Relay flooding, confirmation, HS's, default relay, web of trust

2010-12-06 Thread grarpamp
Some further thoughts on an already mixed thread... Would this increase anonymity? As pointed out previously, not much. Attacks against Tor anonymity usually relate to entry-point/exit-point traffic correlation... Regardless of how many segments are in the middle, if your adversary can corner

Re: Configuring a Hidden Service

2010-12-06 Thread Jens Kubieziel
* zzzjethro...@email2me.net schrieb am 2010-12-06 um 08:19 Uhr: If your computer isn't online all the time, your hidden service won't be either. This leaks information to an observant adversary. Does it leak because it is online all the time or because it isn't online all the time? And how or

Re: Relay flooding, confirmation, HS's, default relay, web of trust

2010-12-06 Thread John Case
On Mon, 6 Dec 2010, grarpamp wrote: And what if the oponnent runs a hidden service trap?... seems that then just watching or running the client's entry guard [1] is all that is needed to confirm both connection and content? Yipes?!!! I'm no expert. This sounds like a very hard and real

Re: Relay flooding, confirmation, HS's, default relay, web of trust

2010-12-06 Thread Eugen Leitl
On Mon, Dec 06, 2010 at 05:18:21PM +, John Case wrote: I proposed early in the previous thread that not only should a web of trust be considered, but that this was indeed a classic case of a web of trust ... I didn't see any comment on this from the Big Names on the list, though...

Re: Relay flooding, confirmation, HS's, default relay, web of trust

2010-12-06 Thread Lucky Green
On 2010-12-06 09:18, John Case wrote: On Mon, 6 Dec 2010, grarpamp wrote: [...] Maybe there would also be benefit in a web of trust amongst nodes not unlike a keysigning party. As with social networking, people vouch for each other in various ways and strengths based on how they feel that

Re: Relay flooding, confirmation, HS's, default relay, web of trust

2010-12-06 Thread John Case
On Mon, 6 Dec 2010, Lucky Green wrote: The Web of Trust (WoT) concept provides for marginal security benefits and then only in a very narrow set of circumstances that are unlikely to hold true for the larger community of Tor node operators. Starting with the second point, the WoT concept

Dmytrij's anonymous VPS

2010-12-06 Thread Moritz Bartl
From http://www.bitcoin.org/smf/index.php?topic=1905.0 - quote - Hello bitcoiners, I'm investigating if here is a demand for anonymous VPS (virtual private servers) service. I have multicore beast server lying around, many years experiences with linux administration and also experiences

Re: Relay flooding, confirmation, HS's, default relay, web of trust

2010-12-06 Thread grarpamp
I'm too obtuse to understand, just with your footnote alone, what a hidden service trap is - would you provide a further explanation, or a link to one ? A hidden service trap is a hidden service run by any one/entity you'd rather not be doing business with. A trap, a lure, a ruse, a sting.

Re: Dmytrij's anonymous VPS

2010-12-06 Thread Theodore Bagwell
I would be interested. But how anonymous are bitcoins? With traditional money, only the government gets to watch you spend it. With BitCoin, now the entire community gets to watch! On Mon, 06 Dec 2010 22:01 +0100, Moritz Bartl mor...@torservers.net wrote: From

Re: Dmytrij's anonymous VPS

2010-12-06 Thread John Case
This is only interesting if you are not on the Internet. Either VPS server as a hidden service, or otherwise Tor only or you set up a parallel (local ?) network. Otherwise, you're just an ISP, no matter what kind of bread crumbs you take as payment, and the hammer is going to come down on

Re: Arm Release 1.4.0

2010-12-06 Thread Hans Schnehl
On Mon, Dec 06, 2010 at 10:25:39AM -0800, Damian Johnson wrote: Hazaa, many thanks for the patches! Committed with the exception of sockstat2 (see below). http://www.atagar.com/transfer/tmp/arm_bsdTest2.tar.bz2 One unrelated problem I noticed is that Arm tends to show local connections

Re: Arm Release 1.4.0

2010-12-06 Thread Damian Johnson
This IP serves as the internal adress to the jail when called from a local subnet, and may show multiple connections to the SocksPort, usually IP:9050. Sorry, I'm not sure if I'm following. You're saying that the check should essentially be: if (localPort == ORPort or localPort ==

Re: Arm Release 1.4.0

2010-12-06 Thread Hans Schnehl
On Mon, Dec 06, 2010 at 06:26:10PM -0800, Damian Johnson wrote: if (localPort == ORPort or localPort == DirPort): # treat as an inbound connection with the external ip # this is part of arm's current behavior elif (localPort == SocksPort and OS == FreeBSD): # treat as an inbound