Re: Re: Re: My tor exit node is STILL gone from the node list

2009-08-04 Thread Alexandru Cezar
Hi list, hi Lee,

> > It at least shouldn't be a problem for TOR, because it has worked with that
> > setup for months.
> Unless you know for sure that nothing has changed on the path between
> your server and all the directory servers you don't know if path MTU
> discovery being broken (if it really is) is a new problem or not.

I have again spoken to my ISP and they say routing is fine.

> What all do the directory servers need to do/see before marking your
> server as a good exit?  It'd be nice to know what they can't do that's
> keeping your server from being marked as a good exit..

I'm interested in that as well. I still cannot get it to be flagged
'Running' reliably.
Would TOR logging on my side help on this? I guess not?

Appreciate any help, I'm sure you don't mind getting 4MB/s exits back. ;-)



Alexandru



--
-
www.posta.ro - Romanias first free webmail since 1998!

_
 - powered by www.posta.ro




Planning to build private network

2009-08-04 Thread t talk
I am currently planning to build a private TOR network for 50 users.  The
goal of the network is to provide anonymous browsing and access to hidden
services for the group while trying to avoid the low speeds seen in the
public network.  The users will not be using the the network for
file sharing or high bandwidth applications like streaming media.  The group
currently uses the public network, and 12 are hosting relays.  The main
complaint from the group is that the public network is too slow for
comfortable use of some internet applications. (No big surprise)
I have a few questions.

1) Will a private network address the speed concerns if built properly?  I
have read considerable amounts on the subject of TOR's speed, and understand
that the number of relays is not the overriding concern.

2) If the answer to 1 is yes (i believe it is), what would be
the optimum number of relays to ensure privacy and speed? Is there
a formula that determines the number of relays need for X number of users,
with a say a 3 hop path? What about hidden services?  If there a rule of
thumb for determining the number of exits to relays?

3) What would the minimum specs of a individual relay be? How much bandwidth
per relay should we strive for?

4) Assuming we build it properly, and do not abuse it, what kind of speeds
can we expect from the network?


Thanks

-T


RE: Please help me test my hidden service

2009-08-04 Thread downie -







I've tried a few times since you posted to reach this site, without success - 
'Domain does not resolve'. Tor 0.2.1.18 is the client, and I can reach the 
Hidden Wiki (on the second attempt at least).

