[tor-talk] SMTP & POP3 Email over Tor.. Anonymity breaking?

2011-06-02 Thread Anon Mus
Hi, Is it true that email SMTP & POP3 hosts (e.g. gmail's servers) can obtain from SMTP & POP3 clients (e.g. Thunderbird) data such as, 1. client time zone 2. client machine clock time 3. client machine time since last boot even though its over Tor? If so, can't these be used to trace a clie

Re: [tor-talk] SMTP & POP3 Email over Tor.. Anonymity breaking?

2011-06-02 Thread tor
On 02/06/2011 11:59, Anon Mus wrote: > Is it true that email SMTP & POP3 hosts (e.g. gmail's servers) can > obtain from SMTP & POP3 clients (e.g. Thunderbird) data such as, > > 1. client time zone > 2. client machine clock time > 3. client machine time since last boot > > even though its over T

Re: [tor-talk] Police was here - whats next?

2011-06-02 Thread Andrew Lewis
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I've been lucky so far, both times police contacted me I just said it was a Tor exit node and it was ok. On Jun 1, 2011, at 11:32 PM, Jim wrote: > > > Nils Vogels wrote: > >> Took a bunch of envelopes to explain the onion rings, but it worked :)

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread CACook
On Wednesday 1 June, 2011 18:41:47 Marsh Ray wrote: > > - VirtualBox VM bridged to LAN still must share the LAN class C, and > > could potentially monitor internal traffic. (And please don't > > quibble with me calling it a class C... they have to make up a name > > and stick with it. I still ca

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Geoff Down
On Thu, 02 Jun 2011 06:36 -0700, cac...@quantum-sci.com wrote: > On Wednesday 1 June, 2011 18:41:47 Marsh Ray wrote: > > > - VirtualBox VM bridged to LAN still must share the LAN class C, and > > > could potentially monitor internal traffic. (And please don't > > > quibble with me calling it a

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread CACook
On Wednesday 1 June, 2011 18:41:47 you wrote: > Don't forget the host-only virtual networking that was suggested too. The Host-only VM adapter does not mean guests will have Internet access; in fact, they won't. vboxnet0 does not have a default gateway. To make vboxnet0 also serve queries outs

Re: [tor-talk] SMTP & POP3 Email over Tor.. Anonymity breaking?

2011-06-02 Thread cmeclax-sazri
On Thursday 02 June 2011 07:24:27 t...@lists.grepular.com wrote: > Not sure. If I wanted to access my email over Tor, but using a proper > client rather than webmail, I'd probably set up fetchmail to fetch the > email using SSL secured POP3 over Tor, and drop it in a local Maildir, > and point Thun

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Joseph Lorenzo Hall
I hate to feed a troll, but many of us run relays that we monitor for badness... it's hard to tell from your curt messages what exactly your issue is or what your use case is. I'm certainly sure you're one of very few people that have alleged Tor is coy about security. Maybe if you laid your case o

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Javier Bassi
On Thu, Jun 2, 2011 at 11:35 AM, Joseph Lorenzo Hall wrote: > I hate to feed a troll, but many of us run relays that we monitor for > badness... it's hard to tell from your curt messages what exactly your > issue is or what your use case is. I'm certainly sure you're one of > very few people that

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Praedor
I've run tor relays for years (linux) and have never ever had any security issues. No compromises, no hacks, no nothing. Untouched. praedor On Thursday, June 02, 2011 09:51:37 am Geoff Down wrote: > > On Thu, 02 Jun 2011 06:36 -0700, cac...@quantum-sci.com wrote: > > On Wednesday 1 June, 2011

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread tor
On 02/06/2011 16:30, Javier Bassi wrote: >> I hate to feed a troll, but many of us run relays that we monitor for >> badness... it's hard to tell from your curt messages what exactly your >> issue is or what your use case is. I'm certainly sure you're one of >> very few people that have alleged To

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Javier Bassi
On Thu, Jun 2, 2011 at 12:52 PM, wrote: > "If Tor has vulnerabilities, it might get exploited!" > > Of course, you can replace "Tor" with any other application name. Tor is > not special in this regard. Yeah, thats why I found his argument strange and said 'I think he's trying to say' although m

Re: [tor-talk] SMTP & POP3 Email over Tor.. Anonymity breaking?

2011-06-02 Thread Anon Mus
t...@lists.grepular.com wrote: On 02/06/2011 11:59, Anon Mus wrote: Is it true that email SMTP & POP3 hosts (e.g. gmail's servers) can obtain from SMTP & POP3 clients (e.g. Thunderbird) data such as, 1. client time zone 2. client machine clock time 3. client machine time since last boot e

[tor-talk] Websites that exclude tor users.Impossible to surpass?

2011-06-02 Thread Luis Maceira
I have faced several websites that exclude Tor users from Sign Up with them,even configuring torrc to go through low speed ExitNodes(not associated with spam) it is not possible.They must be using TorDNSEL,or so,and receiving real time csv lists of ExitNodes and that way it is easy to exclude to

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Joseph Lorenzo Hall
On Thursday, June 2, 2011, Javier Bassi wrote: > > What is think he is trying to say is that if someone finds a security > vulnerability in Tor/Vidalia (this has happened in the past) the > attacker can easily have a list of all IPs running relays, and may > compromise all their machines with his

[tor-talk] .onion jabber server

2011-06-02 Thread Jerzy Łogiewa
does anyone here know of open .onion jabber server? -- Jerzy Łogiewa -- jerz...@interia.eu Dzwonki MP3 na telefon. To sa prawdziwe hity! Pobierz >> http://linkint.pl/f29c2 ___ tor-talk m

Re: [tor-talk] detecting harmful relays

2011-06-02 Thread Ted Smith
On Wed, 2011-06-01 at 21:35 -0600, Jim wrote: > > and...@torproject.org wrote: > > On Wed, Jun 01, 2011 at 05:31:41AM +, krak...@googlemail.com wrote 1.9K > > bytes in 45 lines about: > > : A few weeks ago, there was one that tried to give me a .bin file > > : whenever I tried to visit a non-

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Andrew Lewman
On Thu, 2 Jun 2011 12:30:33 -0300 Javier Bassi wrote: > What is think he is trying to say is that if someone finds a security > vulnerability in Tor/Vidalia (this has happened in the past) the > attacker can easily have a list of all IPs running relays, and may > compromise all their machines with

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread CACook
On Thursday 2 June, 2011 09:53:05 Javier Bassi wrote: > On Thu, Jun 2, 2011 at 12:52 PM, wrote: > > "If Tor has vulnerabilities, it might get exploited!" > > > > Of course, you can replace "Tor" with any other application name. Tor is > > not special in this regard. > > Yeah, thats why I found h

[tor-talk] student project "entry point distribution in overlay networks" useful for Tor

2011-06-02 Thread Kevin . deKok
Hi *, Last year we (student group) did a research project called "entry point distribution in overlay networks". The information in the paper might be useful in combination with Tor. The paper is available here: http://pimpmyshell.org/entry_point_distribution_overlay_networks.pdf regards, Kevin

Re: [tor-talk] SMTP & POP3 Email over Tor.. Anonymity breaking?

2011-06-02 Thread tor
On 02/06/2011 17:55, Anon Mus wrote: >>> Is it true that email SMTP & POP3 hosts (e.g. gmail's servers) can >>> obtain from SMTP & POP3 clients (e.g. Thunderbird) data such as, >>> >>> 1. client time zone >>> 2. client machine clock time >>> 3. client machine time since last boot >>> >>> even tho

Re: [tor-talk] .onion jabber server

2011-06-02 Thread George-Lopez
Jerzy Łogiewa wrote : > does anyone here know of open .onion jabber server? ch4an3siqc436soc.onion:5222 > > -- > Jerzy Łogiewa -- jerz...@interia.eu > ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailma

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Martin Fick
--- On Thu, 6/2/11, t...@lists.grepular.com wrote: > "If Tor has vulnerabilities, it might get exploited!" > > Of course, you can replace "Tor" with any other application > name. Tor is not special in this regard. It is a server though, and every other application is not. Most home user's are n

Re: [tor-talk] SMTP & POP3 Email over Tor.. Anonymity breaking?

