[tor-talk] Tor 0.2.2.28-beta is out

2011-06-04 Thread Roger Dingledine
Tor 0.2.2.28-beta makes great progress towards a new stable release: we fixed a big bug in whether relays stay in the consensus consistently, we moved closer to handling bridges and hidden services correctly, and we started the process of better handling the dreaded "my Vidalia died, and now my Tor

[tor-talk] Best way to anonymize email while still be allowing to receive it?

2011-06-04 Thread 0
The goal is to hide my ip (I have dynamic) when sending and receiving email. Remailers wouldn't fit since they wouldn't allow to receive messages. In addition, I'd like to host a local mail server. I think tor could help, but would correspondents need to be use tor in order to email me? How would

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Well, after all I guess we can acknowledge that there are scenarios where information disclosures will happen. To give users the possibility to contribute while preventing leaks for specific domains they are concerned it would be great if the submi

[tor-talk] Creating Custom Circuits

2011-06-04 Thread Zaher F .
hello.. i was reading about Creating Custom Circuits.. and i found these orders ..but i didnt know how to use them and where to write them..??? Using Tor control protocol you can create custom circuits of different sizes. Regardless of circuit size the last node must be configured as exit-no

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Robert Ransom
On Sat, 4 Jun 2011 12:56:15 -0700 Mike Perry wrote: > Thus spake Robert Ransom (rransom.8...@gmail.com): > > > On Sat, 4 Jun 2011 12:09:52 -0700 > > Mike Perry wrote: > > > > > Thus spake Robert Ransom (rransom.8...@gmail.com): > > > > > > My understanding was that EFF would query DNS for a h

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/04/2011 12:37 PM, tagnaq wrote: > IP address and hostname (and cert.) of intranet-server1.example.com > using a valid certificate *.example.com will be published even if the > first two options in the "advanced options" are enabled. Is that cor

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/04/2011 09:56 PM, Mike Perry wrote: > Thus spake Robert Ransom (rransom.8...@gmail.com): > >> On Sat, 4 Jun 2011 12:09:52 -0700 >> Mike Perry wrote: >> >>> Thus spake Robert Ransom (rransom.8...@gmail.com): >> My understanding was that E

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com): > On Sat, 4 Jun 2011 12:09:52 -0700 > Mike Perry wrote: > > > Thus spake Robert Ransom (rransom.8...@gmail.com): > > > > My understanding was that EFF would query DNS for a hostname, and if > > > the hostname does not exist, assume that it's pr

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Robert Ransom
On Sat, 4 Jun 2011 12:09:52 -0700 Mike Perry wrote: > Thus spake Robert Ransom (rransom.8...@gmail.com): > > My understanding was that EFF would query DNS for a hostname, and if > > the hostname does not exist, assume that it's private. (This should > > scare you even more.) > > EFF only needs

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Mike Perry
Thus spake Robert Ransom (rransom.8...@gmail.com): > > >> Someone running this (SSLObservatorySubmission) in a non-public network > > >> (i.e. an internal corporate network) with Internet access will probably > > >> disclose internal hostnames including IP addresses, if that is the case > > >> I w

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Robert Ransom
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sat, 04 Jun 2011 12:37:14 +0200 tagnaq wrote: > >> Someone running this (SSLObservatorySubmission) in a non-public network > >> (i.e. an internal corporate network) with Internet access will probably > >> disclose internal hostnames including IP a

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 >> Someone running this (SSLObservatorySubmission) in a non-public network >> (i.e. an internal corporate network) with Internet access will probably >> disclose internal hostnames including IP addresses, if that is the case >> I would identify this

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/04/2011 12:52 PM, Robert Ransom wrote: > My understanding was that EFF would query DNS for a hostname, and if > the hostname does not exist, assume that it's private. (This should > scare you even more.) Well, if the EFF is able to ask the DN

Re: [tor-talk] How evil is TLS cert collection?

2011-06-04 Thread Mike Perry
Thus spake tagnaq (tag...@gmail.com): > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 03/21/2011 01:58 AM, Mike Perry wrote: > > I've spent some time working with the EFF recently to build a > > distributed version of the SSL Observatory > > (https://www.eff.org/observatory) to be incl

Re: [tor-talk] EFF Tor Challenge

2011-06-04 Thread Mike Perry
Thus spake cac...@quantum-sci.com (cac...@quantum-sci.com): > On Friday 3 June, 2011 07:16:03 Eugen Leitl wrote: > > I've personally see Linux vserver patch prevent privilege > > escalation and preventing hosts becoming compromised from > > within its guests. There's, of course, GRSEC and other >