blog about tor and skype

2007-03-06 Thread sy16
I read in this blog http://www.hermann-uwe.de/blog/howto-anonymous-communication-with-tor-some-hints-and-some-pitfalls in the comment/reply section: Not meant for privacy It seems like there's a slight misunderstanding here. This setup is not going to anyonymize all of your

Re: blog about tor and skype

2007-03-06 Thread sy16
A quick note: I mean skype sms and skypeout calls, both types are to non-skype mobile phones instead of to another skype user. sy16 [EMAIL PROTECTED] wrote: If I send a text message in skype through tor, is it or is it not encrypted by tor? If I make a skype call through tor, is the voice

Re: blog about tor and skype

2007-03-06 Thread Enigma
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, - From what it sounds your destinations are normal phones. In that case your calls will not be encrypted. Actually, Tor could encrypt your call up to the point where it arrives at a gateway that connects to the public phone network. From there

(no subject)

2007-03-06 Thread Jason Edwards
I am new to Tor so please forgive my ignorance... When I use Vidalia to start and then stop Tor I get the following messages in my Log. Mar 05 15:13:24:072 [Notice] Tor v0.1.2.9-rc. This is experimental software. Do not rely on it for strong anonymity. Mar 05 15:13:24:078 [Notice] Enabling

Re: Error Message when stop Tor with Vidalia

2007-03-06 Thread Michael_google gmail_Gersten
That all looks correct to me. As for the error? It looks like it is saying that it is logged at error level of importance -- important enough that you see it. It does not mean that it's actually an error. On 3/6/07, Jason Edwards [EMAIL PROTECTED] wrote: (I forgot the subject line in my

Re: Error Message when stop Tor with Vidalia

2007-03-06 Thread Enigma
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yeah, from what I know, catching signal TERM, exiting cleanly just means Tor is shutting down but will wait (30 secs I think) before doing so to allow clients to find a new circuit first (hope that was correct). So it's all working as intended

Re: blog about tor and skype

2007-03-06 Thread sy16
Thank you for explaining, it's good to know that VOIP calls are encrpted. About configuring skype to use tor, can I just set proxy server to localhost, port 9050, using HTTPS? Or is it necessary to install freecap? Enigma [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1

Re: blog about tor and skype

2007-03-06 Thread Enigma
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi again, I can't answer your question directly since I don't use Skype. However, in general you should set the proxy option in your application to localhost and the respective port. Just try it out and see if it works or wait for an answer by

Re: Error Message when stop Tor with Vidalia

2007-03-06 Thread Jason Edwards
Thanks for the help guys :) Jay Enigma wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yeah, from what I know, catching signal TERM, exiting cleanly just means Tor is shutting down but will wait (30 secs I think) before doing so to allow clients to find a new circuit first (hope that

Re: blog about tor and skype

2007-03-06 Thread Roger Dingledine
On Tue, Mar 06, 2007 at 02:16:00PM -0500, Roger Dingledine wrote: Step one would be to force Skype to use TCP only. I'm not sure how to do this; one option would be to firewall yourself so only the Tor process can send outbound traffic (don't ask me how to do that in Windows, it's probably

Re: blog about tor and skype

2007-03-06 Thread Enigma
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Oh yeah, I forgot to mention that. Sly16, I read somewhere Skype is just encrypting its own protocol but not the traffic itself. Not sure whether it's true or not. In any case Skype users rely on a closed source protocol so no one really knows if

Re: Error Message when stop Tor with Vidalia

2007-03-06 Thread Roger Dingledine
On Tue, Mar 06, 2007 at 11:49:56AM -0500, Jason Edwards wrote: Mar 05 15:16:43:073 [Error] Catching signal TERM, exiting cleanly. Is everything working correctly? Why do I get an error message when I stop Tor? Good point. The 0.1.2.10-rc release will call that a 'notice', not an 'error',

Re: blog about tor and skype

2007-03-06 Thread Juliusz Chroboczek
The problem is that Skype uses either UDP or TCP, depending on the situation. If it chooses TCP, Freecap will intercept it Roger, Would you agree that Tor should be able to tunnel UDP traffic too? There's a /lot/ of UDP-based applications that it would make sense to tunnel over tor.

Re: blog about tor and skype

2007-03-06 Thread Roger Dingledine
On Tue, Mar 06, 2007 at 08:50:59PM +0100, Juliusz Chroboczek wrote: The problem is that Skype uses either UDP or TCP, depending on the situation. If it chooses TCP, Freecap will intercept it Would you agree that Tor should be able to tunnel UDP traffic too? There's a /lot/ of UDP-based

Re: blog about tor and skype

2007-03-06 Thread Juliusz Chroboczek
Would you agree that Tor should be able to tunnel UDP traffic too? One day I'd like to support this, yes. It's hard though: http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#TransportIPnotTCP Forwarding raw IP is difficult, I agree. But it's UDP I'd like you to forward. Considering

TTL expired?

2007-03-06 Thread Juliusz Chroboczek
I've just switched to 0.1.2.8, and when trying to access a hidden service that doesn't exist, I'm getting SOCKS 5 error number 6 ``TTL expired''. That's a somewhat unexpected error -- I'd expect to get error 4 ``host unreachable''. Juliusz

UDP over Tor [was Re: blog about tor and skype]

2007-03-06 Thread Nick Mathewson
On Tue, Mar 06, 2007 at 02:55:28PM -0500, Roger Dingledine wrote: On Tue, Mar 06, 2007 at 08:50:59PM +0100, Juliusz Chroboczek wrote: The problem is that Skype uses either UDP or TCP, depending on the situation. If it chooses TCP, Freecap will intercept it Would you agree that Tor

Re: blog about tor and skype

2007-03-06 Thread sy16
I don't know how to force skype to use only tcp, but one way to know whether it is using tcp (therefore tor) is to look at the little flag before the place where you enter the phone number. When it is different from where I am, it is probably using tor. I'll check out zfone and probably

Noobie Configuration Questions

2007-03-06 Thread Jason Edwards
Hey guys... I have some noobie questions if anyone has time. When I visit showmyip.com it recognizes that I am using Tor ALTHOUGH the information regarding my internet browser, operating system and type of computer I use is still accurate. Am I doing something wrong or is that unavoidable?

Re: TTL expired?

2007-03-06 Thread Juliusz Chroboczek
Is this a host unreachable case or a network unreachable case? As far as I can tell, the socks5 error messages are totally undocumented beyond the short phrase for each one. It doesn't matter much in my case -- I'm just trying to ensure that the user of Polipo gets an error message that makes

Re: Noobie Configuration Questions

2007-03-06 Thread Michael_google gmail_Gersten
To answer some of your questions: Privoxy does at least two things for you. It strips out some unwanted cookie behavior, and it strips out unwanted advertisements. Centralize advertisement sites are bad for several reasons. One is that they get items like I'm on somesite.com/page1.html, and

Re: list of tor IP addresses

2007-03-06 Thread xiando
Looking at the volunteer page at tor.eff.org, I spotted this: We need an official central site to answer Is this IP address a Tor server? questions. This should provide several interfaces, including a web interface and a DNSBL-style interface. It can provide the most up-to-date answers by

one less onion skin

2007-03-06 Thread James Muir
A typical Tor circuit looks like OP -- OR1 -- OR2 -- OR3 where the three -- links are all TLS connections. TLS protects the OP's communications from adversaries outside the network, but another layer of crypto (used inside TLS) is needed to protect them from the onion routers themselves

Re: one less onion skin

2007-03-06 Thread Steve Southam
Is it because the ORs don't know where they are in the circuit? Of course OR3 knows it's at the end, but the others either recognize or relay. Steve James Muir wrote: A typical Tor circuit looks like OP -- OR1 -- OR2 -- OR3 where the three -- links are all TLS connections. TLS protects

Re: Noobie Configuration Questions

2007-03-06 Thread Joe Knall
On tuesday, 2007-03-06 23:52 Jason Edwards wrote: Hey guys... I have some noobie questions if anyone has time. When I visit showmyip.com it recognizes that I am using Tor ALTHOUGH the information regarding my internet browser, operating system and type of computer I use is still accurate.

Re: one less onion skin

2007-03-06 Thread James Muir
Steve Southam wrote: Is it because the ORs don't know where they are in the circuit? Of course OR3 knows it's at the end, but the others either recognize or relay. I agree that not using k_1, d_1 would allow OR1 to determine that they are the first node in a circuit. However, Tor clients

Re: Noobie Configuration Questions

2007-03-06 Thread James Muir
Most important seems an aware handling of cookies, js and so on. Have a look at noscript https://addons.mozilla.org/firefox/722/ and flashblock http://flashblock.mozdev.org/ NoScript will also disable Flash in addition to JavaScript, although you have to enable this in its config window. In

Re: one less onion skin

2007-03-06 Thread Steve Southam
I'm not sure if this really happens, but if you have a connection open to an OR and a new circuit is required through it, couldn't ORn-1 send a CREATE_FAST to ORn? Steve Southam wrote: Is it because the ORs don't know where they are in the circuit? Of course OR3 knows it's at the end, but

Re: Building tracking system to nab Tor pedophiles

2007-03-06 Thread Michael_google gmail_Gersten
Well, first, this is just the normal exit node exposure of tor. The exit node in your circuit gets to see the raw communication between you and your destination. If you are using an SSL channel (SSH, https, etc) then nothing is a problem. Otherwise, the exit node can do things like spy on

Re: Building tracking system to nab Tor pedophiles

2007-03-06 Thread Starshadow
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Also note that browsing with Firefox using the NoScript http://noscript.net/ extension renders this attack and most others useless, since that java applet never gets executed. Michael_google gmail_Gersten wrote: Well, first, this is just the normal

How would tor defend from this attack?

2007-03-06 Thread Michael_google gmail_Gersten
So here's an idea for an attack on tor. We recently saw a paper that said that someone who puts in a lot of routers, claiming to have high bandwidth, can correlate senders and destinations, exposing the traffic analysis that tor is trying to defend against. And, a response from the maintainers

Re: one less onion skin

2007-03-06 Thread James Muir
Steve Southam wrote: I'm not sure if this really happens, but if you have a connection open to an OR and a new circuit is required through it, couldn't ORn-1 send a CREATE_FAST to ORn? I suppose that could happen, since the OP controls what commands are sent down the circuit to OR_{n-1}.

Re: Building tracking system to nab Tor pedophiles

2007-03-06 Thread Mike Perry
Thus spake Fergie ([EMAIL PROTECTED]): Hmmm. http://blogs.zdnet.com/security/?p=114 Comments? Will they write a ZDnet article about me when my node scanner starts to delist his compromised exit nodes? ;) There's of course no way that these nodes can be allowed to continue to be exits if

Re: Building tracking system to nab Tor pedophiles

2007-03-06 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]): At any rate, I welcome a good open source implementation of this. If nothing else, it will be nice to pit it against my scanner on a test network to make sure this sort of thing can be reliably detected. Oh, and we can also use this as an opportunity

Re: How would tor defend from this attack?

2007-03-06 Thread Dave Jevans
Your proposal is quite realistic, though to get good bi-directional bandwidth would probably cost a lot more than you project, as you'd want colocated servers, not servers on DSL lines. I believe that the exit nodes are one of the weakest points in a Tor network. If you don't know who is

Re: Building tracking system to nab Tor pedophiles

2007-03-06 Thread Roger Dingledine
On Wed, Mar 07, 2007 at 12:56:22AM -0500, James Muir wrote: http://blogs.zdnet.com/security/?p=114 The approaches suggested won't work if you use Firefox with NoScript set to disable JavaScript, Java, Flash and any other plugins. You still have to be careful though -- if you enable them