2011-06-02 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/02/2011 06:55 PM, Anon Mus wrote: > Does anyone know if there is a mail client source code out there that I > could modify to create a client that would send settable/random values? You can modify some of the header values using about:config,

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Martin Fick
--- On Thu, 6/2/11, cac...@quantum-sci.com wrote: > For those interested, so far my best idea is running the > daemon in a VirtualBox VM running SELinux as guest, and > bridged to the outside.  This should substantially > solve most problems except membership in the local > LAN.  I don't think

Re: [tor-talk] layer 2 separation: relay in a Host-only network (was: EFF Tor Challenge)

2011-06-02 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/02/2011 03:56 PM, cac...@quantum-sci.com wrote: > On Wednesday 1 June, 2011 18:41:47 you wrote: >> Don't forget the host-only virtual networking that was suggested >> too. > > The Host-only VM adapter does not mean guests will have Internet >

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread CACook
On Thursday 2 June, 2011 14:50:44 Martin Fick wrote: > --- On Thu, 6/2/11, cac...@quantum-sci.com wrote: > > > For those interested, so far my best idea is running the > > daemon in a VirtualBox VM running SELinux as guest, and > > bridged to the outside. This should substantially > > solve most

Re: [tor-talk] layer 2 separation: relay in a Host-only network (was: EFF Tor Challenge)

2011-06-02 Thread CACook
On Thursday 2 June, 2011 15:45:04 tagnaq wrote: > > At the end, you will have achieved Bridged networking, so why > > bother? > > If your Host OS acts as a router your relay running in a VM won't be > able to perform layer 2 attacks on your LAN as long as the VM can't > compromise the Host OS. Th

Re: [tor-talk] EFF Tor Challenge

2011-06-02 Thread Martin Fick
--- On Thu, 6/2/11, cac...@quantum-sci.com wrote: > > > For those interested, so far my best idea is > running the > > > daemon in a VirtualBox VM running SELinux as > guest, and > > > bridged to the outside.  This should > substantially > > > solve most problems except membership in the > local >

[tor-talk] ReachableAddresses *:* harmful?

2011-06-02 Thread Fernan Bolando
Hi all In my torrc, in order to use bridges that uses ports other than 80,443 Is it acceptable to simply use ReachableAddresses *:* or allowing only specific ports ReachableAddresses *:9001,*:8080,*:80,*:443 regards fernan ___ tor-talk mailing list t

Re: [tor-talk] ReachableAddresses *:* harmful?

2011-06-02 Thread Roger Dingledine
On Fri, Jun 03, 2011 at 10:18:53AM +0800, Fernan Bolando wrote: > > In my torrc, in order to use bridges that uses ports other than 80,443 > > Is it acceptable to simply use > ReachableAddresses *:* > > or allowing only specific ports > ReachableAddresses *:9001,*:8080,*:80,*:443 If you've conf

[tor-talk] The Fight Against Browser FingerPrinting & Creating New Firefox Release for Non-Tor usage based on Tor Browser bundle

2011-06-02 Thread Victor Garin
The Fight Against Browser FingerPrinting & Creating New Firefox Release for Non-Tor usage based on Tor Browser bundle This post will be cross-posted to the blog where it was stated that Tor Button will soon merge with the Firefox and it won't be a stand-alone add-on anymore. I don't understand wh

Re: [tor-talk] ReachableAddresses *:* harmful?

2011-06-02 Thread Fernan Bolando
On Fri, Jun 3, 2011 at 10:59 AM, Roger Dingledine wrote: > On Fri, Jun 03, 2011 at 10:18:53AM +0800, Fernan Bolando wrote: >> >> In my torrc, in order to use bridges that uses ports other than 80,443 >> >> Is it acceptable to simply use >> ReachableAddresses *:* >> >> or allowing only specific por

Re: [tor-talk] ReachableAddresses *:* harmful?

2011-06-02 Thread Sebastian Hahn
On Jun 3, 2011, at 6:52 AM, Fernan Bolando wrote: > Thanks, Actually openbsd seems to defaults this to > ReachableAddresses *:80,*:443 Did you (or does openbsd) set the FascistFirewall option by chance? How did you learn that openbsd defaults to ReachableAddresses *:80,*:443? Thanks Sebastian _