GD
> Date: Mon, 3 Aug 2009 16:42:57 -0400
> From: 2600den...@gmail.com
> To: or-talk@freehaven.net
> Subject: Please help me test my hidden service
> 
> Hey Folks,
> 
> I posted a while ago saying I was making a how-to manual for newbies on
> how to set up (reasonably) secure hidden services. I'm almost done but I
> want to release my server for testing to see if I missed anything
> obvious. This is a pretty standard LAMP install running in a virtual
> machine. The OS is Ubuntu on both.
> 
> The site is at http://76jejbkd7gtm5jbb.onion
> 
> There's a drupal install at /drupal and a wordpress install (currently
> not working due to forwarding issues) at /wordpress.
> 
> Feel free to poke around all you want, just please don't do anything
> that would stop other users from accessing the machine such as DoS
> attacks. If you somehow break through, please stay off my home network ; )
> 
> I haven't allowed users to add content because... well.. you know what
> would happen with that in onionland. If you want to add content just
> throw me an email and I'll make you an account. I figure that way I have
> somebody to blame if stuff goes horribly wrong. My PGP key is included
> if you roll that way.
> 
> I'm also interested to hear people's ideas on how exactly to test the
> security of this server without handing out shell logins (or is that
> exactly what I should do?).
> 
> Any feedback is appreciated.
> 
> Thanks,
> Ringo
> 
> 
> -BEGIN PGP PUBLIC KEY BLOCK-
> Version: GnuPG v1.4.9 (GNU/Linux)
> 
> mQGiBEniUKIRBADfn8kULsRd3si+zPnVbeVp4C/cjxfOxvPURPjRMDPRZPuDuEI5
> QIiMP+lZs0Y1BS/zubrwJ/R+knZW0dfkCbd0IBqhtcci4ZiDXRCNxxYow0MysweG
> sbZE0QY4T2u40ffOLs9m/ENiDebUxknTyAg8/Jim9aBdEDgurCc7HCX+iwCghfLh
> 1POMWQRkXB4zUmXQfp+u+0MD/j5SUN6ct6fH4ex3L/WeIHRA+PZXBEpQv5HCwcYO
> 9VAtS0KYTtrBePXuhabjmiyhWIVsPHa8A+5RW3ONkK4gQ71E7sh2nu44p0rOSVkz
> 9/ZQiHVCjxZJNhvCsabIFT2/G8OFo2XPnJ0+8Gfluueb5a/HKArUWHIvkws82kQ5
> 75RJBACJp436/Bvk/CpKDkIG8v/4dQkyNKhv5AEAbx3jNjdOAxNSK0tBaQAulgCk
> GFNkk+wpv6OWaawgQzFh71KvmEswSLObXk+S6WZgC+Epy4XmfzzDG/gIHD0VuBQ+
> 2D8JzFT/TiDMu6wdYu4kgDg5sO4a5Yzn7xoYMF5YWzXnPKhXi7QacmluZ28gPHJp
> bmdvQGhhY2tibG9jLm9yZz6IZgQTEQIAJgUCSeJQogIbIwUJAeEzgAYLCQgHAwIE
> FQIIAwQWAgMBAh4BAheAAAoJEFUc7QiIWsvrdtkAn3KtPdxxC/qWmmIFZ4Nc4cFE
> as42AJoDwdk/N9I3sPvc91wTTlbsKhoHLrkEDQRJ4lCiEBAAs2JYGr1k1Dgi3DMy
> h0ziX+22tIWWyIJoGKWKFspA7nGeniOBodLBvR+POtqqGCh+bkm9I0X/YMF9oVcP
> xXBql7H6E4JSgtCk7xtohDpLlfcCpsddVxcJdXYLynTUMcmJtCER0bCNIkTmYoV7
> uNXAqmUNAp4zaI70yWsidpAVHme0+sBUYNinfBdlcaMddzslbDtRV7yGKgvW3E5e
> hPNTJ0pWF6WJg4VsEOFoP7pldtQ4YWScskvuCk957K4t4Of3QZs13Nn9sQZleFJU
> E2L1bxEHuSqY/f1F/pbKmc7in8qkoBBAyhUbzCNxxELdof3uJpBy0pw0468GvSyb
> Z4jyh2XFvxFFAcelzc453y9GOylIC0OQczkrzOa6QrIWQSmeCzn/byjLoi+TRFve
> usRmJn5H9MJg+k+mG5LJM2mcyQJU2UOPDvSurKmk50vByBED6Qn5CvhXJp18H6Uk
> 2r+PICG4h8aN9KZpSrMAqYggyKgAxHTlCaQzGCwvJGiX6lx6iIm2GLoqeHdRHZZX
> 9XognVcbTwUWJkL0LR9nhm5U0GhFGM9eRdLw89C/Z/s1/Q/QLjoDh60qXcYo+vFS
> 5bJtiT52HnlA002opyi+Zn5mk9aXQiksOJruIdNw1rvJSe+uAIYQeBv+rinxzAyL
> 4f/p/+vvgnfgkEc2G1hLuGTvWMsAAwYP+gIhIgQ6UwQ0Bu1gyRN88Gs9H0fnQ74Z
> RmFXDgUtpn1YrFzFfTNegQh8vvgo1pXV4ZDPc0w9Cs8QHrspnkYrvSymAEmwYtGd
> nvnAVVROIJfN5d140Z1FJXCgFp/3m2SAX1omYyN3/5WX9ef1uaYWub48kSdqfHlr
> xe8Z15nXQ9E6WMgDtP5jXpfCkAnweW6/WSGRrHlRyBUevCTyRSZ4dwtim0GHsls9
> VbfDYWJVxiKWdgjtjg+PfsXrdQG2KICEHXprS9/tYCheWaHP4couXVHDPUNMGK/w
> HSYXbr0/xA0i0JHpRzVCDweKZ32hgbYkTXp0U7ArBYLtbfpWlB8uWHFFAIS5yJQL
> YMwc8/qFCgl5fUGMk4ZLTgbftQo/sfcOAIPQl2nVjhnvzucj8PgBBaJgH9ORTpW6
> 89zIzOtfXfju0dq4LC6Xj4h6SA/duh8dEiBzewNJ1FwnlrywvaQjsVdx5+5RolAk
> gZKcT4hHCj+s2vCAyF5R70rfKkZkKhMuUzEWc4R4AzbkmI1eTtEl/FJVCzBsJRan
> HC+YMgCdf2ujTxvBltytpWrs0nvzFVY6+RyihQsqlV6KeOtDBTv38a8Q5gdARK0j
> 5og+X3SWHW0p29PSKk6a3NeSB08J0wlXsrNOJ/JXlYw/yIifZdgl6fO8V7rPBoQt
> xIQB5UKSXj8YiE8EGBECAA8FAkniUKICGwwFCQHhM4AACgkQVRztCIhay+vXkQCf
> beWbtPmJOWbXn+9LEaJTqcN73REAn2MmtesdDs24QjWfZeTfc8dyEZ2n
> =O0oE
> -END PGP PUBLIC KEY BLOCK-

