[tor-talk] Bootstrapping gets stuck at 85% - logs included.

2012-05-12 Thread Aaron Whiteman
Tor worked fine until a few days ago.  Then I began to have some problems.  Let 
me explain.

I use apt-get install tor and run 'tor'. The results are:

May 11 21:19:08.358 [notice] Tor v0.2.2.35 (git-73ff13ab3cc9570d). This is 
experimental software. Do not rely on it for strong anonymity. (Running on 
Linux i686)
May 11 21:19:08.362 [notice] Initialized libevent version 1.4.13-stable using 
method epoll. Good.
May 11 21:19:08.362 [notice] Opening Socks listener on 127.0.0.1:9050
May 11 21:19:08.364 [notice] Parsing GEOIP file /usr/share/tor/geoip.
May 11 21:19:09.196 [notice] OpenSSL OpenSSL 0.9.8k 25 Mar 2009 [9080bf] looks 
like it's older than 0.9.8l, but some vendors have backported 0.9.8l's 
renegotiation code to earlier versions, and some have backported the code from 
0.9.8m or 0.9.8n.  I'll set both SSL3_FLAGS and SSL_OP just to be safe.
May 11 21:19:09.354 [notice] Bootstrapped 5%: Connecting to directory server.
May 11 21:19:09.355 [notice] I learned some more directory information, but not 
enough to build a circuit: We have no network-status consensus.
May 11 21:19:09.543 [notice] Bootstrapped 10%: Finishing handshake with 
directory server.
May 11 21:19:10.554 [warn] Problem bootstrapping. Stuck at 10%: Finishing 
handshake with directory server. (No route to host; NOROUTE; count 1; 
recommendation warn)

This always happens.  It just gets stuck.

Then I try the Tor Browser Bundle.  I am using the latest version which I 
downloaded yesterday. 

Here is what the Vidalia client shows when I ./start-tor-browser:

May 11 22:56:30.636 [Notice] Tor v0.2.2.35 (git-b04388f9e7546a9f). This is 
experimental software. Do not rely on it for strong anonymity. (Running on 
Linux i686)
May 11 22:56:30.637 [Notice] Initialized libevent version 2.0.18-stable using 
method epoll. Good.
May 11 22:56:30.637 [Notice] Opening Socks listener on 127.0.0.1:0
May 11 22:56:30.638 [Notice] Socks listener listening on port 42779.
May 11 22:56:30.638 [Notice] Opening Control listener on 127.0.0.1:0
May 11 22:56:30.638 [Notice] Control listener listening on port 34216.
May 11 22:56:30.639 [Notice] Parsing GEOIP file ./Data/Tor/geoip.
May 11 22:56:35.928 [Notice] OpenSSL OpenSSL 1.0.1b 26 Apr 2012 looks like 
version 0.9.8m or later; I will try SSL_OP to enable renegotiation
May 11 22:56:35.928 [Notice] We now have enough directory information to build 
circuits.
May 11 22:56:35.928 [Notice] Bootstrapped 80%: Connecting to the Tor network.
May 11 22:56:35.929 [Notice] New control connection opened.
May 11 22:56:35.929 [Notice] Bootstrapped 85%: Finishing handshake with first 
hop.
May 11 22:58:49.981 [Notice] Tor has not observed any network activity for the 
past 66 seconds. Disabling circuit build timeout recording.
May 11 22:58:50.314 [Notice] Tor now sees network activity. Restoring circuit 
build timeout recording. Network was down for 66 seconds during 1 circuit 
attempts.
May 11 22:59:56.135 [Notice] Tor has not observed any network activity for the 
past 67 seconds. Disabling circuit build timeout recording.
May 11 22:59:57.684 [Notice] Tor now sees network activity. Restoring circuit 
build timeout recording. Network was down for 68 seconds during 2 circuit 
attempts.
May 11 23:01:04.279 [Notice] Tor has not observed any network activity for the 
past 66 seconds. Disabling circuit build timeout recording.
May 11 23:01:04.587 [Notice] Tor now sees network activity. Restoring circuit 
build timeout recording. Network was down for 66 seconds during 1 circuit 
attempts.

Or I might see:

May 12 07:12:33.787 [Warning] Problem bootstrapping. Stuck at 85%: Finishing 
handshake with first hop. (DONE; DONE; count 10; recommendation warn)

I then use the Tor Browser Bundle with a VPN.  It works quickly and effectively.

Why does the original 'tor' get stuck at 10%.  Why does the Browser Bundle get 
stuck at 85%?  Why does the VPN work?

Finally, the Browser Bundle gives an error at ./start-tor-browser:

Qt: Session management error: None of the authentication protocols specified 
are supported

Does this matter and, if so, what can I do about it?  I am using Ubuntu 10.04.

Many thanks!
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] tor/netfilter: packets without uid

2012-05-12 Thread johnmurphy323
> >  echo 1 > /proc/sys/net/ipv4/tcp_rfc1337
> 
> not the right option; this is different, and to avoid an issue with time wait.
> 
> the feature i'm thinking of is time-wait negotiation, which can be
> tweaked to always put this state on the peer (or fail if not
> available).
> 
> last time i messed with this is was kernel build tweaks; probably too
> much for most tastes ;)
> 
> 
> regarding the match rules, why are you whitelisting a firefox
> instances? a robust setup is everything transparently routed, except
> for Tor PID, and only this PID. kernel originated traffic and all
> other application originated traffic is thus routed properly without
> bypass, assuming Tor itself is not vulnerable.

coderman,

thanks for your persisting interest in my issue. I appreciate it. Unfortunately 
your sysconf switches don't work for me. That's fine. I think I will simply 
drop non-uid 42 bytes packets from now on, without explicit logging. (I cannot 
afford a 72MiB syslog after a few days of computer usage)

Regarding my setup, it is not that simple. Actually I have four firefox users 
and four dedicated tor instances for these users. Each firefox is dedicated to 
special requirements.

I have lots of other users, each for dedicated use cases. All other users, 
including my main user, do not have internet access at all.

This setup-up is loosely based on the setup another Tor user presented on this 
very list a few years ago.

What I fear most is not a breach of my anonymity or the breakage of firefox due 
to exploitation (geez, browser suck so much these days). I fear the mix-up of 
application traffic which in turn breaks the anonymity of the application 
stream that I really want to be anonymous. E.g. I usually have all three 
browser opened, routing all of their traffic through the same tor instance is 
madness.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Basic questions from new user but...

2012-05-12 Thread Joe Btfsplk

On 5/11/2012 7:21 AM, Maxim Kammerer wrote:

On Fri, May 11, 2012 at 2:36 AM, Joe Btfsplk  wrote:

Isn't this approach very much a double edged sword?  From the link:

However, we recommend that even users who know how to use NoScript leave
JavaScript enabled if possible, because a website or exit node can easily
distinguish users who disable JavaScript from users who use Tor Browser
bundle with its default settings (thus users who disable JavaScript are less
anonymous).

It may be true that changing settings makes one's profile different, but
from all I've ever read, java script is responsible for more malicious
browser attacks than anything.  That's not so good.

Javascript atacks are, however, out of the scope for anonymity
research. The anonymity set reduction above, while purely theoretical
and of no practical significance, is in that scope. It's a typical
case of project focus shifting priorities to user's disadvantage.
Moreover, if many users turn Javascript off often, it is quite
possible that turning it off offers more (theoretical) anonymity due
to the possibility of fingerprinting users' browser versions by
browsers' respective Javascript quirks.


Can someone explain to non-Tor network experts in layman's terms (25 words
or<  ) :D, what exactly some one / entity HAS to be able to do in order to
profile that Joe has java script disabled,&  then be able to tie it to MY
(dynamic) IP address - at * that * moment (an address that could change
anytime), or to me physically, sitting here at 123 Oak St., Bumfk, ND?

It is not possible — anonymity set reduction only shifts your
anonymity towards pseudonymity. I would guess that most browser users
do not need true anonymity, however, and are fine with pseudonymity.


Then, what are the REAL world odds that out of all the exit nodes traffic,
which are constantly changing users, that someone can monitor enough nodes
AND be able to tie it directly to ONE specific person, w/ a real name&
physical address?  Are we talking that any 12 yr old w/ the right, free
software can do this, or "theoretically"?

Theoretically.
Thanks Maxim.  You may be 100% correct.  No disrespect, but these 
questions - esp. one about changing TBB setting(s) like js or using an 
addon not included in the package (assuming an addon doesn't "leak") 
seem like PRETTY important questions.


I think one of the devs w/ expertise in that area of Tor should answer 
the * real world explanation & chances * how those actions would 
realistically allow someone / entity to positively identify a PERSON, or 
lead them to that person's door, so users can understand.  Explanation 
should also probably be in FAQs.


I don't know your background or if you're associated w/ Tor Project in 
any way - I mean no disrespect.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Basic questions from new user but...

2012-05-12 Thread Elena Johnson

Much appreciated!

Yes, can anyone suggest email providers that will protect privacy and still 
work easily with Tor (? that don't require j's). 

> Date: Wed, 9 May 2012 22:04:58 -0500
> From: joebtfs...@gmx.com
> To: tor-talk@lists.torproject.org
> Subject: Re: [tor-talk] Basic questions from new user but...
> 
> On 5/9/2012 6:56 PM, Elena Johnson wrote:
> > I have a feeling other newbies might benefit. 3 questions below (if 
> > tor-talk is not appropriate for these questions, PLEASE let me know what 
> > the appropriate contact is) .
> >
> > I have read the FAQ's, much documentation, and searched the broader web but 
> > still have questions about browsing the internet with Tor (I'm using the 
> > whole Tor Browser Bundle):
> >
> > 1) Can I ANONYMOUSLY allow scripts for hotmail, gmail and yahoo mail using 
> > Tor browser?
> >-  hotmail -  I can’t sign in, I get the message:
> >"Windows Live ID requires JavaScript to sign in."
> >If I allow the script, use https and HTML and sign in then,
> > I can use NoScript to go through a series of "allowing 
> > scripts" from the following,
> > but I still can't open the email
> >  https://snt130.mail.live.com
> >  https://secure.shared.live.com
> >  https://secure.wlxrs.com
> >
> > - gmail: Google requires scripts to create account (I WAS able to 
> > access HTML email
> >   without  scripts - very very useful and good, THANKS)
> >
> > 2) If I allow scripts ONE TIME, does that blow my anonymity for ALL TIME or 
> > just during that browsing session. In other words, is the info then stored 
> > somewhere that can be retroactively analyzed to reveal my IP address?
> >
> > -
> > I had this experience on the Tor site:
> > - I'm going through the Tor FAQ page and try to link to:
> >
> >   irc channel
> >
> >   tor-talk@lists.torproject.org
> >
> >   h...@rt.torproject.org
> >
> > -I'm assuming Tor is SAFE but for each of these, I get the MESSAGE:
> >
> >   "Load external content?
> >
> >   An external application is needed to handle:
> >
> >   mailto:h...@rt.torproject.org (etc.)
> >
> >   NOTE: External applications are NOT Tor safe by default and can 
> > unmask you!
> >
> >   If this file is untrusted, you should either save it to view 
> > while offline or in a VM,
> >
> >   or consider using a transparent Tor proxy like Tails LiveCD or 
> > torsocks."
> >
> >  - I'm guessing that YES! i can trust that I can use whatever
> > "external application" will allow me to access these Tor support
> > services, BUT I'M NOT ABSOLUTELY SURE. This leads to my third question:
> >
> > 3) Can I ANONYMOUSLY load "external content" using an "external 
> > application"? Does the answer depend on THE SITE I am browsing, the 
> > particulars of the "external application" needed, and the specific 
> > "external content"?
> >  
> 
> Welcome!
> I'm not the foremost expert on Tor & external apps.  Others can chime in 
> or correct my suggestions.  You ARE using the Tor browser bundle - TBB - 
> aren't you?
> 1) If you really want privacy / anonymity, maybe Live Mail, Gmail 
> shouldn't be your choice - at least when using Tor.  The companies 
> behind them are noted for a lot of privacy invasions.  A lot of mail 
> providers seem to require js, but maybe others can suggest some (or 
> methods) that don't require it.  I'm quite sure some providers don't 
> require js.
> 
> 2) AFAIK just for that session.  But, if it's for an email acct that you 
> tried to create anonymously thru Tor - IF - say Gmail, tied you to a 
> real IP address & provider, then you don't have much anonymity for that 
> acct from then on.  That's assuming anyone, including Gmail cares to 
> pursue it.  I'm assuming it warning you about accessing 
> h...@rt.torproject.org means using your mail client.  In their default 
> state, email clients CAN leak info about you.
> 
> Which external content (type) & which application is it trying to use?  
> It does make a difference.  Yes, some can leak certain data.  Some apps 
> can be "torrified," to lesser or greater extents.  Instructions used to 
> be on the Tor documentation site for diff apps, but may have been 
> removed.  May also be wiki articles.
> 
> 3) See ans. # 2.  It's an "it all depends" question that comes up 
> often.  It's not so much the site (unless they use advanced tracking 
> techniques & you have js enabled, etc.), as the external app being 
> used.  In general, heed the warning about loading external content, if 
> true anonymity is desired.   The application could matter because it 
> dictates the type of application needed.  Part of it depends on what 
> you're trying to conceal from whom.NSA?  You may be screwed.  You'll 
> have to research IF the apps needed (& specific o

Re: [tor-talk] Basic questions from new user but...

2012-05-12 Thread SiNA Rabbani
https://help.riseup.net/en/email

--SiNA

On 05/12/2012 03:16 PM, Elena Johnson wrote:
> 
> Much appreciated!
> 
> Yes, can anyone suggest email providers that will protect privacy and still 
> work easily with Tor (? that don't require j's). 
> 
>> Date: Wed, 9 May 2012 22:04:58 -0500
>> From: joebtfs...@gmx.com
>> To: tor-talk@lists.torproject.org
>> Subject: Re: [tor-talk] Basic questions from new user but...
>>
>> On 5/9/2012 6:56 PM, Elena Johnson wrote:
>>> I have a feeling other newbies might benefit. 3 questions below (if 
>>> tor-talk is not appropriate for these questions, PLEASE let me know what 
>>> the appropriate contact is) .
>>>
>>> I have read the FAQ's, much documentation, and searched the broader web but 
>>> still have questions about browsing the internet with Tor (I'm using the 
>>> whole Tor Browser Bundle):
>>>
>>> 1) Can I ANONYMOUSLY allow scripts for hotmail, gmail and yahoo mail using 
>>> Tor browser?
>>>-  hotmail -  I can’t sign in, I get the message:
>>>"Windows Live ID requires JavaScript to sign in."
>>>If I allow the script, use https and HTML and sign in then,
>>> I can use NoScript to go through a series of "allowing 
>>> scripts" from the following,
>>> but I still can't open the email
>>>  https://snt130.mail.live.com
>>>  https://secure.shared.live.com
>>>  https://secure.wlxrs.com
>>>
>>> - gmail: Google requires scripts to create account (I WAS able to 
>>> access HTML email
>>>   without  scripts - very very useful and good, THANKS)
>>>
>>> 2) If I allow scripts ONE TIME, does that blow my anonymity for ALL TIME or 
>>> just during that browsing session. In other words, is the info then stored 
>>> somewhere that can be retroactively analyzed to reveal my IP address?
>>>
>>> -
>>> I had this experience on the Tor site:
>>> - I'm going through the Tor FAQ page and try to link to:
>>>
>>>   irc channel
>>>
>>>   tor-talk@lists.torproject.org
>>>
>>>   h...@rt.torproject.org
>>>
>>> -I'm assuming Tor is SAFE but for each of these, I get the MESSAGE:
>>>
>>>   "Load external content?
>>>
>>>   An external application is needed to handle:
>>>
>>>   mailto:h...@rt.torproject.org (etc.)
>>>
>>>   NOTE: External applications are NOT Tor safe by default and can 
>>> unmask you!
>>>
>>>   If this file is untrusted, you should either save it to view 
>>> while offline or in a VM,
>>>
>>>   or consider using a transparent Tor proxy like Tails LiveCD or 
>>> torsocks."
>>>
>>>  - I'm guessing that YES! i can trust that I can use whatever
>>> "external application" will allow me to access these Tor support
>>> services, BUT I'M NOT ABSOLUTELY SURE. This leads to my third question:
>>>
>>> 3) Can I ANONYMOUSLY load "external content" using an "external 
>>> application"? Does the answer depend on THE SITE I am browsing, the 
>>> particulars of the "external application" needed, and the specific 
>>> "external content"?
>>>  
>>
>> Welcome!
>> I'm not the foremost expert on Tor & external apps.  Others can chime in 
>> or correct my suggestions.  You ARE using the Tor browser bundle - TBB - 
>> aren't you?
>> 1) If you really want privacy / anonymity, maybe Live Mail, Gmail 
>> shouldn't be your choice - at least when using Tor.  The companies 
>> behind them are noted for a lot of privacy invasions.  A lot of mail 
>> providers seem to require js, but maybe others can suggest some (or 
>> methods) that don't require it.  I'm quite sure some providers don't 
>> require js.
>>
>> 2) AFAIK just for that session.  But, if it's for an email acct that you 
>> tried to create anonymously thru Tor - IF - say Gmail, tied you to a 
>> real IP address & provider, then you don't have much anonymity for that 
>> acct from then on.  That's assuming anyone, including Gmail cares to 
>> pursue it.  I'm assuming it warning you about accessing 
>> h...@rt.torproject.org means using your mail client.  In their default 
>> state, email clients CAN leak info about you.
>>
>> Which external content (type) & which application is it trying to use?  
>> It does make a difference.  Yes, some can leak certain data.  Some apps 
>> can be "torrified," to lesser or greater extents.  Instructions used to 
>> be on the Tor documentation site for diff apps, but may have been 
>> removed.  May also be wiki articles.
>>
>> 3) See ans. # 2.  It's an "it all depends" question that comes up 
>> often.  It's not so much the site (unless they use advanced tracking 
>> techniques & you have js enabled, etc.), as the external app being 
>> used.  In general, heed the warning about loading external content, if 
>> true anonymity is desired.   The application could matter because it 
>> dictates the type of application needed.  Part of it depends on w

Re: [tor-talk] Basic questions from new user but...

2012-05-12 Thread Elena Johnson

1) "TBB is modified so that JavaScript shouldn't hurt anonymity."
OK so I can safely allow JavaScript with my emails and be anonymous.
Confusing because NoScript says:
  "Allow scripts globally (dangerous)."

2) "The TorBrowserBundle (TBB) should allow scripting by default"
Confusing because when I log into Tor using TBB the NoScript icon has a red 
slash through it. If I go to any site, e.g. Kmart.com or mozilla a window opens 
up at bottom and says:
Scripts currently forbiddenOptions... Allow 
https://mozilla.org
So I have the option to allow it but by default it is not allowed.

Hope these questions can help other low-tech users.

When I'm on TBB, the NoScript icon has a red slash through it. 
> Date: Thu, 10 May 2012 19:13:05 +0200
> From: bastik@googlemail.com
> To: tor-talk@lists.torproject.org
> Subject: Re: [tor-talk] Basic questions from new user but...
> 
> Elena Johnson, 10.05.2012 01:56:
> > 1) Can I ANONYMOUSLY allow scripts for hotmail, gmail and yahoo mail using 
> > Tor browser?
> 
> The TorBrowserBundle (TBB) should allow scripting by default. It uses an
> modified (aka patched) Firefox, which is re-branded to Tor Browser, and
> ships with NoScript, which is set to allow JavaScript globally.
> 
> This has been done to avoid the problems you mentioned. TBB is modified
> so that JavaScript shouldn't hurt anonymity.
> 
> Regards,
> bastik_tor
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
  
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk