Re: Help Iranian dissidents

2009-06-25 Thread Eugen Leitl
On Wed, Jun 24, 2009 at 07:02:32PM -0400, Bill McGonigle wrote:

  Step 2) Wait for Tor Project to do the technical work.
 
 There could be at least four reasons:
 
 1) they don't believe it.
 They're just throwing ideas at the wall, to see who will do free work
 for them.  They wouldn't spend a dime of their own money to do it.

I don't know who they are, but the only way to cook up a bunch
of throwaway Tor nodes and distribute them for creative installation
is someone who has the spare cash to buy a few hundred to thousand
pieces of hardware, and give them away. In the case of Sheeva, that's
some 10 kUSD for a 1000 units (probably less due to mass rebate).

I don't have such money, but since it was my idea, and Ubuntu already
supports the Sheeva I'm willing to plug an USB drive and set up a self
hosting environment to build a Tor package or a system image based on
Ubuntu if someone sends me a Sheevaplug.

However, it would be probably trivial to do that for a seasoned Tor
developer, and it's also an issue of trust. Would you accept system
images from random strangers?
 
 2) lack of capital
 They think it's a good idea, but don't have the funds to
 allocate/acquire the manpower to get it done.  If only they were better
 at raising money they'd get it done.
 Summer of Code, perhaps other outlets for these folks?
 
 3) ideological inefficiency
 They think it's a tor feature, Tor Project alone should do it, even if
 they have the capital and believe the business case.  I trust in
 individual self-interest too much to believe this is real.
 
 4) Confusion
 They'd do it themselves but it's not obvious what they need to do.
 Being opaque, they work on other things first.
 I suspect this is possible, so I started a wiki page that could, in a
 future form, be useful to this class:
   https://wiki.torproject.org/noreply/TheOnionRouter/EmbeddedTips

That is an excellent idea.

 It would be great if those with experience could add info/links here,
 especially architectural elements with broad commonality among potential
 targets.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


Re: Help Iranian dissidents

2009-06-25 Thread Marco Bonetti
On Wed, June 24, 2009 19:41, Bill McGonigle wrote:
 IIRC, somebody already did a tor mod for the first version.
Long time ago, I torified its traffic for fun:
http://sid77.livejournal.com/2007/07/16/
the problem with running a tor node directly on top of it is the limited
number of resources, at least on those old versions of the router.
(maybe I should try with a minimal openwrt... hmm...)

-- 
Marco Bonetti
BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/

My GnuPG key id: 0x86A91047



Re: Hetzner

2009-06-25 Thread Timo Schoeler

thus Hannah Schroeter spake:

Hi!


Hi,


On Thu, Jun 18, 2009 at 05:52:08AM +0200, Timo Schoeler wrote:


So am I, running a middle node. However, for months now I'm thinking of
reverting it to an exit node as the situation that everyone runs a
middle node, but no one dares to run an exit node just lets TOR die.


Hidden services will run very fine with only middleman and bridge nodes.


that's true, for sure. However, we create a parallel world doing this. 
From a metaphysical POV (IMHO), TOR is (partly) existing to defend 
civil rights. But to be able to do this, it must exist not only in a 
'parallel world'. Losing connection to 'this world' (today's internet) 
would mean to lose the 'war'.


Best,

Timo


Kind regards,

Hannah.




Re: Hetzner

2009-06-25 Thread Eugen Leitl
On Thu, Jun 25, 2009 at 10:28:23AM +0200, Timo Schoeler wrote:

 Hidden services will run very fine with only middleman and bridge nodes.
 
 that's true, for sure. However, we create a parallel world doing this. 

That's not a bug, it's a feature.

 From a metaphysical POV (IMHO), TOR is (partly) existing to defend 
 civil rights. But to be able to do this, it must exist not only in a 

The free, uncesored Intenet is dead. The sooner we acknowledge this,
and realize that we need an anonymizing publishing layer on top of
that the better. I keep harping about that since early 1990s. Surisingly
little has happened since.

 'parallel world'. Losing connection to 'this world' (today's internet) 
 would mean to lose the 'war'.

Things are never quite black and white. There is a network that is
censored and sniffed but also accountable, and hence less prone to abuse. 
On top of that you can have a network that anonymous/pseudonymous,
unaccountable, and slightly abusive.

There's a place for both of them to exist. 

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


Re: ShutdownWaitLength vs. 'restart' in init scripts

2009-06-25 Thread Roger Dingledine
On Tue, Jun 23, 2009 at 12:47:56AM -0400, Bill McGonigle wrote:
 I noticed a problem with the init script I have with the tor package on
 Fedora 10.

Is this with the tor rpm shipped by Fedora? We don't support (or use,
or like, or recommend) the fedora tor rpm.

  The 'restart' command (just a start and stop) sends a -INT
 to the running process, but doesn't account for ShutdownWaitLength.

Check out how the torctl that we ship in the rpms handles that:
https://git.torproject.org/checkout/tor/master/contrib/torctl.in
It basically kills it, and then tries to kill it even harder if it
doesn't die. That's probably not the right answer.

The right answer imo is how the deb package does it:
https://git.torproject.org/checkout/tor/master/debian/tor.init
Check out the wait_for_deaddaemon function: it basically checks each
second whether the process is still around, and returns when it's gone
(or 60 seconds have passed).

So I guess if you raise your ShutdownWaitLength, you'll want to tweak
the script. But that still seems better than the
kill -INT, sleep 1, kill -9 strategy the rpm uses.

Patches to the torctl script greatly appreciated. :)

 or, perhaps even better: fixing the server shutdown process so the old
 server can't take out the new server.

Can you clarify what happens here? 'tor stop' finishes but Tor is still
running, so then 'tor start' fails to launch a new Tor, and then the
old Tor exits, and then you have no Tor running but you think you do?

Thanks!
--Roger



Re: Hetzner

2009-06-25 Thread Timo Schoeler

thus Eugen Leitl spake:

On Thu, Jun 25, 2009 at 10:28:23AM +0200, Timo Schoeler wrote:


Hidden services will run very fine with only middleman and bridge nodes.
that's true, for sure. However, we create a parallel world doing this. 


That's not a bug, it's a feature.


I never said that it's a bug. I just said that if we drop the connection 
to the 'normal' internet we lost the fight. Things like the french 
revolution were without avail.


From a metaphysical POV (IMHO), TOR is (partly) existing to defend 
civil rights. But to be able to do this, it must exist not only in a 


The free, uncesored Intenet is dead. 


So, we already lost it.


The sooner we acknowledge this,
and realize that we need an anonymizing publishing layer on top of
that the better.


The problem is that TOR (and any other system accomplishing this target) 
excludes the 'masses', if one may say so.



I keep harping about that since early 1990s. Surisingly
little has happened since.

'parallel world'. Losing connection to 'this world' (today's internet) 
would mean to lose the 'war'.


Things are never quite black and white.


A few things are, some are not. Have you ever seen a girl being 'a 
little big pregnant'? ;)



There is a network that is
censored and sniffed but also accountable, and hence less prone to abuse. 
On top of that you can have a network that anonymous/pseudonymous,

unaccountable, and slightly abusive.

There's a place for both of them to exist. 


True.

Timo


Re: Hetzner

2009-06-25 Thread Eugen Leitl
On Thu, Jun 25, 2009 at 10:50:08AM +0200, Timo Schoeler wrote:

 I never said that it's a bug. I just said that if we drop the connection 
 to the 'normal' internet we lost the fight. Things like the french 

It is more useful as seeing it as two unrelated networks. That
one is implemented as a virtual layer on top of another isn't
that relevant.

The point is that you can use two (or more, such as
you can use IPv4 and IPv6 on dual-stack setups, and VPNs) 
networks simultaneously.

 The free, uncesored Intenet is dead. 
 
 So, we already lost it.

If you want to see it in such stark terms, yes. However, it's still
perfectly possible to access and publish information uncensored.
Our task should be to remove the friction, to make it easier for
people.

So far, operating anonymizing networks like Tor isn't illegal in
most locations, yet. Where it is illegal (frequently, by use of
unconstituional laws, which makes it high treason, and explicitly
allowing armed resistance if everything else fails in some constitutions,
like e.g. the German Grundgesetz), it is of course morally permissible
to use guerilla tactics.

A simple solution for that case would be to use a self-propagating Tor 
worm, which infects systems, causes a fraction of them to become middleman and
others exits. Such a system would be self-propagating, and trying
to shut the nodes down would resemble a game of whack-a-mole. 
 
 The problem is that TOR (and any other system accomplishing this target) 
 excludes the 'masses', if one may say so.

In totalitarian countries, where means of publishing (such as xerox
machines) were outlawed a small fraction was still capable obtaining
censored information.

Resistance in face of state threats isn't for the weak of heart.
If anonymous access is made illegal I don't expect more than 1-5%
of the population of using it.

-- 
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE


nanog tor talk

2009-06-25 Thread Andrew S. Lists
FYI, there is a brief flare up of discussion on the North American
Network Operators' Group (NANOG) mailing list about Tor. If interested,
the thread in the web accessible archives kicks off here -

http://mailman.nanog.org/pipermail/nanog/2009-June/011485.html

-Andrew


Re: many new relays

2009-06-25 Thread Phil

--- On Wed, 6/24/09,

 150% jump, in such a short time. Not
 sure
 I'd welcome that so soon. I don't have a copy
 of the old cache files from before the jump
 began. But if someone does, consider putting
 them up on a filehost or analyzing it a bit more.
 This really should be looked at in more detail
 before chalking it up to .ir or friendlies. And
 how does this correspond to prior slashdot/digg
 jumps.
 
 netblock/isp/hostname/whois/country
 platform
 nickname
 policy
 bandwidth
 contacts
 uptime
 etc
 

No discussion or comments on this?  What does it mean?


  


Re: nanog tor talk

2009-06-25 Thread Andrew Lewman
On 06/25/2009 02:45 PM, Andrew S. Lists wrote:
 FYI, there is a brief flare up of discussion on the North American
 Network Operators' Group (NANOG) mailing list about Tor. 

And Steven Bellovin replied,
http://mailman.nanog.org/pipermail/nanog/2009-June/011521.html and
started a new thread,
http://mailman.nanog.org/pipermail/nanog/2009-June/thread.html#11521


-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://torproject.org/
Blog: https://blog.torproject.org/
Identica/Twitter: torproject


Re: ShutdownWaitLength vs. 'restart' in init scripts

2009-06-25 Thread Bill McGonigle
On 06/25/2009 04:39 AM, Roger Dingledine wrote:

 Is this with the tor rpm shipped by Fedora?

yes

 We don't support (or use,
 or like, or recommend) the fedora tor rpm.

OK.  Is this ideological, or because it's no good?  I can work to fix
the latter (I don't think anybody at Fedora wants a bad RPM).  In my
experience automatic security updates [aside: which are currently borked
for the Fedora tor package, but that's another story, which I think I've
gotten the right people to resolve at this point] are worth many
trade-offs.  People just don't do security updates the way we wish they
would.

 The right answer imo is how the deb package does it:
 https://git.torproject.org/checkout/tor/master/debian/tor.init
 Check out the wait_for_deaddaemon function: it basically checks each
 second whether the process is still around, and returns when it's gone
 (or 60 seconds have passed).

this makes sense.

 So I guess if you raise your ShutdownWaitLength, you'll want to tweak
 the script. But that still seems better than the
 kill -INT, sleep 1, kill -9 strategy the rpm uses.

agreed, do you see any reason not to extract ShutdownWaitLength from the
config file?

 or, perhaps even better: fixing the server shutdown process so the old
 server can't take out the new server.
 
 Can you clarify what happens here? 'tor stop' finishes but Tor is still
 running, so then 'tor start' fails to launch a new Tor, and then the
 old Tor exits, and then you have no Tor running but you think you do?

OK, so to be more clear:

Let's call the old tor process we're taking down torA and the new one we
want torB.

1) torA is sent an INT to tell it to stop.  It begins its shutdown process.
2) The init script isn't waiting or watching, so it starts torB.
Because torA is no longer bound to its listener port, torB can start up
just fine. The init script is out of the picture now.
3) torA reaches ShutdownWaitLength time.  It kills itself.  ---guess
4) torB gets taken out by torA's final shutdown.

At this point the init script's lockfiles reflect torB running, when
actually no tor is running.  So it behaves inappropriately.

I realize there's no point in addressing the current Fedora RPM init
script here, but assuming 4) is correct, it would seem that however torA
is finding torB, it shouldn't do it that way.

-Bill
-- 
Bill McGonigle, Owner   Work: 603.448.4440
BFC Computing, LLC  Home: 603.448.1668
http://www.bfccomputing.com/Cell: 603.252.2606
Twitter, etc.: bill_mcgonigle   Page: 603.442.1833
Email, IM, VOIP: b...@bfccomputing.com
Blog: http://blog.bfccomputing.com/
VCard: http://bfccomputing.com/vcard/bill.vcf