Re: Undeletable cookies

2011-02-18 Thread katmagic
On Fri, 18 Feb 2011 04:39:39 -0800
Mike Perry mikepe...@fscked.org wrote:

 Thus spake Irratar (irrata...@gmail.com):
 
  Hello.
  
  I have just found a site that can recognize me when I re-accessed it
  after I deleted all private data, toggled Torbutton and restarted Tor.
  
  http://samy.pl/evercookie/
 
 This is news to me. Are you using the default Torbutton settings? When
 we tested this in the past, Torbutton was protecting against it. I
 also just tested it now, and it did not recover my cookie.
 
 Perhaps one of your other addons betrayed you? Did you enable plugins?
 Or perhaps you have a misconfigured polipo storing these cookies in
 its cache?
 
 The Tor Browser Bundles are a good way to ensure you have a properly
 configured, vanilla Tor setup.
 
  Of course, it isn't a Tor problem, but I think it's better to know for
  these who are interested in privacy. many sites may use the same
  technology stealthy. I will try to discover more about how does it
  keep my private information. So far this site seems to forgets me when
  I disable JavaScript, but maybe it just can't display the proper
  number.
 
 Actually, web application layer privacy attacks *are* a Tor issue. We
 try very hard to protect against them:
 https://www.torproject.org/torbutton/en/design/#adversary
 

I think this is the result of #1968.
https://trac.torproject.org/projects/tor/ticket/1968


signature.asc
Description: PGP signature


Re: Loader source

2011-02-04 Thread katmagic
On Sat,  5 Feb 2011 00:59:18 +0200 (EET)
Greg Kalitnikoff kalitnik...@privatdemail.net wrote:

 Hi. Maybe I`m blind or too lazy, but I cannot find source for windows
 loader of Tor Browser Bundle - Start Tor Browser.exe. Please provide
 link 
 
 Thank you.
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

https://gitweb.torproject.org/torbrowser.git/blob/HEAD:/src/RelativeLink/RelativeLink.c


signature.asc
Description: PGP signature


Re: Excessive scrubs

2010-10-13 Thread katmagic
On Wed, 13 Oct 2010 09:02:20 -0500
Jon torance...@gmail.com wrote:

 I saw a message from Tor-op in reference to a similar problem and his
 solution was:
 
 Add the below line to your torrc and the scrubbed will be replaced by
 the domain in question.
 
 SafeLogging 0
 
 of which I tried, but it would not stay in the torrc file. It seems to
 remove it self at some point.
 
 As far as I can tell it never worked, but unknown how long after I
 placed it before it got removed.
 
 Jon
 
 On Wed, Oct 13, 2010 at 8:55 AM, Jon torance...@gmail.com wrote:
  I have noticed over the past 2 weeks, I have been getting an unusual
  amount of scrubs. It doesn't tell me which addresses are being
  scrubbed, so I don't know if they are the same or different ones. It
  does not affect the operation of Tor. Just fills up the logs.
 
  Is there a way to have the '[scrubbed]' removed and the address put
  in its place?
 
  Thanks,
 
  Jon
 
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

What do you mean by 'removed itself'? Was the file never saved, or was
there a point at which something else reverted it, or was it something
else entirely?

Also, which operating system are you using?

--
more than just a leitmotif
PGP Key ID: 33E22AB1


signature.asc
Description: PGP signature


Re: The best way to run a hidden service: one or two computers?

2010-09-18 Thread katmagic
On Fri, 17 Sep 2010 16:36:16 -0400
hi...@safe-mail.net wrote:

 Robert Ransom:
 
  Only if you trust the hardware firewall/router. I wouldn't.
 
 Okay so there aren't that many safe options to run a hidden service
 really, if any at all?
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

The router issue is only relevant if you're exploited, and if you're
running a firewall, get exploited on the root level, too. I'd look into
privilege separation software if you're really serious about security,
specifically AppArmor and SELinux, or systrace if you're on *BSD.
(AppArmor is much simpler than SELinux, though SELinux is probably more
powerful. Personally, I like systrace the best.) Just make sure you
update frequently, and you'll probably be good. :-)

--
more than just a leitmotif
PGP Key ID: 33E22AB1


signature.asc
Description: PGP signature


Re: gratuitous change blocks upgrade to 0.2.2.15-alpha :-(

2010-09-18 Thread katmagic
On Tue, 14 Sep 2010 03:33:33 -0400
grarpamp grarp...@gmail.com wrote:

 Also, regarding the interaction with HS directory lookups and
 excludenodes... i would suggest that specification in excludenodes
 should prevent all contact with such node for all reasons. Or just
 make another option for how to handle that case as well. This is
 more important than the above paragraph. As one could have a node
 that is a 'bad' exit through no fault/intent of its operator...
 such as being plugged into a non-ideal isp... yet it would still
 be perfectly useful when acting as a non-exit or directory provider.

The following options should do what you want:

ExcludeNodes node,node,...
A list of identity fingerprints, nicknames, country codes and address
patterns of nodes to never use when building a circuit.

ExcludeExitNodes node,node,...
A list of identity fingerprints, nicknames, country codes and address
patterns of nodes to never use when picking an exit node. Note that any
node listed in ExcludeNodes is automatically considered to be part of
this list.

StrictNodes 0|1
If 1 and EntryNodes config option is set, Tor will never use any nodes
besides those listed in EntryNodes for the first hop of a normal
circuit. If 1 and ExitNodes config option is set, Tor will never use
any nodes besides those listed in ExitNodes for the last hop of a
normal exit circuit. Note that Tor might still use these nodes for
non-exit circuits such as one-hop directory fetches or hidden service
support circuits.

--
more than just a leitmotif
PGP Key ID: 33E22AB1


signature.asc
Description: PGP signature