Re: 25 tbreg relays in directory

2009-06-30 Thread punkle jones
On Mon, Jun 29, 2009 at 2:59 PM, Scott Bennett benn...@cs.niu.edu wrote: On Mon, 29 Jun 2009 09:19:21 -0500 punkle jones punkle.jo...@gmail.com wrote: Unlurking for the first time, I think. Welcome to the fray! ;) Why not join forces with a popular freeware/shareware product

Re: 25 tbreg relays in directory

2009-06-30 Thread Scott Bennett
On Mon, 29 Jun 2009 07:13:42 -0600 Jim McClanahan jimmy...@copper.net wrote: Scott, when I did a reply on your email, it (tried to) sent it your personal email account rather than the list. You probably were replying to the message sent directly to you, so that is quite likely. :-)

Re: 25 tbreg relays in directory

2009-06-30 Thread Scott Bennett
On Tue, 30 Jun 2009 01:13:13 -0500 punkle jones punkle.jo...@gmail.com wrote: On Mon, Jun 29, 2009 at 2:59 PM, Scott Bennett benn...@cs.niu.edu wrote: On Mon, 29 Jun 2009 09:19:21 -0500 punkle jones punkle.jo...@gmail.com wrote: Unlurking for the first time, I think. Welcome

@Scott Bennett

2009-06-30 Thread Jim McClanahan
I was trying to email you and it bounced: Final-Recipient: rfc822; benn...@cs.niu.edu Original-Recipient: rfc822;benn...@cs.niu.edu Action: failed Status: 5.7.1 Remote-MTA: dns; mp.cs.niu.edu Diagnostic-Code: smtp; 550 5.7.1 benn...@cs.niu.edu... Access denied

@Scott Bennett

2009-06-30 Thread Jim McClanahan
Ah, I see. It is the duplicate messages from you that were confusing me. Why duplicate messages? As somebody else has pointed out recently, the fact that I can post on or-talk means I am subscribed to or-talk.

Re: @Scott Bennett

2009-06-30 Thread Scott Bennett
On Tue, 30 Jun 2009 03:14:29 -0600 Jim McClanahan jimmy...@copper.net wrote: Ah, I see. It is the duplicate messages from you that were confusing me. Why duplicate messages? As somebody else has pointed out recently, the fact that I can post on or-talk means I am subscribed to or-talk.

Re: @Scott Bennett

2009-06-30 Thread Ansgar Wiechers
On 2009-06-30 Scott Bennett wrote: On Tue, 30 Jun 2009 03:14:29 -0600 Jim McClanahan wrote: Ah, I see. It is the duplicate messages from you that were confusing me. Why duplicate messages? As somebody else has pointed out recently, the fact that I can post on or-talk means I am subscribed

Re: @Scott Bennett

2009-06-30 Thread Scott Bennett
On Tue, 30 Jun 2009 13:18:50 +0200 Ansgar Wiechers t...@planetcobalt.net On 2009-06-30 Scott Bennett wrote: On Tue, 30 Jun 2009 03:14:29 -0600 Jim McClanahan wrote: Ah, I see. It is the duplicate messages from you that were confusing me. Why duplicate messages? As somebody else has

Re: many new relays

2009-06-30 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/28/2009 09:05 AM, grarpamp wrote: I'd give it a 15 minute mile high eyeball if I had the 'before the jump' cache files or a 'getinfo desc/all-recent' from back then. I just don't have that dataset. I have uploaded a tarball of the 00:00 UTC

Re: @Scott Bennett

2009-06-30 Thread Ansgar Wiechers
On 2009-06-30 Scott Bennett wrote: On Tue, 30 Jun 2009 13:18:50 +0200 Ansgar Wiechers t...@planetcobalt.net On 2009-06-30 Scott Bennett wrote: On Tue, 30 Jun 2009 03:14:29 -0600 Jim McClanahan wrote: Ah, I see. It is the duplicate messages from you that were confusing me. Why duplicate

Re: 25 tbreg relays in directory

2009-06-30 Thread Alexander Cherepanov
Hello! [Please reply to list only. Thanks.] Scott Bennett wrote to or-t...@seul.org, punkle.jo...@gmail.com on Tue, 30 Jun 2009 02:15:32 -0500 (CDT): I haven't lately looked at the distribution of relays over version strings, Just quick stat from perl -e ' while () { $tor{$1}++

Re: Suggested IT Text... Edit or destroy as fitting.

2009-06-30 Thread Bill Weiss
Michael(co...@cozziconsulting.com)@Fri, Jun 26, 2009 at 11:44:03AM -0400: Not to jump in with both feet, but here's some possible starting text ideas for the IT People Use Tor section... Ahem... IT Professionals use Tor: * To verify IP based firewall rules: A firewall may

Re: @Scott Bennett

2009-06-30 Thread Scott Bennett
On Tue, 30 Jun 2009 19:33:38 +0200 Ansgar Wiechers t...@planetcobalt.net wrote: On 2009-06-30 Scott Bennett wrote: On Tue, 30 Jun 2009 13:18:50 +0200 Ansgar Wiechers t...@planetcobalt.net On 2009-06-30 Scott Bennett wrote: On Tue, 30 Jun 2009 03:14:29 -0600 Jim McClanahan wrote: Ah, I

Obfuscated URLs?

2009-06-30 Thread Martin Fick
Obfuscated URL Paths? Would it be possible to create a URL or some longer string that describes a hidden path through the tor network to a specific hidden URL and to implement a routing mechanism to access documents (files) using this Obfuscated URL? I am fully aware of hidden services, and

Re: Obfuscated URLs?

2009-06-30 Thread Karsten Loesing
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/30/2009 08:47 PM, Martin Fick wrote: Would it be possible to create a URL or some longer string that describes a hidden path through the tor network to a specific hidden URL and to implement a routing mechanism to access documents (files)

Re: @Scott Bennett

2009-06-30 Thread Ansgar Wiechers
On 2009-06-30 Scott Bennett wrote: On 2009-06-30 Scott Bennett wrote: On Tue, 30 Jun 2009 03:14:29 -0600 Jim McClanahan wrote: Ah, I see. It is the duplicate messages from you that were confusing me. Why duplicate messages? As somebody else has pointed out recently, the fact that I can

Re: Obfuscated URLs?

2009-06-30 Thread Freemor
On Tue, 30 Jun 2009 11:47:33 -0700 (PDT) Martin Fick mogul...@yahoo.com wrote: I envision an onion encrypted URL along with the exact path through tor (the three hops) also onion encrypted. This would be similar to the way a client normally wraps requests through tor, but the wrapping

Re: Obfuscated URLs?

2009-06-30 Thread mogulguy
--- On Tue, 6/30/09, Karsten Loesing karsten.loes...@gmx.net wrote: On 06/30/2009 08:47 PM, Martin Fick wrote: Would it be possible to create a URL or some longer string that describes a hidden path through the tor network to a specific hidden URL and to implement a routing mechanism

Re: Obfuscated URLs?

2009-06-30 Thread Martin Fick
--- On Tue, 6/30/09, Freemor free...@gmail.com wrote: I envision an onion encrypted URL along with the exact path through tor (the three hops) also onion encrypted.  This would be similar to the way a client normally wraps requests through tor, but the wrapping would happen up front and

Re: Obfuscated URLs?

2009-06-30 Thread Max
already in here: http://offsystem.sf.net On Tue, Jun 30, 2009 at 8:47 PM, Martin Fick mogul...@yahoo.com wrote: Obfuscated URL Paths? Would it be possible to create a URL or some longer string that describes a hidden path through the tor network to a specific hidden URL and to implement

Tor Installation fails on Mac

2009-06-30 Thread Beirne Konarski
It has been a while since I have run Tor and wanted to get current and configure a server. I pulled down the installations bundles, both 2.0.35-0.1.14-universal and 2.1.16-rc-0.1.14-universal. I'm trying to do the installation on my Intel Mac running OX X 10.5.7 and Firefox 3.5. When I

Firefox video tag

2009-06-30 Thread Erilenz
Hi, Firefox 3.5 was released today. Has anyone investigated the new video tag that it supports with regards to whether or not it can cause leaks with Tor? -- Erilenz

Re: Suggested IT Text... Edit or destroy as fitting.

2009-06-30 Thread Michael
Bill Weiss wrote: Michael(co...@cozziconsulting.com)@Fri, Jun 26, 2009 at 11:44:03AM -0400: Similar to all of these: * To troubleshoot connectivity problems from the outside of their network (i.e. to see what parts of the internet can or can't see their site). Hi Bill, I

Re: Obfuscated URLs?

2009-06-30 Thread Edward Langenback
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Max wrote: already in here: http://offsystem.sf.net http://offsystem.sf.net/ I've had a look at OFF system and I think I'd rather stick with Freenet for such purposes. On Tue, Jun 30, 2009 at 8:47 PM, Martin Fick mogul...@yahoo.com

Re: Obfuscated URLs?

2009-06-30 Thread Freemor
On Tue, 30 Jun 2009 13:34:45 -0700 (PDT) Martin Fick mogul...@yahoo.com wrote: In my scenario, the point of hard coding the path is to obfuscate the final URL, how could this be done differently? In this scenario, it requires all 3 nodes to decrypt the final URL, one node by itself

FYI: router BillyGoat is offline

2009-06-30 Thread Kyle Williams
So some ass thought it would be great to spam from my node, because today I got a complaint about abuse. The node BillyGoat (FP: 12b9b187422b2a7752f861aa0b86e4d99fa88dc0) has been taken offline because of this. I'm not going to argue with my hosting company as they support my websites, and I

Re: FYI: router BillyGoat is offline

2009-06-30 Thread John Brooks
Unfortunately some ISPs just aren't willing to deal with the issues; that's how it works. You could always run a non-exit relay if you wish to, since they'll pretty much never have abuse complaints (theoretically, you could receive complaints related to an end user connecting to you, but that's

Re: FYI: router BillyGoat is offline

2009-06-30 Thread Michael
Kyle Williams wrote: So some ass thought it would be great to spam from my node, because today I got a complaint about abuse. The node BillyGoat (FP: 12b9b187422b2a7752f861aa0b86e4d99fa88dc0) has been taken offline because of this. I'm not going to argue with my hosting company as they

Re: FYI: router BillyGoat is offline

2009-06-30 Thread Kyle Williams
On Tue, Jun 30, 2009 at 6:21 PM, Michael co...@cozziconsulting.com wrote: Kyle Williams wrote: So some ass thought it would be great to spam from my node, because today I got a complaint about abuse. The node BillyGoat (FP: 12b9b187422b2a7752f861aa0b86e4d99fa88dc0) has been taken offline

Re: FYI: router BillyGoat is offline

2009-06-30 Thread Michael
Michael wrote: Kyle Williams wrote: reject 0.0.0.0/8:* http://0.0.0.0/8:* reject 169.254.0.0/16:* http://169.254.0.0/16:* reject 127.0.0.0/8:* http://127.0.0.0/8:* reject 192.168.0.0/16:* http://192.168.0.0/16:* reject 10.0.0.0/8:* http://10.0.0.0/8:* reject 172.16.0.0/12:*

Re: FYI: router BillyGoat is offline

2009-06-30 Thread Kyle Williams
On Tue, Jun 30, 2009 at 6:47 PM, Michael co...@cozziconsulting.com wrote: Michael wrote: Kyle Williams wrote: reject 0.0.0.0/8:* http://0.0.0.0/8:* reject 169.254.0.0/16:* http://169.254.0.0/16:* reject 127.0.0.0/8:* http://127.0.0.0/8:* reject 192.168.0.0/16:* http://192.168.0.0/16:*

Re: Firefox video tag

2009-06-30 Thread Gregory Maxwell
On Tue, Jun 30, 2009 at 6:02 PM, Erilenzeril...@gmail.com wrote: Hi, Firefox 3.5 was released today. Has anyone investigated the new video tag that it supports with regards to whether or not it can cause leaks with Tor? video and audio should have exactly the same attack surface as img has.

Re: FYI: router BillyGoat is offline

2009-06-30 Thread Kyle Williams
On Tue, Jun 30, 2009 at 6:37 PM, Michael co...@cozziconsulting.com wrote: Kyle Williams wrote: reject 0.0.0.0/8:* http://0.0.0.0/8:* reject 169.254.0.0/16:* http://169.254.0.0/16:* reject 127.0.0.0/8:* http://127.0.0.0/8:* reject 192.168.0.0/16:* http://192.168.0.0/16:* reject 10.0.0.0/8:*

General question about exit policies...

2009-06-30 Thread Michael
Hi all, One thing I do not see is support for an exit policy such as: accept *.yahoo.com:80 accept *.google.com:80 Is this type of statement supported but undocumented, and what would people think of having that ability? From my standpoint, it would certainly make running