Re: Tor VoIP, & etc...
Thus spake Shawn K. Quinn ([EMAIL PROTECTED]) [06/09/05 09:22]: : > TOR can only contact other entry/mid/exit nodes on the ports they're : > listening on. The documentation actually requests that people set up nodes : > on TCP ports 80 and 443, for the exact case that this Houston, TX library : > seems to be in. : : The bigger problem is convincing the library's computer to run your : software without getting caught. Even then, there's no guarantee that : the computers have direct Internet access; it's likely everything is : funneled through proxies. Generally speaking, it's not terribly difficult to convince a library computer to run your software. Especially if there's anything from MS Office installed. And whether or not it's funneled through proxies doesn't matter one bit: you're submitted a valid HTTP request to a valid HTTP port. There's no reason the proxy would reject your request. At this point, I think I'll put my money where my mouth is, and try running a TOR node (client only) at my local library. See what happens.
Re: Tor VoIP, & etc...
On Sun, 2005-09-04 at 21:03 -0400, Tyler Durden wrote: > SQ wrote... > > > A Houston (TX, USA) public library? Could be next to impossible, as > > well as excellent cause for revocation of your library card and > > criminal prosecution if caught. > > Well, the idea would be not to get caught. I'm thinking basically of just > adding one of those $40 Tor nubbins at the end of a USB cable and then > tucking the nubbin under the carpet with a sign saying, "DO NOT TOUCH". If > it lasts a month then it might be money well spent, particularly if Al Qaeda > successfully nukes DC. > Damn. They blocked Telnet? They might as well just block TCP/IP. Do > they do this by blocking the likely ports or by merely de-balling the > protocol stack somehow? I assume Tor is smart enough to try various > open ports All you get access to as a library card holder is a Web browser (or pathetic excuse for same, as I think it's a hacked-up IE). The computers at the Houston libraries don't allow access to the USB ports from what I have seen, and in order to get access to anything besides a Web browser you would probably need to reboot the machine and you then have maybe 15-20 minutes before a librarian notices you. Now, the Harris County libraries might be different; I have not gone to one. -- Shawn K. Quinn <[EMAIL PROTECTED]>
Re: Tor VoIP, & etc...
On Mon, 2005-09-05 at 21:32 -0400, Damian Gerow wrote: > Thus spake Tyler Durden ([EMAIL PROTECTED]) [04/09/05 21:14]: > : I assume Tor is smart enough to try various open ports > > TOR can only contact other entry/mid/exit nodes on the ports they're > listening on. The documentation actually requests that people set up nodes > on TCP ports 80 and 443, for the exact case that this Houston, TX library > seems to be in. The bigger problem is convincing the library's computer to run your software without getting caught. Even then, there's no guarantee that the computers have direct Internet access; it's likely everything is funneled through proxies. -- Shawn K. Quinn <[EMAIL PROTECTED]>
Re: Tor VoIP, & etc...
On Sat, 2005-09-03 at 13:56 -0400, Tyler Durden wrote: > In other words, am I contributing to the greater Tor network if I > allow my USB Tor node to function while I'm sucking down a cappucino > or two? For the people that only route stuff like HTTP traffic through your Tor node, it will be a benefit. If I'm IRCing and get routed through your node, that's a different story (but it's no different than the bad old days of IIP where people dropped off by the dozens when someone shut down their computer). A Mixmaster remailer where the mail was transacted at public Internet access points would be much more useful. It would actually be funny if someone did this and named the node "starbuck". Anyway, as others have said, your node will only be able to function as middleman in such a setup, because by the time you register your IP will change unless you camp out in the Starbucks parking lot. Not that middleman is not useful, mind you (this applies to both Tor and Mixmaster). -- Shawn K. Quinn <[EMAIL PROTECTED]>
Re: Tor VoIP, & etc...
Shawn Quinn wrote... For the people that only route stuff like HTTP traffic through your Tor node, it will be a benefit. If I'm IRCing and get routed through your node, that's a different story (but it's no different than the bad old days of IIP where people dropped off by the dozens when someone shut down their computer). A Mixmaster remailer where the mail was transacted at public Internet access points would be much more useful. It would actually be funny if someone did this and named the node "starbuck". So: How hard would it be to surreptitiously install a Tor node into a computer at a public library? -TD
Re: Tor VoIP, & etc...
SQ wrote... A Houston (TX, USA) public library? Could be next to impossible, as well as excellent cause for revocation of your library card Oh no! Loss of the Houston library card! My passport to knowledge!!! criminal prosecution if caught. Well, the idea would be not to get caught. I'm thinking basically of just adding one of those $40 Tor nubbins at the end of a USB cable and then tucking the nubbin under the carpet with a sign saying, "DO NOT TOUCH". If it lasts a month then it might be money well spent, particularly if Al Qaeda successfully nukes DC. Needless to say, I haven't tried. The best you could do from Houston libraries would be a proxy accessed via HTTPS. At one time you could telnet, but that has long since passed. Damn. They blocked Telnet? They might as well just block TCP/IP. Do they do this by blocking the likely ports or by merely de-balling the protocol stack somehow? I assume Tor is smart enough to try various open ports -TD
Tor VoIP, & etc...
