Re: Tor Exit node on Intel Atom 230 anyone?

2008-11-22 Thread Roger Dingledine
On Tue, Oct 07, 2008 at 06:35:14PM +0200, Eugen Leitl wrote:
> the server went offline a few days before the contract expired,
> and EUServ support (always sluggish) went completely incommunicado.
> Methinks the server was seized for forensic examination. It isn't too
> far-fetched to conjecture they logged the entire traffic on authority
> request, and then yielded the Tor node key for subsequent decryption.

Just to clarify here, Tor's design resists the strategy you describe
here of logging traffic and then later breaking into the Tor relay
to get its key. The long-term identity key for a relay is only used
to sign descriptors.

The actual key exchange for circuit encryption is done with ephemeral
keys, which are discarded when the circuit is done.

I've just cleaned up the faq entry on this topic and moved it to the
new faq I've been growing:
https://www.torproject.org/faq#KeyManagement

--Roger



Re: not in the list. Not in the tor network map.

2008-11-22 Thread jed c
I attached the picture previously. Looks like it got cropped a little too much. 
The list of relays on the side begin with the letter A. The relay atlgonyovLi 
as well as the others connected in that circuit were not in the list on the 
left side. They are all listed now. So my connection was going through relays 
that were not in the list or on the map.

--- On Sat, 11/22/08, Jon <[EMAIL PROTECTED]> wrote:
From: Jon <[EMAIL PROTECTED]>
Subject: Re: not in the list. Not in the tor network map.
To: or-talk@freehaven.net
Date: Saturday, November 22, 2008, 5:35 PM

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Is there more information you could give.  For example, are you saying
that the nodes you are connected to are not in your network viewer list?

jed c wrote:
> Looking at my connections I noticed some are not in the list. Is
> this normal?
>
>
>
> --
>

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkkos1gACgkQk8jp5ZVximI4LACfSPC9+JeA7wUuf12vtOXxlLv+
r60AnA/Tu/ZL8jZBpJ+SbisM2UgxtNc/
=rNzv
-END PGP SIGNATURE-




  

Re: not in the list. Not in the tor network map.

2008-11-22 Thread Jon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Is there more information you could give.  For example, are you saying
that the nodes you are connected to are not in your network viewer list?

jed c wrote:
> Looking at my connections I noticed some are not in the list. Is
> this normal?
>
>
>
> --
>

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkkos1gACgkQk8jp5ZVximI4LACfSPC9+JeA7wUuf12vtOXxlLv+
r60AnA/Tu/ZL8jZBpJ+SbisM2UgxtNc/
=rNzv
-END PGP SIGNATURE-



Re: DoS attack

2008-11-22 Thread Roger Dingledine
On Wed, Oct 01, 2008 at 03:10:40PM +0200, Karsten N. wrote:
> the Tor node "gpfa" is for 10 hours target of a DoS attack.
> The attack is running on at the moment.

Hi Karsten,

How did this resolve? Hopefully it ended after a while?

Thanks,
--Roger



Re: swap and live CD

2008-11-22 Thread coderman
On Sat, Nov 22, 2008 at 5:48 AM, Matej Kovacic <[EMAIL PROTECTED]> wrote:
> ...
> But the problem is, that Ubuntu uses swap partition of the host machine.

this isn't much of a problem if you use encrypted swap with an
ephemeral / one time key. power off the host (and wait for DRAM to
drain :) and you should be in good shape.

if data remanence attacks are in your threat model you've probably got
bigger concerns about porting your OS around random hardware though.

regarding using the USB for full OS/swap: the duty cycle of flash
memory is significantly less than disk platters. if you can make use
of disk swap safely it would probably be useful to do so.  booting
from read only ISO media also provides some integrity benefit.

(8.10 supports LVM+LUKS which can provide the encrypted swap without
the key management headaches eCryptfs avoids.  and both take advantage
of hardware crypto acceleration in kernel so those with VIA padlock
cores and other crypto offload won't even notice the overhead!)

my $0.02

best regards,


Re: swap and live CD

2008-11-22 Thread dr . _no
Hi,

you should simply install Ubuntu on an USB stick, because it's 
simply a mass storage device like a HDD. 
I've done it with an 2 GB stick and SuSE Linux some time ago
without problems.
The USB sticks have a size of up to 64 GB, which is enough for a 
huge installation.

Regards,

Rolf

> -Ursprüngliche Nachricht-
> Von: "Freemor" <[EMAIL PROTECTED]>
> Gesendet: 22.11.08 15:30:26
> An: or-talk@freehaven.net
> Betreff: Re: swap and live CD


> On Sat, 22 Nov 2008 14:48:28 +0100
> Matej Kovacic <[EMAIL PROTECTED]> wrote:
> 
> > Hi,
> > 
> > Ubuntu 8.10 has an option to create live USB disk. It could be also
> > writable and you can install your own software.
> > 
> > So you can customize your portable USB stick, have your encrypted
> > private directory (https://wiki.ubuntu.com/EncryptedPrivateDirectory)
> > and install Tor.
> > 
> > But the problem is, that Ubuntu uses swap partition of the host
> > machine.
> > 
> > So, how to remaster live image in such a way, that live CD/USB will
> > not touch swap partition of the host machine?
> > 
> > Thx for any info.
> > 
> > Bye, Matej
> 
> Unless Ubuntu has done something strange it should just be a matter of
> removing any references to that partition from the /etc/fstab file so
> they don't get mounted. To be really sure you could remove the swapon
> commands from the appropriate /etc/rc files. 
> 
> You can use swapon -s to check what swap partitions are currently in
> use.
> You can use swapoff to turn off swap partitions manually (not
> permanent).
> 
> 
> -- 
> [EMAIL PROTECTED]
> [EMAIL PROTECTED]
> 
> This e-mail has been digitally signed with GnuPG - ( http://gnupg.org/ )
> 
> 




Re: swap and live CD

2008-11-22 Thread Freemor
On Sat, 22 Nov 2008 14:48:28 +0100
Matej Kovacic <[EMAIL PROTECTED]> wrote:

> Hi,
> 
> Ubuntu 8.10 has an option to create live USB disk. It could be also
> writable and you can install your own software.
> 
> So you can customize your portable USB stick, have your encrypted
> private directory (https://wiki.ubuntu.com/EncryptedPrivateDirectory)
> and install Tor.
> 
> But the problem is, that Ubuntu uses swap partition of the host
> machine.
> 
> So, how to remaster live image in such a way, that live CD/USB will
> not touch swap partition of the host machine?
> 
> Thx for any info.
> 
> Bye, Matej

Unless Ubuntu has done something strange it should just be a matter of
removing any references to that partition from the /etc/fstab file so
they don't get mounted. To be really sure you could remove the swapon
commands from the appropriate /etc/rc files. 

You can use swapon -s to check what swap partitions are currently in
use.
You can use swapoff to turn off swap partitions manually (not
permanent).


-- 
[EMAIL PROTECTED]
[EMAIL PROTECTED]

This e-mail has been digitally signed with GnuPG - ( http://gnupg.org/ )


signature.asc
Description: PGP signature


Re: RetroMessenger over Tor / TorMessenger

2008-11-22 Thread Nicky van Etten
This looks very very nice!
i hope it will be released for windows soon.

On Sat, Nov 22, 2008 at 12:18 PM, M. Peterson
<[EMAIL PROTECTED]>wrote:

> RetroMessenger has been released for linux
> http://retromessenger.sf.net
> Is there anything to make it working over Tor?
> Direct-Download:
>
> http://mesh.dl.sourceforge.net/sourceforge/retromessenger/RetroMessenger_V0.02-linux.tar.bz2
> Anyone tested already? i guess the library core has to be change to work
> over tor?
> Max
>



-- 
Ciphered/Signed email preferred!
GnuPG KeyID: 0x42435F30
GnuPG DSA2 KeyID: 0x23286031


swap and live CD

2008-11-22 Thread Matej Kovacic
Hi,

Ubuntu 8.10 has an option to create live USB disk. It could be also
writable and you can install your own software.

So you can customize your portable USB stick, have your encrypted
private directory (https://wiki.ubuntu.com/EncryptedPrivateDirectory)
and install Tor.

But the problem is, that Ubuntu uses swap partition of the host machine.

So, how to remaster live image in such a way, that live CD/USB will not
touch swap partition of the host machine?

Thx for any info.

Bye, Matej


Re: How I Learned to Stop Ph34ring NSA and Love the Base Rate Fallacy

2008-11-22 Thread Steven J. Murdoch
On Sun, Sep 28, 2008 at 12:27:11PM +, The23rd Raccoon wrote:
> This post performs some basic analysis of the utility of timing
> correlation attacks against a moderately used anonymous network,
> specifically with respect to the Base Rate Fallacy[1] of Bayesian
> statistics. Via that same analysis, it also for the first time begins to
> quantify the utility that additional users bring to a low latency
> anonymous network in terms of resistance to timing attacks.

George Danezis has discussed this post on his blog:

 
http://conspicuouschatter.wordpress.com/2008/09/30/the-base-rate-fallacy-and-the-traffic-analysis-of-tor/

Steven.

-- 
w: http://www.cl.cam.ac.uk/users/sjm217/


RetroMessenger over Tor / TorMessenger

2008-11-22 Thread M. Peterson
RetroMessenger has been released for linux
http://retromessenger.sf.net
Is there anything to make it working over Tor?
Direct-Download:
http://mesh.dl.sourceforge.net/sourceforge/retromessenger/RetroMessenger_V0.02-linux.tar.bz2
Anyone tested already? i guess the library core has to be change to work
over tor?
Max