Re: How do we defeat exit node sniffing?

2008-06-06 Thread tor-operator
defcon wrote: so what do you all suggest if I must authenticate to a non ssl connection? How do I do it anonymously and safely? Apply the same security measures necessary to authenticate a non-SSL connection without the use of Tor.

RE: How do we defeat exit node sniffing?

2008-06-06 Thread Harry Hoffman
Why do you think it would be embarrassing? I'm fairly certain that some exit nodes have been setup as research projects. On Thu, 2008-06-05 at 21:49 -0700, Wesley Kenzie wrote: snip Or BostonUCompSci? It would be kind of embarrassing to Boston University wouldn't it, if they were found to

Is tor-resolve required to run an Exit node.

2008-06-06 Thread dante
Hi, I'm reading the tor code and (if I've understood it) it looks like the tor binary is sufficient for running either a relay or exit node. i.e. tor-resolve is simply an extra utility for the end user to do DNS resolution via tor rather than via one's DNS server as defined in /etc/resolv.conf.

Re: Is tor-resolve required to run an Exit node.

2008-06-06 Thread Marco Gruß
Hi, dante wrote: I'm reading the tor code and (if I've understood it) it looks like the tor binary is sufficient for running either a relay or exit node. i.e. tor-resolve is simply an extra utility for the end user to do DNS resolution via tor rather than via one's DNS server as defined in

Tor with secure Gmail

2008-06-06 Thread Man Man
Hi! I am using Gmail at https://mail.google.com/ with tor. When I am at login, browser will state that the connection is only partially secure, ie. some items (I do not know what) are not encrypted. However, once I untor, I am able to get into the fully secure Gmail login page. I tried this for

Tor with secure Gmail

2008-06-06 Thread Man Man
Hi! I am using Gmail at https://mail.google.com/ with tor. When I am at login, browser will state that the connection is only partially secure, ie. some items (I do not know what) are not encrypted. However, once I untor, I am able to get into the fully secure Gmail login page. I tried

Re: Tor with secure Gmail

2008-06-06 Thread Alexander W. Janssen
Man Man schrieb: Hi! Aloha! I am using Gmail at https://mail.google.com/ with tor. When I am at login, browser will state that the connection is only partially secure, ie. some items (I do not know what) are not encrypted. However, once I untor, I am able to get into the fully secure

Re: Is tor-resolve required to run an Exit node.

2008-06-06 Thread Fabian Keil
dante [EMAIL PROTECTED] wrote: I'm reading the tor code and (if I've understood it) it looks like the tor binary is sufficient for running either a relay or exit node. Correct. i.e. tor-resolve is simply an extra utility for the end user to do DNS resolution via tor rather than via one's

Tor Desktop

2008-06-06 Thread Chris Burge
I'm trying to implement the Tor Desktop as shown at freehaven on a Xubuntu VMWare install. First, is this project dead? Secondly, how can I tell if this is working. I'm a noob in Linux so any help is good. I didn't want to use the Virtual Privacy Machine on metropipe as it seems too integrated

Re: Tor with secure Gmail

2008-06-06 Thread Fabian Keil
[Second try, now with a subscribed address ...] Man Man [EMAIL PROTECTED] wrote: I am using Gmail at https://mail.google.com/ with tor. When I am at login, browser will state that the connection is only partially secure, ie. some items (I do not know what) are not encrypted. However, once

Re: How do we defeat exit node sniffing?

2008-06-06 Thread scar
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 defcon @ 2008/06/06 02:20: for http connections im worried about cookie sidejacking as well since some sites only authenticate via https and set a cookie, what can we do in this regard? there's nothing to do in this case either. you have to

Re: How do we defeat exit node sniffing?

2008-06-06 Thread Kyle Williams
It also depends on what you are using Tor for. If you are checking your e-mail (or whatever) that is associated with your real identity, then use only HTTPS. But if you are checking a different e-mail account that you have (1) setup over Tor and (2) only use for anonymous purposes, then you run a

Re: Tor Desktop

2008-06-06 Thread phobos
On Fri, Jun 06, 2008 at 10:30:21AM -0400, [EMAIL PROTECTED] wrote 1.3K bytes in 24 lines about: : I'm trying to implement the Tor Desktop as shown at freehaven on a Xubuntu : VMWare install. First, is this project dead? Secondly, how can I tell if Perhaps you mean Tor at

Re: Tor Desktop

2008-06-06 Thread Chris Burge
No, I mean the project at: http://wiki.noreply.org/noreply/VirtualPrivacyMachine. It uses TOR but allows you to have a separate machine using QEMU or something like (i.e. VMWare, VirtualBox, etc). So does this mean that no one knows? Thanks, Chris On Fri, Jun 6, 2008 at 9:38 PM, [EMAIL

Re: Tor Desktop

2008-06-06 Thread defcon
why would u need a seperate tor machine, when all you need is tor and some firefox extensions? On Fri, Jun 6, 2008 at 7:56 PM, Chris Burge [EMAIL PROTECTED] wrote: No, I mean the project at: http://wiki.noreply.org/noreply/VirtualPrivacyMachine. It uses TOR but allows you to have a separate

Re: Tor Desktop

2008-06-06 Thread Kasimir Gabert
On Fri, Jun 6, 2008 at 8:58 PM, defcon [EMAIL PROTECTED] wrote: why would u need a seperate tor machine, when all you need is tor and some firefox extensions? The idea is to prevent any unknown security breeches from compromising your anonymity. If, say, Firefox has a zero day exploit that

Re: Tor Desktop

2008-06-06 Thread Rochester TOR Admin
Here are a few other virtual anonymity machines: - JanusVM [http://www.vmware.com/appliances/directory/392], - xB Machine [http://xerobank.com/software.php], I may be wrong but I thought one of the major problems with someone creating a anonymity virtual machine has been keeping them up to date