented at Rackforce in Canada and I would like to turn it to an exit node. Any suggestion about what to do concerning the datacenter? I would like to avoid being sent offline at the 1st complaint... Thanks! *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: BDS VPNs hosting
Hi, Am 31.12.2010 11:41, schrieb Jordi Espasa Clofent: Do you know another BSD VPS reliable provider? Networkpresence is a Torservers.net exit node sponsor in Australia and also offers BSD on their VPS plans. Australian bandwidth is very expensive though. :( http://networkpresence.com.au/ -- Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Email?
Hi, The Tor Hidden Wiki lists a few other free email services offering HTTPS at: http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email -- Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Any way to secure/anonymize ALL traffic?
Just as a reminder, the problem with Flash and Javascript is not only that they might be able to cirvumvent network settings. Both can gather local information and give it away - in that case it doesn't matter if the channel itself is anonymous. Moritz Am 22.12.2010 14:38, schrieb Praedor Atrebates: I have always been disturbed by the fact that javascript or flash can sidestep tor and give away your real IP. Is there truly no way to control one's own computer so that any and ALL traffic that goes out to the ethernet port or wlan gets directed through tor no matter what? Can any combination of software and hardware prevent software on one's own computer from acting the way someone else wants rather than as the owner wants? I would love to be able to use javascript and flash (some site require one or the other or both to be functional) and know that ANY traffic that exits my own system WILL be directed through the tor network. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Visualization: Tor nodes on Google Maps and Google Earth
Hi, I wrote a small ugly Python script to visualize Tor relays on Google Maps and Google Earth. You can see the result here: * Open KML file in Google Maps: http://maps.google.com/maps?q=http:%2F%2Fwww.torservers.net%2Fmisc%2Ftormap%2Ftormap.kml * Download tormap.kml for Google Earth http://www.torservers.net/misc/tormap/tormap.kml The KML standard is being pushed by Google and should work for OpenStreetMap, too, but I couldn't get it to load there. Feel free to modify the script to generate other outputs. The initial idea was to scale the marker size to show the relay's bandwidth, but Google Maps does not support this. The markers might give a false impression of accuracy. Most IPs can only be tracked to city level (or even region), ie. the markers are somewhat near, not necessarily at the real location of the relay. You can download the script here: http://www.torservers.net/misc/tormap/tormap.py (LGPL) This is a one-time snapshot and I will not update it regularly, unless there is public interest to do so. The bandwidth categories are based on the reported observed bandwidth at the time of creation, so the actual number of high bandwidth nodes will fluctuate every time the script is run. It would be nice to extend this script to use longer-term bandwidth calculation like TorStatus does, and to generate a map over time using all the consensus data provided at http://archive.torproject.org/. An example of what this could look like is Vis4Net's Wikileaks Mirror World Map at http://labs.vis4.net/wikileaks/mirrors/ . ( Mostly copied from my blog at http://moblog.wiredwings.com/archives/20101213/Visualization-Tor-nodes-on-Google-Maps-and-Google-Earth.html ) -- Moritz http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Dmytrij's anonymous VPS
From http://www.bitcoin.org/smf/index.php?topic=1905.0 - quote - Hello bitcoiners, I'm investigating if here is a demand for anonymous VPS (virtual private servers) service. I have multicore beast server lying around, many years experiences with linux administration and also experiences with Tor hidden services. I was thinking about anonymous VPS many years before. There were attemps to do on Tor network, but payments were always problem. There were some free hostings, but quality was always poor. I found bitcoins recently and now feel I have all pieces to do VPS hosting powerful and thanks to bitcoins - really anonymous. My idea is simple - provide no question service. I don't know my customers is and customers don't know who I am. This is huge advantage in contrast to Vekja because nobody know where the server is located and how to shut down it. I provide 1 or more CPU cores, few hundreds MB RAM and few onion addresses routed to VPS ports. Customer will send me few bitcoins every week. Simple. Only one pitfail is here. Because of strong anonymity, all inbound and outbound traffic is routed to Tor network. No direct connection to Internet. Never. It makes system management slower, but anonymity is the main concern. Users can access server using Tor network or directly from Internet using great service http://tor2web.com/ (hidden services are indexed by Google). Price. My offer is 1 core @ 3GHz and 512MB RAM, SLA 99% (minus glitches on Tor network) for 30 bitcoins per week. But I'm open to discussion here for first users. I need at least 3 users to pay housing. Please comment here or send me anonymous message to https://privacybox.de/dmytrij.msg I swear to send 20% of bitcoins to providers of torservers.net and tor2web.com. First one because they are Tor relay providers accepting bitcoins and second one cause their service is needed for my anonymous VPS. They do not accept bitcoins yet, but I expect it is temporary Smiley. Cheers, Dmytrij *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Very low performance in CriptolabTORRelays*
Hi, On 03.12.2010 13:12, Olaf Selke wrote: At least my relay holds a couple of connections to Cryptolab. We (torservers) do, too. About the same amount of connections. Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Descriptor fingerprint format
Hi, Am 29.10.2010 02:23, schrieb grarpamp: It also uses about 9 spaces x ~3300+ descriptors ~= 30,000 bytes of traffic for one client to pull the entire relay list. Multiply that by number of clients[?] x the frequency[?] ~= bandwidth wasted. Excuse my ignorance, but isn't the list transferred compressed? Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: IRQ balancing
Hi, In case you're wondering what this is about: If you see high CPU usage on one core on your high bandwidth server (200 Mbit/s, lots of connections), it is very likely that only one of your CPU is handling network interrupts. Let me add a few things I've learned from fighting with this problem: irqbalance doesn't help a thing, all it does is rotate smp_affinity, so our 100% usage moved from one core to another. I also tried different kernels and various e1000e drivers in hope to get MSI-X working, but it seems as if our hardware doesn't support it ( http://us1.torservers.net/lspci.txt ). In the end the only thing that helped was to enable Receive Packet Steering (RPS), which is in the kernel since 2.6.35, but poorly documented. I still plan to move all the Tor related posts to a separate blog on torservers, but for now you can find how to enable RPS here: http://moblog.wiredwings.com/archives/20100827/Howto-Enable-Receive-Packet-Steering-RPS-on-Linux-2.6.35.html Moritz On 19.10.2010 00:10, grarpamp wrote: Another links regarding earlier posts on this topic: http://www.ntop.org/blog/?p=1 http://www.alexonlinux.com/smp-affinity-and-proper-interrupt-handling-in-linux http://www.alexonlinux.com/why-interrupt-affinity-with-multiple-cores-is-not-such-a-good-thing *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Restricted Exit Policy Port Suggestions?
Am 11.08.2010 15:01, schrieb Harry Hoffman: There are certainly instances where takedown requests are incorrect but the frequency of them isn't high (again, my opinion). It is not so much that they are incorrect. What is incorrect is to force the takedown of Tor exit nodes because of - in comparison - little abuse. And after all the Tor relays are not the origin of the infringement and actually protected by the DMCA (512a). Still, upstream ISP don't care much and want the complaints to cease. In that sense, the takedown requests *are* incorrect. If you want to exclude p2p, then I would bet that the amount of abuse reports would plummet. You cannot exclude p2p if as with Tor exits policy is port based. Bittorrent (which is the main culprit here) uses port 80 (or 443 for SSL) for tracker connections, and random ports for actual transfer. If you cut of tracker connections (by blacklisting them), abuse stops. If you stop the actual transfers from happening, abuse stops, too. Both MediaSentry and BayTSP refer to the infringement including the port that the data was offered on. Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Legal response to real abuse
Hi, How can such an overly simplistic action satisfy the ISP? That simply moves the abuser down the block, it does not stop him. Is it OK if it is not in my back yard? For your ISP, that's probably exactly their rationale. The problem is that individual blocking doesn't help against the real issue here: This is considered the first strike of three -- the third resulting in the termination of your account. Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: A suggestion to TOR [a proxy server]
Hi, On 26.07.2010 04:39, Gregory Maxwell wrote: In my experience with windows machines in computer labs, you are able to install firefox extensions without the permissions to install programs. If people subject to policy restrictions really can't install software but can install extensions then an extension might be an excellent way of getting tor software to people... perhaps a stripped down end user proxy only distribution of Tor. The main difference here is that most programs try to install to Program Files, which requires administrative privileges for the benefit of protection against later tampering. Firefox extensions (by default) end up in the users home directory. I am not sure if it actually does, but the Tor installer should be able to install and run as user just fine, once you point it to a location where you can actually write to. Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
TorVTL: Transparent Proxying on Windows
Hi, What happened to TorVTL? Did anyone look into it recently? http://www.artifex.org/~jarusl/TorVTL/ Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: A suggestion to TOR [a proxy server]
That being said, you should look into the bridge concept. http://www.torproject.org/bridges.html.en On 25.07.2010 23:50, Gregory Maxwell wrote: On Sun, Jul 25, 2010 at 5:44 PM, Praedor Atrebates prae...@yahoo.com wrote: At work I am unable to run or use tor even from a USB key - they are prevented from working. It might be nice to have a website(s) that act as entry points to tor and that use names that do not immediately scream TOR PROXY SERVER! TOR ENTRY POINT RIGHT HERE! so that it is less likely for IT departments to be able to easily block access to such (I am also prevented from accessing any proxy servers and they often name themselves as proxies to boot so they scream their nature and make it easy to block). Is there any way to create tor entry point servers that provide the benefits of the tor network without the cost of providing the site with user ID AND endpoint site? If you do not control the computer you are using then you have already lost the privacy/censorship battle and TOR can't help you. If someone wanted to run an open proxy network which exited via tor there is no way that we could stop them... but they should NOT use the word tor to describe their service because such a service would NOT and could NOT provide the anonymity protection which tor is intended to provide. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: tor-proxy.net is official proxy site of TOR? [Sorry, i meant to say http://torproxy.net/]
Hi, On 22.07.2010 15:24, krishna e bera wrote: That new site does not respond. Also, the same design flaw applies to ANY remote web-based proxy: it is a single concentrator and can thus is a magnet to be attacked or have its incoming connections monitored. If the connections are SSL (https) it might be slightly more difficult to snoop on, but most people do not check certificates so MITM could still occur. Also see http://files.cloudprivacy.net/ssl-mitm.pdf on this issue. Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor 0.2.2.14-alpha is out
Hi, And it would be little affection to normal users. Speaking on behalf of a good, blind friend: This is not true. Unless you consider him not normal. Spontaneuous idea: I think it might be interesting to use a fingerprint similar to the one caculated by Panopticlick to limit/influence the selection of bridge addresses. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Automated threat messages force limitation of Exit Policy (Softlayer)
Hi Mike, Ok, I've updated https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment with this information. Let me know if there is anything else you think might be helpful, too. Thanks. Will do. A blog would be great. Another option besides publishing the actual complaints would be to draft template response letters for various cases and publish those. I'm sure other potential exit operators would greatly benefit from such a collection, and it would be a great thing to link to in that post. I have started to collect statistics and some of my answers on a wiki page: http://www.wiredwings.com/wiki/Torservers.net_Main_Page#Statistics So far, there's not been a single real conversation with anyone about the legal status. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Automated threat messages force limitation of Exit Policy (Softlayer)
