Re: pidgin autoconnecting--how to disable

2013-04-03 Thread Ileana
  However, I think other users also might expect to be able to put
  localhost in the tor/privacy proxy settings, and may also have no
  clue why its not working.  Not sure if that is enhancement or bug,
  but it was annoying for me.  I can't think of any reason a user
  would want dns for localhost to be proxied...
 
 The string needs to somehow be converted to an IP address.
 
 I'm not sure how appropriate it would be to put a special case in for
 localhost, that'd only be a partial solution and seems like an ugly
 hack.
 
 I'd be interested to know what other applications have done for this
 issue.
 
Mozilla products have a screen which allows setting either socks4 or
socks5 proxy.  Whether to do remote dns is, unfortunately, a hidden
hard-to-find config option.  It should appear on that screen as a
checkbox.

There is a textbox, No proxy for: in which you list hostnames or ip
addresses that will not be proxied, dns or otherwise.  The default entry
in this text box is localhost, 127.0.0.1.  This is particularly useful
if you want to connect to some server on the local area network, while
still using the proxy for all other connecctions.

This I think covers every use case scenario.  Ideally, I think you
would have the same menu in the global as well as per/account settings,
making slightly but not much more complicated then mozilla, which just
has the one pref screen per app.

The only instance I see of one wanting to proxy localhost or 127.0.0.1
would be if a server admin is connecting to his IRC (for instance) via
a ssh dynamic socks5 proxy.  he can ssh into the box, and specify
localhost for the irc server hostname, this would be sent over proxy,
and he would connect locally to the loopback adapter on the server.

I think that I would recommend a similar approach.  We might not be
thinking of every usecase, so might as well do this approach which
covers every scenario a user might want to do.  This setting should
still be available for the tor/privacy proxy as well.


___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support


tor/privacy (socks5) option giving ssl error

2013-04-02 Thread Ileana
Hello,

Pidgin 2.10.6 (libpurple 2.10.6)
4cfe697ea3ae39a4fb3dad8e3ed1c70855901095

I am trying to connect to Tor using Pidgin.  I am having a connection
issue.  Of the three proxy options socks4, socks5, and
tor/privacy(socks5), it seems I should be using tor/privacy(socks5). 

This issue has come up on some Tor lists.

Can someone explain exactly what is the difference between Tor/Privacy
Socks5, and just Socks5, and whether you believe Pidgin to preserve the
anonymity?

And also, my question as to why on my system, socks 5 works, but
Tor/Privacy(Socks5) results in SSL connection error almost
immediately (i.e. I don't think it is even making any network activity,
it just immediately displays the SSL connect error.  Setting Socks5
works fine.

Thanks

___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support


Re: tor/privacy (socks5) option giving ssl error

2013-04-02 Thread Ileana
 
 You didn't provide any context to the specific issue, but the likely
 reason for this particular error is that the Tor/Privacy Socks5 mode
 will prevent DNS queries from occurring and this probably has the
 effect of preventing you from determining the correct server to
 connect to (e.g. a DNS SRV lookup is necessary to connect to the
 appropriate XMPP server for a number of domains unless you specify a
 Connect Server manually).
 

Daniel,

Sorry for the lack of context.  I am using tor and pidgin 
Pidgin 2.10.6 (libpurple 2.10.6), on linux.

I am connecting to a normal irc server.

It works with socks 5, it doesn't work, and immediately fails, with
tor/privacy socks5 with error ssl connection failed.

When I try to connect to an IRC tor hidden service
address (blahblahblah.onion) I get: 
Unable to connect: Aborting DNS lookup in Tor Proxy mode.

When I try to connect to a regular IRC address/hostname, I get SSL
Connection Failed.

Both work when I select socks5.  Neither works with tor/privacy(socks5).

Are you suggesting I should be putting the ip addresses in directly for
these hostnames?  That isn't even possible in the case of the hidden
service addresses.  And the hidden service address seems to resolve and
work fine with the socks5 setting.

I don't see how this can't be some kind of bug?  Aren't the dns requests
supposed to go through the proxy?  Do you need to add a check box (do
dns lookup at proxy end), as appears in the main proxy config screen,
for each individual setting?

I am concerned some users may be using pidgin incorrectly.  But you
might be right that it is a dns problem, and it is attempting the
lookup locally.  In the case of the TAILS OS, all dns is transparently
routed over the tor, so local dns gets resolved, and that would work.
But for most privacy users, local dns queeries are a big no-no, yet
they need to be done, and hence are done via socks 5 at proxy end.

What is the workaround now? Use socks4 and make the changes? Is it
sufficient to turn off unpp and disable uneccessary plugins, or is the
tor/privacy setting doing stuff in the code that an end user can't set
manually?  I.E. If I just use socks5 and disable plugins, is that
enough?  Does it do anything versus cctp/ping/dcc etc?

Thanks


___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support


Re: tor/privacy (socks5) option giving ssl error

2013-04-02 Thread Ileana
From my basic understanding, a tor/privacy setting should ensure:

*no local dns lookups (perhaps as an options checkbox)
socks4 automatically does lookup at end...there is no option.
socks5 you have option for local or remote dns in the spec.  Most tor
users want remote, except in the case of TAILS a user might handle the
dns queeries locally(and then resolving them through for instance tor's
dns port).  I think the same side is to do them remotely.

*real ip address never gets sent out

*no other system information gets sent out(kernel version, uname,
os, etc)

*nothing that seems to be a unique identifier gets sent out upon
connect/reconnect. (i.e. ssl session ids, user agents/version, etc).

*timestamps all converted to utc

*any functionality such as dcc where there is a direct connection to
the other client should either be disabled or also insure real ip is
not leaked.

I can't think of anything else off the top of my head, but I may have
missed something.

If you are a developer and can point me to a link to the code that
handles the proxy settings, I would take a further look.

Thanks

___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support


Re: tor/privacy (socks5) option giving ssl error

2013-04-02 Thread Ileana
On Tue, 2 Apr 2013 21:46:20 -0400
Daniel Atallah datal...@pidgin.im wrote:

 
  Daniel,
 
  Sorry for the lack of context.  I am using tor and pidgin
  Pidgin 2.10.6 (libpurple 2.10.6), on linux.
 
  I am connecting to a normal irc server.
 
  It works with socks 5, it doesn't work, and immediately fails, with
  tor/privacy socks5 with error ssl connection failed.
 
  When I try to connect to an IRC tor hidden service
  address (blahblahblah.onion) I get:
  Unable to connect: Aborting DNS lookup in Tor Proxy mode.
 
  When I try to connect to a regular IRC address/hostname, I get SSL
  Connection Failed.
 
 You'll need to provide more details - a sanitized debug log
 (Help-Debug Window) from when it tries to connect should help.
 

(21:49:24) account: Connecting to account foo44...@irc.oftc.net.
(21:49:24) connection: Connecting. gc = 0xb83c3868
(21:49:24) dnsquery: Performing DNS lookup for localhost
(21:49:24) dnsquery: Aborting DNS lookup in Tor Proxy mode.
(21:49:24) proxy: Connection attempt failed: Aborting DNS lookup in Tor Proxy 
mode.
(21:49:24) connection: Connection error on 0xb83c3868 (reason: 0 description: 
SSL Connection Failed)
(21:49:24) account: Disconnecting account foo44...@irc.oftc.net (0xb7c39428)
(21:49:24) connection: Disconnecting connection 0xb83c3868
(21:49:24) connection: Destroying connection 0xb83c3868
(21:49:28) autorecon: do_signon called
(21:49:28) autorecon: calling purple_account_connect

I don't understand this...it says it is doing dns lookup for localhost?

Ahh! I found it...I had localhost in the settings rather then
127.0.0.1.

When I set it to 127.0.0.1 for the proxy host, it works.  I see, it
cuts off all local dns requests, including looking at the host file.

I am not sure if this should be documented...most other applications
(firefox, thunderbird, etc) have the option to do some names locally,
in particular, localhost should usually work.  This may be considered a
minor bug?


 
 Again, it's hard to say without more information.  It's not possible
 to do all DNS requests through the proxy - you can pass a hostname to
 the proxy and have it resolve it, but e.g. a SRV request can't be done
 through a proxy.


 
 No, that checkbox is globally applied, it doesn't need to be more
 granularly applied.

Perhaps you are right.  And I am mixed up in my statements.  socks 4
you have the option local/remote dns.  socks4a seems to automatically
do remote, no option, but pidgin doesn't seem to do socks4a.  And socks5
again the option, but it seems the common setting is to do remote
lookup.  

 
  I am concerned some users may be using pidgin incorrectly.  But you
  might be right that it is a dns problem, and it is attempting the
  lookup locally.  In the case of the TAILS OS, all dns is
  transparently routed over the tor, so local dns gets resolved, and
  that would work. But for most privacy users, local dns queeries are
  a big no-no, yet they need to be done, and hence are done via socks
  5 at proxy end.
 
  What is the workaround now? Use socks4 and make the changes? Is it
  sufficient to turn off unpp and disable uneccessary plugins, or is
  the tor/privacy setting doing stuff in the code that an end user
  can't set manually?  I.E. If I just use socks5 and disable plugins,
  is that enough?  Does it do anything versus cctp/ping/dcc etc?
 
 TAILS is pretty much irrelevant from the application perspective.
 I'm going to hold off answering the rest because we don't know what
 the problem is.
 
OK...I see what you are saying.  I see how TAILS should be irrelevant
from the application end...up into the point the application itself is
sending out information that could deanoymize the client.  TAILS really
can't do anything about that, hence I like that pidgin is
compartmentalizing the problem by having this privacy setting.  I just
think it should be documented exactly what it is doing.

It seems your Tor/Privacy mode should keep the user, by any means
possible, from doing un-intentional loss of private information at the
application level.

Thanks for helping me resolve this, and your obvious work on this app,
which is really nice. I guess I will have to look at the code to see
exactly what is the difference from the socks5/torprivacy setting?  You
mentioned, obviously, it blocking DNS, and we see that here.  I am
wanting a full list of differences.

___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support


Re: tor/privacy (socks5) option giving ssl error

2013-04-02 Thread Ileana
On Tue, 2 Apr 2013 22:36:51 -0400
Daniel Atallah datal...@pidgin.im wrote:

 On Tue, Apr 2, 2013 at 9:11 PM, Ileana
 ile...@fairieunderground.info wrote:
  From my basic understanding, a tor/privacy setting should ensure:
 
 All of my answers below apply to stock Pidgin when you select
 Tor/Privacy in the proxy settings- any third party plugins could
 change the behavior.
 
 Some effort has been put into making XMPP safe from a privacy
 perspective; other protocols have issues - good patches are always
 welcome.

Well thanks for the effort.
 
  *no local dns lookups (perhaps as an options checkbox)
  socks4 automatically does lookup at end...there is no option.
  socks5 you have option for local or remote dns in the spec.  Most
  tor users want remote, except in the case of TAILS a user might
  handle the dns queeries locally(and then resolving them through for
  instance tor's dns port).  I think the same side is to do them
  remotely.
 
 The libpurple DNS functionality will be blocked - anything that can be
 done through the proxy will be done, otherwise the functionality will
 fail (for things using the libpurple DNS API).
 
 It's possible that protocols like gadu-gadu or sametime, which use
 external libraries to implement the protoco,l would make DNS requests
 without using the libpurple API.
 
 It looks like Bonjour/Link-Local accounts will send stuff out on your
 local network, because that's how the protocol works.
 
  *real ip address never gets sent out
 
 This should be the case for XMPP.
 
 If libpurple/Pidgin is configured appropriately, it won't know what
 your external IP address is.
 
 
  *no other system information gets sent out(kernel version, uname,
  os, etc)
 
 Your IRC account default settings contain some information from your
 OS user account, but you're free to change them.
 
 See https://developer.pidgin.im/ticket/15295
 
 There may be other issues for other protocols
 
 
  *nothing that seems to be a unique identifier gets sent out upon
  connect/reconnect. (i.e. ssl session ids, user agents/version, etc).
 
 Of course unique things will be sent out - you're connecting to a IM
 account and your account name will be sent out (and possibly your
 password too depending on what you're connecting to).

Everyone disagrees about the User Agent issue and this has been a big
pain in the butt across applications from browsers to torrent to chat.
It seems XMPP/Pidgin does send out the timezone and pidgin
version/libpurple version. Seems like minor non-senstive stuff but it
does allow partitioning of the userspace.

 
 
  *timestamps all converted to utc
 
 I'm not sure if there are places where your timezone or information
 that can be used to deduce your timezone are sent out, but I don't
 consider this sensitive.
 
  *any functionality such as dcc where there is a direct connection to
  the other client should either be disabled or also insure real ip is
  not leaked.
 
 This wouldn't be a reasonable assumption to make for protocols other
 than XMPP.
 
  I can't think of anything else off the top of my head, but I may
  have missed something.
 
  If you are a developer and can point me to a link to the code that
  handles the proxy settings, I would take a further look.
 
 libpurple/proxy.c

Thanks for the info.  I will take a look at it.

___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support


pidgin autoconnecting--how to disable

2013-04-02 Thread Ileana
One other related issue to annonymity/privacy is I don't like how when
I start pidgin it starts to autoconnect to all my servers.

Is there somewhere I can disable this functionality, so that everytime
I start pidgin, it just comes up with the menu for which accounts I
want to enable, without the autoconnect.  In particular, for anon
irc/xmpp, I want to change the usernames before it starts connecting.

I know the TAILS team made some modification to turn this off, but I
would consider an actual button in the main menu an enhancement request
that I think even non-privacy minded people would like this simple
feature added.  What is the workaround to disable autoconnect?

Thanks.

___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support


Re: pidgin autoconnecting--how to disable

2013-04-02 Thread Ileana
On Tue, 2 Apr 2013 22:18:09 -0500
Ileana ile...@fairieunderground.info wrote:

 I know the TAILS team made some modification to turn this off, but I
 would consider an actual button in the main menu an enhancement

I correct myself.  I would suggest a button in each account menu,
Auto-connect when Pidgin starts up?

If it is not selected, Pidgin passes over the account, and makes no
network activity related to the account.

 request that I think even non-privacy minded people would like this
 simple feature added.  What is the workaround to disable autoconnect?

___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support


Re: pidgin autoconnecting--how to disable

2013-04-02 Thread Ileana
On Tue, 2 Apr 2013 23:29:31 -0400
Daniel Atallah datal...@pidgin.im wrote:

  I correct myself.  I would suggest a button in each account menu,
  Auto-connect when Pidgin starts up?
 
  If it is not selected, Pidgin passes over the account, and makes no
  network activity related to the account.
   
  request that I think even non-privacy minded people would like this
  simple feature added.  What is the workaround to disable
  autoconnect?  
 
 You can choose a Startup Status in the preferences - if you set that
 to Offline, it won't connect on startup.
 
 There is also the -n argument that you can pass to the pidgin command
 to disable autologin for that instance.

Ha!  Thanks.  Both of these issues I was dealing with/annoyed for some
time, and they were already there.

However, I think other users also might expect to be able to put
localhost in the tor/privacy proxy settings, and may also have no
clue why its not working.  Not sure if that is enhancement or bug, but
it was annoying for me.  I can't think of any reason a user would want
dns for localhost to be proxied...

Thanks!

___
Support@pidgin.im mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support