logs archiveIRC Archive / Oftc / #tor / 2010 / January / 12 / 1
nsa
or: mikeperry committed revision 21405 (/torflow/trunk/CircuitAnalysis/BuildTimes/CBT-Test):
or: Change loggig slightly. Output learned timeout data too.
YesIndeed
Hey everybody
I have a hidden service related question if anyone is game
Piet
Based on http://metrics.torproject.org/graphs-static/iran-bridges.png I'd say bridges don't seem to work for iranian users. Do you think that's wrong?
I would expect more than 500 users from there and those two spikes seem to indicate there have been many more for short periods while they were allowed through (for testing maybe)
interestingly those spikes are very similar to those recorded for burma and vietnam
so one might assume the stats were incorrectly recorded at these times.
phobos
or there is some oddity in the data messing with R
last we heard, iran doesn't need bridges yet, as the public tor relays work
the iranian firewall does throttle ssl at random times to make everyone equally unhappy
Goldstein
are u sure the us doesnt need bridges yet?
phobos
maybe everyone needs bridges, what do I know
ultramage
hello, I'd just like to point out an issue with a certain part of the website... on https://check.torproject.org/cgi-bin/TorBulkExitList.py the html code has a typo, using the name='ip' in two places on the html form, causing the text entry box to not display.
not sure if that script even works, just found it by accident and noticed this ^^
phobos
(Action) checks
which browser
ultramage
tried IE8 and Opera
         

phobos
works in firefox
so far
ultramage
hehe, nice, ffox repairs the html
Goldstein
browsers should just reject bad html
the world would be a better plaace
phobos
firebug sees no errors
ultramage
they do, if it's xhtml and you declare it as application/xhtml+xml
but then your users get freaky 'can't parse xml' errors if php decides to dump an error message into the output :)
phobos: the 'error' is that both the submit element and the text element of the form have the name 'ip'
phobos
yup
i see it in ie8
ultramage
it's 4AM so I don't feel like opening the html spec, but I'd wager there's some clause that says each element should have an unique name
phobos
https://bugs.torproject.org/flyspray/index.php?do=details&id=1210 filed
someone will fix it
ultramage
thanks :)
Goldstein
yeah well html should fail too
ultramage
oh, while I'm here... just wondering, if you guys run exit nodes, is your hoster/ISP Tor-aware?
misc
i run relay, and I have asked to the hoster, their only concern was bandwidth
ultramage
there's this server machine that was replaced a few weeks ago, but still leased, so I put Tor on it and made it an exit node with everything on default... and got a copyright infringement notice forwarded to me just 2 hours later
they sure do work fast :)
Goldstein
lol
misc
( my previous one didn't know and the server got closed )
ultramage
ran wireshark and saw that some dude was blasting bittorrent at full speed
looking forward to improvements to the system ^_^
I made it relay-only afterwards... didn't want to mess with the hoster since the old machine's contract ends tomororw
but if I ever wanted to make an exit node, I'd probably go do some negotiations with the hosting first -.-
Goldstein
do torrenters really get into so much trouble if they dont use tor?
ultramage
no idea about that, maybe it was a high-profile thing
or they picked their targets based on location/hosting
makes me wonder though... if according to the tor dmca takedown instructions page there should be no liability, if I actually do evil stuff on the box itself while running a tor exit node, and then claim "it was a tor user who did it"... who has the burden of proof :P
Goldstein
good q
i would think network ops would be liable for whatever happens on their net
if they authorized it
ultramage
so are you liable for running an exit node or not? still curious about that
         

Goldstein
maybe not
dont understand why though
ultramage
because otherwise the only appropriate place to run an exit node would be some forsaken country with no laws
should get this thing governmnent-endorsed and backed
Goldstein
or that island off the uk
as far as dmca is concerned, it's the host that's liable afaik
phobos
an isp is considered a common carrier and therefore aren't liable for the data on their network
ultramage
oh
phobos
similar to how phone companies aren't liable for crimes that take place over their network
at least in the usa, this is how it works
ultramage
ok, so how do people who run exit nodes manage to keep them up?
phobos
good isp's realize the dmca takedown notice is just an allegation and will send it to the person at the Ip address
they merely act as a proxy between the accused and accuser
ultramage
right, and so they did... and from that point?
phobos
using the tor dmca response generally works well and the accuser goes away
or sends another one for some different hash it thinks it detected
my printer has received dmca takedown notices
unlikely it's sharing anything
the vast majority of tor traffic is normal, boring traffic
ultramage
yea, since they obviously just grab a list of alleged peers and don't waste resources to actually confirm anything
phobos
that's how most exit nodes stay up
nothing happens from them
ultramage
ok, so what you say is just wave around the dmca response?