I also allow 465 and 563. Those are used by authenticated SMTPS and NNTPS. Thanks. I have added them to the exit policy. Please get back to us in a week or so with info on your abuse complaint rate with the new policy. I'll update https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment with the policy if it does in fact drastically reduce your abuse complaint raint. It does. There are still some old complaints by MediaSentry and BayTSP being forwarded, but the timestamp clearly show dates before I changed exit policy. Other than that, I have recieved a few SpamCop reports, most of them about spam being sent through HTTP/Webmail, but two recent ones about spam being sent through ESMTP, eg: Received: from livmgfm (anonymizer2.torservers.net [173.244.197.210]) by mtaout-ma04.r1000.mx.aol.com (MUA/Third Party Client Interface) with ESMTPA id 54B3FE91 for x; Mon, 28 Jun 2010 19:36:22 -0400 (EDT) Fortunately, SpamCop uses my direct contact address now instead of going through my ISP. I will soon set up a (b)log about all incidents. I'll also talk to a lawyer (and friend of mine) if I am allowed to publish all complaints. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Fwd: Posting of links to inappropriate sites on children's website via Tor
(Forwarded with permission) Original Message Subject: Posting of links to inappropriate sites on children's website via Tor Date: Mon, 28 Jun 2010 18:44:26 -0400 From: Amos Blanton a...@scratch.mit.edu To: ab...@torservers.net Greetings, I help manage the community on the Scratch website. Scratch is a programming language for kids developed and provided for free by an educational research group at MIT. You can check it out here: http://scratch.mit.edu/ There is a teenager in New York who has decided to create new accounts to post links to trolling sites like lemmonparty.org http://lemmonparty.org etc. on the Scratch website, which allows kids to share projects and comments. It being a site for kids ages 8 and up, that's not good. :( This is the node that was most recently used: http://173.244.197.210/ I think we can find the originating IP from our records, if that would help. In the past this person created accounts to post links in our forums using free web proxies, and now they're moving on to posting them in comments via TOR. I guess we'll have to block new accounts from TOR nodes - but do you guys have any alternatives you can recommend? I understand and accept your mission to support privacy, but unfortunately I can't see any good alternatives to blocking Tor nodes right now. I have read the FAQ, but I thought I'd see if you have any other ideas. Thanks very much for your time, Amos Blanton Scratch Team -- _ Amos *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Automated threat messages force limitation of Exit Policy (Softlayer)
Hi, On 27.06.2010 04:17, Mondior Folimun wrote: I also allow 465 and 563. Those are used by authenticated SMTPS and NNTPS. There's also the chat ports: 1863 (MSN), 5190 (aim), 5050 (yahoo), 5222- 5223 (xmpp/gchat). Those haven't given me any problems either. Thanks. I have added them to the exit policy. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Automated threat messages force limitation of Exit Policy (Softlayer)
Hi, On 27.06.2010 03:00, Mike Perry wrote: Can you post a copy of your counter-notification? Did they say in specific why they believe it doesn't meet the requirements? Also, are you familiar with chillingeffects? They catalog DMCA-related correspondence and provide some legal FAQs for counter-notice procedures. Thanks. After having read more about it, I doubt that I have to file a counter notification after all. I told them so two days ago, citing the relevant sections from DMCA, and haven't heard back from them since. Midphase (100tb) finally told me they were able to SWIP my range, one day before Softlayer (their data center) told me it wasn't possible. The range is still not SWIPed though, Midphase said they would look into it again. So far, Softlayer shows no sign of understanding anything I've told them, neither about DMCA law (with the appropriate paragraphs and the EFF response cited), nor about Tor not being some file sharing utility, nor about that SWIPing would help on the abuse. Midphase on the other hand doesn't interfere, I guess they want no trouble with Softlayer but understand and respect what I'm doing. Since changing the exit policy, the only reports I've been getting were some by SpamCop, and two complaints by BayTSP/MediaSentry with old timestamps. There seems to be a (small) number of spam senders that use Tor in combination with webmail, but there isn't much I can do about that (always different destination IPs). Fortunately SpamCop was able to change their records of my IP range to my contact address so that's not a big problem. I'm not sure if I'm legally allowed to publish the complaints. I want to put them on my blog when I have some time. The exit policy helps to cool down the situation with Softlayer, and I'll try my best to make them understand what it is I'm running. When and if the IP range is SWIPed, we can think about unblocking unknown ports again. The average speed is 26 MB/s at the moment. I'm not sure what limits the speed, the server should be on a Gbit line, and our plan covers 39MB/s... -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Automated threat messages force limitation of Exit Policy (Softlayer)
Hi, Out of curiosity, what exit policy are you now using? Perhaps we want to standardize on a policy that is effective at reducing these complaints. At the moment, I allow ports 20-22,53,79-81,110,143,443,706,873,993, 995,8008,8080,. Feel free to suggest others. If you've filed the counternotice, maybe suggest your ISP just blackhole future mails from the abuse sender? For each mail passed on to me, I also answered to 100TB.com so they could close their ticket and pass that information on to Softlayer. In every mail, I told them that I am sorry for so many automated complaints coming in, that they should not turn my server off because of these 'spam' mails, and that it would be great to SWIP my IP range. No replies. As far as I know, they never got their test case. Too bad. I am willing to step in, but I am not located in the US, which seems to be a requirement. Being able to tell your ISP that the EFF will defend you in this unlikely situation might also help your position with them. I am not so sure, as they didn't react to anything I passed on to them regarding my legal status. I am now trying again to get them to SWIP an IP range for me. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Automated threat messages force limitation of Exit Policy (Softlayer)
Hi, BayTSP/MediaSentry/etc have heard all the excuses, including when they tagged my printer as serving up movies; they don't care. I fully expect they don't even read the responses, just check that a response was received. The response is probably then catalogued for some future court case. I'm not sure it was the most clever thing to do, but I wanted to have this cleared up. After sending a mail to five different BayTSP addresses, they finally came back to me, asking for my DMCA Designated Agent form filing with the US Copyright Office. They also said my counter notification doesn't meet the legal requirements... -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Automated threat messages force limitation of Exit Policy (Softlayer)
Hi, After running our 300MBit/s Tor node for less than a week, the US data center Softlayer has forced me to limit our exit policy to well-known ports after receiving 25 automated Torrent DMCA complaints this weekend and again more than 20 in the last two days. I hope that now that the policy is restricted they will allow the node to stay up. All these complaints list pretty much the same Torrents, have been issued by MediaSentry or BayTSP, and each offers to get back to them on changing email addresses and through a web form. For each single abuse case, I have tried to reach them to tell them about the node and its background, including the offer to block on IP/Port basis and the URL to EFF's legal page, but they didn't get back to me and didn't stop the spamming. I even filed a counter notification with written signature etc. It's frightening to see how easy it is to effectively shut down any server at large ISPs such as Softlayer by just repeatedly sending the same - possibly unjustified - complaints. If you know of any Tor-friendly ISPs with large bandwidth plans, please let me know. -- Moritz Bartl http://www.torservers.net/ http://anonymizer2.torservers.net/ (stats) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node hosting: torservers.net
Hi Mitar, For the original discussion (Tor Exit Node Sponsorship, looking for partners) see http://archives.seul.org/or/talk/May-2010/msg00058.html I came up with same idea some time ago: http://archives.seul.org/or/talk/Feb-2009/msg00018.html I saw your post back then and of course I want to invite you to join our efforts. We have the first server running and currently trying to tweak it to 39MB/s throughput (see stats at http://us1.torservers.net/). We hope that we can find enough constant donators to keep this going. A second node has been donated by http://networkpresence.com.au/ in Australia and I will set that one up soon. (Thanks!) Of course, it's always better to diversify, but when you look at bandwidth prices, it makes sense to unite at least some effort into one larger project. I can only encourage you to follow your idea of another larger node, and to speak to people about it! And have thought of trying to rise money by other means (like personal approach in my country, where I would distribute leaflets and similar, to get also non-technical people to understand and support it, because currently I think we have mostly technical/networking people understand the issue (because they understand how Internet works) or those people who are in censorship regimes). Exactly. I think there is a larger group outside our world who, once educated, would be willing to spend some money on it. As I wrote in my previous e-mail I have a Tor friendly ISP in Slovenia, which costs 110 EUR per month for 100 Mbit/s no other limits node, where I get 5 IPs initially but can also get more. Do you mind adding it to https://wiki.torproject.org/noreply/TheOnionRouter/GoodBadISPs (or is it actually already listed?) -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: [tor] Re: Hidden Services Hosting and DMCA
Hi, On 13.06.2010 23:43, andrew wrote: Then of course he already mentioned a couple of times that he's not in the USA, so even if you were a lawyer he shouldn't take your advice ;) Right. I read the thread too. He is not, but his service and the underlying provider are in the USA. Thank you for your feedback. Still, you're right, I should be more careful with that. I will not host hidden services until I have gathered more information about the consequences. Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Hidden Services Hosting and DMCA
Hi, We are currently having a discussion over at torservers.net on whether it is wise to offer hidden service hosting. Most people don't have a server, they use free email or pay for cheap webhosting. The barrier to create hidden services is quite high. I feel that the Tor network could definitely use an ISP who offers hidden services hosting. My idea was to use a separate, disk encrypted virtual machine for hosting hidden services, and only open it towards the Tor network. Regular, non-anonymous donators should then be able to open their files towards the Internet, too. If you use that server for other things beside Tor you will have a hard time to explain and argue when abuse requests arrive - in fact you can't. It is quite easy to differentiate between a client (tor-exit) or a server (hosted content) also for authorities. Thank you. You're right, this has to be investigated further. I don't think that hosting content - on a logically different machine - influences the forwarding argument for the Tor nodes. Also, I don't see how it is quite easy for authorities to differentiate between middle node traffic and hidden services - that's what they are there for after all. You will not be able to use the response template if you get abuse requests because it does apply for Tor only. Then it will still apply for the IP addresses of the nodes. [...] We further recommend that you not keep any potentially illegal files on the same machine you use for Tor, nor use that machine for any illegal purpose. Although no Tor relay in the US has ever been seized, nor any relay operator sued, the future possibility cannot be ruled out. If that happens, you will want your machine to be clean. [...] The Tor machine will be clean. If I rent a virtual machine, I also don't know what happens on other VMs, and this is how I interpret this. I'm not even so sure if DMCA applies for me, a German hoster offering services, even when using US servers. Internet law isn't easy. Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Hidden Services Hosting and DMCA
Hi, On 12.06.2010 13:13, Marco Bonetti wrote: On 12/giu/2010, at 12.49, Moritz Bartl t...@wiredwings.com wrote: The barrier to create hidden services is quite high. I'm not too sure about this: you can run hidden services on tor clients which do not relay any traffic for the network. Starting a service is not that difficult: an home flat Internet connection and a low power computer are ideal for a small personal hidden service. That machine should be up 24/7, and you still need to maintain (ie. update) it. -- Moritz Bartl http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Hidden Services Hosting and DMCA
Hi Scott, On 12.06.2010 21:10, Scott Bennett wrote: That machine should be up 24/7, and you still need to maintain (ie. update) it. What a strange thing to say! How can you credibly claim to know the availability requirements for other persons' hidden services? I sorry you're right. Being not a native speaker, you shouldn't take all my phrases literally. ;-) Let me rephrase that: I see a group of people who might to provide hidden services, but don't have the resources and/or expertise and/or will to do it all by themselves. Cheers, Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Hidden Services Hosting and DMCA
On 12.06.2010 22:15, Moritz Bartl wrote: I sorry you're right. LOL now that was a typo. :) *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Hidden Services Hosting and DMCA
Hi Mike, Thanks for your valuable input. What you are saying implicates that there might be forces interested in investigating what I am hosting. In a way, you need to compare it to any ISP hosting illegal content without knowledge. In the case of hidden services it might be harder to determine the ISP, in the Internet today it is trivial. Regardless of that, in the end I am just an ISP. If they put so much work in finding the source, and the source turns out to be me - as in an ISP -, what else is there to do other than contacting me? I will do everything I can to shut down illegal services, not only because I am forced to by law, but because I feel it is the right thing to do. The hosters I deal with all agreed to forward abuse to me based on DCMA (or the appropriate country specific equivalent), and I approached them with a commercial partnership background. If I were to defend the idea, I could say that if you tried to find the source of a hidden service, personal servers with worse/less regular uptime on a residential line would be much easier to track down. Of course, you can try to simply ignore these orders due to the fact that you're German and they're not likely to extradite you over them, but you'll probably lose your server, and you might have trouble entering the US at a later date then. Sad as it is, if that's what it takes, I'm up to it. My education spans carefully crafted rights, and if these rights are no longer guaranteed, I will, I want to, stand up for them. I will never *ignore* any orders, but I will carefully examine the legal basis of the inquiry. I've been maintaining a fairly high bandwidth Tor exit for years now, and I know how to deal with abuse. The worst thing that happened was a murder case investigation, but it was no problem to clear it up without any interruptions of my Tor node. I have contacted enough cooperating ISPs outside the US if that turns out to be necessary (and I hope to find more through this project). This specific server at Softlayer is paid for on a monthly basis. I will not provide decryption keys, and luckily I am not forced to do so. If I were, I would not consider doing this. I have closely looked at (somewhat) related incidents in Germany, and all charges have been dropped for lack of evidence if the respective disks were encrypted, in all cases. I feel that this discussion is on the brink of something off topic, but the implications are something that definitely need to be clarified in any case, no matter how I decide. Speaking to the list: I understand that most of you are skeptical about this venture, and you have all the right to be. You should be. But don't just give up one me, tell me about it. Especially with the current political situation, I see a market around Tor, and you should not misconceive that. Commerce is not all bad. Moritz *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node hosting: torservers.net
Hi Andrew, My advice is that if you are trying to attract non-technical people to donate money in order to create more relays, your index page needs to be far less technical. Yes, you're right. I'm not exactly the best person to do this (not a native speaker), but I've revised the index page to make it more clear (and moved the old index page to an intro page). I could use some graphics or a video, but the only non-techy video explaining onion routing I found is a clip from the US series Numb3rs and not exactly the most concise: http://www.youtube.com/watch?v=XIDxDMwwlsw :-] At the moment we're discussing possibly free hidden services/eepsite hosting on the torservers mailinglist. Also, explain how creating more tor/i2p nodes helps the normal person. Or, who it actually helps. And I suggest having two simple thermometers; total funds raised and number of nodes possible per year. A themometer definitely needs to be there. I'm thinking about a model like 1TB per Euro and a slider so users can set their own level of participation. Customizations like an own node name, contact information and DNS name cost extra. Progress is somewhat slow because I only can work on it in my spare time. Thanks for your feedback and your approval! :-) -- Moritz Bartl GPG 0xED2E9B44 http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Tor Exit Node hosting: torservers.net
Hi, I set up a preliminary homepage at http://www.torservers.net/ For the original discussion (Tor Exit Node Sponsorship, looking for partners) see http://archives.seul.org/or/talk/May-2010/msg00058.html Basically it comes down to: I want to run another high bandwidth Tor exit and I am looking for individuals or companies to help sponsor it. To keep the noise down on OR-Talk/Tor-Relays, I have also created a mailing list for hosted tor exit discussion. If you want to stay informed, feel free to subscribe at http://www.freelists.org/list/torservers I am grateful for help, suggestions and other comments. -- Moritz Bartl GPG 0xED2E9B44 http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node hosting: torservers.net
Hi, Your use of the Tor name and logo (and style) is deceptive. I take it you didn't see the favicon. Look again. Fair enough, that is a tad misleading. Yes, I have used the Tor logo in several places. For one, I am not a graphics designer. Secondly, I think my usage (it its context) is neither deceptive nor misleading. Actually, I want to provide Tor services after all. When you look around, you will see a lot of people and companies using logos of products they do not own or are associated with. For example, you will often see the Microsoft logo in places where Microsoft products are sold. Let's look at what the Tor website has to say about its logo: https://www.torproject.org/trademark-faq.html.en If you're making non-commercial use of Tor software, you may also use the Tor onion logo (as an illustration, not as a brand for your products). Please don't modify the design or colors of the logo. You can use items that look like the Tor onion logo to illustrate a point (e.g. an exploded onion with layers, for instance), so long as they're not used as logos in ways that would confuse people. I have also tried to contact the Tor developers through this mailing list about my planned usage, but I guess I should do that more explicitly, and will do that now in a mail to execdir. Sorry. It is very important to me to do this with approval of the Tor community (that's why it started here). See below on why I see my current usage as non-commercial. Of course, that hope includes the big assumption of things like, all donations being used to cover costs (no profit) I don't see commercial as bad per se. I don't see how I am competing with anyone, and if I did (if there was anyone else offering Tor services), that would be useful competition after all. Let me clear with this: I am a student, willing to put my time and effort into running Tor nodes (and more). Depending on what products I am building here - which is something that I hope to have designed in a community effort (hence the mailing list) - I might *some day* consider to make some small amount of management fee. At the moment, this is not part of the plan. , and all sponsors getting their donations back if the new relays never get off the ground. The website is not clear about this yet, but I want to distinguish between node sponsorship and donations. Node sponsorship is a product you can buy, like you can buy managed and unmanaged servers. These are recurring payments with a contract, towards one or more specific services. I will not collect sponsorship money until we - everyone who is interested in funding a node in some way or another - have decided on a specific configuration, setup and server, which will then be ordered. Donations on the other hand are irregular, nonrecurring payments. At the moment I agree that this looks like a primary service on torservers.net, but I really see it as something very optional - I just haven't worked on the other parts of the Plans page yet. I will add a section that one could also want to donate to the Tor project instead to fund development. Donations will be collected, amounts published, and once some node can be funded from them, used. One pragmatic approach to this would be to bill the regular node sponsors less in one month to make up for these irregular donations. I already have several people interested in funding a node, and even if I cannot find enough to fund a big node, there's always a small one we can add. I haven't seen anything come out of his own mailing list yet, but you can be sure I'll be watching it closely. Thanks for your interest. :-) If you want to find out more about me, feel free to visit my blog at www.wiredwings.com . -- Moritz Bartl GPG 0xED2E9B44 http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node hosting: torservers.net
Hi Mike, Thank you for your input. I agree with all you say, and to some degree it shows that it is yet unclear (from the site) what exactly I want to offer. I now think it might have been better to not make it public before getting that message transported, but I haven't published it anywhere outside of the Tor community lists yet. I want to have clear statements about WHAT you get for funding a node, and what monthly amount is left to cover before (!) a new node will be set up. Nobody will be billed before that node is ordered. Irregular donations really are something extra. At the moment, they come across to prominent because there are no product plans yet. I am all open for suggestions, I will outline my ideas in a wiki-like, open discussion, together with early adopters on the mailing list, until there are specific products to offer. That's why I called the section Plans after all. What I really need to attract is people who decide that they want to *own* (parts of) a Tor node, and are willing to pay a monthly fee for it. -- Moritz Bartl GPG 0xED2E9B44 http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node hosting: torservers.net
Hi Mike, If you're making non-commercial use of Tor software, you may also use the Tor onion logo (as an illustration, not as a brand for your products). One of the sticky issues with trademark protection though is that if you do not defend your mark in all applicable cases, you lose the right to defend it in cases you actually do care about. So please do not take any decisions about your use personally. I understand that. I have removed the favicon for now until this is cleared. -- Moritz Bartl GPG 0xED2E9B44 http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node hosting: torservers.net
Hi Scott, Mike and Moritz, Would you both *please* stop posting each message to multiple lists? Thanks much. I have only posted the initial annoucement to both lists. -- Moritz Bartl GPG 0xED2E9B44 http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.
On 20.05.2010 06:25, Roger Dingledine wrote: The trouble here is that if we make family declarations one-sided, then I can tell everybody that I'm in blutmagie's family (and X's family and Y's family and Z's family and ...), and suddenly I'm influencing the path selection of other clients in a way I shouldn't be able to. Maybe it is a misunderstanding on my side, but I agree with Scott. How could this influence the network in a way that one can speak of an attack? My idea was that by stating a family, I say that *my node* musn't be used in a circuit together with other members of that family, no more, no less. So, by misconfiguring the family on my side, I cannot hurt the network more than (in the extreme) by running no node at all. -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Family specifications (was: Re: perfect-privacy.com, Family specifications, etc)
On 20.05.2010 13:28, Oguz wrote: I too do not understand this. Already an evil entry node can list all nodes that it does _not_ control in its family option to try to force circuit through the nodes it controls, though it would obviously be a dead give away listing many unrelated nodes as within the family. Is there a check when a node declares itself to be in a family the descriptor of the other family members are checked to confirm? From what I understand, yes, at the moment both partners have to list each other. That's what the fuss is all about, because this becomes hard to manage when you run a lot of nodes. -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node Sponsorship - looking for partners
On 12.05.2010 18:56, Anders Andersson wrote: A thought: Currently there is a Donate! section on torproject.org, that doesn't mention what the money is used for or how much money that comes in. By the way, Paypal is the most widely used paypent processor, but also the most expensive. Especially for (smaller) donations, Moneybookers and Liberty Reserve are much cheaper (Paypal: 1.9%+0.35€, Moneybookers: 1% with a maximum of 0.50€). -- Moritz Bartl GPG 0xED2E9B44 http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node Sponsorship - looking for partners
By the way, Paypal is the most widely used paypent processor Well, in the open social networking space, sure. There's all sorts of traditional commercial processors such as: https://www.authorize.net/solutions/merchantsolutions/pricing/ Yes, I was implicitly talking about projects that live from donations. -- Moritz Bartl GPG 0xED2E9B44 http://www.torservers.net/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Reducing relays = reducing anonymity ? Tortunnel.
To be more specific about what I mean by equal resources: suppose that users of system X have 5 relays, and tor has 5 relays, and both sets of users used the same bandwidth. If all users used one 10 relay system instead, the total bandwidth should be similar. Tortunnel is not a separate network, but (ab)uses existing Tor exits. My guess would be that tortunnel users - client only - don't think a lot about adding exit relays to Tor. It's not developed any longer, and I don't think many are using it anyway. I agree with Stephen that it's not per se a threat to the Tor network. I can't help but think that there are indeed other use cases that would greatly benefit from a independent simpler transport-type lower-layer that tor could ride on. Have you looked at I2P? http://www.i2p2.de/techintro.html It for example allows both users and services to specify their hop length, and uses packet switching instead of circuit switching. -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Reducing relays = reducing anonymity ? Tortunnel.
On 19.05.2010 23:58, grarpamp wrote: Have you looked at I2P? http://www.i2p2.de/techintro.html It for example allows both users and services to specify their hop length, and uses packet switching instead of circuit switching. Phantom does this too... user specified hop counts based on their needs for speed vs. security. A nice design feature. Is there any working implementation of Phantom? I2P is widely in use, and I must say that I really begin to like it. Code also looks much cleaner to me (not: mature). Tor could use a complete rewrite. -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node Sponsorship - looking for partners
On 14.05.2010 06:56, and...@torproject.org wrote: Can we split entrepreneurial from bad? I don't see the two as one concept. If someone figures out a way to increase fast exit relays and preserve user privacy/anonymity and make money, more power to them. We as the non-profit aren't going to stand in their way. I'm glossing over lots issues, but in general, trying and failing until you succeed is a fine plan as any. Can I use the Tor logo in combination with my hosted Tor sponsorship offer? I'd like to use it as part of a logo, somewhat modified and with the clear statement that I am not associated to the Tor project and that the logo is copyrighted by the project. -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.
number of tor relays listed in the tor directory. Most of them are grouped into one Family or another, but they properly should *all* be in the *same* Family. Under the current configuration, it is quite possible for a client to choose a route for a new circuit in which every hop would use one of your relays, each chosen from a separate Family. It seems to me that you should change all of your relays' torrc files to specify all of them in a single Family. I intend to post a warning notice about what you've done quite soon on the or-talk mailing list, but I am sending you this note first to give you a chance to explain/justify your setup before I involve the rest of the community in the matter. Scott Bennett, Comm. ASMELG, CFIAG -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node Sponsorship - looking for partners
On 13.05.2010 03:27, and...@torproject.org wrote: My USD $0.02. Monthly or yearly? ;-) -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: GeoIP database comparison
On 13.05.2010 04:19, grarpamp wrote: Wasn't there a user driven opensource geoip database project somewhere? Sortof like DynDNS, users go to the website, it pops up their ip address, they enter their location in the DB. Thought it had some advanced stuff too, network admins could enter CIDR blocks, contact info and such. http://hostip.info/ -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node Sponsorship - looking for partners
Hi, I was asked by mail if I was interested in $5 a month. To make that one clear: Yes, I am! I want to fund a node. Depending on the number of people, amounts of money, wishes for services, I will try to find the best suitable hoster. The three posted were just examples of what I have in mind. Just contact me, I'll add you to the list, and keep you posted. When speaking in terms of bandwidth, e.g. 150Mbps, then I'd rather spread it across n machines with 150Mbps/n each. I understand that it is far from ideal. Still, one has to be practical. Currently, one machine is responsible for 25% of exit traffic. Of course, a large number of smaller nodes with good (unrestricted) exit policy would be best, but why don't we have them already then ..? Apart from Mike Perrys arguments, I'd like you to see me as an ISP, offering independent VPS for Tor hosting, with an additional Tor friendly abuse handling. All I can do is promise (and put it in the contract) that I will not monitor the traffic. Then you're better off than with most ISPs out there that shut you down for running Tor or even demand 200 Euro for forwarding one abuse message. If I was the first ISP to offer small VPS, preconfigured Tor exit nodes with root access for customization, then it's a small step towards saying that at the same time, I can put all efforts into one bigger node instead. I mean, what is better, one ISP that explicitly allows Tor, handles abuse, and encrypts the drives, or an ISP that shuts down your virtual server the first time it gets a complaint and maybe monitors your traffic? Strato, the second largest hoster in Europe, once called the police on one of their dedicated servers, because they suspected criminal behavior, by watching the traffic - on their own initiative. I can never make sure that the traffic isn't logged upstream. Also, most ISPs offering VPS are not very explicit about the configuration of their virtual machines, you have to try and see if Tor works first. I will make sure that it does. If you look at bandwidth and hardware prices, once you rent servers, additional bandwidth is cheap. Example: At FDCServers, you get a dedicated machine with 10mbit/s for $50, 100mbit/s (and better hardware) for $160, and 1000mbit/s for $500. I don't aim for the Gigabit, but 10mbit/s is just not economically worthwhile. Kickstarter has three disadvantages: [...] Indeed. I am neither US citizen, nor do I plan to (only) accept Amazon Payments. I see PayPal as one alternative, yes, but in the end it depends on where the people who would like to fund a node live. I am German, EU payments can be made without any fees to my bank account. For organizing payments, I am currently looking into billing software, but haven't been able to find something that suits my needs. I don't have a problem organizing monthly mass email for 20 people (please, pay your fee, by your payment processor of choice among the following...). I would also like theoretically to accept anonymous donations for a node (not for the VPN/webspace stuff of course), but the problem there is not so much accepting it (PSC, Ukash, Liberty Reserve etc), but making sure that the money comes in regularly to fund the node. Before working on the details, I want to make sure there is actual interest in such a node. You have to open to a world of people who see the good in Tor, but either don't have the time or the knowledge to run an own exit. -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Tor Exit Node Sponsorship - looking for partners
A thought: Currently there is a Donate! section on torproject.org, that doesn't mention what the money is used for or how much money that comes in. If you look closely, at the bottom of the page a pie says what the money is used for. Basically, torproject donations are used for development. It might not even be too good to have the same people run nodes. I think it's important that development gets funded. The German Chaos Computer Club and the German Privacy foundation, to name only two, also accept donations towards running Tor nodes. I have something different in mind than just accepting donations for nodes. The node website could list its owners, with a small bio and why they are doing it. And like I said you can use parts of the machine for different purposes (VPN, Webserver, ...). Martin Fick: Also, making donations possible from so sort of anonymous money system to directly support bandwidth might be an idea. I first planned to offer a certain bandwidth push for one-time donations, eg. 1Mbit/s for one month for 2 Euro. The system could be automated to automatically update the Tor node configuration. Still, this doesn't solve the problem that there is no hoster that supports to buy small amounts of bandwidth for just one month. The only thing that comes pretty close are cloud hosters like Amazon, but the bandwidth and constant workload isn't very cheap. What I can offer of course is to collect donations, until they can be turned into a useful node. For example, anonymous/non-recurring donations could be distributed evenly amongst the recurring payers (node sponsors). For torproject.org , I suggest to accept UKash, PaysafeCard, Liberty Reserve and maybe another credit card processor (Paypal doesn't allow prepaid and virtual CCs) in addition to privacy-unfriendly Paypal. -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Tor Exit Node Sponsorship - looking for partners
Hi, At the moment, 25% of all traffic exits through Blutmagie (thanks Olaf!). I guess we all agree that this situation is far from optimal. Judging from the number of requests in the last months where people were looking for friendly ISPs, help with setting up, running and managing Tor nodes, and especially abuse handling advice, I think there is enough interest to fund another big node. I've been in contact with several ISPs lately, asking specifically for high bandwidth Tor exit node hosting. I have also added their responses to the GoodBadISPs wiki. What I am planning is either a large node (split like Blutmagie), if I can find enough people to sponsor it, and/or smaller nodes on virtual machines, eg. for hidden services hosting. I will personally order the machine, manage it, keep Tor(s) running with mostly unrestricted exit policies and handle all abuse. The companies selected will not shut down the serve but pass all abuse to me, WHOIS notices will be adjusted when possible (unfortunately, only a few of them offered that), RDNS and notice pages will be set up accordingly. I know that this is a controversial topic, and that it would be better to have completely independent nodes, but I hope that I can earn your trust. I will happily sign an agreement that I will not log/sniff traffic. :-) The configuration will be published among sponsors. I am open to suggestions here: You as a sponsor might also be interested in an additional private VPN service, or use the large drive space as backup purposes, I2P etc. You can of course also be mentioned on the notice page as sponsor, complete with your company logo. If you're interested, feel free to contact me directly. Tell me what you'd want to give, and what you'd expect for your money. At the moment, I am thinking about something like these (monthly): $200 100TB - http://www.100tb.com/ $160 100Mbit/s - http://fdcservers.net/ 50€ 10Mbit/s - http://www.netrouting.nl/ All depending on how many people are willing to participate. -- Moritz Bartl GPG 0xED2E9B44 http://moblog.wiredwings.com/ *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/