_
Get free photo software from Windows Live
http://www.windowslive.com/online/photos?ocid=PID23393::T:WLMTAGL:ON:WL:en-US:SI_PH_software:082009

DKIM problem (was: Tor on Ubuntu Jaunty)

2009-08-04 Thread Sebastian Wiesinger
* Ted Smith  [2009-08-04 17:28]:
> On Tue, 2009-08-04 at 16:24 +0200, gabrix wrote:

Hi,

sorry to use the list for this, but I can't see gabrix' mail address.

Dear gabrix,

could you please fix your DKIM configuration (enter a key in your DNS
or remove the DKIM signature from your mails). Because right now my
mailserver doesn't accept your mails because it can't get your DKIM
key:

alita dkim-filter[914]: n74I9fJO017279: key retrieval failed (s=stigmate, 
d=gabrix.ath.cx)

sm-mta[17279]: n74I9fJO017279: Milter: data, reject=451 4.3.2 Please try again 
later

$ dig stigmate._domainkey.gabrix.ath.cx TXT
stigmate._domainkey.gabrix.ath.cx. 60 IN CNAME  gabrix.ath.cx.

$ dig gabrix.ath.cx TXT
$


Thanks,

Sebastian

-- 
GPG Key-ID: 0x76B79F20 (0x1B6034F476B79F20)
'Are you Death?' ... IT'S THE SCYTHE, ISN'T IT? PEOPLE ALWAYS NOTICE THE SCYTHE.
-- Terry Pratchett, The Fifth Elephant


Re: copyright abuse through tor

2009-08-04 Thread doc.kuehn
Jan Suhr schrieb:
> Hi doc!
> We, the German Privacy Foundation, regularly receive several of such
> requests regarding file sharing. Usually we reply the requestor
> explaining that the IP address belongs to one of our Tor servers. Also
> we explain what Tor is and that we don't have any logs thus could not
> answer their request.
> I would advice you to send them a similar reply. Lets see if this is
> sufficient. Otherwise it could be important to prove that you are
> running a Tor server (I understood you are running it at home?)
yes, the server runs at my home
> . But
> lets see...
>
> Please feel free to contact me directly to prepare a specific answer or
> discuss the further procedure.
>
> Best regards
> Jan
>
>   
Hello Jan,
first, many thanks for your response and to offer your help.
Let me explain the current state regarding the abuse: since saturday i'm
in contact with a lawyer from the CCC, who provided to help me. He wrote
a letter to the lawyer's office wich accused me, appending a status from
the server descriptors for the said day of abuse. Furthermore he
appended a mail from an employee of the torproject, confirming that my
ip was running a tor-exit node. Now we are waiting for an answer from
the lawyer's office.

So far i realised: it's not enough to say 'i'm running a tor-exit node',
you must proof that a tor-node was / is running on a given ip.

On this way, many thanks and regards to CCC for the fast help!
Jan, i will write you a personal mail in correlation to this issue

Once again, sorry my bad english


Re: VoIP telephony building like Tor

2009-08-04 Thread Alexander Cherepanov
Hi Praedor!
On Tue, 4 Aug 2009 09:58:04 -0400, Praedor Atrebates  wrote:

> Sigh.  Tor is political by its very existence and design.  It is NOT a neutral
> entity.  Its very existence is for political reasons.

It's a matter of terminology. I hope we all (subscribers of this list)
can agree on some technical goals such as anonymity, untraceability,
privacy, access to blocked sites. This is relevant for design of Tor, 
its operation, configuration of Tor, Privoxy etc. Call it political or 
not.

OTOH discussions about government, is it totalitarian or is it behind 
some journalist murders etc., are very flammable and adds _nothing_ 
valuable to technical side. 

If you have better term for this instead of 'political' please 
propose. Maybe 'non-technical'?

Alexander Cherepanov




Re: copyright abuse through tor

2009-08-04 Thread Jan Suhr
Hi doc!
We, the German Privacy Foundation, regularly receive several of such
requests regarding file sharing. Usually we reply the requestor
explaining that the IP address belongs to one of our Tor servers. Also
we explain what Tor is and that we don't have any logs thus could not
answer their request.

I would advice you to send them a similar reply. Lets see if this is
sufficient. Otherwise it could be important to prove that you are
running a Tor server (I understood you are running it at home?). But
lets see...

Please feel free to contact me directly to prepare a specific answer or
discuss the further procedure.

Best regards
Jan

-- 
Jan Suhr
German Privacy Foundation e.V. https://www.privacyfoundation.de/
Anonymous e-mail: https://www.awxcnx.de/jansuhr.msg


Project Introduction: ARM

2009-08-04 Thread Damian Johnson
Hi, throughout the summer I've been on a project called 'arm' (anonymizing
relay monitor). It's a terminal monitor for Tor relays providing
bandwidth/cpu/memory usage, relay configuration, event log, connection
details, etc. The project is intended for command-line aficionados, ssh
connections, and anyone stuck with a tty terminal for checking their relay's
status. More information (including screenshots) is available at '
www.atagar.com/arm'. If this strikes your fancy you can snag a copy of the
project with:
svn co https://tor-svn.freehaven.net/svn/arm/trunk/

I hope others find it a handy utility. It should be stable so if you manage
to make it crash (or have a feature request) then please let me know! Email
is best but I'm also usually on the Tor irc channels (my nick is 'atagar').
However, I'm about to head off to the PETS conference so I might be a little
slow to respond the next few days. Cheers! -Damian


Re: Tor on Ubuntu Jaunty

2009-08-04 Thread Ted Smith
On Tue, 2009-08-04 at 16:24 +0200, gabrix wrote:
> Ted Smith ha scritto:
> > On Tue, 2009-08-04 at 08:49 +0200, Matej Kovacic wrote:
> >> Hi,
> >>
> >> I added APT line for Ubuntu Jaunty Tor installation:
> >> http://mirror.noreply.org/pub/tor jaunty
> >>
> >> I also added GPG key of Peter Palfrader (key ID=94C09C7F).
> >>
> >> However, I got this error:
> >>
> >> W: GPG error: http://mirror.noreply.org jaunty Release: The following
> >> signatures were invalid: KEYEXPIRED 1217637003 KEYEXPIRED 1217637003
> >> KEYEXPIRED 1217637003 KEYEXPIRED 1217637003
> > 
> > You have to add this to your Apt keyring, not your personal keyring. Did
> > you do that? You should probably be using the apt-key program.
> 
> gpg --keyserver pgp.gabrix.ath.cx --recv-keys 17637003
> gpg -a --export 17637003 | sudo apt-key add -
> sudo apt-get update
> 
> The above is if 1217637003 is the key but it doesn't look like ...
> OK ?

You can also just do:

sudo apt-key adv --recv-key  --keyserver 

to put the key directly into apt's keyring.



signature.asc
Description: This is a digitally signed message part


Re: Which proxy to use?

2009-08-04 Thread gabrix
coderman ha scritto:
> On Sat, Aug 1, 2009 at 9:19 AM, Mr. Blue wrote:
>> My requirements are:
>>
>> 1) It must have privoxy's functionality: hide-tor-exit-notation header 
>> filter to remove the Tor exit node notation in Host and Referer headers.
> 
> exit notation as used this way is a deprecated feature. it will be
> removed at some point. you really want the controller to direct an
> exit for you, if you need it, rather than some mangled domain names
> implying the choice.
> 
> 
>> 2) Must be capable to run as a reverse proxy.
>> ...
> 
> what are you trying to do, exactly?
> 
> best regards,
> 
> 
I think he's trying to hide the fact is using tor to access sites might
have blacklisted tor exit nodes or simply just hide he's using tor .

Gab

-- 
pub   1024D/80231A90 2008-07-01
Key fingerprint = 54AC C632 B35E FB9B 6D9F  108D DBE6 5425 8023 1A90



signature.asc
Description: OpenPGP digital signature


Re: Which proxy to use?

2009-08-04 Thread Mr. Blue


- Original Message -
From: coderman 
To: or-talk@freehaven.net
Date: Tue, 4 Aug 2009 08:03:14 -0700
Subject: Re: Which proxy to use?

> On Sat, Aug 1, 2009 at 9:19 AM, Mr. Blue wrote:
> > My requirements are:
> >
> > 1) It must have privoxy's functionality: hide-tor-exit-notation header 
> > filter to remove the Tor exit node notation in Host and Referer headers.
> 
> exit notation as used this way is a deprecated feature. it will be
> removed at some point. you really want the controller to direct an
> exit for you, if you need it, rather than some mangled domain names
> implying the choice.


I see, so I must stop using it and start choosing exit node by controler?
Do you mean sending directives to tor on port 9051?
If it is so, then just give me a link to doc, on that and I will rewrite my PHP 
app.

> 
> 
> > 2) Must be capable to run as a reverse proxy.
> > ...
> 
> what are you trying to do, exactly?


I wana have ONE proxy app installed
Well, curently, I am using privoxy, which achieves a) exit notattion striping, 
but it can not act as a b) reverse proxy.

So I need proxy with ability for both things, as said.



  


Re: Which proxy to use?

2009-08-04 Thread coderman
On Sat, Aug 1, 2009 at 9:19 AM, Mr. Blue wrote:
> My requirements are:
>
> 1) It must have privoxy's functionality: hide-tor-exit-notation header filter 
> to remove the Tor exit node notation in Host and Referer headers.

exit notation as used this way is a deprecated feature. it will be
removed at some point. you really want the controller to direct an
exit for you, if you need it, rather than some mangled domain names
implying the choice.


> 2) Must be capable to run as a reverse proxy.
> ...

what are you trying to do, exactly?

best regards,


Re: Which proxy to use?

2009-08-04 Thread Mr. Blue
What?
No one knows or...?



--- On Sat, 8/1/09, Mr. Blue  wrote:

> From: Mr. Blue 
> Subject: Which proxy to use?
> To: or-talk@freehaven.net
> Date: Saturday, August 1, 2009, 9:19 AM
> My requirements are:
> 
> 1) It must have privoxy's functionality:
> hide-tor-exit-notation header filter to remove the Tor exit
> node notation in Host and Referer headers.
> 
> 2) Must be capable to run as a reverse proxy.
> Will be used in front of Web server
> Like: 
> reverse proxy IP 5.5.5.5
> http server IP 10.10.10.10
> And it is imperativ that, to client, web page looks
> completely, like it has been served directly from IP 5.5.5.5
> based on all headers. (striping needed?)
> Basically reverse proxy and firewall are on one IP that
> shall be requested by others and all others services on
> other IPs, like web on one IP and database on second
> IP/machine etc...
> 
> 
> Which proxy is best for this?
> And for that recommended proxy, could I get a working
> config(someone copy paste snips from theirs config that is
> already using this) to achieve 1) and 2) with coments for
> each line?
> 
> Thx in advance!


  


Re: Tor on Ubuntu Jaunty

2009-08-04 Thread gabrix
Ted Smith ha scritto:
> On Tue, 2009-08-04 at 08:49 +0200, Matej Kovacic wrote:
>> Hi,
>>
>> I added APT line for Ubuntu Jaunty Tor installation:
>> http://mirror.noreply.org/pub/tor jaunty
>>
>> I also added GPG key of Peter Palfrader (key ID=94C09C7F).
>>
>> However, I got this error:
>>
>> W: GPG error: http://mirror.noreply.org jaunty Release: The following
>> signatures were invalid: KEYEXPIRED 1217637003 KEYEXPIRED 1217637003
>> KEYEXPIRED 1217637003 KEYEXPIRED 1217637003
> 
> You have to add this to your Apt keyring, not your personal keyring. Did
> you do that? You should probably be using the apt-key program.

gpg --keyserver pgp.gabrix.ath.cx --recv-keys 17637003
gpg -a --export 17637003 | sudo apt-key add -
sudo apt-get update

The above is if 1217637003 is the key but it doesn't look like ...
OK ?

Gab

-- 
pub   1024D/80231A90 2008-07-01
Key fingerprint = 54AC C632 B35E FB9B 6D9F  108D DBE6 5425 8023 1A90


0x80231A90.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature


Re: VoIP telephony building like Tor

2009-08-04 Thread Praedor Atrebates
Sigh.  Tor is political by its very existence and design.  It is NOT a neutral 
entity.  Its very existence is for political reasons.

On Monday 03 August 2009 06:19:23 pm Alexander Cherepanov wrote:
> Hi Scott!
>
> On Wed, 29 Jul 2009 02:16:29 -0500 (CDT), Scott Bennett  
wrote:
> >  On Sat, 25 Jul 2009 22:04:11 +0400 "Alexander Cherepanov"
> >
> >  wrote:
> >>You wrote to or-talk@freehaven.net, "Vlad \"SATtva\" Miller" 
 on Sat, 25 Jul 2009 06:59:43 -0500 (CDT):
> >>>  On Sat, 25 Jul 2009 18:12:52 +0700 "Vlad \"SATtva\" Miller" 
 wrote:
> James Brown (25.07.2009 00:16):
> >>
> >>[skip]
> >>
> > Very many Russian people were killed, unlawful arrest or simply
> > disappear last 4 - 5 years from activity our new Government...
> 
> Please, please, keep political FUD off the list.
> >>>
> >>>  Given that what he wrote is about a) events reported in the press
> >>> internationally and b) one of the highest priority justifications for
> >>> having a tor development project in the first place, *your* comment
> >>> would appear to be a non sequitur.  Perhaps you should have changed
> >>> your Subject: line to reflect whatever OT issue you wished to discuss
> >>> instead of what was already being discussed.
> >>>  The OP has requested information, and several of us now have tried
> >>> to find information that he might be able to use to his advantage in
> >>> the situation he believes he faces.  If you have additional information
> >>> along these lines, please post it.
> >>
> >>I'm sure that Vlad is happy to see the ongoing discussion of technical
> >>questions raised by the OP. He just asked to keep political FUD off
> >
> >  He gave no such indication in the single line of text that
> > constituted his followup and to which I was following up.
>
> Ok, I cannot guarantee that he is happy about technical questions:-)
> But he clearly toalks about non-technical points.
>
> >>the list. And I'm completely agree with him, IMHO unfounded (and
> >>founded probably also:-) talks about bloody regime are not for this
> >>mailing list. YMMV.
> >
> >  Please reread what I wrote that you have quoted above.  It doesn't
> > matter whether you support or oppose the OP's political views.
>
> Sure. But only while he keeps his political views for himself and
> doesn't bring them to this list.
>
> > The point
> > is that the OP made apparent reference to events reported both in the
> > press in Russia and in the international press as a reason *he* was
> > afraid and wanted to use tor.  That should be more than sufficient
> > information for anyone on this list to understand the OP's motivation for
> > asking his questions.
>
> Just to be sure: you talk about banning Skype? No problem here, it's a
> valid concern, it's in the news, in the press, on TV etc.
>
> The problem is the rhetoric such as quoted at beginning of this mail.
> OP started the thread talking about bloody regime. IMHO it already is
> beyond the acceptable line. But then he continues about killed people
> etc. in the following mails. That very much brings the politics to the
> list and adds nothing to the technical side of discussions.
>
> >>As for banning Skype in Russia, AFAICT it's FUD also. Everything seems
> >>to be based on some discussions in The Russian Union of Industrialists
> >>and Entrepreneurs (just hysterics by mobile operators loosing market
> >>share?). It's somewhat troubling but I'm not sure it's worth much
> >>discussion until there are some concrete details.
> >
> >  Fair enough.  However, if Phil Zimmermann had waited until the FBI
> > had its Carnivore system up and running, along with further development
> > already in progress, we probably would never have gotten PGP or its
> > successors.  He dropped all of his paying work for many months in order
> > to design, code, test, and release PGP 1.0, all justified *in his own
> > mind* on the basis of what he had heard or read that the FBI was talking
> > about doing.
>
> One doesn't need to wait for additional reasons to switch away from
> Skype. It's proprietary and closed technology with all accompanying
> problems. BTW last news are about eBay possibly closing Skype entirely
> which is quite in line with its proprietary nature. So no question
> here.
>
> If someone is concerned about possibility of banning Skype or VoIP in
> general s/he can start with research how VoIP is banned in those
> countries in which it's already banned. There are some examples in
> http://en.wikipedia.org/wiki/VoIP#Legal_issues .
>
> >>What the OP proposes is also somewhat strange. Build the possibility
> >>to "call to ordina[r]y telephones" into Tor? Sure, just add some PSTN
> >>exit nodes...
> >
> >  Yeah, well, that is certainly unnecessary.  Specific applications
> > should be developed outside of tor by interested parties.  I already
> > worry that tor itself will become too large and complex to be kept safe
> > to use. There are already various telephone appl

Re: Tor on Ubuntu Jaunty

2009-08-04 Thread Ted Smith
On Tue, 2009-08-04 at 08:49 +0200, Matej Kovacic wrote:
> Hi,
> 
> I added APT line for Ubuntu Jaunty Tor installation:
> http://mirror.noreply.org/pub/tor jaunty
> 
> I also added GPG key of Peter Palfrader (key ID=94C09C7F).
> 
> However, I got this error:
> 
> W: GPG error: http://mirror.noreply.org jaunty Release: The following
> signatures were invalid: KEYEXPIRED 1217637003 KEYEXPIRED 1217637003
> KEYEXPIRED 1217637003 KEYEXPIRED 1217637003

You have to add this to your Apt keyring, not your personal keyring. Did
you do that? You should probably be using the apt-key program.


signature.asc
Description: This is a digitally signed message part


Re: Please help me test my hidden service

2009-08-04 Thread Nils Vogels
Hi Scott,

On Tue, Aug 4, 2009 at 10:26 AM, Scott Bennett wrote:
>     For that matter, it's probably best *not* to run most kinds of hidden
> services on tor relays precisely because tor relays are well known through
> the directory.  Running a hidden service on a client-only tor would be the
> safest way because clients are not listed anywhere as such.  There might be
> a place for running a hidden service on a bridge, but it would have to be
> for something not terribly dangerous to the hidden service operator because
> bridges *are* known to the bridge authorities and thus must be considered to
> be listed somewhere.  Something like a web service that is also accessible
> directly and publicly and that presents no known danger to its operator (e.g.,
> the various tor status pages) can reasonably be run on a tor relay node,
> a bridge, or a client.

Just trying to figure out what you are saying here:

A hidden service has it's own identifier and to my knowledge, there is
no link between the hidden service and the node that is running it,
you seem to suggest otherwise?

If there is a link between the hidden service and the node that is
running it, then I wonder how *hidden* a hidden service actually is
... since at that point it is just "a service running on node x" and
the term hidden service would be kind of deceiving.

Just because the node running it is a relay or a bridge, does that
make it less hidden? If there is no link between the service and the
node, I don't see how.

Greetings,

Nils
-- 
Simple guidelines to happiness:
Work like you don't need the money,
Love like your heart has never been broken and
Dance like no one can see you.


Re: frequent empty/closed connections

2009-08-04 Thread Scott Bennett
 On Mon, 03 Aug 2009 09:21:53 -0400 The Doctor 
wrote:
>Scott Bennett wrote:
>
>> Empty server or forwarder response.
>> The connection has been closed but Privoxy didn't receive any data.
>...
>>  Does anyone else get these, too?  I suspect that the problem may be in
>> privoxy, rather than tor, but haven't yet figured out a test for that
>> hypothesis.  Any ideas?
>
>I've been seeing this behavior off and on for a few months now, but not
>so often that I felt like tracking it down.  Generally, I just reload
>the page and everything's fine.
>
 Sometimes it takes several reload attempts to get it to work, though.
It also thoroughly bollixes automatically refreshed pages like the small
GOES East images I like to keep handy and updated to most recent half hour.
Any other automated accesses, such as through curl, wget, et al. are also
screwed when it happens.
 If someone has an idea of how to prove that the problem is in privoxy
and not in tor, I can try to file a bug report there.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: Please help me test my hidden service

2009-08-04 Thread Ringo
"For that matter, it's probably best *not* to run most kinds of hidden
> services on tor relays precisely because tor relays are well known through
> the directory.  Running a hidden service on a client-only tor would be the
> safest way because clients are not listed anywhere as such."

