[tor-talk] BitMail.sf.net v 0.6 - Secure Encrypting Email Client
Hello, can BitMail.sf.net as a p2p email tool for encrypted Email (and hybrid with IMAP-Email) be regarded as a reference model for research to create a secure Email Client? as it uses both, gnupg and openssl! http://bitmail.sourceforge.net/ https://sourceforge.net/projects/bitmail/files/BitMail_0.6_2088RC1/ Does anyone know, if it runs over Tor? Sincerely, Robert -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] BitMail.sf.net v 0.6 - Secure Encrypting Email Client
Hello, can BitMail.sf.net as a p2p email tool for encrypted Email (and hybrid with IMAP-Email) be regarded as a reference model for research to create a secure Email Client? as it uses both, gnupg and openssl! http://bitmail.sourceforge.net/ https://sourceforge.net/projects/bitmail/files/BitMail_0.6_2088RC1/ Does anyone know, if it runs over Tor? Sincerely, Robert -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Kaspersky still interferes with SSL port 443 sites
On 11/2/2013 9:15 AM, freek2...@yahoo.de wrote: Do you use the manual mode if KIS? I also tried that feature, but intransparently catching server certificates definitely messed with my system. This function is imho snakeoil of the highest quality. (Except you use an insecure browser and have no idea how ssl/tls and the x.509 certs work.) I want to be able to check certs myself and it's possible that the cert/ssl-design in tor, which uses (afaik randomly generated,) self signed certs, doesn't work with the validation KIS conducts. No - least, don't think so. Not sure what you mean - manual - in this context. *Could* be some screw up w/ certificate, but as said, w/ current settings, KIS doesn't (shouldn't) scan ANY encrypted connections. But KIS could have a problem, that it's not correctly using settings that are shown in GUI. It happens. In the Tor Network map, I can see port 443 try to open, then immediately close when accessing sites using that port. Until I close / reopen KIS - then problem solved. It's just a guess, buy maybe that way you get the proper certificate to your pc. Thanks, but no idea. Normally, stopping / starting KIS - or anything like it, wouldn't load or reload a new certificate. If it's doing that, I'd guess it's a bug. I posted on Kaspersky forum even long time mods have no idea on this one. Haven't filed support req w/ Kaspersky - yet, because doubt they support KIS TBB issues; but I'll try. I'll uncheck all KIS settings for scanning encrypted connections, so it *shouldn't* scan any - then see. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Kaspersky still interferes with SSL port 443 sites
On 11/2/2013 11:16 AM, Moritz Bartl wrote: On 11/02/2013 02:27 PM, Joe Btfsplk wrote: Don't expect too much help here [from Moritz]. Well, not from some, anyway. LOL :) Hey hey, no reason to become hostile. I wrote the mail, which I consider help. Help in making you understand why nobody really interacted with you over this issue the last time you brought it up. Sounds like you would rather not have me comment on this at all. I was trying to be helpful, as in: it is a KIS bug, *especially* if it goes away when you restart it, and also, if it messes with SOCKS in this way, they should get this fixed. If you want to help them fix it, run a local network sniffer and find out what they do exactly with the requests in question. Moritz Thanks Moritz, the phrase Well, not from some, anyway. LOL :) w/ LOL a smilie is pretty far from hostile, from my understanding. That's why they're sometimes used in email / postings - to indicate tone, that's often lost in email. Thought I was taking the high road; trying to defuse what seemed like a pretty flippant, looking down your nose reply. If not your intent, I apologize. If it was, may want to dial back a notch. I'm sure lots of Tor users have closed source AV software. But, see here - I'm still smiling: :D, :), ;) Why no one responded...? Kinda amusing. Could well be same reason KIS gurus / long time mods are stumped. Or same reason hundreds of software devs have been stumped by my questions / observations, over decades. Millions of users post intelligent questions on forums / lists *ALL* the time no one has an answer. Means nothing. It'd be very hard for me many to *entirely* avoid closed source software. I try to use open source if at all possible. I'll try the sniffer - if don't discover something else (soon), or if KIS support doesn't have a solution. I'm not sure Kaspersky cares about KIS / TBB issues. Yes, it seems like a (possible) bug. Stopping / restarting KIS *shouldn't* have an effect on certificates, whether it is / isn't scanning encrypted connections, etc. No (visible) settings are changed, by stopping / restarting it. That's why I said it was unusual. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Kaspersky still interferes with SSL port 443 sites
On 11/2/2013 2:04 PM, Sukhoi wrote: I am experimenting problems with TorBrowser on the last months. On most of the web sites I have to reload it 2 to 8 times until it loads, receiving most of the times messages like this: Unable to connect Firefox can't establish a connection to the server at blog.torproject.org. Sukhoi - a bit off topic, but I'm not sure your problem is w/ Kaspersky or any AV / FW. If you haven't upgraded to TBB 2.4.x (still beta), may try that. I think what you're seeing (if using TBB 2.3.x) is pretty common. Was for me until I upgraded. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] EncFS in Tails
I have just discovered that EncFS works well under Windows. So that would be a secure way to share files between Windows and Linux. But can I do it with Tails also? On the site I only find the release notes for Tails 0.12 where EncFS is said to be replaced by the persistent partition. Than I have spent half an hour looking around, but I find nothing as GUI. Can I use EncFS with Tails? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] EncFS in Tails
Red Sonja wrote (05 Nov 2013 18:22:29 GMT) : I have just discovered that EncFS works well under Windows. So that would be a secure way to share files between Windows and Linux. But can I do it with Tails also? Please take Tails-specific questions to the Tails support channels: https://tails.boum.org/support/ Thanks in advance! Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] [RELEASE] Torsocks 2.0.0-rc2
Lunar: For those too lazy to build torsocks manually, I have just uploaded an updated package to Debian experimental [1]. Given that David said he plans to discuss a new name for torsocks soon... And also to keep compatibility with existing scripts... (torsocks changed a lot, config files are no longer compatible) To make a clean transition from torsocks to insert new name in here, wouldn't it be better not to replace torsocks in Debian with the rewrite? I think the new package insert new name in here could enter the usual experimental - sid - testing and the old torsocks should just be removed from testing at some point (reason: dead upstream, superseded by insert new name in here). -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] [RELEASE] Torsocks 2.0.0-rc2
On 05 Nov (20:44:08), adrelanos wrote: Lunar: For those too lazy to build torsocks manually, I have just uploaded an updated package to Debian experimental [1]. Given that David said he plans to discuss a new name for torsocks soon... And also to keep compatibility with existing scripts... (torsocks changed a lot, config files are no longer compatible) Yah that's an issue that needs also to be discussed. Right now, this version of torsocks breaks the compatibility with the configuration file. I thought of keeping the old one but then I just told myself that considering a complete rewrite, let's take the opportunity to change that conf. file and do it right (and more Tor centric). It might not have been a good idea in the end but I'll let the community judge that and it's totally possible to revert that. To make a clean transition from torsocks to insert new name in here, wouldn't it be better not to replace torsocks in Debian with the rewrite? I think the new package insert new name in here could enter the usual experimental - sid - testing and the old torsocks should just be removed from testing at some point (reason: dead upstream, superseded by insert new name in here). In terms of new naming, I would personally *love* that but we have to be careful with package that depends on torsocks and one comes into mind, parcimonie. So, if we decide that a new name is a good idea, packaging needs to consider the transition and possible breakage. Cheers! David -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk signature.asc Description: Digital signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk