Re: When can I get TOR for mobile?

2010-05-25 Thread Orionjur Tor-admin
and...@torproject.org wrote:
> On Tue, May 25, 2010 at 12:59:48PM +, tor-ad...@orionjurinform.com wrote 
> 0.8K bytes in 18 lines about:
> : Does a Tor-version for WM exist? I thought that such tor-version didn't
> : exist.
> 
> It doesn't exist in binary form.  However, thanks to a volunteer, we
> just committed some code to support it this week.
> 
> See,
> https://gitweb.torproject.org/tor.git/commit/312f4ee410de718aaf20030d22a93f1c258faa37
> for an example.
> 

I have got the 312f4ee410de718aaf20030d22a93f1c258faa37.tar.gz file and
how I could install it to my WM-PPC? It seems me that I can't do it
through make && make install under my Linux-machine (for WM).
Sorry for lamer's qustion but I have never compiled windows-programs
from sources.
And where can I get OpenSSL and libz for the WM, does they exist? (I
have read in the readme.txt file that "OpenSSL and libz both compile on
MinGW out of the box").
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: When can I get TOR for mobile?

2010-05-25 Thread andrew
On Tue, May 25, 2010 at 12:59:48PM +, tor-ad...@orionjurinform.com wrote 
0.8K bytes in 18 lines about:
: Does a Tor-version for WM exist? I thought that such tor-version didn't
: exist.

It doesn't exist in binary form.  However, thanks to a volunteer, we
just committed some code to support it this week.

See,
https://gitweb.torproject.org/tor.git/commit/312f4ee410de718aaf20030d22a93f1c258faa37
for an example.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread 屠申完美
Dear all,
My tor have a error,this is the message log:
 [Warning] Problem bootstrapping. Stuck at 10%: Finishing handshake with
directory server. (Socket is not connected [WSAENOTCONN ]; NOROUTE; count 4;
recommendation warn)

I have already set the bridges. pls help me,thanks.


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Mike Perry
Cool Story, bro.

Thus spake Scott Bennett (benn...@cs.niu.edu):

> Mike and Moritz,
>  Would you both *please* stop posting each message to multiple lists?
> Thanks much.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpwX5jpdIrXf.pgp
Description: PGP signature


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi Scott,

>Mike and Moritz,
> Would you both *please* stop posting each message to multiple >lists?
>Thanks much.

I have only posted the initial annoucement to both lists.

--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi Mike,


"If you're making non-commercial use of Tor software, you may also use
the Tor onion logo (as an illustration, not as a brand for your
products)."

One of the sticky issues with trademark protection though is that if
you do not defend your mark in all applicable cases, you lose the
right to defend it in cases you actually do care about. So please do
not take any decisions about your use personally.


I understand that. I have removed the favicon for now until this is cleared.

--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Scott Bennett
Mike and Moritz,
 Would you both *please* stop posting each message to multiple lists?
Thanks much.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi Mike,

Thank you for your input. I agree with all you say, and to some degree 
it shows that it is yet unclear (from the site) what exactly I want to 
offer. I now think it might have been better to not make it public 
before getting that message transported, but I haven't published it 
anywhere outside of the Tor community lists yet.


I want to have clear statements about WHAT you get for funding a node, 
and what monthly amount is left to cover before (!) a new node will be 
set up. Nobody will be billed before that node is ordered. Irregular 
donations really are something extra. At the moment, they come across to 
prominent because there are no "product plans" yet.
I am all open for suggestions, I will outline my ideas in a wiki-like, 
open discussion, together with "early adopters" on the mailing list, 
until there are specific "products" to offer. That's why I called the 
section "Plans" after all.


What I really need to attract is people who decide that they want to 
*own* (parts of) a Tor node, and are willing to pay a monthly fee for it.


--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Mike Perry
Thus spake Moritz Bartl (t...@wiredwings.com):

> Let's look at what the Tor website has to say about its logo:
> https://www.torproject.org/trademark-faq.html.en
> 
> "If you're making non-commercial use of Tor software, you may also use 
> the Tor onion logo (as an illustration, not as a brand for your 
> products). Please don't modify the design or colors of the logo. You can 
> use items that look like the Tor onion logo to illustrate a point (e.g. 
> an exploded onion with layers, for instance), so long as they're not 
> used as logos in ways that would confuse people."
> 
> I have also tried to contact the Tor developers through this mailing 
> list about my planned usage, but I guess I should do that more 
> explicitly, and will do that now in a mail to execdir. Sorry. It is very 
> important to me to do this with approval of the Tor community (that's 
> why "it started here").

The problem is that the Tor developers really don't know - they
primarily write software rather than practice law :). Andrew and the
Tor Board of Directors typically need to discuss these issues with
actual lawyers.

One of the sticky issues with trademark protection though is that if
you do not defend your mark in all applicable cases, you lose the
right to defend it in cases you actually do care about. So please do
not take any decisions about your use personally.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpg4zD3zOc18.pgp
Description: PGP signature


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi,


Your use of the Tor name and logo (and style) is deceptive.

I take it you didn't see the favicon. Look again.

Fair enough, that is a tad misleading.


Yes, I have used the Tor logo in several places. For one, I am not a 
graphics designer. Secondly, I think my usage (it its context) is 
neither "deceptive" nor misleading. Actually, I want to provide Tor 
services after all.
When you look around, you will see a lot of people and companies using 
logos of products they do not own or are associated with. For example, 
you will often see the Microsoft logo in places where Microsoft products 
are sold.

Let's look at what the Tor website has to say about its logo:
https://www.torproject.org/trademark-faq.html.en

"If you're making non-commercial use of Tor software, you may also use 
the Tor onion logo (as an illustration, not as a brand for your 
products). Please don't modify the design or colors of the logo. You can 
use items that look like the Tor onion logo to illustrate a point (e.g. 
an exploded onion with layers, for instance), so long as they're not 
used as logos in ways that would confuse people."


I have also tried to contact the Tor developers through this mailing 
list about my planned usage, but I guess I should do that more 
explicitly, and will do that now in a mail to execdir. Sorry. It is very 
important to me to do this with approval of the Tor community (that's 
why "it started here").


See below on why I see my current usage as "non-commercial".


Of course, that hope includes the big assumption of things like,

> all donations being used to cover costs (no profit)

I don't see "commercial" as bad per se. I don't see how I am competing 
with anyone, and if I did (if there was anyone else offering Tor 
services), that would be "useful" competition after all.


Let me clear with this: I am a student, willing to put my time and 
effort into running Tor nodes (and more). Depending on what "products" I 
am building here - which is something that I hope to have designed in a 
"community effort" (hence the mailing list) - I might *some day* 
consider to make some small amount of "management fee". At the moment, 
this is not part of the plan.



, and all sponsors getting their donations back if the
new relays never get off the ground.


The website is not clear about this yet, but I want to distinguish 
between node sponsorship and donations.


Node sponsorship is "a product you can buy", like you can buy managed 
and unmanaged servers. These are recurring payments with a contract, 
towards one or more specific services. I will not collect sponsorship 
money until we - everyone who is interested in funding a node in some 
way or another - have decided on a specific configuration, setup and 
server, which will then be ordered.


Donations on the other hand are irregular, nonrecurring payments. At the 
moment I agree that this looks like a "primary service" on 
torservers.net, but I really see it as something very optional - I just 
haven't worked on the other parts of the "Plans" page yet. I will add a 
section that one could also want to donate to the Tor project instead to 
fund development.
Donations will be collected, amounts published, and once some node can 
be funded from them, used. One pragmatic approach to this would be to 
bill the regular node sponsors less in one month to make up for these 
irregular donations.
I already have several people interested in funding a node, and even if 
I cannot find enough to fund a big node, there's always a small one we 
can add.


> I haven't seen anything come out of his own

mailing list yet, but you can be sure I'll be watching it closely.


Thanks for your interest. :-) If you want to find out more about me, 
feel free to visit my blog at www.wiredwings.com .


--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Mike Perry
Thus spake Moritz Bartl (t...@wiredwings.com):

> I set up a preliminary homepage at http://www.torservers.net/
> 
> For the original discussion ("Tor Exit Node Sponsorship, looking for 
> partners") see http://archives.seul.org/or/talk/May-2010/msg00058.html
> 
> Basically it comes down to: I want to run another high bandwidth Tor 
> exit and I am looking for individuals or companies to help sponsor it.
> 
> To keep the noise down on OR-Talk/Tor-Relays, I have also created a 
> mailing list for "hosted tor exit" discussion. If you want to stay 
> informed, feel free to subscribe at http://www.freelists.org/list/torservers
> 
> I am grateful for help, suggestions and other comments.

Hi Moritz,

I for one thing this is a great idea. I also welcome and encourage
others to step up and try to start similar projects, once we have a
good pattern down for a model that seems to work.

However, a common problem with donation-run projects like this (and
non-profits in general) is that everyone expects that the project will
succeed because someone else will jump in before them and fund it/save
it. Economists often call this the free-rider problem, but I think it
is more closely related to "Diffusion of Responsibility":
http://en.wikipedia.org/wiki/Diffusion_of_responsibility

Because of these fundamental aspects of human nature, I think it is
very important to set goals such as: "We will not start or maintain
this project at the target level until/unless we have X months of
future funding", where X is around 3 months initially, and ideally
6-12 months or more long term. 

I think its also very important for people to see what their level of
dollar contribution gets them in terms of a percentage slice of exit
bandwidth for the Tor network. At the volumes you will likely be
purchasing bandwidth at, this is likely to be a very very compelling
ratio.

This financial data should be very public on your website. If the
account balance ever drops below the level that can support roughly
this many months of service, you should renegotiate your contract with
your ISP to a level of service that you can support, and begin
clamoring for more funding.

Without this level of public accounting and public announcement of
financial requirements, I imagine most people are just going to look
at your site and assume "Well, that's nice. Best of luck, hope it works
out for you!" and move on. I know, because that thought has been in
the back of my mind (although I already spend quite a bit of my
paycheck to support Tor-related infrastructure, so perhaps I
am justified :).

If instead it's clear to people that if they just donate that $10,
$50, or $200, that it will make a significant impact to your service
staying online for X amount of time with Y amount of additional
capacity, they are way more likely to step forward.

For what it's worth, the optimal one-time donation amount to
request for addons.mozilla.org addons has been statistically
determined to be $10. I'm not sure if the same
psychological/political/financial dynamics will apply here, though.
Your optimal requested donation amount may be higher or lower,
depending upon the impact people believe they will have with that
money, and any additional economies of scale you can present to them
for donating more/reaching a higher level of total funding.
 


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpnnlbAzLSa0.pgp
Description: PGP signature


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Aplin, Justin M

On 5/25/2010 7:39 PM, Curious Kid wrote:

Yes, of course it should be obvious that it is not sponsored by The Tor Project.
   


Maybe it's just me, then. I tend to assume that anything not on the 
official website isn't sponsored by the official project, unless they 
make a point of explicitly saying "Sponsored by...". If that's not as 
general an assumption as I would think, then perhaps it does bear making 
the point clear.



I take it you didn't see the favicon. Look again.


Fair enough, that is a tad misleading.


People in the past have created "non-competing" companies that used the Tor 
name to increase their profits.
   


This will be a contention point. Most of me hopes this is an honest 
effort at contributing to the Tor project. Of course, that hope includes 
the big assumption of things like, all donations being used to cover 
costs (no profit), and all sponsors getting their donations back if the 
new relays never get off the ground. Big hopes and big assumptions; time 
will tell I suppose.



It should not be in very small letters in the most hidden spot. Frankly, the 
leadup posts in the mailing list raised red flags for me that it would 
deliberately try to look like part of The Tor Project.
   


Again, maybe it's just me, but it was clearly visible on my screen when 
I brought the page up. I haven't seen anything come out of his own 
mailing list yet, but you can be sure I'll be watching it closely. 
Cautious optimism is the way to go with any new project like this, methinks.


~japlin
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Curious Kid
> 

> Your use of the 
> Tor name and logo (and style) is deceptive. Why did you make your disclaimer 
> in 
> fine print under the website? It looks like a copyright notice. Many people 
> won't bother to read it.

Should he have to? The only place I see Tor's 

Yes, of course it should be obvious that it is not sponsored by The Tor Project.

> logo is where he's explaining what Tor is. I thought it was pretty clear from 
> a 

I take it you didn't see the favicon. Look again.

> quick glance that his website is about providing hosting, not competing with 
> the 
> Tor Project.

People in the past have created "non-competing" companies that used the Tor 
name to increase their profits.

The disclaimer I imagine is just that, a "Don't contact me 

I would not imagine that.

> with legal or support issues meant for Tor's staff." Doesn't exactly have to 
> be 
> in bold red 
> letters.

It should not be in very small letters in the most hidden spot. Frankly, the 
leadup posts in the mailing list raised red flags for me that it would 
deliberately try to look like part of The Tor Project.



  

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Justin Aplin

On May 25, 2010, at 6:59 PM, Curious Kid wrote:


Your use of the Tor name and logo (and style) is deceptive. Why did  
you make your disclaimer in fine print under the website? It looks  
like a copyright notice. Many people won't bother to read it.


Should he have to? The only place I see Tor's logo is where he's  
explaining what Tor is. I thought it was pretty clear from a quick  
glance that his website is about providing hosting, not competing with  
the Tor Project.


The disclaimer I imagine is just that, a "Don't contact me with legal  
or support issues meant for Tor's staff." Doesn't exactly have to be  
in bold red letters.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Curious Kid
> because it's still undocumented vaporware.  I still think the

whole 
> thing smacks of being a honeypot for gullible humans.

They have gotten awesome news coverage in over a dozen big-name media outlets. 
http://www.censorshipresearch.org/press/ I wonder why that is.

The whole project seems intensely focused on Iran. I wonder why that is, but it 
could explain the news coverage.



  

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-25 Thread Curious Kid
> Hi,


I set up a preliminary homepage at 
> http://www.torservers.net/

Your use of the Tor name and logo (and style) is deceptive. Why did you make 
your disclaimer in fine print under the website? It looks like a copyright 
notice. Many people won't bother to read it.



  

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Roger Dingledine
On Tue, May 25, 2010 at 04:01:43PM -0400, Ted Smith wrote:
> >   I couldn't figure
> > out why the author, Kurt Knutson of WGN TV, was so taken in by something 
> > that
> > isn't even available yet and about which there is so little publicly 
> > available
> > information.
> > 
> Maybe Tor Project should talk to his publicist ;-)

Tor certainly takes a different approach to publicity compared to
people like Haystack. We prefer to let our technology and deployment
do the speaking, and then explain it to people once it's clear there's
something worth explaining.

As has been made clear in all areas of technology over the past years,
though, the publicity side of things doesn't care whether you have the
technology sorted out or not.

Still, no thanks. I'd rather spend my time figuring out how to make the
technology actually work, than telling people about how great it'll be.

That said, massive publicity engines like this one can still do the
field some good. First, it reminds a much broader segment of society
about the issues. Second, it draws the attention of the censors. :)

> > >looks like they'll be running single-hop proxies from various hosts, and
> > >distributing that list inside the proprietary software they distribute
> > 
> >  That's more than I managed to extract from it, but that certainly
> > looks very bad if that is indeed what they are doing.
> > 
> They're just trying to tunnel traffic out of the "oppressive" countries,
> not provide actual anonymity (though they're very unclear about
> admitting this and should probably say it in big flashing red letters).
> They admit that tunneling Tor through their system would be a "good"
> thing.

Big red warning letters are actually something that these other projects
attack us about. After all, if you scare your users, they'll just go
elsewhere, or "worse", they'll stop trying to circumvent their firewall
as much.

It does worry me that so many of these projects see circumvention and
user privacy as totally unrelated goals. Iran sure has been learning its
lesson in that regard, with all the shiny new deep packet inspection
hardware their government is deploying. Check out these quotes from
Iran's chief of police:
http://www.reuters.com/assets/print?aid=USTRE61800J20100209

For more reading, check out #5 at
https://svn.torproject.org/svn/projects/articles/circumvention-features.html

It sure would be cool if somebody worked on pluggable ways to transport
Tor traffic in a more unobservable way. I suspect that starting over is
an unlikely route to get there though.

--Roger

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Ted Smith
On Tue, 2010-05-25 at 14:36 -0500, Scott Bennett wrote:
> On Tue, 25 May 2010 13:33:23 -0400 Ted Smith 
> wrote:
> >On Tue, 2010-05-25 at 01:45 -0500, Scott Bennett wrote:
> >> I don't know who "Censorship Research Center" might be, but they claim
> >> to have a development project going for another encrypted proxy service.
> >> However, they say it will be free software, but *not* be open source, so =
> >no
> >> one can examine what they have done in order to look for bugs, design fla=
> >ws,
> >> etc. :-(  There isn't much real information at the web site,
> >>=20
> >>http://www.haystacknetwork.com
> >>=20
> >> but what little there is looks very much like an attempt to sucker people
> >> who don't understand much about security.
> >>  Oh.  I almost forgot.  Their FAQ page mentions tor, complaining abou=
> >t
> >> tor's publicly available directory and arguing that their method is bette=
> >r,
> >> while not mentioning bridges.
> >
> >I saw this a while ago. From what I could get from their website, it
> 
>  What drew my attention to it was a small newspaper column in yesterday's
> _Fib_ (a.k.a. _Trib_ a.k.a. _The_Chicago_Tribune_) that I saw at a coffee
> shop.  The author was all ga-ga about it, praising Austin Heap as if he
> should be canonized ASAP for his wonderful work for freedom of speech.
> Being somewhat of a skeptical nature, I looked up the web site referred to
> in the article when I got back to my apartment last night.  I couldn't figure
> out why the author, Kurt Knutson of WGN TV, was so taken in by something that
> isn't even available yet and about which there is so little publicly available
> information.
> 
Maybe Tor Project should talk to his publicist ;-)

> >looks like they'll be running single-hop proxies from various hosts, and
> >distributing that list inside the proprietary software they distribute
> 
>  That's more than I managed to extract from it, but that certainly
> looks very bad if that is indeed what they are doing.
> 
They're just trying to tunnel traffic out of the "oppressive" countries,
not provide actual anonymity (though they're very unclear about
admitting this and should probably say it in big flashing red letters).
They admit that tunneling Tor through their system would be a "good"
thing.


signature.asc
Description: This is a digitally signed message part


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Scott Bennett
 On Tue, 25 May 2010 13:33:23 -0400 Ted Smith 
wrote:
>On Tue, 2010-05-25 at 01:45 -0500, Scott Bennett wrote:
>> I don't know who "Censorship Research Center" might be, but they claim
>> to have a development project going for another encrypted proxy service.
>> However, they say it will be free software, but *not* be open source, so =
>no
>> one can examine what they have done in order to look for bugs, design fla=
>ws,
>> etc. :-(  There isn't much real information at the web site,
>>=20
>>  http://www.haystacknetwork.com
>>=20
>> but what little there is looks very much like an attempt to sucker people
>> who don't understand much about security.
>>  Oh.  I almost forgot.  Their FAQ page mentions tor, complaining abou=
>t
>> tor's publicly available directory and arguing that their method is bette=
>r,
>> while not mentioning bridges.
>
>I saw this a while ago. From what I could get from their website, it

 What drew my attention to it was a small newspaper column in yesterday's
_Fib_ (a.k.a. _Trib_ a.k.a. _The_Chicago_Tribune_) that I saw at a coffee
shop.  The author was all ga-ga about it, praising Austin Heap as if he
should be canonized ASAP for his wonderful work for freedom of speech.
Being somewhat of a skeptical nature, I looked up the web site referred to
in the article when I got back to my apartment last night.  I couldn't figure
out why the author, Kurt Knutson of WGN TV, was so taken in by something that
isn't even available yet and about which there is so little publicly available
information.

>looks like they'll be running single-hop proxies from various hosts, and
>distributing that list inside the proprietary software they distribute

 That's more than I managed to extract from it, but that certainly
looks very bad if that is indeed what they are doing.

>(IIRC). They also say they'll be using HTTP as the transport protocol,
>which means either that the content will be unencrypted or that it'll be
>tunneled through HTTP.=20
>
>I wonder if they'll sign the binary blobs they distribute; it would be
>very easy for the police in any country to distribute their own
>backdoored version (via sneakernet) and just arrest everyone who uses
>it.
>
 Maybe they'll sign it with their own in-house equivalent to PGP, too. :-}


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Ted Smith
On Tue, 2010-05-25 at 20:28 +0200, Olaf Selke wrote:
> Ted Smith schrieb:
> > 
> > I wonder if they'll sign the binary blobs they distribute; it would be
> > very easy for the police in any country to distribute their own
> > backdoored version (via sneakernet) and just arrest everyone who uses
> > it.
> 
> I wonder why they're so exclusively focused on Iran. Their mission is to
> "provide safe, unfiltered Internet to the people of Iran ...". How do
> their users know it's not the Mossad behind the project? Anyway, I don't
> care.

Because when this started Iran was probably on the news. If it was a few
years previous, they'd be talking about Burma.


signature.asc
Description: This is a digitally signed message part


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Olaf Selke
Ted Smith schrieb:
> 
> I wonder if they'll sign the binary blobs they distribute; it would be
> very easy for the police in any country to distribute their own
> backdoored version (via sneakernet) and just arrest everyone who uses
> it.

I wonder why they're so exclusively focused on Iran. Their mission is to
"provide safe, unfiltered Internet to the people of Iran ...". How do
their users know it's not the Mossad behind the project? Anyway, I don't
care.

Olaf
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Ted Smith
On Tue, 2010-05-25 at 01:45 -0500, Scott Bennett wrote:
> I don't know who "Censorship Research Center" might be, but they claim
> to have a development project going for another encrypted proxy service.
> However, they say it will be free software, but *not* be open source, so no
> one can examine what they have done in order to look for bugs, design flaws,
> etc. :-(  There isn't much real information at the web site,
> 
>   http://www.haystacknetwork.com
> 
> but what little there is looks very much like an attempt to sucker people
> who don't understand much about security.
>  Oh.  I almost forgot.  Their FAQ page mentions tor, complaining about
> tor's publicly available directory and arguing that their method is better,
> while not mentioning bridges.

I saw this a while ago. From what I could get from their website, it
looks like they'll be running single-hop proxies from various hosts, and
distributing that list inside the proprietary software they distribute
(IIRC). They also say they'll be using HTTP as the transport protocol,
which means either that the content will be unencrypted or that it'll be
tunneled through HTTP. 

I wonder if they'll sign the binary blobs they distribute; it would be
very easy for the police in any country to distribute their own
backdoored version (via sneakernet) and just arrest everyone who uses
it.


signature.asc
Description: This is a digitally signed message part


Tor on a Tablet (Android!)

2010-05-25 Thread Nathan Freitas

Here's a quick post with images of Orbot running on a 7" Android tablet:

http://guardianproject.info/2010/05/25/tor-on-a-tablet/

This is a wifi-only device so it may be a better option for a truly secured 
Android solution, than something with a closed-source Qualcomm chipset in it.

I plan to do a tear down of this hardware soon to see just what is making it 
tick.

+Nathan

PGP.sig
Description: This is a digitally signed message part


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Flamsmark
I seem to recall that something called haystack, with a remarkably similar
webpage was the software and donations portal developed by @austinheap
during the Iran election. Since Heap's twitter is still linked from the
haystacknetworkcom page, I assume that this project remains the offspring of
that effort. I can't comment directly, but I recall that the effort seemed
pretty legitimate at that time. I assume that it's still legitimate, even if
not free software in the strictest sense. The Censorship Research Center is
San Francisco non-profit, started by Heap. They do have a contact form on
their about page: http://www.censorshipresearch.org/about/

While I think that free (as in speech as in Stallman) software is the best
way to go, I can understand why someone of good intentions might think
otherwise. I reckon that haystack is not a malicious honeypot, or cynical
effort to relive people of their cash. However, I do think that the project
may not be overly successful, and that donations would do more good
elsewhere.


On 25 May 2010 02:45, Scott Bennett  wrote:

> I don't know who "Censorship Research Center" might be, but they claim
> to have a development project going for another encrypted proxy service.
> However, they say it will be free software, but *not* be open source, so no
> one can examine what they have done in order to look for bugs, design
> flaws,
> etc. :-(  There isn't much real information at the web site,
>
>http://www.haystacknetwork.com
>
> but what little there is looks very much like an attempt to sucker people
> who don't understand much about security.
> Oh.  I almost forgot.  Their FAQ page mentions tor, complaining about
> tor's publicly available directory and arguing that their method is better,
> while not mentioning bridges.
>
>
>  Scott Bennett, Comm. ASMELG, CFIAG
> **
> * Internet:   bennett at cs.niu.edu  *
> **
> * "A well regulated and disciplined militia, is at all times a good  *
> * objection to the introduction of that bane of all free governments *
> * -- a standing army."   *
> *-- Gov. John Hancock, New York Journal, 28 January 1790 *
> **
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>


Re: When can I get TOR for mobile?

2010-05-25 Thread Orionjur Tor-admin
Nathan Freitas wrote:
> Sorry, there is no version of Tor available for that class of Java phone 
> currently. You need to upgrade to an Android, Windows Mobile, Nokia N900 or 
> iPhone device.
> 
> On May 24, 2010, at 12:20 PM, emigrant wrote:
> 
>> sony ericsson k530i
> 
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> 

Does a Tor-version for WM exist? I thought that such tor-version didn't
exist.
Where I can get it?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


RE: [OT] another proxy, but not open source :-(

2010-05-25 Thread downie -

The Haystack developer was interviewed for the BBC documentary The Virtual 
Revolution - this episode I think:
http://www.bbc.co.uk/worldservice/documentaries/2010/03/100301_the_virtual_revolution_part_two.shtml
and see
http://news.bbc.co.uk/1/hi/world/middle_east/8505645.stm

GD
  
_
Hotmail has tools for the New Busy. Search, chat and e-mail from your inbox.
http://www.windowslive.com/campaign/thenewbusy?ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_1

Re: problem with bridges and a suggestion

2010-05-25 Thread andrew
On Tue, May 25, 2010 at 05:18:44PM +0800, for.tor.bri...@gmail.com wrote 1.3K 
bytes in 36 lines about:
: china is blocking TOR  more and more strict,
: I can't establish a TOR circuit even I updated bridges in config file
: of torrc with info retrieved from https://bridges.torproject.org and
: email replies from brid...@torproject.org.

Correct.  We are aware of this.

: this morning, I got some new bridges through a hidden https proxy and
: established a TOR circuit, but after some time, I lost the connection
: and couldn't  establish a TOR circuit any more.

Can you send debug logs to tor-assista...@torproject.org with what
happens when your client tries to connect to the bridges?

: from my knowledge to china's blocking methods, I believe they found my
: newly got bridges through network traffic protocol analysis, and
: blocked them.

This is unlikely.  In our experience, they are merely blocking IP:Port
combinations.

: use a general protocol for TOR clients to interact with bridges, so
: that they can't distinguish the traffic between TOR clients and
: bridges,
: so that they can't find new bridges got through private ways.

Tor traffic through bridges vs. public relays is the same.  There is not
a special "bridge connection".  See
https://www.torproject.org/faq#RelayOrBridge, also that text needs to be
updated to reflect China's uniqueness in filtering Tor public relays.

: the general protocol could be https which is encryption protected;

It is already.  What may be unique is we start the connection with a TLS
renegotiation.  This is probably starting to stand out as unique now
that OpenSSL decided to everyone used renegotiation incorrectly and
almost all operating systems have erroneously disabled this
functionality by default.  See
https://www.torproject.org/faq#KeyManagement

: the general protocol could be plain http, if you can encode its
: content dynamically and privately, and don't make it display any
: fingerprints.

Then someone can read your traffic.  Hiding in plain sight sounds good
on paper, but doesn't stand up to academic research, so far.  See
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#YoushouldusesteganographytohideTortraffic.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Aplin, Justin M

On 5/25/2010 6:22 AM, Scott Bennett wrote:

  "Proprietary" means the client companies pay for it, right?  Which
means they are funding its development, right?  Windows Server releases
are closed source, right?  And client companies install and use it, right?
Now, none of that tells us "how many large contributors would be willing
to install closed-source software that they're not involved in developing
on their servers", but I should think that the number may be fairly large.
   


Ha, I see your point. Although by "large contributors" I was thinking of 
those awesome souls to run our heavy-duty relays and not corporations. A 
quick run-through of our top 50 contributors shows 47 Linux boxes and 3 
FreeBSD boxes. I guess I'm just biased into thinking it's the 
open-software nuts who most support the cause ;-)


~Japlin
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Scott Bennett
 On Tue, 25 May 2010 05:55:34 -0400 "Aplin, Justin M" 
wrote:
>On 5/25/2010 4:59 AM, Scott Bennett wrote:
>>   You may well be assuming too much.  It's not easy to know at this
>> point because it's still undocumented vaporware.  I still think the
>> whole thing smacks of being a honeypot for gullible humans.
>>
>
>I'll admit I could be totally off base. But it's 5 in the morning and I 
>honestly can't think of another way they could implement what they're 
>trying to do (effectively, anyway) without an enormous infrastructure. 
>Cheapest way to create one seems to be distributing your free software 
>and having your users act as... oh wait, somebody thought of that already!

 :-)
>
>>   Well, that, at least, happens all the time.  How many installations
>> of Windows Server 200[38] would you guess there are, for example?
>>
>
>Maybe I've been out of the game for too long, but in my experience 
>proprietary software is used either because it works well, or because it 

 "Proprietary" means the client companies pay for it, right?  Which
means they are funding its development, right?  Windows Server releases
are closed source, right?  And client companies install and use it, right?
Now, none of that tells us "how many large contributors would be willing
to install closed-source software that they're not involved in developing
on their servers", but I should think that the number may be fairly large.

>comes with support (i.e. insurance). The Windows servers, for example, 
>work well in corporate environments running a large number of Windows 
>machines in a Domain, and often said corporation will purchase support 
>to go with it. It's worth the cost to keep things running (somewhat) 
>smoothly. If you have a free alternative that works just as well and can 
>be maintained by your staff without too much ado, odds are it will be 
>used. Apache on *nix comes to mind as one example, as opposed to IIS.
>
>So if we have two free softwares, one open-source and one closed-source, 
>neither with any *explicit* support, the choice is going to come down to 
>which one works better, and which one looks better. If they put out a 
>crappy product, odds are it'll get uninstalled by the majority of users 
>who just don't want to bother fucking with it. If it's a decent product, 
>however, and it has a decent UI, and their production team can keep up 
>with releases and bugfixes and whatnot, we may be in for some viable 
>competition. We'll see. Somehow I doubt it.
>
>>   China has done that at least once already.  They apparently managed
>> to get ~80% of what the bridge authorities had at the time, IIRC.  Yet
>> the remainder continued to operate and serve many people in China during
>> that time.  And bridges come and go, just like ordinary relays.  Many
>> are on dynamically assigned IP addresses, so their addresses change,
>> thereby invalidating those data in the Chinese government's list.
>>
>
>The picture in my head reminds me of this, for some reason: 
>http://xkcd.com/350/

 Nice call! ;)
>
>>> I am a tad unnerved at the number of links to the donation page,
>>> though I appreciate the costs associated with such an endeavor.
>>>
>>>  
>>   Indeed.
>>
>
>As an aside, they do have a shiny-looking website, and I won't pretend 
>users aren't attracted to that. We could do with a little shininess 
>ourselves. Still though, pandering for donations when you're not even 
>offering any sort of product or service... honeypot indeed.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Aplin, Justin M

On 5/25/2010 4:59 AM, Scott Bennett wrote:

  You may well be assuming too much.  It's not easy to know at this
point because it's still undocumented vaporware.  I still think the
whole thing smacks of being a honeypot for gullible humans.
   


I'll admit I could be totally off base. But it's 5 in the morning and I 
honestly can't think of another way they could implement what they're 
trying to do (effectively, anyway) without an enormous infrastructure. 
Cheapest way to create one seems to be distributing your free software 
and having your users act as... oh wait, somebody thought of that already!



  Well, that, at least, happens all the time.  How many installations
of Windows Server 200[38] would you guess there are, for example?
   


Maybe I've been out of the game for too long, but in my experience 
proprietary software is used either because it works well, or because it 
comes with support (i.e. insurance). The Windows servers, for example, 
work well in corporate environments running a large number of Windows 
machines in a Domain, and often said corporation will purchase support 
to go with it. It's worth the cost to keep things running (somewhat) 
smoothly. If you have a free alternative that works just as well and can 
be maintained by your staff without too much ado, odds are it will be 
used. Apache on *nix comes to mind as one example, as opposed to IIS.


So if we have two free softwares, one open-source and one closed-source, 
neither with any *explicit* support, the choice is going to come down to 
which one works better, and which one looks better. If they put out a 
crappy product, odds are it'll get uninstalled by the majority of users 
who just don't want to bother fucking with it. If it's a decent product, 
however, and it has a decent UI, and their production team can keep up 
with releases and bugfixes and whatnot, we may be in for some viable 
competition. We'll see. Somehow I doubt it.



  China has done that at least once already.  They apparently managed
to get ~80% of what the bridge authorities had at the time, IIRC.  Yet
the remainder continued to operate and serve many people in China during
that time.  And bridges come and go, just like ordinary relays.  Many
are on dynamically assigned IP addresses, so their addresses change,
thereby invalidating those data in the Chinese government's list.
   


The picture in my head reminds me of this, for some reason: 
http://xkcd.com/350/



I am a tad unnerved at the number of links to the donation page,
though I appreciate the costs associated with such an endeavor.

 

  Indeed.
   


As an aside, they do have a shiny-looking website, and I won't pretend 
users aren't attracted to that. We could do with a little shininess 
ourselves. Still though, pandering for donations when you're not even 
offering any sort of product or service... honeypot indeed.


~japlin

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Tor Exit Node hosting: torservers.net

2010-05-25 Thread Moritz Bartl

Hi,

I set up a preliminary homepage at http://www.torservers.net/

For the original discussion ("Tor Exit Node Sponsorship, looking for 
partners") see http://archives.seul.org/or/talk/May-2010/msg00058.html


Basically it comes down to: I want to run another high bandwidth Tor 
exit and I am looking for individuals or companies to help sponsor it.


To keep the noise down on OR-Talk/Tor-Relays, I have also created a 
mailing list for "hosted tor exit" discussion. If you want to stay 
informed, feel free to subscribe at http://www.freelists.org/list/torservers


I am grateful for help, suggestions and other comments.

--
Moritz Bartl
GPG 0xED2E9B44
http://www.torservers.net/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


problem with bridges and a suggestion

2010-05-25 Thread t f
dear friends,

problem:
china is blocking TOR  more and more strict,
I can't establish a TOR circuit even I updated bridges in config file
of torrc with info retrieved from https://bridges.torproject.org and
email replies from brid...@torproject.org.
this morning, I got some new bridges through a hidden https proxy and
established a TOR circuit, but after some time, I lost the connection
and couldn't  establish a TOR circuit any more.

from my knowledge to china's blocking methods, I believe they found my
newly got bridges through network traffic protocol analysis, and
blocked them.

so my suggestion is:
1.
use a general protocol for TOR clients to interact with bridges, so
that they can't distinguish the traffic between TOR clients and
bridges,
so that they can't find new bridges got through private ways.
2.
the general protocol could be https which is encryption protected;
the general protocol could be plain http, if you can encode its
content dynamically and privately, and don't make it display any
fingerprints.

by the way, I'm not a native english speaker, please pardon my awkward english.

sincerely

frank
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Scott Bennett
 On Tue, 25 May 2010 03:30:34 -0400 Justin Aplin 
wrote:
>On May 25, 2010, at 2:45 AM, Scott Bennett wrote:
>
>> I don't know who "Censorship Research Center" might be, but they  
>> claim
>> to have a development project going for another encrypted proxy  
>> service.
>> However, they say it will be free software, but *not* be open  
>> source, so no
>> one can examine what they have done in order to look for bugs,  
>> design flaws,
>> etc. :-(  There isn't much real information at the web site,
>
>Without the community support, I wonder how quickly it could be  
>adopted. I'm assuming it's going to rely on user-run exits like Tor,  

 You may well be assuming too much.  It's not easy to know at this
point because it's still undocumented vaporware.  I still think the
whole thing smacks of being a honeypot for gullible humans.

>and I wonder how many large contributors would be willing to install  
>closed-source software that they're not involved in developing on  
>their servers.

 Well, that, at least, happens all the time.  How many installations
of Windows Server 200[38] would you guess there are, for example?
>
>> but what little there is looks very much like an attempt to sucker  
>> people
>> who don't understand much about security.
>> Oh.  I almost forgot.  Their FAQ page mentions tor, complaining  
>> about
>> tor's publicly available directory and arguing that their method is  
>> better,
>> while not mentioning bridges.
>
>Haters' gonn' hate. I'll admit, though, that using bridges might be a  
>bit above the "average" user, especially when it comes to finding  
>them. Not exactly plug-n-play. I also don't see why it would be  
>terribly difficult for a sufficiently determined government to amass a  
>large list of bridges and make that option essentially (if not  
>completely) inviable.

 China has done that at least once already.  They apparently managed
to get ~80% of what the bridge authorities had at the time, IIRC.  Yet
the remainder continued to operate and serve many people in China during
that time.  And bridges come and go, just like ordinary relays.  Many
are on dynamically assigned IP addresses, so their addresses change,
thereby invalidating those data in the Chinese government's list.
>
>I am a tad unnerved at the number of links to the donation page,  
>though I appreciate the costs associated with such an endeavor.
>
 Indeed.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: [OT] another proxy, but not open source :-(

2010-05-25 Thread Justin Aplin


On May 25, 2010, at 2:45 AM, Scott Bennett wrote:

I don't know who "Censorship Research Center" might be, but they  
claim
to have a development project going for another encrypted proxy  
service.
However, they say it will be free software, but *not* be open  
source, so no
one can examine what they have done in order to look for bugs,  
design flaws,

etc. :-(  There isn't much real information at the web site,


Without the community support, I wonder how quickly it could be  
adopted. I'm assuming it's going to rely on user-run exits like Tor,  
and I wonder how many large contributors would be willing to install  
closed-source software that they're not involved in developing on  
their servers.


but what little there is looks very much like an attempt to sucker  
people

who don't understand much about security.
Oh.  I almost forgot.  Their FAQ page mentions tor, complaining  
about
tor's publicly available directory and arguing that their method is  
better,

while not mentioning bridges.


Haters' gonn' hate. I'll admit, though, that using bridges might be a  
bit above the "average" user, especially when it comes to finding  
them. Not exactly plug-n-play. I also don't see why it would be  
terribly difficult for a sufficiently determined government to amass a  
large list of bridges and make that option essentially (if not  
completely) inviable.


I am a tad unnerved at the number of links to the donation page,  
though I appreciate the costs associated with such an endeavor.


~japlin