Re: Any way to secure/anonymize ALL traffic?

2010-12-22 Thread 7v5w7go9ub0o
On 12/22/10 08:38, Praedor Atrebates wrote: I have always been disturbed by the fact that javascript or flash can sidestep tor and give away your real IP. Is there truly no way to control one's own computer so that any and ALL traffic that goes out to the ethernet port or wlan gets directed

Re: Any way to secure/anonymize ALL traffic?

2010-12-22 Thread 7v5w7go9ub0o
On 12/22/10 17:10, Praedor Atrebates wrote: Could one setup a VM with some arbitrary timezone for it alone and run tor and bind there so that flash and javascript cannot get such info as local timezone, etc? Would it be possible to have the VM change timezone in some random/semi-random

Re: Any way to secure/anonymize ALL traffic?

2010-12-22 Thread 7v5w7go9ub0o
On 12/22/10 20:32, Kyle Williams wrote: On Wed, Dec 22, 2010 at 8:39 AM, 7v5w7go9ub0o7v5w7go9u...@gmail.comwrote: Any and ALL suggests a machine that allows only HTTP/S activity to/from a TOR process; to/from a TOR entry node; all other traffic (e.g. UDP from some sneaky plugin) is blocked.

Re: Adding voip to torchat

2010-12-19 Thread 7v5w7go9ub0o
On 12/18/10 12:25, intrigeri wrote: 7v5w7go9ub0o wrote (18 Dec 2010 16:45:06 GMT) : Did you do any testing with SIP clients - e.g. SIP Communicator and/or SFLphone? I ask because each of these seem to be very active, and also offer ZRTP. I did not. Please let me know any testing results

Re: shadowserver.org

2010-06-14 Thread 7v5w7go9ub0o
On 06/14/10 10:02, alex-...@copton.net wrote: I am running the exit-node tor-readme.spamt.net. Thank You tor-readme.spamt.net, for your generous contribution to tor!!! My provider, server4you, keeps getting abuse reports from shadowserver.org. According to the abuse service they are running

Re: shadowserver.org

2010-06-14 Thread 7v5w7go9ub0o
On 06/14/10 18:52, John Brooks wrote: [] And second, the exit policy of my node does not allow IRC. For me this makes no sense at all. From my experience, shadowserver has a habit of being overzealous like this. I've never dealt with them in the context of Tor, but I had an

Re: [GSoC] Improving Snakes on a Tor

2010-05-01 Thread 7v5w7go9ub0o
On 05/01/10 00:15, John M. Schanck wrote: [] I'm going to be working on improving the Snakes on a Tor (SoaT) exit scanner. For those of you not familiar with it, SoaT aims to detect malicious, misconfigured, or heavily censored exit nodes by comparing the results of queries fetched across

Re: Torlock - a simple script to prevent outgoing packets from bypassing Tor.

2010-03-01 Thread 7v5w7go9ub0o
On 03/01/10 11:38, Kyle Williams wrote: You might want to look at JanusVM. I can't quite tell; I'm guessing that JanusVM uses a VPN(TUN/TAP) to redirect all host packets to the VM - thereby blocking any loose packets? (any non-TOR interaction with the ISP - which may be a hotspot)? TIA []

Re: Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-25 Thread 7v5w7go9ub0o
On 02/24/10 23:16, Ted Smith wrote: On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote: [] Perhaps mention the benefits of TPM chips (on 'ix, they can be configured to benefit the user, not some record company)? Yup. Check out Trusted Grub if you're blessed with the appropriate hardware

Re: Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-24 Thread 7v5w7go9ub0o
On 02/24/10 00:10, Ringo wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 One update that should be noted is that this doesn't protect against bad nanny attacks. With full disk encryption, the boot partition isn't encrypted (as you have to load it so it can ask for your passphrase and

Re: TorChat is a security hazard

2010-02-24 Thread 7v5w7go9ub0o
On 02/23/10 22:38, Paul Campbell wrote: [snip] It is possible to run Off-the-Record Messaging over Tor. Off-the-Record Messaging has all kinds of features: encryption, perfect forward secrecy and deniable authentication. And it doesn't have the problems of TorChat. Good point on OTR

Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-23 Thread 7v5w7go9ub0o
Good job! IMHO this is a very nice paper; well written! (Adjusted the title of this post a bit, in case the readers weren't aware your goal ) (FWIW, some might want to read the paper - to gain a lot of insight and background - and then download/test a copy of your (sanitized) .img

Re: Tor on the Nokia N900 (Mobile Tor stuff)

2010-02-20 Thread 7v5w7go9ub0o
On 02/19/10 16:13, Rich Jones wrote: Thanks for the reply. After some thought, I realize that the perfect should not be an enemy of the good; that TORing the net remains valuable, even if the OS is handshaking the cloud. It is also important that as many (cell) users as possible use/support

Re: Tor on the Nokia N900 (Mobile Tor stuff)

2010-02-20 Thread 7v5w7go9ub0o
On 02/19/10 20:09, Jacob Appelbaum wrote: 7v5w7go9ub0o wrote: On 02/18/10 20:07, Jacob Appelbaum wrote: The performance of Tor is similar to any other Tor client - this is our reference C implementation running on the N900. With that said - You may want to hold out and get an Android phone

Re: Tor on the Nokia N900 (Mobile Tor stuff)

2010-02-19 Thread 7v5w7go9ub0o
On 02/18/10 20:07, Jacob Appelbaum wrote: The performance of Tor is similar to any other Tor client - this is our reference C implementation running on the N900. With that said - You may want to hold out and get an Android phone. We're looking to do a release of Tor on Android next week. We

Re: browser fingerprinting - panopticlick

2010-01-31 Thread 7v5w7go9ub0o
Andrew Lewman wrote: On 01/30/2010 08:40 PM, 7v5w7go9ub0o wrote: Given the implications of panopticlick, have you any interest/plans in making Torbutton fingerprints even more indistinguishable (e.g. give every user a windows I.E. fingerprint) Just to highlight what Mike said

Re: browser fingerprinting - panopticlick

2010-01-31 Thread 7v5w7go9ub0o
Kyle Williams wrote: 7v5w7go9ub0o wrote: Andrew Lewman wrote: On 01/29/2010 08:20 PM, 7v5w7go9ub0o wrote: As we slowly transition to web 2.0, probably the next step is putting the TOR browser in a VM full of bogus, randomized userid/sysid/network information - carefully firewalled

Re: browser fingerprinting - panopticlick

2010-01-30 Thread 7v5w7go9ub0o
Andrew Lewman wrote: On 01/29/2010 08:20 PM, 7v5w7go9ub0o wrote: As we slowly transition to web 2.0, probably the next step is putting the TOR browser in a VM full of bogus, randomized userid/sysid/network information - carefully firewalled to allow TOR access only (TOR would be running

Re: browser fingerprinting - panopticlick

2010-01-30 Thread 7v5w7go9ub0o
scar wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Mike Perry @ 01/28/2010 02:04 PM: After all, in normal operation, your history leaks one fuckload of a lot of bits. And that's a technical term. Sensitive ones too, like what diseases and genetic conditions you may have (via

Re: browser fingerprinting - panopticlick

2010-01-30 Thread 7v5w7go9ub0o
scar wrote: Mike Perry @ 01/28/2010 02:04 PM: After all, in normal operation, your history leaks one fuckload of a lot of bits. And that's a technical term. Sensitive ones too, like what diseases and genetic conditions you may have (via Google Health url history, or Wikipedia url history).

Re: browser fingerprinting - panopticlick

2010-01-30 Thread 7v5w7go9ub0o
Mike Perry wrote: [] The reason why Torbutton didn't opt for the same origin policy method is because Tor exit nodes can impersonate any non-https origin they choose, and query your history or store global cache identifiers that way. It was basically all or nothing for us. Ah.

Re: browser fingerprinting - panopticlick

2010-01-29 Thread 7v5w7go9ub0o
Mike Perry wrote: Thus spake Seth David Schoen (sch...@eff.org): Mike Perry writes: Thus spake coderman (coder...@gmail.com): EFF has an interesting tool available: https://panopticlick.eff.org/ technical details at

Re: browser fingerprinting - panopticlick

2010-01-29 Thread 7v5w7go9ub0o
Andrew Lewman wrote: On 01/29/2010 04:36 PM, Michael Holstein wrote: The main cause was the screen resolution. https://blog.torproject.org/blog/effs-panopticlick-and-torbutton Running TOR and leaving javascript enabled sort of defeats the point, doesn't it? Not really. Most of the

Re: /r/onions

2009-09-15 Thread 7v5w7go9ub0o
Rich Jones wrote: Hello! I know there have to be some really interesting .onions out there, but I've been having trouble finding them, so I started a reddit.com 'subreddit' to do some of that web 2.0 magic and let the good ones bubble up. http://www.reddit.com/r/onions/ , if any of you

Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

2009-08-24 Thread 7v5w7go9ub0o
Ringo wrote: I would appreciate any feedback people have on this. This is just an idea and it's kind of beta, so don't use this unless you know what you're doing. PGP key at bottom of message More Secure Tor Browsing Through A Virtual Machine in Ubuntu IMHO, you're on the right

Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

2009-08-24 Thread 7v5w7go9ub0o
Kyle Williams wrote: On Mon, Aug 24, 2009 at 6:18 AM, 7v5w7go9ub0o 7v5w7go9u...@gmail.comwrote: == 1. Which VM software are the most breakout proof, should an attacker gain access with a root shell? This is a tricky question which depends on your requirements. Before I get

Re: Torbutton for Mozilla Thunderbird

2009-08-09 Thread 7v5w7go9ub0o
Sigh... yes; especially when one (upon rare occasion) requests the embedded http images, and thereby asks TBird to visit a web page. One would then want the transaction monitored by both TorButton and NoScript. :-( (p.s. open up about:config in TB and scan for jav. I hope there really is no

Re: TOR and HADOPI

2009-05-28 Thread 7v5w7go9ub0o
Juliusz Chroboczek wrote: Is anyone know where find an how to use TOR against HADOPI ? Using tor to evade the French data retention and HADOPI laws is no different from using tor for evading the surveillance of other police states. (Hadopi is the new law in france about P2P: if you download

Re: looking for an FTP - SOCKS proxy

2009-01-05 Thread 7v5w7go9ub0o
Scott Bennett wrote: On Mon, 05 Jan 2009 12:01:29 +0100 gabrix gab...@gabrix.ath.cx wrote: Scott Bennett wrote: I know people are doing FTP transfers via tor, but I don't know how they are doing it. What are people using for a proxy to sit between either a native FTP client or a web

Re: Jailed/sandboxed/chrooted applications

2009-01-02 Thread 7v5w7go9ub0o
Adlesshaven wrote: Does anyone here jail, sandbox or chroot the applications they use with Tor? yep. 1. Separate, individual (GRSecurity-hardened) jails on Linux for Thunderbird, Opera, and TOR itself. 2. Opera connects to TOR via polipo - which is jailed in a common jail; and Thunderbird

Re: FYI: ultimate security proxy with tor

2008-10-29 Thread 7v5w7go9ub0o
Eugen Leitl wrote: FYI: http://howtoforge.com/ultimate-security-proxy-with-tor Ultimate Security Proxy With Tor Nowadays, within the growing web 2.0 environment you may want to have some anonymity, and use other IP addresses than your own IP. Or, for some special purposes - a few IPs or

Re: Default ORPort 443 [was: Re: German data rentention law]

2008-10-19 Thread 7v5w7go9ub0o
Erilenz wrote: * on the Sun, Oct 19, 2008 at 07:14:31AM -0500, Scott Bennett wrote: Besides, opening ports 1024 usually requires root-privileges, which could introduce serious security issues if an exploitable flaw were found in Tor. You can still advertise port 443 as your ORPort and listen

Re: German data rentention law

2008-10-18 Thread 7v5w7go9ub0o
Roger Dingledine wrote: snip Otherwise, all german nodes have to switch to middle man. snip 1. Given that the ISP will have logs anyway, why disallow German exit nodes? 2. How about changing all TOR port useage - including relays and entry ports - to 443? 'Twould be hard to know

Re: German data rentention law

2008-10-18 Thread 7v5w7go9ub0o
Roger Dingledine wrote: On Sat, Oct 18, 2008 at 06:43:34PM -0400, 7v5w7go9ub0o wrote: Roger Dingledine wrote: snip Otherwise, all german nodes have to switch to middle man. snip To be clear, I didn't write the above line. 1. Given that the ISP will have logs anyway, why disallow German

Does TOR use any non-ephemeral (non-DHE) ciphers?

2008-09-24 Thread 7v5w7go9ub0o
David Howe has been running some tests, and has discovered that in many cases, SSL transactions can be recorded, and decrypted by Wireshark after the fact - this because an ephemeral cipher was NOT chosen by the server; i.e. a cipher was chosen that does not provide Perfect Forward Secrecy .

Re: OnionCat 0.1.9 now supports IPv4

2008-09-15 Thread 7v5w7go9ub0o
Bernhard Fischer wrote: On Monday 15 September 2008, Sven Anderson wrote: Am 15.09.2008 um 16:16 schrieb Bernhard Fischer: We have a new version of OnionCat ready which is now capable of IPv4-forwarding. Read http://www.abenteuerland.at/onioncat/ for further instructions on how to use

Re: Google's Chrome Web Browser and Tor

2008-09-05 Thread 7v5w7go9ub0o
Nick Mathewson wrote: On Thu, Sep 04, 2008 at 03:20:34PM -0700, Kyle Williams wrote: Hi all, I've been playing around with Google's new web browser and Tor. I thought it might be good to share my findings with everyone. After reading Google's privacy policy[1], I for one would not want to use

Re: Vidalia exit-country

2008-08-21 Thread 7v5w7go9ub0o
Camilo Viecco wrote: 7v5w7go9ub0o wrote: What a great idea! Thank you for working on this!! And thanks to Google for supporting this project. Sadly, I get a clean linux compilation, but no extra tab. Is there an additional dependency? e.g. geoip? TIA gcc-3.4.6, glibc-2.6.1

Re: Update to default exit policy

2008-08-20 Thread 7v5w7go9ub0o
anonym wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 20/08/08 15:42, 7v5w7go9ub0o wrote: anonym wrote: Email clients leak tons of information, the most critical I know of being your IP address and/or host in the EHLO/HELO in the beginning of the SMTP(S) transaction. Nope

Re: Update to default exit policy

2008-08-20 Thread 7v5w7go9ub0o
anonym wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 20/08/08 15:42, 7v5w7go9ub0o wrote: anonym wrote: Email clients leak tons of information, the most critical I know of being your IP address and/or host in the EHLO/HELO in the beginning of the SMTP(S) transaction. Nope

Re: Update to default exit policy

2008-08-19 Thread 7v5w7go9ub0o
Dawney Smith wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 krishna e bera wrote: I'm not clear on how authentication (on any port) stops spam, other than the ISP cutting off a given userid after complaints. A lot of spam already comes from malware infected computers via their

Tor controller errors

2008-08-11 Thread 7v5w7go9ub0o
IIUC, I should be able to list the current configuration via the control port. My attempt at this fails... help! getinfo config/* 552 Unrecognized key config/* (when I list valid GETINFO commands, I get this: getinfo info/names 250+info/names= accounting/bytes -- Number of bytes

Re: browser footprint

2008-07-21 Thread 7v5w7go9ub0o
Karsten N. wrote: I have read a thread at the JonDos forum about browser footprints. A browser is not only identified by the user-agent, it is possible to use the accepted language, the accepted content, accepted charsets... To create a highly anonymous group, many user should use the same

Re: Torbutton 1.2.0RC4 Error

2008-07-03 Thread 7v5w7go9ub0o
Matthieu Dalissier wrote: Hi there, I don't know if it is the right place to post this. A few days ago i ve upgraded my torbutton to 1.2.0RC4 with FF3.0 and now can't toggle away from the Tor-state. The plugin is in default configuration, when i click on the Torbutton an error message with

Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-26 Thread 7v5w7go9ub0o
F. Fox wrote: scar wrote: F. Fox @ 2008/06/26 02:39: 7v5w7go9ub0o wrote: (snip) This actually creates another question (not to be argumentative :-) ). Given that there is no exit node, would an OnionCat to OnionCat connection over TOR need to be encrypted? Is it plain-text anywhere along

Re: Password Authentication Required

2008-06-26 Thread 7v5w7go9ub0o
Kyle Williams wrote: On Thu, Jun 26, 2008 at 4:30 PM, [EMAIL PROTECTED] wrote: On Thu, Jun 26, 2008 at 02:30:30PM -0400, [EMAIL PROTECTED] wrote 0.9K bytes in 29 lines about: : 'til you get a better reply, my newbie guess is that this sounds like a : vidalia connection response. i.e. the

Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-25 Thread 7v5w7go9ub0o
Bernhard Fischer wrote: On Tuesday 24 June 2008, 7v5w7go9ub0o wrote: snip My hope is to use OnionCat on my laptop to VNC via TOR to my home computer using nomachine NX. Is that kind of use possible with OC? Thanks again. Yes, this should work. But why would you like to do this? TOR's hidden

Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-25 Thread 7v5w7go9ub0o
Dave Page wrote: On Wed, Jun 25, 2008 at 09:16:12AM -0400, 7v5w7go9ub0o wrote: Bernhard Fischer wrote: On Tuesday 24 June 2008, 7v5w7go9ub0o wrote: My hope is to use OnionCat on my laptop to VNC via TOR to my home computer using nomachine NX. Is that kind of use possible with OC? 1

Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-25 Thread 7v5w7go9ub0o
F. Fox wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 7v5w7go9ub0o wrote: (snip) 1. Connecting via TOR would be an extra, minor security option to conceal the fact that my home is running a VNC server - eavesdropping kids at the hotspot may try to make it a hacking prize. You should

Re: OnionCat -- An IP-Transparent TOR Hidden Service Connector

2008-06-24 Thread 7v5w7go9ub0o
Bernhard Fischer wrote: OnionCat creates a transparent IPv6 layer on top of TOR's hidden services. It transmits any kind of IP-based data transparently through the TOR network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services. See