Re: [tor-talk] Tor no longer works with win2K ??

2011-11-10 Thread Jeroen Massar
On 2011-11-10 13:13 , Anon Mus wrote: [..] > I do have a socks listen address specified > > SocksListenAddress 127.0.0.1 Unless a SOCKS capable program is listening there already, it should not be an issue. See 'netstat -an' in a command prompt to check if this is the case or not. Greets, Jero

Re: [tor-talk] Tor no longer works with win2K ??

2011-11-10 Thread Jeroen Massar
On 2011-11-10 11:39 , Anon Mus wrote: [..] > Nov 10 10:17:10.093 [Warning] Warning from libevent: evsig_init: > socketpair: Cannot assign requested address [WSAEADDRNOTAVAIL ] This is the important part, it states that the address is not available. Did your properly shutdown the old version? And/

Re: [tor-talk] Avoiding DoS inside the Tor network (Was: Anonymous to attacks Hidden Wiki and othershiddenservice)

2011-10-24 Thread Jeroen Massar
On 2011-10-24 15:29 , Eugen Leitl wrote: > On Mon, Oct 24, 2011 at 02:40:26PM +0200, Jeroen Massar wrote: > >> If you would introduce something like hashcash, does the source node or >> the intermediate node have to do this hashcash calculation? > > Like in BitCoin, onl

[tor-talk] Avoiding DoS inside the Tor network (Was: Anonymous to attacks Hidden Wiki and othershiddenservice)

2011-10-24 Thread Jeroen Massar
On 2011-10-24 14:10 , Eugen Leitl wrote: > On Mon, Oct 24, 2011 at 01:46:13PM +0200, Jeroen Massar wrote: >> On 2011-10-24 13:34 , hi...@safe-mail.net wrote: >> [..] >>> The problem is that they're using denial of service attacks to overload the >>> serv

Re: [tor-talk] Fwd: Anonymous to attacks Hidden Wiki and othershiddenservice

2011-10-24 Thread Jeroen Massar
On 2011-10-24 13:34 , hi...@safe-mail.net wrote: [..] > The problem is that they're using denial of service attacks to overload the > servers, and parts of the Tor network as a result. Tor doesn't seem to > handle this very well. The internet does not handle (D)DoS attacks either. > This takes

Re: [tor-talk] GeoIP

2011-10-22 Thread Jeroen Massar
On 2011-10-22 09:27 , kamyar kamyar wrote: > Hi all, > > What's GeoIP file in TOR directory? what's it used for? The file contains IPv4 address ranges to Country mappings. It is used for determining the country that an IP address is in. This as several configuration commands allow avoiding/reque

Re: [tor-talk] Strange TOR connection behavior? EntryNodes/Strict

2011-10-17 Thread Jeroen Massar
On 2011-10-17 12:24 , fati...@safe-mail.net wrote: > I'm a little new to TOR. I run it in linux and start and stop it from > a terminal window. I have changed my torrc to include the following: > > > EntryNodes poohbear > > where 'poohbear' is the entry node I wish to use. > > This setup works,

Re: [tor-talk] German police keylogger analysis (and the effects on Tor are....?)

2011-10-13 Thread Jeroen Massar
On 2011-10-13 13:40 , and...@torproject.org wrote: > On Wed, Oct 12, 2011 at 11:39:12PM -0700, williamwright...@yahoo.com > wrote 1.1K bytes in 24 lines about: : Keyloggers would, I assume, > defeat the whole purpose of Tor since the URL would be recorded and > sent to the fedz. > > If you lose co

Re: [tor-talk] PSI Jabber leaking the client hostname?

2011-10-12 Thread Jeroen Massar
On 2011-10-12 14:14 , phil...@bailey.st wrote: [..] > Opened session for test2@x.onion/foobar > > I guess is not normal to have your hostname going to some tor end point, > is this leak related to PSI or maybe some other misconfiguration. That 'foobar' portion (or the long number

Re: [tor-talk] Securing servers

2011-10-11 Thread Jeroen Massar
On 2011-10-11 21:04 , t...@lists.grepular.com wrote: > On 11/10/11 19:34, Jeroen Massar wrote: [..] > Regarding your comments on keys being stored in RAM on crypto > filesystems, I have a working solution for that too. My Ubuntu laptop > uses full disk encryption, but the key is shif

Re: [tor-talk] Inter-op connectivity of TOR directory authorities for the establishment of Private TOR Network

2011-10-11 Thread Jeroen Massar
On 2011-10-11 19:14 , Faisal Rehman wrote: > *Dear All,* > > As I am working to establish a small tor private network and for this > purpose I have to and done the following things: > > 1. Configuration of Several Directory Authorities (Completed) > 2. Inter-op connectivity of these authorities f

Re: [tor-talk] Securing servers

2011-10-11 Thread Jeroen Massar
On 2011-10-11 20:24 , t...@lists.grepular.com wrote: [..] > I've been doing this myself for a while now. I wrote/released some > software to do it. It's described here: > > https://grepular.com/Automatically_Encrypting_all_Incoming_Email > > And here: > > https://grepular.com/Automatically_Encry

Re: [tor-talk] WSJ- Google- Sonic Mr. Applebaum

2011-10-11 Thread Jeroen Massar
On 2011-10-11 17:29 , Eugen Leitl wrote: > On Tue, Oct 11, 2011 at 02:30:01PM +0200, Jeroen Massar wrote: > >> Of course you are raising the bar, > > That's the main idea. > >> but that is the only thing you are >> doing, as the adversary can still

Re: [tor-talk] Securing servers

2011-10-11 Thread Jeroen Massar
another will kick the persons involved and nicely ask to move along somewhere else. > On 11.10.2011 14:33, Jeroen Massar wrote: >>> If the box is at a place under your control, you will at least know. >>> Replugging can be noticed (packet drops, changes in voltage) and the

Re: [tor-talk] WSJ- Google- Sonic Mr. Applebaum

2011-10-11 Thread Jeroen Massar
On 2011-10-11 16:42 , Eugen Leitl wrote: > On Tue, Oct 11, 2011 at 12:48:53PM +0100, Julian Yon wrote: > >> I think you missed the point Jeroen was making there. If Mallory >> *really* wants to compromise your server, there will be a level of >> security beyond which a gun to your children's heads

Re: [tor-talk] WSJ- Google- Sonic Mr. Applebaum

2011-10-11 Thread Jeroen Massar
On 2011-10-11 13:48 , Julian Yon wrote: > On 11/10/11 09:07, Eugen Leitl wrote: >>> At one point or another they just apply rubberhose crypto thus don't >>> make it too difficult. >> Why do you bother breathing? You'll die, anyway. > > I think you missed the point Jeroen was making there. If Mallo

Re: [tor-talk] WSJ- Google- Sonic Mr. Applebaum

2011-10-11 Thread Jeroen Massar
On 2011-10-11 13:18 , Moritz Bartl wrote: > On 10.10.2011 23:20, Jeroen Massar wrote: >>>> Does not matter what service you use, they all fail under the pressure >>> Use your own servers at the co-lo. Use TPM and tamper-proof systems. >> Does not matter, given

Re: [tor-talk] WSJ- Google- Sonic Mr. Applebaum

2011-10-11 Thread Jeroen Massar
On 2011-10-11 10:07 , Eugen Leitl wrote: > On Mon, Oct 10, 2011 at 11:20:05PM +0200, Jeroen Massar wrote: > >>> Use your own servers at the co-lo. Use TPM and tamper-proof systems. >> >> Does not matter, given enough power/money/force your adversary can walk > >

Re: [tor-talk] WSJ- Google- Sonic Mr. Applebaum

2011-10-10 Thread Jeroen Massar
On 2011-10-10 22:27 , Eugen Leitl wrote: > On Mon, Oct 10, 2011 at 07:07:35PM +0200, Jeroen Massar wrote: >> On 2011-10-10 18:42 , Andre Risling wrote: >>> Here's how Google is a compliant slave. >>> >>> You still use Gmail?! >> >> Does not

Re: [tor-talk] WSJ- Google- Sonic Mr. Applebaum

2011-10-10 Thread Jeroen Massar
On 2011-10-10 18:42 , Andre Risling wrote: > Here's how Google is a compliant slave. > > You still use Gmail?! Does not matter what service you use, they all fail under the pressure of organizations that want access to it, be that legal or illegal. (The bigger problem with the context of the ar

Re: [tor-talk] Idiotical abuses against Tor-servers

2011-09-21 Thread Jeroen Massar
On 2011-09-22 07:20 , Orionjur Tor-admin wrote: > Periodically, about one time in a half of year, some people posts an > abuses against my Tor-server which seems as idiotical. I guess you mean your Tor exit node. > To days ago my vds-provider received the next abuse report: [..] > Frankly speekin

Re: [tor-talk] Mac?

2011-09-09 Thread Jeroen Massar
On 2011-09-09 05:09 , cmeclax-sazri wrote: > On Thursday 08 September 2011 22:02:56 Andre Risling wrote: >> - Who stores the MAC address of the computer you're using? The ISP? An >> Webmail service? > > On IPv4, a MAC address goes only as far as the local network (the MAC address > my router ha

[tor-talk] Verifying software signatures (Was: Dutch CA issues fake *.torproject.org cert (among many others))

2011-09-03 Thread Jeroen Massar
On 2011-09-03 15:39 , Joe Btfsplk wrote: > On 9/2/2011 4:46 PM, and...@torproject.org wrote: >> On Fri, Sep 02, 2011 at 01:31:53PM -0400, col...@averysmallbird.com >> wrote 4.5K bytes in 109 lines about: >> : According to a number of bloggers(1), torproject.org was include >> among those >> >> Here

Re: [tor-talk] Dutch police break into webservers over hidden services

2011-09-01 Thread Jeroen Massar
On 2011-09-01 15:24 , Roger Dingledine wrote: > Several people have asked us on irc about recent news articles like > http://wireupdate.com/wires/19812/dutch-police-infiltrate-hidden-child-porn-websites-in-the-u-s/ [..] In addiotion I want to refer to the below article from the Dutch "Public Minis