[tor-talk] Freedom not Fear 2012: Great opportunity for Tor advocacy

2012-08-21 Thread Fabian Keil
There's an upcoming bar camp in Brussels (2012-09-14 - 2012-09-17) that is relevant to our interests, but doesn't seem to be on the calendar yet: http://www.freedomnotfear.org/ https://wiki.vorratsdatenspeicherung.de/Freedom_Not_Fear_2012 It's likely to be attended by a fair number of non-technica

[tor-talk] anonym has a new OpenPGP key

2012-08-21 Thread anonym
Here's my key transition message: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I, anonym , have replaced my OpenPGP key: Old key: pub 1024D/D0E64958 2007-06-25 uid anonym Fingerprint: A43A 06A5 C52F 59C2 7ABB B56F A7C1 2CC1 D0E6 4958 New key: pub 4096R/10CC5BC7 2012-08-2

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/20/2012 08:49 AM, fakef...@tormail.org wrote: > Good pointing at this. Gets much too less attention. You need much > less wiretapping orders. Just one. Wiretap the internet exchange > point and get any Tor user. Those are all excellent points.

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Eugen Leitl
- Forwarded message from Bryce Lynch - From: Bryce Lynch Date: Tue, 21 Aug 2012 12:49:02 -0400 To: zs-...@googlegroups.com Cc: doctrinez...@googlegroups.com Subject: Re: [tor-talk] End-to-end correlation for fun and profit Reply-To: zs-...@googlegroups.com On Mon, Aug 20, 2012 at 3:43 P

[tor-talk] [ZS] Re: End-to-end correlation for fun and profit

2012-08-21 Thread Eugen Leitl
- Forwarded message from Bryce Lynch - From: Bryce Lynch Date: Tue, 21 Aug 2012 13:08:52 -0400 To: zs-...@googlegroups.com Cc: doctrinez...@googlegroups.com Subject: [ZS] Re: [tor-talk] End-to-end correlation for fun and profit Reply-To: doctrinez...@googlegroups.com On Tue, Aug 21, 201

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Runa A. Sandvik
On Tue, Aug 21, 2012 at 6:21 PM, The Doctor wrote: > As I understand it, Tor nodes know IP addresses one up and one down in > a circuit. I haven't read through the Tor codebase in a while (two or > three years), so my question is this: Does Tor apply the same family > avoidance check when picking

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread fakefake
> Or they could get a blanket wiretapping order and catch them all at > once. I've often wondered if it's worth running Tor routers on the > EC2 for this reason. Bridges make sense if EC2 has enough IP addresses and the censurer doesn't ban the whole range. Too many relays give too much power to

Re: [tor-talk] [ZS] Re: End-to-end correlation for fun and profit

2012-08-21 Thread fakefake
> - Forwarded message from Bryce Lynch - > > From: Bryce Lynch > Date: Tue, 21 Aug 2012 13:08:52 -0400 > To: zs-...@googlegroups.com > Cc: doctrinez...@googlegroups.com > Subject: [ZS] Re: [tor-talk] End-to-end correlation for fun and profit > Reply-To: doctrinez...@googlegroups.com > > O

[tor-talk] Analyzing the traffic between nodes in my private tor network

2012-08-21 Thread juhapki
Hey guys, I succeeded to build a private tor network including some hidden services in it and every tor-machine (ubuntu) is behind a different router (multiple networks) I have tried to build my tor network as real as possible in our lab environment. Now I am monitoring the network traffic bet

[tor-talk] Turning Tor into a full darknet as backup plan

2012-08-21 Thread fakefake
What is the plan if exit harassment is one day so strong that there are no more exit server? Is that a realistic scenario? As backup plan I suggest to keep the network and to concentrate on .onion. Server with .onion obviously accept Tor traffic and don't harass Tor servers. Am I mistaken or isn'

Re: [tor-talk] Turning Tor into a full darknet as backup plan

2012-08-21 Thread Moritz Bartl
Hi, Once there are no exit servers any more (for which there is absolutely no indication), the network of relays will still exist and Hidden Services will still work. So your "backup plan" is already in position. On 21.08.2012 20:16, fakef...@tormail.org wrote: > What is the plan if exit harassme

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Tue, Aug 21, 2012 at 8:27 PM, Eugen Leitl wrote: >> 10 11.50% > > So, in other words, you'd hav to have 10 Tor routers on the same > network. That's like me having 10 Tor nodes on my home network and > not setting the NodeFamily directive in torrc. Somebody playing games > aside, I can see th

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/21/2012 01:30 PM, Runa A. Sandvik wrote: > From > https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/path-spec.txt: > > "We do not choose more than one router in a given /16 subnet (unless > EnforceDistinctSubnets is 0)." So, seeing as

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/21/2012 02:57 PM, Maxim Kammerer wrote: > No, it means that if you intercept traffic from 10 top-bandwidth > Tor routers with some characteristics (Guard + Exit, basically) at > what's probably the nearest hardware switch (seems true for the > n

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread With Weather Eye Open
Original Message > From: Bryce Lynch > > This claim sounds a little fishy to me, in this light. I'm not surprised. Last week, the same guy kept asserting that Tor was mainly used for nefarious purposes like buying drugs or illegal pornography, in addition to claiming such wou

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I think karsten's graphs from #6443 fit also well to this thread: https://trac.torproject.org/projects/tor/ticket/6443 You might also be interested in this thread on tor-relays: https://lists.torproject.org/pipermail/tor-relays/2012-July/001433.htm

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/21/2012 04:13 PM, With Weather Eye Open wrote: > I'm not surprised. Last week, the same guy kept asserting that Tor > was mainly used for nefarious purposes like buying drugs or > illegal pornography, in addition to claiming such would be "not

Re: [tor-talk] Analyzing the traffic between nodes in my private tor network

2012-08-21 Thread Roger Dingledine
On Tue, Aug 21, 2012 at 09:09:32PM +0300, juha...@wippies.fi wrote: > I succeeded to build a private tor network including some hidden >services in it and every tor-machine (ubuntu) is behind a different >router (multiple networks) I have tried to build my tor network as real >as possible in our la

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Tue, Aug 21, 2012 at 10:33 PM, The Doctor wrote: > That suggests that an attacker won't get nearly as much information with this > attack as it seems. No, you didn't understand the point of the attack. > A valid point, I will concede. Nothing written about /16 and /24 networks in this threa

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Tue, Aug 21, 2012 at 11:13 PM, With Weather Eye Open wrote: > I'm not surprised. Last week, the same guy kept asserting that Tor was mainly > used for nefarious purposes like buying drugs or illegal pornography, in > addition to claiming such would be "not difficult to prove." LOL! 1. Stop s

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Tue, Aug 21, 2012 at 11:25 PM, tagnaq wrote: > I think karsten's graphs from #6443 fit also well to this thread: Bingo — in the first graph in the ticket [1] you see that the probability gets to ~80% when the number of nodes gets to 40. What this graph doesn't show, however, is that many of th

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Roger Dingledine
On Mon, Aug 20, 2012 at 10:33:29AM +0300, Maxim Kammerer wrote: > As you can see, sniffing just 25 Class-C networks (or 42 individual > nodes) lets an adversary correlate ~25% of (non-.onion) circuits. I think your numbers may not be right (there are a lot of other subtleties to the calculation),

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread adrelanos
With Weather Eye Open: > Original Message > >> From: Bryce Lynch >> >> This claim sounds a little fishy to me, in this light. > > I'm not surprised. Last week, the same guy kept asserting that Tor was mainly > used for nefarious purposes like buying drugs or illegal pornograph

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Ted Smith
On Mon, 2012-08-20 at 10:33 +0300, Maxim Kammerer wrote: > Hello gentlemen, > [1] http://pastebin.com/hgtXMSyx I ran this script on the current consensus. The full results (the nodes-sniff-summary file) are below my signature. How did you compile the country-codes to IPs list? That wasn't produce

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Wed, Aug 22, 2012 at 3:29 AM, Ted Smith wrote: > I ran this script on the current consensus. The full results (the > nodes-sniff-summary file) are below my signature. How did you compile > the country-codes to IPs list? That wasn't produced by the script. Manually, using WHOIS and traceroute.

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Jacob Appelbaum
Maxim Kammerer: >> It's comforting that this approach yields quickly diminishing returns. >> Going from 25 to 60 networks only gets you a 10% increase in networks >> surveillance (if I'm reading the output correctly), and returns plateau >> entirely at that point (I'm considering about two percent

[tor-talk] Up-to-date Repositories

2012-08-21 Thread Robert Marquardt
Hello, The stable version of Tor is currently 0.2.2.38-1 according to the website. Does someone cares about the deb- and rpm repositories or are they deprecated? The latest version in the repositories is mainly 0.2.2.35. Or is there another reason (except the lack of time) why 0.2.2.35 is the

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Ted Smith
On Wed, 2012-08-22 at 04:42 +0300, Maxim Kammerer wrote: > > Also, it's not immediately clear whether eavesdropping those > networks > > would actually get you strong enough correlation to accurately > > de-anonymize users[1]. If our rodent(?) friend(s?) could comment on > > this, I'd appreciate th

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Maxim Kammerer
On Wed, Aug 22, 2012 at 2:11 AM, Roger Dingledine wrote: > I think your numbers may not be right (there are a lot of other subtleties > to the calculation), but your point is still generally correct. There are some subtleties, mainly the restriction on distinct families in a circuit — you can acc

Re: [tor-talk] End-to-end correlation for fun and profit

2012-08-21 Thread Andreas Krey
On Wed, 22 Aug 2012 04:42:35 +, Maxim Kammerer wrote: ... > technologies (like Tor). So maybe you need them to be ?sophisticated?, > after all, but my point was that you don't need something exceptional > like involving state security agencies ? i.e., FBI + UK Police + DE > Police + a couple of