Current state of affairs regarding Torservers.net

2011-02-10 Thread Moritz Bartl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi all, Hi Joseph,

On 09.02.2011 01:03, Joseph Lorenzo Hall wrote:
 At what point can torservers be confident it can support $800/month?

It's a very tough decision to make. Our current funds ($2400) mean we
would survive 3 months. Three months of beating the drum, incorporation,
proper announcement and press release, finally translating the website,
plus some nice ticking clocks and bars on the website and Kickstarter
fundraising.

State of affairs:

100tb doesn't respond
2host doesn't respond
evoboxes isn't quite sure yet; cannot SWIP yet
Most don't like us
Other are too expensive: Professional offers start at ~500 Euro per 200
Mbps at the cheapest (with 100 of that already donated)

FDC has a new datacenter in CZ, $300 for unmetered Gbit; not sure they
would accept us, waiting on a reply. Mike Perry left and told me to
better stay away, but he was at a US datacenter.
http://www.webhostingtalk.com/showthread.php?t=1017226

And we don't even know if we can push the server to Gbit anyway. There
seem to be some bottlenecks still hidden inside the code. Amunet is at
not more than 800 Mbps most of the time.

We can:

* go with Swiftway in a strategic moment and hope for the best (in terms
of bandwidth and publicity)
* run the first Icelandic exit for 12€/Mbps
* go with a reliable 200 mbps in Germany for ~500 Euro/mnth
* try FDC
* look/wait for better offers

I think we should make a decision before, or, at the latest, at the
foundation meeting. I haven't heard back from the tax authorities yet, I
expect it to take no longer than one more week. I'm leaving Dresden for
two weeks on 22nd, so Feb 19th would be the last possible ad hoc
founding date or we'll have to postpone until mid March.

If you want to discuss any of this, join us at irc.oftc.net #torservers,
or contact me personally on XMPP mor...@torservers.net.

- -- 
Moritz Bartl
http://www.torservers.net/
-BEGIN PGP SIGNATURE-

iQEcBAEBAgAGBQJNVJJVAAoJEOGPxWJITcUAcvkIALa0NvvPqU9C5hA5OcemYTAk
EjREQsuE6L8TpVTN0sp4pTCxk3QJ3RQ0Ygxlz2GKLXWuopOKu8D8mE6yb0IE4WHs
15aPZF1dttyiWEK3FEQb1BAZP2EFdeOin1xHtWmsNJrVUB3C6vim2XjtKLfjhZ75
XBFcfWoCgJ61ck2jWMHpr7LgLZQN7gWvf46HMY7Rxn/wlwJTXTedJ+DcPR4BIJkB
25W7TKm9qvTEl1C0eiYDwboNdzbES77Kzmrgyljk80vZvu/rV5jdQW3K8hasnh3f
RIEoD3EJtHrPSi6KZ9H0vj1ysa8UJKg1v6W7FYtc7qel0JT5zojImTsOBk0Gobo=
=feyN
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: I wish to see one video on you tube - question about flash.

2011-02-09 Thread Moritz Bartl
Hi,

On 09.02.2011 09:13, Matthew wrote:
 I know that the Metasploit people have a script which checks the IP via
 Flash.  But how common would it be for a commercial provider to do
 this?  Would there be a way of finding out if YouTube of whatever are
 employing this technique?

In this particular case, does it matter?

 However, can one actually view videos via Tor.  Surely they demand
 too great a level of bandwith?

There are several techniques to download videos from Youtube, so
bandwidth doesn't matter that much if you can just wait.

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Sent e-mails going into spam folders.

2011-02-09 Thread Moritz Bartl
On 09.02.2011 10:18, Karsten N. wrote:
 May be, some mail providers does not add the sender IP address to the
 mail header? Google Mail does not add it. Any other?

Set up your own on a server not running Tor and remove the lines
yourself. I have documented the process for Postfix:
http://moblog.wiredwings.com/archives/20100501/Remove-IPs-from-Outgoing-Mail-Postfix-SMTP.html

My outgoing mails are passed over my small exit
anonymizer1.torservers.net, my home IP cleansed, to my ISPs mail server
(see my mail headers). I haven't had problems with mail delivery so far.

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Test Vidalia Tor Browser Bundles with libevent2

2011-02-06 Thread Moritz Bartl
Hi Erinn,

This has nothing to do with libevent2, but it would really be nice if
the installer would remember the old Vidalia installation directory.

Is there anything specific we should look out for? Successfully started
it as a relay on Win7 x64, the log looks good so far.

Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


IP WHOIS Reassignment (was: Re: cease and desist from my vps provider...)

2011-02-04 Thread Moritz Bartl
Hi,

On 04.02.2011 16:38, Jordi Espasa Clofent wrote:
 If you got your own IP space with own ripe contact, all the abuse mails
 will go to you, so it does not cause trouble to them at all. Maybe this
 is what is meant with you are responsible.
 M sorry but ¿do you know exactly what you´re talking about?
 To get your own IP space isn't a trivial process, nor cheap. Use the
 next link as a starting point to know something about:
 http://ripe.net/membership/new-members/index.html
 You shouldn't confuss the people. Get your own IP space it's only
 possible for enterprises and even if you´re an enterprise you need a
 complex network engineering behind you.

You can get the PA subnet reallocated to you as a customer of a LIR
without additional cost.

Examples:
ARIN: http://whois.arin.net/rest/net/NET-74-120-15-144-1/pft
RIPE: http://www.db.ripe.net/whois?searchtext=79.140.39.227

For ARIN, you have to convince your ISP to submit a reallocation
request. The process can be eased as follows: Go to arin.net, create
your own POC records and ORG ID. I have attached a template I used to
get an IP range reassigned to my OrgID TORSE and attach handle
TAD54-ARIN for abuse and TORSE-ARIN for tech.

All the ISP has to do is fill out points 20 to 23 with info about the
subnet, copy and paste the text-based template into the body of an
e-mail and send to hostmas...@arin.net with the subject line REASSIGN
DETAILED.
The original form including more comments is at
https://www.arin.net/resources/templates/reassign-detailed.txt

I am not sure how it works for RIPE, but as you can see from the example
above, it can be done.

-- 
Moritz Bartl
http://www.torservers.net/
Template: ARIN-REASSIGN-DETAILED-4.2
**  As of October 2007
**  Detailed instructions are located below the template.

01. Downstream Org ID: TORSE
** IF DOWNSTREAM ORG ID IS PROVIDED SKIP TO LINE 20.

02. Org Name:
03. Org Address:
03. Org Address:
04. Org City:
05. Org State/Province:
06. Org Postal Code:
07. Org Country Code:
08. Org POC Handle:
** IF POC HANDLE IS PROVIDED SKIP TO LINE 20.

09. Org POC Contact Type (P or R): 
10. Org POC Last Name or Role Account:
11. Org POC First Name:
12. Org POC Company Name:
13. Org POC Address:
13. Org POC Address:
14. Org POC City:
15. Org POC State/Province:
16. Org POC Postal Code:
17. Org POC Country Code:
18. Org POC Office Phone Number:
19. Org POC E-mail Address:

** NETWORK SECTION
20. IP Address and Prefix or Range: 
21. Network Name:
22. Origin AS:
23. Hostname of DNS Reverse Mapping Nameserver:
23. Hostname of DNS Reverse Mapping Nameserver:

** OPTIONAL RESOURCE CONTACT SECTION
24. Net POC Type (T, AB, or N): AB

25. Net POC Handle: TAD54-ARIN

24. Net POC Type (T, AB, or N): T, N

25. Net POC Handle: TORSE-ARIN

** IF POC HANDLE IS PROVIDED SKIP TO LINE 37.

26. Net POC Contact Type (P or R):
27. Net POC Last Name or Role Account:
28. Net POC First Name:
29. Net POC Company Name:
30. Net POC Address:
30. Net POC Address:
31. Net POC City:
32. Net POC State/Province:
33. Net POC Postal Code:
34. Net POC Country Code:
35. Net POC Office Phone Number:
36. Net POC E-mail Address:

** OTHER OPTIONAL FIELDS
37. Public Comments: ---
37. Public Comments: This network is used for research in
37. Public Comments: anonymization and censorship circumvention
37. Public Comments: and provides Tor exit nodes to end users.
37. Public Comments: 
37. Public Comments: http://www.torservers.net/abuse.html
37. Public Comments: Direct abuse issues to ab...@torservers.net
37. Public Comments: ---
38. Additional Information:

END OF TEMPLATE



Re: IP WHOIS Reassignment

2011-02-04 Thread Moritz Bartl
On 04.02.2011 16:55, Moritz Bartl wrote:
 I am not sure how it works for RIPE, but as you can see from the example
 above, it can be done.

