[tor-talk] [tails] Crypto enforcement proposal

2012-08-23 Thread HardKor
Hello,

I took a look on the persistant partition of tails :

# cryptsetup luksDump /dev/sdb2
[...]
Cipher name:   aes
Cipher mode:   cbc-essiv:sha256
Hash spec: sha1
[...]
MK bits:   256
[...]

Even if it look secure, I think you could better do this :

[...]
Cipher name:   serpent
Cipher mode:   xts-essiv:sha256
Hash spec: sha512
[...]
MK bits:   512
[...]

What do you think about that ?

HardKor
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor-unfriendly List

2012-08-23 Thread Jim
Paul wrote:
 Is there a list of 'things' (services, web sites, etc.) that do not work
 well with Tor? For example, connect to MSN using Tor and you'll find
 yourself being banned. http://www.rightmove.co.uk/ refuses to work with
 Tor. Such a list would be useful to check before trying to use such
 services, I think.

Perhaps a little OT for this thread but, FWIW, I continue to be able to
access (via webmail) an @msn.com email address via Tor.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Reliable server hosting company for Tor exits?

2012-08-23 Thread Rejo Zenger
Hi,

 Tor relays (regardless of exit policy) are listed in the Tor consensus,
 which is public -- it has to be so clients can get the list.

Yes. Of course. Stupid me.

 As for the problem the blacklisters were trying to solve, at best
 they were thinking I want to block Tor, I'll scrape this page I found
 and block all the IPs in it. At worst, they were taking the path all
 blacklists eventually take, of I will punish everything associated with
 this thing I hate, in hopes that it will die or at least its neighbors
 will pressure it.

That doesn't make sense to me. But then again, it's probably not supposed to 
be. :)

-- 
Rejo Zenger . r...@zenger.nl . 0x21DBEFD4 . https://rejo.zenger.nl
GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [tails] Crypto enforcement proposal

2012-08-23 Thread intrigeri
Hi,

HardKor wrote (23 Aug 2012 09:05:00 GMT) :
 I took a look on the persistant partition of tails :
 [...]

Thank you for caring about this.

 What do you think about that ?

Not all Tails developers read tor-talk, so please direct such
discussion threads to the communication channels documented there:

 https://tails.boum.org/contribute/how/input/

Cheers,
--
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Advanced configuration troubleshooting] Exit node slowed way down

2012-08-23 Thread Moritz Bartl
Hi,

Like Andreas Krey, I would also guess its the ISP bandwidth. Have you
tried contacting them about it?

On 23.08.2012 02:16, Name Withheld wrote:
 Hi guys,
 
 I've been running a kind-of 1gbps (voxility style 1gbps) exit server on
 Debian for a couple months, and while it started out very fast, it's
 gotten much slower over time.  The server itself hasn't slowed down --
 if I do speed tests, it still pulls 25MB/s (bytes not bits) with no
 problem (on top of the tor load), but it never seems to push more than
 10-12MB/s through the tor network, even if I run 6 tor processes with
 each separated onto a private cpu core.  Even if I stop the other tor
 processes and revert to a single-tor-instance server, it doesn't reach
 the old 20 MB/s anymore. 

-- 
Moritz Bartl
https://www.torservers.net/
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [tails] Crypto enforcement proposal

2012-08-23 Thread HardKor
Thank you, I'll forward the mail to the mails ML.

HardKor

On Thu, Aug 23, 2012 at 12:40 PM, intrigeri intrig...@boum.org wrote:

 Hi,

 HardKor wrote (23 Aug 2012 09:05:00 GMT) :
  I took a look on the persistant partition of tails :
  [...]

 Thank you for caring about this.

  What do you think about that ?

 Not all Tails developers read tor-talk, so please direct such
 discussion threads to the communication channels documented there:

  https://tails.boum.org/contribute/how/input/

 Cheers,
 --
   intrigeri
   | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
   | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Advanced configuration troubleshooting] Exit node slowed way down

2012-08-23 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

[breaking the thread as it didn't seem to be related to Robin's]

 For a visual, you can see how it just sort of gave up on life
 around the beginning of August here (although some of that is
 accounted by extra tor instances cannibalizing stats):
 
 https://atlas.torproject.org/#details/88984E7F8DDB702644660E10A5C7019FA80B8AFF

Did
 
you had a look at the advertised bandwidth fraction graphs?
(it dropped from 0.7% to under 0.2% around the 1th of August)


These relays (00Teh0Signul00, 00T3h0Signul00, 00Teh0S1gnul00)
currently do not have the stable flag.


-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlA2KRUACgkQyM26BSNOM7b17QD/WLsvuqgbzgKlm7mgaledM/+Y
e/lbUztJPUx8ueepP9wA/RnzgvCvqdmtdgwVlfCkgfRGp8/7G+nYEnwVdnK9Cf7z
=X8aM
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Reliable server hosting company for Tor exits?

2012-08-23 Thread Robin Kipp
Hi Eugen,

 Hetzner allows use of multiple IP addresses with one server.

Ah, yes, that's true - thanks a lot for pointing that out to me, as I 
completely forgot about this! Well, I guess I could get myself a second IP in 
that case and continue running it as a relay... But in that case, I think I'd 
still want to designate a separate server as the actual Tor exit, just in case 
something really terrible happens and the machine gets taken down temporarily. 
But yes, thanks a lot for bringing that to my mind!
Robin
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Reliable server hosting company for Tor exits?

2012-08-23 Thread Robin Kipp
Hi Roger,
thanks a lot for explaining this once again and also for the link! Admittedly, 
I kind of like the sense of sarcasm about blacklists that you put into this 
message :-)
Robin

Am 22.08.2012 um 22:36 schrieb Roger Dingledine a...@mit.edu:

 On Wed, Aug 22, 2012 at 08:37:16PM +0200, Rejo Zenger wrote:
 On 22 aug. 2012, at 16:07, Robin Kipp wrote:
 I've already been running a Tor relay on that for quite a while,
 but sadly had to find out that the server's IP subsequently got added
 to several EMail blacklists - despite the server only being a relay and
 not an actual exit node!
 
 This is interesting. Did they provide any explanation for this? 
 
 Your root server, did they have access to the server as well? How did
 they know you were running a relay, other than looking on your server
 for a Tor process, or looking into your traffic? What problem did they
 try to solve by adding your server on a blacklist?
 
 Tor relays (regardless of exit policy) are listed in the Tor consensus,
 which is public -- it has to be so clients can get the list.
 
 As for the problem the blacklisters were trying to solve, at best
 they were thinking I want to block Tor, I'll scrape this page I found
 and block all the IPs in it. At worst, they were taking the path all
 blacklists eventually take, of I will punish everything associated with
 this thing I hate, in hopes that it will die or at least its neighbors
 will pressure it.
 
 See the link at the bottom of
 https://www.torproject.org/docs/faq-abuse#TypicalAbuses
 for a fun read.
 
 --Roger
 
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Reliable server hosting company for Tor exits?

2012-08-23 Thread Moritz Bartl
On 23.08.2012 19:14, Robin Kipp wrote:
 I would also like to work with an ISP that is concerned with user
 pass on my personal information to third parties whenever a slight
 sign of trouble arises.

I don't believe in privacy hosters. Once police is involved, every ISP
will give out your data. Any decent ISP should not give out your info in
other minor cases (or foreign investigations), and I don't think ISPs
like Hetzner will. I don't really see what exactly you are trying to
protect against, but kicked in doors because of police is something
you can only protect by providing the ISP with fake data and paying
anonymously (for example over the counter in a bank).

 Now, I'm not sure where you're based and what languages you speak,
 but in case you speak German as well, feel free to contact me in
 either English or German, whatever works best for you! :-)

I am German. If you have any questions, feel invited to contact me off-list.

-- 
Moritz Bartl
https://www.torservers.net/
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Iran's Green Movement - URGENT ALERT - Please RT

2012-08-23 Thread SiNA Rabbani
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Mir Hossein Mousavi, former presidential candidate during the 2009
elections and leader of the Green Movement under illegal house arrest
for approximately 18 months, was transferred to a cardiac hospital in
down town Tehran under extreme security measures accompanied by his
wife Zahra Rahnavard.

526 days after his illegal house arrest, Mir Hossein Mousavi who was
reportedly suffering from extreme chest pain was reportedly
transferred this morning, Thursday August 23rd, 2012, under extreme
security measures to the Coronary Care Unit (CCU) at a cardiac
hospital in central Tehran. It has been reported that security agents
arrived at the hospital the night before Mousavi?s transfer,
installing security cameras throughout the hospital.

According to the same reports the security apparatus assigned to Mir
Hossein Mousavi and his wife Zahra Rahnavard at the hospital includes
tens of IRGC agents, security agents and plain clothes officers. The
hospital personnel working in the unit where Mousavi has been
admitted, have not been allowed to leave the building and Mousavi is
said to be banned from all visitation.

It has been reported that as a result of a blocked coronary artery,
Mousavi under went a three hour angiogram. Upon completion of the
operation, Mousavi was transferred back to the CCU unit where he is
likely to remain for a longer period of time.

In the event that Mousavi?s hospitalization is prolonged, there is
speculation that he will be kept in isolation in a separate unit in
the hospital.

Source: Kaleme: http://kaleme.org/1391/06/02/klm-110814/

- -- 
The world will not be destroyed by those who do evil, but by those
who watch them without doing anything. ~ Albert Einstein
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=L3xe
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Iran's Green Movement - URGENT ALERT - Please RT

2012-08-23 Thread SiNA Rabbani
You are right. I am hoping it reaches my Tor friends all at once.

--SiNA
On Aug 23, 2012 12:45 PM, HardKor hardkor.i...@gmail.com wrote:

 Isen't this mailing list reserved to topics related with the Tor Project ?

 HardKor

 On Thu, Aug 23, 2012 at 9:39 PM, SiNA Rabbani s...@redteam.io wrote:

  -BEGIN PGP SIGNED MESSAGE-
  Hash: SHA1
 
  Mir Hossein Mousavi, former presidential candidate during the 2009
  elections and leader of the Green Movement under illegal house arrest
  for approximately 18 months, was transferred to a cardiac hospital in
  down town Tehran under extreme security measures accompanied by his
  wife Zahra Rahnavard.
 
  526 days after his illegal house arrest, Mir Hossein Mousavi who was
  reportedly suffering from extreme chest pain was reportedly
  transferred this morning, Thursday August 23rd, 2012, under extreme
  security measures to the Coronary Care Unit (CCU) at a cardiac
  hospital in central Tehran. It has been reported that security agents
  arrived at the hospital the night before Mousavi?s transfer,
  installing security cameras throughout the hospital.
 
  According to the same reports the security apparatus assigned to Mir
  Hossein Mousavi and his wife Zahra Rahnavard at the hospital includes
  tens of IRGC agents, security agents and plain clothes officers. The
  hospital personnel working in the unit where Mousavi has been
  admitted, have not been allowed to leave the building and Mousavi is
  said to be banned from all visitation.
 
  It has been reported that as a result of a blocked coronary artery,
  Mousavi under went a three hour angiogram. Upon completion of the
  operation, Mousavi was transferred back to the CCU unit where he is
  likely to remain for a longer period of time.
 
  In the event that Mousavi?s hospitalization is prolonged, there is
  speculation that he will be kept in isolation in a separate unit in
  the hospital.
 
