Re: Tor relay on vserver exeeding numtcpsock

2011-01-13 Thread Klaus Layer
Am Mittwoch, 12. Januar 2011, um 22:44:12 schrieb Moritz Bartl:
 Hi,
 
 You should probably contact the ISP first to see if they will raise the
 limit. Mine was low on file descriptors and they upped it generously 5
 minutes later (on a cheap $20 vserver).
 
 Moritz
 

Thanks for all your suggestions. This morning I contacted the HostEurope 
support. They were very friendly but refused to increase the parameter. They 
told me that the product is designed this way and they cannot change anything. 
They advised me to order a product with a higher number of tcp sockets. But 
even the high-end vserver product for EUR 70 ($90) per month only provides 
1550 tcp connections (http://faq.hosteurope.de/index.php?cpid=13281). All 
these HostEurope vserver products are crippled regarding numtcpsock.

Bottom line: HostEuropes vserver cannot be recommended for tor relays. I will 
update the wiki accordingly.

I will move to another ISP. In the meantime I will play around with the 
ConstrainedSocksSize parameter to get the most out of the vserver.

Moritz, from which ISP did you get this $20 vserver?

Regards,

Klaus

-- 
Klaus Layer
Walldorf, Germany
GPG Fingerprint: 466D 12F8 28A3 D137 A77E FC3B 271C 2D79 6F5E 94C9


signature.asc
Description: This is a digitally signed message part.


Re: forum hacks

2011-01-13 Thread umgregor


Sorry, I missed that!


:D



On Jan 13 2011, Olaf Selke wrote: 

Hi,
are folks from 27c3 trying to break into web forums today? Never got so many abuse complaints within a few hours in the last three years.
regards Olaf
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talk in the body. http://archives.seul.org/or/talk/


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: BHDC11 - De-anonymizing Live CDs through Physical Memory Analysis

2011-01-13 Thread intrigeri
Hi,

(Now Cc'ing tails-dev mailing list.)

coderman wrote (12 Jan 2011 12:06:05 GMT) :
 however, more than just wipe at shutdown is useful.

Ack. On second thought, it appears to me the current T(A)ILS wipe
memory on shutdown implementation does not necessarily protect
against the attacks that the mentioned talk will probably highlight.
It is likely that some other similar implementations in Live systems
are affected as well.

In short: we wipe *free* memory only, in order to keep the system in
working state and let the shutdown sequence finish its work afterwards
(i.e. actually halt or reboot the system). On the other hand, data
saved in the {union,au}fs ramdisk branch is not free memory and might
thus be recovered. A security announce about this is being worked on
(explaining this problem and the possible consequences to
non-technical users is, well, tricky).

 explicit ordered zeroisation is handy. (starting with keys and key
 schedules, working cipher state, then on to user data, before
 completing a full pass or three. this takes a smart kexec or other
 ham fisted - still worth the effort.)

The kexec idea seems brilliant to me: this is the best way I can think
of to run the memory wipe process inside an environment where almost
all of the memory is considered as being free.

I have thus started implementing this idea in T(A)ILS. Thanks to
Debian's initramfs-tools and kexec-tools, drafting an early prototype
was quite easy. Stay tuned, more to come soon.

 in any case, this begs the question of best practice in solid state
 remanence avoidance. it would make a good FAQ entry, perhaps...

T(A)ILS specification and security design document (draft almost ready
to be published to a wild, unsuspecting world) intends to propose a
set of best practices in this field.

Bye,
--
  intrigeri intrig...@boum.org
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
  | Do not be trapped by the need to achieve anything.
  | This way, you achieve everything.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Repeated messages from me

2011-01-13 Thread Olaf Selke
I apologize for sending repeated messages to this list. My K9 Android
mail app on the cell phone seems to be out of control.

Olaf
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Repeated messages from me

2011-01-13 Thread Marco Predicatori
Olaf Selke, on 01/13/2011 01:42 PM, wrote:
 I apologize for sending repeated messages to this list. My K9
 Android mail app on the cell phone seems to be out of control.

Uh, maybe that's what they are really doing at 27c3! :-P

-- 
http://www.predicatori.it/marco/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: System time in anonymity oriented LiveCDs

2011-01-13 Thread anonym
13/01/11 04:28, Roger Dingledine:
 If your Tor fetches its consensus from a directory authority, you're
 in better shape, insofar as the directory authorities are probably not
 your adversaries.

But if we'd force this, we'd be distinguishable from other Tor clients
to some extent, I suppose.

 Relays do these directory fetches in the clear, though, due to an
 earlier bug: https://trac.torproject.org/projects/tor/ticket/827
 so we're back to the authentication and integrity question there. Clients
 set up a TLS connection first and tunnel their directory fetches over it,
 so they're in slightly better shape. Do your LiveCD users always have
 both ORPort set to 0?

Yes, ORPort is set to 0 per default. However, a user could easily become
and OR by fiddling around in Vidalia.

 The better answer is for Tor clients to read the time out of the NETINFO
 cells that are part of the v2 connection handshake we added in Tor
 0.2.0.x. See section 4.2 of tor-spec.txt:
 https://git.torproject.org/tor/doc/spec/tor-spec.txt

You mean that we should read this value when our Tor client makes its
very first try to establish a connection to a directory server/mirror?
How is this any safer than checking the consensus' valid-after/until
values? The mirror we connect to could be compromised, and send us an
appropriate timestamp and then replay any old consensus.

 Using the data in NETINFO cells has been sitting on the todo list for
 a while:
 https://git.torproject.org/tor/doc/spec/proposals/149-using-netinfo-data.txt
 but nobody's moved it forward. Perhaps somebody wants to pick this up
 and do it? :)

I'm not sure I understand this proposition (alternatively I don't
understand NETINFO cells). It says we don't want to simply trust the
NETINFO cell timestamp and IP address blindly, but instead we want some
sort of majority vote based on the NETINFO cell values of several
nodes. I can understand how that makes sense for the timestamp, but the
IP address? My understanding is that when a node sends a NETINFO cell,
its IP address value should be the sending node's real IP address.
Hence, how can looking at other nodes' NETINFO cells help validating the
IP address? They should all be pair-wise different.

 Also, ideally you want to get an opinion from more than one directory
 authority. One design that I could imagine would be to, if we find a
 directory mirror or entry guard whose time disagrees with us, connect
 to a directory authority to get a stronger opinion. If the directory
 authority also disagrees, connect to a threshold of directory authorities
 and then memorize our relative clock skew based on the majority vote.

How do you propose we'd do this? Remember: we have no directory
information when we want to set the time, and the time needs to be set
before we get the consensus (otherwise we cannot trust it). Is this a
catch-22?



signature.asc
Description: OpenPGP digital signature


Re: Tor relay on vserver exeeding numtcpsock

2011-01-13 Thread Olaf Selke
On 12.01.2011 22:02, coderman wrote:
 On Wed, Jan 12, 2011 at 7:57 AM, Klaus Layer klaus.la...@gmx.de wrote:
 ...
 Error creating network socket: No buffer space available

 errors. The numtcpsocks parameter limit is set to 550 on the vserver. Before
 asking the ISP to increase the value I would like to ask you what a 
 reasonable
 value  of this parameter would be.
 
 550 is ridiculous. it should be at least 4096, more if they are accomodating.

here's some data for the machine running my four nodes:

anonymizer2:~# netstat -tn | wc -l
54157
anonymizer2:~# netstat -tn | grep ESTABLISHED | wc -l
30708

regards Olaf
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tor relay on vserver exeeding numtcpsock

2011-01-13 Thread Jan Weiher
2011/1/13 Olaf Selke olaf.se...@blutmagie.de:
 On 12.01.2011 22:02, coderman wrote:
 On Wed, Jan 12, 2011 at 7:57 AM, Klaus Layer klaus.la...@gmx.de wrote:
 ...
 Error creating network socket: No buffer space available

 errors. The numtcpsocks parameter limit is set to 550 on the vserver. Before
 asking the ISP to increase the value I would like to ask you what a 
 reasonable
 value  of this parameter would be.

 550 is ridiculous. it should be at least 4096, more if they are accomodating.

 here's some data for the machine running my four nodes:

 anonymizer2:~# netstat -tn | wc -l
 54157
 anonymizer2:~# netstat -tn | grep ESTABLISHED | wc -l
 30708

 regards Olaf
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/


Well, I don't think a cheap VPS is capable of creating this much
connections anyways. I got a relay with a limit of 800kb/sec (I don't
think a cheap VPS can do more traffic due to traffic limitations) and
I got this:

jan@puerta:~$ netstat -tn | wc -l
1002
jan@puerta:~$ netstat -tn | grep ESTABLISHED | wc -l
976

But I would agree that diversity is needed and good, and there are
plenty of ISPs out there. I would advice to look for a smaller one.
Those are often more helpful if you have got some special requests.

best regards,
Jan
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: geeez...

2011-01-13 Thread Fabian Keil
Moritz Bartl mor...@torservers.net wrote:

 On 12.01.2011 22:05, Fabian Keil wrote:
  Some of my equipment got seized a few months ago.
 
 Good luck on getting it back then!

Thanks.

  I'm also not sure how the police would try to seize equipment
  and fail (assuming the equipment is actually there). 
 
 Explosives? ;-)
 Did you run a Tor exit at home? I'm not sure if they come and seize your
 home computer if the Tor server is hosted in a data center. Olaf seems
 not to have run into big trouble yet (or maybe he was quick on replacing
 the hardware).

The exit node that triggered the raid is hosted by Strato.

I'm running it there since 2006. The friendly local police man
who usually deals with the occasional abuse cases has a generic
description of Tor that includes the IP addresses of my exit nodes
and can forward that information to whomever is interested without
having to contact me every time.

This arrangement worked rather well so far.

For reasons unknown to me the investigation that lead to the
raid was handled by a different police department, though, and
apparently the police men involved prefer to investigate a bit
differently. They also didn't seem that fond of Tor in general.

Fabian


signature.asc
Description: PGP signature


Re: geeez...

2011-01-13 Thread Mitar
Hi!

On Thu, Jan 13, 2011 at 3:01 AM, Roger Dingledine a...@mit.edu wrote:
 This is related to the if you remove Tor from the world, you're not
 really reducing the ability of bad guys to be anonymous on the Internet
 idea.

This could be then analog argument as saying that if you remove one
weapon factory from the world, that there would be no difference? But
one after another and there will be.

I cannot buy an argument saying that because situation is bad there
should be no small improvements where there could be.

 various other techniques people have developed over the years to deal with 
 abuse.

Then tell me which techniques have we developed which prevent
pedophiles to use hidden Tor services? Which techniques have we
developed which prevent somebody to blackmail somebody else over Tor
network and stay anonymous? Which techniques have we developed which
can help found out which are other people in terrorist group and trace
their communication, once we discover they use Tor?

 It depends where your jerks are coming from. If your jerks are all obeying
 every law and showing up from their static non-natted IP address, then
 yes, routing address is definitely related to identity. But if your
 jerks have ever noticed this doesn't work so well for them, they may
 start using other approaches and suddenly you're back needing to learn
 about application-level mechanisms

Because current protocols were done just to solve technical problems
and not also law or other society problems. For example, HAM
operators and their networks had, before they started their packets
networks, already laws in place requiring them that each packet should
also contain call-sign of responsible person/station. OK, in this
particular case (as far as I know) this is not cryptographically
enforced (but this is a technical thing) but it still shows that laws
like this can work. So if countries (like they cooperate on ACTA)
would declare that it is illegal to send or route or relay any packet
without information about responsible person for it things would be
much different.

So saying that currently technology does not support this and so it
does not matter is just because it was not required to support this.
But there is nothing preventing that laws would be changed in this
way. Probably also many lobbies are doing in this direction. Adding
another required field to IPv6 is not so hard. Making it
cryptographically secure a bit more. Do all work on teach people about
identity thefts (which would become even more profitable) even harder.

Because of this those are not arguments I could agree upon. They are
true, but it could be also otherwise. I would like to hear good
arguments why even if we would have in place all possible technical
means to identify originators (or possibility to turn this on if we
decide so) it would be still proper to not go along this path.

I can see arguments for this only possible with basing the argument on
human rights and similar values we might share. But then there are
conflicts of those rights, security vs. freedom.


Mitar
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: geeez...

2011-01-13 Thread Jimmy Richardson

Hi,:

What the hell are you talking about? The whole idea of Tor is anonymity, 
and you want Tor to make it easy to identify its users?


Thomas Jefferson already answered your question: The man who would 
choose security over freedom deserves neither.


If you want security over freedom, you're welcome to migrate to China or 
Iran.


Thanks


On 1/14/2011 9:27 AM, Mitar wrote:

Hi!

On Thu, Jan 13, 2011 at 3:01 AM, Roger Dingledinea...@mit.edu  wrote:

This is related to the if you remove Tor from the world, you're not
really reducing the ability of bad guys to be anonymous on the Internet
idea.

This could be then analog argument as saying that if you remove one
weapon factory from the world, that there would be no difference? But
one after another and there will be.

I cannot buy an argument saying that because situation is bad there
should be no small improvements where there could be.


various other techniques people have developed over the years to deal with 
abuse.

Then tell me which techniques have we developed which prevent
pedophiles to use hidden Tor services? Which techniques have we
developed which prevent somebody to blackmail somebody else over Tor
network and stay anonymous? Which techniques have we developed which
can help found out which are other people in terrorist group and trace
their communication, once we discover they use Tor?


It depends where your jerks are coming from. If your jerks are all obeying
every law and showing up from their static non-natted IP address, then
yes, routing address is definitely related to identity. But if your
jerks have ever noticed this doesn't work so well for them, they may
start using other approaches and suddenly you're back needing to learn
about application-level mechanisms

Because current protocols were done just to solve technical problems
and not also law or other society problems. For example, HAM
operators and their networks had, before they started their packets
networks, already laws in place requiring them that each packet should
also contain call-sign of responsible person/station. OK, in this
particular case (as far as I know) this is not cryptographically
enforced (but this is a technical thing) but it still shows that laws
like this can work. So if countries (like they cooperate on ACTA)
would declare that it is illegal to send or route or relay any packet
without information about responsible person for it things would be
much different.

So saying that currently technology does not support this and so it
does not matter is just because it was not required to support this.
But there is nothing preventing that laws would be changed in this
way. Probably also many lobbies are doing in this direction. Adding
another required field to IPv6 is not so hard. Making it
cryptographically secure a bit more. Do all work on teach people about
identity thefts (which would become even more profitable) even harder.

Because of this those are not arguments I could agree upon. They are
true, but it could be also otherwise. I would like to hear good
arguments why even if we would have in place all possible technical
means to identify originators (or possibility to turn this on if we
decide so) it would be still proper to not go along this path.

I can see arguments for this only possible with basing the argument on
human rights and similar values we might share. But then there are
conflicts of those rights, security vs. freedom.


Mitar
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: geeez...

2011-01-13 Thread Mike Perry
Thus spake Mitar (mmi...@gmail.com):

  This is related to the if you remove Tor from the world, you're not
  really reducing the ability of bad guys to be anonymous on the Internet
  idea.
 
 This could be then analog argument as saying that if you remove one
 weapon factory from the world, that there would be no difference? But
 one after another and there will be.
 
 I cannot buy an argument saying that because situation is bad there
 should be no small improvements where there could be.

That's not what we're saying, but I suspect you may just be trolling.
You're certainly straw-manning...

  various other techniques people have developed over the years to deal with 
  abuse.
 
 Then tell me which techniques have we developed which prevent
 pedophiles to use hidden Tor services? Which techniques have we
 developed which prevent somebody to blackmail somebody else over Tor
 network and stay anonymous? Which techniques have we developed which
 can help found out which are other people in terrorist group and trace
 their communication, once we discover they use Tor?

The same techniques that law enforcement use when these same
sophisticated adversaries use black market compromised botnets:
http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.html
http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_digital_forgeries.html
http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distributing_your.html

In these cases, police need to do police work: gathering technical
data and examining content for evidence to aid in the investigation;
and infiltrating groups and performing stings (for which they often
use Tor).

  It depends where your jerks are coming from. If your jerks are all obeying
  every law and showing up from their static non-natted IP address, then
  yes, routing address is definitely related to identity. But if your
  jerks have ever noticed this doesn't work so well for them, they may
  start using other approaches and suddenly you're back needing to learn
  about application-level mechanisms
 
 Because current protocols were done just to solve technical problems
 and not also law or other society problems. For example, HAM
 operators and their networks had, before they started their packets
 networks, already laws in place requiring them that each packet should
 also contain call-sign of responsible person/station. OK, in this
 particular case (as far as I know) this is not cryptographically
 enforced (but this is a technical thing) but it still shows that laws
 like this can work. So if countries (like they cooperate on ACTA)
 would declare that it is illegal to send or route or relay any packet
 without information about responsible person for it things would be
 much different.

You think criminals obey the law?

Both China and South Korea have instituted fully authenticated
internet drivers licenses, and not only has cybercrime not vanished,
it continues to flourish and profit from new markets that trade in these
credentials and the use of authenticated connections through proxy.

Even a fully cryptographically secured and authenticated Internet
would still be *just* as vulnerable to abuse, all other things being
equal. Grandma could even be required to have her iris scanned before
entering her bunker to use her military-grade encrypted, authenticated
PC that is otherwise disconnected from the Internet while her iris is
not available. But as soon as she scans her iris, the malware on her
machine would wake up and inform its masters that it is ready to do
their bidding.

The only way to really curtail these social problems is to properly
address their root causes. Taking freedoms away seems like an easy
quick fix, but in reality, there is no gain, only more insecurity.


This is why Tor is not part of the problem. In fact, its use by law
enforcement for stings, infiltration, and investigation indicates it
is also part of the solution.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgp8yzAPfXBDT.pgp
Description: PGP signature