Re: When can I get TOR for mobile?

2010-05-26 Thread Orionjur Tor-admin
and...@torproject.org wrote:
 On Tue, May 25, 2010 at 12:59:48PM +, tor-ad...@orionjurinform.com wrote 
 0.8K bytes in 18 lines about:
 : Does a Tor-version for WM exist? I thought that such tor-version didn't
 : exist.
 
 It doesn't exist in binary form.  However, thanks to a volunteer, we
 just committed some code to support it this week.
 
 See,
 https://gitweb.torproject.org/tor.git/commit/312f4ee410de718aaf20030d22a93f1c258faa37
 for an example.
 

I have got the 312f4ee410de718aaf20030d22a93f1c258faa37.tar.gz file and
how I could install it to my WM-PPC? It seems me that I can't do it
through make  make install under my Linux-machine (for WM).
Sorry for lamer's qustion but I have never compiled windows-programs
from sources.
And where can I get OpenSSL and libz for the WM, does they exist? (I
have read in the readme.txt file that OpenSSL and libz both compile on
MinGW out of the box).
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Re: problem with bridges and a suggestion

2010-05-26 Thread for.tor.bridge
dear andrew,

thanks a lot for your prompt reply.

as to your question:
Can you send debug logs to tor-assista...@torproject.org with what
happens when your client tries to connect to the bridges?

my answer:
sorry, I'm not familiar with TOR development, could you kindly tell me which 
file or files the debug logs are in?

as to your comment:
This is unlikely.  In our experience, they are merely blocking IP:Port 
combinations.

my answer:
I know some developers of china's blocking projects, so I know that they have 
more methods than that.
first, the so-called static blocking method include both mere IP mode and 
IP:port combination mode;
second, the so-called dynamic blocking mothod can break tcp connection upon 
traffic fingerprints.

hope I can help.
 
frank
2010-05-26

-
发件人:andrew
发送日期:2010-05-25 19:52:05
收件人:or-talk
抄送:
主题:Re: problem with bridges and a suggestion

On Tue, May 25, 2010 at 05:18:44PM +0800, for.tor.bri...@gmail.com wrote 1.3K 
bytes in 36 lines about:
: china is blocking TOR  more and more strict,
: I can't establish a TOR circuit even I updated bridges in config file
: of torrc with info retrieved from https://bridges.torproject.org and
: email replies from brid...@torproject.org.

Correct.  We are aware of this.

: this morning, I got some new bridges through a hidden https proxy and
: established a TOR circuit, but after some time, I lost the connection
: and couldn't  establish a TOR circuit any more.

Can you send debug logs to tor-assista...@torproject.org with what
happens when your client tries to connect to the bridges?

: from my knowledge to china's blocking methods, I believe they found my
: newly got bridges through network traffic protocol analysis, and
: blocked them.

This is unlikely.  In our experience, they are merely blocking IP:Port
combinations.

: use a general protocol for TOR clients to interact with bridges, so
: that they can't distinguish the traffic between TOR clients and
: bridges,
: so that they can't find new bridges got through private ways.

Tor traffic through bridges vs. public relays is the same.  There is not
a special bridge connection.  See
https://www.torproject.org/faq#RelayOrBridge, also that text needs to be
updated to reflect China's uniqueness in filtering Tor public relays.

: the general protocol could be https which is encryption protected;

It is already.  What may be unique is we start the connection with a TLS
renegotiation.  This is probably starting to stand out as unique now
that OpenSSL decided to everyone used renegotiation incorrectly and
almost all operating systems have erroneously disabled this
functionality by default.  See
https://www.torproject.org/faq#KeyManagement

: the general protocol could be plain http, if you can encode its
: content dynamically and privately, and don't make it display any
: fingerprints.

Then someone can read your traffic.  Hiding in plain sight sounds good
on paper, but doesn't stand up to academic research, so far.  See
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#YoushouldusesteganographytohideTortraffic.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Re: Tor Exit Node hosting: torservers.net

2010-05-26 Thread frank
屠申完美,

the bridges are blocked, try to find some more bridges.

sincerely,
 
frank
2010-05-26

-
sender: 屠申完美
sending date: 2010-05-26 12:27:14
receiver: or-talk
cc: 
subject: Re: Tor Exit Node hosting: torservers.net

Dear all,
My tor have a error,this is the message log:
 [Warning] Problem bootstrapping. Stuck at 10%: Finishing handshake with
directory server. (Socket is not connected [WSAENOTCONN ]; NOROUTE; count 4;
recommendation warn)

I have already set the bridges. pls help me,thanks.


Re: Re: problem with bridges and a suggestion

2010-05-26 Thread frank
dear andrew,

I tried to reach directory server with the following config:

#use a https proxy to reach directory server
HttpProxy IP:port

but it doesn't work, does not the directory server support https proxy?

my suggestion:
1.
let the directory server support https proxy, so that tor clients could reach 
it through a hidden https proxy;
2.
the directory server tests the reachability from some relays to the requesting 
tor clients, 
then sends back to tor clients a merely enough number of relays reachable by 
the requesting tor clients;
3.
in order to accomplish step 2, you have to set up some mechanics for relays to 
actively test reachability from them to tor clients.

hope I can help.

sincerely,
 
frank
2010-05-26

-
发件人:andrew
发送日期:2010-05-25 19:52:05
收件人:or-talk
抄送:
主题:Re: problem with bridges and a suggestion

On Tue, May 25, 2010 at 05:18:44PM +0800, for.tor.bri...@gmail.com wrote 1.3K 
bytes in 36 lines about:
: china is blocking TOR  more and more strict,
: I can't establish a TOR circuit even I updated bridges in config file
: of torrc with info retrieved from https://bridges.torproject.org and
: email replies from brid...@torproject.org.

Correct.  We are aware of this.

: this morning, I got some new bridges through a hidden https proxy and
: established a TOR circuit, but after some time, I lost the connection
: and couldn't  establish a TOR circuit any more.

Can you send debug logs to tor-assista...@torproject.org with what
happens when your client tries to connect to the bridges?

: from my knowledge to china's blocking methods, I believe they found my
: newly got bridges through network traffic protocol analysis, and
: blocked them.

This is unlikely.  In our experience, they are merely blocking IP:Port
combinations.

: use a general protocol for TOR clients to interact with bridges, so
: that they can't distinguish the traffic between TOR clients and
: bridges,
: so that they can't find new bridges got through private ways.

Tor traffic through bridges vs. public relays is the same.  There is not
a special bridge connection.  See
https://www.torproject.org/faq#RelayOrBridge, also that text needs to be
updated to reflect China's uniqueness in filtering Tor public relays.

: the general protocol could be https which is encryption protected;

It is already.  What may be unique is we start the connection with a TLS
renegotiation.  This is probably starting to stand out as unique now
that OpenSSL decided to everyone used renegotiation incorrectly and
almost all operating systems have erroneously disabled this
functionality by default.  See
https://www.torproject.org/faq#KeyManagement

: the general protocol could be plain http, if you can encode its
: content dynamically and privately, and don't make it display any
: fingerprints.

Then someone can read your traffic.  Hiding in plain sight sounds good
on paper, but doesn't stand up to academic research, so far.  See
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#YoushouldusesteganographytohideTortraffic.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Re: Tor Exit Node hosting: torservers.net

2010-05-26 Thread Dare
Frank,
Thanks for your help.I get a lot of bridges,today,but all blocked.
So i try to install the your-freedom,and set the proxy at tor,now it's work
greatly.
But i think the your-freedom can't work well always.so how can i get the
strong bridge for tor?

2010/5/26 frank for.tor.bri...@gmail.com

 屠申完美,

 the bridges are blocked, try to find some more bridges.

 sincerely,

 frank
 2010-05-26

 -
 sender: 屠申完美
 sending date: 2010-05-26 12:27:14
 receiver: or-talk
 cc:
 subject: Re: Tor Exit Node hosting: torservers.net

 Dear all,
 My tor have a error,this is the message log:
  [Warning] Problem bootstrapping. Stuck at 10%: Finishing handshake with
 directory server. (Socket is not connected [WSAENOTCONN ]; NOROUTE; count
 4;
 recommendation warn)

 I have already set the bridges. pls help me,thanks.




-- 
Dare


gwget and tor?

2010-05-26 Thread emigrant
is there a way to use gwget with tor?
most of the times i download a direct link in tor enabled firefox it
stops in the middle despite the internet connection is good.

thanks.

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor Exit Node hosting: torservers.net

2010-05-26 Thread andrew
On Tue, May 25, 2010 at 11:24:43AM +0200, t...@wiredwings.com wrote 0.9K bytes 
in 23 lines about:
 I set up a preliminary homepage at http://www.torservers.net/

Looks good.  You have already received plenty of feedback about creating
confusion as to who is sponsoring these relays, so I'm not going to
address it further.  

My advice is that if you are trying to attract non-technical people to
donate money in order to create more relays, your index page needs to be
far less technical.  As examples, look at the difference in
http://www.charitywater.org/ versus http://www.watercharity.org/.   They
roughly do the same thing in the eyes of a normal person.  The former
website is much more successful at public fundraising according to their
990 filings.  

Also, explain how creating more tor/i2p nodes helps the normal person.
Or, who it actually helps.  And I suggest having two simple
thermometers; total funds raised and number of nodes possible per year.

Overall, I'm happy we have people starting to try to create more relays,
whether through this model or the Coldboot UK model.  

Good luck.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: gwget and tor?

2010-05-26 Thread Aplin, Justin M

On 5/26/2010 7:39 AM, emigrant wrote:

is there a way to use gwget with tor?
most of the times i download a direct link in tor enabled firefox it
stops in the middle despite the internet connection is good.
   
I don't know about gwget, but plain wget supports http proxies, which 
you can point at Polipo. If you're only going to need to do this every 
once in a while, I'd pop open a terminal and do the following:
HTTP_PROXY=127.0.0.1:8118  HTTPS_PROXY=127.0.0.1:8118  
FTP_PROXY=127.0.0.1:8118

export HTTP_PROXY  export HTTPS_PROXY  export FTP_PROXY
wget your://url.to/download.here

If that doesn't work for you, open your Polipo configuration file and 
see what port it's set up to run on, and change the bit after the colon 
in the environmental variables. Wget will pick up on the environmental 
variables and should route your download through Tor. These settings 
will only last until you either close the shell, or until you log out (I 
forget which and can't make it to my linux box to check), so if you'll 
be doing this a lot you can add the following lines to your .wgetrc file 
to have them executed automatically:


proxy = on
HTTP_PROXY = 127.0.0.1:8118
HTTPS_PROXY = 127.0.0.1:8118
FTP_PROXY = 127.0.0.1:8118

To resume an interrupted download, just add the -c option, like so:

wget -c your://url.to/download.here


thanks.

   


Anytime =)

~japlin
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Bridges and China (new thread)

2010-05-26 Thread andrew
Rather than continue to hijack the old thread, here's a new one about
bridges and china.

I'm fully aware the GFW seems to have successfully crawled
https://bridges.torproject.org and added all of those bridges into their
blocking regime.  The email distribution method, brid...@torproject.org,
may also have been crawled and added to the blocking regime.  There are
still 3 other pools of bridge addresses, one of which is held in
reserve.  It seems the other two methods are continuing to work, as a
paltry 5000 connections from China still can access Tor daily.  This is
vastly smaller than the 100,000 or so we used to get.  

The other methods of obtaining bridges are slower and more viral.  They
use social networking technologies like twitter and qq to distribute
bridge addresses.  I've been told if you search on baidu, you can find
such bridge addresses.  And until now, they still work.  We've given
some addresses to trusted networks inside China. What they do with the
bridges is up to them.  I've heard some are bridge addresses are being
released by blog posts, BBS posts, qq, and ads on taobao. I'm assuming
the admins of the GFW read or-talk in some fashion.  They are doing
their job and we're doing ours.

Conversely, Tor supports 3rd party http/https proxies.  Many people use
Tor because they want the privacy aspects of it, not just the ability to
circumvent a firewall.  You can use the 3rd party http/https proxy as
the access layer around the blocking system, and then to tor.

This is an arms race, we're working on next steps in it.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: gwget and tor?

2010-05-26 Thread Scott Bennett
 On Wed, 26 May 2010 09:40:29 -0400 Aplin, Justin M jmap...@ufl.edu
wrote:
On 5/26/2010 7:39 AM, emigrant wrote:
 is there a way to use gwget with tor?
 most of the times i download a direct link in tor enabled firefox it
 stops in the middle despite the internet connection is good.

I don't know about gwget, but plain wget supports http proxies, which 
you can point at Polipo. If you're only going to need to do this every 
once in a while, I'd pop open a terminal and do the following:
HTTP_PROXY=127.0.0.1:8118  HTTPS_PROXY=127.0.0.1:8118  
FTP_PROXY=127.0.0.1:8118
export HTTP_PROXY  export HTTPS_PROXY  export FTP_PROXY
wget your://url.to/download.here

 Once again, I strongly recommend that you set the *_proxy environment
variables to full URLs rather than to the abbreviated forms you've shown
above.  See fetch(3) in the man pages for details.

If that doesn't work for you, open your Polipo configuration file and 
see what port it's set up to run on, and change the bit after the colon 
in the environmental variables. Wget will pick up on the environmental 
variables and should route your download through Tor. These settings 
will only last until you either close the shell, or until you log out (I 
forget which and can't make it to my linux box to check), so if you'll 
be doing this a lot you can add the following lines to your .wgetrc file 
to have them executed automatically:

proxy = on
HTTP_PROXY = 127.0.0.1:8118
HTTPS_PROXY = 127.0.0.1:8118
FTP_PROXY = 127.0.0.1:8118

 See note above.

To resume an interrupted download, just add the -c option, like so:

wget -c your://url.to/download.here


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at cs.niu.edu  *
**
* A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army.   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: problem with bridges and a suggestion

2010-05-26 Thread Stephen Carpenter
On Tue, May 25, 2010 at 7:51 AM,  and...@torproject.org wrote:
 On Tue, May 25, 2010 at 05:18:44PM +0800, for.tor.bri...@gmail.com wrote 1.3K 
 bytes in 36 lines about:

 : this morning, I got some new bridges through a hidden https proxy and
 : established a TOR circuit, but after some time, I lost the connection
 : and couldn't  establish a TOR circuit any more.

 Can you send debug logs to tor-assista...@torproject.org with what
 happens when your client tries to connect to the bridges?

 : from my knowledge to china's blocking methods, I believe they found my
 : newly got bridges through network traffic protocol analysis, and
 : blocked them.

 This is unlikely.  In our experience, they are merely blocking IP:Port
 combinations.

The question though is... how do they find them? Sure, you can get the
directory list, scrape the common bridge lists. However... this pretty
quickly is just Whack a Mole. You have to imagine that they are
smart enough to figure that a person who was using tor yesterday, is
probably looking for a new bridge today.

Once you know who, even if its a small subset, is using tor, and smart
enough to find bridges as you shut them down, well... it wouldn't be
hard to watch them, and identify which connections of theirs are
bridges, and then push out new block lists. Even if I can't prove that
your connection from port x to port y is a tor connection, I can still
connect to the same remote port and negotiate an ssl connection myself
and verify if its a bridge. Hell, it could be automated.

It may not be 100%, but, it doesn't really need to be. Its not like
you need all the users all the time, just enough to raise the bar and
cut down the numbers.

 : use a general protocol for TOR clients to interact with bridges, so
 : that they can't distinguish the traffic between TOR clients and
 : bridges,
 : so that they can't find new bridges got through private ways.

 Tor traffic through bridges vs. public relays is the same.  There is not
 a special bridge connection.  See
 https://www.torproject.org/faq#RelayOrBridge, also that text needs to be
 updated to reflect China's uniqueness in filtering Tor public relays.

 : the general protocol could be https which is encryption protected;

 It is already.  What may be unique is we start the connection with a TLS
 renegotiation.  This is probably starting to stand out as unique now
 that OpenSSL decided to everyone used renegotiation incorrectly and
 almost all operating systems have erroneously disabled this
 functionality by default.  See
 https://www.torproject.org/faq#KeyManagement

Perhaps other ways of hiding it are needed. As it is, it would be
trivial to connect via ssl and verify if a machine talks onion router.
It might be harder if there were multiple protocol paths into it. What
if I connect on port 25  and get a normal mail server, then start tls
from within protocol and use a command to switch to onion routing. I
connect on port 636 and its ldap first. 993 and its IMAP over ssl.

Perhaps the secret command to initiate the protocol could be part of
the bridge description?

-Steve
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Bridges and China (new thread)

2010-05-26 Thread Al MailingList
On Wed, May 26, 2010 at 4:06 PM,  and...@torproject.org wrote:
 Rather than continue to hijack the old thread, here's a new one about
 bridges and china.

 I'm fully aware the GFW seems to have successfully crawled
 https://bridges.torproject.org and added all of those bridges into their
 blocking regime.  The email distribution method, brid...@torproject.org,
 may also have been crawled and added to the blocking regime.  There are
 still 3 other pools of bridge addresses, one of which is held in
 reserve.  It seems the other two methods are continuing to work, as a
 paltry 5000 connections from China still can access Tor daily.  This is
 vastly smaller than the 100,000 or so we used to get.

Is it worth adding a captcha to bridges.torproject.org? Incidentally,
what happens when adversaries just block access to that site?

How about responding to bridge request emails with a captcha style
email attachment with the IPs of bridges?

That would kill any automated attempt to scrape the bridges?

Al
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Bridges and China (new thread)

2010-05-26 Thread Ryan Day
On Wed, May 26, 2010 at 3:42 PM, Al MailingList alpal.mailingl...@gmail.com
 wrote:


 Is it worth adding a captcha to bridges.torproject.org? Incidentally,
 what happens when adversaries just block access to that site?

 How about responding to bridge request emails with a captcha style
 email attachment with the IPs of bridges?

 That would kill any automated attempt to scrape the bridges?

 Al


I have a project called ObfuscaTOR which reads bridge information and
displays it using captcha-style encoding.  Its a wordpress plugin, and
development is kinda stalled.  There have been some downloads, and a Reddit
post, but other then that interest seemed kind of low.  I even had one guy
email me to remove the project as I was helping to destroy the Tor Project.

This gets around adversaries blocking access because any one of the
millions of bloggers can include the plugin, so you can't block the whole
internet(unless you have a country wide firewall of course;)   As far as
automated scanning, I have heard China doesn't automate the process so much
as they have thousands of workers manually scanning for things such as this.

I like your email idea though,  its a lot easier to track and block email
requests from the same domain.  It seems like it would be a lot harder to
setup lots of fake mail servers.  How about incoming email being filtered
based on the sender however?


Ryan


Re: Bridges and China (new thread)

2010-05-26 Thread andrew
On Wed, May 26, 2010 at 08:42:12PM +0100, alpal.mailingl...@gmail.com wrote 
1.2K bytes in 26 lines about:
: Is it worth adding a captcha to bridges.torproject.org? Incidentally,
: what happens when adversaries just block access to that site?

Is it worth adding, maybe.  Most captcha systems assume a program is
trying to break it, increasingly, blog spam and such is done by humans
paid pennies per hour.  

: That would kill any automated attempt to scrape the bridges?

Assume a human is doing the scraping.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


No fingerprint in Notice level log on Windows

2010-05-26 Thread Aplin, Justin M
This may be borderline nitpicking, but a nice feature I've noticed when 
configuring my PPC machines is that Vidalia catches a line from the log 
starting Your Tor server's identity key fingerprint is I've found 
it's useful to have at a glance in a number of testing and configuring 
situations. None of my Windows machines seem to show this; both are let 
at log level Notice.


I haven't had time to play with different log levels yet, maybe I'll get 
to it this weekend. Plus my Windows server has been getting a lot of 
traffic today, I feel bad restarting it lol.


Is anyone else as anal as me about noticing things like this?

~japlin
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Re: problem with bridges and a suggestion

2010-05-26 Thread frank
Steve,

thanks a lot, steve, you got my points totally!
I can't express my points very clearly, I'm not a native english speaker. :-(

sincerely,
 
frank
2010-05-27

-
sender: Stephen Carpenter
sending date: 2010-05-27 00:01:47
receiver: or-talk
cc: 
subject: Re: problem with bridges and a suggestion

On Tue, May 25, 2010 at 7:51 AM,  and...@torproject.org wrote:
 On Tue, May 25, 2010 at 05:18:44PM +0800, for.tor.bri...@gmail.com wrote 1.3K 
 bytes in 36 lines about:

 : this morning, I got some new bridges through a hidden https proxy and
 : established a TOR circuit, but after some time, I lost the connection
 : and couldn't  establish a TOR circuit any more.

 Can you send debug logs to tor-assista...@torproject.org with what
 happens when your client tries to connect to the bridges?

 : from my knowledge to china's blocking methods, I believe they found my
 : newly got bridges through network traffic protocol analysis, and
 : blocked them.

 This is unlikely.  In our experience, they are merely blocking IP:Port
 combinations.

The question though is... how do they find them? Sure, you can get the
directory list, scrape the common bridge lists. However... this pretty
quickly is just Whack a Mole. You have to imagine that they are
smart enough to figure that a person who was using tor yesterday, is
probably looking for a new bridge today.

Once you know who, even if its a small subset, is using tor, and smart
enough to find bridges as you shut them down, well... it wouldn't be
hard to watch them, and identify which connections of theirs are
bridges, and then push out new block lists. Even if I can't prove that
your connection from port x to port y is a tor connection, I can still
connect to the same remote port and negotiate an ssl connection myself
and verify if its a bridge. Hell, it could be automated.

It may not be 100%, but, it doesn't really need to be. Its not like
you need all the users all the time, just enough to raise the bar and
cut down the numbers.

 : use a general protocol for TOR clients to interact with bridges, so
 : that they can't distinguish the traffic between TOR clients and
 : bridges,
 : so that they can't find new bridges got through private ways.

 Tor traffic through bridges vs. public relays is the same.  There is not
 a special bridge connection.  See
 https://www.torproject.org/faq#RelayOrBridge, also that text needs to be
 updated to reflect China's uniqueness in filtering Tor public relays.

 : the general protocol could be https which is encryption protected;

 It is already.  What may be unique is we start the connection with a TLS
 renegotiation.  This is probably starting to stand out as unique now
 that OpenSSL decided to everyone used renegotiation incorrectly and
 almost all operating systems have erroneously disabled this
 functionality by default.  See
 https://www.torproject.org/faq#KeyManagement

Perhaps other ways of hiding it are needed. As it is, it would be
trivial to connect via ssl and verify if a machine talks onion router.
It might be harder if there were multiple protocol paths into it. What
if I connect on port 25  and get a normal mail server, then start tls
from within protocol and use a command to switch to onion routing. I
connect on port 636 and its ldap first. 993 and its IMAP over ssl.

Perhaps the secret command to initiate the protocol could be part of
the bridge description?

-Steve
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
N‹§²æìr¸›zǧu©Þ™¨¥¶‰šŽŠÝ¢j-¢ºk¢7œ¶ŠàÂ+aº{.nÇ+‰·¨®Ö¥’)í…æèw(m¶Ÿÿj·!Š÷¬±ë¥¢¸?¢¿íjY?

Re: Bridges and China (new thread)

2010-05-26 Thread frank
hi, andrew,

I've been told if you search on baidu, you can find  such bridge addresses.
bridge addresses are being released by blog posts, BBS posts, qq, and ads on 
taobao.
then bad guys can get and block them too through baidu searching,
and more, qq is totally under control of bad guys, we can't trust qq, believe 
me, I know the truth.

Tor supports 3rd party http/https proxies
could you kindly tell me how to use tor above 3rd party https/http proxies? 
what's the config?
 

sincerely,
 
frank
2010-05-27

-
sender: andrew
sending date: 2010-05-26 23:07:04
receiver: or-talk
cc: 
subject: Bridges and China (new thread)

Rather than continue to hijack the old thread, here's a new one about
bridges and china.

I'm fully aware the GFW seems to have successfully crawled
https://bridges.torproject.org and added all of those bridges into their
blocking regime.  The email distribution method, brid...@torproject.org,
may also have been crawled and added to the blocking regime.  There are
still 3 other pools of bridge addresses, one of which is held in
reserve.  It seems the other two methods are continuing to work, as a
paltry 5000 connections from China still can access Tor daily.  This is
vastly smaller than the 100,000 or so we used to get.  

The other methods of obtaining bridges are slower and more viral.  They
use social networking technologies like twitter and qq to distribute
bridge addresses.  I've been told if you search on baidu, you can find
such bridge addresses.  And until now, they still work.  We've given
some addresses to trusted networks inside China. What they do with the
bridges is up to them.  I've heard some are bridge addresses are being
released by blog posts, BBS posts, qq, and ads on taobao. I'm assuming
the admins of the GFW read or-talk in some fashion.  They are doing
their job and we're doing ours.

Conversely, Tor supports 3rd party http/https proxies.  Many people use
Tor because they want the privacy aspects of it, not just the ability to
circumvent a firewall.  You can use the 3rd party http/https proxy as
the access layer around the blocking system, and then to tor.

This is an arms race, we're working on next steps in it.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Re: problem with bridges and a suggestion

2010-05-26 Thread frank
hi steve,

Perhaps other ways of hiding it are needed. As it is, it would be
trivial to connect via ssl and verify if a machine talks onion router.
It might be harder if there were multiple protocol paths into it. What
if I connect on port 25  and get a normal mail server, then start tls
from within protocol and use a command to switch to onion routing. I
connect on port 636 and its ldap first. 993 and its IMAP over ssl.

that's it!  to use a general protocol even like udp 53 to act as a tunnel for 
tor negotiation traffic.

sincerely,
 
frank
2010-05-27

-
sender: Stephen Carpenter
sending date: 2010-05-27 00:01:47
receiver: or-talk
cc: 
subject: Re: problem with bridges and a suggestion

On Tue, May 25, 2010 at 7:51 AM,  and...@torproject.org wrote:
 On Tue, May 25, 2010 at 05:18:44PM +0800, for.tor.bri...@gmail.com wrote 1.3K 
 bytes in 36 lines about:

 : this morning, I got some new bridges through a hidden https proxy and
 : established a TOR circuit, but after some time, I lost the connection
 : and couldn't  establish a TOR circuit any more.

 Can you send debug logs to tor-assista...@torproject.org with what
 happens when your client tries to connect to the bridges?

 : from my knowledge to china's blocking methods, I believe they found my
 : newly got bridges through network traffic protocol analysis, and
 : blocked them.

 This is unlikely.  In our experience, they are merely blocking IP:Port
 combinations.

The question though is... how do they find them? Sure, you can get the
directory list, scrape the common bridge lists. However... this pretty
quickly is just Whack a Mole. You have to imagine that they are
smart enough to figure that a person who was using tor yesterday, is
probably looking for a new bridge today.

Once you know who, even if its a small subset, is using tor, and smart
enough to find bridges as you shut them down, well... it wouldn't be
hard to watch them, and identify which connections of theirs are
bridges, and then push out new block lists. Even if I can't prove that
your connection from port x to port y is a tor connection, I can still
connect to the same remote port and negotiate an ssl connection myself
and verify if its a bridge. Hell, it could be automated.

It may not be 100%, but, it doesn't really need to be. Its not like
you need all the users all the time, just enough to raise the bar and
cut down the numbers.

 : use a general protocol for TOR clients to interact with bridges, so
 : that they can't distinguish the traffic between TOR clients and
 : bridges,
 : so that they can't find new bridges got through private ways.

 Tor traffic through bridges vs. public relays is the same.  There is not
 a special bridge connection.  See
 https://www.torproject.org/faq#RelayOrBridge, also that text needs to be
 updated to reflect China's uniqueness in filtering Tor public relays.

 : the general protocol could be https which is encryption protected;

 It is already.  What may be unique is we start the connection with a TLS
 renegotiation.  This is probably starting to stand out as unique now
 that OpenSSL decided to everyone used renegotiation incorrectly and
 almost all operating systems have erroneously disabled this
 functionality by default.  See
 https://www.torproject.org/faq#KeyManagement

Perhaps other ways of hiding it are needed. As it is, it would be
trivial to connect via ssl and verify if a machine talks onion router.
It might be harder if there were multiple protocol paths into it. What
if I connect on port 25  and get a normal mail server, then start tls
from within protocol and use a command to switch to onion routing. I
connect on port 636 and its ldap first. 993 and its IMAP over ssl.

Perhaps the secret command to initiate the protocol could be part of
the bridge description?

-Steve
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Bridges and China (new thread)

2010-05-26 Thread andrew
On Thu, May 27, 2010 at 11:21:50AM +0800, for.tor.bri...@gmail.com wrote 2.7K 
bytes in 67 lines about:
: I've been told if you search on baidu, you can find  such bridge addresses.
: bridge addresses are being released by blog posts, BBS posts, qq, and ads on 
taobao.
: then bad guys can get and block them too through baidu searching,
: and more, qq is totally under control of bad guys, we can't trust qq, believe 
me, I know the truth.

The point of releasing the bridge addresses this way is to see how long
it takes to go from public publishing to blocking in the GFW.

: Tor supports 3rd party http/https proxies
: could you kindly tell me how to use tor above 3rd party https/http proxies? 
what's the config?

There are two ways to do this, through Vidalia or editing your torrc.
In Vidalia, go to Settings, Network, and click I use a proxy to access
the Internet, then enter your proxy details.

In torrc, see
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#MyInternetconnectionrequiresanHTTPproxy.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Re: Bridges and China (new thread)

2010-05-26 Thread frank
hi andrew,

thanks a lot for your prompt reply.

In torrc, see
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#MyInternetconnectionrequiresanHTTPproxy.
ok,  got it, I prefer this way, thanks a lot.

sincerely,
 
frank
2010-05-27

-
sender: andrew
sending date: 2010-05-27 11:42:55
receiver: or-talk
cc: 
subject: Re: Bridges and China (new thread)

On Thu, May 27, 2010 at 11:21:50AM +0800, for.tor.bri...@gmail.com wrote 2.7K 
bytes in 67 lines about:
: I've been told if you search on baidu, you can find  such bridge addresses.
: bridge addresses are being released by blog posts, BBS posts, qq, and ads on 
taobao.
: then bad guys can get and block them too through baidu searching,
: and more, qq is totally under control of bad guys, we can't trust qq, believe 
me, I know the truth.

The point of releasing the bridge addresses this way is to see how long
it takes to go from public publishing to blocking in the GFW.

: Tor supports 3rd party http/https proxies
: could you kindly tell me how to use tor above 3rd party https/http proxies? 
what's the config?

There are two ways to do this, through Vidalia or editing your torrc.
In Vidalia, go to Settings, Network, and click I use a proxy to access
the Internet, then enter your proxy details.

In torrc, see
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#MyInternetconnectionrequiresanHTTPproxy.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Re: Bridges and China (new thread)

2010-05-26 Thread frank
hi, andrew

##You will need an http proxy for doing GET requests to fetch the Tor 
directory, 
##and you will need an https proxy for doing CONNECT requests to get to Tor 
relays. 
##(It's fine if they're the same proxy.) 
#HttpProxy IP:port
#HttpsProxy IP:port

my question:
why not put the tor directory server in https mode too?

sincerely,
 
frank
2010-05-27

-
sender: andrew
sending date: 2010-05-27 11:42:55
receiver: or-talk
cc: 
subject: Re: Bridges and China (new thread)

On Thu, May 27, 2010 at 11:21:50AM +0800, for.tor.bri...@gmail.com wrote 2.7K 
bytes in 67 lines about:
: I've been told if you search on baidu, you can find  such bridge addresses.
: bridge addresses are being released by blog posts, BBS posts, qq, and ads on 
taobao.
: then bad guys can get and block them too through baidu searching,
: and more, qq is totally under control of bad guys, we can't trust qq, believe 
me, I know the truth.

The point of releasing the bridge addresses this way is to see how long
it takes to go from public publishing to blocking in the GFW.

: Tor supports 3rd party http/https proxies
: could you kindly tell me how to use tor above 3rd party https/http proxies? 
what's the config?

There are two ways to do this, through Vidalia or editing your torrc.
In Vidalia, go to Settings, Network, and click I use a proxy to access
the Internet, then enter your proxy details.

In torrc, see
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#MyInternetconnectionrequiresanHTTPproxy.

-- 
Andrew Lewman
The Tor Project
pgp 0x31B0974B

Website: https://www.torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/