Supercookies

2009-08-20 Thread Matej Kovacic
Hi, I am not sure if this was on this list, but it is an interesting information: http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/ it seems cookies could be respawned... And there is a plugin to remove this LSO's: https://addons.mozilla.org/en-US/firefox/addon/6623

Solaris10/Sparc, tor and threads

2009-08-20 Thread Thomas . Hluchnik
Hello, my fist steps with running tor on Sparc are successful. I did it with Solaris10, Sun-CC on a E450 with 4 CPU. When doing configure I found a message: configure:2435: You are running Solaris; Sometimes threading makes cpu workers lock up here, so I will disable threads. This is a pity

Re: Tor/Iptables Question

2009-08-20 Thread Ringo
I've run into a problem. My model is that a user torify has all traffic forwarded to localhost. From there, it should all be dropped except connections to privoxy (port 8118). It all works up until the last iptables command. I assume this is blocking all incoming traffic, including traffic I've

Re: Tor/Iptables Question

2009-08-20 Thread coderman
On Thu, Aug 20, 2009 at 4:55 AM, Ringo2600den...@gmail.com wrote: ... I can't connect to any websites, but I can send requests out. Is there anything obvious I'm missing or a something I should add? ... try adding: iptables -A INPUT -p tcp -m state --state ESTABLISHED -j ACCEPT before:

Re: Tor/Iptables Question

2009-08-20 Thread Ringo
I'm still getting the same problem : ( Here's what wget gives me: wget google.com resolving google.com (works) connecting to google.com... and then it just never finished. Ringo coderman wrote: On Thu, Aug 20, 2009 at 4:55 AM, Ringo2600den...@gmail.com wrote: ... I can't connect to any

Re: Tor/Iptables Question

2009-08-20 Thread Kyle Williams
Maybe this will work for you. FYI, I changed your iptables rules some and recalled the rest from memory, so it's iffy. #allow connections to privoxy iptables -A OUTPUT -o lo -p

Re: Tor/Iptables Question

2009-08-20 Thread Ringo
Ok so I added this one (which seemed like the only one that would open things up) and still no luck: iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT Here's a export of my current rules: # Generated by iptables-save v1.4.1.1 on Thu Aug 20 09:28:22 2009 *filter :INPUT ACCEPT

Re: Supercookies

2009-08-20 Thread Ted Smith
On Thu, 2009-08-20 at 08:55 +0200, Matej Kovacic wrote: Hi, I am not sure if this was on this list, but it is an interesting information: http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/ it seems cookies could be respawned... And there is a plugin to remove

Re: Supercookies

2009-08-20 Thread Eugen Leitl
On Thu, Aug 20, 2009 at 09:54:59AM -0400, Praedor Atrebates wrote: No need to go extreme and lose most functionality by going 1% free/open software. The issue is security only. Some features are intrinsically exploitable, and it matters little how it's implemented. You simply lose a

Re: Supercookies

2009-08-20 Thread Ted Smith
On Thu, 2009-08-20 at 09:54 -0400, Praedor Atrebates wrote: On Thursday 20 August 2009 09:36:40 am Ted Smith wrote: On Thu, 2009-08-20 at 08:55 +0200, Matej Kovacic wrote: Hi, I am not sure if this was on this list, but it is an interesting information:

Re: Supercookies

2009-08-20 Thread Andrew Lewman
On 08/20/2009 10:09 AM, Ted Smith wrote: You don't lose most functionality by using free software. Not picking on Ted, but this whole thread is off-topic. -- Andrew Lewman The Tor Project pgp 0x31B0974B Website: https://torproject.org/ Blog: https://blog.torproject.org/ Identi.ca: torproject

Re: Scott made me do it.

2009-08-20 Thread Andrew Lewman
On 08/20/2009 12:59 AM, Scott Bennett wrote: Hmmm...I'm not too sure that I should be blamed for this, but nevertheless... Not blaming you, just honoring you as the instigator. ;) To get back to your question of why we need a proxy between a browser and tor, though, I would like to

Re: Supercookies

2009-08-20 Thread Ted Smith
On Thu, 2009-08-20 at 10:28 -0400, Andrew Lewman wrote: On 08/20/2009 10:09 AM, Ted Smith wrote: You don't lose most functionality by using free software. Not picking on Ted, but this whole thread is off-topic. Wait, what? The discussion of persistent, hidden, plugin-based storage is

Re: bad exit node

2009-08-20 Thread KT
On 8/20/09, Scott Bennett benn...@cs.niu.edu wrote: On Wed, 19 Aug 2009 23:54:01 +0100 KT listcli...@gmail.com wrote: Node 446E29C6F3D47C315B78EBB1BAC62C241C9F992 [1] completely overwrites The above is not a valid identifier. It appears to be missing one character. Sorry for

Re: Supercookies

2009-08-20 Thread Andrew Lewman
On 08/20/2009 10:58 AM, Ted Smith wrote: Wait, what? The discussion of persistent, hidden, plugin-based storage is off-topic for the Tor list? I would think that constitutes a security threat from the perspective of someone using Tor to safeguard their anonymity. Additionally, the question

Re: Solaris10/Sparc, tor and threads

2009-08-20 Thread Roger Dingledine
On Thu, Aug 20, 2009 at 12:52:38PM +0200, thomas.hluch...@netcologne.de wrote: my fist steps with running tor on Sparc are successful. I did it with Solaris10, Sun-CC on a E450 with 4 CPU. Great. When doing configure I found a message: configure:2435: You are running Solaris; Sometimes

Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

2009-08-20 Thread Kyle Williams
On Thu, Aug 20, 2009 at 9:05 AM, Curious Kid letsshareinformat...@yahoo.com wrote: Please excuse my extreme ignorance. Even if an attacker were to be able to gain command-line access through a vulnerability in a program such as Firefox, they still wouldn't be able to obtain the user's IP

Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

2009-08-20 Thread Curious Kid
Please excuse my extreme ignorance. Even if an attacker were to be able to gain command-line access through a vulnerability in a program such as Firefox, they still wouldn't be able to obtain the user's IP address, look at their file system, or gain access to any other

Bad exit node: freeMe69

2009-08-20 Thread KT
Exit node freeMe69 [1] is injecting the following snippet to response body: script type=text/javascript src=http://s.tobban.com/solver/cpt.php;/script [1] http://tinyurl.com/mz9d7e

Re: Bad exit node: freeMe69

2009-08-20 Thread Tom Hek
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Aug 20, 2009, at 23:02 PM, KT wrote: Exit node freeMe69 [1] is injecting the following snippet to response body: script type=text/javascript src=http://s.tobban.com/solver/cpt.php;/script [1] http://tinyurl.com/mz9d7e It's actually

Re: Bad exit node: freeMe69

2009-08-20 Thread Flamsmark
On Thu, Aug 20, 2009 at 17:29, Tom Hek t...@tomhek.nl wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Aug 20, 2009, at 23:02 PM, KT wrote: Exit node freeMe69 [1] is injecting the following snippet to response body: script type=text/javascript

Re: Bad exit node: freeMe69

2009-08-20 Thread KT
On 8/20/09, Tom Hek t...@tomhek.nl wrote: On Aug 20, 2009, at 23:02 PM, KT wrote: Exit node freeMe69 [1] is injecting the following snippet to response body: script type=text/javascript src=http://s.tobban.com/solver/cpt.php;/script [1] http://tinyurl.com/mz9d7e It's actually injected

Re: Bad exit node: freeMe69

2009-08-20 Thread Andrew Lewman
On 08/20/2009 08:28 PM, downie - wrote: iCharles Proxy, a href=http://www.xk72.com/charles/;http://www.xk72.com/charles//a/i The real charles proxy is at http://www.charlesproxy.com/ and is generally used for debugging apps, but is also used to spy on people. The innocent explanation is that

Re: More Secure Tor Browsing Through A Virtual Machine in Ubuntu

2009-08-20 Thread coderman
On Thu, Aug 20, 2009 at 9:05 AM, Curious Kidletsshareinformat...@yahoo.com wrote: .. How is entropy gathered in virtual machines? Will it tell you if there is not enough entropy to support unpredictable routing and encryption? (Or is that even an issue at all with Tor?) hi Curious, entropy