Re: [tor-talk] tor/netfilter: packets without uid

2012-05-10 Thread Marsh Ray
On 05/10/2012 09:11 PM, johnmurphy...@safe-mail.net wrote: Hi List, I am trying to tweak my transparent netfilter setup (Tor Stable, Debian Wheezy, GNU/Linux, iptables v1.4.12.2, Kernel 3.2.0-amd64). So far, redirection and torification works fine. I have have several users, some of them have th

Re: [tor-talk] segfault at 8 ip ... error 4 in tor

2011-12-01 Thread Marsh Ray
On 12/01/2011 09:16 AM, Hanspeter Spalinger wrote: Hi, I built a new gdb (from the homepage), and got the output below. I too tried rebuild tor from the source (apt-get source, dpkg-buildpackage,...) and both times the stack trace looks like this. I do not understand why gdb does not find the to

Re: [tor-talk] Tor no longer works with win2K ??

2011-11-12 Thread Marsh Ray
On 11/12/2011 01:11 PM, Julian Yon wrote: Nobody's going to keep an old, unsupported system up and running, at personal expense, just to appease a person who is rude to them. It's also a bad idea from a security perspective. You could easily be doing them more harm than good. Win2k had a lo

Re: [tor-talk] Tor and AES-NI acceleration , and Tor profiling

2011-11-08 Thread Marsh Ray
On 11/08/2011 12:28 AM, Jacob Appelbaum wrote: On 11/07/2011 09:29 PM, coderman wrote: On Sun, Nov 6, 2011 at 5:57 PM, Moritz Bartl wrote: ... [notice] Using OpenSSL engine Intel AES-NI engine [aesni] for AES however, you are getting not only 3x-10x+ performance improvement in AES ops, but al

Re: [tor-talk] Freedom Hosting admin revealed by Anonymous - Tor finally cracked?

2011-11-02 Thread Marsh Ray
On 11/02/2011 05:54 PM, Gozu-san wrote: Is it really possible that over 100 fools would have downloaded a purported Tor security update from Hard Candy in one day? In the middle of an attack by OpDarknet? Seriously? Mozilla stats https://addons.mozilla.org/en-US/statistics/addon/2275 seem t

Re: [tor-talk] Google and Gmail

2011-09-10 Thread Marsh Ray
On 09/10/2011 10:22 PM, Andre Risling wrote: I've noticed a lot of people that are concerned about privacy and security are using Gmail accounts. Do you really trust Google not to read your email and tell THE MAN what you've been saying? No. But technologies like Tor are general purpose and u

Re: [tor-talk] Tor spying

2011-09-07 Thread Marsh Ray
On 09/07/2011 09:21 PM, Indie Intel wrote: Apparently people are spying on Tor users by setting up their own exit nodes and sniffing traffic?! Oh yeah. It happens. This Moxie Marlinspike is even a well-respected researcher, apparently. He gives talks at Blackhat to government hacker wannabes

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-07 Thread Marsh Ray
On 09/07/2011 04:48 PM, Julian Yon wrote: There's no need to be patronising. I have plenty of security experience. Sorry, wasn't trying to be patronizing. Just trying to give my opinion plainly. This is where, IMHO, computer security people can maybe take a step back. Sure we should all remin

Re: [tor-talk] Dutch CA issues fake *.torproject.org cert (among many others)

2011-09-07 Thread Marsh Ray
On 09/07/2011 03:19 PM, Julian Yon wrote: My bank forces me to enter part of my password using unobscured dropdowns "for security". Sure, it avoids keyloggers, but what about *someone standing behind me*? Do they have a gun? Otherwise, cover the screen with your hand or ask them to look away.

Re: [tor-talk] EFF Tor Challenge

2011-06-01 Thread Marsh Ray
On 06/01/2011 07:35 PM, cac...@quantum-sci.com wrote: On Wednesday 1 June, 2011 16:39:22 Javier Bassi wrote: I have to say I felt a bit disappointed when I saw that the EFF was also running a middle node. I thought they would be running the openest exit node. Everybody's gotta choose their bat

Re: [tor-talk] Securing a Relay - chroot

2011-05-27 Thread Marsh Ray
On 05/27/2011 11:22 AM, cac...@quantum-sci.com wrote: On Friday 27 May, 2011 08:10:47 tagnaq wrote: You do not mention the threats you worry about and assets you care about (thread model + security requirements). Yes that's because I don't know what threats there may be. http://en.wikipedia.

Re: [tor-talk] Tor TLS error

2011-05-27 Thread Marsh Ray
Which version (number, distribution) of OpenSSL are you using? The line number s23_clnt.c:607 might tell us something. Could you get a packet capture (Wireshark, tshark, tcpdump, etc.)? It's probably only a few KB of the packets which are relevant to the failed connection attempt. On 05/27/2011

Re: [tor-talk] Tor TLS error

2011-05-27 Thread Marsh Ray
On 05/27/2011 11:53 AM, alex wrote: On 05-27 11:39, Marsh Ray wrote: Which version (number, distribution) of OpenSSL are you using? 0.9.8o-5ubuntu1 Could you get a packet capture (Wireshark, tshark, tcpdump, etc.)? I'll try. But I'm running a Tor Relay, so isolating my traffic

Re: [tor-talk] Securing a Relay - chroot

2011-05-26 Thread Marsh Ray
On 05/26/2011 11:12 AM, cac...@quantum-sci.com wrote: On Thursday 26 May, 2011 07:31:42 Eugen Leitl wrote: So you're worrying about a compromised vserver guest compromising the host, which is then used to attack your LAN segment? Doesn't even have to compromise the host. With the guest in the

Re: [tor-talk] "drop all vulnerable relays from the consensus"

2011-05-16 Thread Marsh Ray
On 05/15/2011 03:38 PM, tagnaq wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, "If someone publishes or demonstrates a code-exec exploit [...] we should drop all vulnerable relays from the consensus" [1] - - Does Tor provide Authority Directories with an easy way to reject/drop rela