I actually thought the opposite was true. If somebody is running a
hidden service that's transferring lots of data, somebody listening to
their connection would be able to tell that lots of traffic was going
through the Tor network. If this person had a middleman relay, this
would be easy to explain. I guess it depends on the person's situation.

Thoughts?

"Best you learn how to protect your butt *before* opening it up to the
> world, no?  Have you thought about running your service inside a jail or a
> virtual machine?  That would make it much easier to wall it off from the
> rest of your computer and home network."

It's inside a virtual machine and the account it's using on the host
machine has been limited fairly well IMO.

>  A jail or a VM can certainly help you there by limiting the ability
> of shell accounts to access the world at large, especially when combined
> with the application of a decent packet filter on the host system.

Something deep inside me says it would be a horrible idea to give out
shell access but it's in a virtual machine (which I'm not attached to if
I lose) and the host firewall won't let it send anything out that
doesn't go through Tor. Maybe it wouldn't be so dangerous after all.

Solidarity,
Ringo


Re: Please help me test my hidden service

2009-08-04 Thread Scott Bennett
 On Mon, 03 Aug 2009 16:42:57 -0400 Ringo <2600den...@gmail.com>
wrote:
>I posted a while ago saying I was making a how-to manual for newbies on
>how to set up (reasonably) secure hidden services. I'm almost done but I
>want to release my server for testing to see if I missed anything
>obvious. This is a pretty standard LAMP install running in a virtual
>machine. The OS is Ubuntu on both.
>
>The site is at http://76jejbkd7gtm5jbb.onion

 I trust that, once you have figured out how to make it work properly,
you will generate new keys for your currently not-so-very-hidden service,
now that you've identified the connection between the URL above and yourself.
:-)
 For that matter, it's probably best *not* to run most kinds of hidden
services on tor relays precisely because tor relays are well known through
the directory.  Running a hidden service on a client-only tor would be the
safest way because clients are not listed anywhere as such.  There might be
a place for running a hidden service on a bridge, but it would have to be
for something not terribly dangerous to the hidden service operator because
bridges *are* known to the bridge authorities and thus must be considered to
be listed somewhere.  Something like a web service that is also accessible
directly and publicly and that presents no known danger to its operator (e.g.,
the various tor status pages) can reasonably be run on a tor relay node,
a bridge, or a client.
>
>There's a drupal install at /drupal and a wordpress install (currently
>not working due to forwarding issues) at /wordpress.
>
>Feel free to poke around all you want, just please don't do anything
>that would stop other users from accessing the machine such as DoS
>attacks. If you somehow break through, please stay off my home network ; )

 Best you learn how to protect your butt *before* opening it up to the
world, no?  Have you thought about running your service inside a jail or a
virtual machine?  That would make it much easier to wall it off from the
rest of your computer and home network.
>
>I haven't allowed users to add content because... well.. you know what
>would happen with that in onionland. If you want to add content just
>throw me an email and I'll make you an account. I figure that way I have
>somebody to blame if stuff goes horribly wrong. My PGP key is included

 Again, a jail or a VM would help you contain any damage, and a backup
of the jail's or VM's environment would make it very easy and fast to
restore it to the way you set it up.

>if you roll that way.
>
>I'm also interested to hear people's ideas on how exactly to test the
>security of this server without handing out shell logins (or is that
>exactly what I should do?).

 A jail or a VM can certainly help you there by limiting the ability
of shell accounts to access the world at large, especially when combined
with the application of a decent packet filter on the host system.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**


Re: Tor on Ubuntu Jaunty

2009-08-04 Thread Marco Bonetti
On Tue, August 4, 2009 08:49, Matej Kovacic wrote:
> I added APT line for Ubuntu Jaunty Tor installation:
> http://mirror.noreply.org/pub/tor jaunty

> W: GPG error: http://mirror.noreply.org jaunty Release: The following
> signatures were invalid: KEYEXPIRED 1217637003 KEYEXPIRED 1217637003
> KEYEXPIRED 1217637003 KEYEXPIRED 1217637003

probably unrelated, but aren't you missing a "main" at the end of the apt
source line?
ciao

-- 
Marco Bonetti
BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/

My GnuPG key id: 0x86A91047