Re: What can see a server of a Bittorent when I contact with it through Tor?

2010-02-23 Thread Bill Weiss
James Brown(jbrownfi...@gmail.com)@Sun, Feb 21, 2010 at 04:05:33PM +:
 I set my Bittorent client for contacting with tracker through Tor.
 What can see a server of a Bittorent when I contact with it through Tor?
 As I understand there are ip-adresses of exit-nodes in the headers of
 ip-packets. But I want to know are there my real ip-addresses in the all
 content of such ip-packets? How the Bittorrent server give other users
 about me - through ip or by another way?
 I want to be anonimous at least for the tracker, its ISP and state
 powers control the territory when its server are based.

They can all see your real IP.  That's how other nodes know how to get
packets to you.

You could configure it to do everything through BitTorrent, but:
1) Don't do that.  The speed will be horrible.  Like, slower than getting
   a second job at minimum wage and making enough to buy whatever you're
   downloading. Even free stuff, which you could pay someone to burn to
   disk and mail you.

2) Don't do that.  DMCA notices to exit nodes by people who don't realize
   the above suck, and will cost us exits in the long run.

-- 
Bill Weiss
 
Dan you know me, I like to remove as much personal freedom as I can
  when programming
Dan which we can call API Developer's Jock Itch

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: What can see a server of a Bittorent when I contact with it through Tor?

2010-02-23 Thread Watson Ladd

On Feb 23, 2010, at 07:36 AM, Bill Weiss wrote:

 James Brown(jbrownfi...@gmail.com)@Sun, Feb 21, 2010 at 04:05:33PM +:
 I set my Bittorent client for contacting with tracker through Tor.
 What can see a server of a Bittorent when I contact with it through Tor?
 As I understand there are ip-adresses of exit-nodes in the headers of
 ip-packets. But I want to know are there my real ip-addresses in the all
 content of such ip-packets? How the Bittorrent server give other users
 about me - through ip or by another way?
 I want to be anonimous at least for the tracker, its ISP and state
 powers control the territory when its server are based.
 
 They can all see your real IP.  That's how other nodes know how to get
 packets to you.
 
 You could configure it to do everything through BitTorrent, but:
 1) Don't do that.  The speed will be horrible.  Like, slower than getting
   a second job at minimum wage and making enough to buy whatever you're
   downloading. Even free stuff, which you could pay someone to burn to
   disk and mail you.
 
 2) Don't do that.  DMCA notices to exit nodes by people who don't realize
   the above suck, and will cost us exits in the long run.
This is why specialized anonymity services for filesharing exist, like MUTE, 
Gnunet, and Freenet. Prehaps Tor FAQ's on bittorrent should include them as 
alternatives.
 
 -- 
 Bill Weiss
 
 Dan you know me, I like to remove as much personal freedom as I can
  when programming
 Dan which we can call API Developer's Jock Itch
---
Watson Ladd
 
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: What can see a server of a Bittorent when I contact with it through Tor?

2010-02-23 Thread Marco Bonetti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Bill Weiss wrote:
 They can all see your real IP.  That's how other nodes know how to get
 packets to you.
only peers of the swarm you connect to will have your real ip. the
tracker will probably just see your exit node one and announce it to
other peers as well.
there was a similar thread in this very mailing list last year, we also
end digging up a proposed BitTorrent RFC too :)

- --
Marco Bonetti
Tor research and other stuff: http://sid77.slackware.it/
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/

My GnuPG key id: 0x0B60BC5F
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkuD/KcACgkQTYvJ9gtgvF+AZwCfa+353awOWE7nFd/wlWGRCMaL
ex4AoID+j8hCy5GjsNO+0tC+D90zh7zY
=AhHj
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-23 Thread 7v5w7go9ub0o

Good job!

IMHO this is a very nice paper; well written!

(Adjusted the title of this post a bit, in case the readers weren't 
aware your goal )


(FWIW, some might want to read the paper - to gain a lot of insight and 
background - and then download/test a copy of your (sanitized) .img 
file. First running of the VM would be -with- saving of any changes to 
the VM so as to create and save a unique, permanent service name; 
subsequent runs discard changes!?)


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


TorChat is a security hazard

2010-02-23 Thread Paul Campbell
Hello.

I'm in no way a security expert.  I never ran TorChat but I did read the 
source code. Read on why I haven't run it.

TorChat is an inofficial chat client for the Tor network.  I like the idea 
behind TorChat: easy to use, usb-stick portable and runs on Windows 98.

These are the problems I see with TorChat:

1. No authentication.  There is no way you can know for sure that the person 
you are chatting with is the person you chatted with yesterday.  Tor's hidden 
services don't make any such guarantees about incoming connections. The clients 
stay anonymous.

2. To make things even worse, the only information needed to impersonate a 
buddy is their .onion address.

3. Buddies have control over your buddylist.  It is just a matter of 
identifying as a buddy and telling the software to remove this said buddy.

I don't think these are the only problems, but the first one alone is enough to 
conclude that TorChat cannot give adequate security.  It's too easy to 
impersonate people.  TorChat lives off the name of the Tor Project, but 
unfortunately doesn't deliver.

It is possible to run Off-the-Record Messaging over Tor.  Off-the-Record 
Messaging has all kinds of features: encryption, perfect forward secrecy and 
deniable authentication.  And it doesn't have the problems of TorChat.

Best regards,
Paul



  

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-23 Thread Ringo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

One update that should be noted is that this doesn't protect against
bad nanny attacks. With full disk encryption, the boot partition isn't
encrypted (as you have to load it so it can ask for your passphrase and
decrypt the rest of the drive). If the machine isn't physically secured,
it's vulnerable to this type of attack.

Solidarity,
Ringo

7v5w7go9ub0o wrote:
 Good job!
 
 IMHO this is a very nice paper; well written!
 
 (Adjusted the title of this post a bit, in case the readers weren't
 aware your goal )
 
 (FWIW, some might want to read the paper - to gain a lot of insight and
 background - and then download/test a copy of your (sanitized) .img
 file. First running of the VM would be -with- saving of any changes to
 the VM so as to create and save a unique, permanent service name;
 subsequent runs discard changes!?)
 
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkuEtK8ACgkQETpif9i/srq2lwCfZfhJCegkIYZcCkaQMMmXqIq4
aogAn1P1WK/BooxiS7hC44gRAmp4RVxb
=AAH9
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: What can see a server of a Bittorent when I contact with it through Tor?

2010-02-23 Thread David Lusthof
On 02/23/2010 05:04 PM, Marco Bonetti wrote:
 Bill Weiss wrote:
 They can all see your real IP.  That's how other nodes know how to get
 packets to you.
 only peers of the swarm you connect to will have your real ip. the
 tracker will probably just see your exit node one and announce it to
 other peers as well.
 there was a similar thread in this very mailing list last year, we also
 end digging up a proposed BitTorrent RFC too :)
 

I run a 500kb/sec~ exit node and all my logs (IMAP, SSH, HTTP, etc) are
completely flooded with bittorrent connection attempts when Tor is
running...
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/