Re: How to use Google Gadgets with Tor? - Is this possible?

2011-01-18 Thread Matthew
Let's try some science. We need a control, so lets create a blank Firefox profile. This requires running firefox with a command of 'firefox -P'. This will bring up the profile window and then you can create a blank profile and try to set your proxy to use Tor and try it again, and then try

Re: How to use Google Gadgets with Tor? - Is this possible?

2011-01-16 Thread Mike Perry
Thus spake M (moeedsa...@gmail.com): On Sat, Jan 15, 2011 at 7:02 PM, Mike Perry mikepe...@fscked.org wrote: You could also install an addon to observe the requests your browser uses in both non-Tor and Tor accesses of this gadget to see if the requests appear different for some

Re: How to use Google Gadgets with Tor? - Is this possible?

2011-01-16 Thread Robert Ransom
On Sun, 16 Jan 2011 06:06:11 + M moeedsa...@gmail.com wrote: On Sat, Jan 15, 2011 at 7:02 PM, Mike Perry mikepe...@fscked.org wrote: You could also install an addon to observe the requests your browser uses in both non-Tor and Tor accesses of this gadget to see if the requests appear

How to use Google Gadgets with Tor? - Is this possible?

2011-01-15 Thread Matthew
This post is similar to the problems people have been having with cookies and Gmail when using TorButton. In this case within Gmail I enabled add any gadget by URL and then added Twitter (https://twittergadget.appspot.com/gadget-gmail.xml). Without Tor when I click on the Twitter icon the

Re: How to use Google Gadgets with Tor? - Is this possible?

2011-01-15 Thread Mike Perry
Thus spake Matthew (pump...@cotse.net): To cut a long story short after having removed TorButton, NoScript, and HTTPS-Everywhere and therefore leaving just Tor I still cannot get Twitter to work from Gmail. I am using Firefox. The Twitter icon and drop-down box partially loads (but not

Re: How to use Google Gadgets with Tor? - Is this possible?

2011-01-15 Thread Matthew
On 15/01/11 19:02, Mike Perry wrote: Thus spake Matthew (pump...@cotse.net): To cut a long story short after having removed TorButton, NoScript, and HTTPS-Everywhere and therefore leaving just Tor I still cannot get Twitter to work from Gmail. I am using Firefox. The Twitter icon and

Is it possible to firewall Tor traffic with a hardware firewall?

2010-10-30 Thread hikki
can't restart it as long as the firewall blocks all outgoing traffic except for your entry node's IP addresses. Is there a way to make this possible, so you can IP filter your Tor computer and lock its connections only to your entry nodes and directory servers? Or is this impossible

Re: Is it possible to firewall Tor traffic with a hardware firewall?

2010-10-30 Thread Kyle Williams
One possible solution would be to run Tor on the firewall/router instead of the PC/server, and configure the HiddenServicePort to point to the PC that is running the service you want hidden. You would also want to make sure that the firewall/router is routing all traffic from the hidden service PC

Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-08 Thread Eugen Leitl
On Thu, Oct 07, 2010 at 08:31:14PM -0400, Michael Gomboc wrote: Hi! If there is no back-door or bug in your VM software, how you wanna break out of the VM? Ever seen bugless software? Even with root privileges you will be a prisoner within the VM.

Re: Hidden service: Is it possible for an attacker to break out ofa VM?

2010-10-08 Thread hikki
Robert Ransom: It depends on the VM software you are using. I did find an interesting guide to setup a hidden service on this mailing list, explaining how to setup Qemu on Ubuntu. I prefer a free open source VM with the ability to run as an unprivileged user.

Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread hikki
The title says it all: Several people recommend running a hidden service from within a VM, to prevent attackers from doing side channel attacks and reading off your hardware components and serial numbers. Then I heard that attackers can actually break out of VM's if they get root access on it

Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread Thomas S. Benjamin
Hikki, From a defense in depth point of view it can help to use a VM. It is not impossible for an adversary to break out of a VM, but if you are using a good VM it will at least require a pretty sophisticated attacker. I would say that using a VM would increase the security of your hidden

Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread Michael Gomboc
Hi! If there is no back-door or bug in your VM software, how you wanna break out of the VM? Even with root privileges you will be a prisoner within the VM. Proof me wrong. Michael 2010/10/7 hi...@safe-mail.net The title says it all: Several people recommend running a hidden service from

Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread Robert Ransom
On Thu, 7 Oct 2010 18:12:45 -0400 hi...@safe-mail.net wrote: Several people recommend running a hidden service from within a VM, to prevent attackers from doing side channel attacks and reading off your hardware components and serial numbers. Using a VM doesn't prevent most side-channel

Re: Hidden service: Is it possible for an attacker to break out of a VM?

2010-10-07 Thread andrew
On Thu, Oct 07, 2010 at 08:31:14PM -0400, michael.gom...@gmail.com wrote 2.8K bytes in 78 lines about: : If there is no back-door or bug in your VM software, how you wanna break out : of the VM? That's a perfect world that doesn't exist. The VM software will have bugs, someone will exploit it.

Tor Extension possible for Safari, others ?

2010-06-19 Thread Dreamcat4
Hi, With the recently released of Safari 5, its now possible to write extensions in HTML / CSS. It would be nice to know whether the browser API exposed by Apple is capable of allowing / exposing the Browser requests to a Socks Proxy (for Tor). Ie like FoxyProxy, TorButton etc does for Firefox

Re: Is it possible to use eDonkey clients with the Tor?

2010-03-27 Thread starslights
Hi James, Tor are not made for Bitorrent, E2DK etc you will overload the network and don't will have any speed. So please look about I2P or Bitblinder project for such things signature.asc Description: This is a digitally signed message part.

Re: Is it possible to use eDonkey clients with the Tor?

2010-03-27 Thread Marco Bonetti
Actually, you can use a donkey client with tor but it will be useless: you'll end up as a leech with no one being able to connect to your real ip address. On a side note, I'm not too sure about the burden of a torified donkey client: leeches get really slow download speeds. -- Sent from my

Re: Is it possible to use eDonkey clients with the Tor?

2010-03-27 Thread Curious Kid
- Original Message From: Marco Bonetti si...@slackware.it To: or-talk@freehaven.net or-talk@freehaven.net Sent: Sat, March 27, 2010 1:18:07 PM Subject: Re: Is it possible to use eDonkey clients with the Tor? Actually, you can use a donkey client with tor but it will be useless

Is it possible to use eDonkey clients with the Tor?

2010-03-26 Thread James Brown
I find in the Tor-wiki only information concirning its using with BitTorrent clients. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/

Is it possible to use Tor on such devices?

2009-12-19 Thread James Brown
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 http://www.nokia.ru/products/phones/nokia-n900/specifications -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

Re: Is it possible to use Tor on such devices?

2009-12-19 Thread Andrea Trentini
I have the n800 and I did not try tor on it, but I'm sure that it'll work if you try this package: http://maemo.org/downloads/product/OS2008/easy-deb-chroot/ I have it installed and I do use almost everything :) James Brown wrote: http://www.nokia.ru/products/phones/nokia-n900/specifications

is it possible...

2009-11-07 Thread anon
to DOS directory authorities with millions of reject and/or accept lines in a node config? *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body.

ExitNodes for encrypted connects only are not possible. Why?

2009-05-09 Thread Gitano
for ports 443, 465, 563, 993, 995 (https, ssmtp, nntps, imaps, pop3s) only, but this is not possible. What's the reason behind this? Is there any chance to loose this restriction in one of the next releases?

Re: ExitNodes for encrypted connects only are not possible. Why?

2009-05-09 Thread Karsten Loesing
and allows exits to at least one /8 address space. I would like to setup my ExitNode for ports 443, 465, 563, 993, 995 (https, ssmtp, nntps, imaps, pop3s) only, but this is not possible. What's the reason behind this? Is there any chance to loose this restriction in one of the next releases

Re: ExitNodes for encrypted connects only are not possible. Why?

2009-05-09 Thread Gitano
Karsten Loesing wrote: Feel free to configure your node to exit to those 5 ports only. That makes your node an exit node for connections to those ports. Your node won't get the Exit flag, though, but that's not required for being an exit node. The Exit flag is used by clients for path

Re: ExitNodes for encrypted connects only are not possible. Why?

2009-05-09 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 05/09/2009 01:38 PM, Gitano wrote: It's unlikely that the criteria you pasted above will be changed. There need to be some criteria, and if almost every node matches them, the flag would be useless. Ok, but adding one more 'secure' port

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-10 Thread Scott Bennett
to the 1 GB/s campus backbone net, but it is attached via a 100 Mb/s router, so the reported data rate is four to five times the rate physically possible due to the router's limitation. The server, according to its operator, is running on a 2.6 GHz P4, and its descriptor says the machine is running

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-10 Thread Domenico Andreoli
Hi, On Wed, Sep 10, 2008 at 07:16:46AM -0500, Scott Bennett wrote: It appears that mnl was not actually down. It may be experiencing some network connection problems. Its operator mentioned that he had been unable to log into it over the weekend, but when he came in on Monday, it was

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-10 Thread Domenico Andreoli
, so the reported data rate is four to five times the rate physically possible due to the router's limitation. The server, according to its operator, is running on a 2.6 GHz P4, and its descriptor says the machine is running LINUX. Based upon postings quite a while back from blutmagie's operator

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-10 Thread Scott Bennett
is attached to the 1 GB/s campus backbone n= et, but it is attached via a 100 Mb/s router, so the reported data rate is fo= ur to five times the rate physically possible due to the router's limitation. The server, according to its operator, is running on a 2.6 GHz P4, and its descriptor says

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-10 Thread Kasimir Gabert
On Wed, Sep 10, 2008 at 7:28 AM, Scott Bennett [EMAIL PROTECTED] wrote: The fact of not being an exit node would make it a better corruped relay? I mean, if I would like to DOS the Tor network I would be better No, or at least I don't think so. What I was referring to is that most of the

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-10 Thread Roger Dingledine
On Wed, Sep 10, 2008 at 03:09:35PM +0200, Domenico Andreoli wrote: Due to other reasons this morning it was offline and I've been unable to mail too. I am recovering a couple of messages I sent yesterday on this ml which have been dropped becaouse (I guess) wrote them with the wrong From email

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-10 Thread coderman
On Wed, Sep 10, 2008 at 1:53 PM, Olaf Selke [EMAIL PROTECTED] wrote: ... 10% less than the bw data collected by mrtg i'd be curious to compare number of packets with the observed bandwidth; how much of that 10% is TCP/IP protocol headers that aren't visible to Tor's bandwidth accounting (which

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-10 Thread Scott Bennett
On Wed, 10 Sep 2008 07:46:51 -0600 Kasimir Gabert [EMAIL PROTECTED] wrote: On Wed, Sep 10, 2008 at 7:28 AM, Scott Bennett [EMAIL PROTECTED] wrote: The fact of not being an exit node would make it a better corruped relay? I mean, if I would like to DOS the Tor network I would be better

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-09 Thread Roger Dingledine
On Tue, Sep 09, 2008 at 05:15:15AM -0500, Scott Bennett wrote: bandwidth 5242880 10485760 52239166 --- ~48.8 MB/s (!) Wow. Nice! :) And, as you say, unlikely to be true. All of the above leads me to suspect two things. One is that there may be some

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-09 Thread Scott Bennett
On Tue, 9 Sep 2008 06:42:02 -0400 Roger Dingledine [EMAIL PROTECTED] wrote: On Tue, Sep 09, 2008 at 05:15:15AM -0500, Scott Bennett wrote: bandwidth 5242880 10485760 52239166 --- ~48.8 MB/s (!) Wow. Nice! :) And, as you say, unlikely to be true.

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-09 Thread Kasimir Gabert
the reported data rate is four to five times the rate physically possible due to the router's limitation. The server, according to its operator, is running on a 2.6 GHz P4, and its descriptor says the machine is running LINUX. Based upon postings quite a while back from blutmagie's operator and from

Re: peculiar server bandwidth posted by server mnl and possible new type of attack

2008-09-09 Thread Olaf Selke [EMAIL PROTECTED]
Kasimir Gabert wrote: Would you mind looking over the new router detail page and seeing if it looks reasonable to you? You can view it at http://trunk.torstatus.kgprog.com/router_detail.php?FP=795513a52e5155af5e36937d5a7c76d3bf20d0c4 Sir, Yes Sir! It appears to be slighly below my mrtg

Is it possible to establish a Keep-Alive connection ?

2008-08-14 Thread hgiuh ghj
Hello ! I would like to know if it's possible to establish a keep-alive HTTP connection-type using Polipo with Tor. I'm currently using Privoxy with Tor, which can only provide close connection-type according to the HTTP Headers. Thanks ! David Magnus

Re: Is it possible to establish a Keep-Alive connection ?

2008-08-14 Thread Marco Bonetti
On Thu, August 14, 2008 13:39, hgiuh ghj wrote: I would like to know if it's possible to establish a keep-alive HTTP connection-type using Polipo with Tor. according to http://www.pps.jussieu.fr/~jch/software/polipo/polipo.html#Persistent-connections , yes. -- Marco Bonetti Slackintosh Linux

Possible bug in vidalia 0.1.5 'Tor Network Map' GUI?

2008-06-29 Thread john smith
when I was using vidalia 0.1.5 (compiled from source] on the previous 0.2.0.26-rc version of Tor. Is it possible that some error might have occurred when I was compiling from source or could this possibly be some other kind of error/bug? Everything else in tor-0.2.0.28-rc vidalia 0.1.5 seems

Re: Possible attack questions

2008-06-01 Thread Xizhi Zhu (Romeo)
In fact, some authorities do view the traffic. For example, China is viewing the traffic coming in and out of the border, and blocking the connections when sensitive content occurs. So far as I know, as there are so many people viewing the sensitive contents through kinds of proxies like Tor,

Possible attack questions

2008-05-31 Thread Bradford X
of network is slim. However my understanding is that it would be possible for an attacker to view traffic at their ISP in this country, and also the traffic coming out in the US, and tell who was visiting what because of the timing. My question, assuming I am correct that this is possible, is: What

Re: Spoofing location - possible?

2008-05-08 Thread Scott Bennett
On Tue, 06 May 2008 14:08:48 -0400 [EMAIL PROTECTED] wrote: @Scott: Yes. Pick some U.S.-based exit nodes, and use the .exit notation you referred to above. It means choosing your exits by hand, rather than letting tor do that, but it will get you to the exit you want, provided that

Spoofing location - possible?

2008-05-06 Thread buralex
#ComparisonProxyAggregators so ... is what I'm looking for possible? and assuming it is ... is there any prospect that TOR would be able to deliver enough throughput for effective streaming? ANSWER: YES!! (google video works) so did http://www.pandora.com/ (streaming radio - not available non-US

Re: Spoofing location - possible?

2008-05-06 Thread Geoffrey Goodell
On Tue, May 06, 2008 at 07:04:38AM -0400, [EMAIL PROTECTED] wrote: Jamie McCarthy [EMAIL PROTECTED] said on May 05, 2008 12:38 -0400 (in part): Please forgive me for not doing more thorough research before emailing. I'm not part of the Tor community and not really interested in getting too

RE: Spoofing location - possible?

2008-05-06 Thread Wesley Kenzie
Subject: Spoofing location - possible? Jamie McCarthy [EMAIL PROTECTED] said on May 05, 2008 12:38 -0400 (in part): Please forgive me for not doing more thorough research before emailing. I'm not part of the Tor community and not really interested in getting too into it. I'm just

Re: Spoofing location - possible?

2008-05-06 Thread Robert Hogan
On Tuesday 06 May 2008 13:40:34 Geoffrey Goodell wrote: On Tue, May 06, 2008 at 07:04:38AM -0400, [EMAIL PROTECTED] wrote: Jamie McCarthy [EMAIL PROTECTED] said on May 05, 2008 12:38 -0400 (in part): Please forgive me for not doing more thorough research before emailing. I'm not part

Re: Spoofing location - possible?

2008-05-06 Thread buralex
Geoffrey Goodell [EMAIL PROTECTED] said on May 06, 2008 8:40 -0400 (in part): me: I came to TOR looking not so much for the ability to surf anonymously but to convince my end target that I'm from a particular country. Primarily to allow use of streaming media (radio and video) from sites

Re: Spoofing location - possible?

2008-05-06 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Yes, you can spoof geolocation with Tor. You just need to pin your exit node to one in the area you'd like. 1. Dig through a Tor directory to find a suitable exit node. 2. Put something like this in your torrc: ExitNodes

Re: Possible attack method?? Question..

2008-01-14 Thread Anon Mus
Watson Ladd wrote: Anon Mus wrote: This question is for those with the knowhow. A while back I got a number of emails from the same source where the emails were sent in pairs a minute or less apart. The first of each of the email pair were large (over 700characters), the second were

Possible attack method?? Question..

2008-01-11 Thread Anon Mus
). My guess is that my contact was in fact an intelligence (probably British with the help of the USA) plant out there pretending to be a (British) activist with a grievance. My question is, is this email pair (of vastly differing sizes) a possible attack method on a Tor user, by somehow watching

Re: Possible attack method?? Question..

2008-01-11 Thread Paul Syverson
On Fri, Jan 11, 2008 at 04:02:28PM -0600, Jon McLachlan wrote: (please correct me if I'm incorrect but...) if the adversary controls your entry-guard (which is nearly impossible to detect and considered a 'strong' adversary) if the adversary controls input to your tunnel (like text in an

Re: Possible attack method?? Question..

2008-01-11 Thread Max Berger
Am Freitag, den 11.01.2008, 09:44 -0800 schrieb Anon Mus: This question is for those with the knowhow. A while back I got a number of emails from the same source where the emails were sent in pairs a minute or less apart. The first of each of the email pair were large (over

Re: Possible attack method?? Question..

2008-01-11 Thread Anon Mus
thetor network in the suspected country of connection origin. e.g. in the suspected country of origin filter traffic  - by time band  - by tor network node source  - by packet size pattern and you get a list of possible IP's who could be the suspect. Do this a couple of times

Re: Possible attack method?? Question..

2008-01-11 Thread Watson Ladd
Anon Mus wrote: This question is for those with the knowhow. A while back I got a number of emails from the same source where the emails were sent in pairs a minute or less apart. The first of each of the email pair were large (over 700characters), the second were small (under 50

Passing another,second,individual torrc on command line to Tor possible ?

2007-12-31 Thread Ben Stover
a second torrc which I can pass to Tor as starting parameter on command line. Is this possible ? Or is there a work around for this ? Ben

Re: Passing another,second,individual torrc on command line to Tor possible ?

2007-12-31 Thread Ben Wilhelm
having to manually edit the one and only torrc I would appreciate to have a second torrc which I can pass to Tor as starting parameter on command line. Is this possible ? Or is there a work around for this ? Ben

How to get the smallest OS possible to run Icecat(firefox)

2007-12-31 Thread kazaam
Hi, I will try to make a really really small OS. All it should do is running IceCat(Firefox) and maybe Sylpheed and Gajim. The reason is I wanna test a little bit with running this OS in a vmware and sending all traffik of this child-system over Tor. So the OS just needs to run within a

Re: Passing another,second,individual torrc on command line to Tor possible ?

2007-12-31 Thread anonym
on command line. Is this possible ? Or is there a work around for this ? Ben -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHeTY/p8EswdDmSVgRAisVAJ4te9vUpY5Z6knDxEALxVZ6Gp7PqgCcDdrD eizVA7xNgIRX0ASLCaBcsTA= =Bfmn -END PGP SIGNATURE-

Re: How to get the smallest OS possible to run Icecat(firefox)

2007-12-31 Thread Kyle Williams
Like JanusVM? On Dec 31, 2007 9:43 AM, kazaam [EMAIL PROTECTED] wrote: Hi, I will try to make a really really small OS. All it should do is running IceCat(Firefox) and maybe Sylpheed and Gajim. The reason is I wanna test a little bit with running this OS in a vmware and sending all traffik

Re: How to get the smallest OS possible to run Icecat(firefox)

2007-12-31 Thread kazaam
On Mon, 31 Dec 2007 15:37:01 -0800 Kyle Williams [EMAIL PROTECTED] wrote: Like JanusVM? No JanusVM gives me an VPN to tunnel through. I wanna have an easy parallel system. Like using my normal linux system as ever and using my secured one just for surfing but this really secure. -- kazaam

Re: Passing another,second,individual torrc on command line to Tor possible ?

2007-12-31 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Ben Stover wrote: Can I start Tor with a second, individual torrrc configuration file? In general I want to use the original torrc. But occasionally I want to use e.g. specific exit nodes. So I must use a modified torrc. Instead of always

Re: How to get the smallest OS possible to run Icecat(firefox)

2007-12-31 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 kazaam wrote: On Mon, 31 Dec 2007 15:37:01 -0800 Kyle Williams [EMAIL PROTECTED] wrote: Like JanusVM? No JanusVM gives me an VPN to tunnel through. I wanna have an easy parallel system. Like using my normal linux system as ever and using

Exit from Tor, Pivoxy and Vidalia with one click possible ?

2007-12-29 Thread Ben Stover
When I start Tor, then 3 icons appear in the SysTray of WinXP: 1 for Tor 1 for Pivoxy 1 for Vidalia If I want to exit all 3 programs I have to exit them all 3 individually, one after the other: Is there a way to exit them all 3 at once with only 1 click ? Ben

Re: Exit from Tor, Pivoxy and Vidalia with one click possible ?

2007-12-29 Thread phobos
On Sat, Dec 29, 2007 at 11:07:39AM +0100, [EMAIL PROTECTED] wrote 0.3K bytes in 15 lines about: : Is there a way to exit them all 3 at once with only 1 click ? They are three separate programs. Therefore, three separate clicks are needed. Someday in the future we may tie them all together. --

Running Tor + Pivoxy from USB stick possible ?

2007-12-26 Thread Ben Stover
I want to install Tor + Pivoxy on an USB stick and run it on multiple computers on demand. Is this possible? I guess I have to install + start the Tor service on every new computer again. How do I do that without re-installing whole Tor + Pivoxy again? Regards Ben

Re: Running Tor + Pivoxy from USB stick possible ?

2007-12-26 Thread Marco Bonetti
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ben Stover wrote: Is this possible? For win32 enviroments: http://portabletor.sourceforge.net/ You could, however, build static versions of both tor and privoxy and carry them around. ciao - -- Marco Bonetti Slackintosh Linux Project Developer

possible DoS attack?

2007-12-11 Thread Scott Bennett
In the last couple of days, I've noticed my tor server maxing out the transmit side (~110-~115 KB/s) of my ADSL while typically using 10 KB/s of the receive side, usually for long periods of time. Curious about this oddity, I began looking at netstat output more frequently to see what was

Re: possible DoS attack?

2007-12-11 Thread F. Fox
) It sounds mighty suspicious, in my opinion. If I recall correctly, directory mirroring is based on HTTP (hence, why it's encouraged to host it on port 80 for fascist firewalled folks, if at all possible). Therefore, it would be vulnerable to any fundamental attack (i.e., based on the nature of TCP

Possible to have favorites?

2007-12-09 Thread Christian Westlund
While it feels like it kinda defeats the purpose with tor, is it possible to have favorites to connect through? Sometimes I need a US ip, sometimes another country. And it feels redundant to click the new identity till I get one that is. I just started using tor, together with foxy proxy

Re: Possible to have favorites?

2007-12-09 Thread Michael Schmidt
good idea, but why not trusted friends as stable connections for an entry point of the tor network? - Tor as a plugin of http://retroshare.sf.net please evaluate it. 2007/12/9, Christian Westlund [EMAIL PROTECTED]: While it feels like it kinda defeats the purpose with tor, is it possible

Re: Possible to have favorites?

2007-12-09 Thread Marco Bonetti
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michael Schmidt wrote: good idea, but why not trusted friends as stable connections for an entry point of the tor network? For what I know (I'm not a developer) limiting the possibilities of entry/middleman/exit nodes is always a bad thing(tm) for

Re: Possible to have favorites?

2007-12-09 Thread Michael Schmidt
not default, but as an option to choose that tunnel to/of a friend, connect if you like to favourites = or trusted friends if not, then choose a random peer. 2007/12/9, Marco Bonetti [EMAIL PROTECTED]: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Michael Schmidt wrote: good idea, but why

Possible Attack, Questions

2007-06-20 Thread Ringo Kamens
I have a question regarding attacks on tor. From what I understand, if somebody were to obtain the private key of a hidden server, they would be able to serve requests as that server. My question is: If there are two servers running with the same private key on the Tor network, what determines

Re: Block directory authorities, is it possible?

2007-01-22 Thread Eugene Y. Vasserman
http://tor.eff.org/svn/trunk/doc/design-paper/blocking.pdf It seems to me that the most difficult things are 1) to ensure that a user in a blocked country always has access to a bridge, and 2) proving that bridges are useful. 1) It seems a user needs to know at least two working bridges in

Re: Block directory authorities, is it possible?

2007-01-18 Thread Total Privacy
On Sat, 13 Jan 2007 19:41:57 +0800, Kevin Smith [EMAIL PROTECTED] said: Why hasn't Tor been blocked in China already? Torpark is redirecting Two explanations: 1 - They need it for own use, field agents inside china to field agents in foreign countries. An easy way to not have to go by embassy

Re: Block directory authorities, is it possible?

2007-01-15 Thread Pei Hanru
On 2007-1-15 11:38 CST(UTC+8), Kevin Smith wrote: When a page is blocked it usually looks like it has timed out. I'm not clear as to how the blocking works. It seems that sensitive keywords in a webpage trigger the firewall to send a TCP reset to both the client and the server(1), but I do not

Re: Block directory authorities, is it possible?

2007-01-14 Thread Kevin Smith
I have never heard that the Tor website http://tor.eff.org/ has been blocked in China, nor any URLs under that website. It is currently not blocked by my ISP in Beijing, nor was it blocked by my ISP in Shandong province when I lived there. I was, however, referring to the Tor service itself, not

Re: Block directory authorities, is it possible?

2007-01-14 Thread Jacob Appelbaum
Kevin Smith wrote: I have never heard that the Tor website http://tor.eff.org/ has been blocked in China, nor any URLs under that website. It is currently not blocked by my ISP in Beijing, nor was it blocked by my ISP in Shandong province when I lived there. I was, however, referring to the

Re: Block directory authorities, is it possible?

2007-01-14 Thread Kevin Smith
I wonder if it's just an oversight that tor.eff.org hasn't been blocked in your case? I don't think it is an oversight that tor.eff.org has not been blocked in my case. I have never heard of the Tor site being blocked anywhere in China. My friends in Beijing, Shanghai and Shandong province are

Re: Block directory authorities, is it possible?

2007-01-13 Thread Pei Hanru
On 2007-1-13 4:44 CST(UTC+8), Mike Perry wrote: I live in China and was/am having difficulties in using Tor, the problem is: it takes quite a long time to build a circuit for the first time I start Tor on my Windows machine. Am I understanding correctly? Are there any actions Tor can take?

Re: Block directory authorities, is it possible?

2007-01-13 Thread Kevin Smith
Why hasn't Tor been blocked in China already? Torpark is redirecting to the Google homepage (1). The psiphon homepage has been blocked. The Freegate homepage is blocked. Why not Tor? Could it be that Tor is being used to help identify suspected dissidents? Consider the following: I'm sitting at

Re: Block directory authorities, is it possible?

2007-01-13 Thread Roger Dingledine
On Sat, Jan 13, 2007 at 07:41:57PM +0800, Kevin Smith wrote: Why hasn't Tor been blocked in China already? Torpark is redirecting to the Google homepage (1). The psiphon homepage has been blocked. The Freegate homepage is blocked. Why not Tor? My guesses, in order of ease-of-explanation: A)

Re: Block directory authorities, is it possible?

2007-01-13 Thread Kevin Smith
Why hasn't Tor been blocked in China already? My guesses, in order of ease-of-explanation: A) There are perhaps 3 people in China running Tor clients right now, according to my rough estimates. That's roughly zero people, in China. B) The general perception of Tor is that it's a tool

Block directory authorities, is it possible?

2007-01-12 Thread Pei Hanru
. [...] When a client has no live network-status documents, it downloads network-status documents from a randomly chosen authority. Well, Tor will finally recover here when the fibers are repaired. But this reminds me of a possible attack against the Tor network, say

Re: Block directory authorities, is it possible?

2007-01-12 Thread Shava Nerad
At 04:41 AM 1/12/2007, Pei Hanru wrote: Well, Tor will finally recover here when the fibers are repaired. But this reminds me of a possible attack against the Tor network, say, if the notorious Great Firewall of China blocks *all* the connections to *all* the directory authorities (currently 5 I

Re: Block directory authorities, is it possible?

2007-01-12 Thread Mike Perry
Thus spake Pei Hanru ([EMAIL PROTECTED]): Hi all, I live in China and was/am having difficulties in using Tor, the problem is: it takes quite a long time to build a circuit for the first time I start Tor on my Windows machine. Am I understanding correctly? Are there any actions Tor can

Re: Possible fishing attempt for eBay

2006-11-03 Thread Ricky Fitz
Did anyone else get these? Me too, the funniest thing is: Your registered name is included to show this message originated from eBay But the name isn't included ;-) greetings, Ricky. signature.asc Description: Dies ist ein digital signierter Nachrichtenteil

Possible fishing attempt for eBay

2006-10-31 Thread Total Privacy
Maybe slightly off topic (btw, is OT = Off Topic or On Topic?) but because I newer had anything to do with eBay and still get this, perhaps other on this list also received it as some strange effect of being into this list, where any member see all others addresses? The following email

Re: Possible fishing attempt for eBay

2006-10-31 Thread Edward Langenback
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tuesday, October 31, 2006 at 2:00:44 PM in Message [EMAIL PROTECTED], Total wrote: Maybe slightly off topic (btw, is OT = Off Topic or On Topic?) but because I newer had anything to do with eBay and still get this, perhaps other on this list

Re: Possible fishing attempt for eBay

2006-10-31 Thread George Shaffer
On Tue, 2006-10-31 at 15:00, Total Privacy wrote: The following email appeared two times (25 and 26 octobre) sent from [EMAIL PROTECTED] with a subject of Security Service Notification. Both have exactly the same content, They are bogus. I got exactly the two same emails and reported the

Re: Possible fishing attempt for eBay

2006-10-31 Thread Fergie
Just a side-note: Please take the time to report these at: http://www.castlecops.com/pirt Cheers, - ferg -- George Shaffer [EMAIL PROTECTED] wrote: On Tue, 2006-10-31 at 15:00, Total Privacy wrote: The following email appeared two times (25 and 26 octobre) sent from [EMAIL PROTECTED]

Improvement of memory allocation possible?

2006-05-11 Thread Joerg Maschtaler
Hi, if it possible to add an option which allows to shrink memory buffers immediatly if they are not full? [1] I run an Tor server on a virtual server in which the amount of RAM is the bottleneck of this system. Since ~ 3 weeks i measure the resident memory allocation and the corresponding

Re: Improvement of memory allocation possible?

2006-05-11 Thread Nick Mathewson
On Thu, May 11, 2006 at 09:21:05PM +0200, Joerg Maschtaler wrote: Hi, if it possible to add an option which allows to shrink memory buffers immediatly if they are not full? [1] I don't think you would want that; the CPU usage would be *insanely* high. Every time you transmitted any

Re: Improvement of memory allocation possible?

2006-05-11 Thread Ben Wilhelm
of this memory. (Although your buffer-shrinking would help reduce that maximum-allocated-size.) -Ben Nick Mathewson wrote: On Thu, May 11, 2006 at 09:21:05PM +0200, Joerg Maschtaler wrote: Hi, if it possible to add an option which allows to shrink memory buffers immediatly if they are not full

Re: Improvement of memory allocation possible?

2006-05-11 Thread Watson Ladd
wrote: Hi, if it possible to add an option which allows to shrink memory buffers immediatly if they are not full? [1] I don't think you would want that; the CPU usage would be *insanely* high.Every time you transmitted any information at all, you'd need to shrink the buffer, and then immediately