What you want to ask your ISP for is ASSIGNED PA space. In constrast
to provider independent IP space (PI), PA space can only be used within
the network of the ISP.

Quote http://www.ripe.net/docs/ripe-492.html#9
ASSIGNED PA: This address space has been assigned to an End User for
use with services provided by the issuing LIR. It cannot be kept when
terminating services provided by the LIR. 

-- 
Moritz Bartl
http://www.torservers.net/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: IP WHOIS Reassignment

2011-02-04 Thread Moritz Bartl
On 04.02.2011 17:05, morphium wrote:
 You can get the PA subnet reallocated to you as a customer of a LIR
 without additional cost.
 Would that be such a reallocation:
 http://www.db.ripe.net/whois?searchtext=46.4.237.146

Yes.

 Because I'm mentioned there first for my /25, but Hetzner is mentioned aswell.

That is correct. The difference between the assignment to you by Hetzner
and the assignment of 79.140.39.227 to the CCC is that Hetzner attached
its ORG handle to the larger netblock, which Vollmar didn't.

It would be a good idea to get Hetzner to add an abuse-mailbox and a Fax
number to your person object. Police investigators still prefer to use Fax.
-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: exit node config for egypt IP range

2011-01-28 Thread Moritz Bartl
According to some Twitter users, only DNS is down. Third party DNS (or
Tor) work.

Moritz

On 28.01.2011 18:09, Peter Thoenen wrote:
 All Egypt ISP are offline, the gov has turned the full
 internet OFF.

 This isn't true. I have access to some machines in Noor -
 this is an ISP
 currently active in Cairo.
 
 http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Why so many exit nodes in Absecon, New Jersey?

2011-01-23 Thread Moritz Bartl
Hi,

On 23.01.2011 21:30, Bobby Butter wrote:
 Does anyone know why there is such a concentration of nodes in this one
 small place?  

linode.com is a pretty well-known vserver provider. As long as the node
does not generate too much trouble for them, they can be considered
(somewhat) Tor friendly.

See http://www.linode.com/forums/viewtopic.php?t=3082

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Torservers: Update on move to UK on the association

2011-01-17 Thread Moritz Bartl
Hi,

[ Crossposted to or-talk; if you want to stay informed about
torservers.net or discuss specifics, please subscribe to our list:
http://www.freelists.org/list/torservers ]

* SOFTLAYER/100TB:
A few days ago Softlayer nullrouted ONE of our exit IPs, but the other
IPs are still up. So much for the 72hr deadline issued on Dec 5th
(because of one DMCA complaint).

I could just move the one dead exit to one of our unused IPs, but we
have used up most of our bandwidth in the current billing period anyway
(85TB at the moment, one week to go), so it doesn't hurt that much and
I'll let it run with three Tor processes for the next week.
BW: http://us1.torservers.net/stats/graphs/graph_6_3.png

Every time I ask 100tb about the new server in the UK, they tell me they
will get back to me with an offer shortly.

* ASSOCIATION:
About the association: You know that I am working on setting up a
non-profit organization. I have found an excellent privacy lawyer who
helps me to set everything up, and the foundation will be based in their
offices, which gives the best legal protection we can get. At the
moment, I am waiting for the tax authorities to confirm the charitable
status of our charter, after that we will hold a founding meeting in
Dresden, probably sometime in early February.

If you happen to be somewhere near and want to help us get this thing
going, you're welcome to join us! I could also use a native speaker for
the press release (to hopefully generate a bit of attention to the Tor
project).

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Torservers: Update on move to UK on the association

2011-01-17 Thread Moritz Bartl
Hi,

For the foundation meeting, it is required that all founding members to
physically meet. So will be the yearly members meeting. At the moment
our goal is to gather all interested German exit operators. Everyone who
cannot come to the initial discussion is well invited to *join* the
association later!

Also it allows those that want to sponsor nodes, but not deal with the
tech side of it to contribute.

That's been the idea of Torservers from the start. We concentrate on
making this possible, but the association also wants to, like you said,
get exit operators together.

It would be awesome to have a lot of local (ie. country-wide) similar
associations pop up, and loosely connect them all through Torservers.

If you want to help making this possible, talk to us! You're basically
free to contribute anything you'd like to see.

-- 
Moritz Bartl
http://www.torservers.net/

On 17.01.2011 23:23, Andrew Lewis wrote:
 I doubt that I will be able to get to dresden, but is there a chance of
 some sort of video conference? I like the idea of putting together so
 sort of official group behind the tor exit node operators. There are a
 ton of things that this could encompass, and we could roll up a
 few different efforts under one header. Also it allows those that want
 to sponsor nodes, but not deal with the tech side of it to contribute.  
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor relay on vserver exeeding numtcpsock

2011-01-12 Thread Moritz Bartl
Hi,

You should probably contact the ISP first to see if they will raise the
limit. Mine was low on file descriptors and they upped it generously 5
minutes later (on a cheap $20 vserver).

Moritz

On 12.01.2011 22:02, coderman wrote:
 Error creating network socket: No buffer space available
 errors. The numtcpsocks parameter limit is set to 550 on the vserver. 
 550 is ridiculous. it should be at least 4096, more if they are accomodating.
 good luck!  you may want to update the good / bad ISP entry with your
 experience.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: geeez...

2011-01-12 Thread Moritz Bartl
Hi,

On 12.01.2011 22:05, Fabian Keil wrote:
 Some of my equipment got seized a few months ago.

Good luck on getting it back then!

 I'm also not sure how the police would try to seize equipment
 and fail (assuming the equipment is actually there). 

Explosives? ;-)
Did you run a Tor exit at home? I'm not sure if they come and seize your
home computer if the Tor server is hosted in a data center. Olaf seems
not to have run into big trouble yet (or maybe he was quick on replacing
the hardware).

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: geeez...

2011-01-12 Thread Moritz Bartl
Hi,

On top of this, it is *illegal* in Germany to keep user identifiable
data unless required for billing purposes.

Telemediengesetz §15 Nutzungsdaten
http://www.gesetze-im-internet.de/tmg/__15.html

Let me translate the first paragraph:

§15 Usage Data
(1) The service provider may collect personal data of a user and use
them only to the extent necessary to enable the use and billing of
telemedia. Usage data are particularly
1. Characteristics to identify the user,
2. Information on the beginning and end and the extent of current usage and
3. Details about the used telemedia services.

-- 
Moritz Bartl
http://www.torservers.net/

On 13.01.2011 00:33, Mitar wrote:
 Hi!
 
 But I wan't a legally binding statement from a lawyer or an official (BSI) 
 that running TOR exit nodes
 in germany is legal.
 
 In Slovenia there is a law (for Internet commerce) that persons just
 passing data around, not changing it, choosing destination or source,
 filter, etc, are not responsible for the data. This even works for the
 servers. So if you have a server with content you are just storing for
 somebody else you are not responsible for that. But you have a witness
 status if they want to prosecute this somebody and have to cooperate.
 So police will come and talk to you, but not as s suspect but as a
 witness.
 
 Probably this is an EU law.
 
 
 Mitar
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: geeez...

2011-01-12 Thread Moritz Bartl
On 13.01.2011 01:01, Mitar wrote:
 On top of this, it is *illegal* in Germany to keep user identifiable
 data unless required for billing purposes.
 I think it is allowed but you have to clearly inform users of this
 (register this data collection with data privacy agency) and reasons
 for it and there is then principle of proportionality and subsidiarity
 so that you have to prove that collecting all this data is really
 needed for service or something. 

That is already included in the first paragraph: [...] to the extent
necessary to enable the use. It is not defined that a particular
service may not require some personal identifiable data over the course
of the whole period, but it is only allowed to do so if it is really
_required_ for either usage or billing of the service.

 Maybe in Germany things are more strict?

Most services just don't care enough, and apart from areas where you can
make a shitload of money by harrassing people it is rarely prosecuted.
For example, using Google Analytics was and has always been illegal in
Germany, but you still can find hundreds of German sites using it.

To make this clear: If you as an operator are based in Germany, you have
to follow the German law, even if your server is located in other countries.
-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: geeez...

2011-01-11 Thread Moritz Bartl
Hi Dirk,

 ok... since this mailing list is not able to give at least some tips
 for running a tor exit node except:

What do you want to know exactly? In many countries, running an
anonymizing service is definitely not illegal. Many exit operators run
into trouble with their ISP, because they are too easily scared by DMCA
complaints and the like. This is especially true for an exit policy that
allows arbitrary ports, as your ISP will be flooded with mails from
BayTSP/MediaSentry. That's why we have compiled a list of well-known
ports. [1]

You should find an ISP who explicitly allows you to run a Tor exit, and
if you want you can start with an open exit policy. If your ISP
complaints and wants to shut you down later, you can switch to the
reduced exit policy. Or, you can allow exiting only to a few ports. It's
your decision.
Try to convince your ISP to SWIP the IP range and attach your personal
abuse handle. Example:
http://torstatus.blutmagie.de/cgi-bin/whois.pl?ip=79.140.39.227

Most complaints you will have to deal with can be easily solved by
telling them about Tor. In extreme cases, the police might come knocking
to your door or even try to seize your equipment, but I am only aware of
a single case in Germany where that happened some years ago.

If you need technical help setting up a node, the comments in torrc and
the documentation on the website should help you. If not, join #tor on
irc.oftc.net and I'm sure there will be someone to give you a hand.

-- 
Moritz Bartl
http://www.torservers.net/

[1]
https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment

On 12.01.2011 00:28, Dirk wrote:
 
 Do it. or We do have a lawyer (how is that supposed to help me?)
 
 I will just ask the german Bundesamt für Sicherheit in der 
 Informationstechnik (https://www.bsi.bund.de) howto setup a TOR
 exit node without ruining my life... :D
 
 people here are probably too cool to give noobs instructions...
 
 
 Dirk
 
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Index of hidden services?

2011-01-07 Thread Moritz Bartl
Hi,

Am 07.01.2011 22:26, schrieb Andrew Lewman:
 It's possible one could create a search engine that
 crawls every possible .onion hostname on common tcp ports (80, 443,
 8080, 8443).  Over long periods of time, this may find many hidden
 services.

I haven't given it much thought yet, but I like the idea of a central
index and an option in torrc that publishes my .onion to this index (and
maybe even push website changes/locally crawl the site).

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Home Internet with Anonymity Built In

2011-01-06 Thread Moritz Bartl
On 06.01.2011 16:43, Trystero Lot wrote:
 The software will also be made
 available for people to install on routers they have bought themselves,
 Appelbaum says.
 
 hopefully this version will work specially with ATA specially the ones
 with builtin routers.

https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/Torouter

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor and google groups

2011-01-05 Thread Moritz Bartl
Hi,

On 05.01.2011 20:18, Orionjur Tor-admin wrote:
 Is it very difficult to buy a SIM without showing ID in the USA or
 countries of Western Europe? Sorry for such off topic but it is very
 interesting to know are there any countries in Western Europe or states
 of the USA when it is possible to buy a SIM without showing your ID with
 accordance to local law?

At least in Germany, you can buy SIMs not activated in a lot of shops
without showing ID. It is an open secret that you can activate many of
them using a(ny) correct address without further verification.

Also off topic: For example, UKash vouchers are being sold across Europe
and can be used to buy prepaid Mastercards online using a service called
UKash Neo, using SMS as owner verification. I can confirm that the CCs
work even with Paypal.
In the US, a lot of shops sell prepaid CCs (gift cards). To use
online, they also require some sort of address verification, which is
probably hard to do in a country where there is no ID or residency register.
-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor and google groups

2011-01-05 Thread Moritz Bartl
Hi,

Am 05.01.2011 20:37, schrieb Matthew:
 Have you tried this in Spain?  In Madrid the shop photocopied the back
 page of my passport. 

Germany introduced an electronic ID recently. In the revised laws they
made clear that leaving the ID as deposit, or having it photocopied, is
illegal. The new ID carries a personal identifier printed on it that
should only be known to the bearer.

[Source:
http://www.heise.de/newsticker/meldung/Deine-wichtigste-Karte-Vom-Umgang-mit-dem-neuen-Personalausweis-1133588.html
]
-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Tor in German media (27c3)

2011-01-04 Thread Moritz Bartl

Hi,

FYI: The German public radio network Deutschlandfunk put up an interview 
with Julius Mittenzwei, the Chaos Computer Club lawyer, about Tor.


http://vimeo.com/18267378 (german only)

--
Moritz
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: The Skype begin refusing payments making on their site through the Tor

2011-01-04 Thread Moritz Bartl

Hi,

On 04.01.2011 14:02, Praedor Atrebates wrote:
 Am I missing something?

Anonymous credit cards?

--
Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor in German media (27c3)

2011-01-04 Thread Moritz Bartl

Hi,

On 04.01.2011 17:46, Dirk wrote:

So all I need is a competent lawyer to run as many exit nodes as I want in 
Germany?


Most people run as many exit nodes as they want without even having a 
lawyer in the first place. It is not an illegal service at all.


For the future, it might be a good idea to form a lose network of 
lawyers/funds that openly promise legal help to ANY Tor node operator. 
In Germany, both Chaos Computer Club and German Privacy Foundation 
promise to fight for the right of Tor node operators in case something 
big hits them. In the US, EFF made a similar promise.

--
Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Exit node and datacenter

2011-01-04 Thread Moritz Bartl

Hi,

Contact your ISP and tell them what you want to do. Ask if it's possible 
to SWIP your IP range and attach your own abuse handle (email address).
If your ISP is okay with it, I think it's worth trying the open exit 
policy first, and only limit it later in case you run into trouble with 
your ISP. For a suggestion on a limited policy, see [1].


--
Moritz

[1] 
https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment

Am 04.01.2011 19:12, schrieb forc...@safe-mail.net:

Hello!

Since about 18 months I am hosting a Tor relay middleman on a dedicated box 
rented at Rackforce in Canada and I would like to turn it to an exit node.

Any suggestion about what to do concerning the datacenter? I would like to 
avoid being sent offline at the 1st complaint...

Thanks!
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: BDS VPNs hosting

2010-12-31 Thread Moritz Bartl

Hi,

Am 31.12.2010 11:41, schrieb Jordi Espasa Clofent:

Do you know another BSD VPS reliable provider?


Networkpresence is a Torservers.net exit node sponsor in Australia and 
also offers BSD on their VPS plans. Australian bandwidth is very 
expensive though. :(


http://networkpresence.com.au/

--
Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Email?

2010-12-29 Thread Moritz Bartl

Hi,

The Tor Hidden Wiki lists a few other free email services offering HTTPS at:
http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email

--
Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Any way to secure/anonymize ALL traffic?

2010-12-22 Thread Moritz Bartl
Just as a reminder, the problem with Flash and Javascript is not only 
that they might be able to cirvumvent network settings. Both can gather 
local information and give it away - in that case it doesn't matter if 
the channel itself is anonymous.


Moritz

Am 22.12.2010 14:38, schrieb Praedor Atrebates:

I have always been disturbed by the fact that javascript or flash can sidestep 
tor and give away your real IP.  Is there truly no way to control one's own 
computer so that any and ALL traffic that goes out to the ethernet port or wlan 
gets directed through tor no matter what?  Can any combination of software and 
hardware prevent software on one's own computer from acting the way someone 
else wants rather than as the owner wants?  I would love to be able to use 
javascript and flash (some site require one or the other or both to be 
functional) and know that ANY traffic that exits my own system WILL be directed 
through the tor network.



***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Visualization: Tor nodes on Google Maps and Google Earth

2010-12-15 Thread Moritz Bartl
Hi,

I wrote a small ugly Python script to visualize Tor relays on Google
Maps and Google Earth. You can see the result here:

* Open KML file in Google Maps:
http://maps.google.com/maps?q=http:%2F%2Fwww.torservers.net%2Fmisc%2Ftormap%2Ftormap.kml

* Download tormap.kml for Google Earth
http://www.torservers.net/misc/tormap/tormap.kml

The KML standard is being pushed by Google and should work for
OpenStreetMap, too, but I couldn't get it to load there. Feel free to
modify the script to generate other outputs.
The initial idea was to scale the marker size to show the relay's
bandwidth, but Google Maps does not support this.

The markers might give a false impression of accuracy. Most IPs can only
be tracked to city level (or even region), ie. the markers are somewhat
near, not necessarily at the real location of the relay.

You can download the script here:
http://www.torservers.net/misc/tormap/tormap.py (LGPL)

This is a one-time snapshot and I will not update it regularly, unless
there is public interest to do so. The bandwidth categories are based on
the reported observed bandwidth at the time of creation, so the actual
number of high bandwidth nodes will fluctuate every time the script is
run. It would be nice to extend this script to use longer-term bandwidth
calculation like TorStatus does, and to generate a map over time using
all the consensus data provided at http://archive.torproject.org/. An
example of what this could look like is Vis4Net's Wikileaks Mirror World
Map at http://labs.vis4.net/wikileaks/mirrors/ .

( Mostly copied from my blog at
http://moblog.wiredwings.com/archives/20101213/Visualization-Tor-nodes-on-Google-Maps-and-Google-Earth.html
)
-- 
Moritz
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Dmytrij's anonymous VPS

2010-12-06 Thread Moritz Bartl

From
http://www.bitcoin.org/smf/index.php?topic=1905.0

- quote -
Hello bitcoiners,

I'm investigating if here is a demand for anonymous VPS (virtual
private servers) service. I have multicore beast server lying around,
many years experiences with linux administration and also experiences
with Tor hidden services.

I was thinking about anonymous VPS many years before. There were
attemps to do on Tor network, but payments were always problem. There
were some free hostings, but quality was always poor. I found bitcoins
recently and now feel I have all pieces to do VPS hosting powerful and
thanks to bitcoins - really anonymous.

My idea is simple - provide no question service. I don't know my
customers is and customers don't know who I am. This is huge advantage
in contrast to Vekja because nobody know where the server is located
 and
how to shut down it. I provide 1 or more CPU cores, few hundreds MB RAM
and few onion addresses routed to VPS ports. Customer
will send me few bitcoins every week. Simple.

Only one pitfail is here. Because of strong anonymity, all inbound and
outbound traffic is routed to Tor network. No direct connection to
Internet. Never. It makes system management slower, but anonymity is
the main concern.

Users can access server using Tor network or directly from Internet
using great service http://tor2web.com/ (hidden services are indexed by
  Google).

Price. My offer is 1 core @ 3GHz and 512MB RAM, SLA 99% (minus glitches
on
Tor network) for 30 bitcoins per week. But I'm open to discussion here
for first users. I need at least 3 users to pay housing. Please comment
here or send me anonymous message to https://privacybox.de/dmytrij.msg

I swear to send 20% of bitcoins to providers of torservers.net and
tor2web.com. First one because they are Tor relay providers accepting
bitcoins and second one cause their service is needed for my
anonymous VPS. They do not accept bitcoins yet, but I expect it is
temporary Smiley.

  Cheers,
Dmytrij
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Very low performance in CriptolabTORRelays*

2010-12-03 Thread Moritz Bartl
Hi,

On 03.12.2010 13:12, Olaf Selke wrote:
 At least my relay holds a couple of connections to Cryptolab.

We (torservers) do, too. About the same amount of connections.

Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Descriptor fingerprint format

2010-10-29 Thread Moritz Bartl

Hi,

Am 29.10.2010 02:23, schrieb grarpamp:

It also uses about 9 spaces x ~3300+ descriptors ~= 30,000 bytes
of traffic for one client to pull the entire relay list. Multiply that
by number of clients[?] x the frequency[?] ~= bandwidth wasted.


Excuse my ignorance, but isn't the list transferred compressed?

Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: IRQ balancing

2010-10-18 Thread Moritz Bartl
Hi,

In case you're wondering what this is about: If you see high CPU usage
on one core on your high bandwidth server (200 Mbit/s, lots of
connections), it is very likely that only one of your CPU is handling
network interrupts.

Let me add a few things I've learned from fighting with this problem:
irqbalance doesn't help a thing, all it does is rotate smp_affinity, so
our 100% usage moved from one core to another. I also tried different
kernels and various e1000e drivers in hope to get MSI-X working, but it
seems as if our hardware doesn't support it (
http://us1.torservers.net/lspci.txt ).

In the end the only thing that helped was to enable Receive Packet
Steering (RPS), which is in the kernel since 2.6.35, but poorly
documented. I still plan to move all the Tor related posts to a separate
blog on torservers, but for now you can find how to enable RPS here:
http://moblog.wiredwings.com/archives/20100827/Howto-Enable-Receive-Packet-Steering-RPS-on-Linux-2.6.35.html

Moritz

On 19.10.2010 00:10, grarpamp wrote:
 Another links regarding earlier posts on this topic:
 
 http://www.ntop.org/blog/?p=1
 http://www.alexonlinux.com/smp-affinity-and-proper-interrupt-handling-in-linux
 http://www.alexonlinux.com/why-interrupt-affinity-with-multiple-cores-is-not-such-a-good-thing
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Restricted Exit Policy Port Suggestions?

2010-08-11 Thread Moritz Bartl

Am 11.08.2010 15:01, schrieb Harry Hoffman:

There are certainly instances where takedown requests are incorrect but
the frequency of them isn't high (again, my opinion).


It is not so much that they are incorrect. What is incorrect is to force 
the takedown of Tor exit nodes because of - in comparison - little 
abuse. And after all the Tor relays are not the origin of the 
infringement and actually protected by the DMCA (512a). Still, upstream 
ISP don't care much and want the complaints to cease.


In that sense, the takedown requests *are* incorrect.


If you want to exclude p2p, then I would bet that the amount of abuse
reports would plummet.


You cannot exclude p2p if as with Tor exits policy is port based. 
Bittorrent (which is the main culprit here) uses port 80 (or 443 for 
SSL) for tracker connections, and random ports for actual transfer.


If you cut of tracker connections (by blacklisting them), abuse stops. 
If you stop the actual transfers from happening, abuse stops, too. Both 
MediaSentry and BayTSP refer to the infringement including the port that 
the data was offered on.



Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Legal response to real abuse

2010-08-07 Thread Moritz Bartl

Hi,


How can such an overly simplistic action satisfy the ISP? That simply
moves the abuser down the block, it does not stop him. Is it OK if it is
not in my back yard?


For your ISP, that's probably exactly their rationale.

The problem is that individual blocking doesn't help against the real 
issue here:


This is considered the first strike of three -- the third resulting in 
the termination of your account.


Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: A suggestion to TOR [a proxy server]

2010-07-26 Thread Moritz Bartl
Hi,

On 26.07.2010 04:39, Gregory Maxwell wrote:
 In my experience with windows machines in computer labs, you are able 
 to install firefox extensions without the permissions to
 install programs.
 If people subject to policy restrictions really can't install
 software but can install extensions then an extension might be an
 excellent way of getting tor software to people... perhaps a stripped
 down end user proxy only distribution of Tor.

The main difference here is that most programs try to install to Program
Files, which requires administrative privileges for the benefit of
protection against later tampering. Firefox extensions (by default) end
up in the users home directory.

I am not sure if it actually does, but the Tor installer should be able
to install and run as user just fine, once you point it to a location
where you can actually write to.

Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


TorVTL: Transparent Proxying on Windows

2010-07-26 Thread Moritz Bartl

Hi,

What happened to TorVTL? Did anyone look into it recently?

http://www.artifex.org/~jarusl/TorVTL/

Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: A suggestion to TOR [a proxy server]

2010-07-25 Thread Moritz Bartl
That being said, you should look into the bridge concept.

http://www.torproject.org/bridges.html.en

On 25.07.2010 23:50, Gregory Maxwell wrote:
 On Sun, Jul 25, 2010 at 5:44 PM, Praedor Atrebates prae...@yahoo.com wrote:
 At work I am unable to run or use tor even from a USB key - they are 
 prevented from working. It might be nice to have a website(s) that act as 
 entry points to tor and that use names that do not immediately scream TOR 
 PROXY SERVER!  TOR ENTRY POINT RIGHT HERE! so that it is less likely for IT 
 departments to be able to easily block access to such (I am also prevented 
 from accessing any proxy servers and they often name themselves as proxies 
 to boot so they scream their nature and make it easy to block).  Is there 
 any way to create tor entry point servers that provide the benefits of the 
 tor network without the cost of providing the site with user ID AND endpoint 
 site?
 
 
 If you do not control the computer you are using then you have already
 lost the privacy/censorship battle and TOR can't help you.
 
 
 If someone wanted to run an open proxy network which exited via tor
 there is no way that we could stop them... but they should NOT use the
 word tor to describe their service because such a service would NOT
 and could NOT provide the anonymity protection which tor is intended
 to provide.
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: tor-proxy.net is official proxy site of TOR? [Sorry, i meant to say http://torproxy.net/]

2010-07-25 Thread Moritz Bartl
Hi,

On 22.07.2010 15:24, krishna e bera wrote:
 That new site does not respond.
 
 Also, the same design flaw applies to ANY remote web-based proxy:
 it is a single concentrator and can thus is a magnet to be attacked
 or have its incoming connections monitored.  If the connections
 are SSL (https) it might be slightly more difficult to snoop on, 
 but most people do not check certificates so MITM could still occur.

Also see http://files.cloudprivacy.net/ssl-mitm.pdf on this issue.

Moritz

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor 0.2.2.14-alpha is out

2010-07-20 Thread Moritz Bartl

Hi,


And it would be little affection to normal users.


Speaking on behalf of a good, blind friend: This is not true. Unless you 
consider him not normal.


Spontaneuous idea: I think it might be interesting to use a fingerprint 
similar to the one caculated by Panopticlick to limit/influence the 
selection of bridge addresses.


--
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-30 Thread Moritz Bartl

Hi Mike,


Ok, I've updated
https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
with this information. Let me know if there is anything else you think
might be helpful, too.


Thanks. Will do.


A blog would be great. Another option besides publishing the actual
complaints would be to draft template response letters for various
cases and publish those. I'm sure other potential exit operators would
greatly benefit from such a collection, and it would be a great thing
to link to in that post.


I have started to collect statistics and some of my answers on a wiki page:
http://www.wiredwings.com/wiki/Torservers.net_Main_Page#Statistics
So far, there's not been a single real conversation with anyone about 
the legal status.


--
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-29 Thread Moritz Bartl

I also allow 465 and 563. Those are used by authenticated SMTPS and
NNTPS.

Thanks. I have added them to the exit policy.

Please get back to us in a week or so with info on your abuse
complaint rate with the new policy. I'll update
https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
with the policy if it does in fact drastically reduce your abuse
complaint raint.


It does. There are still some old complaints by MediaSentry and BayTSP 
being forwarded, but the timestamp clearly show dates before I changed 
exit policy.


Other than that, I have recieved a few SpamCop reports, most of them 
about spam being sent through HTTP/Webmail, but two recent ones about 
spam being sent through ESMTP, eg:


Received: from livmgfm (anonymizer2.torservers.net [173.244.197.210])
	by mtaout-ma04.r1000.mx.aol.com (MUA/Third Party Client Interface) with 
ESMTPA id 54B3FE91 for x; Mon, 28 Jun 2010 19:36:22 -0400 (EDT)


Fortunately, SpamCop uses my direct contact address now instead of going 
through my ISP.


I will soon set up a (b)log about all incidents. I'll also talk to a 
lawyer (and friend of mine) if I am allowed to publish all complaints.


--
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Fwd: Posting of links to inappropriate sites on children's website via Tor

2010-06-28 Thread Moritz Bartl
(Forwarded with permission)

 Original Message 
Subject: Posting of links to inappropriate sites on children's website
via Tor
Date:   Mon, 28 Jun 2010 18:44:26 -0400
From:   Amos Blanton a...@scratch.mit.edu
To: ab...@torservers.net

Greetings,

I help manage the community on the Scratch website. Scratch is a
programming language for kids developed and provided for free by an
educational research group at MIT. You can check it out here:

http://scratch.mit.edu/

There is a teenager in New York who has decided to create new accounts
to post links to trolling sites like lemmonparty.org
http://lemmonparty.org etc. on the Scratch website, which allows kids
to share projects and comments. It being a site for kids ages 8 and up,
that's not good. :(

This is the node that was most recently used:
http://173.244.197.210/

I think we can find the originating IP from our records, if that would help.

In the past this person created accounts to post links in our forums
using free web proxies, and now they're moving on to posting them in
comments via TOR.  I guess we'll have to block new accounts from TOR
nodes - but do you guys have any alternatives you can recommend? I
understand and accept your mission to support privacy, but unfortunately
I can't see any good alternatives to blocking Tor nodes right now. I
have read the FAQ, but I thought I'd see if you have any other ideas.

Thanks very much for your time,
Amos Blanton
Scratch Team

-- 
_
Amos

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-27 Thread Moritz Bartl
Hi,

On 27.06.2010 04:17, Mondior Folimun wrote:
 I also allow 465 and 563. Those are used by authenticated SMTPS and
 NNTPS.
 There's also the chat ports: 1863 (MSN), 5190 (aim), 5050 (yahoo), 5222-
 5223 (xmpp/gchat). Those haven't given me any problems either.

Thanks. I have added them to the exit policy.

--
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-26 Thread Moritz Bartl
Hi,

On 27.06.2010 03:00, Mike Perry wrote:
 Can you post a copy of your counter-notification? Did they say in
 specific why they believe it doesn't meet the requirements?
 Also, are you familiar with chillingeffects? They catalog DMCA-related
 correspondence and provide some legal FAQs for counter-notice
 procedures.

Thanks. After having read more about it, I doubt that I have to file a
counter notification after all. I told them so two days ago, citing the
relevant sections from DMCA, and haven't heard back from them since.

Midphase (100tb) finally told me they were able to SWIP my range, one
day before Softlayer (their data center) told me it wasn't possible. The
range is still not SWIPed though, Midphase said they would look into it
again.

So far, Softlayer shows no sign of understanding anything I've told
them, neither about DMCA law (with the appropriate paragraphs and the
EFF response cited), nor about Tor not being some file sharing utility,
nor about that SWIPing would help on the abuse. Midphase on the other
hand doesn't interfere, I guess they want no trouble with Softlayer but
understand and respect what I'm doing.

Since changing the exit policy, the only reports I've been getting were
some by SpamCop, and two complaints by BayTSP/MediaSentry with old
timestamps. There seems to be a (small) number of spam senders that use
Tor in combination with webmail, but there isn't much I can do about
that (always different destination IPs). Fortunately SpamCop was able to
change their records of my IP range to my contact address so that's not
a big problem.
I'm not sure if I'm legally allowed to publish the complaints. I want to
put them on my blog when I have some time.

The exit policy helps to cool down the situation with Softlayer, and
I'll try my best to make them understand what it is I'm running. When
and if the IP range is SWIPed, we can think about unblocking unknown
ports again.

The average speed is 26 MB/s at the moment. I'm not sure what limits the
speed, the server should be on a Gbit line, and our plan covers 39MB/s...

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-23 Thread Moritz Bartl
Hi,

 Out of curiosity, what exit policy are you now using? Perhaps we want
 to standardize on a policy that is effective at reducing these
 complaints.

At the moment, I allow ports 20-22,53,79-81,110,143,443,706,873,993,
995,8008,8080,. Feel free to suggest others.

 If you've filed the counternotice, maybe suggest your ISP just blackhole
 future mails from the abuse sender?

For each mail passed on to me, I also answered to 100TB.com so they
could close their ticket and pass that information on to Softlayer. In
every mail, I told them that I am sorry for so many automated complaints
coming in, that they should not turn my server off because of these
'spam' mails, and that it would be great to SWIP my IP range. No replies.

 As far as I know, they never got their test case.

Too bad. I am willing to step in, but I am not located in the US, which
seems to be a requirement.

 Being able to tell your ISP that the EFF will defend you in this 
 unlikely situation might also help your position with them.

I am not so sure, as they didn't react to anything I passed on to them
regarding my legal status. I am now trying again to get them to SWIP an
IP range for me.

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-23 Thread Moritz Bartl
Hi,

 BayTSP/MediaSentry/etc have heard all the
 excuses, including when they tagged my printer as serving up movies;
 they don't care. I fully expect they don't even read the responses, just
 check that a response was received.  The response is probably then
 catalogued for some future court case.

I'm not sure it was the most clever thing to do, but I wanted to have
this cleared up. After sending a mail to five different BayTSP
addresses, they finally came back to me, asking for my DMCA Designated
Agent form filing with the US Copyright Office. They also said my
counter notification doesn't meet the legal requirements...

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Automated threat messages force limitation of Exit Policy (Softlayer)

2010-06-22 Thread Moritz Bartl
Hi,

After running our 300MBit/s Tor node for less than a week, the US data
center Softlayer has forced me to limit our exit policy to well-known
ports after receiving 25 automated Torrent DMCA complaints this weekend
and again more than 20 in the last two days. I hope that now that the
policy is restricted they will allow the node to stay up.

All these complaints list pretty much the same Torrents, have been
issued by MediaSentry or BayTSP, and each offers to get back to them on
changing email addresses and through a web form. For each single abuse
case, I have tried to reach them to tell them about the node and its
background, including the offer to block on IP/Port basis and the URL to
EFF's legal page, but they didn't get back to me and didn't stop the
spamming. I even filed a counter notification with written signature etc.

It's frightening to see how easy it is to effectively shut down any
server at large ISPs such as Softlayer by just repeatedly sending the
same - possibly unjustified - complaints.

If you know of any Tor-friendly ISPs with large bandwidth plans, please
let me know.
-- 
Moritz Bartl
http://www.torservers.net/
http://anonymizer2.torservers.net/ (stats)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-06-18 Thread Moritz Bartl
Hi Mitar,

 For the original discussion (Tor Exit Node Sponsorship, looking for
 partners) see http://archives.seul.org/or/talk/May-2010/msg00058.html
 I came up with same idea some time ago:
 http://archives.seul.org/or/talk/Feb-2009/msg00018.html

I saw your post back then and of course I want to invite you to join our
efforts. We have the first server running and currently trying to tweak
it to 39MB/s throughput (see stats at http://us1.torservers.net/). We
hope that we can find enough constant donators to keep this going. A
second node has been donated by http://networkpresence.com.au/ in
Australia and I will set that one up soon. (Thanks!)

Of course, it's always better to diversify, but when you look at
bandwidth prices, it makes sense to unite at least some effort into one
larger project.

I can only encourage you to follow your idea of another larger node, and
to speak to people about it!

 And
 have thought of trying to rise money by other means (like personal
 approach in my country, where I would distribute leaflets and similar,
 to get also non-technical people to understand and support it, because
 currently I think we have mostly technical/networking people
 understand the issue (because they understand how Internet works) or
 those people who are in censorship regimes).

Exactly. I think there is a larger group outside our world who, once
educated, would be willing to spend some money on it.

 As I wrote in my previous e-mail I have a Tor friendly ISP in
 Slovenia, which costs 110 EUR per month for 100 Mbit/s no other limits
 node, where I get 5 IPs initially but can also get more.

Do you mind adding it to
https://wiki.torproject.org/noreply/TheOnionRouter/GoodBadISPs (or is it
actually already listed?)

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [tor] Re: Hidden Services Hosting and DMCA

2010-06-14 Thread Moritz Bartl
Hi,

On 13.06.2010 23:43, andrew wrote:
 Then of course he already mentioned a couple of times that he's not in
 the USA, so even if you were a lawyer he shouldn't take your advice ;)
 Right.  I read the thread too.  He is not, but his service and the
 underlying provider are in the USA.

Thank you for your feedback.
Still, you're right, I should be more careful with that. I will not host
hidden services until I have gathered more information about the
consequences.

Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Hidden Services Hosting and DMCA

2010-06-12 Thread Moritz Bartl
Hi,

We are currently having a discussion over at torservers.net on whether
it is wise to offer hidden service hosting.
Most people don't have a server, they use free email or pay for cheap
webhosting. The barrier to create hidden services is quite high. I feel
that the Tor network could definitely use an ISP who offers hidden
services hosting. My idea was to use a separate, disk encrypted virtual
machine for hosting hidden services, and only open it towards the Tor
network. Regular, non-anonymous donators should then be able to open
their files towards the Internet, too.

 If you use that server for other things beside Tor you will have a
 hard time to explain and argue when abuse requests arrive - in fact
 you can't.
 It is quite easy to differentiate between a client (tor-exit) or a
 server (hosted content) also for authorities.

Thank you. You're right, this has to be investigated further. I don't
think that hosting content - on a logically different machine -
influences the forwarding argument for the Tor nodes.
Also, I don't see how it is quite easy for authorities to
differentiate between middle node traffic and hidden services - that's
what they are there for after all.

 You will not be able to use the response template if you get abuse
 requests because it does apply for Tor only.

Then it will still apply for the IP addresses of the nodes.

 [...] We further recommend that you not keep any potentially illegal
 files on the same machine you use for Tor, nor use that machine for
 any illegal purpose. Although no Tor relay in the US has ever been
 seized, nor any relay operator sued, the future possibility cannot
 be ruled out.
 If that happens, you will want your machine to be clean. [...]

The Tor machine will be clean. If I rent a virtual machine, I also don't
know what happens on other VMs, and this is how I interpret this.

I'm not even so sure if DMCA applies for me, a German hoster offering
services, even when using US servers. Internet law isn't easy.

Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Hidden Services Hosting and DMCA

2010-06-12 Thread Moritz Bartl
Hi,

On 12.06.2010 13:13, Marco Bonetti wrote:
 On 12/giu/2010, at 12.49, Moritz Bartl t...@wiredwings.com wrote:
 The barrier to create hidden services is quite high.
 I'm not too sure about this: you can run hidden services on tor clients
 which do not relay any traffic for the network.
 Starting a service is not that difficult: an home flat Internet
 connection and a low power computer are ideal for a small personal
 hidden service.

That machine should be up 24/7, and you still need to maintain (ie.
update) it.

-- 
Moritz Bartl
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Hidden Services Hosting and DMCA

2010-06-12 Thread Moritz Bartl
Hi Scott,

On 12.06.2010 21:10, Scott Bennett wrote:
 That machine should be up 24/7, and you still need to maintain (ie.
 update) it.
  What a strange thing to say!  How can you credibly claim to know the
 availability requirements for other persons' hidden services?

I sorry you're right. Being not a native speaker, you shouldn't take all
my phrases literally. ;-)
Let me rephrase that: I see a group of people who might to provide
hidden services, but don't have the resources and/or expertise and/or
will to do it all by themselves.

Cheers,
Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Hidden Services Hosting and DMCA

2010-06-12 Thread Moritz Bartl
On 12.06.2010 22:15, Moritz Bartl wrote:
 I sorry you're right.

LOL now that was a typo. :)
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Hidden Services Hosting and DMCA

2010-06-12 Thread Moritz Bartl
Hi Mike,

Thanks for your valuable input. What you are saying implicates that
there might be forces interested in investigating what I am hosting. In
a way, you need to compare it to any ISP hosting illegal content without
knowledge. In the case of hidden services it might be harder to
determine the ISP, in the Internet today it is trivial. Regardless of
that, in the end I am just an ISP. If they put so much work in finding
the source, and the source turns out to be me - as in an ISP -, what
else is there to do other than contacting me? I will do everything I can
to shut down illegal services, not only because I am forced to by law,
but because I feel it is the right thing to do. The hosters I deal with
all agreed to forward abuse to me based on DCMA (or the appropriate
country specific equivalent), and I approached them with a commercial
partnership background.

If I were to defend the idea, I could say that if you tried to find the
source of a hidden service, personal servers with worse/less regular
uptime on a residential line would be much easier to track down.

 Of course, you can try to simply ignore these orders due to the fact
 that you're German and they're not likely to extradite you over them,
 but you'll probably lose your server, and you might have trouble
 entering the US at a later date then.

Sad as it is, if that's what it takes, I'm up to it. My education spans
carefully crafted rights, and if these rights are no longer guaranteed,
I will, I want to, stand up for them. I will never *ignore* any orders,
but I will carefully examine the legal basis of the inquiry. I've been
maintaining a fairly high bandwidth Tor exit for years now, and I know
how to deal with abuse. The worst thing that happened was a murder case
investigation, but it was no problem to clear it up without any
interruptions of my Tor node.

I have contacted enough cooperating ISPs outside the US if that turns
out to be necessary (and I hope to find more through this project). This
specific server at Softlayer is paid for on a monthly basis. I will not
provide decryption keys, and luckily I am not forced to do so. If I
were, I would not consider doing this. I have closely looked at
(somewhat) related incidents in Germany, and all charges have been
dropped for lack of evidence if the respective disks were encrypted, in
all cases.

I feel that this discussion is on the brink of something off topic, but
the implications are something that definitely need to be clarified in
any case, no matter how I decide.

Speaking to the list: I understand that most of you are skeptical about
this venture, and you have all the right to be. You should be. But don't
just give up one me, tell me about it. Especially with the current
political situation, I see a market around Tor, and you should not
misconceive that. Commerce is not all bad.

Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-28 Thread Moritz Bartl

Hi Andrew,


My advice is that if you are trying to attract non-technical people to
donate money in order to create more relays, your index page needs to be
far less technical.


Yes, you're right. I'm not exactly the best person to do this (not a 
native speaker), but I've revised the index page to make it more clear 
(and moved the old index page to an intro page). I could use some 
graphics or a video, but the only non-techy video explaining onion 
routing I found is a clip from the US series Numb3rs and not exactly the 
most concise: http://www.youtube.com/watch?v=XIDxDMwwlsw :-]


At the moment we're discussing possibly free hidden services/eepsite 
hosting on the torservers mailinglist.



Also, explain how creating more tor/i2p nodes helps the normal person.
Or, who it actually helps.  And I suggest having two simple
thermometers; total funds raised and number of nodes possible per year.


A themometer definitely needs to be there. I'm thinking about a model 
like 1TB per Euro and a slider so users can set their own level of 
participation. Customizations like an own node name, contact information 
and DNS name cost extra.

Progress is somewhat slow because I only can work on it in my spare time.

Thanks for your feedback and your approval! :-)

--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi,

I set up a preliminary homepage at http://www.torservers.net/

For the original discussion (Tor Exit Node Sponsorship, looking for 
partners) see http://archives.seul.org/or/talk/May-2010/msg00058.html


Basically it comes down to: I want to run another high bandwidth Tor 
exit and I am looking for individuals or companies to help sponsor it.


To keep the noise down on OR-Talk/Tor-Relays, I have also created a 
mailing list for hosted tor exit discussion. If you want to stay 
informed, feel free to subscribe at http://www.freelists.org/list/torservers


I am grateful for help, suggestions and other comments.

--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi,


Your use of the Tor name and logo (and style) is deceptive.

I take it you didn't see the favicon. Look again.

Fair enough, that is a tad misleading.


Yes, I have used the Tor logo in several places. For one, I am not a 
graphics designer. Secondly, I think my usage (it its context) is 
neither deceptive nor misleading. Actually, I want to provide Tor 
services after all.
When you look around, you will see a lot of people and companies using 
logos of products they do not own or are associated with. For example, 
you will often see the Microsoft logo in places where Microsoft products 
are sold.

Let's look at what the Tor website has to say about its logo:
https://www.torproject.org/trademark-faq.html.en

If you're making non-commercial use of Tor software, you may also use 
the Tor onion logo (as an illustration, not as a brand for your 
products). Please don't modify the design or colors of the logo. You can 
use items that look like the Tor onion logo to illustrate a point (e.g. 
an exploded onion with layers, for instance), so long as they're not 
used as logos in ways that would confuse people.


I have also tried to contact the Tor developers through this mailing 
list about my planned usage, but I guess I should do that more 
explicitly, and will do that now in a mail to execdir. Sorry. It is very 
important to me to do this with approval of the Tor community (that's 
why it started here).


See below on why I see my current usage as non-commercial.


Of course, that hope includes the big assumption of things like,

 all donations being used to cover costs (no profit)

I don't see commercial as bad per se. I don't see how I am competing 
with anyone, and if I did (if there was anyone else offering Tor 
services), that would be useful competition after all.


Let me clear with this: I am a student, willing to put my time and 
effort into running Tor nodes (and more). Depending on what products I 
am building here - which is something that I hope to have designed in a 
community effort (hence the mailing list) - I might *some day* 
consider to make some small amount of management fee. At the moment, 
this is not part of the plan.



, and all sponsors getting their donations back if the
new relays never get off the ground.


The website is not clear about this yet, but I want to distinguish 
between node sponsorship and donations.


Node sponsorship is a product you can buy, like you can buy managed 
and unmanaged servers. These are recurring payments with a contract, 
towards one or more specific services. I will not collect sponsorship 
money until we - everyone who is interested in funding a node in some 
way or another - have decided on a specific configuration, setup and 
server, which will then be ordered.


Donations on the other hand are irregular, nonrecurring payments. At the 
moment I agree that this looks like a primary service on 
torservers.net, but I really see it as something very optional - I just 
haven't worked on the other parts of the Plans page yet. I will add a 
section that one could also want to donate to the Tor project instead to 
fund development.
Donations will be collected, amounts published, and once some node can 
be funded from them, used. One pragmatic approach to this would be to 
bill the regular node sponsors less in one month to make up for these 
irregular donations.
I already have several people interested in funding a node, and even if 
I cannot find enough to fund a big node, there's always a small one we 
can add.


 I haven't seen anything come out of his own

mailing list yet, but you can be sure I'll be watching it closely.


Thanks for your interest. :-) If you want to find out more about me, 
feel free to visit my blog at www.wiredwings.com .


--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi Mike,

Thank you for your input. I agree with all you say, and to some degree 
it shows that it is yet unclear (from the site) what exactly I want to 
offer. I now think it might have been better to not make it public 
before getting that message transported, but I haven't published it 
anywhere outside of the Tor community lists yet.


I want to have clear statements about WHAT you get for funding a node, 
and what monthly amount is left to cover before (!) a new node will be 
set up. Nobody will be billed before that node is ordered. Irregular 
donations really are something extra. At the moment, they come across to 
prominent because there are no product plans yet.
I am all open for suggestions, I will outline my ideas in a wiki-like, 
open discussion, together with early adopters on the mailing list, 
until there are specific products to offer. That's why I called the 
section Plans after all.


What I really need to attract is people who decide that they want to 
*own* (parts of) a Tor node, and are willing to pay a monthly fee for it.


--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi Mike,


If you're making non-commercial use of Tor software, you may also use
the Tor onion logo (as an illustration, not as a brand for your
products).

One of the sticky issues with trademark protection though is that if
you do not defend your mark in all applicable cases, you lose the
right to defend it in cases you actually do care about. So please do
not take any decisions about your use personally.


I understand that. I have removed the favicon for now until this is cleared.

--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi Scott,

Mike and Moritz,
 Would you both *please* stop posting each message to multiple lists?
Thanks much.

I have only posted the initial annoucement to both lists.

--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.

2010-05-20 Thread Moritz Bartl
On 20.05.2010 06:25, Roger Dingledine wrote:
 The trouble here is that if we make family declarations one-sided, then
 I can tell everybody that I'm in blutmagie's family (and X's family and
 Y's family and Z's family and ...), and suddenly I'm influencing the
 path selection of other clients in a way I shouldn't be able to.

Maybe it is a misunderstanding on my side, but I agree with Scott. How
could this influence the network in a way that one can speak of an
attack? My idea was that by stating a family, I say that *my node*
musn't be used in a circuit together with other members of that family,
no more, no less.
So, by misconfiguring the family on my side, I cannot hurt the network
more than (in the extreme) by running no node at all.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Family specifications (was: Re: perfect-privacy.com, Family specifications, etc)

2010-05-20 Thread Moritz Bartl
On 20.05.2010 13:28, Oguz wrote:
 I too do not understand this. Already an evil entry node can list all
 nodes that it does _not_ control in its family option to try to force
 circuit through the nodes it controls, though it would obviously be a
 dead give away listing many unrelated nodes as within the family. Is
 there a check when a node declares itself to be in a family the
 descriptor of the other family members are checked to confirm?

From what I understand, yes, at the moment both partners have to list
each other. That's what the fuss is all about, because this becomes hard
to manage when you run a lot of nodes.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node Sponsorship - looking for partners

2010-05-20 Thread Moritz Bartl
On 12.05.2010 18:56, Anders Andersson wrote:
 A thought: Currently there is a Donate! section on torproject.org,
 that doesn't mention what the money is used for or how much money that
 comes in. 

By the way, Paypal is the most widely used paypent processor, but also
the most expensive. Especially for (smaller) donations, Moneybookers and
Liberty Reserve are much cheaper (Paypal: 1.9%+0.35€, Moneybookers: 1%
with a maximum of 0.50€).

-- 
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node Sponsorship - looking for partners

2010-05-20 Thread Moritz Bartl
  By the way, Paypal is the most widely used paypent processor
 Well, in the open social networking space, sure.
 There's all sorts of traditional commercial processors such as:
 https://www.authorize.net/solutions/merchantsolutions/pricing/

Yes, I was implicitly talking about projects that live from donations.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Moritz Bartl
 To be more specific about what I mean by equal
 resources: suppose that users of system X have 
 5 relays, and tor has 5 relays, and both
 sets of users used the same bandwidth.  If all 
 users used one 10 relay system instead, the 
 total bandwidth should be similar.

Tortunnel is not a separate network, but (ab)uses existing Tor exits. My
guess would be that tortunnel users - client only - don't think a lot
about adding exit relays to Tor. It's not developed any longer, and I
don't think many are using it anyway.

I agree with Stephen that it's not per se a threat to the Tor network.

 I can't help but think that there are indeed 
 other use cases that would greatly benefit 
 from a independent simpler transport-type 
 lower-layer that tor could ride on. 

Have you looked at I2P? http://www.i2p2.de/techintro.html
It for example allows both users and services to specify their hop
length, and uses packet switching instead of circuit switching.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Moritz Bartl
On 19.05.2010 23:58, grarpamp wrote:
 Have you looked at I2P? http://www.i2p2.de/techintro.html
 It for example allows both users and services to specify their hop
 length, and uses packet switching instead of circuit switching.
 Phantom does this too... user specified hop counts based on their
 needs for speed vs. security. A nice design feature.

Is there any working implementation of Phantom? I2P is widely in use,
and I must say that I really begin to like it. Code also looks much
cleaner to me (not: mature). Tor could use a complete rewrite.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node Sponsorship - looking for partners

2010-05-19 Thread Moritz Bartl
On 14.05.2010 06:56, and...@torproject.org wrote:
 Can we split entrepreneurial from bad?  I don't see the two as one
 concept.  If someone figures out a way to increase fast exit relays and
 preserve user privacy/anonymity and make money, more power to them. We
 as the non-profit aren't going to stand in their way.  I'm glossing over
 lots issues, but in general, trying and failing until you succeed is a
 fine plan as any.

Can I use the Tor logo in combination with my hosted Tor sponsorship
offer? I'd like to use it as part of a logo, somewhat modified and with
the clear statement that I am not associated to the Tor project and that
the logo is copyrighted by the project.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.

2010-05-17 Thread Moritz Bartl
 number of tor relays listed
 in the tor directory.  Most of them are grouped into one Family or
another,
 but they properly should *all* be in the *same* Family.  Under the current
 configuration, it is quite possible for a client to choose a route for a
 new circuit in which every hop would use one of your relays, each chosen
 from a separate Family.  It seems to me that you should change all of your
 relays' torrc files to specify all of them in a single Family.
  I intend to post a warning notice about what you've done quite
soon on
 the or-talk mailing list, but I am sending you this note first to give you
 a chance to explain/justify your setup before I involve the rest of the
 community in the matter.


   Scott Bennett, Comm. ASMELG, CFIAG

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node Sponsorship - looking for partners

2010-05-13 Thread Moritz Bartl
On 13.05.2010 03:27, and...@torproject.org wrote:
 My USD $0.02.

Monthly or yearly? ;-)

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: GeoIP database comparison

2010-05-13 Thread Moritz Bartl
On 13.05.2010 04:19, grarpamp wrote:
 Wasn't there a user driven opensource geoip database project
 somewhere? Sortof like DynDNS, users go to the website, it
 pops up their ip address, they enter their location in the DB.
 Thought it had some advanced stuff too, network admins
 could enter CIDR blocks, contact info and such.

http://hostip.info/

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node Sponsorship - looking for partners

2010-05-12 Thread Moritz Bartl
Hi,

I was asked by mail if I was interested in $5 a month. To make that one
clear: Yes, I am! I want to fund a node. Depending on the number of
people, amounts of money, wishes for services, I will try to find the
best suitable hoster. The three posted were just examples of what I have
in mind. Just contact me, I'll add you to the list, and keep you posted.

When speaking in terms of bandwidth, e.g. 150Mbps, then I'd rather
spread it across n machines with 150Mbps/n each.

I understand that it is far from ideal. Still, one has to be practical.
Currently, one machine is responsible for 25% of exit traffic. Of
course, a large number of smaller nodes with good (unrestricted) exit
policy would be best, but why don't we have them already then ..?

Apart from Mike Perrys arguments, I'd like you to see me as an ISP,
offering independent VPS for Tor hosting, with an additional Tor
friendly abuse handling. All I can do is promise (and put it in the
contract) that I will not monitor the traffic. Then you're better off
than with most ISPs out there that shut you down for running Tor or even
demand 200 Euro for forwarding one abuse message.
If I was the first ISP to offer small VPS, preconfigured Tor exit nodes
with root access for customization, then it's a small step towards
saying that at the same time, I can put all efforts into one bigger node
instead.

I mean, what is better, one ISP that explicitly allows Tor, handles
abuse, and encrypts the drives, or an ISP that shuts down your virtual
server the first time it gets a complaint and maybe monitors your
traffic? Strato, the second largest hoster in Europe, once called the
police on one of their dedicated servers, because they suspected
criminal behavior, by watching the traffic - on their own initiative. I
can never make sure that the traffic isn't logged upstream. Also, most
ISPs offering VPS are not very explicit about the configuration of their
virtual machines, you have to try and see if Tor works first. I will
make sure that it does.

If you look at bandwidth and hardware prices, once you rent servers,
additional bandwidth is cheap. Example: At FDCServers, you get a
dedicated machine with 10mbit/s for $50, 100mbit/s (and better hardware)
for $160, and 1000mbit/s for $500. I don't aim for the Gigabit, but
10mbit/s is just not economically worthwhile.

Kickstarter has three disadvantages: [...]

Indeed. I am neither US citizen, nor do I plan to (only) accept Amazon
Payments. I see PayPal as one alternative, yes, but in the end it
depends on where the people who would like to fund a node live. I am
German, EU payments can be made without any fees to my bank account.

For organizing payments, I am currently looking into billing software,
but haven't been able to find something that suits my needs. I don't
have a problem organizing monthly mass email for 20 people (please, pay
your fee, by your payment processor of choice among the following...).

I would also like theoretically to accept anonymous donations for a node
(not for the VPN/webspace stuff of course), but the problem there is not
so much accepting it (PSC, Ukash, Liberty Reserve etc), but making sure
that the money comes in regularly to fund the node.

Before working on the details, I want to make sure there is actual
interest in such a node.

You have to open to a world of people who see the good in Tor, but
either don't have the time or the knowledge to run an own exit.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node Sponsorship - looking for partners

2010-05-12 Thread Moritz Bartl
 A thought: Currently there is a Donate! section on torproject.org,
 that doesn't mention what the money is used for or how much money that
 comes in. 

If you look closely, at the bottom of the page a pie says what the money
is used for.
Basically, torproject donations are used for development. It might not
even be too good to have the same people run nodes. I think it's
important that development gets funded. The German Chaos Computer Club
and the German Privacy foundation, to name only two, also accept
donations towards running Tor nodes.

I have something different in mind than just accepting donations for
nodes. The node website could list its owners, with a small bio and why
they are doing it. And like I said you can use parts of the machine for
different purposes (VPN, Webserver, ...).

Martin Fick:
 Also, making donations possible from so sort of anonymous
 money system to directly support bandwidth might be an
 idea.

I first planned to offer a certain bandwidth push for one-time
donations, eg. 1Mbit/s for one month for 2 Euro. The system could be
automated to automatically update the Tor node configuration. Still,
this doesn't solve the problem that there is no hoster that supports to
buy small amounts of bandwidth for just one month. The only thing that
comes pretty close are cloud hosters like Amazon, but the bandwidth and
constant workload isn't very cheap.
What I can offer of course is to collect donations, until they can be
turned into a useful node. For example, anonymous/non-recurring
donations could be distributed evenly amongst the recurring payers
(node sponsors).

For torproject.org , I suggest to accept UKash, PaysafeCard, Liberty
Reserve and maybe another credit card processor (Paypal doesn't allow
prepaid and virtual CCs) in addition to privacy-unfriendly Paypal.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Tor Exit Node Sponsorship - looking for partners

2010-05-10 Thread Moritz Bartl
Hi,

At the moment, 25% of all traffic exits through Blutmagie (thanks
Olaf!). I guess we all agree that this situation is far from optimal.

Judging from the number of requests in the last months where people
were looking for friendly ISPs, help with setting up, running and
managing Tor nodes, and especially abuse handling advice, I think there
is enough interest to fund another big node.

I've been in contact with several ISPs lately, asking specifically for
high bandwidth Tor exit node hosting. I have also added their responses
to the GoodBadISPs wiki.

What I am planning is either a large node (split like Blutmagie), if I
can find enough people to sponsor it, and/or smaller nodes on virtual
machines, eg. for hidden services hosting. I will personally order the
machine, manage it, keep Tor(s) running with mostly unrestricted exit
policies and handle all abuse. The companies selected will not shut
down the serve but pass all abuse to me, WHOIS notices will be adjusted
when possible (unfortunately, only a few of them offered that), RDNS
and notice pages will be set up accordingly.

I know that this is a controversial topic, and that it would be better
to have completely independent nodes, but I hope that I can earn your
trust. I will happily sign an agreement that I will not log/sniff
traffic. :-) The configuration will be published among sponsors.

I am open to suggestions here: You as a sponsor might also be
interested in an additional private VPN service, or use the large drive
space as backup purposes, I2P etc. You can of course also be mentioned on
the notice page as sponsor, complete with your company logo.

If you're interested, feel free to contact me directly. Tell me what
you'd want to give, and what you'd expect for your money.

At the moment, I am thinking about something like these (monthly):

 $200 100TB - http://www.100tb.com/
 $160 100Mbit/s - http://fdcservers.net/
 50€  10Mbit/s  - http://www.netrouting.nl/

All depending on how many people are willing to participate.

-- 
Moritz Bartl
GPG 0xED2E9B44
http://moblog.wiredwings.com/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/