Re: Confused about Tor settings

2006-10-05 Thread jon smith
--- glymr [EMAIL PROTECTED] wrote: i'm pretty sure someone has written some dns proxy that queries through tor, i have a vague memory that it was only implemented in windows however. i'm going to look into this because i think it'd be rather cool to actually resolve all dns queries

Re: Confused about Tor settings

2006-10-05 Thread glymr
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 it's pissing me off that the dns leak problem hasn't been plugged yet, to the point that i'm teetering on the edge of deciding to dedicate my weekend to writing a dns proxy to sort this crap out permanently, in c... a language i'm only moderately

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread glymr
-BEGIN PGP SIGNED MESSAGE- Hash: RIPEMD160 I am not adding anything useful, but I wish to add my feeling about this situation that people are so rapidly responding to a threat so early. :) tor will never die if people like you all are on it. (which reminds me i've blathered about writing

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Alexander W. Janssen
On Wed, Oct 04, 2006 at 08:45:03PM -0400, Claude LaFrenière wrote: Hmmm... Bogus exit nodes or bogus DNS servers ? One or the other way, brute forcing my way through all exit-nodes should reveil it. Hopefully... Is it possible that the strange side effects comes, not from the exit nodes

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread BlueStar88
Currently i'm improving my torstat page to mark nodes with bad http-behavior, using automatic http-throughput comparison of every http-servicing exit-node against a reference exit-node. Then it's up to the users to add a ExcludeNodes statement in torrc using this information. Greets

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Claude LaFrenière
Hi *Alexander W. Janssen* : On Wed, Oct 04, 2006 at 08:45:03PM -0400, Claude LaFrenière wrote: Hmmm... Bogus exit nodes or bogus DNS servers ? One or the other way, brute forcing my way through all exit-nodes should reveil it. Hopefully... This is a lot a job. May be a very long

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Alexander W. Janssen
On Thu, Oct 05, 2006 at 09:31:47PM +0800, Deephay wrote: Also, the logo linux-magazine.com what you need, when you need it is a image or just text? Exactly the same page is at http://www.wdr.tv/. The content of that page is (gathered with tcpdump): frameset rows=100%,* frameborder=no border=0

0.1.1.24 release announcement?

2006-10-05 Thread Jay Goodman Tamboli
On Oct 3, 2006, at 20:33:56, [EMAIL PROTECTED] wrote: Are you on OSX x86 or PPC? The 0.1.1.24 packages for OSX are fat binaries. I apologize if I missed the message due to filtering on my end, but was 0.1.1.24 ever announced? I see it's on the download page, and there

Re: New User Questions

2006-10-05 Thread Claude LaFrenière
Hi *David O Smith* : I've just started using Tor on my MacTel system, running OS 10.4.8 I saw somewhere instructions for using Camino with Tor, but I can't find them now. Anyone help me? Some hints here (founded with Google...):

Re: Analyzing TOR-exitnodes for anomalies

2006-10-05 Thread Claude LaFrenière
Hi *Alexander W. Janssen* : Got it ! I was going to this web site: http://www.iamaphex.net (This is the web site for Torcap, a program to socksify application in Windows O.S.) with the exit node exit node: whistlermother Info: http://node2.xenobite.eu/torstat.php 1195whistlersmother

First results of analysis

2006-10-05 Thread Alexander W. Janssen
Hi all, i checked 1161 nodes in total. 269 of them where responsive exit-nodes, all behaving correctly. 9 exitnodes where responsive, but their had some proxy installed which didn't behave quite correct when you accessed a webpage with the notation original.url.$nodename.exit; the

Re: Confused about Tor settings

2006-10-05 Thread George Shaffer
On Thu, 2006-10-05 at 02:07, jon smith wrote: I still don't get it. Tor is for anonymity. DNS leaks compromise anonymity (apparently anyone with 2 brain cells on nodding terms can figure out where you're going). The Tor documentation implies, however, the setting ftp to fail (port 8118)

Re: First results of analysis

2006-10-05 Thread coderman
On 10/5/06, Alexander W. Janssen [EMAIL PROTECTED] wrote: ... i checked 1161 nodes in total. 269 of them where responsive exit-nodes, all behaving correctly. or just behaving when you were looking? ;) 9 exitnodes where responsive, but their had some proxy installed which didn't behave

Re: First results of analysis

2006-10-05 Thread Claude LaFrenière
Hi *coderman* : some kind of automated testing for rogue exits would be useful though. May be but read this thread first to have a the complete story: From: Alexander W. Janssen Newsgroups: gmane.network.tor.user Subject: Analyzing TOR-exitnodes for anomalies Message-ID: [EMAIL PROTECTED]