Re: [tor-talk] IP being banned - Help!

2012-02-18 Thread grarpamp
> "Your IP(xx.xx.xx.xx) has been banned by administrator." > > I can fix it by going to the Vidalia Control Panel and changing identity, > but it is a PITA. Is there any way to stop this from happening in the first > place? Yes, user education. Whenever someone tells you of their idiotic exploits

Re: [tor-talk] Tor directory servers

2012-02-19 Thread grarpamp
> The script would fetch the the latest tor exit node fingerprints and loop > through each one connecting to www.example.com.FINGERPRINT.exit via SOCKS5.A > failed connection means the fingerprint is discarded whereas successful ones > means it is added to a database of usable tor exit nodes. >

Re: [tor-talk] Scroogle is No More?

2012-02-21 Thread grarpamp
> I never met someone from the YaCy project. > > and they are reallynice people. Yeah, I heard those yacy guys are serial killin, drug dealin, baby rapin, church burnin, terrorists. Better not use yacy. Johnny's mom's is really nice, she can't code for shit though. On to more useful comparison...

Re: [tor-talk] Let's make Onion Addresses Meaningful To Humans

2012-02-29 Thread grarpamp
Mostly a summary... > http://tools.ietf.org/html/rfc1751 http://en.wikipedia.org/wiki/S/KEY http://en.wikipedia.org/wiki/OPIE_Authentication_System http://en.wikipedia.org/wiki/OTPW These still work well for simple OTP systems. The words are also simple English. > http://www.sinic.name/docs/

Re: [tor-talk] LeaseWeb disconnects Tor exit node for forum "spam"

2012-02-29 Thread grarpamp
> ORIGINAL COMPLAINT BELOW > StopForumSpam report for LEASEWEB ASN16265 It seems pretty clear leaseweb signed themselves up to receive this report. Or maybe sfs did, but then they'd be spamming leaseweb :) > We have many other customers that operate anonymous VPN services > and none of them had a

Re: [tor-talk] on the topic of tor's weaknesses

2012-02-29 Thread grarpamp
> The main problem, besides the overhead, is that padding doesn't work > if an adversary can do something as trivial as very briefly delaying > It is too easy for an adversary to put a traffic signature on a > circuit in one place, and look for it elsewhere. If he owns, e.g., the > first node and a

Re: [tor-talk] on the topic of tor's weaknesses

2012-02-29 Thread grarpamp
>>> It may take a while for a clientA to use said entry but when >>> they do it seems it would be quite easy to time/count correlate >>> or munge the HS traffic of clientA. And only require two nodes >>> (hs, entry) and no GPA taps to do so. >> That's why guards were introduced: They will not comp

Re: [tor-talk] Operating system updates / software installation behind Tor Transparent Proxy

2012-03-01 Thread grarpamp
> Robert Ransom wrote: > Use Tor 0.2.3.x-alpha, give the user 10 or more SocksPorts and 10 or > more DNSPorts to point things which really need to be anonymous at, > and no TransPort. I think both are useful. Using TransPort as a safety packet log and proxy catchall for whatever apps might defy So

Re: [tor-talk] Operating system updates / software installation behind Tor Transparent Proxy

2012-03-01 Thread grarpamp
On Thu, Mar 1, 2012 at 11:31 PM, Andrew Lewman wrote: > bittorrent trackers are fine, it's the bulk download of GB of data 7x24 > that loads up the network. Wanted to add a bit here from another view. I see no issue with bulk data transfer, so long as you give back empty bandwidth equal to your

Re: [tor-talk] Operating system updates / software installation behind Tor Transparent Proxy

2012-03-02 Thread grarpamp
> Robert Ransom wrote: > FreeBSD, apt, GPG, [etc] Unfortunately, I know of none that do OpenPGP right. Such as signing their git (sha-1 tree strength) repos upon init and each release tag, distributing keys with said releases/announcements, and integrating that so on down the chain, into updates,

Re: [tor-talk] Operating system updates / software installation behind Tor Transparent Proxy

2012-03-03 Thread grarpamp
> It's lame so or so. The exit node admins will have to deal with > copyright infringement complaints. 'All bulk data' was the intended meaning. Assuming copyright is not going away, certainly operators would want to see the complaint generating portion of bulk move solely and natively to the unde

Re: [tor-talk] Operating system updates / software installation behind Tor Transparent Proxy

2012-03-03 Thread grarpamp
> It's my impression that signed packages aren't a priority > for the BSDs in general. It will happen when one of their mirrors gets rooted, or one of their devs gets their machine, and thus their dev account, rooted. The kernel.org, gnu/fsf and debian[?] incidents all come to mind. Too bad it see

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread grarpamp
Nice graphic :) Some small details not worth including... site.com under HTTPS really means site-IP to various observers between user and webserver. site-IP may or may not mean site.com in the presence of virtual hosting schemes. At the exit and beyond, knowing a site user is using Tor could be

Re: [tor-talk] Awareness for identity correlation through circuit sharing is almost zero.

2012-03-06 Thread grarpamp
Does this ask for using a pre existing load balancer solution? Can the host's firewall be configured to fan out (say round robin or flow based) the streams (and dns) that it would normally capture and send to a single TransPort and DNSPort... across multiple Tor's providing same access ports? I h

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread grarpamp
> The nodes must reside in commercial data centers Subject only to Tor's defenses, such as CIDR block restrictions, a node is a node. Going with the USA idea: what if the FBI, in the normal course of business, calls up all their local cable/dsl/fiber/cell providers and has a few lines run to each

Re: [tor-talk] Tor and HTTPS graphic

2012-03-07 Thread grarpamp
> I think that it is important to differentiate national security > and law enforcement here. Yes. They are two separate camps. Who now more regularly talk with each other to varying degrees, both in the office, and in the pub. It's likely only a legal question as to what tools either may use. Th

Re: [tor-talk] Tor and HTTPS graphic

2012-03-08 Thread grarpamp
> Thanks to Mark Klein, we know that the NSA wiretaps in the US are > passive in nature, not active. We know that *back then* *one* of their possible tap systems was passive. All thanks due of course. > But who knows what they do [...] ... today, to whoever. > I don't think The Man can correla

[tor-talk] Encrypting the layers...

2012-03-21 Thread grarpamp
Assuming for the moment that aliens have better than brute force knowledge [1] about certain algorithms but perhaps do not have said knowledge regarding others... Would it make some sense for humans to use a different stream algorithm and key exchange method for each layer? [1] But "this is more

[tor-talk] Compilation error in tor-0.2.2.35 FreeBSD

2012-03-22 Thread grarpamp
On FreeBSD RELENG_4 i386 gcc 2.95.4+, I get this: container.c: In function `smartlist_ensure_capacity': container.c:72: `SIZE_MAX' undeclared (first use in this function) container.c:72: (Each undeclared identifier is reported only once container.c:72: for each function it appears in.) SIZE_MAX i

Re: [tor-talk] Compilation error in tor-0.2.2.35 FreeBSD

2012-03-22 Thread grarpamp
Fixed here: https://trac.torproject.org/projects/tor/ticket/3894 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Server/host for Tor forum in Iceland or Norway?

2012-04-01 Thread grarpamp
> Hosting relays in Iceland is expensive due to the current monopoly > arrangement on bandwidth and connections to Greenland and the > UK, see http://www.farice.is/. If planning to host tor relays in Iceland, Maybe a half year ago I posted some more info, and don't believe there is a monopoly situ

Re: [tor-talk] Forget Iran- beware of US isp's

2012-04-10 Thread grarpamp
> .If I told you it might give away my location. > Look up "major internet outage in US" for today. Right, which is why you tell us to search it and get the same location info. > Interesting, fios is a last mile solution from verizon. Not sure if that was just a 'neato' but, for those not in tha

[tor-talk] Hidden Services - Intermittant connections

2012-04-20 Thread grarpamp
Seems over the course of a couple branches of Tor that connecting to hidden services can be strange. I often have two or more Tor's running. One can connect to HS(a) just fine. The other can't... but killing and restarting it seems to always resolve the situation. And they both might always connec

[tor-talk] Socks5 and msmtp

2012-05-04 Thread grarpamp
If anyone would like to volunteer for this small project, here is an open invitation... :) What is msmtp? http://msmtp.sourceforge.net/ http://wiki.mutt.org/?LightSMTPagents/Msmtp Coverage on msmtp-us...@lists.sourceforge.net ... Hey all! Been using msmtp

Re: [tor-talk] Socks5 and msmtp

2012-05-06 Thread grarpamp
> jaro...@dyne.org says: > I'm very interested in this, Hi :) I think the motivation is to make the use of SOCKS with msmtp simple. Which generally means SOCKS being added to msmtp itself. Certainly not only for Tor, but also for biz, edu, and gov firewalls as well. Lots of good use cases there t

Re: [tor-talk] Socks5 and msmtp

2012-05-20 Thread grarpamp
>>> or are you thinking of a shell script using socat? >> Socat does not provde a SOCKS server, only a client, so it can't >> be used. I mentioned it only as an example of an interesting shim-like >> tool that might be out there. Not as one that could be used in this >> case. > I use msmtp + socat

Re: [tor-talk] Socks5 and msmtp

2012-05-21 Thread grarpamp
On Mon, May 21, 2012 at 3:10 PM, Leandro Noferini wrote >>> I use msmtp + socat and they works fine together with a tor relay. >> >> Those of you saying you're using socat to allow msmtp to speak to >> a SOCKS server... can you post an example of your invocation/config? > > socat -d -d -d -lu TCP4

Re: [tor-talk] Socks5 and msmtp

2012-05-22 Thread grarpamp
>> Yes, but I'm pretty sure that would break TLS since msmtp sees localhost as >> CN >> in its config and the cert CN says realsmtp.net. > No, msmtp could be configured not to check ssl certs with > tls_certcheck off > option in .msmtprc Ok, sure with that, but well the presumption is that secur

Re: [tor-talk] Socks5 and msmtp

2012-05-23 Thread grarpamp
> Well, what could we begin to do? I guess draft the use case and usage spec, pick a socks5 library or write one. Taking some of this from what's been posted by people so far. Get it to the msmtp list. I'm not really any good at C at all, so someone would have to tackle that. But wherever msmtp ma

Re: [tor-talk] Socks5 and msmtp

2012-05-25 Thread grarpamp
>> msmtp's complement, fetchmail, speaks of SOCKS in its >> docs, mentions a couple socks libs. But I've not tested >> fetchmail with them yet, it should be. > > fetchmail leacks inesorably (?) dns requests also used through a proxy > socks -  this is my experience. I don't see any leaks with tors

Re: [tor-talk] Question about exits

2012-05-26 Thread grarpamp
> If I run a Tor exit node and use Tor myself, is there any chance that my own > traffic might exit my own node?  Of course, if this were to happen, I'd > still have plausible deniability since I'd be running an exit node but it > would still be too close for comfort! If your client is not also th

Re: [tor-talk] Socks5 and msmtp

2012-05-26 Thread grarpamp
>> msmtp's complement, fetchmail, speaks of SOCKS in its >> docs, mentions a couple socks libs. But I've not tested >> fetchmail with them yet, it should be. > > fetchmail leacks inesorably (?) dns requests also used through a proxy > socks -  this is my experience. > > I found fdm (http://fdm.sour

Re: [tor-talk] How to Control middle Nodes?

2012-05-31 Thread grarpamp
> windows... VoIP clients I use Phonerlite, it use UDP. > because of TOR is TCP based, I will use openvpn to > transferring udp packet through TOR network. > ... > I will use tor network only without hidden services. For hidden to hidden, consider using onioncat. > to connect openvpn and tor i us

Re: [tor-talk] TBB 2.2.36-1 fails to include Firefox 13

2012-06-08 Thread grarpamp
I've noticed OS vendors taking up the FireFox ESR train in their ports for the same valid maintenance reasons. Though they do seem to track ESR and most current, with ESR getting the real work, and current only to compile. Probably comes down to when to make the time investment porting to the next

[tor-talk] MaxClientCircuitsPending - upper limit?

2012-06-19 Thread grarpamp
So I'm about to bump this to 1024. Are there any upper limits within tor on this, 2k, 4k? Are proxy clients given a reset/closed when tor has hit this limit? getinfo circuit-status shows 1100+ in BUILT state, Guess that's some other limit or is not limited. " We'd like to launch a circuit to han

Re: [tor-talk] Tor Traffic Overhead

2012-06-21 Thread grarpamp
> which is on average the traffic overhead of Tor traffic respect to > non-tor traffic? > I mean, if i make a 1MB transfer in an HTTP session without Tor, how > much data will be transferred with Tor, so in % which is the overhead? I'm sure you could make your system quiet, watch your packet/byte

Re: [tor-talk] Hidden Wiki

2012-06-21 Thread grarpamp
Really? Why do people insist on posting these silly shortened links. It's not really cool or hip, doesn't hide anything or protect anyone. And now lots of people have to go click it to see what it is and wade through a steaming pile of html/js/cookies, etc instead of evaluating it on its face. Cou

[tor-talk] Forbes article: Tor and Bitcoin

2012-06-21 Thread grarpamp
http://www.forbes.com/sites/jonmatonis/2012/06/19/torwallet-sparks-trust-without-jurisdiction-debate/ ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Hidden Wiki

2012-06-22 Thread grarpamp
> There are like 20 "the hidden wiki" pages all of them claiming to be > "the" real one. Sure. But given the nature of kpvz7's shoddy ops, the post late-2011 battle/outage forkage and the complete untrustability of any commerce link across them all, there probably isn't a real/best anymore... such

Re: [tor-talk] Forbes article: Tor and Bitcoin

2012-06-22 Thread grarpamp
> or get "hacked". Hah, we already let brick and morter get away with that excuse and more, these webs will be no different. > you don't need services like this website Completely true. Yet watching it all is good for some laughs :) "World's 2nd gold rush hits, miners pull off mass land grab, h

Re: [tor-talk] vwfws4obovm2cydl.onion ??

2012-06-22 Thread grarpamp
> Anbody have any information on;  vwfws4obovm2cydl.onion  ? You must have obtained the address from somewhere. So what did the ad copy or context associated with it say? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.or

Re: [tor-talk] vwfws4obovm2cydl.onion ??

2012-06-23 Thread grarpamp
>> harvested from malware... contained; vwfws4obovm2cydl.onion >> It contained a script file named; poclbm120222.cl > So from what it seems, the malware included a bitcoin miner > that perhaps is to report found blocks to ... this site in question. And surely the contents of any wallet it

Re: [tor-talk] [Bitcoin-development] Tor hidden service support

2012-06-26 Thread grarpamp
/// Meanwhile, on bitcoin-devel... Hello everyone, a few days ago we merged Tor hidden service support in mainline. This means that it's now possible to run a hidden service bitcoin node, and connect to other bitcoin hidden services (via a Tor proxy) when running git HEAD. See doc/Tor.txt for mor

Re: [tor-talk] [Bitcoin-development] Tor hidden service support

2012-06-27 Thread grarpamp
> Reading https://github.com/bitcoin/bitcoin/blob/master/doc/Tor.txt > Is bitcoin software going to incorporate tor binaries within the > application standard application and automatically create a Tor Hidden > Service on behalf of end-user? > > Are there any direction regarding this kind of integ

Re: [tor-talk] [Bitcoin-development] Tor hidden service support

2012-06-27 Thread grarpamp
>> Regarding the addressing, why not use directly the .onion address? > > https://en.bitcoin.it/wiki/Protocol_specification#Network_address > > Unfortunately, this addressing scheme apparently cannot accommodate > other anonymous networks, such as I2P, that uses 256 bits for its > Base-32 addresses

Re: [tor-talk] [Bitcoin-development] Tor hidden service support

2012-06-27 Thread grarpamp
>> 256 bits - A tough interop problem for sure. It seems maybe >> a worthy long term goal for the projects to sort out. > > It can be probably solved on the I2P side. The 256-bit address is a > SHA-256 of the full 3072-bit address (2048-bit public key + 1024-bit > signing public key) + a few extra

Re: [tor-talk] possible to identify tor user via hardware DRM?

2012-06-28 Thread grarpamp
>> can these chips be used to spying and identifying people The summary is probably... Only those with access to the chip masks, or an equally serious amount of reverse engineering gear, knows what goes into a chipset. Therefore anything is possible. And if you're not proxying the output of suspe

Re: [tor-talk] possible to identify tor user via hardware DRM?

2012-06-28 Thread grarpamp
>>> can these chips be used to spying and identifying people > > The summary is probably... Meant largely as to the nebulous 'spying' by 'them'. Not as to Seth's good post regarding the possibilities with known technologies. Hopefully it threaded that way.

Re: [tor-talk] Tor vs Network administrator

2012-06-28 Thread grarpamp
> When using Tor in a local network, what the network administrator can see if > he checks my activity on the network?? Generally speaking, a network admin can see that you are using Tor (the packets moving), not what you're doing over it (the packet contents). If 'network admin' also means 'syst

Re: [tor-talk] WG: Questions about your project and about data security

2012-06-28 Thread grarpamp
> 1. What are the main aims and the strategy of the Tor Project? You can find the answer to this by reading the Tor Project website: https://www.torproject.org/ https://blog.torproject.org/ https://media.torproject.org/ Ony of many answers to questions 2, 3, 4 might be: Users don't know, mixed wi

Re: [tor-talk] blocked exit node IP because of spam

2012-07-01 Thread grarpamp
> anonymously donate Well, very few places take cash or money order in the mail. Call them stupid to not take the money. Then there's AML with bitcoin, etc. > a persistent nym Building a persistent nym is handy if you wish to establish such a personage for compartemented tasks, etc. However, the

Re: [tor-talk] [info] Anonymous Publishing Is Dead.

2012-07-01 Thread grarpamp
>> like the NSA for example, consider that they haven't yet managed to track >> down the guys running the Silk Road drug site (http://silkroadvb5piz3r.onion) Call me stupid, but I actually think the NSA does have the capability to locate Tor hidden services, even if only those existing within the

Re: [tor-talk] [Need quick help] 30+ mbps node taken down by host

2012-07-04 Thread grarpamp
>> Thank you for the response. Unfortunately, it looks like this might be >> an impossible problem to solve, since they followed it up and said it's >> forum spam and hack attempts, not just email spam. Basically, my node > > So they're keep changing their story. It seems they want to get rid of y

Re: [tor-talk] How to pin the SSL certificate for torproject.org?

2012-07-06 Thread grarpamp
Fetchmail, msmtp, etc can all connect to a host, take that cert fingerprint, compare it to the one you've configured, and drop the connection if they differ. Doesn't FF support this kind of fingerprint scheme? Or even simply storing the site's cert for comparing. __

Re: [tor-talk] How to pin the SSL certificate for torproject.org?

2012-07-07 Thread grarpamp
>> Fetchmail, msmtp, etc can all connect to a host, >> take that cert fingerprint, compare it to the one you've >> configured, and drop the connection if they differ. > > That may work against some adversaries but not against very clever > adversaries. He can let the first connection alone and tam

Re: [tor-talk] How to pin the SSL certificate for torproject.org?

2012-07-07 Thread grarpamp
>> >> Fetchmail, msmtp, etc can all connect to a host, >> >> take that cert fingerprint, compare it to the one you've >> >> configured, and drop the connection if they differ. >> > >> > That may work against some adversaries but not against very clever >> > adversaries. >> He can let the first con

Re: [tor-talk] How to pin the SSL certificate for torproject.org?

2012-07-08 Thread grarpamp
>> And what about FF's 'are you sure want to connect >> to this strange cert'... 'accept one time' or 'add and accept >> forever' option? So why not dump the cert in the forever file? >> But if that's not checking _at least_ the fingerprint, and hopefully >> the cert chain, then it's useless for s

Re: [tor-talk] secure and simple network time (hack)

2012-07-19 Thread grarpamp
> Why don't we propose a clean solution for this time mess anyway? Is this that big of a deal? If a would be Tor user doesn't know what time it is and/or can't set their clock manually, they've got bigger issues to worry about. And given 90% of these users use windows, they're set via ntp by defa

[tor-talk] mailing list vs. f0rum

2012-07-22 Thread grarpamp
> they should create an official clear net discussion f0rum. > > "The idea is to share more with the community and give people a chance to > ask questions directly of the people doing the work." > > that is the purpose of a F0RUM, not another MAILING LIST used by the 1%. > The 1% of what set of pe

Re: [tor-talk] torsocks, usewithtor, torify questions - end the confusion!

2012-07-22 Thread grarpamp
Torsocks docs are woefully in need of work to match the code. And you may find yourself better off if you ignore the scripts and write your own. All you really need is: LD_PRELOAD=/.../libtorsocks.so TORSOCKS_CONF_FILE=/.../torsocks.conf TORSOCKS_DEBUG=1 "$@" local = 10.0.0.0/255.0.0.0 local = 12

Re: [tor-talk] What is 127.0.69.0?

2012-07-23 Thread grarpamp
>From what I recall, some mapping of these addresses is required fo make FTP work. I also remember FTP working without that with the old tsocks, and not with torsocks. But it's been so long that even I must consider my own memory as rumor. ___ tor-talk ma

[tor-talk] circuit_send_next_onion_skin(): Bug: Unexpectedly high circuit_successes

2012-07-27 Thread grarpamp
I'm seeing hundreds of these. The current M seems to exceed the m, for which m is increased, then M exceeds that... repeat. ver: branch 0.2.3.x as of jul 17. Should I ticket this or append more info? [warn] circuit_send_next_onion_skin(): Bug: Unexpectedly high circuit_successes (M/m) for guard .

Re: [tor-talk] circuit_send_next_onion_skin(): Bug: Unexpectedly high circuit_successes

2012-07-27 Thread grarpamp
> Ticket and assign it to me. Cc nickm (if you can). https://trac.torproject.org/projects/tor/ticket/6475 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] anyone created an acct on GMX using Tor?

2012-08-01 Thread grarpamp
> Riseup has been recommend by (imho) trustworthy and honest people. RiseUp is that place that makes you fill out *why* you want one of their free accounts, your activism. What do you guys put in there? Can you just leave it blank? Or say 'not applicable', no reason, unspecified. Do you have to sa

Re: [tor-talk] anyone created an acct on GMX using Tor?

2012-08-03 Thread grarpamp
> Sounds a little harsh. Any reason * whatsoever *? It's called covering ass, and not having to debate with you who's definition of 'abuse' is right. If you cause them problems, they can drop you. Doesn't mean if you send death threats they drop you, only that they can. This is actually a pret

Re: [tor-talk] anyone created an acct on GMX using Tor?

2012-08-04 Thread grarpamp
> The only way I've been able to create a Gmail account recently was through an > Android tablet. I installed Orbot and Orweb APKs so all traffic was through > Tor at the time, then created the account through Settings > Acounts & Sync > > Add Account. I'd be wary of that approach. It would be

Re: [tor-talk] Tor as ecommerce platform

2012-08-08 Thread grarpamp
> 4. Tor and hidden services are good enough for an ecommerce platform. Be careful the words... this is like saying the US Gov is doing great at preventing 'terrorist' attacks simply because there haven't been any. And although I might trust Tor, it's not wise to trust a GPA such as the NSA, nor

Re: [tor-talk] Tor as ecommerce platform

2012-08-10 Thread grarpamp
>>No offense to the weirdos, though. You guys are my people :). > Really? You don't come across as very friendly to the 'weirdos'. Oh, but he is! You see, I'm an astrophysicist with minor in geology and ancient history. I lose three jobs and eventually were committed to green sanitarium b

Re: [tor-talk] Tor as ecommerce platform

2012-08-11 Thread grarpamp
> .onion is another thing that is tragically failing to reach its > potential because no one tries to make it useful for normal stuff. I > rather intensely dislike the way it is being used now, but I also know > that good use cases exist, and amazing ones are possible. Ditto. Onionland is mostly d

Re: [tor-talk] Tor as ecommerce platform

2012-08-11 Thread grarpamp
> expand the network instead of just using it as a proxy. Make everyone > a relay (even if low-bandwidth relays are not useful, and even if > there are theoretical issues — solve the issues instead) and have a > hidden service address by default. Work with file sharing software > developers to have

Re: [tor-talk] Tor as ecommerce platform

2012-08-11 Thread grarpamp
> Still, it is a little surprising they can't trace bitcoin yet, though. > Maybe they can. If you're using an anonet, a new address for every transaction, a good mix that at least guarantees lack of per session taint, and are willing to accept a random variance in your input and output BTC amount

Re: [tor-talk] Tor as ecommerce platform

2012-08-11 Thread grarpamp
> I ask again, because I want the answer to improve us: >> > How would you have us promote Tor? Setting aside for the moment those possibly arguing illegal cases... I don't think you can do much different, or better. Even if you repeat the historical wisdom that the current presumed good parts of

Re: [tor-talk] Leave Your Cellphone at Home

2012-09-05 Thread grarpamp
> Very interesting read. " Resnick: The recent article in Wired describes where and how the NSA plans to store its share of collected data. But as the article explains, the Utah facility will have another important function: cryptanalysis, or code-breaking, as much of the data cycling through

[tor-talk] Hidden Services - reliably resolving/using onions, CPU

2012-09-05 Thread grarpamp
When trying to fetch about 50 onions at a time, Tor eats up all of a P4 1.8GHz CPU. And only about a tenth of the HTTP requests that are expected to resolve and return data ever do return said data. Further, using Tor as an exit (whether via polipo or SOCKS) also becomes less than useful. I'm not

Re: [tor-talk] Rap News 15

2012-09-06 Thread grarpamp
> haha! Beware that youtube now embeds unique identifiers in each downloaded video. Be careful when you share content these days, it might just be haha on you. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/m

[tor-talk] Record number of onions online!

2012-09-10 Thread grarpamp
OnionLand now has well over 500 known onions online :) ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Tor 0.2.4.2-alpha is out

2012-09-10 Thread grarpamp
> - Log fewer lines at level "notice" about our OpenSSL and Libevent > versions and capabilities when everything is going right. The version confirmation was handy when you're compiling static and want to know what actually made it into the binary without using strings. Doesn't matter to

[tor-talk] SocksPort: Circuit isolation is not Exit isolation

2012-09-10 Thread grarpamp
I noticed this when trying multiple SocksPort's. I ended up with the following circuits, listed in order of command invocation: port 8051 circ 35 nodes R1 R2 E1 port 8052 circ 34 nodes R3 R4 R5 E1 Note the same exit was selected. Also, the second circuit was longer. I don't think either of these

Re: [tor-talk] SocksPort: Circuit isolation is not Exit isolation

2012-09-10 Thread grarpamp
>> The typical use case is wanting to use multiple accounts on the >> same site at once, with a guarantee that you're not appearing to >> be from the same exit and thus are not as easily linked. > This doesn't make sense to me. If you've got two requests open from > the same exit to the same site

Re: [tor-talk] Hidden Services - reliably resolving/using onions, CPU

2012-09-10 Thread grarpamp
> Tor's hidden service protocol I get most of the protocol. > Patient: `Doctor, it hurts when I do this.' > Doctor: `Don't do that then.' Though I might agree, more perhaps from the humor aspect :) We all know telling users not to do something, that is at least marginally possible, doesn't work.

Re: [tor-talk] hidden services and stream isolation (file transfer over Tor HS speedup?)

2012-09-11 Thread grarpamp
> I think you aren't considering how much cpu load is added by > opening a new circuit ... > This latency you will experience is exactly the sort of thing > that will get worse if people start overloading the network with > extra circuits. As with the current count of onions, it's not intentional

Re: [tor-talk] SocksPort: Circuit isolation is not Exit isolation

2012-09-11 Thread grarpamp
> If anonAccountA and anonAccountB are run by different users, I'd > expect them to use the same exit 1/N of the times that they both log > in. > > But if, over time, I see that anonAccountA and anonAccountB both > sometimes use some of the same exits, but they never use the same exit > at the same

Re: [tor-talk] Tor 0.2.4.2-alpha is out

2012-09-11 Thread grarpamp
> The version stuff is thill there in the first line of the output. I think you meant the tor version/git up top and I meant compiling whichever versions of libevent/ssl with their version lines farther down. I'm used to access times, strings, trace, ldd if dynamic... so any way is fine with me. (

Re: [tor-talk] One answer to the bittorrent problem . . .?

2012-09-13 Thread grarpamp
Although I don't speak for Tor, allow me to summarize... - Tor is a transport only. As a matter of both policy and law, and because all data along the hops is encrypted anyways by design... it has no ability to and will not be modifying any data in transit even if it could. - Tor has no plans to

[tor-talk] tor-0.2.4.2-alpha compile errors

2012-09-14 Thread grarpamp
Some easy ones... src/common/util.c:3903: warning: preprocessing directive not recognized within macro arg src/common/util.c:3904: `#else' not within a conditional src/common/util.c:3906: unbalanced `#endif' *** Error code 1 3900 log_notice(LD_GENERAL, "Failed to terminate process with

Re: [tor-talk] Botnet command server hidden in Tor

2012-09-14 Thread grarpamp
> (can hardly be the first, can it?) We've all had conversations over the past five plus years about how Tor would be useful for botnets. I'm amazed it hasn't really shown up at all. Maybe the lack of speed and larger footprint hurts more than being taken offline does.

Re: [tor-talk] tor-0.2.4.2-alpha compile errors

2012-09-14 Thread grarpamp
>>> What compiler is that, and version? The code in main.c has been like >>> this for a while, I wonder why it didn't come up before. See 3894. Because nobody uses it anymore :) > Should be fixed in e4ce8cd9691708d9bc0bcc9904d656fe35001946. Yes, master works now. Thx. ___

[tor-talk] onion id calculation

2012-09-15 Thread grarpamp
rend-spec... "permanent-id" is the permanent identifier of the hidden service, consisting of 80 bits. It can be calculated by computing the hash value of the public hidden service key and truncating after the first 80 bits: permanent-id = H(public-key)[:10] https://trac.torproject.org/projects/to

Re: [tor-talk] Hidden Services

2012-09-17 Thread grarpamp
> Is it possible to access the hash table Yes. But you're still facing 2^80, among other things. > I tried sniffing my own traffic There used to be some other things you could "sniff" to do this, but they're almost entirely phased out. These days you'd only get a few services dumb enough not to

Re: [tor-talk] SocksPort: Circuit isolation is not Exit isolation

2012-09-18 Thread grarpamp
Update: My nutty fruit bat now tells me I had 'trackhostexits .' turned on in the original example. I think that explains the growth of the matching exit (4th node) onto the second circuit. Without that I get (with SessionGroup as default)... r1 r2 r3 r4 r5 r6 r1 r2 r3 r4 r1 r5 r1 r2 r3 r1 r4 r

Re: [tor-talk] onion id calculation

2012-09-18 Thread grarpamp
> look correct to me. Hope this helps Yes. Robert noted my former sleepy state totally messed the use of string functions which affected length and values. But I never would have guessed your hint that there was some sort of common header being deleted from the key itself... I have no idea what it

Re: [tor-talk] Hidden Services

2012-09-18 Thread grarpamp
>> similar features to facilitate indexing of visited TorHs by 3rd > If you do this, please honour peoples robots.txt files. No, they are publishing a list of onions/urls visited, not doing the indexing themselves, robots has nothing to do with t2w. ___

Re: [tor-talk] onion id calculation

2012-09-18 Thread grarpamp
> That code comes from another thread that you missed: Less than a month ago too, that's pretty funny :) ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Hidden Services

2012-09-18 Thread grarpamp
> People use robots.txt to indicate that they don't want their site to > be added to indexes. They use it to indicate that they don't want their site to be crawled. Tor2Web isn't crawling anything, thus they have no need or obligation to fetch and consider anyone's robots in the first place. Nobo

Re: [tor-talk] Hidden Services

2012-09-19 Thread grarpamp
> In almost all cases (99% or higher), robots.txt is used to indicate > that a site shouldn't be crawled, *because* they don't want it > to be indexed. The intention is painfully clear... Not really, maybe they could care less about the index, but don't want crawlers looping through all their band

Re: [tor-talk] Hidden Services

2012-09-20 Thread grarpamp
>>> I've met some people who tell me they run a relay >>> which records every hidden service descriptor. They don't >>> tell me more than that. >> As to being any specific relay [the RP?], not sure. But if so, the >> domain view there is going to be narrow and slow going. Someone >> who has read t

Re: [tor-talk] JonDo uses Skype for circumventing Internet censorship

2012-09-20 Thread grarpamp
> Not a bad idea, except the repressive governments with which I'm most > familiar also > ban Skype. (The ban on Skype isn't just for censorship, but to maximise > revenue You might want to try something like this... https://jitsi.org/ Perhaps over something like these (which might be a bit fas

Re: [tor-talk] Tor and P2P (Hidden SMS)

2012-09-26 Thread grarpamp
> When one phone connects to another, it "knows" that the device it's > connecting to is running the hidden service that it is trying to send > a message to. However, the other phone, (the one running the hidden > service), has no idea who is connecting to it. You can use ping pong handshakes. Or

Re: [tor-talk] Tor and P2P

2012-09-26 Thread grarpamp
Allow me to combine some quotes from this recent thread alone... > I've had an idea for a while for a killer service for... > I'd be very much interested to see it in reality. I guess the > delays will be more then acceptable. > it would be cool to have a more general protocol for P2P use > thro

Re: [tor-talk] Tor and P2P

2012-09-26 Thread grarpamp
> While we don't need a very complex p2p design (in short, we are mostly > just talking about simple HTTP servers running on each device, behind > a hidden service .onion), I am concerned in the long run about > scalability and reliability of this. Is, or can Tor be, useful or optimal? On which pl

  1   2   3   4   5   6   7   8   9   10   >