Re: [tor-talk] Tor transparent proxy leaks?

2013-04-02 Thread grarpamp
A) The rules might be wrong
B) Lsof may be seeing pre-nat connection addresses
C) Don't include unrelated datas like rpcbind, ssh, etc
when your concern is some other app.

Those attempting to debug their setup should
be running tcpdump or wireshark on their internal
and external interfaces, etc. Lsof isn't the sort
of tool to use to see what just flew by.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Can OpenVPN servers be run as Tor hidden services?

2013-04-02 Thread Bernhard R. Fischer
On Wednesday 27 March 2013 07:36:42 mirimir wrote:
> On 03/27/2013 05:38 AM, Bernhard R. Fischer wrote:
> > On Wednesday 27 March 2013 04:59:41 mirimir wrote:
> >> OpenVPN clients connect with servers via Tor in TCP mode.
> >> 
> >> But can OpenVPN servers be run as Tor hidden services?
> >> 
> >> I searched quite a bit, but didn't find anything. That's surprising,
> >> because (in retrospect) the idea seems so obvious.
> >> 
> >> What am I missing?
> 
> 
> 
> > If you are trying to build an IP connection between hosts based on hidden
> > services, you may also use OnionCat. It does exactly what you are looking
> > for.
> > 
> > https://www.cypherpunk.at/onioncat/
> 
> Thank you. I didn't think of OnionCat, although I've read about it before.
> 
> Using OnionCat, would I be establishing a private point-to-point
> connection to the remote IPv6 address? Or would I be connecting to a
> common multi-point VPN, through which I could reach the remote IPv6
> address?


OC works point-to-point but of course several "clients" could connect to one 
central point. I put "clients" under quotes because OC implements the peer-to-
peer-model and not the client-server-model.

Since it offers a transparent IP connection you can additionally setup any 
kind of routing.


Regards,
Bernhard


signature.asc
Description: This is a digitally signed message part.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Can OpenVPN servers be run as Tor hidden services?

2013-04-02 Thread Bernhard R. Fischer
On Wednesday 27 March 2013 17:20:10 grarpamp wrote:
> >> https://www.cypherpunk.at/onioncat/
> > 
> > Using OnionCat, would I be establishing a private point-to-point
> > connection to the remote IPv6 address? Or would I be connecting to a
> > common multi-point VPN, through which I could reach the remote IPv6
> > address?
> 
> Read through the given link, the connection model is detailed there.
> OnionCat does not yet perform optional source authentication HS
> handshake, so if you want that you'll need another layer.

Yes, you are right. The destination OC reuses the TCP session of the incoming 
connection.

But it would be not much effort to implement this into OC. Actually I did it 
by intense because using a separate connection back would double the HS 
connection setup time which was extremely high (up to 30 seconds) at the time 
OC was developed.

We are currently polishing the website, the code of OC and so on up. Probably 
I'll add this feature.

Bernhard


signature.asc
Description: This is a digitally signed message part.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] unable to create bitmessage forum account via Tor

2013-04-02 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Jonathan,
(CC tor-talk)

thanks for your work on bitmessage.
I reviewed your papers and wanted to give you some feedback and
suggestions (problems we try to prevent in torbirdy [1]) in your forum
at [2] but I was unable to do so (forum thinks I'm a spamer [3]).

I didn't want to send my feedback via direct email because I wanted to
have an open discussion.

It would be great if you could allow me (and others) to create a forum
account via Tor.

thanks!

btw: is there a bitmessage pseudo-mailing list about bitmessage?
(besides announce)




[1] https://trac.torproject.org/projects/tor/wiki/torbirdy
[2] https://bitmessage.org/forum
[3] "The user tagnaq with Email tag...@gmail.com (IP ) is
a Spam, please contact forum administrator."
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlFbKAAACgkQyM26BSNOM7Yb4wD+JiJJR8Pi+lUAlecGUaxmsfcy
wtlA0C1hfcAIwgxFh2wA/0mb74KOfDltih9q0C0HJ7EVqVYdLs4wUuQJeZ9TiJIO
=BzPs
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Image blocking on Wordpress-based hidden services

2013-04-02 Thread Griffin Boyce
  Back in January, I created a couple of WordPress plugins that strip
images and other media from posts programmatically (without removing theme
images).

https://github.com/glamrock/wp-imageless

  "wp-imageless" removes image/img tags, while "wp-medialess" removes
img/image/object/embed/video/iframe tags.

  I wrote it to scratch my own itch, to make moderation easier.  If you're
running a hidden service using wordpress, you might find it useful.  This
will work with WP multi-site and is backwards-compatible to v1.5.

  As a sidenote, if you're running a blog network as a hidden service,
please send me a link as I've yet to hear of one. :D

best,
Griffin

-- 
Please note that I do not have PGP access at this time.
OTR: sa...@jabber.ccc.de / fonta...@jabber.ccc.de
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk