Re: Unique properties and realtime entry-exit check

2006-04-05 Thread Mike Perry
Thus spake Total Privacy ([EMAIL PROTECTED]):

 Two hypothetical examples: 
 
 1. 
 I?m using the normal Firefox (without Tor) with cookies enabled 
 to log in on Yahoo email to make some stuff as my real identity. 
 Then I close the normal Firefox and start Torpark Firefox with 
 cookies enabled to log in on another Yahoo email to make some 
 stuff as an fake identity. Now the question is, are the cookies 
 capable to retrieve some unique information about my computer, 
 that later is comparable at Yahoo head quarter, to figure out 
 this two different Yahoo webmail accounts was actually runned 
 from one same computer? 

That depends on your profile directory.. If torpark and firefox are
sharing the same profile, cookies will be shared. If they are sharing
profiles, extensions probably will be shared also. 

An easy to check this without devling through arcane browser settings
is to install a cookie monitoring extension. I really like Add N' Edit
cookies myself. You can search for yahoo via each browser and make
sure no cookies are cross-populating.

 2. 
 The same base as in the example 1 above, but with the difference 
 that no cookies enabled anywhere and the webmail account is at 
 Fastmail with complete https connection for everything. Now the 
 question is, are there some unique properties by my computer?s 
 https handling that appear the same on the Fastmail head quarter 
 to make sure the two webmail accounts was runned from the one 
 same computer? 

I think that unless you have installed a client certificate, there
should be no identifying information in an SSL handshake. If you do
have a client certificate installed (you will know if you do), I think
the client only uses it if the server requests it.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Firefox through Tor

2006-04-27 Thread Mike Perry
Thus spake Michael Holstein ([EMAIL PROTECTED]):

 So the problem is that a motivated adversary can subpoena or simply
 ask DoubleClick to hand over their IP/cookie logs. If you are using
 Tor for /everything/, then what they get from DoubleClick for that
 email address is just a Tor IP, no harm no foul. However, if the user
 had set up a filter that only sends *yahoo.com through Tor, then
 DoubleClick will have their /real IP/ on file in association with
 whatever unique ID yahoo passed for that email address, even though
 yahoo's records show only the Tor IP.
 
 Swichproxy (as well as CTRL+SHIFT+DEL) in Firefox will clear all cookies.
 
 Anytime you switch between TOR/Direct you should close down to all but 
 one blank window, clear cookies/cache one way or another, and *then* 
 proceed.

Just clearing cookies every time there is a switch is not enough if
there is an automatic Tor filter in place.

The problem is that yahoo can custom-generate its links to DoubleClick
so they encode your email address (dunno if they do do this, but I'm
sure some sites and ad parters do). Therefore identifiying information
is sent independent of the cookie.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Firefox through Tor

2006-04-27 Thread Mike Perry
Thus spake Michael Holstein ([EMAIL PROTECTED]):

 The problem is that yahoo can custom-generate its links to DoubleClick
 so they encode your email address (dunno if they do do this, but I'm
 sure some sites and ad parters do). Therefore identifiying information
 is sent independent of the cookie.
 
 Which is why one should have separate accounts created for anonymous 
 use, and do everything (including setup of those accounts) from an 
 anonymized connection.
 
 Once you've touched your anonymous account from a session involving 
 anything that *isn't* anonymous, it's game over.

Agreed. This is also why an automatic filter is dangerous if it is not
done properly. Just one slip-up, accidental click, etc, and you're
toast.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Firefox through Tor

2006-04-28 Thread Mike Perry
Thus spake Eric H. Jung ([EMAIL PROTECTED]):

 Hello Michaels,
 
 I apologize for the delayed reply. Please don't interpret the delay as
 a lack of interest--it surely isn't.
 
 Quoting Mike Perry:
 Just clearing cookies every time there is a switch is not enough if
 there is an automatic Tor filter in place.
 
 The problem is that yahoo can custom-generate its links to DoubleClick
 so they encode your email address (dunno if they do do this, but I'm
 sure some sites and ad parters do). Therefore identifiying information
 is sent independent of the cookie.
 
 I hope you'll both agree there's nothing FoxyProxy can do about this.
 Unless you have a striking relevation which could solve the problem
 programmatically, I'm just going to add this to the FoxyProxy FAQ as a
 be careful warning in an attempt to educate.

Depending on the flexibility of XPCOM, it should be possible to solve
this problem programatically (but it is error-prone).

I probably should summarize everything from this thread again just so
you have it all in one place:

The way to solve the problem is to make sure that all embedded object
links are in fact loaded through the active proxy for the parent
tab/page. This includes frames, iframes, css, js, images, java, flash,
and other misc plugin objects. Probably some other stuff too.

So long as the 'evil' link-object is loaded through Tor, the problem
is solved. The assumption is that the information encoded in the
link isn't compromising by itself, but that the danger is that the
browser will autoload the link in the clear and thus your real IP will
be in that server's logs associating you with your Torrified email
account.

Also, because of accidental clicks, phishing attacks, and referrer
urls, user followed links should also be protected. Pretty much
anything the user follows from a protected, proxied page should
inherit that page's proxy settings (including links followed by
opening them in a new tab/window).

Lastly, as Michael pointed out, you have to clear all cookies
everytime a proxy switch is done (mega bonus points for a mechanism to
protect certain cookies from deletion a-la
http://cookieculler.mozdev.org/). If you do not do this, a cookie
accessed from an ad banner displayed while you are visiting a site in
the clear can be transmitted again when you access your email account
through Tor, thus ruining your pseudonymity against an adversary with
access to the ad server's data (assume everyone). The reverse is also
possible, so cookies have to be cleared in each direction of the
switch.

Even with all these countermeasures, the type of filter where you
specify only untrusted/Tor sites is error prone and should carry heavy
warnings for people who truly need anonymity, and needs to be tested
heavily by vigilant people with a wide variety of usage habits.

I do think that it should be possible to build such a filter though.
And it would be very very nice to have.

 I forgot to mention that if a URL doesn't match any patterns defined
 in FoxyProxy, FoxyProxy *does not* default to a direct
 connection. Instead, it defaults to the whatever proxy
 (if any) has been defined in Firefox's Connection Settings.   

  
 By defining Tor as the proxy in Firefox's Connection Settings, Tor
 is used as a catch-all for non-matches.
   
 I'll shortly be adding blacklist capability to FoxyProxy (it already
 has whitelist ability). That, in conjunction, with the above
 catch-all, should provide enough ingredients to come up with some
 safe recipe for some of the problems both of you describe, no?  

Yes, inverting the filter so that you list only sites that you trust
to connect to in the clear is a much safer option (and much easier to
implement!), but my guess is that it will be much less popular than
the ability to specify the sites you only want to visit through Tor
(ie gmail/yahoo/.onion). There in lies the dillemma.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Firefox through Tor

2006-04-29 Thread Mike Perry
Thus spake glymr ([EMAIL PROTECTED]):

  Yes, inverting the filter so that you list only sites that you
  trust to connect to in the clear is a much safer option (and much
  easier to implement!), but my guess is that it will be much less
  popular than the ability to specify the sites you only want to
  visit through Tor (ie gmail/yahoo/.onion). There in lies the
  dillemma.
 
 what about changing the proxy program so it always runs through
 privoxy, and having foxyproxy switch the upstream proxy to none or
 tor. this solves the problem of identifiable information from the
 beginning because it strips most of the identifiable stuff. you don't
 even see those evil spy-cookie producing ads with privoxy. if there is
 any simple way to make it possible to quickly switch privoxy to and
 from tor that would strengthen the anonymity a lot.

I regularly purge tons of cookies from doubleclick, informit,
googlesyndication, ad nauseum that have been collected even through
privoxy. Unfortunately privoxy really should only be depended upon as
a SOCKS to HTTP proxy converter. It is not a reliable privacy tool
anymore.

  I do think that it should be possible to build such a filter
  though. And it would be very very nice to have.

While I'm at it, let me strengthen this statement by saying that such
a filter for selective torrification is pretty much a necessity for
the simple reason that every Tor user *has* to do all the
countermeasures by hand anyway as-is if they ever turn Tor off (which
I imagine most of them do, esp during periods of network lag).

If an extension such as Foxyproxy can perform these tasks
automatically, and can be verified to be performing them correctly
each time, this is a vast improvement over everyone doing it by hand
(especially for Tor newbies).


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Some legal trouble with TOR in France

2006-05-14 Thread Mike Perry
Thus spake Eric H. Jung ([EMAIL PROTECTED]):

  Tony's point was that you could arrange not to have the 
 authentication
  tokens anymore. You better hope they believe you when you say you
  don't have it, though.
 
 Not having the authentication tokens counts as refusing to surrender
 them.
 
 Per US law, if a judge subpoenas you to hand them over and you refuse
 and/or remain silent, it means indefinite jail time (until you hand
 over the tokens) and/or fines.

Where is your source on this? As I understand it, there are a few
fundamental principles of the US legal system that should render this
statement completely false. One is Habeas Corpus.. You can't just
throw someone in jail indefinitely without a criminal charge and a
trial. http://en.wikipedia.org/wiki/Writ_of_habeas_corpus 

Though it seems BushCo are violating it with enemy combatant
charges, I do not think they have the political power (at least
anymore) to name an anonymity provider as an enemy combatant
(especially if they are a natural born US citizen). The same applies
to the 72 hour warrant deal, at least as far as I can tell from
http://www.fff.org/comment/com0601c.asp

Second, if it is a criminal charge, you are not under any obligation
to testify against yourself in a criminal court of law (5th
ammendment). There are various exceptions to this, main one being if
you are not the person charged of the crime (though I think you can
still claim that such testimony may incriminate you for unrelated
matters). I suppose it could also be argued that the passphrase does
not count as testimony, but it sure seems like it is.

Finally, some googling on subpoena compliance seems to indicate that
punishment for subpoena non-compliance is 'contempt of court' charge
and fines.

http://www.rcfp.org/cgi-local/privilege/item.cgi?i=questions

That page advises you not to answer any subpoenas without challenging
them first, among other things (ie one state's court cannot usually
subpoena someone from another state). Contempt of court charges for
non-compliance may be repeated, but any contempt law I can find on
the web has some form of maximum limit. The longest I've seen so far
is North Carolina, which is a max of 1yr in 90 day increments:
http://www.rosen.com/ppf/cat/statco/laws.asp


Also, dunno how accurate it is, but Wikipedia seems to claim that the
key disclosure provisions of the RIPA (Part III) are not yet in force
in the UK:

http://en.wikipedia.org/wiki/Regulation_of_Investigatory_Powers_Act_2000




We seriously have to watch our paranoia on this one. This is one of
those situations that if we believe we have no rights, it will be very
easy to knock us over, simply by playing off our fears and demanding
keys without any legitimate basis to do so.

If any Tor operator is arrested/detained in the US, they would do well
to refuse to surrender any passphrase until they are actually in court
and ordered to do so by a Judge (and then only after voicing protest,
to allow for clear appeal to a higher court). Cops will probably just
lie to you and try to convince you that you are required on the spot.
Ask for a lawyer immediately. 

This is not just to protect the Tor network either. With computer laws
as crazy as they are, and with the IPPA coming down the road, soon
simply having something like an Open Source DVD player or archiver on
your machine will be enough to land you in jail for a while, if it's
not already...

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Speak of the Devil

2006-05-19 Thread Mike Perry
British govt just started pushing for Part III of RIPA citing
terrorism and kiddie porn as major reasons to require people to
disclose encryption keys...

http://arstechnica.com/news.ars/post/20060518-6870.html

Seems we may have a strong ally on our side on this one. International
bankers might not want the local police requiring them to hand over
keys either, though they certainly have enough political influence to
stop investigations before they start I'm sure...

The UK Crypto thread that spawned this article is here:
http://www.chiark.greenend.org.uk/pipermail/ukcrypto/2006-May/080742.html

One can only hope that the Bill of Rights is enough to keep this
bullshit out of the US, but who knows.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Threats to anonymity set at and above the application layer; HTTP headers

2006-05-22 Thread Mike Perry
Thus spake Anothony Georgeo ([EMAIL PROTECTED]):

 IMO a needed and important feature of any
 'filtering/scrubbing' proxy appliction is some sort of
 'on-the-fly' decryptionscrubbingencryption scheme
 for ingress/egress HTTPS traffic.
 
 [needlessly complicated stuff removed]

K.I.S.S.

This has all sorts of issues with certificate verification and so on.
Not to mention that I think that any sort of user configurable
scrubber is not going to be used effectively by more than 1% of the
population (if even that). Hell, I don't understand privoxy's
configuration to the degree I'd feel safe relying on it by itself
and I'm a programmer.

The only way to do this is via extensions to the browser. That way you
do not interfere with CRL/OCSP for true cert verification (which sadly
seems very broken in Firefox currently) and it makes it easy to switch
components on/off if something doesn't work because one of your
filters isn't quite right. And you get SSL for free, because your
extensions see the web data AFTER the browser has performed (optional)
rigorous checks to make sure the cert has not been revoked or
otherwise compromised/spoofed.

I really think that we desperately need an intelligent proxy selection
mechanism such as Eric Jung's FoxyProxy (so long as it properly
isolates cookies for each proxy and does the proxy filtering on a
per-tab basis as discussed previously). Combine this with NoScript,
Adblock, and a user agent switcher, and I really don't see any reason
for privoxy anymore (except to remove maybe a stray HTTP header here
and there, but since those aren't logged, that may not be needed).

It sucks that we lose browser independence with this mechanism, but
thems the breaks. They should all should be compatible with xpi
anyways ;)


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Tor and Google Image search

2006-08-18 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

 Brian C wrote:
  Hi,
 
  Shatadal wrote:

  Hi,
 
  Whenever I use google image search via tor the search page serves up
  empty pages. Without tor google image search behaves as it normally
  does. Does anybody else face this problem?
 
  Thanks.
  
 
  Just tried http://images.google.com using tor on Debian. Did two
  searches which worked great.
 
  Brian

 i've the problem on w2k with the last vidalia bundle.
 I think it's a new privoxy default config, if I use tor as a socks proxy
 i can see the thumbs images.google
 Dan

Actually, I've started noticing this even though my privoxy config
hasn't changed in a long while. I think its something new that
images.google.com is doing that privoxy doesn't like.

If you add:


{ fragile } 
images.google.com


to your Privoxy action file, it works again. To declare everything as
fragile:


{ fragfile }
.


Perhaps the images.google.com declairation should be added to the
Privoxy that is shipped with vidalia/tor. It is likely to be pretty
frustrating to new users.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: following on from today's discussion

2006-08-18 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 It's certainly hard to pin down the exact risks here -- there are
 clearly huge risks on both sides. Somebody should write up a clear
 concise explanation, perhaps based on some statements from this thread. :)

I'd like to also add that it is possible for rogue Tor servers to go
beyond simply evesdropping on traffic. On one occasion I recieved a
corrupt .exe file via Tor.. It appeared to be just noise, but it woke
me up to the possibility that it is quite feasible that Tor exit nodes
can do all sorts of things to traffic: modifiying .exes, injecting
browser/media format exploits, etc etc. Since the Tor client scrubbs
logs, it can be difficult to tell which exit server was in fact
responsible, especially if they only target a small percentage of
connections.

It might be nice if Vidalia had an option to retain some connection
history in-memory only for a period of time on the order of 10s of
minutes for the purposes of monitoring for malicious/censored exit
nodes. 

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Tor and Google Image search

2006-08-18 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]):

 to your Privoxy action file, it works again. To declare everything as
 fragile:
 
 
 { fragfile }
 ..

Ouch. Two typos, one caused by me, one by mailinglist/MTA. 
This should be one period. And { fragile }, just like before.


 { fragile }
 . 

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: following on from today's discussion

2006-08-19 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 Correct. Woe is the day when a malicious Tor exit node also has a stolen
 or purchased copy of a trusted CA's key.

Eeep.

 The next thing we need to do is continue to work on interfaces and
 usability for end-user applications like Firefox. What does that
 lock mean really? If I do (or don't) see the lock, what should I
 trust?  How can we make use of the plethora of anti-phishing schemes
 currently under research?
 
 And lastly, there's the issue of advocacy for authentication,
 integrity, and confidentiality on the Internet in general.
 Translation: we need to get everybody using SSL for everything.

Time for a nice tinfoil-amplified SSL rant..

Is anyone in the world actively watching and tracking SSL certs beyond
simply verifying CA key signatures?  By looking at teh OCSP RFC
(http://rfc.sunsite.dk/rfc/rfc2560.html) it appears as if you are hard
pressed to tell if a cert is a dup or not:

'The good state indicates a positive response to the status inquiry.
At a minimum, this positive response indicates that the certificate is
not revoked, but does not necessarily mean that the certificate was
ever issued or that the time at which the response was produced is
within the certificate's validity interval.'

I mean good goddess. So even if you are watching for revokations, you
are only handling half of the SSL threat model... Some form of
ssh-like fingerprint tracking really needs to be coupled with
CRL-style checks so that you only accept a different cert than normal
for citibank.com if a revocation has been actually issued by them.
Especially when we have over 100 root certs spanning multiple
countries trusted by most browsers now.

To add insult to injury, the only public OCSP server I can find seems
completely broken. Everything comes back with 'unknown' with bad
timestamps. Yes, even their demo key.

http://www.openvalidation.org/en/info/openssl.html


This client seems to be somehow issuing correct queries to verisign's
OCSP according to ethereal (even though it is configured to use
openvalidation.org), but the UI reports the same 'unknown' status as
'openssl ocsp' did:

http://www.openvalidation.org/ValWorks.html

Madness. 

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: following on from today's discussion

2006-08-19 Thread Mike Perry
Thus spake Matej Kovacic ([EMAIL PROTECTED]):

 I was thinking about a solution to prevent traffic injection in 
 non-encrypted public websites. What about having TWO conection open and 
 do some kind of checking if the content is the same (maybe access the 
 content from two different locations and do some MD5 check). I know the 
 idea is hard to implement, since website can serve different content for 
 each location or every second, and this could also mean double load of 
 Tor network. But maybe someone will develop my idea into the usable 
 form... If not, feel free to drop it away.

So what about a stochastic solution instead:

1. Create some listing of exe files, commonly vulnerable doc formats, 
   and SSL sites that changes periodically, possibly scraped off google
2. Use some perl glue to go through the Tor node list and try each exit
   to make sure they aren't modifying this data.
   a. Certs can be checked byte by byte to make sure they don't differ
  across exit nodes.
   b. Images, doc files, ppt files, exes can be verified by multiple
  sources

A handful of hosts could run this thing and publish their results,
perhaps along with some other manually created list of undesirable
exits.

I think this is doable with perl, the Tor control port, wget, md5sum,
tsocks and 'openssl s_client', and is a lot more efficient than having
everyone verify everything always. The testing can be periodic, can
manually associate streams with connections so exits are known, etc.

If I'm not distracted by something shiny in the next couple days I'll
give it a shot. I mean, we've got to get these motherfuckin snakes off
this motherfuckin plane.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: following on from today's discussion

2006-08-21 Thread Mike Perry
Thus spake Matej Kovacic ([EMAIL PROTECTED]):

 Hi,
 
  A handful of hosts could run this thing and publish their results,
  perhaps along with some other manually created list of undesirable
  exits.
 
 Great, that could be an interesting research. However, if someone is
 doing this (injection/modifying) not all the time, it would be harder to
 detect him.

Yeah, thats why we need a few people running it continuously over a
long period of time. It serves as a deterrent that the network
is actually monitoring for this behavior, since nodes doing
this will eventually be noticed.

Though for botnet operators who presumably are able to sign up their
botnet hosts as tor nodes anonymously via their own relay network,
they may not care if the individual nodes are caught or not.. Scary
thought.

I've managed to keep myself sufficiently insulated from shiny things,
and have finished a script that uses Tor to md5sum a list of URLs and
also track the SSL certs of a list of https hosts. This script saves
corrupted files, so if we catch infected exes, it's possible we can
use these samples to go after botnet command and control. That ability
may also be a sufficient deterrent to keep teh snakes off teh Tor.

I also have a seperate script that parses the Tor directory and choses
nodes based on exit port policy and bandwidth. I'm working to make
this one operate with the tor control port to actually build and
attach circuits and inform the first script which exit node it is
choosing via a named pipe. This way we can experiment with different
strategies for choosing exit nodes to scan, short path lengths, and so
on easily.

I'd guestimate about 2 days before I have a prototype that works
fully with a fixed list of URLs. Possibly end of next weekend before I
have something that picks docs  exes randomly off google.


P.S. Does anyone know a clean way to do line-buffered select()able
socket IO via perl? From looking at IO::Socket it seems like the
timeout is only used for accept/connect... I may have to restort to
multithreaded perl.. *shudder*.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Snakes On A Tor

2006-08-24 Thread Mike Perry
 be nice to
build a list of nodes that do this to either fix them or simply
shitlist them.

3. Some SSL websites (for example citibank.com) actually have a whole
collection of SSL certificates for some unknown reason. Even saving
SSL certs specific to each IP of a round-robin DNS host still isn't
good enough.  Ugh.

4. When you exit via multiple control-C's, the last couple MD5s will
show up as bogus because system() function causes the SIGINT to be
delivered to wget and not perl. The fix for this listed in the perlfaq
did not work. :(

5. SOAT is likely to not work optimally if you are using the same Tor
client for other things. In some cases this can cause the exit to
change between the time that SOAT uses it and the time that it detects
an error and asks Metatroller what exit was used. It is probably best
to run a secondary Tor client with a different control port just for
SOAT and the Metatroller. You probably want this for anonymity reasons
also, especially since the default path length used by SOAT is only 2.

Note that Tor node operators can concievably run SOAT on their Tor
nodes with a path length of 1, since for them scanned nodes won't be
able to tell for sure if they are the originators, or just relaying
another circuit.


http://fscked.org/proj/minihax/SnakesOnATor/


I will be running this thing myself. If I notice anything interesting,
I'll post it to the list. Of course my own exit node is always clean
and never ever ever injects malicious code. So no one needs to scan it
at all. You can all trust me. Nobody else should scan. ;)


So far my Connection: close list is:

- baphomet
- err
- moulticastfrsrv
- ni
- pax

Anyone know what causes this? They don't do it all the time. Just
sometimes.

 
-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Snakes On A Tor

2006-08-24 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

 Permissions for the zip file prevent downloading.
 
 
 ???

Sorry I'm an idiot. Forgot to also set grsec permissions for teh file. 

Fixed.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Snakes On A Tor

2006-08-24 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]):

 --  BIG FAT WARNING  -
 
 Another possible giveaway is that I do not use uptime information in
 the node selection process. Nodes may be able to tell you are a
 Metatroller client if one of their neighbors for that circuit has
 extremely low uptime.

Oh, I also forgot to implement guard nodes. Woops. Maybe I will get to
that later.

It also bothers me slightly I don't verify directory signatures, but
unless there's a perl RSA implementation that's compatible with the
one used to sign the dir, there's not much chance in me doing that
ever. I do use key names instead of node names for path specification.
So the worst that could happen is that nodes disappear/change their
exit policies. Just don't download the directory through Tor for now
and it should be fine.


P.S. Nick/Roger, where is the TorCtl.py module mentioned in
contrib/TorControl.py? Not seeing it on the SVN web portal. It's a
pity I didn't see this contrib python before I went on my mad quest.
I've been looking for a reason to learn Python. 

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Skype Call Traced

2006-08-26 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

 On Sat, Aug 26, 2006 at 03:48:54PM -0400, [EMAIL PROTECTED] wrote 0.3K bytes 
 in 12 lines about:
 : I believe Skype is UDP-based, and Tor can only work with TCP  
 : connections. There are probably other issues as well.
 
   Skype works fine over Tor.  Depending upon your circuit, voice
   calls can be very laggy.

Hrmm.. According to:
http://www.secdev.org/conf/skype_BHEU06.handout.pdf

Skype does TCP if UDP attempts fail. However it appears to encode your
IP address in messages. Sort of defeats the purpose of Torifying it.
Probably the case with a lot of voice clients, unless you can find a
way to get them to not discover your IP...

I also find it unpossible that actual watermarking was used against
this fellow as opposed to simple IP tracking.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Skype Call Traced

2006-08-27 Thread Mike Perry
Thus spake Andrew Del Vecchio ([EMAIL PROTECTED]):

 Damn. Unpossible? This sounds like Double-Plus ungood newspeak man! :P

Yes, I actually am an agent of an unknown branch of an unmentionable
TLA dedicated to the slow and subtle corruption of teh english
language to suit our nefarious ends for world domination.  Snakes On A
Tor was just my cover to distract you long enough to become infected
by our neurolinguistic virus, and the Metatroller has hidden code in
its regular expressions that report your wearabouts directly to our
array of orbiting mind control lasers. ;)

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Holy shit I caught 1

2006-08-27 Thread Mike Perry
Thus spake Anothony Georgeo ([EMAIL PROTECTED]):

 Hi Mike,
 
 Nice catch :-)
 
 I would like to use your Snakes on a Tor but I'm not sure how to use
 it.  I downloaded it and I have all the required apps (md5summer,
 wget and openssl) on my Windows XP Home.
 
 Could you give me a quick how-to?
 
 BTW, I have my HTTP_PROXY and HTTPS_PROXY environmental variables
 set to 127.0.0.1:8118.
 
 Thanks and sorry for the asking,

I'm guessing actually scanning is going to be WAY over your head. It's
really meant for people who run Tor servers on Linux boxen and know
what they're doing, because right now you have to manually eyeball the
SSL certs and MD5 error files to double-check everything is Ok. I'll
try to improve that in a few weeks.

But, the Metatroller is a neat toy if you just want to investigate
censorship conditions in China/Germany for a day or whatever.

For that you DO NOT actually need md5summer, wget, and openssl. You
only need those if you want to run soat.pl.

For the Metatroller to work, you need to tell Vidalia to start
Tor with an alternate torrc. Open a new 'torrc' textfile on your
Desktop somewhere and put the lines:

ControlPort 9051
__LeaveStreamsUnattached 1

in it. Tell Vidalia in its config window to use this file as an
alternate torrc location. Restart Tor.

Once you have everything in your path, ActivePerl installed and
Vidalia set up to use this Torrc, either Start-Run.. cmd.exe or
launch cygwin, and cd to the directory you unzipped SOAT into.

You should be able to type 

'metatroller.pl cached-directory country-codes'

and it shoud print a WARN and a NOTICE that it is ready.

Periodically you should hit up http://moria.mit.edu:9031/tor/ and save
that output to 'cached-directory' in the SOAT dir. Ditto for
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl?textonly=1. Save that
to 'country-codes' in the same dir.

Once it's all set up, if you want to play with the Metatroller's
options, you can open another cmd.exe and type 'telnet 127.0.0.1 9052'
and you should be able to give it the commands it lists under 'HELP'.

You can actually watch the metatroller build circuits in the Vidalia
network status window. 

Now mind the warnings I gave about the Metatroller and anonymity,
ESPECIALLY if you fire up soat.pl also. 



If you run soat.pl, you should be running it on a seperate machine
than you are using normally (or inside a vmware image or simply
another instance of Tor) because of shortened pathlengths, strange
exit selection strategy, etc etc etc.

To actually scan, you need md5summer to be renamed to md5sum.exe, and
you need all those tools to be in your path. Perhaps c:\windows if you
don't mind the clutter. Hopefully the output from md5summer is the
same as UNIX md5sum..

I'm guessing these complications probably will make it beyond your
ability to actually scan at this time.. Between these ramblings and
the README file, hopefully you can at least tinker with the
Metatroller for a bit so you can bask in the glory of some orbiting
mind control lasers. Winter is coming, maybe you can save on the
heating bill.



-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Holy shit I caught 1

2006-08-27 Thread Mike Perry
Thus spake Jay Goodman Tamboli ([EMAIL PROTECTED]):

 On 2006.08.27, at 22:44, Mike Perry wrote:
 
 If you run soat.pl, you should be running it on a seperate machine
 than you are using normally (or inside a vmware image or simply
 another instance of Tor) because of shortened pathlengths, strange
 exit selection strategy, etc etc etc.
 
 To clarify, is this warning because we shouldn't try to use the  
 circuits soat.pl builds, or is there some other reason? In other  
 words, would it be ok to run soat.pl as long as we're not using Tor  
 at that time on that machine?

Hrmm. Depends... Using the same Tor client as soat.pl uses is really
bad of course, because for those circuits, pathlen is only 2 and exits
are chosen in a round-robin fashion. Also it will likely confuse
soat.pl as well.

However, in the case where your internet IP is being shared by a
Metatroller/SOAT client, it essentially boils down to how dangerous it
is for entry nodes, over time, to infer that there is an abnormal Tor
client at your IP. 

I'm not sure exactly how damaging this could be. It would seem to me
that so long as your regular, important connections go through a Tor
client NOT running the Metatroller, middle and exit nodes should not
be able to tell you are running Metatroller, and should not be able to
partition/fingerprint you (which I think is the most dangerous
aspect). Maybe Roger/Nick can shed more light on this, though.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Holy shit I caught 1

2006-08-27 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 Actually, it would be smarter to add a controller interface to let
 the controller inform Tor of new opinions it should have. For example,
 this server is not running. Then we could do all the smarts in the
 controller, where they should be.
 
 The actual interface will be a bit delicate though, since we want Tor
 to do some of the thinking and the controller to do other of the thinking.
 
 As a first step though, we could make the controller changes sticky,
 meaning that Tor doesn't do any thinking for servers that the controller
 has given it an opinion on.

KO.

An interface to suck a signature-verified directory out of Tor via the
control-port or some other means would also be nice.

 Check out
 https://tor-svn.freehaven.net/svn/torctl/trunk/python/

Ok, I will consider rewriting it for this python interface. Have to
learn python first, which has been on my TODO list for some time, so
hopefully it will happen. I would guess the directory notification
interface won't appear for a while in Tor either, so I probably have
time. When 0.1.2 stabilizes?

In the meantime I will keep my rickety perl running and will keep in
contact with the list when I notice things.

 Also check out Geoff's python Tor controller (which uses the above
 scripts) at http://afs.eecs.harvard.edu/~goodell/blossom/

I actually had a look at blossom, but didn't see that it was using a 
standard torctl interface. Probably just me not groking python tho.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Holy shit I caught 1

2006-08-27 Thread Mike Perry
Thus spake Arrakistor ([EMAIL PROTECTED]):

 Mike,
 
 My torpark mirrors are not providing pre-localized downloads. They all
 come in english flavor by default, but include the lang packs for
 chinese simp and german.
 
 Tell me more about the corrupt downloads, are they recent? From
 karotte or sectoor?

Weirdest shit in the world. Privoxy is dumping temporary failure
messages mid-stream into the binaries, yet keeping the sizes exactly
the same. Perhaps this was the source of the original mysterious
binary corruption that sent me on this quest oh so long ago.
Unfortunately then I was in a hurry and just deleted the file without
thinking :)

So even so, it's unsettling.. You download some app, iso, video, or
whatever via Privoxy and it kindly tells you there's a temporary
failure mid-binary stream. How nice of it.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Holy shit I caught 1

2006-08-28 Thread Mike Perry
Thus spake Fabian Keil ([EMAIL PROTECTED]):

  So even so, it's unsettling.. You download some app, iso, video, or
  whatever via Privoxy and it kindly tells you there's a temporary
  failure mid-binary stream. How nice of it.
 
 How nice of you to back up your claims with enough information
 to reproduce the problem. Which error message did you get and
 did you verify the problem with another client?

I assumed that anyone who actually cared to reproduce the problem
would just run the script, because that's all I did.

Running the script out of the box with the default settings
will reproduce the problem within a few hours of scanning. You will
get tons of corrupted Torpark exes in your docs dir. Seems to really
like Torpark more than anything else. Probably cause its the biggest.

Here is the error:

  title503 - Connect failed ([EMAIL PROTECTED])/title
  This is a href=http://www.privoxy.org/;Privoxy/a 3.0.3
on localhost.localdomain (127.0.0.1), port 8118!-- @if-can-toggle-start --,

It's embedded in the exe. strings won't find it, but grep will.

 Especially the keeping the size exactly the same part sounds
 more like a problem in the fetching client. Are you sure that
 your application doesn't retry failed fetch attempts without
 caring about status codes?

Client is wget. Apparently it does retry after failure. Manpage says
nothing about status codes. Maybe it doesn't know what to do with 503.
 
 Is it impossible that the download was started but the connection
 broke down, your application tried again and got a 404 no such
 domain, saved the error message in the binary stream and tried
 again with a adjusted byte range?  

Yeah, I'm thinking the connection most likely broke down, wget retried
and tried to continue the stream, but Privoxy came back with its 503
status error page instead, probably not something wget was looking
for. Wget probably tried once more after that connection closed, and
picked up the stream again.

Unfortunately my copy of curl is ignoring HTTP proxy environment
variables and --proxy command line settings, so I can't check to see
if it has the same property.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Snakes On A Tor Scanner - 0.0.3

2006-10-13 Thread Mike Perry
Over the past month or so I've been testing and improving my Tor
network scanner, and it seems to be shaping up pretty nicely.

http://fscked.org/proj/minihax/SnakesOnATor/SnakesOnATor-0.0.3.zip

As a quick refresher, the scanner consists of two parts:

The Metatroller:
   A Tor Controller that allows you to customize properties of your
   Tor routes. You can control path length, exit country, fast node
   cutoff, and lots of other neat things.

Snakes On A Tor:
   A Scanner that uses the Metatroller to scan the network for nodes
   that are unstable and/or modifying exit traffic. Docs are now
   obtained randomly from google queries.

Metatroller will work in ActivePerl on Windows without any other
dependencies, however SOAT will require curl, md5sum, and openssl. 

I think SOAT and Metatroller are in good enough shape that they
should make for good QA tools for Tor to help reduce circuit failure,
and also useful tools for people who would like to monitor the Tor
network. 

I'm also suspicious of the 7/8 node cutoff for fast nodes.  I think
that perhaps it should be raised to 65% or so, but I have no hard data
as of yet to illustrate this cutoff point. Since adoption is critical
to anonymity, and regular people won't use Tor if they think it is
slow, I believe it is far more imporant that we have known reliable,
fast nodes than lots of slow ones that are prone to dropping circuits.
Hopefully we can discover these cutoffs using this tool.


Here's the CHANGELOG for 0.0.3:

 Metatroller:
  - Now gets its node list directly from Tor using the control port
  - Implemented guard nodes
  - Added circuit/stream failure statistics
  - Improved reliability/recovery from circuit and stream failures
  - All commands can now take no arguments to print current value

 Soat:
  - obtains its doc list via google filetype queries
  - verifies this list contains no dynamic content
  - Saves long-term aggregate failure stats from metatroller

I've given Roger and Nick some patches to expose circuit failure
reason codes to the controller. I think part of these made it into
0.1.2.2-alpha, and hopefully the rest will be in 0.1.2.3. Metatroller
does not need these reason codes to record failures, but it is more
accurate if they are present.



Here's the current list of Metatroller commands:

214  COUNTRY CC|ALL
214   - Pick a two letter country code to select exits from, or ALL
214  COUNTRIES
214   - List countries that have tor exits
214  PERCENTFAST #
214   - What % of the network is considered 'fast' for node selection
214  BWCUTOFF #
214   - Minimum observed bandwidth (KB) that a node must have to be selected
214  UNIFORM 1|0
214   - Should selection among fast nodes be uniform (or bandwidth-biased)?
214  ORDEREXITS 1|0
214   - Should exits be chosen one after another instead of randomly?
214  FASTEXITS 1|0
214   - Should exits be chosen from 'fast' nodes or all nodes?
214  GUARDNODES 1|0
214   - Use guard nodes?
214  PATHLEN #
214   - What should the path length of circuits be?
214  NEWEXIT
214   - Throw away all circuits and choose a new exit
214  SETEXIT NAME
214   - Hardcode an exit for all future circuits
214  GETLASTEXIT
214   - Lists the last used exit
214  FAILRATES
214   - Print out the failure rates of nodes


While it is still not advisable for you to use SOAT on a machine you
wish to preserve your anonymity with, Metatroller is perhaps not as
dangerous as I thought.

I've looked into the Tor source, and it turns out that in some cases
Tor does make circuits out of low-uptime nodes. With that, and the
addition of Guard Nodes to Metatroller, it is perhaps not nearly as
dangerous as I had originally thought. The main dangers revolve around
PATHLEN and PERCENTFAST, and are explained in the README.

I believe normal usage should be comparable to Tor in safety at this
point, though there are a couple of attractive fixes in 0.1.2.x I
would like to adopt.

Plans for the future include more finer-grained failure statistics,
node max/min/avg bandwidth stats, and possible integration with the
directory servers to help avoid unstable/malicious nodes (or at the
very least, an internally saved blacklist for high failure-rate
nodes).

Also, the metatroller currently does not subscribe to router info or
(non-existent) network status events, so it should be restarted
periodically. When network-status events are available in 0.1.2.x I'll
support them.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Snakes On A Tor Scanner - 0.0.3

2006-10-14 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]):

 Over the past month or so I've been testing and improving my Tor
 network scanner, and it seems to be shaping up pretty nicely.
 
 http://fscked.org/proj/minihax/SnakesOnATor/SnakesOnATor-0.0.3.zip

Found another DNS poisoner/injector/evil upstream ISP. Exit node
Andrewgao poisoned the scanners access of
http://linuxmafia.com/faq/Debian/installers.html

to give me instead:

http://fscked.org/proj/minihax/SnakesOnATor/linux-mafia.Andrewgao.html

Seems to be a javascript popup to set a cookie and then close the
window. Seems to be slightly broken (the window is never closed for
me), but the scary thing is if it worked, the user's experience would
be that they had accessed the page un-hindered.



Also, as an FYI, I'm exporting my scanner's failure statistics to
http://fscked.org/proj/minihax/SnakesOnATor/fail_rates

Right now it's probably difficult to do anything with that. I will
try to enhance it to be broken down by failure type RSN, then it 
should be more clear which nodes are failing circuits/streams and 
why.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Snakes On A Tor Scanner - 0.0.3

2006-10-14 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

  Lastly, the metatroller currently does not subscribe to router info or
  (non-existent) network status events, so it should be restarted
  periodically. When network-status events are available in 0.1.2.x I'll
  support them.
 
 If you could help us get moving on that, that would be great. Some sort
 of spec patch and preliminary code patch would be fabulous.

Ok, I'll try to get to this. Might be a while though. In the short
term I'm going to hack on the reason stats so we can figure out why
these circuits are failing, but perl's data structure limitations are
proving even that to be a bit too much...

  3. SOAT is not likely to work optimally if you are using the same Tor
  client for other things. In some cases this can cause the exit to change
  between the time that SOAT uses it and the time that it detects an
  error and asks Metatroller what exit was used.
 
 When you extendcircuit, you can specify purpose=controller, and
 then Tor won't ever touch those circuits on its own.

Yes, but in this case Tor doesn't close the circuits when they are
old/unused, and I would have to maintain that info myself. I'm opting
for letting Tor maintain the destruction of them for me.

However, that's not the problem with concurrent SOAT+normal usage. The
problem is mainly that if you try to connect to some port where the
current SOAT exit can't connect to, a new circuit will be built and a
new exit will be chosen. Right now there is no notion of circuits in
SOAT, so it just asks for the last exit used. Hence, if you caused
metatroller to build a new circuit while SOAT was using an old one,
and there is an MD5 error for some URL, the wrong exit will be blamed
for it.

  I'm also suspicious of the 7/8 node cutoff for fast nodes.  I think
  that perhaps it should be raised to 65% or so, but I have no hard data
  as of yet to illustrate this cutoff point. Since adoption is critical
  to anonymity, and regular people won't use Tor if they think it is
  slow, I believe it is far more imporant that we have known reliable,
  fast nodes than lots of slow ones that are prone to dropping circuits.
  Hopefully we can discover these cutoffs using this tool.
 
 That's an interesting question -- do the slow ones drop circuits more
 often? I'd be curious to hear some data on that.
 
 More generally, while using a fraction of the nodes (7/8 or 65%) lets
 us adapt better to whatever network we have available, it may still not
 be the right approach if our goal is to have high chances of getting a
 non-sucky circuit. On the other hand, people who sign up to be relays
 but never get used may be sad. On the third hand, so what? Hm.

Yeah, we'll need to wait for me to do stream bandwidth statistics to
best figure this out. This may be a while out, but I thought I'd throw
it out there for consideration.

 While we're at it, would it be interesting to look into adding a country
 code to the network-status list, saying our best guess based on whois
 or whatever of where the node is? As more and more tools hardcode fetch
 it from serifos, unauthenticated and with a single point of failure,
 it might be nice to offer a better option.

Yeah. If that shows up, I will make use of it. I'm a bit
over-committed to do this myself though.


Here's my task list:

1. Failure stats based on reason codes
2. Network/routerinfo status events
3. Node stats for stream bandwidth
4. Statstics on reasonable cutoff %-age
5. Not get fired from my day job 

A Rewrite in Python task may be inserted in there anywhere from 0-5,
depending on how many brick walls perl presents. #1 alone is getting
extremely annoying because of limitations on thread-shared structures.

Due to Task 5, other tasks may experience arbitrary delays ;)

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Snakes On A Tor Scanner - 0.0.4

2006-10-15 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 This looks great. Here are a few responses from reading your README:
 
 The Metatroller requires two Tor config options in your torrc:
 
 ControlPort 9051
 __LeaveStreamsUnattached 1
 
 You could have your Metatroller connect to Tor and set
 __LeaveStreamsUnattached=1 itself. Then the user doesn't have to mess
 with his torrc at all (assuming he already has the controlport set). In
 fact, when the metatroller exits you could unset it, so Tor becomes a
 normal client again.

Ok, I've got a new release up with this fix and some others. No more
torrc editing needed.

http://fscked.org/proj/minihax/SnakesOnATor/SnakesOnATor-0.0.4.zip

0.0.4:
 Metatroller:
  - Failure stats based on reason codes
  - Sets __LeaveStreamsUnattached via controller. No config needed
anymore.
 
 Soat:
  - Fixed counting bug (ratios were OK, but errors+connects were
counted multiple times)
  - Saves REASON statistics from Metatroller 
  - Changed scanning node selection to be fully uniform for both exits
and other hops

Reason-based statistics are now exported to:
http://fscked.org/proj/minihax/SnakesOnATor/fail_reasons

The first number is the failcount for that type, the second one
is the total failcount, and the third is the total circuits
made via this node.

For reason statistics, it reasontotal/totalfailed.


For http://fscked.org/proj/minihax/SnakesOnATor/fail_rates

The first number is the total failcount, and the second is
the number of circuits made via this node.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: hijacked SSH sessions

2006-10-16 Thread Mike Perry
Thus spake Taka Khumbartha ([EMAIL PROTECTED]):

 today i have had several attempted man in the middle attacks on my
 SSH sessions.  i am not sure which exit node(s) i was using, but the
 MD5 hash of the fingerprint of the spoofed host key is:
 
 4d:64:6f:bc:bf:4a:fa:bd:ce:00:b0:8e:c9:40:60:57
 
 and it does not matter which host i connect to, the MD5 hash
 presented it always the same.

Interesting. Could be another upstream chinese ISP, or DNS poisoning
again. Were you using SOCKS4A/SOCKS5 or did you connect direct to an
IP?

I just wrote a scanner for this for SOAT and have been scanning for an
hour or so now. Haven't seen it yet, but I'm using tsocks so if they
did it with DNS, I'm not gonna see it yet.. Or perhaps they saw your
mail and shut 'er down. I'll keep scanning though.

Anyone know a clever way to get a random sampling of ssh hosts
without brute-force IP scanning? I don't need logins, just IPs.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: hijacked SSH sessions

2006-10-17 Thread Mike Perry
Thus spake Taka Khumbartha ([EMAIL PROTECTED]):

 -BEGIN PGP SIGNED MESSAGE- Hash: SHA1
 
 Mike Perry @ 2006/10/16 13:25:
  Thus spake Taka Khumbartha ([EMAIL PROTECTED]):
  
  today i have had several attempted man in the middle attacks on
  my SSH sessions.  i am not sure which exit node(s) i was using,
  but the MD5 hash of the fingerprint of the spoofed host key is:
 
  4d:64:6f:bc:bf:4a:fa:bd:ce:00:b0:8e:c9:40:60:57
 
  and it does not matter which host i connect to, the MD5 hash
  presented it always the same.
  
  Interesting. Could be another upstream chinese ISP, or DNS
  poisoning again. Were you using SOCKS4A/SOCKS5 or did you connect
  direct to an IP?
  
 
 i was using socks4 protocol within my ssh application, but directly
 passed an IP address to Tor.

Hrm. Guess it wasn't random DNS redirect then.

Well either they must have been scared off, or I'm blind. Cause
I'm not seeing this now. Been through almost every exit node in the
directory a few times now..

Probably actually malicious though, since I don't think China would be
intimidated by some posts on the Tor list ;)

Please post if you notice it again.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Practical onion hacking: finding the real address of Tor clients

2006-10-18 Thread Mike Perry
Thus spake Jacob Appelbaum ([EMAIL PROTECTED]):

 Hi *,
 
 Fortconsult wrote this and it may be of some interest to people on this
 list:
 http://www.packetstormsecurity.org/0610-advisories/Practical_Onion_Hacking.pdf

Wow. I think the most telling statement is that most of the people
they got were from China. Probably unfortunate side effect of most of
the Tor docs being in English..

Incidently, I tried out TorPark the other day, and I must say it is
pretty magnificent. Having a well-configured browser like that for Tor
usage solves nearly every one of these problems. 

Would be nice if NoScript defaulted to All-Off instead of All-On, and
they used AdBlock Plus with some feeds instead of just AdBlock, but
otherwise excellent for casual only sometimes Tor users who are
likely to be tripped up by this sort of stuff.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Practical onion hacking: finding the real address of Tor clients

2006-10-18 Thread Mike Perry
Thus spake Chris ([EMAIL PROTECTED]):

 Can the tor directory provider run a script every now and again that
 checks the content of a site/image retrieved from outside of tor and
 though each exit node and then look into any discrepancies.  I know
 anyone can try this and make a better test but this will eventualy
 have to be done and acted upon by a trusted party.

We're working on it. I'm running a multi-purpose scanner right now
(see Snakes On A Tor threads in the archives), but results still have
to be sifted through manually, no automatic directory integration yet.
It's not easy to do this automated and be right all the time,
especially in the face of changing content and dropped
connections/truncation. Probably will end up having the script email a
human/humans with results that they can verify.



-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: still slow browsing

2006-11-12 Thread Mike Perry
Thus spake gabrix ([EMAIL PROTECTED]):

 I have already written about this but now it's red light ... i badly
 want to keep my tor node otherways  i would have already removed the tor
 server but i cannot get on like this.I recently also had from my isp a
 bandwidth upgrade to  2MB(they say ... it's TIM!)and i still suffer of
 slow browsing .I also just using the or port and commented the dir port
 and added this in my /etc/tor/torrc
 
  BandwidthRate 20KB
  BandwidthBurst 20KB
 
 The minimum possible , isn't?
 I'm actually trying this guide
 
  http://wiki.noreply.org/noreply/TheOnionRouter/CronBandwidthLimit
 
 And i'm going to wait for a minimal iptables script that is going to
 deal with this problem .Yes you got it! i'm waiting this script from you
 , it's 2 mounthes i'm trying out but i don't know how to do it properly
 and you saw my previous posts i tryied it.Sorry guys i hope you
 collaborate otherways i will be forced to close the node ... i don't
 want to but help help help !

Well, if you're willing to sink some time into it, you can try to
follow the ADSL bandwidth shaper howto:

http://www.faqs.org/docs/Linux-HOWTO/ADSL-Bandwidth-Management-HOWTO.html
(Gentoo version: http://gentoo-wiki.com/HOWTO_Packet_Shaping)

Unfortunately it's probbaly hard to do if you're running an exit node
and there are lots of exit ports, unless you have spare IPs and can
use one for the Tor node and one for normal traffic. This is what I
do. My script based on this howto is attached. It works EXTREMELY well
(Tor load has NO effect on normal traffic. I don't rely on
BandwidthRate/BandwidthBurst at all). 

The key property is that you cap your total bandwith through the box
(via the shaper) to be slightly lower than your link bandwidth so that
your box controls the queue size and thus ordering, not your uplink
provider.

I haven't posted my script anywhere cause I figured that having a
spare IP for your Tor node is probably pretty rare. However if you are
not an exit and thus only have one port for Tor traffic, it should be
readily adaptable based on port instead of IP.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


LIMIT-tor.sh
Description: Bourne shell script


Re: still slow browsing

2006-11-13 Thread Mike Perry
Thus spake gabrix ([EMAIL PROTECTED]):

 
 
  Cheers for the script i'm going to give it a try and than tell ya !
 

I assume this was supposed to be in reply to my message. If you
produce a port-based one please repost and/or post on the wiki. That
may be useful to more people than my IP based one.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: ff 1.5.0.7 2.0 (remote) dns leaks when using tor

2006-11-16 Thread Mike Perry
Thus spake lester psigal ([EMAIL PROTECTED]):

 hi there,
 i've got a setup for anonymous browsing using firefoxf 1.5.0.7 and
 lately ff 2 with privoxy and tor (vidalia bundle 0.0.7) on windows xp sp2.
 the ff configuration option 'network.proxy.socks_remote_dns ' is set to
 true, the setting 'network.proxy.failover_timeout' is set to 5 and
 the 'network.proxy.socks_version' is set to 5 but the ethereal logs show
 that firefox is still leaking dns requests, i.e. ff still does the
 lookups itself and does not delegate them to the proxy (which is not
 quite true: the dns requests are always delegated to the proxy and
 _sometimes_ to the local dns client too).
 to make it worse the leaks are occuring randomly (sometimes the remote
 dns works and sometimes not), so i'm guessing that it is a timeout issue.
 does ff fallback to local dns lookup when a remote lookup request is not
 answered in a timely manner or is it a failure with the os dns client or
 even a ff bug?
 what else could be done to prevent ff from dns leaking?
 
 any hints or suggestions would be very nice as it does not make any
 sense to me to operate a quite complex and complicated system for
 anonymous browsing when tracking of dns requests is all
 a profiling facility has to do...
 
 thanks
 
 p.s. i've already posted the same message to the the mozillazine ff
 general forum without getting an answer

Well, just so you don't feel that everyone is ignoring you, I'll voice
most of our reactions: *shock*, *eyes popping*. Woops, time to turn
privoxy back on (use HTTP proxy port 8118 and don't list anything in
the SOCKS line).

Were you able to determine exactly what network.proxy.failover_timeout
governed? Was it just DNS? Did it have any effect at all on the
behavior? Perhaps the units are miliseconds. Sometimes Tor takes as
long as a minute to build a new circuit...

It would be logical if either 0 or -1 meant infinite.. Did you try
those?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: ff 1.5.0.7 2.0 (remote) dns leaks when using tor

2006-11-19 Thread Mike Perry
Thus spake lester psigal ([EMAIL PROTECTED]):

 then, i've tried different settings:
 setting ff's 'network.proxy.failover_timeout' to '-1' or '0'
 - no change
 (if a timeout occurs privoxy shows up with one of its error pages)
 leaving socks proxy line blank in ff's connection setting
 - no change
 setting all proxy protocols to privoxy port
 - no change
 disabling dns client service on win xp
 - no change
 disabling 'forward socks4a requests' directive in privoxy configuration
 - no change
 
 also, i've recognized that the local dns queries are occuring when there
 is an direct user interaction with the browser like entering an url,
 selecting a bookmark, clicking a link etc. while requests from websites
 (when loading a page) seem to be resolved remotely (they do not show up
 in the ethereal logs but are requested in privoxy and log'ged by tor).
 unfortunately, i don't know if ff resolves dns by an own internal
 resolver thread or by delegating to the system which makes the whole
 thing worse.
 
 so, usually i'm not easily frustated but over here i'm really missing a
 thing and i would not wonder if its a little configuration tweak i
 forgot about...

Yeah, like others have said it is most likely some extension you are
running. Maybe google toolbar, yahoo toolbar, something of this nature
that interacts with each page? I tried watching Torbutton and
socks-only and got no DNS leaks w/ ff 1.5, no matter what my timeout
settings were. I did get a few Try Again timeout messages from
firefox, but no leaks.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: False certificates

2006-11-28 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

 I noticed that, by connecting to some https domains from some exitnodes, I 
 receive a warning of a false certificate. Closing the circuit and using 
 another one (so another exit node) makes the things back to normal.
 
 I could identify only one exitnode, have still doubts for 2 others
 
 
 bach from Germany : 212.42.236.140

Confirmed (I've found an alternate machine to do dev on, so I should
be able to continuously scan now). Bach is self-signing certs still,
and not just for e-gold.  It is also likely the culprit as opposed to
an upstream ISP, since the CN name is bach.  Based on this, I'm
guessing they're not intending to stop anytime soon.

Is there any way to manually de-list this as an exit in the tor
directory servers while we develop a way to integrate this automated
scanning solution?

Having everyone add this node into their ExcludeNodes is not
practical. There should be some way for the Tor maintainers to
override supplied exit policies for misbehaving nodes. Or is the plan
going forward just to tell everyone to upgrade to alpha and have it
listen to the BadExit flag? Can this be set manually right now?


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs
CONNECTED(0003)
---
Certificate chain
 0 s:/O=TOR/CN=bach
   i:/O=TOR/CN=bach identity
 1 s:/O=TOR/CN=bach identity
   i:/O=TOR/CN=bach identity
---
Server certificate
-BEGIN CERTIFICATE-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-END CERTIFICATE-
subject=/O=TOR/CN=bach
issuer=/O=TOR/CN=bach identity
---
No client certificate CA names sent
---
SSL handshake has read 1446 bytes and written 344 bytes
---
New, TLSv1/SSLv3, Cipher is EDH-RSA-DES-CBC3-SHA
Server public key is 1024 bit
SSL-Session:
Protocol  : TLSv1
Cipher: EDH-RSA-DES-CBC3-SHA
Session-ID: 
Session-ID-ctx: 
Master-Key: 
52F1E4EE58BB5185C7E0F7A47F500BCB7EFC628E9EB75B18828F31970F9B5060D71DF73B2E4AC6624C793FBF5C5AA20E
Key-Arg   : None
Krb5 Principal: None
Start Time: 1164754863
Timeout   : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---


Re: False certificates

2006-11-28 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 On Tue, Nov 28, 2006 at 06:52:29PM -0600, Mike Perry wrote:
   bach from Germany : 212.42.236.140
  
  Confirmed (I've found an alternate machine to do dev on, so I should
  be able to continuously scan now). Bach is self-signing certs still,
  and not just for e-gold.  It is also likely the culprit as opposed to
  an upstream ISP, since the CN name is bach.  Based on this, I'm
  guessing they're not intending to stop anytime soon.
 
 Yuck. Actually, Peter Palfrader just pointed out that it's probably just
 an iptables screw-up. bach is that Tor server's nickname. It looks
 like he's redirecting all outgoing port 443 requests back into his ORPort.
 
 So, yet another instance of a non-malicious attacker. :)

Heheh, I guess this goes in the never blame conspiracy when you can
blame incompetence column. Damn, it's so much more exciting to find
malicious nodes ;)

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: How can I trust all my Tor nodes in path

2006-12-01 Thread Mike Perry
Thus spake Robert Hogan ([EMAIL PROTECTED]):

 On Friday 01 December 2006 20:55, Tim Warren wrote:
  On 12/1/06, Robert Hogan [EMAIL PROTECTED] wrote:
   The real danger with Tor is using sensitive information over http rather
   than
   https and mixing anonymous and non-anonymous traffic over the same
   circuit.
   Those two are the most common and most easy mistakes to make.
 
  Maybe you could answer a question for me. Should I NOT login in to a site,
  such as a bank, when using Tor? Or do I need to make sure it is https:?
 
  Appreciate any clarification.
 
  Thanks,
 
 If you use https (and your browser hasn't complained about the ssl 
 certificate) you're fine.  The exit node can see everything (if they want) 
 over http. 
 
 Everything after the exit node is just as good or bad as if you weren't using 
 tor. Tor just adds an extra guy to the chain of *reputable* carriers who 
 *could* monitor your traffic - and it is best practice to assume that at 
 least the tor exit node is doing exactly that. see http://tor.unixgu.ru

It is also wise not to log in to any form over plain http, even if the
form posts to an https url. This is true not just over Tor, but pretty
much anywhere an attacker can manage to position themselves to rewrite
your traffic, which is pretty much anywhere.

Many, many, many banking sites completely disregard this attack vector
in favor of ease of use. Even if the target action of a form is https,
if you have retrieved the form via plain http, that post can be
rewritten to go anywhere. An http redirect later and you're logged in
to your banking site, no harm no foul. Except to your account balance,
of course :)

If your bank is braindamaged in this way, usually giving it a bullshit
login until you can verify you are actually connected via https to it
is probably the easiest way to deal with this.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: How can I trust all my Tor nodes in path

2006-12-01 Thread Mike Perry
Thus spake Martin Toron ([EMAIL PROTECTED]):

 Hi.
 
 I have read in the Tor documentation that the number of Tor routers
 in a path is hard-coded at 3.  And I understand that the path
 changes every 10 minutes (except for active connections).
 
 As a client not running a server, how am I sure that at least one of
 the nodes in the path can be trusted?
 
 A little math:  assume there are 200 Tor routers, some of which have
 been compromised and owned by the same attacker.  If the number
 compromised is small, I can be somewhat confident that at least one
 router is trusted.  However, suppose the attacker massed a global
 attack on the Tor network:  all at once the attacker introduces
 10,000 new routers into the network, all of which he has control of.
 Now, when I choose 3 routers for my path, I only have a few that may
 be trusted, which are in the original 200.
 
 Has this problem been addressed elsewhere?

So I'm guessing you're thinking something like someone heading over to
Amazon's Elastic Computing Cloud and setting up 10,000 tor servers?

I believe tor servers have to be manually approved by tor-ops before
they begin to be used for normal traffic. This used to be the case at
least. Perhaps it has been abandoned due to scaling issues?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Bootstraping Tor manually to get past the Great Firewall

2006-12-04 Thread Mike Perry
Thus spake Nick Mathewson ([EMAIL PROTECTED]):

 The long-term problem is dealing with the fact that the censors can
 access the directories too, and that IP-based blocks are the bread and
 butter of firewalls.

Can't find the article now, but I once read it is more difficult for
China to add IP-based blocks than keyword/url ones. It takes them
longer to add IP blocks as opposed to new keywords. Couple this with
the fact that there is probably a lot of churn a lot of the Tor nodes
towards the middle-bottom, and a way to get this directory information
across might be enough for a while...


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Tor DNS lookups failing

2006-12-04 Thread Mike Perry
Thus spake Jay Goodman Tamboli ([EMAIL PROTECTED]):

 A few months ago I modified Snakes on a Tor to do DNS lookups through  
 various nodes and compare the results. At the time there was a node  
 that was intermittently giving users an ad page instead of a real  
 page. I found then that the only node that was returning an IP  
 address that was incorrect was whistlersmother, but I didn't report  
 that here because I was a little unsure about my methodology.
 
 Last week I started scanning again with a better idea of what I was  
 doing. Notably, the latest Tor alpha resets the DNS cache on NEWNYM,  
 so I didn't have to much with the Tor source to stop it from caching  
 the lookups. After a couple of days of scanning, I haven't found any  
 nodes returning incorrect information, but I have seen more lookup  
 failures than I remember seeing last time. This jibes with my  
 personal experience, where I feel like I've seen more DNS lookup  
 failures than previously.
 
 I was wondering, first, if other people are seeing fairly frequent  
 erroneous DNS failures. Secondly, is there anything Tor can do to  
 improve the situation, like requesting a second lookup via another  
 circuit if one reports a failure, or maybe not caching failures? I'm  
 not sure either of those is a good solution, but right now when I get  
 a failure I have to either wait for the circuit to time out or send  
 Tor NEWNYM. Otherwise the result seems to be cached, so a reload in  
 my web browser just gives me the Privoxy error page again.

Yeah, I just started noticing a lot of DNS failures on my most recent
batch of scanning as well. I've got a fair amount of work to do before
SoaT 0.0.5 is ready (I think I've just about hit the limit of
maintainable complexity in a perl script :), but when it's done it
should be able to help us figure out which servers this is happening
at, as well as a shitload of other interesting info as well.

I'm hoping to make the release next weekend.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Nodes frequently changing keys...

2006-12-06 Thread Mike Perry
Several nodes seem to be rapidly rotating keys.. Over the past 24
hours or so the following nodes have changed keys:

Unnamed - 11 changes, 7 keys
ididedittheconfig - 6 changes, 3 keys
waldi - 5 changes, 2 keys
iddbadfpi2 - 3 changes, 2 keys
oinc - 3 changes, 2 keys
anonymous - 2 changes, 2 keys

Is there any reason why these nodes are doing this? It's been going on
for a while (month or more?), finally got around to recording it.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: how to prevent Tor from auto-buiding circle?

2006-12-07 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

 Hi,guys. I'm working on my own Tor controller recently. I want to 
 do full controlling on circle and stream, but i found that Tor keep 
 auto-buiding circles. How to prevent Tor from doing it?

Unfortunately I think there is no tor option for this. In my case I
ignore the circuit extends I didn't cause. You can build a table/list
by watching for 250 EXTENDED ([\d]+) right after you send the
EXTEND.. Any events for other circuit IDs you can then ignore. 

However, I'm guessing you want to completely avoid touching nodes that
are known to be unreachable from your location? Is it bad if you
try to connect to firewalled nodes?


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Nodes frequently changing keys...

2006-12-07 Thread Mike Perry
Thus spake Nick Mathewson ([EMAIL PROTECTED]):

 On Thu, Dec 07, 2006 at 01:46:39AM -0600, Mike Perry wrote:
  Several nodes seem to be rapidly rotating keys.. Over the past 24
  hours or so the following nodes have changed keys:
 
 Actually, from the look of things, these are actually multiple nodes
 with the same nickname.  This is completely kosher according to the
 spec.  If you want to tell nodes apart, you're supposed to look at the
 identity key, not just at the nickname.  Unless the Named flag is
 set in the network status docs, the nickname is not a canonical
 identifier.

Ah. I thought the purpose of using keys was to get the same nodes
after name changes. I thought names were enforced to be unique.

 In some cases, this is probably intentional.  Unnamed is currently
 the default nickname used when no nickname is set.
 ididedittheconfig seems like an obvious riff on the line in the
 default torrc.  anonymous seems like an obvious I didn't want to
 name this name.  I'm not so sure abobut waldi, iddbadfpi2, and oinc.

You're right, I should have just looked at the directory. All those
but waldi and oinc actually have different IP addresses. I will try to
be more thorough next time.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


A Brief Study on Circuit Construction Speed and Reliability

2006-12-16 Thread Mike Perry
nodes - the last successful hop and the first unsuccesful one. So in
effect, the STREAMDETACHED reason really is 2x more common than in
those lists. On the other hand, it is mostly alleviated by making
compute_socks_timeout() always return 15 (this was not done for this
study, however).


Well that's about all the detail I have time to go into right now. The
complete results are up at
http://fscked.org/proj/minihax/SnakesOnATor/speedrace.zip

As soon as I finish polishing up my README and change log, I will put
up the new release of SoaT itself up. Should be by sometime today.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Snakes on a Tor 0.0.5

2006-12-16 Thread Mike Perry
I've finished off another release of my scanner and wrote another perl
script to perform the timing/reliability measurments in the previous
post.


Release is at:
http://fscked.org/proj/minihax/SnakesOnATor/SnakesOnATor-0.0.5.zip


ChangeLog:


0.0.5:
 Metatroller:
  - suspicious vs naive failure rate information
  - New commands to support exporting these stats to SpeedRacer+SoaT
  - Subscribes to Network status events to get new router information
from Tor
  - Now better able to handle concurrent streams at once

 SoaT:
  - Now scans SSH hosts present in ./known_hosts for key changes
  - Attributes DNS resolution to proper exit, even if different than 
actual data circuit
  - Checks for content changes outside of Tor to eliminate false
positives
  - Filters out dynamic content ahead of time before scanning stats
  - Allows wildcard filetype all

 SpeedRacer:
  - Implemented. 


This is the last release that will be written in perl (unless some
huge bug is discovered). I'm going to rewrite it in Python so I can
get some decent OO support to implement some more advanced features.
There might not be another release for a few months.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: A Brief Study on Circuit Construction Speed and Reliability

2006-12-17 Thread Mike Perry
Thus spake Ringo Kamens ([EMAIL PROTECTED]):

 Thanks for that. It's interesting to have that data visualized.

Yeah, it's not quite as immediately relevant as exit scanning, but it
is a little more interesting with respect to studying the network as a
whole I think. What I'm really looking forward to is gathering some
statistics on most common peers during failure. I'm curious if those
OR_CONN_CLOSED are happening because certain nodes are
unreachable or partitioned from one another somehow, or if it is
something else. But I need better structure  object support for that
than perl can provide sanely, unfortunately.

I've gone back to scanning exits in the meantime. If anyone wants to
join me with a different wordlist.txt, set of filetypes and other ssh
hosts, it might be nice.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Exit ports 465 and 587 [was: Tor and Thunderbird]

2007-01-02 Thread Mike Perry
Thus spake Michael Holstein ([EMAIL PROTECTED]):

 Here's another idea ... gmail allows SMTP via SSL (smtps on tcp/465).
 
 You've got to authenticate for in/out (meaning google account) but you 
 can get one of those anonymously. They do POP via SSL as well (pop3s on 
 tcp/995). Combine the two and you've got a functional client.
 
 This should help you out .. (applies to Outlook, but Thunderbird would 
 use same settings in different places) :
 
 http://mail.google.com/support/bin/answer.py?answer=13278query=smtptopic=type=fctx=search

For the Tor nodes that allow 465 and 587, have any of you seen abuse
complaints or problems with SORBS and other vigilante spam crusader
overlords? If these ports are almost always authenticated I will allow
it in my exit policy without bothering with the IP list.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


SSH key spoofing

2007-01-02 Thread Mike Perry
Deliberately breaking threading so this doesn't fall through the
cracks. 

Thus spake Robert Hogan ([EMAIL PROTECTED]):

 
 Got this when testing an ssh connection:
 
 WARNING: DSA key found for host shell.sf.net
 in /home/robert/.ssh/known_hosts:8
 DSA key fingerprint 4c:68:03:d4:5c:58:a6:1d:9d:17:13:24:14:48:ba:99.
 The authenticity of host 'shell.sf.net (66.35.250.208)' can't be established
 but keys of different type are already known for this host.
 RSA key fingerprint is cf:9b:db:c4:53:c3:f0:0d:e8:c4:15:33:61:71:01:ca.
 Are you sure you want to continue connecting (yes/no)? no
 
 
 Tor first attempted to attach a circuit with toxischnet as it's exit. This 
 didn't work, so it then used tormentor. I then got the above.
 
 I subsequently used both toxischnet and tormentor to connect without any key 
 authentication issues. The RSA fingerpint is not listed by sourceforge. 
 
 http://sourceforge.net/docs/G04/en/#fingerprintlist
 
 Malice? Misconfiguration of some sort? Anyone care to test either of these 
 exits?

Hrmm.. My scanner seems to be getting hung on some bug (possibly one
that I'm tickling in Tor or possibly my own), so I haven't seen this
during automatic scanning yet, but I can confirm manually that
tormentor IS in fact regularly changing ssh keys. It should be
delisted as an exit ASAP.

toxischnet is currently hibernating, so its hard to say on that one.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Block directory authorities, is it possible?

2007-01-12 Thread Mike Perry
Thus spake Pei Hanru ([EMAIL PROTECTED]):

 Hi all,
 
 I live in China and was/am having difficulties in using Tor, the problem
 is: it takes quite a long time to build a circuit for the first time I
 start Tor on my Windows machine.

 Am I understanding correctly? Are there any actions Tor can take? After
 all, we cannot simply assume this will not happen in the future.

If the problem right now is just IP blocking you can try the tor
option HttpProxy which will route your dirserver traffic through an
http proxy you specify. Unfortunately, certain areas have begun
blocking by the /tor/ url postfix that dirservers use, independent of
IP. There is an option in 1.2.x/SVN to tunnel this traffic via other
tor nodes (via SSL), but I believe it is prone to exploding at this
point in time.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: tor and p2p

2007-01-25 Thread Mike Perry
Thus spake Robert Hogan ([EMAIL PROTECTED]):

  There's lots of work left before Tor is in a position for most users
  to be servers.
 
  http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#EverybodyAServer
 
  Hope that helps,
  --Roger
 
 My hosting provider blackholed my mail for a 24 hour period so I've had to 
 read all the replies on the archive.
 
 Thanks for the links and input, though I did get one or two responses which 
 misinterpreted me as suggesting the current tor network be used for anon p2p. 
 Perish the thought!

Yeah, I'm going to say that I2P is much better suited to this than
Tor, especially when you're talking about creating a new network
anyway. For as much bashing as poor jrandom takes on this list and the
wiki, I think he deserves a bit of praise for the fabulous job of
software engineering he has done with I2P. The code is clean,
flexible, and elegant bordering on sexy. It also exports Java Socket
compatible interfaces that Java apps can readily use to be ported over
(and there are python and I think C bindings as well). This has
enabled the pretty straight-forward port of the Phex gnutella client,
the Azureus plugin, and a native I2P bittorrent client I2PSnark.

Not to mention the vast bulk of I2P performance tuning and development
effort is focused on making their hidden service-like features work
well, where as Tor only devotes minimal effort to this component,
focusing instead on relaying to the external Internet. Plus I2P has
configurable path lengths built into the GUI allowing you to sacrifice
anonymity in certain applications to boost performance (either as a
client or server).

However, as was pointed out by enigma, any P2P mix network is going to
suffer a lot more at the lack of residential upstream than normal P2P.
In fact, if you use the standard pathlen of 3, any hidden
service-style system is going to only have 1/6 of the total bandwidth
a normal P2P system would have :(

(I fear that this residential limit will likely continue to the point
where the ratio is only sufficient to get ACKS back for the downstream
channel... Doesn't anyone ever have to email/upload large files to
work or email vids to friends? Maybe there will eventually be demand 
for this not to take aeons...)

 One final dumb question. The torify-ing wiki says:
 
 BitTorrent is already using a mechanism similiar to Tor to communicate with 
 other peers. 
 
 Is this referring to DHT? Is it really that similar?

Yes, this is absolutely correct... In the degenerate case where there
is only 1 tor network per torrent, and you were sufficiently
inebriated enough to handwave cells into the same abstract concept as
file segments, they are the same!

Oh, and also sometimes bittorrent encrypts traffic. Plus they both
use the Internets to communicate between peers! So really there is no
difference. (Who wrote this garbage? ;)


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Removing 1 modular exponentiation

2007-02-19 Thread Mike Perry
Thus spake Watson Ladd ([EMAIL PROTECTED]):

 Hello!
 Tor currently uses RSA encrypted DH exchanges. This requires that the
 server and client both make 3 exponentiations: Two for DH, One for RSA.
 But we can reduce this significantly. I've already presented this
 before, but now I think I can justify security. Sanity checks are assumed.
 
 Cryptographic Personae: Anonymous Alice and Ricky the Onion Router.
 Protocol Paramaters: A group with a generator g that takes on m
 values. DDH is hard in the group. I put generator in quotes because a
 lot of the time it's not a mathematical generator. The group is written
 multiplicatively.
 Setup: Ricky picks a random positive integer k less then m. Let y be
 Ricky's public key. Then y=g^k.
 Protocol round 1: Alice picks a random positive integer a. Let f=y^a.
 Alice sends f to Ricky.
 Protocol round 2: Ricky picks a random positive integer b. Let h=g^b.
 Key calculation: Ricky computes the key as f^(b/k) where
 (g^(k))^(1/k)=g. Alice computes the key as h^a. Note that both Ricky and
 Alice perform 2 group exponentiations.

Well, one immediate problem is that b/k has to be an integer.. So b=rk
for some random r and b is thus not completely random.. To clarify the
effects of this, you should rewrite your protocol as follows from
Round 2 on:

Round 2: Ricky picks positive integer b=rk. Let h=g^b = g^rk = y^r
Key calculation: Ricky computes the session key as s = f^r = y^ar = g^kar.
Alice computes the session key as s = h^a = g^ba = g^rka

All is well and good until Echelon Eve drops in for a spell. Having
recently upgraded her interception points to both evesdrop AND inject
traffic, Eve has her way with Ricky and Alice in the following racy
3-way secenario (hide the kids):


Alice and Eve:
R1: Alice picks her f=y^a
Alice sends to Ricky, intercepted by Eve.
R2: Eve picks a random number e. Let h_e=y^e. Sends to Alice
Key caluclation: Eve computes the session key as s=f^e=y^ae
Alice computes the key as h_e^a=y^ea


Eve and Ricky:
R1: Eve picks her f_e=y^v
Eve sends to Ricky.
R2: Ricky picks his random number r. let h=y^r=g^rk. Sends to Alice (Eve)
Key calculation: Ricky computes the session key as s=f_e^r=y^vr
Eve computes the session key as h^v=y^rv

Eve then happily relays traffic for Alice and Ricky. 


The fundamental problem is that all you've done is created a new (yet
equivalent) generator y for the exact same group G (since the group is
finite, cyclic and of prime order). Thus the same MITM authentication
problems with DH still exist, our demonic overlords win, begin reading 
your improved Tor traffic, and start executing whistleblowers
for exposing their satanic sex rings again. :(

Plus a few kittens probably die too.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs



Re: Security concerning Tor, BitTorrent and Firewall

2007-02-19 Thread Mike Perry
Thus spake a a ([EMAIL PROTECTED]):

 Oh, excuses. I do not (at least not after the distinct replies) intend 
 to use this either to leech torrents or to leech Tor. Anyways, after 
 testing this for approximately three minutes, my ol' pa went totally 
 nutters on the realisation that this might circumvent the firewall (and 
 yes, he's usually nutters for a reason).
 
 A more accurate question on my behalf would therefore be: Can Tor (if 
 you use it without (or with, for that matter) port forwarding the 
 firewall, create holes in the firewall by allowing incoming 
 connections through the Tor proxy. The ?Torrent case kinda implies this 
 (riiight...?) as the other peers seemed to be able to connect to me at a 
 higher rate...

This is extremely unlikely. Most firewalls create holes for outgoing
TCP connections based on tuples of (IP dest, IP src, TCP dest, TCP
source). Unless your firewall is braindamaged, Tor should not open
incoming holes for bittorrent, since Tor only connects to Tor IPs and
ports for that first hop (which is all your firewall will see). 

(UDP is a different story, but neither Tor nor bittorrent use UDP).

One way to verify if your firewall is braindamaged is to download the
utility wireshark (http://www.wireshark.org) and start it up.

Once it's running, the following filter will show you all INCOMING TCP
connections to the machine running bittorrent:

(tcp.flags == 2)  (ip.dst == 192.168.0.XXX)

Replace 192.168.0.XXX with your bittorrent machine's IP.

You should see no packets other than for other holes opened in your
firewall.

One alternate way your firewall could be broken is that it is allowing
UPNP (or Apple's equivalent.. forget its name). UPNP is used by client
applications to negotiate ports to open on the firewall. If your
bittorrent client supports UPNP and has it enabled, and your firewall
has it enabled, holes will open automatically independent of Tor.

You can also tell your dad that you are probably just as vulnerable
with just a single fixed (non-UPNP) port open for bittorrent as you
are running bittorrent with outgoing connecitons. So long as nothing
other than bittorrent listens on that port, the only thing exploitable
via that port should be bittorrent, and bittorrent is already
exploitable via traffic travelling over the outbound connections it
made (though outbound connections aren't visible to people scanning
your IP for exploitable clients).

 Or am I completely off the rails?

It's likely, see above ; ) 

It certainly should have nothing to do with Tor unless your firewall
manufacturer is really really dumb (not very likely).

 Or should this be put to rest because it is simply exploration of 
 exploitation ?

Very few sane people shoot down public discussion exploring
exploitation. The only way systems can hope to remain secure is if the
net IQ of people securing them exceeds that of those attempting to
break them. The only way for this to happen is public oversight and
discussion (ESPECIALLY of exploits involving closed-source systems -
closed-source companies have finite and small IQ compared to the rest
of the world). 

Unfortunately, fewer and fewer people in control of systems and law
are sane these days. So the world is about to get mighty interesting ;)


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Removing 1 modular exponentiation

2007-02-19 Thread Mike Perry
Thus spake James Muir ([EMAIL PROTECTED]):

 Mike Perry wrote:
 Thus spake Watson Ladd ([EMAIL PROTECTED]):
 Well, one immediate problem is that b/k has to be an integer.. So b=rk
 for some random r and b is thus not completely random.. To clarify the
 effects of this, you should rewrite your protocol as follows from
 Round 2 on:
 
 that's not really a problem.  all computations are done in the group 
 ZZ_p. 1/k really means the inverse of k modulo the order of g in ZZ_p. 
 So b/k does not have to be an integer.

My abstract algebra is a bit rusty, but isn't finding this value as
hard as the DLP?

Problem is: (g^X)^k = g for some given k. Find X equivalent to 1/k.

Rewrite as (g^k)^X = g

Seems like you need to take the Discrete Log of both sides to get your
X=1/k value. This is hard.

Perhaps you are thinking that g^(b/k)=g^b*g^(1/k).  But it doesn't, it
is (g^b)^(1/k).

If I'm wrong, please enlighten.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Removing 1 modular exponentiation

2007-02-19 Thread Mike Perry
Thus spake Watson Ladd ([EMAIL PROTECTED]):

 James Muir wrote:
  
  You may already know that the current scheme has a security reduction
  (Goldberg, PET 2006), so I imagine there would have to be a comparable
  argument before the powers that be would consider a new scheme.
  
  Out of curiosity, what is it about your scheme that makes you say it is
  insecure?
  
  -James
 Mike Perry had an MITM attack. It wasn't due to a problem with my proof
 but a problem in that what I proved wasn't sufficient to insure
 security. Basically Alice was performing DH with y the generator. So Eve
 could easily perform an MITM attack. And Eve can connect to Ricky
 easily. Still, a more efficient and still *secure* protocol would be a win.

Ah, right. My proof should still apply because even though b/k is not
an integer, it can still be written as b = r*k mod p. r is the
exponent of g you get when you do (g^b)^(1/k) after finding (1/k) mod
p using the Eucliean Algorithm as James pointed out. Right?

It's all coming back to me now (maybe). ;)

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Running Tor on a v-server with limited number of TCP sockets

2007-02-21 Thread Mike Perry
Thus spake Stephan Walter ([EMAIL PROTECTED]):

 On 2007-02-21 21:25, Alexander W. Janssen wrote:
  From a pragmatic point of view that would also mean that you wouldn't
  be able to log in from remote if TOR gobbles up all sockets.
 
 It's not as bad as that, as the ssh daemon is listening all the time and
 therefor already has its socket.

Actually, it probably is as bad as that. Each time accept() is called
on this server socket to handle a new SSH connection a new socket is
formed.. Unless their limit has a special exemption that they coded
themselves for accept().. But most likely its some garbage usermode
Linux thingy with ulimit -n set on the usermode linux process.

On the plus side, if they did code this exception for accept(), it
should apply to Tor as well, at least for incoming connections to the
OR port.  Eventually most routers should connect to you, and Tor will
just use those OR connections (though they may get closed if no
circuits are on them.. not sure about how long Tor keeps idle OR
connections open).

However, my scanner (if it ever works :) probably will end up flagging
your node as unreliable.. But you've got a while before that actually
means anything.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: pop3 and smtp over ssl [was: ssh]

2007-03-05 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

 Kees,
 
 I connect to various safe-mail accounts through secure POP (over
 SSL, port 995) to read my mail and have never problems. Or better to say that 
 when the tor exit node doesn't connect to safe-mail, I just try again a few 
 minutes later and usually it is ok. My mail program (Thebat) even does it all 
 alone, it checks email every xx minutes, as I wish.
 
 Sending mail is another story :) It is quite impossible in SMTP on 25 as in 
 secure SMTP on 465, as most tor exit nodes block traffic to these ports. So, 
 to send email, better is to connect to a web
 interface (in https of course), safe-mail is fine for this too.

This is interesting.. According to running
http://tor.eff.org/svn/trunk/contrib/exitlist, there should be about
20 nodes that exit to port 465.. The problem might be that these nodes
are slower overall, and tend to drop more circuits. If either of you
try setting CircuitBuildTimeout to like 10 in your .torrc, does it
help?

It would be nice if there was a way to specify an additional portlist
Tor uses to prebuild a couple extra circuits for. Circuit construction
can take a really long time and maybe this option would help people
who use apps on ports other than 80 and 443. Roger/Nick,
agree/disagree? Did I just volunteer? ;)

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Building tracking system to nab Tor pedophiles

2007-03-06 Thread Mike Perry
Thus spake Fergie ([EMAIL PROTECTED]):

 Hmmm.
 
  http://blogs.zdnet.com/security/?p=114
 
 Comments?

Will they write a ZDnet article about me when my node scanner starts
to delist his compromised exit nodes? ;)

There's of course no way that these nodes can be allowed to continue
to be exits if discovered. Any of them can be retooled into targeting
a lot more than just pedophiles, for fun, profit, or via subpoena.
He's also putting himself in an interesting position here wrt federal
wiretap law as well (as mentioned on the Tor legal faq). Though of
course, he picked a good target to pick on. The anonymous typically
have little legal recourse. Especially when you claim they all just
want child porn.

Of course, anyone utilizing common Tor best practices will not be
affected by this. (Though the one gripe I have is that NoScript allows
Java if you allow scripts.. But there are also extensions that block
Java globally - like QuickJava).

At any rate, I welcome a good open source implementation of this. If
nothing else, it will be nice to pit it against my scanner on a test
network to make sure this sort of thing can be reliably detected.


As an aside, it's recently become clear that a lot of people are using
these Internets things to transmit child pornography. Perhaps we
should just shut 'er down? 

Sure would be easier than actually finding the PRODUCERS of such
content...


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Building tracking system to nab Tor pedophiles

2007-03-06 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]):

 At any rate, I welcome a good open source implementation of this. If
 nothing else, it will be nice to pit it against my scanner on a test
 network to make sure this sort of thing can be reliably detected.

Oh, and we can also use this as an opportunity to definitively settle
once and for all the age old question of which is the superior
language, python, or ruby? He does have to waste an awful lot of lines
on end statements... ;)

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Building tracking system to nab Tor pedophiles

2007-03-07 Thread Mike Perry
Thus spake Freemor ([EMAIL PROTECTED]):

 I think what needs to be done here is to create a FAQ or other standard
 document that will 1.) inform the vastly misinformed public. 2.) list
 places and ways they can make a difference.

Excellent post, even if slight off-topic. As suggested on IRC, I think
the Tor documentation strategy needs to be rethought. Most people
barely read the download page, let alone the reems of FAQ questions.

We've had two attacks now on Tor that rely on unmasking users who
use Tor incorrectly. One of them actually published a paper and had
decent results at unmasking this way (mostly Asian users who probably
can't read our english mailinglist or english FAQ), and the media
still doesn't seem to understand that these attacks are well
documented.

The Tor download page should have a concice Things to know before
downloading section that lists a few key points about the most easy
ways your identity can be revealed through Tor. Something like
 
Things to know before you download Tor:
 - Browser plugins can be made to reveal your IP. 
 - This includes Flash, Java, ActiveX and others. 
   - It is recommended that you use FireFox and install the extensions 
 NoScript, QuickJava, and FlashBlock to control this behavior if
 you must have these plugins installed for non-Tor usage.
 - Make sure your browser settings have a proxy listed for ALL
   protocols (including Gopher and FTP).
 - For further details, please consult the Tor FAQ.

Maybe this will stop the same attack from hitting the blogosphere
every 2 months. Even better, maybe it will stop that attack from
actually working..

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Building tracking system to nab Tor pedophiles

2007-03-07 Thread Mike Perry
Thus spake Paul Syverson ([EMAIL PROTECTED]):

 I don't think it was off topic. To repeat what I already said in
 an individual response.
 
   I think it was not OT since your post addressed the reality of a
   situation for which people were designing Tor modifications and
   deployments and you evaluated their applicability to intended
   application.

Good. Solid post all around then.

 I had advocated something similar some time ago. Actually what I proposed
 was that some sort of test server be set up. I know there are already
 many of them, but I was thinking that there could be testing stages
 in an install wizard (or a post-install testing wizard)
 that takes the user through various tests and what to do in response
 to results. I know a lot of work, maybe another suggestion to be
 listed on the volunteer page or a candidate for summer of code?
 
 You dream big (not sure which is the bigger dream ;)

Heheh, well speaking of dreaming big, while both what you and Jason
Edwards said are great goals to have, I think we shouldn't get
distracted from stopping the bleeding now with a few sentences right
up front while something more elaborate is devised (or a volunteer
steps up).

The problem is if it isn't right on the download page and translated
into most languages, people will just assume they are good to go
without bothering to read the FAQ until something breaks (as Jason
pointed out). I also fall into this category with most software (even
stuff I develop for ;).

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-08 Thread Mike Perry
Thus spake sy16 ([EMAIL PROTECTED]):

 My suggestions as a no-tech user:
 
 Perhaps the Warning should be put on top of the page, before the
 download links - sometimes people don't go further than the download
 links.
 
 Also, might I suggest NoScript to be used in conjunction with
 QuickJava? And please add a line reminding users to reload the page
 if they use QuickJava. NoScript reloads automatically but not
 QuickJava.

The problem with NoScript is that it is incredibly complex, and unless
you configure it properly (which is NOT the default), it is really no
protection against an attack like Moore's. The default whitelist is
enough for him to abuse. A bad tor node can fake any host it wants.

Even worse, it is possible to THINK you are configuring NoScript
properly and make yourself even more insecure. For example, the
addons.mozilla.org people got the brilliant idea to transmit
extensions over http (even though the site itself is https). They
verify MD5s using javascript that runs on the https connection.. If
you disable javascript for them, you are downloading extensions
without any verification :(.

Unfortunately, QuickJava by itself is not enough to disable java
launched from a moore-style attack.
http://metasploit.com/research/misc/decloak/ actually builds the
applet html in a hidden div using javascript. QuickJava lets it
through.. On the plus side, Sun Java 5.0r10 seems to obey SOCKS for
his datagramsocket test, which is a huge surprise... Who knows if the
same can be said for MS Java.

This last point puts us in a catch-22. Personally, I think even if we
could describe to people how to use NoScript, it is going to be waay
too much of a hassle and too error prone to work reliabily for the
average user, especially as more and more sites go AJAX with no other
option. On the plus side, the author of QuickJava has also authored an
anonymity extension for anonmouse. Perhaps he would be amenable to
fixing his extension against moore's on-the-fly HTML generation.
However his email address is not listed on the author page :(



 About the evil exit nodes, these extensions might help detect false
 pages: HostIP.Geolocation plugin, netcrafttoolbar, FormFox, and
 Shazou. FormFox is somewhat paranoid and not always accurate, but it
 serves as a reminder of thinking before clicking submit.
 
 About mail client: I configure my Thunderbird 995 and 465, same
 server name for pop and smtp, with Torbutton. So far I have had no
 problem retrieving and sending. There have been mentions in this
 list about problems with smtp, so maybe I am missing something. Am I
 blithely assuming my getting and sending mail  through tor and SSL?
 
 About Windows (sorry guys) security, set up a normal user account
 for browsing, like they do in Linux. Change Administrator to some
 other moniker and set a password. And disable remote administration
 if you don't need this enabled.

Yea, these are good ideas for a second page. But on the front page we
just want a few paragraphs that covers all the bases.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page (Re: QuickJava update req)

2007-03-08 Thread Mike Perry
Thus spake light zoo ([EMAIL PROTECTED]):

 
 --- Mike Perry [EMAIL PROTECTED] wrote:
 
  Perhaps he would be amenable to fixing his
  extension against moore's on-the-fly HTML
  generation.  However his email address is not
  listed on the author page :(
 
 Well it looks like Mr. Greene prefers to receive
 feature requests on his blog, not email.  He seems
 very open to feature requests and suggestions:
 
 Quote Mr. Green:
 --
 Please leave comments for feature requests here to be
 considered.
 --
 
 Mr. Green's blog entry page:
 http://www.blogger.com/comment.g?blogID=17969172postID=112982970672088922

Yeah, I left a feature request for him. 
http://quickjavaplugin.blogspot.com/2006/12/features-requested.html

On further investigation his plugin seems to rely on the Firefox
setting 'security.enable_java', so perhaps he would have direct
ability in fixing this bug.. But on the plus side, maybe the fact that
this setting is under 'security' and can still be bypassed will
warrant prompt response from the Firefox team.. I'm probably occupied
for today.. If anyone wants to test this option for firefox 1.5 and
2.0 latest with moore's page please do so and post here. Note it's
hard to tell if the applet is running. You probably have to use
wireshark and filter on udp while hitting the page with tor disabled.
The udp packet is to red.metasploit.com. It is easy to see with a
filter of 'udp'.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page (Re: QuickJava update req)

2007-03-08 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]):

 Thus spake light zoo ([EMAIL PROTECTED]):
 
  
  --- Mike Perry [EMAIL PROTECTED] wrote:
  
   Perhaps he would be amenable to fixing his
   extension against moore's on-the-fly HTML
   generation.  However his email address is not
   listed on the author page :(
  
  Well it looks like Mr. Greene prefers to receive
  feature requests on his blog, not email.  He seems
  very open to feature requests and suggestions:
  
  Quote Mr. Green:
  --
  Please leave comments for feature requests here to be
  considered.
  --
  
  Mr. Green's blog entry page:
  http://www.blogger.com/comment.g?blogID=17969172postID=112982970672088922
 
 Yeah, I left a feature request for him. 
 http://quickjavaplugin.blogspot.com/2006/12/features-requested.html
 
 On further investigation his plugin seems to rely on the Firefox
 setting 'security.enable_java', so perhaps he would have direct
 ability in fixing this bug.. But on the plus side, maybe the fact that

Err. rather he probably has NO direct ability to fix it.

 this setting is under 'security' and can still be bypassed will
 warrant prompt response from the Firefox team.. I'm probably occupied
 for today.. If anyone wants to test this option for firefox 1.5 and
 2.0 latest with moore's page please do so and post here. Note it's
 hard to tell if the applet is running. You probably have to use
 wireshark and filter on udp while hitting the page with tor disabled.
 The udp packet is to red.metasploit.com. It is easy to see with a
 filter of 'udp'.

http://metasploit.com/research/misc/decloak/ is his url (mentioned in
a previous post). Hit that with JS enabled but java disabled to test.
The more platforms + JVM combos we have the better our odds are of
someone at firefox listening to us and fixing it promptly and
correctly. It's possible the behavior of this 'security.enable_java'
flag is OS+JVM dependent. I will do what I can, but I'm probably
going to be pretty occupied for the next few days with other things.

Also, as much as we have given him shit, HD Moore does deserve some
thanks about providing an open example of all this for us to test.
That is much better than the others who have studied this have done.
(Though I do suspect he may in fact simply hate Tor, at least his
security and research ethics are intact).

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-08 Thread Mike Perry
Thus spake H D Moore ([EMAIL PROTECTED]):

 Thanks for the feedback! Keep in mind this is the first applet I have ever 
 written :-) Any information about the new API would be appreciated. Do 
 you happen to know what versions it is compatible with? Bizzare that they 
 would explicitly allow non-proxied connections. I used the Datagram 
 Socket was so that I could send requests directly to the DNS server and 
 not have to do any extra processing on the server side. 

Actually, I'm also curious about your on-the-fly applet tag
generation. Were you aware that it would bypass that
security.enable_java setting or was it just a general evasive thing
you did for filtering? Do you have any information if this is specific
to certain versions/JVMs or if it is a universal hack?

Have you contacted the Firefox people?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-08 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 On Thu, Mar 08, 2007 at 04:12:10PM -0600, H D Moore wrote:
  I am in the process of updating the decloak 
  demonstration to explain each of the tests and provide source code for 
  the components. What may not be obvious (especially from the ZDNet 
  article), is that I believe in the Tor project's goals and am not 
  developing these types of tests to damage the project. 
 
 Hi HD,
 
 Thanks for joining the discussion, and welcome. We (the Tor developers)
 have been working mostly on making Tor itself work, and hoping that
 other people would step up to help us figure out how to safely configure
 the supporting applications (web browsers, etc). We could sure use some
 help. :)
 
 The current simplest advice I can give people is to remove all plugins:
 http://tor.eff.org/download.html.en#Warning
 Do you have any suggestions on safe ways to back off from that?

I have a couple more points - the second browser phrase should link to
http://portableapps.com/apps/internet/firefox_portable because
otherwise it's not really easy to have a second firefox installed.
 
I think we should also mention that we do scan the exits to try to
verify they are behaving well, but we may miss some. 

While developing the next generation of my scanner I still do scan for
matching MD5s inside/outside Tor from time to time, and the next
generation scanning script itself will examine script+embedded tags to
handle odd content/URLS in dynamic pages, but the main danger though
is in people targeting small segments of the population that I do not
speak the language of to issue queries for..  Tibetan sympathizers in
China come to mind..  Well, pretty much everyone in China comes to
mind, and I'm sure there are plenty of other marginal groups this
applies to as well (other than child porn viewers).

Scanning doesn't help Moore's point 3, but hopefully some statement of
vigilance on our part will help Tor seem a little less like a
perpetual connection through the wireless net at Defcon.. Though
unfortunately that is the level of precaution Tor users should
probably be ready to take.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-08 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]):

 Thus spake Roger Dingledine ([EMAIL PROTECTED]):
 
  On Thu, Mar 08, 2007 at 04:12:10PM -0600, H D Moore wrote:
   I am in the process of updating the decloak 
   demonstration to explain each of the tests and provide source code for 
   the components. What may not be obvious (especially from the ZDNet 
   article), is that I believe in the Tor project's goals and am not 
   developing these types of tests to damage the project. 
  
  Hi HD,
  
  Thanks for joining the discussion, and welcome. We (the Tor developers)
  have been working mostly on making Tor itself work, and hoping that
  other people would step up to help us figure out how to safely configure
  the supporting applications (web browsers, etc). We could sure use some
  help. :)
  
  The current simplest advice I can give people is to remove all plugins:
  http://tor.eff.org/download.html.en#Warning
  Do you have any suggestions on safe ways to back off from that?
 
 I have a couple more points - the second browser phrase should link to
 http://portableapps.com/apps/internet/firefox_portable because
 otherwise it's not really easy to have a second firefox installed.

Actually, negative on this. Cookies, extensions, and bookmarks are not
transfered over, but existing plugins from other firefox installs are
still detected. We just can't seem to catch a break here.. There
doesn't seem to be any way to disable plugins once you have installed
them... The 'about:plugins' chart does have an Enabled column..
maybe burried somewhere is a way to disable them with extensions..

Does anyone know anything about wrting firefox extensions? How do I go
about finding these plugin enabled properties, if they even exist
outside the compiled code?


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Warnings on the download page

2007-03-09 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 Also, isn't Portable Firefox Windows-only? Or am I confused?

True, just going for what I assume is the majority of our
userbase first. Especially people who are going to have difficulty
with this stuff. Was also in a rush and didn't check out the plugin
thing right away, sorry.
 
  I think we should also mention that we do scan the exits to try to
  verify they are behaving well, but we may miss some.
 
 How often are you doing this scanning at this point?

Couple times a week for overnight runs. Pretty much whenever I add new
functionality to the stats gatherering system I do an SSL + http scan
with the old perl scanner controlling the new python core before
checkin.

The problem is the http scanner itself is MD5 based, and it does
nothing to find nodes that deliberately target dynamic content.. So
maybe I'm doing nothing of substance at this point.

 Speaking of which, a frequently asked question that isn't answered on
 the FAQ is: I'm pretty sure my exit node is screwing with me. How do
 I figure out which exit node it is? My answers so far have been
   - Run at loglevel info and go look through all the stuff that
 makes no sense to you. Not so easy.
   - Use Vidalia's Network Map window and watch which circuit your
 stream is connecting to. Easy -- if you use Vidalia.
   - Connect to the control port manually and ask for stream and
 circuit events and then let it scroll. When something goes
 wrong, look at the output and piece it back together.
 
 Any ideas on a more foolproof approach? :)

Heh. I haven't had much luck with 'foolproof' anything lately. It
definitely shouldn't be anything other than in-memory. It would be
nice is Vidalia had a list of recently used exits and a list if IPs
visited for each (with some expiration time of like 5 min?) 

Even with Vidalia it is hard to open the network window while the
stream is still attached to your circuit. Usually by the time you
notice its long closed.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Work on Tor this summer, get paid by Google

2007-03-20 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 The deadline for students submitting applications is _MARCH 24_.
 
 I've put up a page with more details here:
 http://wiki.noreply.org/noreply/TheOnionRouter/SummerOfCode
 and there's a big list of potential projects here:
 http://tor.eff.org/volunteer.html.en#Coding

I just whipped up a TODO and a README file for the TorFlow library, so
if you scanned this list and either didn't see anything interesting,
or just went TorFlow, buh? at my item and moved on, maybe it's worth
seeing if any of the stuff in http://tor.eff.org/svn/torflow/README
and http://tor.eff.org/svn/torflow/TODO catches your eye. The stuff
marked not GSoC isn't forbidden, it's just less likely that it will
involve enough pure coding to make Google happy.

But if you did see an interesting item on the list, don't let me
distract you from it. Particularly any Windows coding. The Windows
select bug, Polipo port, and the USB drive are all very imporant and
less likely to get done by the main Tor devs who are mostly
Linux-focused.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Securing teh Intarwebs (Ultimate Solution ;)

2007-03-31 Thread Mike Perry
So I've spent the last week burried in javascript, xml, xbl, and
something pronounced Zool. I seem to have survived, but it is quite
possible I may turn into a fire breathing demondog at any moment. Hail
Gozer.

The result of this mad vision quest is a new and improved Torbutton.
Based off of TorButton 1.0.4, it has the following additional features:

1. It turns off browser plugins when you click a button in the statusbar,
   and also whenever Tor is on.

2. It clears your cookies whenever you toggle tor.

3. It hooks dangerous javascript functions, including:
   A. The Date() object, which can reveal your timezone
   B. document.getElement* which can be used to probe CSS attributes
  to see if you have visited certain sites or issued certain
  google queries: http://gemal.dk/browserspy/css.html
   C. navigator.oscpu and navigator.platform, two OS revealing strings
  not managed by UserAgentSwitcher.

4. It can optionally clear history whenever tor is toggled
   (unfortunately saving non-tor history is not possible yet. Firefox
DOES have an API to do this, but it is not implemented).


http://fscked.org/proj/minihax/TorButton/TorButton-1.1.0-alpha-dev.xpi

The goal of this extension is to make javascript as safe as it can be
to use over Tor, modulo browser vulerabilities (which the FF people
will actually fix.. They seem to enjoy arbitrary sites being able to
query their history and search keywords, however.. That is a feature).


ALPHA WARNING:

This is ALPHA software. It desperately needs someone to review it and
to try to break it. Especially the Date hooks. Those are complicated,
and feeding Date various malformed strings to parse may cause it to
generate a time with an offset from the actual time that reveals your
timezone, among other issues. I tried my best to guard against these
types of issues, but it could really use another pair of eyes. Or
several.

Additionally, it would be nice if someone could verify that popups,
iframes, frames, and other crazy gimpy windows properly hook Date()
and disable plugins. I tested iframes and frames briefly, but I did
not test popups.


ABANDONWARE WARNING:

I am not terribly interested in maintaining this extension. Especially
not for the next month or so. However, I will consider fixing serious
bugs involving my hooks of Date(), but likely not in any timely
fashion. If absolutely nothing happens with this after a month, I will
add it to my pile of responsibilities. But I should probably find the
time to pay my utilities first. I'm really hoping Scott will pick up my
changes and continue maintaining this extension.


KNOWN ISSUES (AKA HELP PLZ!):

This extension has been tested to work on FF2.0 and FF1.5. FF1.5
unfortunately lacks a sane TabOpen event, so plugins are not properly
disabled for new tabs when they open. FF2.0 seems ok.

I tried the code snippets for FF1.5 for this from
http://developer.mozilla.org/en/docs/Code_snippets:Tabbed_browser
but I was unable to get it to deliver events just for a tab, and I
eventually gave up. I am not planning on suppoting FF1.5 ever. If you
like FF1.5, please submit a patch. It's possible I was just doing
something dumb. I did only learn javascript 5 days ago :)

It might also be nice if someone changed that J graphic to a P for
plugins, and also made a button for toggling the javascript.enabled
pref (and hooked it up so it actually worked).


BRIEF EXPLAINATION OF SOURCE:

XPIs are zips of jar files that contain javascript and xml. The jar
files themselves are also zips. The javascript hooking magic is done
in jshooks.js. The plugin toggling and events for javascript are in
torbutton.js.


Good luck!


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: My ISP block Tor Servers

2007-04-18 Thread Mike Perry
Thus spake Koh Choon Lin ([EMAIL PROTECTED]):

  If you can't or don't want to switch ISP you could
  rent a server with uncensored net access and use
  it as proxy.
 
 I am working in Singapore and the government branded Tor as criminal
 skills. Thus, I have to go through a proxy even to get the Tor
 client!

Heh. This reminds me of a lawfirm one of my friends used to work at.
They told me when they tried to visit my website the content filter
denied them with that same message: Criminal skills. Never did get a
copy of the censor page though. This was in the USA.

Content filters are awesome.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Using a Proxy with Tor

2007-04-20 Thread Mike Perry
Thus spake Tarek Tag ([EMAIL PROTECTED]):

 1) When setting a proxy, via the HttpProxy/HttpProxyAuthenticator commands,
 does anything else need to be set, or are these the minimum set of commands
 needed? Currently, my torrc file simply contains the following (which
 doesn't seem to be working as expected):
 
 HttpProxy myproxy.com:port
 
 HttpProxyAuthenticator myusername:password
 
 2) Do both the HttpProxy AND HttpsProxy commands need be set in order to get
 the proxy to work (along with the authenticator information if applicable),
 or do I choose only one depending on the address of my proxy? 

Yes, you need to set both. HttpProxy only proxies directory traffic.
HttpsProxy proxies Tor node traffic. Also, if your proxy only allows
connections to limited ports, you must specify FascistFirewall and
FirewallPorts for those ports, or the more recent (and slightly more
complicated) ReachableAddresses config.

 When I put the HttpProxy/HttpProxyAuthenticator commands in my torrc file,
 and took a look at the traffic through a network analyzer, it doesn't show
 the behaviour that I expected: That is, it shows that all traffic is still
 going from my local computer to the Tor nodes directly, rather then via the
 proxy.

Regretably the proxy behavior with Tor is not all that good. For
example, if for some reason the proxy is unreachable, it fails
silently and reverts to non-proxied connections. If the proxy refuses
to allow you to connect to a particular IP/port (for example, if you
do not specify FascistFirewall), it prints out a warn, and then
reconnects without using the proxy.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


Re: Using a Proxy with Tor

2007-04-23 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 On Fri, Apr 20, 2007 at 06:41:43PM -0700, Mike Perry wrote:
  Regretably the proxy behavior with Tor is not all that good. For
  example, if for some reason the proxy is unreachable, it fails
  silently and reverts to non-proxied connections. If the proxy refuses
  to allow you to connect to a particular IP/port (for example, if you
  do not specify FascistFirewall), it prints out a warn, and then
  reconnects without using the proxy.
 
 Can you clarify this bug report? I was under the impression that Tor's
 proxy behavior was perfect, at least in 0.1.1.10-alpha and later.

The above was what I noticed while briefly testing SETCONF HttpsProxy
via the control port for different proxies, some unreachable, some
that gave me 403 errors. It seemed that after the proxy failed once,
it was ignored. Sometimes it failed silently and then was ignored.

I suppose I could have been doing something strange accidentally. Or
maybe the control port setting wasn't properly being propagated. I can
retest sometime next week if you need me to.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpqBx0adybeH.pgp
Description: PGP signature


Re: Sampled Traffic Analysis by Internet-Exchange-Level Adversaries

2007-05-30 Thread Mike Perry
Thus spake Paul Syverson ([EMAIL PROTECTED]):

 Anyway, the main reason I'm writing is that my objection was not just
 that the GPA was too strong but that it was too weak. Thinking you
 could have an adversary powerful enough to monitor all the links
 necessary to watch your whole large network but not able to do any
 active traffic shaping at all anywhere seems obviously nuts. This is
 one reason why padding on an open low-latency (lossless) network is
 problematic: an adversary with any active capability at all can induce
 a timing channel easily.

Actually, I'm going to disagree slightly because I don't feel like
sleeping yet :). It would take far less resources to passively tap the
traffic and filter out say Tor IPs and do analysis on just that data
offline. Trying to actively do that filter in-path PLUS arbitrarily
delay (ie queue in memory) that traffic in real time, all without
signficantly affecting pass-through traffic seems like it would be a
lot more expensive.

Also, not to mention there is a limited number of bits that can be
reliably encoded in this manner, and the purturbations of padding that
shares the same TLS connection will lower this effectiveness. The
adversary needs enough bits to get through to be able to track all the
parties it is interested in. If padding is in place, it will have to
spend considerable effort in redundancy to make sure that the
timestamp remains present in the exit stream.. Which again means more
queueing and more expense. 

Of course, it also means more expense on the part of the anonymity
network in wasted bandwidth.. If padding slows down the network to the
point where users start to leave, other, more dangerous effects take
over.

Finally, going on what has been disclosed so far in the EFF v ATT case,
it would seem that global adversary-style mass surveilance is in fact
ocurring passively, out of path. At least the illegal domestic stuff,
anyways. I suppose it's anyone's guess what they do when it's less
blatantly illegal.. Maybe Echelon is the reason my bbc is so slow! :)

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgp0Pyj2XtyR3.pgp
Description: PGP signature


Re: What will happen to Tor after the new German data retention law takes effect?

2007-06-14 Thread Mike Perry
Thus spake Freemor ([EMAIL PROTECTED]):

anyways just thoughts in the wind.. I'm sure the Tor Devs are
 probably gnashing teeth and pulling hair as a hundred reasons why it's a
 bad idea stream through their minds.

Code moves faster than law. No need to panic, or speculate on
technical solutions before a law is even passed. If the powers that be
are this intent on exemplifying their stupidity and pointlessly
wasting their resources on excuses to justify flawed totalitarianism
instead of addressing real problems, we should let them. We will have
plenty of time to adapt once the law is passed.

Right now, the proper avenue is well-articulated political opposition.
On a technical perspective we should be lazy with this one. It will
work to our advantage. Plus, I can't believe such measures don't run
against basic human rights and constitutional protections revolving
around search  seizure and presumed innocence. But I am constantly
surprised by the williness of my own country to shred the spirit if
not the letter of its own constitution as soon as technology comes
into consideration.. and even before that point.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgplFs24cdlad.pgp
Description: PGP signature


Re: Cisco firewall filtering Tor?

2007-06-14 Thread Mike Perry
Hey Jay!

Thus spake Jay Goodman Tamboli ([EMAIL PROTECTED]):

 I'm stuck behind a FascistFirewall part of the day, and I've been
 trying to get Tor to work as a client. I've added a line to my torrc:
 
 ReachableAddresses *:443
 
 Oddly, I can see that Skype is using TCP connections on port 443. I
 can't tell if they're working, but Skype is keeping them up (and Skype
 as a whole seems to be working).
 
 Tor, on the other hand, is not working. netstat shows established
 connections on port 443, but Tor doesn't seem to be accepting them as
 usable. I have debug logging on, but I'm not sure what to look for,
 since it seems to be trying to create circuits in parallel. Is there a
 message printed when a OR connection fails, giving a reason?

If you are running Tor 0.1.2.x or later, you can add ControlPort
9051 to your .torrc, and telnet localhost 9051. You can then do 

AUTHENTICATE
SETEVENTS EXTENDED CIRC ORCONN

to get some info that is sometimes not reported in logs, in a
well-formed format. You can also try jacking up your log to debug
level. It then should dump a bunch of info about TLS connections
there, but that is harder to sift through.

Might also be a good idea to kill tor, fire up wireshark
(www.wireshark.org), start a network capture, start tor, and let it
try to make some circuits for a bit. Then save the capture, and post
it and the control port info and possibly logs somewhere so we can
look at the results.

 Is it possible the firewall is looking at the :443 connections and
 somehow telling that it's Tor rather than HTTPS?

I believe at some point, tor changed its TLS certificate format to be
less-torlike.. But maybe this is only in SVN and not widely deployed
at the tor nodes. Roger or Nick will need to answer this question most
likely.

If they are doing content-based filtering like this, it is likely they
are also blocking directory connections too..


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpuoQ4kvTzcr.pgp
Description: PGP signature


New Torbutton (1.1.4-alpha)

2007-07-09 Thread Mike Perry
As some of you know, I've been working on a security-enhanced version
of Torbutton to handle all sorts of anonymity vulnerabilities present
in a standard Firefox configuration (see the big fat warning on
http://tor.eff.org/download.html.en - the goal is to make all that
text irrelevant). I will be presenting this plugin as a part of my
talk Securing the Tor Network for Black Hat and Defcon.

The goal of the extension is to make it possible to use modern
websites via Tor without the risk of something reducing your anonymity
set or bypassing proxy settings.

The major features are: 
 * Disabling plugins while Tor is enabled
 * Isolating dynamic content to the Tor state at document load
 * Cookie jars/cookie clearing
 * Cache management
 * History Management
 * User agent spoofing
 * Timezone spoofing

The extension itself, and more information on the individual
features/options are available at the horrifyingly stoic homepage:
http://torbutton.torproject.org/dev/

Currently, only FireFox 2.0 is supported. Kind-hearted souls are
sought to help port to Seamonkey and Thunderbird.

Feedback, suggestions, and comments are welcome. Especially if someone
could point out what I'm doing wrong with the OpenSearch Google search
plugin installations (which are somewhat unrelated, but I figured were
worth putting up there, since a major usability complaint is Why do I
get the damn German/Chinese/etc Google with Tor?).


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpYM5smmIWrt.pgp
Description: PGP signature


Re: New Torbutton (1.1.4-alpha)

2007-07-10 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

 Hi,
 
  Looks like great progress. One question though
 
 My question: How does the new Torbutton interferes with other
 extensions for the same or similar purposes:

 
 - Adblock Plus
 - CookieCuller

I run these two. No conflicts so far.

 - User Agent Switcher

I briefly tested this. It seems to play nice. I would advise against
setting a different user agent during Tor usage though, because of
anonymity set reduction. Torbutton already masks your user agent to a
popular recent windows firefox build (and does a better job of it
too).

 - SafeCache
 - SafeHistory

These two are superceded/assimilated by Torbutton in one form or another.

 - Flashblock

Might be useful for Non-Tor usage, but Tor usage will have all
plugins disabled. Would be interesting to know if flashblock can
somehow re-enable it, but I doubt it.

 - NoScript

No idea. I don't really like this thing. Also note that Tor nodes can
inject script from the default whitelist, so it doesn't really protect
you there.

 - RefControl

Hopefully this functionality will be assimilated into Torbutton.
Actually, are you aware of sites that their Forge functionality
still breaks? That is what I was considering implementing for all
sites with Torbutton. 

 - JavaScript Options

Looks relatively benign.

 - CookieSafe
 - CustomizeGoogle
 - Layerblock

Dunno about these guys. Please report any issues.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpU7UcSZghu7.pgp
Description: PGP signature


Re: New Torbutton (1.1.4-alpha)

2007-07-11 Thread Mike Perry
Thus spake Ryan Wagner ([EMAIL PROTECTED]):

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 I'm very pleased with the new Torbutton version so far. The only thing
 that's bothering me is automatically disabling 'Remember passwords for
 sites' when tor is toggled on. I'd prefer a way to disable this feature.
 Even if logging into sites over tor can be dangerous for anonymity and
 the security of the account itself, it's still nice to prevent one's ISP
 from retaining a record of goings on. It's possible to manually
 re-enable remembering passwords after tor has been toggled on, so it's a
 minor inconvenience, really.

This is tied in with the history writing setting. The idea was that if
you are OK with tor writing out these things, then you are ok with it
saving your history and vice-versa. 

However, this idea may be slightly flawed since you could be concerned
about history disclosure attacks from regular websites you visit.. So
maybe it should be a seperate option..



-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpqVoEFsxUcP.pgp
Description: PGP signature


Re: New Torbutton (1.1.4-alpha)

2007-07-11 Thread Mike Perry
Thus spake Robert Hogan ([EMAIL PROTECTED]):

 On Monday 09 July 2007 10:16:55 Mike Perry wrote:
  Feedback, suggestions, and comments are welcome. Especially if someone
  could point out what I'm doing wrong with the OpenSearch Google search
  plugin installations (which are somewhat unrelated, but I figured were
  worth putting up there, since a major usability complaint is Why do I
  get the damn German/Chinese/etc Google with Tor?).
 
 Stop me if this has been suggested before, but would it be worth introducing 
 an unofficial URI for hidden services that would make them recognisable to 
 the likes of torbutton? The idea being that the user could 'enable tor' 
 simply by clicking on a hidden service link rather than the usual jig of 
 click-servernotfound-back-scratchhead-enabletor-clickagain.
 
 Is this possible with a firefox plugin or would it be necessary to get the 
 firefox developers on board?

Actually, this is possible a few different ways.. You can create your
own protocol handlers, but it might not be necessary. Torbutton
already listens to the LocationChange event.. It may be possible just
to look to see if the new location has a .onion/ in it, and enable tor
if so. But this probably should be pondered for a while.. Changing tor
state automatically makes me a little nervous, even if it is only in
the Tor Enabled direction..

And creating a new protocol prefix for onion sites seems a little
sketchy also.. All sorts of compatibility issues are probably hiding
in there (not just the obvious problem of adoption).

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpnrJWGU6k9f.pgp
Description: PGP signature


Re: New Torbutton (1.1.4-alpha)

2007-07-12 Thread Mike Perry
Thus spake Jens Kubieziel ([EMAIL PROTECTED]):

 * Mike Perry schrieb am 2007-07-11 um 10:55 Uhr:
  Thus spake Jens Kubieziel ([EMAIL PROTECTED]):
   * Mike Perry schrieb am 2007-07-09 um 11:16 Uhr:
 * Cache management
   IMHO there should be check box for managing the cache by yourself. Like
   it is at privacy and cookie settings.
  
  Is there a good reason behind this wish? The cache can store unique
 
 It's about choice. Assume that I want to manage FF's cache by myself.
 Then I'll have no option to do it unless I stop using Torbutton.

But why? I can actually create a lot more options if you just want
choices. There are a couple things torbutton just does automatically
(like making sure you never query google's safesearch for every url on
the fly), and some actions (like the web history+form history+login
history option) come bundled together as a single option.

Torbutton is already bordering on an obscene number of nobs.. There is
room for this one, I guess.. But if I do this, and split the history
options out into seperate settings, we're talking about at least 10
more options (6 more history, 1 more cache.. plus at least 3-4 more
others if you want *everything* to be an option). That is getting a
little ridiculous, and I'm running out of space for nobs. Is all this
really needed?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgphyMq0wG4t5.pgp
Description: PGP signature


Torbutton 1.1.5-alpha

2007-07-18 Thread Mike Perry
Torbutton 1.1.5 has been released at http://torbutton.torproject.org/dev/

The changes are small, but significant:
 * bugfix: Reset shutdown option if user wants to manually manage cookies
 * misc: Add code to detect date hooking failures to zero in on Bug #460
 * new: Pref to disable DOM Storage during Tor usage

Bug #460 is a potentially nasty issue where in some cases the
Date/timezone hooks aren't properly applied. The 1.1.5 code should pop
up an alert now when this is the case. The alert will say either
False [win/doc] hooking. Please report bug+website! or Error,
double js-hook. Please report either of these ocurrances plus the
website plus what else you may have been doing either here or in the
bug:

http://bugs.noreply.org/flyspray/index.php?do=detailsid=460

In the meantime, you should be safe from timezone disclosure so long
as those alerts are not present, but please be vigilant.


There also is an uncomfirmed bug that in some cases cookies may not be
cleared during Tor toggle (and probably only when you are using
certain options also). Please keep an eye out for this one.

http://bugs.noreply.org/flyspray/index.php?do=detailsid=457


P.S. Thanks go to Steve Topletz of Xerobank for the DOM Storage tip.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpbuQNlQHuYL.pgp
Description: PGP signature


Re: On the performance scalability of Tor

2007-07-18 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 On Wed, Jul 18, 2007 at 07:52:14PM -0700, Mike Perry wrote:
  Thus spake Mike Perry ([EMAIL PROTECTED]):
  
   RELAY_EXTEND is the way this is done. I believe clients can and do
   send multiple RELAY_EXTENDs in a row, so it's not like its a
  
  Sorry, I'm a moron. I meant to say RELAY_BEGIN. Also, Roger/Nick,
  please correct me if these can't be issued concurrently.
 
 They can be issued concurrently. Tor doesn't care.
 
 Also, with HTTP/1.1 pipelining to the actual website, we just need to
 open a single TCP stream (one RELAY_BEGIN) and we can then fetch many
 pages in a row.
 
 I'm not sure if this is better or worse than fetching them in parallel. I
 suspect Juliusz (the polipo developer) has opinions :), and I'll defer
 to him.

Yeah, cause it's not like optimizing high latency networks and chatty
protocols for speed is my day job or anything. Probably should wait
for the expert to weigh in to really be sure ;)

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgphk8XMyUpdv.pgp
Description: PGP signature


Re: Tor takes too much RAM

2007-07-22 Thread Mike Perry
Thus spake Roger Dingledine ([EMAIL PROTECTED]):

 On Sun, Jul 22, 2007 at 10:35:56AM +0200, Olaf Selke wrote:
   Yes, my directory authorities are using way too much ram too. It appears
   that we introduced something bad in 0.1.2.x that wasn't present in
   0.1.1.x.
   
  today I noticed that according the FAQ tor needs 768 MB ram each 10 Mbps
  bandwidth :-)
 
 No, this is not true. At least, it wasn't true for 0.1.1.x. Some kind
 soul appears to have modified the FAQ to report the current situation,
 rather than bugging anybody about the problems. :)
 
 A few months ago we had plenty of people running at 30Mbps+ using 200M
 or 300M of memory, back when 0.1.1.x was the recommended stable.
 
 You might try downgrading to 0.1.1.26 briefly, and see how it compares
 to the current situation.

I have done this, and have been running 0.1.1.26 for about a couple
weeks weeks. It appears to be leaking at about the same rate as
0.1.2.14 did.

Since this problem suddenly showed up, yet 0.1.1.26 has been out for
ages, perhaps it is a client problem? There is that issue where
clients can send too many SENDMEs and fill up server buffers.. Maybe
there is a SENDME leak?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgprjIBR8lfyx.pgp
Description: PGP signature


Re: Torbutton 1.1.6-alpha

2007-08-01 Thread Mike Perry
Thus spake Kees Vonk ([EMAIL PROTECTED]):

 I just installed torbutton 1.1.6, restarted firefox (2.0.0.5 on
 Kubuntu). Clicked on 'Tor Disabled', which changed to 'Tor Enabled'.
 Then went to janusvm.peertech.org (which told me I was not using Tor),
 then hit the back button and got a dialogue box with said: False doc
 hooking. Please report bug+website! (my initial page was:
 file:///usr/share/ubuntu-artwork/home/index.html). After that I seem to
 get that error on every page, even when just switching tabs (just opened
 the above URL in a second tab).
 Just closed firefox and clicked on the above URL to restart firefox, it
 restarts with 'Tor Enabled', but no error. Then opened an new empty tab,
 and then switch back to the initial one and straight away get the error
 again. (Toggling Tor to disabled stops this behaviour, enabling it again
 starts it again.)

Is this bug reproducible? Does it happen every time for this website
even after successive restarts of the browser? I am having
difficulties reproducing this...

 Also when I look at my extensions they don't seem to be disabled. I am
 using the following extensions:
 
 Adblock Filterset.G Updater - 0.3.1.0
 Adblock Plus - 0.7.5.1
 CookieSafe - 2.0.6
 Fasterfox - 2.0.0
 Forecastfox - 0.9.5.2
 FoxyProxy - 2.5.3
 Konquefox - 1.3
 NoScript - 1.1.5
 Tab Mix Plus - 0.3.6
 Torbutton - 1.1.6-alpha
 View Cookies CS - 1.0.7

At a glance, I would suspect NoScript may be the culprit. If you
disable that thing, does the issue persist?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpqk7rWHODfS.pgp
Description: PGP signature


Linux Tor node prioritization script

2007-08-20 Thread Mike Perry
So I've posted this script before, but that was over a year ago,
probably should re-announce it.

I've created a Linux 'tc'-based tor prioritization script, ideal for
running Tor nodes on Linux machines that have multiple IPs with
non-Tor traffic on them that you would like to take priority over Tor
traffic. 

Using this script, it is possible to set a minimum guaranteed
bandwidth for your Tor node, and to allow it to take up all unused
bandwidth up to another maximum value you specify. I use it on a few
different types of links, and it is very nice. You can allow Tor to
take up essentially an entire link, but still have that link usable
for ssh, web, etc. I don't even feel the impact of Tor traffic on
nodes that use this script.

It is in svn at http://tor.eff.org/svn/trunk/contrib/linux-tor-prio.sh
and soon to be in the various source tarballs.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpr0eXr94beP.pgp
Description: PGP signature


Want a faster Tor? Upgrade, inform others

2007-09-01 Thread Mike Perry
For those of you who are not subscribed to or-announce and/or have
friends who use Tor, the latest Tor stable should provide significant
performance/capacity increase once most clients upgrade. According to
my measurements with TorFlow, there should be roughly four times as
much capacity once the network rebalances. 

In addition, many users should experience noticable improvement in
performance just based on the fact that we are choosing guards 
in proportion to their bandwidth and expiring guards that were
selected with the buggy uniform algorithm.

Also, once the network is balanced, we can begin to investigate both
reliability scanning options and Johannes Renner can finish his
Master's Thesis on performance enhanced path selection. :)

http://archives.seul.org/or/announce/Aug-2007/msg1.html

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgp0tjUbSSbJY.pgp
Description: PGP signature


Torbutton 1.1.7 Released

2007-09-21 Thread Mike Perry
The 1.1.7 alpha release of the security-enhanced Tor Firefox extension
is out. http://torbutton.torproject.org/dev

Changes in this version:

  * bugfix: bug 495: couple of memory leaks found and fixed by arno
  * bugfix: bug 497: uninstall exception found and fixed by arno
  * bugfix: bug 460: No more alerts should happen. But does that mean
its fixed? Outlook not so good...
  * bugfix: bugs 461+489: verbosity+macos logging issues resolved
  * bugfix: if javascript is disabled, the hooking code no longer complains
  * misc: Update spoofed Firefox version to 2.0.0.6
  * new: Restore Defaults button added to the preferences window


Please report bugs at 

http://bugs.noreply.org/flyspray/index.php?tasks=allproject=5

Enjoy! 

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpJURwJPeh78.pgp
Description: PGP signature


Re: Warning TorButton 1.1.7-alfa

2007-09-23 Thread Mike Perry
Thus spake [EMAIL PROTECTED] ([EMAIL PROTECTED]):

 I upgraded to 1.1.7-alfa yesterday and saw that it is really a crap
 :(

Thanks for the bug report. Even though it is a bit immaturely
delivered with lots of whining instead of actual helpful content, I
will do my best to fix the issues you have encountered.
 
 I used to manage my cookies, javacsript and history, MYSELF. Now
 trobutton wants to do all by itself, and the result is that:

 1- My history isn't cleared when I close Firefox, even when this
 option is selected in the Firefox options.

This is a bug. It will be fixed in 1.1.8. Thanks for reporting!

In the meantime, the workaround is to go into the Torbutton
preferences, go to the Shutdown tab, and click Allow me to manage
my own Private Data Settings.

 2- Some websites that use javascript do not work with Tor. It is
 possible that I TRUST the CONTENT of a website, including scripts,
 BUT I want to use TOR to hide my IP. With torbutton this is a real
 hassle now.

Is it possible for you to give me a list of websites torbutton breaks?
or describe how it breaks then? It works for me and I have recieved no
reports of breakage so far from others.

 Will try to go back to an older version if it is still available
 online :( Torbutton is a GREAT extension but WHY hell does the
 author want to care of all together??? Maybe he should also include
 Firefox in the extension, and why not, Windows or a unix
 distribution??? really BAD now :

You can hate on me all day long, but the fact of the matter is that
every other Firefox extension combo (including self management up to
the point of a Tor-only firewall) leaves you vulnerable to numerous
attacks to reveal your IP address and other location infromation. So
people can either help me fix Torbutton so it is usable for them, or
they can choose to remain vulnerable.

You may want to read over http://torbutton.torproject.org/dev/ to see
what sort of things you are vulnerable to without torbutton. If that
documentation is unclear, again, please notify me.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpos06cJRbaG.pgp
Description: PGP signature


Re: Warning TorButton 1.1.7-alfa

2007-09-23 Thread Mike Perry
Thus spake Scott Bennett ([EMAIL PROTECTED]):

  On Sun, 23 Sep 2007 06:47:17 -0400 [EMAIL PROTECTED] wrote:
 I upgraded to 1.1.7-alfa yesterday and saw that it is really a crap :(
 
 I used to manage my cookies, javacsript and history, MYSELF. Now trobutton 
 wants to do all by itself, and the result is that:
 
 1- My history isn't cleared when I close Firefox, even when this option is 
 selected in the Firefox options.
 
 2- Some websites that use javascript do not work with Tor. It is possible 
 that I TRUST the CONTENT of a website, including scripts, BUT I want to use 
 TOR to hide my IP. With torbutton this is a real hassle now.
 
  That kind of thing is only one of the reasons I do not use TorButton and
 most likely never will.

Can you give me a list of websites torbutton breaks for you? And how
does it break them? Toggling torbutton will kill javascript in
websites that are currently open, but you want that, unless you like
random javascript timers going off and sending your real IP to
website.

 Will try to go back to an older version if it is still available online 
 :( Torbutton is a GREAT extension but WHY hell does the author want to 
 care of all together??? Maybe he should also include Firefox in the 
 extension, and why not, Windows or a unix distribution??? really BAD now 
 :
 
  (You have a bad case of linewrap there, friend. :-)
  You could also try FoxyProxy, which I have used in the past, or
 SwitchProxy, which I prefer use now.  (I used FoxyProxy for a while at a time
 when SwitchProxy stopped working.  But then FoxyProxy came out with a version
 that didn't work, and I was afraid I might have to go with TorButton.  But
 SwitchProxy returned to the rescue with a newer, working version.:-)  These
 two are both more versatile than TorButton in the sense that they allow you
 to configure as many different proxies as you like and to switch between them
 at will.  Each proxy can, of course, be configured with addresses that bypass
 proxies entirely, too.

SwitchProxy should be usable with Torbutton. If you configure your Tor
proxy settings as one of the proxies, Torbutton should detect when it
is enabled and turn on its security features for you without your
needing to actually hit the torbutton itself. If it does not, it is a
bug. Please report it.

Again, Torbutton protects against numerous web exploits that can
reveal your IP address when you use vanilla proxy changers. Please
read over http://torbutton.torproject.org/dev/ before you go
recommending insecure solutions to people, or simply hate on Torbutton
without providing any bug reports to the maintainer as to why.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpuXyEwrNzwc.pgp
Description: PGP signature


Torbutton 1.1.8-alpha (Usability improvements)

2007-10-02 Thread Mike Perry
This is the 1.1.8 alpha release of the Torbutton Firefox extension. It
features significant usability and compatibility enhancements. However,
it is still alpha software, so it may have some rough edges. If you
notice issues or have usability complaints, now is the time to speak up
while things are still easy to change. Please be specific. 

I have made a good effort to anticipate common usability complaints for
this release from the feedback I have so far received, but I am not
omniscient. Eventually, this Torbutton will be backported to the stable
Tor release, so if you do not speak up soon, you will be perpetually
suffering in silence and will be stuck uninstalling the extension every
time you upgrade Tor (and leaving yourself vulnerable to numerous
anonymity-compromising vulnerabilities in the process).

See http://torbutton.torproject.org/dev for more information.

Changes in 1.1.8
  * bugfix: bug 510: Decouple cookie clearing from Clear Private Data 
settings
  * bugfix: bug 474: Decouple password+form saving from history writing
  * bugfix: bug 460: Rework handling of hooking based on global 
events+window lookup
  * bugfix: Hooking fixes for pages with nested frames/iframes
  * bugfix: Cookies are now properly synced before storing into a jar
  * misc: Tightened up the alerts a bit more for the javascript hooking
  * misc: Changed defaults to be less intrusive to non-tor usage
  * new: Added options to start in Tor and reload cookies after browser crash
  * new: Added ability to have both Tor and Non-Tor cookie jars

http://torbutton.torproject.org/dev/releases/torbutton-1.1.8-alpha.xpi
MD5: 39ce0dc3f6b20f79042aad2397baafb4

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpcodSU4YtZo.pgp
Description: PGP signature


Re: Torbutton 1.1.8-alpha (Usability improvements)

2007-10-02 Thread Mike Perry
Thus spake jeffery statin ([EMAIL PROTECTED]):

 I do not have issues or complaints but I do have a
 question and a possible feature request.
 
 a) Why is JavaScript not disabled by TorButton?  Does
 hook dangerous javascript make using JavaScript safe
 with Tor?

The combination of hook dangerous javascript and isolate dynamic
content make javascript safe, modulo browser exploits. The main
problems with javascript revolve around the ability to get timezone+OS
info, and to install event handlers/timers to load content after you
toggle Tor. These two issues are handled by those options
respectively.

For some Java plugin+OS combos, the Disable Plugins during Tor Usage
is also required. http://ha.ckers.org/weird/tor.cgi claims that they
are able to get Firefox 2.0 to call java functions from javascript.
When I tested with the Sun JRE 5.0 on Windows, this was only possible
up to and including Firefox 1.5, but not Firefox 2.0.  However it
appears that the new Sun JRE 6.0 has fixed this problem, and again
allows you full access to Java from javascript. Brilliant work,
impressive even for a company that has managed to give the same
product 5 different version numbers at the same time.

Note that allowing plugins is a lot more dangerous than just Java
anyways, so you should not have this setting unchecked for normal
usage unless you have some other type of upstream Tor-only firewall.

 b) Would it be possible to have TorButton
 automatically clear the cache, unprotected Tor
 cookies, etc when a NewNym signal is sent (for example
 by Vidalia)?

This is logistically difficult. The easier route is to add a New Nym
option to torbutton itself, and have it somehow communicate to either
vidalia or the control port directly. Allegedly raw TCP is possible
from privileged Firefox javascript, but it is likely less than pretty.
I will look into it to see if it is technically possible before the
1.2 stable release. 

Usability complications also arise though. If the user says they want
to keep their Tor cookies in a jar (or left alone entirely), should
new nym still clear them? I think so, esp since cookies can be
injected and stolen by exit nodes (even many https ones). But other
people may disagree.  Some people really like cookies. I wouldn't
expect those people to also like Tor, but I'm sure they're out there.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpfPWjP3dO85.pgp
Description: PGP signature


Re: Torbutton 1.1.8-alpha (Usability improvements)

2007-10-02 Thread Mike Perry
Thus spake MB ([EMAIL PROTECTED]):

 Could you please also make it compatible with Thunderbird ?
 
 Torbutton 1.4 installs (and works) fine with Thunderbird after editing 
 the config file in the xpi package to allow Thunderbird to install it.
 
 I suppose it should works as well with the new version ?

Hrmm, unlikely. Most of the stuff the new Torbutton does is very
tightly coupled to Firefox 2.0 behavior and recently created
unfrozen interfaces and events. Even just supporting
Mozilla/Seamonkey properly would probably require a lot of rewriting,
and a lot of luck wrt specific behaviors being the same, or even being
possible.

However, the one good thing we have going for us is that I would think
email clients would be much more careful about running random
code/plugins that are sent to them. If the thunderbird folks are
actually careful about what they allow html email to do, it should be
fine to continue running the standard Torbutton, and we probably
should create a seperate stripped down Thunderbutton extension or
something like this specifically for thunderbird (ie something not too
much different than torbutton 1.0.4).

What sort of security does thunderbird employ for html mail by
default? Does it allow html mail to run javascript, post forms to
random websites, run java applets, and/or arbitrary plugins (flash,
quicktime, etc)? If it allows any of these things, 1.0.4 may not be
enough.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpRVDwMRplR9.pgp
Description: PGP signature


Re: Advanced traffic shaping with iptables?

2007-10-03 Thread Mike Perry
Thus spake Marco Bonetti ([EMAIL PROTECTED]):

 On Wed, September 26, 2007 02:41, [EMAIL PROTECTED] wrote:
  It looks like the script needs Tor to run on a virtual address.
  This could be done by adding another address to your default interface
 Yesterday night (CEST) I've modified the script to use only one ip, packet
 matching is done via uid. Unfortunately the uid/gid/pid/ matching is
 broken on smp machines (according to man iptables). I'll made it
 avalaible this evening, as soon as I get back home.

Wow, nice work! I didn't see this option. Completely didn't expect it
to exist either.

Actually, my iptables manpage only says that pid, sid and command
matching are broken on SMP.  Perhaps UID is actually safe?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpFF8zHE79Ui.pgp
Description: PGP signature


Re: Torbutton 1.1.8-alpha (Usability improvements)

2007-10-03 Thread Mike Perry
Thus spake Michael_google gmail_Gersten ([EMAIL PROTECTED]):

 I think that's the real issue I have with cookies. The idea that a
 cookie can be permanent without my approval. I have no problem with
 login cookies. I have every problem with third party cookies being
 accepted at all (the only place where IE is better than firefox --
 those can be disabled in IE). I hate visitor tracking cookies that
 seem to get stuffed out by every website hoster now-a-days.

So what does this mean to you with respect to cookie clearing? Should
a newnym signal always clear cookies? Should it sometimes clear
cookies? Should its behavior be tied to an existing torbutton cookie
preference? I'm still of the mind it's kind of silly to put it in
torbutton if it doesn't clear cache+cookies...
 
 Now, how do httpS: streams get their cookies stolen or modified?

http://seclists.org/bugtraq/2007/Aug/0070.html

Gmail and many other sites are still vulnerable.

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpJvHzhfomKk.pgp
Description: PGP signature


Re: Firefox IPv6 Anonymity bypass

2007-10-25 Thread Mike Perry
Thus spake Nick 'Zaf' Clifford ([EMAIL PROTECTED]):

 Hey ya,
 
 Just noticed one small problem with Tor + Firefox + IPv6.
 I'm aware that Tor doesn't yet support IPv6, but I found an interesting
 development with respect to a system that has IPv6 configured and working.
 
 If you are using Tor (and have Firefox configured to use the HTTP
 proxy), Firefox will not use the proxy for IPv6 traffic. This means that
 if you visit a website using Tor, and it has a img, href, etc to a ipv6
 hostname, Firefox will happily connect with your native IPv6 connection
 (bypassing Tor).
 
 The work around for this is to disable Ipv6 (about:config,
 network.dns.disableIPv6 = true)

Nice. Thanks for reporting this, I will add it to the next reelease of
the dev torbutton. 

One thing concerns me though: Since this setting is under network.dns,
does this mean it disables using IPv6 only for DNS replies? Did you
verify this actually works to block numerical IPv6 links as well?


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgp07wuZ1YukV.pgp
Description: PGP signature


Re: Firefox IPv6 Anonymity bypass

2007-10-26 Thread Mike Perry
Thus spake Arrakis ([EMAIL PROTECTED]):

 Greetings and welcome to 2006!

 Excerpt from How To Create Torpark

Heh, what's happened in 2007 then? Does this document still exist? A
couple of google searches fail to turn it up.
 
 Step 31. set as follows:
 noscript.notify.hideDelay = 30
 noscript.statusIcon = false
 network.dns.disableIPv6 = true ; ipv6 addresses fail through tor.

Does this in fact block ipv6 if no DNS is involved and image links are
numerical only? I am living in the dark ages of ipv4. Can someone who
has ipv6 verify this for us? From reading:

http://kb.mozillazine.org/Network.dns.disableIPv6

it looks like this setting is not enough by itself.

 network.proxy.socks_remote_dns = true
 browser.sessionstore.enabled = false
 browser.sessionhistory.max_entries = 1
 network.cookie.lifetime.days = 0
 dom.storage.enabled = false
 dom.max_script_run_time = 60 ;script running time
 dom.max_chrome_script_run_time = 60;
 network.proxy.failover_timeout = 0 ;always retry the proxy, never
 revert.
 plugin.scan.plid.all = false ;Do not allow plugin scanning.
 security.xpconnect.plugin.unrestricted = false; do not allow
 unlimited access to XPConnect

Do we know exactly what this does? It seems somewhat vague and
undocumented. Do we know any extensions it breaks?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpyo9q6JlXTK.pgp
Description: PGP signature


Re: 20090101

2007-11-14 Thread Mike Perry
Thus spake Smuggler ([EMAIL PROTECTED]):

 Olaf Selke wrote:
  Eugen Leitl wrote:
  On Sat, Nov 10, 2007 at 08:14:34PM +0100, Olaf Selke wrote:
 
  nothing will change for German tor operators due to this law. It defines
  how to store and how to hand over stored data to the authorities. Data
  not collected at all can't be stored, right?. But this law does not
  enforce tor operators to collect any data.
  Oh, really? So ISPs, VoIP and mobile phone providers have nothing to fear,
  right?
  
  right!
 
 Wrong. I read the law. My lawyers read the law. It doesnt say: Store the
 data you have. It says: Store these specific datasets, no matter if you
 have them or not. The comments in the Regierungsentwurf are very telling.
 So, I am sorry. Tor nodes will have to log. ISPs will have to log.
 Everyone doing public telco services will have to log.

Actually, out of curiosity do your lawyers believe that
upstream/backbone/IX ISPs will also be required to log (and to log the
same type of data)? That would seem to be a lot of data.. Not to
mention that upstream ISPs will not have customer information for IP
addresses. It would seem to me that Tor nodes are much more similar to
backbone routers than consumer ISPs.


-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgpTZL1QyFh0R.pgp
Description: PGP signature


Re: 20090101

2007-11-14 Thread Mike Perry
Thus spake Smuggler ([EMAIL PROTECTED]):

 Olaf Selke wrote:
  Eugen Leitl wrote:
  On Sat, Nov 10, 2007 at 08:14:34PM +0100, Olaf Selke wrote:
 
  nothing will change for German tor operators due to this law. It defines
  how to store and how to hand over stored data to the authorities. Data
  not collected at all can't be stored, right?. But this law does not
  enforce tor operators to collect any data.
  Oh, really? So ISPs, VoIP and mobile phone providers have nothing to fear,
  right?
  
  right!
 
 Wrong. I read the law. My lawyers read the law. It doesnt say: Store the
 data you have. It says: Store these specific datasets, no matter if you
 have them or not. The comments in the Regierungsentwurf are very telling.
 So, I am sorry. Tor nodes will have to log. ISPs will have to log.
 Everyone doing public telco services will have to log.

Oh, and I'm also wondering about redundancy. If I run a Tor node in
Germany is it the case that I have to log, AND my ISP has to log, AND
their colo provider has to log, AND the upstream ISP has to log, AND the
IX has to log all the same data? Is there any division of
responsibility? Or will there be like 5-10 copies of the same
connection data floating around everywhere?

-- 
Mike Perry
Mad Computer Scientist
fscked.org evil labs


pgp3BKQrUQ75W.pgp
Description: PGP signature


  1   2   3   >