  Source: Kaleme: http://kaleme.org/1391/06/02/klm-110814/
 
  - --
  The world will not be destroyed by those who do evil, but by those
  who watch them without doing anything. ~ Albert Einstein
  -BEGIN PGP SIGNATURE-
  Version: GnuPG v1.4.11 (GNU/Linux)
  Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
 
  iQIcBAEBAgAGBQJQNob/AAoJEJPBwXYLR9VtKsMP/0n4JI31kN59wUuYt1dtdFhq
  qVs+Dw3B5M6TxUM83y/88W5kvqEMfUZj6PpEba4YJrCcJ3eXBepzNk8EaYe7DgEo
  2fvWEmIvigiMDDD60GfF9khLDAKxaBxVk9AvQs0hJZ6etIMx6dGZ0Opfd2iOGtxd
  5fRnVML4Y9b6MlZ29qETyYoZYvYm6cgJGxYbI3nKUGizpG4UVvD4ya8pv/N8bWwt
  kiMYCsM/gzAfIiV0MqJNmCkBIedfC0s66/P7JYDh6MCBGirAwlv7F/3oo8J94P/A
  YhLEz+zv1Fm4iSwyJjfo/odAh4KbMFd1/PEzhHrVN5pPmxUs9+aeCBJp4vYaNblz
  lPkYkJfFvnyHJdud2fAK8j8x5vtsEDiRcq9kkQM+mpJcJbCkC1r0vgGSYezbmp+M
  1duFvxgHsIaGfjoQZ9n8Y5As/VgPWkOZBZetF0ozMtSdIYAbHrNXdjhKOLi2c9tS
  vKMXgJf8B2qnUb9ffFvjDs0juse5v28dMXwZKZIECokadLQTnX9LXHK0Ez4z+nyO
  0h6x7dFVDJCzrixNMytXiHbDh461k0nLm6Laep/zGU1rCqHloPTiC19bGYK6Yjph
  ULCgRnS1pYIBMI0oYYKfnhbmJVQY1XOvm3nYs9EA4LBQneKWFl7Pf8Gjx2YDfXOf
  h2N/qb0JQMpH3cbXA2AQ
  =L3xe
  -END PGP SIGNATURE-
  ___
  tor-talk mailing list
  tor-talk@lists.torproject.org
  https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] zeus virus

2012-08-23 Thread David H. Lipman

From: scar s...@drigon.com


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

hi all, i operate the cave router from my home DSL connection, and
from time to time it will get suspended because CenturyLink will
notice mailicious traffic from viruses routed thru the Tor network.
most of the time i can block these because my they will tell me
destination IP addresses.  but lately my service has been getting
suspended because of this zeus virus and the reports my ISP sends
don't have any destination ip addresses.  below is a sample report of
what they send me, you can see with with 'conficker' one there is a
dst address that i can block, but with zeus there is practically no
data.  (the IP Address column is what my IP address was at the time)
i have asked CenturyLink for more info, specifically destination ip
addresses, but this is all they give me.  so does anyone know of a way
to block this zeus thru Tor?  thanks

Date/Time Seen (GMT)   IP AddressInfection Data (*)
-    ---   --
2012-08-20 00:56:3267.1.15.107   infection = 'zeus',
addl_data = '/config.bin'
2012-07-30 15:06:1397.115.197.107infection = 'zeus',
addl_data = '/zs/config.bin'
2012-07-26 23:17:4897.115.196.146infection = 'conficker',
subtype = 'downadup', src_port = '49510', dst_port = '80',
http_host = '149.20.56.33', url = 'GET /search?q=0 HTTP/1.1',
http_agent = 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1;
InfoPath.2; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR
3.5.30729)', dst_ip = '149.20.56.33', sourceSummary = 'Sinkhole HTTP
Drone Report'
2012-07-04 18:46:3597.115.192.31 infection = 'zeus',
addl_data = '/update32.php'



Zeus Bot (aka; ZBot) is not a virus.  It is a data stealing trojan with 
other aspects and it, and variants, have a large distribution on the 'net.


Usually config.bin is an encrypted file that has instructions for the Bot 
component.


Conficker (aka; Downup) is an I-worm and Bot.

Whatever the case, malicious bot activity is being detected and thus you 
should stop using Tor and you should make sure you computer(s) are clean.


I suggest reading this...
http://forums.malwarebytes.org/index.php?showtopic=9573

Creat an account and post your problem here...
http://forums.malwarebytes.org/index.php?s=547b20f67444c3ee30a883a34bf60fb0showforum=7



References:
http://searchsecurity.techtarget.com/definition/Zeus-Trojan-Zbot
http://en.wikipedia.org/wiki/Zeus_%28Trojan_horse%29
http://en.wikipedia.org/wiki/Conficker




--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp 



___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Advanced configuration troubleshooting] Exit node slowed way down

2012-08-23 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

 3) I'm not sure where to view the advertised bandwidth graph

 https://atlas.torproject.org/#details/88984E7F8DDB702644660E10A5C7019FA80B8AFF

Scroll
 
down till you see graphs with red, green, yellow and blue lines.
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlA2m7gACgkQyM26BSNOM7YC9gEAl4SpEeUzxqAJe4DkAKd2TiPr
uAHbUjKgPwv4mX4oCXoA/0jKA7On42pNNdcy5u/4iUtl3tY/b/hOn5cNJGjWxfT/
=ZUhg
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] zeus virus

2012-08-23 Thread scar
David H. Lipman @ 08/23/2012 01:40 PM:
 Whatever the case, malicious bot activity is being detected and thus you
 should stop using Tor and you should make sure you computer(s) are clean.

well, no, i'm not gonna do that. ;) the server is running linux and not
infected.
when i started running this tor exit router i received copyright
complaints from the MPAA and my service was shut down, and i fixed my
torrc to block the p2p ports.  then it started getting shut down for
viruses, and i've continued to update my torrc.  now it only happens 2-3
times a month and CenturyLink always promptly reactivates my service.
this is just a case of 'a few bad apples' and i have the (cheap)
bandwidth to spare, so no plans to stop using Tor just yet.

frankly, i don't get how this zeus trojan can operate without
destination addresses. in fact it seems to me it would be utterly
useless as a trojan if there weren't destination addresses.  then again
i've been out of the loop as technology has progressed.  if that is
really the case, i'm wondering if there is a way to add a firewall rule
that will block traffic that is looking for config.bin and
update32.php, and whether that would really block this malicious
traffic


___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor already running

2012-08-23 Thread Aaron Paden

Hi,
This is a simple issue, but important. The script should check to see if 
Tor/Vidalia is already running and just open the browser. As it is, if I 
close the browser, come back some time later, and click the Tor icon, it 
results in an error because Tor is still running in the background. I 
can't open urls from other applications with the browser for the same 
reason.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Reliable server hosting company for Tor exits?

2012-08-23 Thread Julian Wissmann
Hi Robin,

last time I checked, Hetzner did not allow to run Tor exits. Make sure if that 
still is the case before you run into trouble with them.

Julian

 Hi Eugen,
 
 Hetzner allows use of multiple IP addresses with one server.
 
 Ah, yes, that's true - thanks a lot for pointing that out to me, as I 
 completely forgot about this! Well, I guess I could get myself a second IP in 
 that case and continue running it as a relay... But in that case, I think I'd 
 still want to designate a separate server as the actual Tor exit, just in 
 case something really terrible happens and the machine gets taken down 
 temporarily. But yes, thanks a lot for bringing that to my mind!
 Robin
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor-unfriendly List

2012-08-23 Thread || ΣΖΟ ||
Even better would be a logo that say's: This site doesn't respect it's users.

but yes, a pre-screen would be nice, when a user

not just a list, an immideate warning when you type type the url, or a
browser bar that turns red.

even block the site before you even download 1 bit so that it doesn't
even register the exit node's IP address



On Thu, Aug 23, 2012 at 10:41 AM, Jim jimmy...@copper.net wrote:
 Paul wrote:
 Is there a list of 'things' (services, web sites, etc.) that do not work
 well with Tor? For example, connect to MSN using Tor and you'll find
 yourself being banned. http://www.rightmove.co.uk/ refuses to work with
 Tor. Such a list would be useful to check before trying to use such
 services, I think.

 Perhaps a little OT for this thread but, FWIW, I continue to be able to
 access (via webmail) an @msn.com email address via Tor.

 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Iran's Green Movement - URGENT ALERT - Please RT

2012-08-23 Thread Greg Norcie
Stanford's Liberation Technology list would probably be a better home
for this:

https://mailman.stanford.edu/mailman/listinfo/liberationtech

A lot of Tor people also read it, as well as others who would value
this info.
--
Greg Norcie (g...@norcie.com)
GPG key: 0x1B873635

On 8/23/12 3:48 PM, SiNA Rabbani wrote:
 You are right. I am hoping it reaches my Tor friends all at once.
 
 --SiNA On Aug 23, 2012 12:45 PM, HardKor hardkor.i...@gmail.com
 wrote:
 
 Isen't this mailing list reserved to topics related with the Tor
 Project ?
 
 HardKor
 
 On Thu, Aug 23, 2012 at 9:39 PM, SiNA Rabbani s...@redteam.io
 wrote:
 
 Mir Hossein Mousavi, former presidential candidate during the 2009 
 elections and leader of the Green Movement under illegal house
 arrest for approximately 18 months, was transferred to a cardiac
 hospital in down town Tehran under extreme security measures
 accompanied by his wife Zahra Rahnavard.
 
 526 days after his illegal house arrest, Mir Hossein Mousavi who
 was reportedly suffering from extreme chest pain was reportedly 
 transferred this morning, Thursday August 23rd, 2012, under
 extreme security measures to the Coronary Care Unit (CCU) at a
 cardiac hospital in central Tehran. It has been reported that
 security agents arrived at the hospital the night before Mousavi?s
 transfer, installing security cameras throughout the hospital.
 
 According to the same reports the security apparatus assigned to
 Mir Hossein Mousavi and his wife Zahra Rahnavard at the hospital
 includes tens of IRGC agents, security agents and plain clothes
 officers. The hospital personnel working in the unit where Mousavi
 has been admitted, have not been allowed to leave the building and
 Mousavi is said to be banned from all visitation.
 
 It has been reported that as a result of a blocked coronary
 artery, Mousavi under went a three hour angiogram. Upon completion
 of the operation, Mousavi was transferred back to the CCU unit
 where he is likely to remain for a longer period of time.
 
 In the event that Mousavi?s hospitalization is prolonged, there is 
 speculation that he will be kept in isolation in a separate unit
 in the hospital.
 
 Source: Kaleme: http://kaleme.org/1391/06/02/klm-110814/
 
 ___ tor-talk
 mailing list tor-talk@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
 ___ tor-talk mailing
 list tor-talk@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
 ___ tor-talk mailing
 list tor-talk@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [Advanced configuration troubleshooting] Exit node slowed way down

2012-08-23 Thread Karsten Loesing
On 8/23/12 10:18 PM, Name Withheld wrote:
 3) I'm not sure where to view the advertised bandwidth graph, but what
 is this stat generated from?  I just double-checked the torrc for the
 main instance and it's 80MB+.

Advertised bandwidth is the minimum of bandwidth rate, burst, and
observed bandwidth.  You write the first two values into your torrc, but
the third value is measured by your relay.

https://gitweb.torproject.org/torspec.git/blob/777ddbf:/dir-spec.txt#l383

You can find the advertised bandwidth value on the Atlas page of your relay:

https://atlas.torproject.org/#details/88984E7F8DDB702644660E10A5C7019FA80B8AFF

Best,
Karsten
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk