[tor-relays] (no subject)

2013-08-27 Thread Bruno Kitzis
Hello,


Can you remove my email adress from your contact list?


Thanks in advance.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] efficiency and reachability

2013-08-27 Thread Kostas Jakeliunas
On Tue, Aug 27, 2013 at 1:11 PM, That Guy g...@gmx.us wrote:


 1) have 4 extra unused devices, 2 android  2 older laptops running
 Xubuntu  Lubuntu  that can run full time  my 2 primary
 machines(android tab and Debian laptop). With only so much bandwidth,
 what helps best in that situation?
 a. fewer(1-2) devices offering more BW each, or
 b. more(4-7) devices each offering less BW to the network.


Would all these devices be behind a single external IP address (if that
question makes sense)? They'd all be behind the same router (as I take it);
in all probability, that would in most cases mean they'd all share the same
external / WAN IP address.

Is that the case? If yes, you should try and not run more than two Tor
relays behind the same WAN IP. That's because the directory authorities
(which compose and sign lists of relays that Tor user clients then download
to compose circuits of) won't like this, afaik.

In any case, it does kind of matter what's your realistic overall download
and upload throughput / bandwidth.

 2)

Port forwarding would make the most amount of sense, I guess.

Each of those devices, having Tor instances running on them, will have a
torrc config file. Probably under /etc/tor/torrc, or
/usr/local/etc/tor/torrc (you can also probably use Vidalia for this.) In
that file, there will be a line

#ORPort 9001

You will need to (after uncommenting the line) set different ports in each
of the Tor instances you're running, and then port-forward that same port
(that's the most easy way) to each of the devices. Basically, external
port (e.g. 9001) - forward to local IP of the device in question - 9001.

Try and set the ORPort to 443 on one of the devices, if possible. (This
might mean you'll have to run Tor as root, or will need to change
capabilities.) In any case, the ports will have to differ, the way I see it.

--

Kostas.

0x0e5dce45 @ pgp.mit.edu
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] What if my favorite online store websiteblacklists all Tor Relay IP addresses?

2013-08-27 Thread Dave Lahr
Just wanted to follow up - I emailed yelp, never heard back from them, but
now we can access it.  We can also access TDBank North (I can't remember if
I emailed them or not).


On Mon, Aug 26, 2013 at 11:37 AM, Konstantinos Asimakis
insh...@gmail.comwrote:

 Chuck do you run Tor on a separate machine to do that? Or have you found
 some way to pass only your Tor traffic through the VPN?

 Cheers.

 -
 My full signature with lots of links 
 etc.https://bittit.info/publicDro/signature.html


 On Mon, Aug 26, 2013 at 10:01 AM, Chuck Bevitt t...@bevitt.ws wrote:

 I run a tor exit node (CulverCityChuck) using my home Internet (Time
 Warner). I did used to get blacklisted by Yelp and occasionally Google. I
 started using an anonymous VPN service for my exit node which gives it a
 different IP than the rest of my home traffic and haven't had a problem
 since. Costs less than $100 / year and gives me (and my ISP) some measure
 of protection from DMCA complaints.

 The other side of the issue would be customers accessing web storefronts
 via tor and getting blocked because the traffic comes from an exit node.
 Not sure what the answer to that is.

 Chuck Bevitt

 Sent from my iPad

 On Aug 25, 2013, at 6:46 PM, Gordon Morehouse gor...@morehouse.me
 wrote:

  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA512
 
  t...@t-3.net:
  Not sure where you live but, I read that these days, USA is
  photographing the fronts of all postal mail. So, mailed
  merchandise isn't exactly a win on privacy anyway.
 
  That is correct[1].
 
  1.
 
 http://www.nytimes.com/2013/08/03/us/postal-service-confirms-photographing-all-us-mail.html
 
  Best,
  - -Gordon M.
 
 
  -BEGIN PGP SIGNATURE-
 
  iQEcBAEBCgAGBQJSGrNdAAoJED/jpRoe7/uj7ZIH/2tcPxpO0F0G+W0fI3cWu/CC
  +Igh8j9zpXJkA1Z8YODuiyD26G3VQSg3IILXUjfCpzvLsP3xKzxImD3atocXK7y7
  O7tLdgyLg4nPLNtILQtOe26g3W59ljxPJXoHRwGpO0N1g94qkggepxB3qz83UZe/
  TPZ3iIhtImvYmzXgU1RHK+3X5ikAlRFShbgPG7IsZrsB9QMFgDL4fGL0x1/ipTLh
  mfuzdHbfAYqW4zXVgn9wuncWZK/FY1D2e5gMbavrVpR1jRFxuAB81ty230ibOHPC
  1DX4+pqHZOWyNpEpADX+aejhpA9F2yLE6ahhnTtv8UBNxpWh2OZwEP4pem+EQJ0=
  =rbQ3
  -END PGP SIGNATURE-
  ___
  tor-relays mailing list
  tor-relays@lists.torproject.org
  https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new relays

2013-08-27 Thread Jon Gardner
On Aug 22, 2013, at 11:56 AM, mick m...@rlogin.net wrote:

 The other thing that I am weighing is just a moral question regarding 
 misuse of the Tor network for despicable things like child porn. I 
 understand that of all the traffic it is a small percentage and that 
 ISPs essentially face the same dilemma, but I wonder if more can be
 done to make Tor resistant to evil usage.
 
 Tor is neutral. You and I may agree that certain usage is unwelcome,
 even abhorrent, but we cannot dictate how others may use an anonymising
 service we agree to provide. If you have a problem with that, you
 probably should not be running a tor node.

Then why have exit policies? Exit nodes regularly block unwelcome traffic 
like bittorrent, and there's only a slight functional difference between that 
and using a filter in front of the node to block things like porn (which, come 
to think of it, also tends to be a bandwidth hog like bittorrent--so it doesn't 
have to be just a moral question). If someone has a problem with exit nodes 
blocking things like porn (or bittorrent, or...), then they probably should not 
be using Tor.

The very idea of Tor is based on moral convictions (e.g., that personal privacy 
is a good thing, that human rights violations and abuse of power are bad 
things, etc.). So Tor is most definitely not neutral, nor can it be--because, 
if it is to exist and flourish, those moral convictions must remain at its 
foundation. One cannot on the one hand claim that human rights violations are 
wrong while on the other hand claiming that pornography (especially child 
porn) is right. If one wants further proof that Tor has a moral component, 
one has only to visit http://www.torproject.org, click the About Tor link, 
and notice the discussion points. I doubt that anyone could convince the Tor 
team to add ...for unfettered access to pornography... as a bullet point 
under Why we need Tor.

The Tor devs go to great lengths to try to keep evil governments from using 
Tor against itself. Why not devote some effort toward keeping evil traffic 
off of Tor? Given the fact that we need more relays is the common mantra, it 
seems to me that if the Tor community could come up with a technical answer to 
address at least some of the most egregious abuses of Tor--things like child 
porn, or even porn in general, that either have nothing to do with Tor's 
foundational mission, or (like child porn) are antithetical to it--the result 
would be greater public support for the technology, and a wider deployment base.

It's worth discussion.

Jon

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new relays

2013-08-27 Thread Andreas Krey
On Tue, 27 Aug 2013 11:08:34 +, Jon Gardner wrote:
...
 Then why have exit policies?

To keep spammers at bay (or getting your exit blacklisted);
to keep traffic at bay (bittorrent), to keep law harrassment
at bay (again bittorrent, others as well).

 Exit nodes regularly block unwelcome traffic like bittorrent, and there's 
 only a slight functional difference between that and using a filter in front 
 of the node to block things like porn

THe point is that the exit policy is a decision of the exit operator
in question, not of the network as a whole. If you want to access
something you just need to find some exit that allows it.

Who should even decide what 'porn' means, or do you expect each
exit operator to maintain his own blacklist?

 The very idea of Tor is based on moral convictions (e.g., that personal 
 privacy is a good thing, that human rights violations and abuse of power are 
 bad things, etc.). So Tor is most definitely not neutral, nor can it 
 be--because, if it is to exist and flourish, those moral convictions must 
 remain at its foundation.

No. The underlying conviction of tor is that communication shall be free,
not censored. Besides there is pretty little whose transport via a
network should reasonably be illegal.

 One cannot on the one hand claim that human rights violations are wrong 
 while on the other hand claiming that pornography (especially child porn) is 
 right. If one wants further proof that Tor has a moral component, one has 
 only to visit http://www.torproject.org, click the About Tor link, and 
 notice the discussion points. I doubt that anyone could convince the Tor team 
 to add ...for unfettered access to pornography... as a bullet point under 
 Why we need Tor.

No. But if you want to ensure unfettered access to X, that necessarily
implies unfettered access ot Y, for any values of X and Y. Any mean to
disable access to Y implies that the tor network can be forced as well
to disable access to X.

 The Tor devs go to great lengths to try to keep evil governments from using 
 Tor against itself. Why not devote some effort toward keeping evil traffic 
 off of Tor? Given the fact that we need more relays is the common mantra, 
 it seems to me that if the Tor community could come up with a technical 
 answer to address at least some of the most egregious abuses of Tor--things 
 like child porn, or even porn in general, that either have nothing to do with 
 Tor's foundational mission, or (like child porn) are antithetical to it--the 
 result would be greater public support for the technology, and a wider 
 deployment base.

What do you think how long it takes, when we block X, we start getting
requests (or worse, think NSL) to block Y. The moment tor gets a global
block list I will pull the plug on my relays.

Besides: You didn't mention any idea how to actually find and enumerate
the things you apparently want to block. Or how not to overblock. There
isn't even a government entity that has this problem solved.

Andreas

-- 
Totally trivial. Famous last words.
From: Linus Torvalds torvalds@*.org
Date: Fri, 22 Jan 2010 07:29:21 -0800
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new relays

2013-08-27 Thread Vincent Yu
On 08/28/2013 12:08 AM, Jon Gardner wrote:
 Then why have exit policies? Exit nodes regularly block unwelcome traffic 
 like bittorrent, and there's only a slight functional difference between that 
 and using a filter in front of the node to block things like porn (which, 
 come to think of it, also tends to be a bandwidth hog like bittorrent--so it 
 doesn't have to be just a moral question).
I do not wish to comment on the morality or desirability of traffic
filters, but on the implementation:

It is much easier to block the majority of BitTorrent traffic than it is
to block specific content served through HTTP. Torrent traffic can be
blocked by the reduced exit policy
https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy,
which is a static whitelist of ports to allow. To do the same thing for
content over HTTP, one would have to maintain a dynamic blacklist of IPs
(or IP/port combinations) to block, which is much more challenging. An
even more challenging alternative would be to implement deep packet
inspection https://en.wikipedia.org/wiki/Deep_packet_inspection at the
exit nodes---I think this is completely unpalatable to most Tor
developers and exit node operators (and maybe illegal under US
wiretapping laws).

Vincent


smime.p7s
Description: S/MIME Cryptographic Signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Being flooded.........

2013-08-27 Thread Allan Moon
by virusessince starting relay.  I run several anti 
viral and malware routines daily and ever since deciding to start 
relaying, they are all being stretched to their capacity.  Let me know 
when the sys is cleaned up.  Maybe include an anti viral with the relay 
setup and update it thru the software.  Make it so no one can connect to 
Tor unless they are certified clean.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Being flooded.........

2013-08-27 Thread Daniel Case
they are all being stretched to their capacity.


1: Anti virus and malware detection don't have a 'capacity' - no idea what
you're talking about.

Make it so no one can connect to Tor unless they are certified clean.


2: Whether your an exit relay or not, viruses would not come from Tor. Your
relay is just a tunnel for encrypted traffic to pass through, there is
simply no way a virus could get onto your machine that way as nothing stops
at your machine and if you were to sniff what went through it would all be
encrypted.

If you've been on Tor yourself and downloaded things from the onion sites
then it's your own fault, same as the regular web. You're blaming the wrong
program.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new relays

2013-08-27 Thread mick
On Tue, 27 Aug 2013 11:08:34 -0500
Jon Gardner j...@brazoslink.net allegedly wrote:

 On Aug 22, 2013, at 11:56 AM, mick m...@rlogin.net wrote:
 
  Tor is neutral. You and I may agree that certain usage is unwelcome,
  even abhorrent, but we cannot dictate how others may use an
  anonymising service we agree to provide. If you have a problem with
  that, you probably should not be running a tor node.
 
 Then why have exit policies? Exit nodes regularly block unwelcome
 traffic like bittorrent, and there's only a slight functional
 difference between that and using a filter in front of the node to
 block things like porn (which, come to think of it, also tends to be
 a bandwidth hog like bittorrent--so it doesn't have to be just a
 moral question). If someone has a problem with exit nodes blocking
 things like porn (or bittorrent, or...), then they probably should
 not be using Tor.
 
 The very idea of Tor is based on moral convictions (e.g., that
 personal privacy is a good thing, that human rights violations and
 abuse of power are bad things, etc.). 

Nope. Not in my view. Tor's USP is anonymity of access to any and
all network resources. I say again, tor is neutral. It cares
not about what those resources are - it just shovels bits. 

And as a relay operator I cannot say that bits of type A are OK to
retrieve but not bits of type B. I do not even know what type of bits
are transferred.

As someone else here said censorship implies surveillance.

 The Tor devs go to great lengths to try to keep evil governments
 from using Tor against itself. Why not devote some effort toward
 keeping evil traffic off of Tor? 

Define evil (or its converse good). I'd bet that given any random
selection of people in a room you'd get a broad spectrum of views. The
only way you can safely meet /all/ those views is not to take a
position at all and remain neutral. 

I repeat tor is neutral. 

 
 It's worth discussion.
 

I agree.

Best

Mick
-

 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
 http://baldric.net

-



signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Being flooded.........

2013-08-27 Thread Andy Isaacson
On Tue, Aug 27, 2013 at 12:52:14PM -0400, Allan Moon wrote:
 by virusessince starting relay.

What signs do you have that this is happening?  Are you running AV on
your relay node, or something?  What messages are you getting?

Good luck cleaning up your system.  You mightw want to run a relay on a
cheap Linux computer like a rpi instead of on a Windows machine.

Considering that several AV programs consider *Tor* to be malware, it
wouldn't be a good idea to require AV for Tor!

-andy
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Being flooded.........

2013-08-27 Thread krishna e bera
On 13-08-27 12:52 PM, Allan Moon wrote:
 by virusessince starting relay.  I run several anti
 viral and malware routines daily and ever since deciding to start
 relaying, they are all being stretched to their capacity.  Let me know
 when the sys is cleaned up.  Maybe include an anti viral with the relay
 setup and update it thru the software.  Make it so no one can connect to
 Tor unless they are certified clean.

You should not be scanning the traffic exiting your Tor relay, and
especially not altering it by removing viruses or anything else.
Doing so will get your node listed as a bad exit.  Try adding an
exception to your firewall or anti-virus rules for the Tor.exe program's
traffic exiting (and returning via) your computer.

Likely your virus detectors are seeing the drive-by exploits on websites
and bogus search engines that surfers typically click on.  Your own
machine should not be affected by these things as it is just passing
them through to the requestor at the other end of the Tor network.

If you do not want to deal with viruses or other end-user content, you
can change your exit policy to
reject *:*
in other words, become a non-exit node.


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new relays

2013-08-27 Thread Tor Exit
 The Tor devs go to great lengths to try to keep evil governments from 
 using Tor against itself. Why not devote some effort toward keeping evil 
 traffic off of Tor? 

I agree. Why not block the most obvious abuse? All professional Apache 
webservers install a module named 'mod_secure' that will filter out trivial 
hacking attempts such as:

   GET /index.php?id=123 OR 1=1
   GET /index.php?file=../../../../../../../etc/passwd

Why not employ similar techniques on a Tor exit? We can be 100% sure about the 
malicious intent. The examples above are not a matter of taste/moral 
conviction/opinion, so why not implement a 'mod_security'-like filter in Tor?

 Define evil (or its converse good). I'd bet that given any random 
 selection of people in a room you'd get a broad spectrum of views. The only 
 way you can safely meet /all/ those views is not to take a position at all 
 and remain neutral.


Yes, this is a gray area. Moreover, there is not a solid technical solution to 
reliably label or classify content. However, suppose that in ten years 
technology has advanced and we can reliably classify websites as gay porn, 
controversial political views, child porn, weapons, etc. Then I see no 
harm in a tor exit operator to choose an exit policy that matches his own moral 
beliefs. Don't forget Tor exits are operated by volunteers that donate time and 
money to provide anonymity and provide access to content they think is 
important to the world and should be freely accessible at all cost.

Others may regard this as censorship, but they are free to operate a Tor exit 
node themselves to provide access to more grim content. Everybody has their own 
reasons to join the torproject. Be it providing access to information for those 
living under an oppressing regime, or because they don't want their health care 
insurance to know what diseases they search on Google, or because they have a 
sexual orientation that is unacceptable in the community they live in. 

Why is it so bad if a Tor exit operator tries to match the use of their node 
with their own moral beliefs?


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new relays

2013-08-27 Thread krishna e bera
On 13-08-27 05:12 PM, Tor Exit wrote:
 The Tor devs go to great lengths to try to keep evil governments from 
 using Tor against itself. Why not devote some effort toward keeping evil 
 traffic off of Tor? 
 
 I agree. Why not block the most obvious abuse? All professional Apache 
 webservers install a module named 'mod_secure' that will filter out trivial 
 hacking attempts such as:
 
GET /index.php?id=123 OR 1=1
GET /index.php?file=../../../../../../../etc/passwd
 
 Why not employ similar techniques on a Tor exit? We can be 100% sure about 
 the malicious intent. The examples above are not a matter of taste/moral 
 conviction/opinion, so why not implement a 'mod_security'-like filter in Tor?
 
 Define evil (or its converse good). I'd bet that given any random 
 selection of people in a room you'd get a broad spectrum of views. The only 
 way you can safely meet /all/ those views is not to take a position at all 
 and remain neutral.
 
 
 Yes, this is a gray area. Moreover, there is not a solid technical solution 
 to reliably label or classify content. However, suppose that in ten years 
 technology has advanced and we can reliably classify websites as gay porn, 
 controversial political views, child porn, weapons, etc. Then I see no 
 harm in a tor exit operator to choose an exit policy that matches his own 
 moral beliefs. Don't forget Tor exits are operated by volunteers that donate 
 time and money to provide anonymity and provide access to content they think 
 is important to the world and should be freely accessible at all cost.
 
 Others may regard this as censorship, but they are free to operate a Tor exit 
 node themselves to provide access to more grim content. Everybody has their 
 own reasons to join the torproject. Be it providing access to information for 
 those living under an oppressing regime, or because they don't want their 
 health care insurance to know what diseases they search on Google, or because 
 they have a sexual orientation that is unacceptable in the community they 
 live in. 
 
 Why is it so bad if a Tor exit operator tries to match the use of their node 
 with their own moral beliefs?


You can do that if you choose, but consequences may include:

- getting listed as a BadExit:
  https://trac.torproject.org/projects/tor/wiki/doc/badRelays

- becoming liable for not stopping illegal activity passing through your
node, or get charged with illegal wiretapping. See the Snoop question in:
  https://www.torproject.org/eff/tor-legal-faq.html.en

- creating uncertainty about whether exit node operators snoop on
traffic or retain data, which puts all of them at risk of being seized
during police investigations;

- impeding police investigations of the evil sites:
 https://www.torproject.org/about/torusers.html.en#lawenforcement


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new relays

2013-08-27 Thread Andy Isaacson
On Tue, Aug 27, 2013 at 11:08:34AM -0500, Jon Gardner wrote:
 Then why have exit policies? Exit nodes regularly block unwelcome
 traffic like bittorrent, and there's only a slight functional
 difference between that and using a filter in front of the node to
 block things like porn

The exit policy is a public statement to the Tor network by the exit
node about what traffic it is willing to transport.  Users who wish to
use a particular TCP port can consult the consensus and find an exit
node which meets their needs.

By contrast, a porn blacklist would presumably prevent particular HTTP
requests from being satisfied, based on analysis of the contents of the
requests.  In other words, the pornfiltering-exit-node offered to
transport port 80, but then reneged on the offer when it looked inside
the box and didn't like what it found.

If only there were a separate TCP port for HTTP-with-Porn and all the
pornographers used it, then an exit policy for HTTP-without-porn would
be possible.  But alas, we don't even have vague agreement on what
constitutes porn, much less a social contract requiring all
pornographers to segregate their traffic for our convenience.

RFC6969, Pornographic HTTP.  #ideasforapril1

Consider http://www.ietf.org/rfc/rfc3514.txt --

   Firewalls, packet filters, intrusion detection systems, and
   the like often have difficulty distinguishing between packets that
   have malicious intent and those that are merely unusual.  The problem
   is that making such determinations is hard.  To solve this problem,
   we define a security flag, known as the evil bit, in the IPv4
   header.  Benign packets have this bit set to 0; those that
   are used for an attack will have the bit set to 1.

-andy
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new relays

2013-08-27 Thread Andreas Krey
On Tue, 27 Aug 2013 23:12:01 +, Tor Exit wrote:
GET /index.php?file=../../../../../../../etc/passwd
 
 Why not employ similar techniques on a Tor exit? We can be 100% sure about 
 the malicious intent.

No, you can't be sure. That request could quite well be totally legitimate;
you are not in a position to judge for the site owner.

(I'm just fighting against a 'transparent proxy' that thinks
POST with more than 1000 bytes are evil. Please don't add
more points of failure to an already fragile web.)

Andreas

-- 
Totally trivial. Famous last words.
From: Linus Torvalds torvalds@*.org
Date: Fri, 22 Jan 2010 07:29:21 -0800
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays