Re: Tor 0.1.2.2-alpha is out
Hi! On Mon, Oct 09, 2006 at 06:49:09PM -0400, Roger Dingledine wrote: - Workaround for name servers (like Earthlink's) that hijack failing DNS requests and replace the no-such-server answer with a helpful redirect to an advertising-driven search portal. Also work around DNS hijackers who helpfully decline to hijack known-invalid RFC2606 addresses. Config option ServerDNSDetectHijacking 0 lets you turn it off. Is that related to our lengthy More bad tor server? thread? Thanks a lot and keep up your good work! Alex. -- I am tired of all this sort of thing called science here... We have spent millions in that sort of thing for the last few years, and it is time it should be stopped. -- Simon Cameron, U.S. Senator, on the Smithsonian Institute, 1901. signature.asc Description: Digital signature
Re: Tor 0.1.2.2-alpha is out
On Tue, Oct 10, 2006 at 10:32:34AM +0200, Alexander W. Janssen wrote: - Workaround for name servers (like Earthlink's) that hijack failing Is that related to our lengthy More bad tor server? thread? Yes. Of course, they each will need to upgrade before it will matter for them, but it's a start. Thanks a lot and keep up your good work! Glad you like it. Nick was actually the one who wrote most of the code for the 0.1.2.2-alpha release. I was pretty much just the one who wrote the changelog and looked over all the commits. :) --Roger
Tor and SMEServer ?
Hi, Does anyone have installed TOR on a SMEserver 6.01 ? I'd like to create a tor server on that system, because it's the one I use..., but I can't find any doc. Thanks for your help
Re: Confused about Tor settings
On Sat, 07 Oct 2006 Total Privacy replied to George Shaffer: As for the DNS leaks, I think more is being made of this than it Was´nt this solved several months ago, in Torpark (Windows)? I have no idea, but even if it was, it doesn't mean it's solved in Tor. If so, their solution may be directly applicable, but Torpark does not seem to be making their full source available. I downloaded their source package, and it had only one medium size source file and several non text files. I could find no copyright or credits for any Firefox or Tor developer. Even if it's encrypted Tor traffic, they still know at a minimum the Tor entry node it's for, and depending on how well the Tor headers are constructed, may even be able to find the final destination. That must be wrong. What do you mean by Tor headers? As far as I can see in packet logs, the Tor headers only appear when a circuit is established initially (such as in the startup process) and don´t contain anything about exit destination, unencrypted. The rest of session just looks like random garbage (encrypted) also with DNS request in it, not in clear visible. My mistake. You are most likely right regarding the final destination and content. As long as the cryptography is sound, the ISP is unlikely to break it; since Tor requires OpenSSL this should be the case. I did not understand that the full content of all Tor packets was encrypted, but if you've been looking at them, I'll take your word. Regarding the entry node, every TCP (and UDP) packet has to have some destination where it's expected in an IP header. If they don't, routers would not know what to do with the packet. In the case of Tor packets leaving the original client, this would be the entry node, not the real destination. George Shaffer PS Sorry about the lack of headers to thread this properly. My ISP, Comcast, blocked about 30 messages from Friday afternoon to Sunday afternoon and I had to get this off the web, and build a reply in a new message.
Re: question to the german tor users
Hi, I wondered the same and apparently there wasn't one yet. Thus I created one (yahoo group for now). All you have to do is to register a yahoo ID and sign up for the group at: http://de.groups.yahoo.com/group/german_tor_mailinglist You will automatically be registered and you can send mails to the group via: [EMAIL PROTECTED] Sincerely, Landorin missi schrieb: I am interested to. :o) Greetz Missi Eben(am 7. 10. 2006 um 17:40 Uhr)hast du eingetippt: He is there a german tor related mailinglist somewhere? havent found one. If not and you are interested in one, please pm me.-) bernd -- Webseite: http://www.entartete-kunst.com/ Yeah, yo mama dresses you funny and you need a mouse to delete files. Songverfehlung des Tages: NIX -- Accelerate cancer research with your PC: http://www.chem.ox.ac.uk/curecancer.html GPG key ID: 4096R/5360872F
Re: question to the german tor users
Oh, I just noticed that it's enough to send a mail to: [EMAIL PROTECTED] for subscribing to the group. To unsubscribe use: [EMAIL PROTECTED] Sincerely, Landorin Landorin schrieb: Hi, I wondered the same and apparently there wasn't one yet. Thus I created one (yahoo group for now). All you have to do is to register a yahoo ID and sign up for the group at: http://de.groups.yahoo.com/group/german_tor_mailinglist You will automatically be registered and you can send mails to the group via: [EMAIL PROTECTED] Sincerely, Landorin missi schrieb: I am interested to. :o) Greetz Missi Eben(am 7. 10. 2006 um 17:40 Uhr)hast du eingetippt: He is there a german tor related mailinglist somewhere? havent found one. If not and you are interested in one, please pm me.-) bernd -- Webseite: http://www.entartete-kunst.com/ Yeah, yo mama dresses you funny and you need a mouse to delete files. Songverfehlung des Tages: NIX -- Accelerate cancer research with your PC: http://www.chem.ox.ac.uk/curecancer.html GPG key ID: 4096R/5360872F
RE: List of NODES in IP form
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mr. Blue Sent: Tuesday, October 10, 2006 5:30 PM To: [EMAIL PROTECTED] Subject: List of NODES in IP form Hello, this is my first post here. So, client(user) obtains a list of Tor nodes from a directory server. Now I'm developing web-apps in PHP 5 and I would like someone to tell me, how to get all IPs of those Tor nodes and put them in a .txt file. (each IP of a node on a new line in .txt file) I believe all the exit nodes are posted on a web page somewhere. Found it http://serifos.eecs.harvard.edu/cgi-bin/exit.pl When that .txt file is created my PHP script can start utilizing it. Thanks for a help in advance Oh, one more question... When I use tor and check my IP with some web service, it is actualy showing IP of a last node. Is that correct? ...or not? I believe that is correct the last node is an exit node. Thx...! __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
Re: List of NODES in IP form
I wrote a little script a while ago that may be useful to you: http://infosecpotpourri.blogspot.com/2006/08/listing-active-tor-servers.html Whenever you run it, the script queries one of the authoritative directory servers and dumps that server's list of known nodes. A quick-and-dirty hack, to be sure, but maybe useful to you, even if just as a starting point for your own code. David Mr. Blue wrote: Hello, this is my first post here. So, client(user) obtains a list of Tor nodes from a directory server. Now I'm developing web-apps in PHP 5 and I would like someone to tell me, how to get all IPs of those Tor nodes and put them in a .txt file. (each IP of a node on a new line in .txt file) When that .txt file is created my PHP script can start utilizing it. Thanks for a help in advance Oh, one more question... When I use tor and check my IP with some web service, it is actualy showing IP of a last node. Is that correct? ...or not? Thx...! __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
Re: List of NODES in IP form
Hey thanks guys! You were both vey helpful! Thanks again __ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com
Re: List of NODES in IP form
On Tue, Oct 10, 2006 at 07:28:06PM -0700, Mr. Blue wrote: Hey thanks guys! You were both vey helpful! Unfortunately, both of those answers use the old version 1 directory protocol (from Tor 0.1.0.x), which is deprecated at this point. So both of those techniques will be somewhat inaccurate. Further, since each Tor server has its own exit policy, and assuming your goal is to get a list of IP addresses which might connect to your service, you don't so much want a list of all the Tor IP addresses as you want a list of all the Tor IP addresses whose exit policies allow connections to your service. This is why we provide a script to make this list for you: see the end of http://tor.eff.org/faq-abuse#Bans --Roger