[tor-talk] Problem with TransPort etc.

2012-04-21 Thread Anders Andersson
I am trying to route all traffic from one specific user on one machine on
my LAN through Tor, but I am having difficulties. There is probably
something I have neglected to configure.

What is special with my setup is that I run Tor on one of my servers
(debian). I would like to keep doing this. I am aware that my traffic is
flowing in cleartext over my LAN.

On this server, Tor is running fine, with the following in torrc:
TransPort 10.x.x.x:19050
DNSPort 10.x.x.x:19053
VirtualAddrNetwork 10.192.0.0/10

10.x.x.x is that server's address on the LAN. 'netstat' shows that Tor is
listening on these ports.

On my client machine, I have created a user called 'torvm'. I have added
these two iptables rules:
# iptables -A OUTPUT -t nat -p tcp -m owner –-uid-owner torvm -j DNAT --to
10.x.x.x:19050
# iptables -A OUTPUT -t nat -p udp --dport 53 -mowner --uid-owner torvm -j
DNAT --to 10.x.x.x:19053

The client is running Ubuntu. I doubt this is relevant at the moment.

Now I test this setup on my client:
$ w3m -dump_head www.sunet.se

What happens is this:

1. The client sends the packets to the server on the correct address and
port. This can be seen from a tcpdump trace [1].

2. I do not get any output from my test command on the client. Without the
iptables rules, I do get the expected output.

3. The Tor log shows a warning message: "getsockopt() failed: Protocol not
available".
I don't know if this is the root of the problem. Googling for this in
relation to Tor does not show anything that seemed relevant.
Nothing relevant shows up in syslog that is not also in Tor's log.

I hope someone here can help me.

I'm using Tor 0.2.3.13-alpha-dev (git-627c37ad6a06e3aa)


// Anders



[1] Trace of tcpdump on the server:
IP client.domain.39585 > server.domain.19053: UDP, length 30
IP server.domain.19053 > client.domain.39585: UDP, length 30
IP client.domain.51077 > server.domain.19053: UDP, length 30
IP server.domain.19053 > client.domain.51077: UDP, length 30
IP server.domain.49591 > gateway.domain.domain: 6+ PTR?
x.x.x.10.in-addr.arpa. (41)
IP client.domain.58550 > server.domain.19053: UDP, length 43
IP server.domain.19053 > client.domain.58550: UDP, length 43
IP gateway.domain.domain > server.domain.49591: 6* 1/0/0 PTR
client.domain. (76)
IP client.domain.35406 > server.domain.19053: UDP, length 43
IP server.domain.19053 > client.domain.35406: UDP, length 43
IP server.domain.55162 > gateway.domain.domain: 33538+ PTR?
x.x.x.10.in-addr.arpa. (41)
IP client.domain.41624 > server.domain.19053: UDP, length 30
IP server.domain.19053 > client.domain.41624: UDP, length 46
IP gateway.domain.domain > server.domain.55162: 33538* 1/0/0 PTR
gateway.domain. (75)
IP client.domain.46034 > server.domain.19050: Flags [S], seq 3208505086,
win 14600, options [mss 1460,sackOK,TS val 4208312 ecr 0,nop,wscale 7],
length 0
IP server.domain.19050 > client.domain.46034: Flags [S.], seq 1175066879,
ack 3208505087, win 5792, options [mss 1460,sackOK,TS val 13096141 ecr
4208312,nop,wscale 4], length 0
IP client.domain.46034 > server.domain.19050: Flags [.], ack 1, win 115,
options [nop,nop,TS val 4208312 ecr 13096141], length 0
IP client.domain.46034 > server.domain.19050: Flags [P.], seq 1:233, ack 1,
win 115, options [nop,nop,TS val 4208312 ecr 13096141], length 232
IP server.domain.19050 > client.domain.46034: Flags [.], ack 233, win 429,
options [nop,nop,TS val 13096141 ecr 4208312], length 0
IP server.domain.19050 > client.domain.46034: Flags [R.], seq 1, ack 233,
win 429, options [nop,nop,TS val 13096141 ecr 4208312], length 0


[2] Tor log:
[info] evdns_server_callback(): Got a new DNS request!
[info] evdns_server_callback(): None of the questions we got were ones
we're willing to support. Sending NOTIMPL.
[info] evdns_server_callback(): Got a new DNS request!
[info] evdns_server_callback(): None of the questions we got were ones
we're willing to support. Sending NOTIMPL.
[info] evdns_server_callback(): Got a new DNS request!
[info] evdns_server_callback(): None of the questions we got were ones
we're willing to support. Sending NOTIMPL.
[info] evdns_server_callback(): Got a new DNS request!
[info] evdns_server_callback(): None of the questions we got were ones
we're willing to support. Sending NOTIMPL.
[info] evdns_server_callback(): Got a new DNS request!
[debug] connection_add_impl(): new conn type Socks, socket -1, address
10.x.x.x, n_conns 7.
[info] evdns_server_callback(): Passing request for [scrubbed] to
rewrite_and_attach.
[debug] connection_ap_handshake_rewrite_and_attach(): Client asked for
[scrubbed]:0
[info] addressmap_rewrite(): Addressmap: rewriting [scrubbed] to [scrubbed]
[info] evdns_server_callback(): Passed request for [scrubbed] to
rewrite_and_attach_if_allowed.
[debug] conn_read_callback(): socket 53 wants to read.
[debug] connection_handle_listener_read(): Connection accepted on socket 12
(child of fd 53).
[debug] connection_add_impl(): new conn type Socks, socket 12, address
10.x.x.x, n_conns 8.
[debug] connect

Re: [tor-talk] How to protect a hidden service from DoS attacks?

2011-03-04 Thread Anders Andersson
On Fri, Mar 4, 2011 at 11:09 PM,   wrote:
> Is it even possible? Since everyone is your entry node's IP, if you block it,
> no one will be able to connect to your service.
>
> Some people DoS hidden services to moderate you, making them unreadable.

DoS on the "external" internet seems to be 99% overloading the server
CPU that have badly written and bloated server-side scripts. To
protect from this, don't use badly written and bloated server-side
scripts.

Depending on what you use the service for, you can try to rate-limit
everything to something that is just above usable. I suppose this
wouldn't tax your server CPU with unnecessary encryption.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] torrc consistency

2011-03-09 Thread Anders Andersson
On Wed, Mar 9, 2011 at 2:56 PM,   wrote:
> Seems that there are already kind of a convention in the way it is
> written :
>
> - Lines starting with '## ' are descriptions of a block of items
> - Lines starting with '#' are commented items.
> - Items are in the form of 'Item value'
> - Items sometimes have short descriptions/examples following them on the
>  same line, beginning by a #
>
> The last point is the one that lacks consistency. Sometimes items
> descriptions/examples are on top of the concerned item, sometimes on the
> same line, right after the item.
>
> That would make the job easier if there was a clear convention for this
> file, and if it was applied correctly everywhere.
>
> What do you think? What would be the best way to write this file?

Sounds to me that everything after a '#' is a comment, like in pretty
much every other config file or scripting language. How can this be a
problem?
Why should Config::Model even bother about comments?

Also, "if it was applied correctly everywhere" will obviously break if
one allows the user to modify the file, and if the user modifications
are valid syntax.

It seems that I have missed something that you find important.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Iran cracks down on web dissident technology

2011-03-21 Thread Anders Andersson
On Mon, Mar 21, 2011 at 4:32 AM, Ali-Reza Anghaie  wrote:
> I find it curious that ~credibility~ of tor is being called into
> question by some. The source is readily available, the libraries it
> compiles against are readily available, the change logs, code control
> records, etc. are all readily available. Certain contributors to tor
> have come under fire from various Governments and private
> institutions. For bloody sin sake EVERYTHING has had Uncle Sam
> involved in some variable way at this point. Linux, GCC, sendmail,
> bind, etc. etc.
>
> FUD is an energy stealer and if you can afford that energy loss then
> at least put it to good use auditing and tracking down bugs or any
> backdoors you suppose. -Ali

I think that it's more curious that someone used Tor and didn't know
that it used to be a military research project. Like the internet.

But to be honest, if you don't know anything about programming it
doesn't matter that the source code is available, how are you supposed
to check? Pay someone a ridiculous amount of money to check it for
you? And there's no way to know how many independent programmers have
validated the source code. In a scenario where the military actually
would hide something in the source, all programmers working on the
project would of course be in on it together. There are only a handful
of them.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Iran cracks down on web dissident technology

2011-03-21 Thread Anders Andersson
On Mon, Mar 21, 2011 at 1:59 PM, Joe Btfsplk  wrote:

> I've never known Sam to get involved in, or fund something - especially like
> this - * w/o wanting something in return.*  Ever.  WHETHER or not they make
> known, to anyone, what they want or intend to do.  It's been shown for over
> 50 - 60 yrs (probably much longer) that even people in charge of entire govt
> projects (or govt funded ones), often don't know the  *full* extent of
> what's being done w/ the research, technology, info, etc.  If you want to
> ignore history, go ahead.

What they have gained with the Tor project, and I'm just brainstorming
here because I'm from Sweden and don't know much about the internals
of DoD, is this:

They need a project like Tor as much as "we" do, if not more. They
need ways to communicate with spies and dissidents located all over
the world, they need a system that let their people do this without
causing any suspicion.

With Tor, they have such a tool, and the openess of the software and
source code means that it's more thoroughly tested than they could
ever have done in secret. It is likely that they have a highly
modified version of Tor and that they are watching the Tor project
very carefully as a research project to see the strengths and
weaknesses with such a project.

Planting backdoors in software like this is pretty useless and
ineffective, because you can only use it once. As soon as you act on
information received, there is a very big chance that the backdoor
will be uncovered, Tor will lose all credibility, and no one will ever
again use it for anything that the US would seem interesting.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] To Toggle, or not to Toggle: The End of Torbutton

2011-04-11 Thread Anders Andersson
On Tue, Apr 12, 2011 at 1:33 AM, Mike Perry  wrote:
> (blah blah)
> The reason I am discussing this in so much detail here is because I
> believe there is a chance that there are users out there who rely on
> the toggle model and/or their OS Firefox build, and may be confused or
> enraged by the new model. I'm asking this list to get an idea of how
> many of those users there are, and to try to understand what the
> overall costs of this sort of migration are.
>
> I also ask this because I am a heavy user of the toggle model myself,
> and abandoning it is sort of a leap of faith for me, too.
>
> So can anyone bring up any specific issues that may be caused by the
> change?

I consider myself a rather technical user with a lot of knowledge
about the pitfalls of using Tor and security products in general, and
I'm scared shit whenever I want to use torbutton in firefox because
I'm afraid I will forget to toggle it, or toggle it at the wrong time,
or simply do anything wrong. I have created a separate firefox profile
with torbutton always on, and one profile without it, and separating
these is the only sane way.

Thus, I can only agree to 100% that this is a good idea.

The only problem I can come up with at 2 AM is that maintaining a
separate firefox can be a little messy in various linux distributions
unless you happen to have someone build a nice binary for you. I
suppose most of the common distributions will be covered with a
tor-repository and the minor distributions will generally have more
knowledgable users so they can take care of the evenutal mess.


// pipe
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] detecting harmful relays

2011-06-01 Thread Anders Andersson
On Wed, Jun 1, 2011 at 1:46 PM,   wrote:
> On Wed, Jun 01, 2011 at 05:31:41AM +, krak...@googlemail.com wrote 1.9K 
> bytes in 45 lines about:
> : A few weeks ago, there was one that tried to give me a .bin file
> : whenever I tried to visit a non-SSL website, but I haven't had a
> : problem like that since. I always rejected the .bin file.
>
> I don't think this is a malicious relay, as I get these from time to
> time as well.  It only happens with firefox and only when going through
> really busy exit relays.  I think it's firefox misinterpreting a partial
> stream of data as a binary file.

Not to mention there are thousands of better and easier ways to run a
malicious relay than to replace everyones data with unnamed binary
downloads.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] help!!

2011-08-20 Thread Anders Andersson
On Sat, Aug 20, 2011 at 4:53 PM, Aditya Sharma  wrote:
> My university has blocked many sites that i think ought not to be blocked..
> This made me install the tor
> At first it worked and would easily open the blocked sites but then after 2
> days the tor would not connect to its server as if the tor itself has been
> blocked...
> Please help me out of this problem.
> Regards
> Aditya

If you're paying a tuition fee to your school, you could ask them what
they are doing and why they are blocking the internet. Then demand
that they open up the sites they have blocked. You should easily be
able to get a lot of students to back you up. This would probably make
your internet experience better than if you all install Tor.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] ISP surveillance.

2014-07-24 Thread Anders Andersson
They will know that you are using Tor, but not what you are doing with Tor.

Check this nice overview: https://www.eff.org/pages/tor-and-https

You can click the buttons and see what everyone knows about you.

On Thu, Jul 24, 2014 at 7:24 PM, Marcos Eugenio Kehl
 wrote:
>
>
>
> Hello experts!
> TAILS, running by usb stick, protect me against forensics tecnics in my pc. 
> Ok.
> TOR, running as a client only or as a relay, protect (theoretically) my 
> privacy. Ok.
> But... if my static IP, provided by my ISP, is under surveillance by a legal 
> requirement, what kind of data they can sniff?
>
>  I mean, my connection looks like a simple HTTPS, or they know I am diving 
> into the Deep Web, "hacking the world"? Could the ISP capture the downloads 
> dropping into my pc when running TAILS?
> If so, TOR Socks (proxy + TOR) is the pathway to deceive and blindfold my ISP?
>
> https://www.torproject.org/docs/proxychain.html.en
>
> Thanks.
>
> Marcos Kehl (Brazil)
>
>
>
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Why make bad-relays a closed mailing list?

2014-07-31 Thread Anders Andersson
And since it's not possible to do this right without any leaks due to
software bugs, planted flaws and insiders, the only thing it will lead
to is to make it impossible for the users to verify the decisions
leading up to which servers are bad. The NSA will still get your
precious warnings.

On Thu, Jul 31, 2014 at 1:44 PM,   wrote:
> Actually...
>
> A bad-relays mailing list would IMO take a degree of care to do right,
> considering that email gets gathered at the packet level by intelligence
> agencies who are expected to be initiating attacks. Sensitive stuff would
> belong as GPG or PGP emails or similar. Juicy details regarding bad-relays
> discussion should be tighter than even a closed mailing list, is my thought.
>
>
>
>
>
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Cause of drops in network congestion on 2013-10-09 and 2014-06-06

2014-08-07 Thread Anders Andersson
Why do you think they belong to different groups? It's absolutely not
obvious if the colorization is removed. All of your "groups" have a
preceding slope indicating that something started before your limits,
and they seem to be normal variations of a general down slope that
started in 2013.

On Fri, Aug 8, 2014 at 12:54 AM, Virgil Griffith  wrote:
> I've been looking through the various historical data from
> metrics.torproject.org.
>
> If you plot the 'used bandwidth' divided by the 'advertised bandwidth'
> (meant to be a rough measure of network congestion), you get three distinct
> groups, seen here:
>
> http://dl.dropbox.com/u/3308162/three_groups.png
>  What happened on the dates 2013-10-09 and 2014-06-06 which could have
> resulted in these striking drops in network congestion?
>
> -V
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-13 Thread Anders Andersson
On Wed, Aug 13, 2014 at 12:06 PM,   wrote:

> If it's possible for the owner of a hidden service (whether the FBI or a
> regular person) to install malware which grabs visitors' IPs, then what is
> stopping any hidden service owner from doing this?

Nothing is stopping a hidden service owner from doing anything that an
operator on the open net can do.


> Considering the number of individuals that must have visited the hidden
> service, this doesn't seem to be very many people. Why were so few
> identified? Were the 25 using outdated browsers (TBB)?
>
> How, in this case, was it possible for the FBI to learn the IP addresses of
> visitors to this hidden service? The Tor hidden server page states that "In
> general, the complete connection between client and hidden service consists
> of 6 relays: 3 of them were picked by the client with the third being the
> rendezvous point and the other 3 were picked by the hidden service."
>
> Can someone knowledgeable please explain how visitors to a Tor hidden
> service can have their real IPs detected?

AFAIK the malware used javascript to break the users' browsers. As
someone who argues against using javascript in any context, I can only
say "told you so", but that doesn't really help anyone. :)

Because they managed to get in to the client browser, they could learn
the real IP address and MAC address, they didn't learn this through
Tor.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-14 Thread Anders Andersson
On Wed, Aug 13, 2014 at 11:56 PM, Aymeric Vitte  wrote:

>>   As
>> someone who argues against using javascript in any context, I can only
>> say "told you so", but that doesn't really help anyone. :)
>
> No and you are wrong

>From 
>https://lists.torproject.org/pipermail/tor-announce/2013-August/89.html
"An attack that exploits a Firefox vulnerability in JavaScript has
been observed in the wild."
People who didn't allow javascript were safe.


>> Because they managed to get in to the client browser, they could learn
>> the real IP address and MAC address
>
> and the color of your shirt

Why are you so defensive? Is it your code they broke? They could learn
the color of my shirt if the browser user has access to a webcam,
which is not uncommon. This is however highly irrelevant.


>> , they didn't learn this through
>> Tor.
>
> Are you serious in your answer?

Very much so. If you don't believe me, then maybe you'll believe these sources:

https://lists.torproject.org/pipermail/tor-announce/2013-August/89.html
https://www.mozilla.org/security/announce/2013/mfsa2013-53.html

Nothing was exploited through Tor. In fact, they couldn't find out who
was using the server *because* people used Tor. So they had to resort
to javascript exploits.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pattern In Tor Addresses

2014-08-15 Thread Anders Andersson
On Fri, Aug 15, 2014 at 5:07 AM, Ben Healey  wrote:
> Below is they address changed into numbers.
> Letters changed into numbers starting with a-1 through z-26.
> The numbers are the numbers 1.2.3..
>
> I then added all them together.
>
> Then divided the totals by 2.
>
> Results:
> -
> 8 2 4 2 13 23 19 20 18 6 11 12 2 19 9 6174 /2 87  /2 43.5
> 2 7 9 3 2 7 7 8 21 8 18 5 7 2 4 4  114 /2 57  /2 28.5
> 26 17 11 20 8 3 21 9 13 22 24 7 12 6 18 9  226 /2 113 /2 56.5
> 16 7 10 1 6 3 6 26 15 5 1 18 10 15 6 9 154 /2 77  /2 38.5
> 5 8 1 2 11 8 14 20 17 10 4 20 3 11 10 17   161 /2 80.5
> 11 4 10 13 4 5 3 3 16 14 19 6 5 4 3 3  123 /2 61.5
> 2 7 9 3 2 7 7 8 21 8 18 5 7 2 4 4  114 /2 57  /2  28.5
> 2 12 3 10 7 3 20 1 12 21 8 23 9 4 24 5 164 /2 82  /2  41 /2 20.5
>
> They all seem to at some point end in a half number???

I continued on your research to see if I could find a pattern, and I
found something very interesting.
I took all the numbers you found, put them next to each other, like "8
2 4 ... 2 7 9 3 ... 4 24 5". Then I removed the duplicates and sorted
this list so I got them in a better order, like "1 2 ... 24 26".
If I print a line for every number which has the same width as the
actual number, I got a triangle like this:

1: #
2: ##
3: ###
4: 
5: #
6: ##
...

Just like the triangle associated with the Illuminati. I think the Tor
developers have a lot to explain here.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Help test a new RBG

2014-08-21 Thread Anders Andersson
> We have placed MKRAND - A Digital Random Bit Generator, on GitHub, and it
> would be helpful to receive some feedback regarding its potential use in
> the TOR project.

What benefit would it give? What would it replace? This seems to me to
solve a problem that has already solved, but in an obfuscated way
filled with new age buzzwords.

"Syntropic Randomness is a co-creative act between Man, Machine, and
Universe." - exactly how high do you have to be to write such things?


> This RBG does not use mathematical methods, and thus does not suffer from
> wraparound issues or dependency on ALU architectures.

Has this ever been an issue? You mention dependency on ALU
architectures while still talking about clock cycles in your comments
- are these some kind of virtual clock cycles then?


> The RBG can be considered alpha-quality at this stage and is not ready for
> production use, however it is appropriate for research into new kinds of
> obfuscation protocols and key generation schemes.

what kind of obfuscation protocols?

Yeah, I think a paper is necessary here..
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Third-parties tracking me on Tor

2014-08-21 Thread Anders Andersson
> After using Tor for some years I realized that third-parties can determine 
> what sites I visit when watching my internet activity.

What do you mean by third-parties?



> When I visit hidden services how can they know what site it is or know what 
> site I visit that's not on Tor?

Why do you think they know?



> How did they know I was using TorMail when it was available and the content 
> of the e-mail I sent?

Who are "they"?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TOR tried to take a snapshot of my screen

2014-08-25 Thread Anders Andersson
On Mon, Aug 25, 2014 at 8:22 PM,
 wrote:

> I did a new upload to a popular JPG hosting service. Here they are:
> http://i.imgur.com/QAKp7k1.jpg (Zemana log)
> http://i.imgur.com/nJkCQJp.jpg (Zemana version)
> http://i.imgur.com/06ZW0IK.jpg
> http://i.imgur.com/XsbpQ4X.jpg
> http://i.imgur.com/eikxgpe.jpg
> http://i.imgur.com/jWjAq5N.jpg
> http://i.imgur.com/iuqltM0.jpg
> http://i.imgur.com/01cuLYd.jpg
> http://i.imgur.com/ijnZwGs.jpg


Seriously, you're running Tor in a 12 year operating system that
haven't seen any security updates for several months, and you blame it
on Tor? If you think Tor is shady because it's received government
funding, you should perhaps investigate Microsoft's deals with the
NSA.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Copyright troll trying to shake down a Pirate Party member

2014-09-14 Thread Anders Andersson
On Fri, Aug 29, 2014 at 3:44 PM, Sebastian Mäki
 wrote:
> Someone had been downloading a torrent "This Ain't Game Of Thrones
> XXX" via TOR or my wireless network. The law firm Hedman Partners, who
> represent Hustler in Finland seemed to have made the assumption that
> it's ok hustle some money from me based on the IP-address alone.

Hi! You mention in the letter that you reported the threat to the
police. How did they respond?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] ICANN and .onion

2014-05-18 Thread Anders Andersson
A few years ago, ICANN started to accept suggestions for new top-level
domain names. A friend recently posted a .onion link to me, and it made me
realize that there might be a big problem if a company or organization
other than Tor actually registered .onion and made it work in any browser.

1) Has there been any discussions regarding the severity of the problem if
it should eventually happen? If so, are the discussions or the result of
them available online for reading?

2) Has Tor applied to ICANN about the .onion domain, or discussed the pro
and con of doing this?


I have been out of the Tor loop for a couple of years, so I'm sorry if this
topic has come up in previous discussions - regardless, I could not find an
answer.

// Anders
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] ICANN and .onion

2014-05-19 Thread Anders Andersson
On Mon, May 19, 2014 at 7:06 AM, grarpamp  wrote:

> Users leaking dns / failing to redirect dns into tor is not a tor problem.
>

I think that's a rather arrogant point of view. If it was not a Tor
problem, .onion would not be needed in the first place. Tor developers do
seem to work hard on making it difficult for a user to accidentally leak
information, so simply saying that users "failing to redirect dns into tor
is not a tor problem" is a little counterproductive.

If someone would register .onion I see two problems:

1) A malevolent registrar could redirect all .onion lookups to their own
proxy, essentially routing all "hidden" traffic through their own machine.
At the moment, clicking a .onion link means that it either routes through
Tor, or it fails loudly: there's no risk clicking such a link. This
behaviour would change to something that either routes through Tor and
you're safe, or you think it routes through Tor but it's actually decoded
by a third part. I think that's a usability issue, and not something that
should simply be ignored. Maybe it's not something that can easily be
solved, but that is why there must be a discussion about it. Maybe the only
solution is to strongly warn users.

2) Useful websites could actually pop up under .onion, making a plugin that
takes over that domain seem intrusive and less attractive. This is less of
a problem I think.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Ad Blocking Software

2014-06-10 Thread Anders Andersson
On Mon, Jun 9, 2014 at 9:18 PM, Antonio Z  wrote:
> I understand that it is not necessary, but I believe that making your
> own ad blocking software would bring more people to tor. It does not
> even have to come with the bundle. It could just be an optional add on
> called, Tor Ad blocker.
>
> Inappropriate ads are the main reason why I would just shift back to a
> browser in which I can maneuver easier.

What's wrong with any of the ad blockers already out there, like, adblock?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Running an exit node which exits on a different IP than it listens to

2014-06-24 Thread Anders Andersson
I have been sorting through my mailbox the last few days and stumbled
upon an email from 2012, from this mailing list. A worried user got a
false negative from check.torproject.org because an exit relay sent
exit traffic out on an IP that's different from what was advertised.

However, this made me think that it is perhaps not such a bad idea if
more exit relays did that, even slower ones. I have access to a couple
of IP numbers that I could easily configure in this way.

Basically: Use one IP for Tor traffic, and one IP for exit traffic.
The Tor traffic IP:Port is what would be advertised to the Tor
network, and only that.

The reason would be to minimize the chances of the exit IP ending up
in some overzealous blacklist. I'm pretty sure that a lot of the
blacklist operators just scrape the public list of relays and then
they end up in a lot of places where the customer is not even aware
what is being blocked. This is painfully obvious to people running a
non-exit relay from home, when trying to use IRC or other services.

Is this a good idea to do if you have the resources? Will it cause any
non-obvious problems? I guess one problem is that check.torproject.org
will show that you're not using Tor, unless it's been modified since
2012 to check this in another way.

I'm not sure if I'm making myself clear here, please ask me to clarify
if this is the case.

// Anders
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-02 Thread Anders Andersson
Unfortunately he doesn't seem to want to take this further, so the
ruling will stand. It's his choice, but it could be a very bad
deterrent to other potential exit node operators in Austria.

On Wed, Jul 2, 2014 at 10:54 PM, Moritz Bartl  wrote:
> On 07/02/2014 12:42 AM, ba...@clovermail.net wrote:
>> There are little details on this case:
>> https://network23.org/blackoutaustria/2014/07/01/to-whom-it-may-concern-english-version/
>>
>>
>> Does the Tor project has a defense support fund or a list of committed
>> pro bono lawyers in different countries for such cases?
>
> If any Tor operator has any trouble, please contact Tor and
> Torservers.net immediately so we help.
>
> This particular case went bad because of multiple reasons. We strongly
> believe that it can be easily challenged. While certainly shocking,
> lower court ruling should not be taken too seriously, and this won't
> necessarily mean that all Tor relays in Austria are now automatically
> illegal. The ruling only happened two days ago, there is no written
> statement from the court yet, so we should all be patient and wait for
> that before we make any assumptions. We will definitely try and find
> some legal expert in Austria and see what we can do to fight this.
>
> --
> Moritz Bartl
> https://www.torservers.net/
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread Anders Andersson
On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl  wrote:
> On 07/02/2014 11:00 PM, Anders Andersson wrote:
>> Unfortunately he doesn't seem to want to take this further, so the
>> ruling will stand. It's his choice, but it could be a very bad
>> deterrent to other potential exit node operators in Austria.
>
> We are in contact with William, and quite possibly there is the option
> of following this further with another Austrian operator who
> self-reports himself, with our help. Please everyone give us time to
> look into this together with some lawyers.

Thank you! That's amazing! I'm quite sure that the support you get
from the Tor community when running an exit node really helps in
giving people the courage to do so.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-08 Thread Anders Andersson
On Tue, Jul 8, 2014 at 2:32 AM, Joe Btfsplk  wrote:
> On 7/7/2014 6:04 PM, I wrote:
>> As for freedom of speech Australia has none legislated and does have
>> severe laws against sedition.
>> What other developed country can match that for discouraging speech?
>
> Well, 'Stralia is a penal colony, after all. :D  They have to keep all the
> prisoners on a short leash.
> Aussies don't have "freedom of speech" guaranteed in their constitution (or
> the equivalent)?

Did I miss the discussions when this changed from Austria to
Australia? Those two countries are bound to have very different legal
systems. I'm not sure Australia is on-topic for this thread.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Project is sued

2014-07-08 Thread Anders Andersson
Wait.. what..

He's suing Tor because it's possible to reach a clearnet website
through Tor2web? Talk about publicity stunt.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Letsencrypt and Tor Hidden Services

2015-08-19 Thread Anders Andersson
On Wed, Aug 19, 2015 at 8:43 PM, Alec Muffett  wrote:
>
> Hi, I'm Alec, and I am co-author of the Onion RFC draft with Jacob Appelbaum.
>
> Reports of the bogging-down have been greatly exaggerated, and I wish people 
> would stop repeating them.
>
> The status of the Onion RFC draft is viewable at:
>
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-onion-tld/
>
> ...and this afternoon I created some amendments to the draft to address IETF 
> and IANA concerns, and have circulated them amongst the team (me, Jake, Mark) 
> to see if I've goofed.
>
> We will merge them, soon, in good time for the next review.
>
> In the most recent review IANA in particular were very helpful, offering to 
> rewrite some of their stuff in order to make it abundantly clear to 
> CA/B-Forum that:
>
> 1) onion will be a special case
> 2) onion should never be delegated
> 3) but nonetheless SSL certificates should be issued for it
>
> ...which proactively addresses a concern from a few months back re: whether 
> CA/B-Forum would nitpick a "Special Use" designation.
>
> TL;DR - we are not past the finish line yet, and there is work to be done and 
> challenge, but we're not down nor are we out.
> --
> Alec Muffett
> Security Infrastructure
> Facebook Engineering
> London

Just wanted to  thank you for this work, I hope you succeed!

/ Anders
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What's to be Done

2015-08-24 Thread Anders Andersson
On Mon, Aug 24, 2015 at 10:08 AM, Apple Apple
 wrote:
> The problem is most users and developers (including the likes of Linus) do
> not care at all about security but will hit the roof in rage if the system
> is 0.1% slower or this buggy 30 year old Unix application does not work
> anymore.
>
> Is it realistic to incorporate real security into such a mainstream distro
> Debian or do we need to build/ fork a separate distro?

There's a lot of hyperbole here. Do you have anything to back this up?
Did someone actually try to improve the security but had to back down?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] IBM says Block Tor

2015-08-26 Thread Anders Andersson
I couldn't find what they mean with "the Netherlands is home to the
largest number of non-malicious and malicious nodes combined" in
Figure 1 on page 8. What differentiate a "malicious node" from a
"non-malicious node"?

Otherwise it wasn't that bad, but the last paragraph is quite offensive:

"In general, networks should be configured to deny access to websites
such as www.torproject.org"


On Thu, Aug 27, 2015 at 12:51 AM, grarpamp  wrote:
> http://public.dhe.ibm.com/common/ssi/ecm/wg/en/wgl03086usen/WGL03086USEN.PDF
>
> IBM Advises Businesses To Block Tor
>
> With Tor-based attacks on the rise, IBM says it's time to stop Tor in
> the enterprise.
>
> New data from IBM's X-Force research team shows steady increase in SQL
> injection and distributed denial-of-service attacks as well as
> vulnerability reconnaissance activity via the Tor anonymizing service.
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] IBM says Block Tor

2015-08-27 Thread Anders Andersson
On Thu, Aug 27, 2015 at 8:08 AM, CJ  wrote:
>
> People using Tor for "bad things" just don't realize how they fuck up
> the whole thing. Not even mentioning "weird contents", just the script
> kiddies running metasploit/other through Tor.

If the realize or not is irrelevant. They don't care about Tor, most
people don't. They will of course use Tor for whatever purpose they
want, as long as they can do it.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] New Ahmia search released

2016-01-03 Thread Anders Andersson
On Sun, Jan 3, 2016 at 5:52 PM, Nurmi, Juha  wrote:
> I released refactored new version of Ahmia search engine :)
>
> It's not finished yet but the main parts are working. Be patient, it's far
> from perfect. It has some performance issues etc.

Seems to work well, except for the annoying "Unfortunately we have not
deployd non-JavaScript version of Ahmia yet." message which doesn't
seem to actually do anything. :)
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Metrics shows drop of users

2016-01-05 Thread Anders Andersson
On Tue, Jan 5, 2016 at 8:50 AM, Chris & Julie Forever
 wrote:
> Well, if they've had the kind of luck that i've had with the tor nework:;
> then they've made "quiting the tor net", their New Years " resolution". As
> I have.

Is it addictive? Why can't you just quit using it?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Escape NSA just to enter commercial surveillance?

2016-01-15 Thread Anders Andersson
On Fri, Jan 15, 2016 at 9:11 PM, juan  wrote:
> something considered a 'crime' by the criminal mafia knonw as
> 'government' - and yet the identity of those people isn't
> compromised.

I'm sorry, but it's difficult to take you seriously. If you actually
want anyone to take your words seriously and in the long run effect a
change, you need to start working on your debating skills. Find
sources that backs up your standpoints. Don't go into needless rants.
Those sorts of things.

On the other hand, if you want to look like a screaming child with no
other agenda than wanting to be at the center of attention, you're
doing a good job.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Danish data retention on steroids

2016-01-29 Thread Anders Andersson
On Fri, Jan 29, 2016 at 4:57 PM, Niels Elgaard Larsen  wrote:
> I come from a meeting in the Danish ministry of Justice this afternoon,

Why? :)


> 3. How many Danish Tor nodes in a circuit would you be comfortable with?

I can assure you that a lot of countries will have worse data logging
place, the main difference being that making it official makes it
easier for a bad guy to get hold of.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is it possible to use Tor without showing a Tor IP to the destination?

2016-02-21 Thread Anders Andersson
On Sun, Feb 21, 2016 at 7:17 PM, Scfith Rise up  wrote:
> I can point you in a direction that I took to accomplish this without having 
> to resort to a third party VPN. I am running my own VPN from a VPS and added 
> it to my proxychains file. Here is the github for proxychains-ng that I 
> highly recommend. This setup accomplishes what you ask, a list of ip 
> addresses that it chains through to the final destination. Your tor 
> connection can be one of them or not as you wish. Enjoy.

So basically they see that someone signs up using the VPS that you've
paid for using your real name and account? Why do you even use Tor to
connect to the VPS? If they want to know who's behind the account
they'll just send a threatening enough letter to the VPS owner.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Is it possible to use Tor without showing a Tor IP to the destination?

2016-02-22 Thread Anders Andersson
On Sun, Feb 21, 2016 at 9:30 PM, Scfith Rise up  wrote:
> Mr. Andersson is assuming a lot. There are definitely tried and true methods 
> to make purchases online and setup identities for these types of things. At 
> the end of the day, yes the VPS provider is the weakest link. But you can use 
> one that has no logs, carries a warrant canary, etc. and you can burn your 
> VPS IP address as often as you need or spin up new ones as often as you need 
> too. This is just one of many approaches and requires you to know what you 
> are doing in locking down the VPS besides knowing how to buy it the right 
> way, etc.

All of this boils down to a single point of failure: You have to trust
your VPS. "Has no logs" - you don't know that. "Burn your VPS IP" -
All IP<->VPS history might be logged. "Spin up new ones" - from the
outside this is exactly like changing the IP, you have to trust that
the VPS provider does not keep the logs.

However, if you do manage to get an anonymous VPS, I agree that it is
beneficial to only connect to it through Tor if you want it to remain
anonymous.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB users, please give 1 minute of your time for science

2017-04-25 Thread Anders Andersson
On 25 April 2017 at 13:12, Lolint  wrote:
> I've been making those tests on your website multiple times with the TBB but 
> most of the
> time I get a unique fingerprint even when re-doing the test at different 
> times with the same
> browser.

This is something worth pointing out. How does the current
browser-identification websites handle that?

If you always show up as "unique", even when returning, it means that
you are not really that unique or identifiable after all. This also
applies if you end up in small groups.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor and PCP (Port Control Protocol)

2017-06-05 Thread Anders Andersson
Since my ISP implements carrier-grade NAT[1] (with an opt-out system)
I read a little about it and found something called the "Port Control
Protocol"[2] (PCP). Unless I am mistaken, and *if* my ISP implements
it, it seems that it could enable me to run a Tor relay on one of the
shared IP numbers.

From what I understand it would make it possible for me to send a
message to my ISPs router saying something like "I want an external
port bound to this ip:port on my network", and it would either assign
a port on the external IP and return it to me, or deny the request. If
accepted, I could have my Tor announce that external ip:port and
everything should work as expected.

Now, before I dig in to this, I wonder if someone else has experience
with it? Any flaws with this hypothetical setup?



[1]: https://en.wikipedia.org/wiki/Carrier-grade_NAT
[2]:https://en.wikipedia.org/wiki/Port_Control_Protocol
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor ban discussion at Russian state Duma

2017-07-09 Thread Anders Andersson
On Wed, Jul 5, 2017 at 1:35 PM, Leonid Evdokimov  wrote:

> On Tue, Jun 27, 2017 at 02:37:02PM +0300, Leonid Evdokimov wrote:
> > there is ~120 days gap after 3rd draft approval before Tor being
> outlawed.
>
> Small update. I consider that statement it technically wrong now :)
>
> Russian Federal Tax Service (the one that banned www.google.ru for a
> couple of hours) got sort of a right to ban websites distributing
> network censorship circumvention tools if the tools can be used to
> access illegal gambling sites.
>

Could you elaborate on "sort of a right"? From your summary it seems that
they do have the right to ban for example https://www.torproject.org/ but
running a Tor exit node or using Tor should be safe?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Mimix, an operating system inside the main OS

2017-11-10 Thread Anders Andersson
On Thu, Nov 9, 2017 at 11:23 PM, George  wrote:
> Franps:
>> https://www.networkworld.com/article/3236064/servers/minix-the-most-popular-os-in-the-world-thanks-to-intel.amp.html
>>
>>  You might not know it, but inside your Intel system, you have an
>> operating system running in addition to your main OS, MINIX. And it’s
>> raising eyebrows and concerns
>
> Without question, the revelations about Intel ME are shocking. Sort of
> like we've known has existed on smart phones for a long while.
>
> The article seems to note that it's only an issue for the "last few
> years" when I believe it's been found as far back as the Thinkpad x200
> (~year 2000), at least.

Not sure how "shocking" this is. The people behind libreboot has been
trying to inform about this for a long time:

https://libreboot.org/faq.html#intel
https://libreboot.org/faq.html#amd

But obviously they are tinfoil-wearing conspiracy theorists, right?

This is what has stopped me from spending any money on a new CPU from
Intel or AMD the past years. Sadly, I don't have a practical
alternative right now. Even though some shady "fixes" exists, I prefer
to vote with my wallet.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Curious about the Zwiebelfreunde incident - are there any updates?

2018-08-12 Thread Anders Andersson
I recently went through the mailing list archive to catch up on events
in the Tor world, and one thing that worried me a lot was the June 20
police raid on Zwiebelfreunde[1].

According to the blog entry, the initial request for returning the
equipment was denied. Are there any further updates to the case that
you can share to those of us who are overly curious?



[1] 
https://blog.torservers.net/20180704/coordinated-raids-of-zwiebelfreunde-at-various-locations-in-germany.html
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [New report] Uganda's Social Media Tax through the lens of network measurements

2018-12-01 Thread Anders Andersson
On Mon, Nov 12, 2018 at 1:09 PM Maria Xynou 
wrote:

> As of 1st July 2018, Uganda has introduced a new OTT (Over The Top) tax
> -  commonly referred to as the Social Media Tax - which requires people
> in Uganda to pay taxes to the government in order to access several
> online social media platforms. Unless this tax is paid, access to these
> specific social media platforms is blocked.
>
...

> * Ugandan ISPs primarily implement internet censorship by means of HTTP
> blocking, resetting connections to taxed and banned sites.
>

I don't understand how they figure out who to block. Do the government
really keep a detailed register that the ISPs must synchronize with their
customer database? Sounds like a lot of overhead.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] tor project website change

2019-04-06 Thread Anders Andersson
On Wed, Apr 3, 2019 at 10:47 AM grarpamp  wrote:
> Anyhow...
>
> The last actual use case warning or disclaimer on torproject.org
> was removed by or on October 10 2010. Some historical bisects..
>
> Site v1
> first, domain 1998-01-29
> http://web.archive.org/web/19981212031609/http://www.onion-router.net/
>
> same content actually to "circa" 2006
> http://web.archive.org/web/20061023145713/http://www.onion-router.net/
>
> http://web.archive.org/web/20130120133213/http://www.onion-router.net/
> except for the gov diff
> http://web.archive.org/web/20130420093515/http://www.onion-router.net/
>
> curr
> http://web.archive.org/web/20190228035625/http://www.onion-router.net/
>
> Site v2
> first, domain 2006-10-17
> http://web.archive.org/web/20071011223019/http://www.torproject.org/
> last
> http://web.archive.org/web/20101003133226/http://www.torproject.org/
>
> Site v3
> first
> http://web.archive.org/web/20101010191937/http://www.torproject.org/
> last
> http://web.archive.org/web/20190326100059/https://www.torproject.org/
>
> Site v4
> first
> http://web.archive.org/web/20190327033924/https://www.torproject.org/

Thanks for these links!

Amazing how much better the initial v1 site looks compared to the
later versions. Web 2.0 and 3.0 was really a step back in usability
from the actual *WEB* of hyperlinks.

Today every website looks like an advertisement meant to be viewed in
the couch on your iPad, carefully planned so that you have to scroll
through the content. Gotta get those "user engagement" advertisement
revenue statistics. Too bad it has spread to a lot of open source
projects. I have a difficult time trusting the sincerity of a project
that needs to overwhelm me with catchy slogans the first thing they
do, without even linking to the details.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] How can an external observer detect if a malicious relay does excessive logging?

2021-06-22 Thread Anders Andersson
Having had little luck with my question posted on
tor.stackexchange.com[1] I will try here, perhaps there are more
"eyes" on the mailing list.

Under "Criteria for rejecting bad relays" on the Network Health Team's
wiki[2] there is a list of things that makes a relay be "malicious".
Everything there seems possible to find out (with some effort) except
this:

"- Excessive logging (over notice) during normal operation"

I've tried to figure out how this can be probed from the outside, but
can't come up with anything realistic. How can it be probed?


[1] 
https://tor.stackexchange.com/questions/22430/how-can-an-external-observer-detect-if-a-malicious-relay-does-excessive-logging
[2] 
https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Criteria-for-rejecting-bad-relays
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk