Re: [tor-relays] "What fraction of the tor network by consensus weight are the openssl-vulnerable relays?"

2014-04-08 Thread Kostas Jakeliunas
On Wed, Apr 9, 2014 at 3:49 AM, Kostas Jakeliunas wrote: > Making a separate thread so as not to pollute the challenger[1] one. > > Roger: you wanted to know (times are UTC if anyone cares), > > [22:08:35] [...] we now have a list of 1000 fingerprints, and we could >> pretend those are in the chal

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Jesus Cea
On 08/04/14 17:01, Moritz Bartl wrote: > On 04/08/2014 04:58 PM, ecart...@riseup.net wrote: >> Greetings all. I follwed the above instructions on my relay. Upon >> restarting Tor I have lost all of my flags and I have a new fingerprint. >> Previously I had the Fast, Guard, Named, Running, Stable

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Roger Dingledine
On Tue, Apr 08, 2014 at 07:31:43PM -0600, Jesse Victors wrote: > I'd recommend that every relay operator delete their keys as well, Not every. Those on OpenSSL 0.9.8, e.g. because they're using Debian oldstable, were never vulnerable to this bug. I imagine there are some FreeBSD or the like people

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Jesse Victors
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I've updated OpenSSL, deleted the keys on my exit per the recommendations, and restarted the whole box. I got a new fingerprint. I'll watch to see how long the flags take to come back, but I predict it will be like a new relay. I wonder how this cha

Re: [tor-relays] Metrics for assessing EFF's Tor relay challenge?

2014-04-08 Thread Kostas Jakeliunas
On Wed, Apr 9, 2014 at 4:18 AM, Kostas Jakeliunas wrote: > On Wed, Apr 9, 2014 at 4:06 AM, Lukas Erlacher wrote: > >> Hi Kostas, >> >> right now, we're coding challenger against what exists in debian wheezy, >> which means version 0.1.2 of the requests lib using the python-requests >> package you

Re: [tor-relays] Metrics for assessing EFF's Tor relay challenge?

2014-04-08 Thread Kostas Jakeliunas
On Wed, Apr 9, 2014 at 4:06 AM, Lukas Erlacher wrote: > Hi Kostas, > > right now, we're coding challenger against what exists in debian wheezy, > which means version 0.1.2 of the requests lib using the python-requests > package you mentioned, where response.json is correct, and not > response.jso

Re: [tor-relays] Metrics for assessing EFF's Tor relay challenge?

2014-04-08 Thread Lukas Erlacher
Hi Kostas, right now, we're coding challenger against what exists in debian wheezy, which means version 0.1.2 of the requests lib using the python-requests package you mentioned, where response.json is correct, and not response.json() to get json content from the response. I'd recommend that i

[tor-relays] "What fraction of the tor network by consensus weight are the openssl-vulnerable relays?"

2014-04-08 Thread Kostas Jakeliunas
Making a separate thread so as not to pollute the challenger[1] one. Roger: you wanted to know (times are UTC if anyone cares), [22:08:35] [...] we now have a list of 1000 fingerprints, and we could > pretend those are in the challenge and use our graphing/etc plans on them > [22:08:45] they happ

Re: [tor-relays] running Tor relay live with AddressSanitizer

2014-04-08 Thread starlight . 2014q2
Based on my experience today, I'd say this is an excellent idea for any Tor relay operator. Have been running 'tor' on the router since late November with AddressSanitizer and it has crashed exactly ONE time: Today when someone attempted to apply the OpenSSL "Heartbleed" attack against the relay.

Re: [tor-relays] Metrics for assessing EFF's Tor relay challenge?

2014-04-08 Thread Kostas Jakeliunas
On Tue, Apr 8, 2014 at 12:59 PM, Karsten Loesing wrote: > On 05/04/14 17:46, Lukas Erlacher wrote: > > Hello Nikita, Karsten, > > > > On 04/05/2014 05:03 PM, Nikita Borisov wrote: > >> On Sat, Apr 5, 2014 at 3:58 PM, Karsten Loesing > >> wrote: > >>> Installing packages using Python-specific pack

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread grarpamp
On Tue, Apr 8, 2014 at 4:04 PM, Roger Dingledine wrote: > Actually, I'd like us to take this opportunity to throw out the Named > and Unnamed flags entirely. > I think we've done pretty well at teaching > users to use $fingerprints rather than nicknames in the few cases where > they actually want

Re: [tor-relays] URGENT: active OpenSSL "Heartbleed" attack on Tor Nodes

2014-04-08 Thread Roger Dingledine
On Tue, Apr 08, 2014 at 06:30:28PM -0400, starlight.201...@binnacle.cx wrote: > Have been running Tor relay with > AddressSanitizer and it crashed this > morning. People on #tor are helping us enumerate vulnerable relays, so while this plausibly is an instance of "somebody testing for the vulnerab

[tor-relays] URGENT: active OpenSSL "Heartbleed" attack on Tor Nodes

2014-04-08 Thread starlight . 2014q2
Have been running Tor relay with AddressSanitizer and it crashed this morning. I thought it was related to the system being close to running out of free memory until I read about the new OpenSSL vulnerability. Anyone running a Tor relay with OpenSSL 1.0.1 should update the library or rebuild agai

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread grarpamp
On Tue, Apr 8, 2014 at 4:34 PM, Roger Dingledine wrote: > On Tue, Apr 08, 2014 at 04:35:39PM +0100, mick wrote: >> Moritz Bartl allegedly wrote: >> > Yes. You made it generate new keys, so it is a "new relay" as far as >> > Tor is concerned. This is why not everybody should generate new keys >> >

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Roger Dingledine
On Tue, Apr 08, 2014 at 04:35:39PM +0100, mick wrote: > Moritz Bartl allegedly wrote: > > Yes. You made it generate new keys, so it is a "new relay" as far as > > Tor is concerned. This is why not everybody should generate new keys > > immediately, especially larger relays. But don't worry too muc

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hy community :( It seems, that we are seriously f# since 14 MAR 2012 with the release of the openssl 1.0.1 branch until yesterday!!! Affected services which used these libraries are enormous. ftps, https, imaps, smtp over ssl, xmpp, and so on

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Roger Dingledine
On Tue, Apr 08, 2014 at 07:00:53PM +0200, Andreas Krey wrote: > On Tue, 08 Apr 2014 17:01:18 +, Moritz Bartl wrote: > ... > > immediately, especially larger relays. But don't worry too much, you'll > > get your flags back eventually. :) > > But my name only very eventually? Correct. Actually

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Chris Whittleston
Yup - looks like I just missed it before, updated - now to clear keys and reboot. Thanks, Chris On 8 April 2014 20:48, Alexander Dietrich wrote: > I just got 1.0.1e-2+rvt+deb7u5, try again? > > Best regards, > > Alexander > > --- > PGP Key: 0xC55A356B | https://dietrich.cx/pgp > > On 2014-0

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Alexander Dietrich
I just got 1.0.1e-2+rvt+deb7u5, try again? Best regards, Alexander --- PGP Key: 0xC55A356B | https://dietrich.cx/pgp On 2014-04-08 21:27, Chris Whittleston wrote: > I run a relay on a Raspberry Pi and have just gone through and updated > (apt-get update, apt-get upgrade') but it seems

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Chris Whittleston
I run a relay on a Raspberry Pi and have just gone through and updated (apt-get update, apt-get upgrade') but it seems like the latest version available is still compromised? openssl (1.0.1e-2+rvt+deb7u4) If so - recommendations as to where I might be able to find an updated version for the pi wo

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread David Serrano
On 2014-04-08 09:20:28 (-0700), ecart...@riseup.net wrote: > > Update: I now have Running, Unnamed, V2Dir and Valid flags after 90 > minutes of uptime. So I guess all is well. So do I. I guess Named will be the toughest of them all :). -- David Serrano GnuPG id: 280A01F9 signature.asc Des

Re: [tor-relays] 1.0.1e-2+deb7u5 should be good for Wheezy

2014-04-08 Thread Felix Eckhofer
Hey Guido. Am 08.04.2014 20:07, schrieb Guido Witmond: According to the debian security announcement it has been fixed at *u5*. Where did you get *u6*? A QUANTUM INSERT? Or a typo? Debian released another update that - unlike the previous version - also prompts you to restart affected servic

Re: [tor-relays] 1.0.1e-2+deb7u5 should be good for Wheezy

2014-04-08 Thread Guido Witmond
On 04/08/14 20:19, Roman Mamedov wrote: > On Tue, 08 Apr 2014 19:54:21 +0200 > elrippo wrote: > >> Hy there. >> >> My Debian Wheezy box is using 1.0.1e-2+deb7u6 after the upgrade >> >> I think this should be good :) > > Thanks for the heads-up, turns out it was updated twice in a day. > > I gu

Re: [tor-relays] 1.0.1e-2+deb7u5 should be good for Wheezy

2014-04-08 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hy Guido. I tend to use openssl-dev, so I suppose that is on behalf of the dev extension :D greetings, elrippo On 08. April 2014 20:07:58 MESZ, Guido Witmond wrote: >On 04/08/14 19:54, elrippo wrote: >> Hy there. >> >> My Debian Wheezy box is us

Re: [tor-relays] 1.0.1e-2+deb7u5 should be good for Wheezy

2014-04-08 Thread Roman Mamedov
On Tue, 08 Apr 2014 19:54:21 +0200 elrippo wrote: > Hy there. > > My Debian Wheezy box is using 1.0.1e-2+deb7u6 after the upgrade > > I think this should be good :) Thanks for the heads-up, turns out it was updated twice in a day. I guess the 6th version is not as important if you remembered

Re: [tor-relays] 1.0.1e-2+deb7u5 should be good for Wheezy

2014-04-08 Thread Guido Witmond
On 04/08/14 19:54, elrippo wrote: > Hy there. > > My Debian Wheezy box is using 1.0.1e-2+deb7u6 after the upgrade > > I think this should be good :) According to the debian security announcement it has been fixed at *u5*. Where did you get *u6*? A QUANTUM INSERT? Or a typo? http://www.debian

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread elrippo
Indeed, you should check you /var/lib/tor/keys directory to be empty before restarting your service again. ATTENTION!!! On a Debian box, i got the "warning" to restart the openssh and openvpn server, to be sure that these services use the new libssl binaries. It is recommended to not only resta

Re: [tor-relays] 1.0.1e-2+deb7u5 should be good for Wheezy

2014-04-08 Thread elrippo
Hy there. My Debian Wheezy box is using 1.0.1e-2+deb7u6 after the upgrade I think this should be good :) Am Dienstag, 8. April 2014, 17:09:07 schrieb Felix: > Thanks for posting the blog in here > > > Relays and bridges: Tor relays and bridges could maybe be made to > > > > leak their med

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread mick
On Tue, 08 Apr 2014 19:04:08 +0200 Lukas Erlacher allegedly wrote: > On Debian or Ubuntu: > > service tor stop && rm /var/lib/tor/keys/* && apt-get update && > apt-get -y upgrade > You might want to restart tor after that. -

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Andreas Krey
On Tue, 08 Apr 2014 17:01:18 +, Moritz Bartl wrote: ... > immediately, especially larger relays. But don't worry too much, you'll > get your flags back eventually. :) But my name only very eventually? Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds Date: Fri, 22 Jan 2

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Lukas Erlacher
On Debian or Ubuntu: service tor stop && rm /var/lib/tor/keys/* && apt-get update && apt-get -y upgrade Cheers Luke On 04/08/2014 05:55 PM, Dennis Crawford wrote: > Where is the instructions for this? > > Thanks! > Dennis > > -Original Message- > From: tor-relays [mailto:tor-relays-bou

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread ecarter9
Update: I now have Running, Unnamed, V2Dir and Valid flags after 90 minutes of uptime. So I guess all is well. Disregard my second question I see you already addressed it, thanks. > Thanks Moritz. But shouldn't I at least be Fast Running Valid? I thought > that when I first set up the relay I

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread ecarter9
Thanks Moritz. But shouldn't I at least be Fast Running Valid? I thought that when I first set up the relay I received those flags almost immediately, but I've been running for over an hour and I still have no flags at all. Also, if all relays lose their flags won't we be left with an inoperable

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Dennis Crawford
Where is the instructions for this? Thanks! Dennis -Original Message- From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf Of mick Sent: Tuesday, April 8, 2014 11:36 AM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Relays vulnerable to OpenSSL bug: P

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Zack Weinberg
On Tue, Apr 8, 2014 at 11:01 AM, Moritz Bartl wrote: > On 04/08/2014 04:58 PM, ecart...@riseup.net wrote: >> Greetings all. I follwed the above instructions on my relay. Upon >> restarting Tor I have lost all of my flags and I have a new fingerprint. >> Previously I had the Fast, Guard, Named, R

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread mick
On Tue, 08 Apr 2014 17:01:18 +0200 Moritz Bartl allegedly wrote: > On 04/08/2014 04:58 PM, ecart...@riseup.net wrote: > > Greetings all. I follwed the above instructions on my relay. Upon > > restarting Tor I have lost all of my flags and I have a new > > fingerprint. Previously I had the Fast,

[tor-relays] 1.0.1e-2+deb7u5 should be good for Wheezy

2014-04-08 Thread Felix
Thanks for posting the blog in here > > Relays and bridges: Tor relays and bridges could maybe be made to > leak their medium-term onion keys (rotated once a week), or their > long-term relay identity keys. An attacker who has your relay identity > key can publish a new relay descriptor indic

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread ecarter9
> best practice would be to update > your OpenSSL package, discard all the files in keys/ in your > DataDirectory, and restart your Tor to generate new keys. Greetings all. I follwed the above instructions on my relay. Upon restarting Tor I have lost all of my flags and I have a new fingerprint

Re: [tor-relays] Relays vulnerable to OpenSSL bug: Please upgrade

2014-04-08 Thread Moritz Bartl
On 04/08/2014 04:58 PM, ecart...@riseup.net wrote: > Greetings all. I follwed the above instructions on my relay. Upon > restarting Tor I have lost all of my flags and I have a new fingerprint. > Previously I had the Fast, Guard, Named, Running, Stable, and Valid flags. > Is this expected? Did

Re: [tor-relays] Metrics for assessing EFF's Tor relay challenge?

2014-04-08 Thread Karsten Loesing
On 05/04/14 17:46, Lukas Erlacher wrote: > Hello Nikita, Karsten, > > On 04/05/2014 05:03 PM, Nikita Borisov wrote: >> On Sat, Apr 5, 2014 at 3:58 PM, Karsten Loesing >> wrote: >>> Installing packages using Python-specific package managers is >>> going to make our sysadmins sad, so we should have