Re: First Vidalia Prototype including User Authorization on Hidden Services

2008-07-07 Thread Ringo Kamens
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

This looks really cool, thanks for all of your hard work!
Comrade Ringo Kamens
Domenik Bork wrote:
> Hey list,
> 
> a few of you may know me from IRC, ohers may not. I'm one of this years
> Google Summer of Code students. My project is about implementing Vidalia
> support for Hidden Services with User Authorization, according to the
> Tor proposal 121-hs-authorization of Karsten Loesing.
> A Hidden Service is a service that is reachable by a .onion adress, but
> the IP-Adress of the service provider is hidden. My goal is now to let
> Vidalia configure those Hidden Services, give a Service provider the
> possibility to create User Authorization data(.onion adress and a
> descriptor cookie) for each user he wants to access the service.
> Additionally there should be the option to store authorization data
> needed to access other hidden services in Vidalia. So a Service Provider
> has then the opportunity to create individual authorization data for
> single users and it would be no problem to exclude users from a service
> if he wants to let them no longer access the service.
> 
> As a few of you may have noticed I uploaded the first prototype of my
> Google Summer of Code Project. This prototype includes the complete
> functionality explained above with all the communication to/from Tor as
> well as persistent storage of the configuration.
> 
> Within this Mail I give you a little How2 for the installation of my
> Vidalia branch and the correct Tor branch you need to run it with User
> Authorization.
> 
> Here starts the little installation help:
> 
> Tor related:
> 1)Download the newest version of Karstens Tor branch (svn co
> https://tor-svn.freehaven.net/svn/tor/branches/121-hs-authorization/)
> 2)start a terminal and switch into the directory of 121-hs-authorization
> 3)type in the following command lines
>  1. ./autogen.sh [Enter]
>  2. ./configure [Enter]
>  3. make
>  4) if everything worked fine there shoul be the Tor binary in
> /121-hs-authorization/src/or/
> 
> Vidalia related:
> 1)Download the newest branch of my Vidalia branch (svn co
> https://svn.vidalia-project.net/svn/vidalia/branches/hidden-services)
> 2)start a terminal and switch into the directory of hidden-services branch
> 3)type in the following command lines
>  1. cmake . && make [Enter]
> 4)if everything worked fine there should be a Vidalia binary in
> hidden-services/src/vidalia/
> 5)click on the binary to start Vidalia
> 6)click on settings and then on „General“ to configure the path to the
> Tor executable in that way that it points to the 121-hs-authorization
> version
> 7)click on „Save“
> 8)click on „Stop Tor“
> 9)click on „Start Tor“
> 10)now the new Tor version should be started and you can start
> configuring Hidden Services with/without User Authorization etc by
> clicking on „Settings“ and then „Services“.
> 
> Possible configurations of Hidden Services:
> •normal Hidden Service with one single adress for all users
> •Hidden Service with User Authorization to easily include/exclude
> single users while the service is still reachable with the „old“ adress
> by other users who are configured.
> •Store the Authorization Data you need to access Hidden Services.
> 
> I would really appreciate it if I can find a few people who are
> interested in testing it and giving me some feedback or/and bug reports.
> Remember, this is just the first prototype and there are bugs and things
> i'm going to change in the next weeks. So this test phase is thought to
> give some feedback about the look and feel, whether the communication
> to/from Tor works as it should etc.. GUI stuff.
> 
> Best regards,
> 
> - --Domenik
> 
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIcpikmBTzXUpNYqQRAln2AKCSV53gheuM6er7HM1QFOaw+nOx1gCeMwNq
9U0pUtWopElyVKUFrAnmYR8=
=JEOa
-END PGP SIGNATURE-


First Vidalia Prototype including User Authorization on Hidden Services

2008-07-07 Thread Domenik Bork

Hey list,

a few of you may know me from IRC, ohers may not. I'm one of this  
years Google Summer of Code students. My project is about implementing  
Vidalia support for Hidden Services with User Authorization, according  
to the Tor proposal 121-hs-authorization of Karsten Loesing.
A Hidden Service is a service that is reachable by a .onion adress,  
but the IP-Adress of the service provider is hidden. My goal is now to  
let Vidalia configure those Hidden Services, give a Service provider  
the possibility to create User Authorization data(.onion adress and a  
descriptor cookie) for each user he wants to access the service.  
Additionally there should be the option to store authorization data  
needed to access other hidden services in Vidalia. So a Service  
Provider has then the opportunity to create individual authorization  
data for single users and it would be no problem to exclude users from  
a service if he wants to let them no longer access the service.


As a few of you may have noticed I uploaded the first prototype of my  
Google Summer of Code Project. This prototype includes the complete  
functionality explained above with all the communication to/from Tor  
as well as persistent storage of the configuration.


Within this Mail I give you a little How2 for the installation of my  
Vidalia branch and the correct Tor branch you need to run it with User  
Authorization.


Here starts the little installation help:

Tor related:
1)Download the newest version of Karstens Tor branch (svn co 
https://tor-svn.freehaven.net/svn/tor/branches/121-hs-authorization/)
2)start a terminal and switch into the directory of 121-hs-authorization
3)type in the following command lines
 1. ./autogen.sh [Enter]
 2. ./configure [Enter]
 3. make
 4) if everything worked fine there shoul be the Tor binary in /121- 
hs-authorization/src/or/


Vidalia related:
1)Download the newest branch of my Vidalia branch (svn co 
https://svn.vidalia-project.net/svn/vidalia/branches/hidden-services)
2)start a terminal and switch into the directory of hidden-services  
branch

3)type in the following command lines
 1. cmake . && make [Enter]
4)if everything worked fine there should be a Vidalia binary in hidden- 
services/src/vidalia/

5)click on the binary to start Vidalia
6)click on settings and then on „General“ to configure the path to the  
Tor executable in that way that it points to the 121-hs-authorization  
version

7)click on „Save“
8)click on „Stop Tor“
9)click on „Start Tor“
10)now the new Tor version should be started and you can start  
configuring Hidden Services with/without User Authorization etc by  
clicking on „Settings“ and then „Services“.


Possible configurations of Hidden Services:
•   normal Hidden Service with one single adress for all users
•	Hidden Service with User Authorization to easily include/exclude  
single users while the service is still reachable with the „old“  
adress by other users who are configured.

•   Store the Authorization Data you need to access Hidden Services.

I would really appreciate it if I can find a few people who are  
interested in testing it and giving me some feedback or/and bug  
reports. Remember, this is just the first prototype and there are bugs  
and things i'm going to change in the next weeks. So this test phase  
is thought to give some feedback about the look and feel, whether the  
communication to/from Tor works as it should etc.. GUI stuff.


Best regards,

- --Domenik



PGP.sig
Description: This is a digitally signed message part


Re: Traffic routed through Sweden

2008-07-07 Thread Juliusz Chroboczek
> **: FWIW and IMHO, I believe that much of the privacy and security of
> clients not only has to be, but *should be* left to them. Stopping
> Darwin and bottle-feeding those with inferior skills and/or capacity
> only drags down the human race. Those who can, will learn; those who
> cannot, will suffer the consequences.

I cannot but strongly disagree with that notion.

I expect my automobile vendor and my car mechanic to guarantee my
safety while I know little more about cars than how to check the
tyres' pressure.  I expect the people who built the bridges in my area
to guarantee that they won't fall down without me needing to know much
about statics.  And I expect to be able to go from Calais to Dover by
ferry without knowing anything about ship buidling.

This is not to say that we should guarantee anything at the exit-node
level, but please don't take the elitist attitude that your car
mechanic, your civil engineer and your ship-builder should know whether
AES-128 is more or less secure than Blowfish.

Juliusz


Re: locating hidden services

2008-07-07 Thread nobledark
Thanks Comrade, that's good to know - I appreciate the quick 
response.

 - nD

On Mon, 07 Jul 2008 16:00:19 + Ringo Kamens 
<[EMAIL PROTECTED]> wrote:
>As long as you don't submit your hidden service to any wikis and 
>it's
>not linked to from anywhere, nobody will be able to find out about 
>it.
>Comrade Ringo Kamens
>[EMAIL PROTECTED] wrote:
>> Hi again,
>> 
>> Learning about hidden services - what are the methods (if any) 
>for 
>> Tor users to locate a hidden service? Is there a way to search 
>for 
>> them, get the info from the directory servers, etc? 
>> 
>> Say for example that I have a web server running as a hidden 
>> service and I only want people from a certain group to be able 
>to 
>> locate/access that server. Authentication has already been 
>> addressed on the server but I don't want users who are not part 
>of 
>> that group to "bang" on my hidden service with a bunch of bogus 
>> login requests.
>> 
>> In the past, I've used port knocking/SPA to address this issue 
>but 
>> I'm not exactly sure how that would work out in a Tor/Hidden 
>> Service environment - anyone have any experience along those 
>lines? 
>> Any other information or advice?
>> 
>> Thanks as always - nD   
>> 
>> --
>> Live the good life! Click now for great retirement planning 
>assistance!
>> 
>http://tagline.hushmail.com/fc/Ioyw6h4dQXa9Q3uwL9LU4xK72RWz8nFg7Ukz
>DwSFU923hWGZKosOrH/
>> 
>>