Damian Gerow replied to the great Tyler Durden: Thus spake Tyler Durden ([EMAIL PROTECTED]) [02/09/05 19:45]: : How long will it take the Greater Tor Network to notice the existence of : this little node? A few days after you register. : In other words, if I go into a Starbucks with this thing, can my laptop or : whatever start acting like a temporary Tor node? Well, here I meant after registration, etc...in a "regular" IP network it can take seconds to minutes in order for routing tables (at layer 3) or the local MAC Address tables (at layer 2) to recognize that you're back on line. With a Tor node I'm wondering how long it takes for the greater Tor network to both notice your existence and then trust that you're here to stay...for a while. In other words, am I contributing to the greater Tor network if I allow my USB Tor node to function while I'm sucking down a cappucino or two? Though, you can just skip all that, walk in to Starbucks, sit down, and start using your TOR node as your own entry point. No registration, no wait, no nothing: just sit down and go. I just set a node up a few days ago, and was surprised at how simple it was to get TOR up and going. In other words, just for me. That, of course, is great. As for simplicity, I need that: I know my way around the BLSR protection switching bytes in an OC-48 4 fiber ring, but I'm a veritable IP dummy (oh, well I DID design parts of a layer 2 GbE switch, but I'm no routing jock). I just don't have time to have to fiddle with the OS myself, so this will be interesting. Think I might get me one of those gizmos and then stick it on my PDA. So: Can Tor support VoIP Yet? I could call up bin Laden from a Starbucks! -TD
Re: Tor VoIP, & etc...
Thus spake Tyler Durden ([EMAIL PROTECTED]) [04/09/05 21:14]: : I assume Tor is smart enough to try various open ports TOR can only contact other entry/mid/exit nodes on the ports they're listening on. The documentation actually requests that people set up nodes on TCP ports 80 and 443, for the exact case that this Houston, TX library seems to be in. So yes, TOR *is* smart enough to try various open ports, but it will only work if something is listening on said ports.
Re: Tor VoIP, & etc...
Thus spake Tyler Durden ([EMAIL PROTECTED]) [03/09/05 14:03]: : Well, here I meant after registration, etc...in a "regular" IP network it : can take seconds to minutes in order for routing tables (at layer 3) or the : local MAC Address tables (at layer 2) to recognize that you're back on : line. With a Tor node I'm wondering how long it takes for the greater Tor : network to both notice your existence and then trust that you're here to : stay...for a while. : : In other words, am I contributing to the greater Tor network if I allow my : USB Tor node to function while I'm sucking down a cappucino or two? As others have stated, no, likely not: bouncing your connection up and down like that will likely cause great untrust within the TOR routing. Whether you will be /harming/ the TOR network or not is a more interesting question... I'd suspect not, but it's probably worth looking into. : In other words, just for me. That, of course, is great. Good. : As for simplicity, I need that: I know my way around the BLSR protection : switching bytes in an OC-48 4 fiber ring, but I'm a veritable IP dummy (oh, : well I DID design parts of a layer 2 GbE switch, but I'm no routing jock). : I just don't have time to have to fiddle with the OS myself, so this will : be interesting. Think I might get me one of those gizmos and then stick it : on my PDA. It is, quite literally, a matter of installing the binary (whichever OS you are using will determine the method of installation), setting two, maybe three configuration parameters -- things like logging levels, interfaces to use, and other very basic parameters -- starting it up and using it. So I imagine you can handle it quite easily. : So: Can Tor support VoIP Yet? I could call up bin Laden from a Starbucks! In theory, TOR can support anything that can handle a SOCKS connection. So if your VoIP program can do SOCKS, then yes, it can. If your VoIP program can't, wrappers are readily available. The question to ask here is: can TOR support VoIP /well/? I wouldn't put much faith in maintaining a solid VoIP connection: due to the very nature of what TOR does, you're introducing a substantial amount of latency to your connection, and it might be enough to throw off any VoIP connections you try to make. But it's worth trying... - Damian
Re: Tor VoIP, & etc...
On Sun, 2005-09-04 at 11:49 -0400, Tyler Durden wrote: > Shawn Quinn wrote... > >For the people that only route stuff like HTTP traffic through your Tor > >node, it will be a benefit. If I'm IRCing and get routed through your > >node, that's a different story (but it's no different than the bad old > >days of IIP where people dropped off by the dozens when someone shut > >down their computer). A Mixmaster remailer where the mail was transacted > >at public Internet access points would be much more useful. It would > >actually be funny if someone did this and named the node "starbuck". > > So: How hard would it be to surreptitiously install a Tor node into a > computer at a public library? A Houston (TX, USA) public library? Could be next to impossible, as well as excellent cause for revocation of your library card and possible criminal prosecution if caught. Needless to say, I haven't tried. The best you could do from Houston libraries would be a proxy accessed via HTTPS. At one time you could telnet, but that has long since passed. Other public libraries? Who knows. -- Shawn K. Quinn <[EMAIL PROTECTED]>