--
Click to get a free auto insurance quotes from top companies.
http://tagline.hushmail.com/fc/Ioyw6h4d8EIMn1NBzRQK6vXIt0XRn2B8j2VZVuKm7IHKd7ZcWUNnnj/



Re: locating hidden services

2008-07-07 Thread Ringo Kamens
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

As long as you don't submit your hidden service to any wikis and it's
not linked to from anywhere, nobody will be able to find out about it.
Comrade Ringo Kamens
[EMAIL PROTECTED] wrote:
> Hi again,
> 
> Learning about hidden services - what are the methods (if any) for 
> Tor users to locate a hidden service? Is there a way to search for 
> them, get the info from the directory servers, etc? 
> 
> Say for example that I have a web server running as a hidden 
> service and I only want people from a certain group to be able to 
> locate/access that server. Authentication has already been 
> addressed on the server but I don't want users who are not part of 
> that group to "bang" on my hidden service with a bunch of bogus 
> login requests.
> 
> In the past, I've used port knocking/SPA to address this issue but 
> I'm not exactly sure how that would work out in a Tor/Hidden 
> Service environment - anyone have any experience along those lines? 
> Any other information or advice?
> 
> Thanks as always - nD   
> 
> --
> Live the good life! Click now for great retirement planning assistance!
> http://tagline.hushmail.com/fc/Ioyw6h4dQXa9Q3uwL9LU4xK72RWz8nFg7UkzDwSFU923hWGZKosOrH/
> 
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIcj2SmBTzXUpNYqQRAnFRAJwOruQ8a4YHGhw0WYe3jXUUFfFP2QCgtXCO
LWmRygpUTa7jJm/UHCT51B8=
=jEVH
-END PGP SIGNATURE-


locating hidden services

2008-07-07 Thread nobledark
Hi again,

Learning about hidden services - what are the methods (if any) for 
Tor users to locate a hidden service? Is there a way to search for 
them, get the info from the directory servers, etc? 

Say for example that I have a web server running as a hidden 
service and I only want people from a certain group to be able to 
locate/access that server. Authentication has already been 
addressed on the server but I don't want users who are not part of 
that group to "bang" on my hidden service with a bunch of bogus 
login requests.

In the past, I've used port knocking/SPA to address this issue but 
I'm not exactly sure how that would work out in a Tor/Hidden 
Service environment - anyone have any experience along those lines? 
Any other information or advice?

Thanks as always - nD   

--
Live the good life! Click now for great retirement planning assistance!
http://tagline.hushmail.com/fc/Ioyw6h4dQXa9Q3uwL9LU4xK72RWz8nFg7UkzDwSFU923hWGZKosOrH/



Re: No Tor server exists that allows exit to 127.0.0.1:80. Rejecting.

2008-07-07 Thread krishna e bera
On Mon, Jul 07, 2008 at 12:12:54AM -0400, [EMAIL PROTECTED] wrote:
> I noticed this in my tor client log [Tor v0.2.0.28-rc (r15188) with
> SafeLogging 0 in torrc]:
> 
> [notice] No Tor server exists that allows exit to 127.0.0.1:80. Rejecting.
[snip] 
> like this." - http://archives.seul.org/or/talk/Mar-2007/msg00404.html

That could be caused by someone mapping certain domains to 127.0.0.1 in their 
local DNS service,
which when returned would cause your browser or http-proxy to request a 
document from localhost.
I used to map doubleclick.net to 127.0.0.1 in my router, for example.
Some malware and anti-malware software makes that kind of mapping in the 
Windows hosts file.
Thus i don't think a Tor node is doing it, though from a client point of view
one might consider a Tor exit node and its DNS as a single service.
Perhaps it could be logged at the exit node itself as a possible 
misconfiguration warning.

You can see your current exit node using Vidalia.
I don't know how to find out past exit nodes, or if it is a bad idea to keep 
that kind of info around.