(getting the feeling that the result depends largely on their goodwill)
Goldstein
that law seems predicated on the assumption that the isp can contact and deny access to the offender
so it seems shaky to me
ultramage
ok, and if the law does not discriminate based on the circumstances, that would be me... and poof exit node server permanently offline.
I'd kinda want to see more documentation of this kind too
phobos
what kind of documentation?
ultramage
can't remember 100%, but do the docs also cover how to proceed in such cases?
phobos
https://blog.torproject.org/blog/five-years-exit-node-operator
http://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
Goldstein
how well does port blocking do at stoping torrenting?
ultramage
well, if uncheck all of the boxes, it works <_<
but that's not an exit node anymore
Goldstein
well suppose you just exit on all the irc ports
ultramage
hm, the tor-dmca-response document only states that 'claims of infringement' are not proof of infringement and therefore do not activate the disconnect part of the law
guess any steps after that would be a personal legal battle, outside of scope of the document
when tor gets ipv6 I'll start advertising the use of hidden services
hidden tracker -> non-issue
of course the network wouldn't be happy about that
currently can't do anything since my isp does not assign public ips :\
at least the old box is doing fine... 700kB/s up 700kB/s down, recv:560GB, sent:614GB
got another 1gb until the limit, so I'll just leave it running until they decide to turn off the box
phobos
lots of people use hidden services to host a tracker
it's the bulk transfer that sucks
people in china use hidden trackers to share international versions of skype without the govt backdoor
and linux distros copied from outside the country
Goldstein
dr|z3d: Fuck you
maybe if i killed you, good things would happen
dr|z3d: Fuck you
maybe if i killed you, good things would happen
dr|z3d: Fuck you
spike
?@5254! BCB ?> @CAA:8 3>2>@OB?
here to speak Russian?
dr|z3d
spike: English please.
No Russian spoken here, sorry.
spike
thanks
dr|z3d
Maybe there's a #tor-ru channel?
Probabably not, but you might become the founding member. :)
spike
I was there one :)
dr|z3d
We can deal with broken English here, if you have a question? :)
spike
no. no questions. I just came out of curiosity.
dr|z3d
Oh, ok. Then pull up a seat, crack open a beer, and welcome!
spike
:)
saeftl
how do i "UseBridges"? it seems that i need to know at least one bridge to do that. from what source?
Runa
saeftl: to learn about bridges, go to https://bridges.torproject.org/
saeftl
runa: thank
s
is this a question for the FAQ?
r1eo
client_likes_consensus() no need to call log_warn(), crazy urls of reqs from some clients are frightening relay operators.
SwissTorExit
morning to everyone, i don't why from a few it seem that the guard flag appear and disipear without reason for me , like the speed told by vidalia don't correspond to the consensus. It is normal or a bug somewhere? i.e : Current Uptime: 2 Day(s), 10 Hour(s), 51 Minute(s), 32 Second(s)
Bandwidth (Max/Burst/Observed - In Bps): 153600 / 204800 / 225213 and i see 80 to 120 KB in vidalia
well a concreate test about the better speed of Tor actually is that is possible yet to read the news in direct streaming 90 % of the times as early was not possible, so it really lokk more quick instead of what the stats said...
and that's so great while it great to can see news for me :P
r1eo
extrainfo_dump_to_string() do wrong. if tor_snprintf() returns -1 no need to ""Adding stats to extra-info descriptor."" useless anyway, need to free() and to return -1; imidately.
karsten
r1eo: good catch. is there a known bug associated with that?
Sebastian
karsten: I think no.
r1eo
yep, no bug. at least no overflows with such.
bug 1208: can be that missed "\n" before strlcat of "router-signature\n" because some appended before string do not contained it; or that not fitten "router-signature\n" because small buffer?
karsten
r1eo, Sebastian: can either of you file a bug report on the extra-info thing above, please? i don't have my flyspray pw here right now.
Sebastian
filed, subscribed karsten.
1211
karsten
thanks
r1eo: can't check. the most recent sources i have here are from november. can you see if that code has changed recently, like in december? e.g. by using 'git blame router.c'.
r1eo
parse_bridge_stats_controller() looks interestly.
ah, no. fname = get_datadir_fname("stats"PATH_SEPARATOR"bridge-stats"); more interestly.
He wrote (Sami Farin): "Deleting the old cached stuff at /var/lib/tor" so he deleted stats subdir or possible not? thats a question?
OFFShare
the address of a hidden service is part or full the public key the hidden service sends to the directory servers. So does the dircetory server know all hidden servers addresses ?
keb
it knows their fingerprint, it never knows their ip address
OFFShare
but it knows their onion address or not ?
keb
i bleive so
*believe
OFFShare
ok, thats what i got so far...
keb
git seems to be down still
SwissTorExit
hi keb ,, yep , i hope that will soon online :P
keb
there is a mirror for the website but not for the git
curious
SwissTorExit
yep, i dunno what'up with it
keb
is git designed to support distributed repositories
nsa
or: mikeperry committed revision 21406 (/torflow/trunk/CircuitAnalysis/BuildTimes/CBT-Test):
or: Change how the run redo works. Make it run as specified in
or: the outline. Also fix some bugs.
uvok
hello
I am running a tor server. Sometimes my connection gets lost & a receive a new IP adresse. thus, the published server descriptor isn't correct anymore, but tor doesn't seem to send a new descriptor.
is there a solution to this, except for restarting the server?
pipe
I would add a line that sends a SIGHUP to the running tor whenever you get a new IP
Not the cleanest way, but cleaner than restarting
uvok
pipe, how can I detect if I get a new IP adress? (so what would the script look like)
pipe
Depends on what DHCP client you use
the script would just be "kill -HUP `pidof tor`"
Assuming you run linux :)
uvok
pipe, DHCP? you're kidding ;-) I am using a static IP to connect to my router (and yes, I run linux)
pipe
If you get a new IP it's not static
*especially* not if you get a new one when you disconnect
uvok
pipe, About which IP are we talking?
about my pc (192....) or my public? (84...)
pipe
your public of course
uvok
cause the first keeps the same, while the latter changes
actually only my router knows that I get a new IP, my PC doesn't notice it (unless I would check my IP with a script every 5 minutes or so...)
pipe
How long have you waited to see if your IP is updated in the published list?
uvok
dunno, I have only checked one of the tor status websites, maybe that was the mistake (they need quite a while...)... I'll have a look at the server descriptor next time it disconnects...
pipe
I don't know how this works really, but the servers find out about your IP when you connect to them I think
If your IP changes, you connect from a new one (naturally), and they should detect this
uvok
bleh, http://moria.seul.org:9032/tor/status/authority doesn't load here...
dr|z3d
Evading bans, Gold5tein, only serves to strengthen the case for keeping your ban in place.
Gold5tein
i'll just do a better job then
pipe
wtf
Gold5tein: What the hell were you doing back there?
Gold5tein
howdy
back where?
pipe
(Action) reads backlog from the banning :)
Gold5tein
yeah, I'm sorry about that
I was pissed because dr|z3d was a jerk to me on #nottor
pipe
ah
dr|z3d
This is all very interesting, and all very irrelevanyt
pipe
I thought it was interesting, because what was seen here was a seemingly normal conversation and then suddenly he started to threaten to kill you repeatedly, I just couldn't find any logical reason
dr|z3d
pipe: Can we #nottor this please? :)
Runa
or not, there's no need to feed the troll :)
Mother
greetings
quick question, machine A is running tor, machine B has A's LAN IP as its default gateway
machine A has the outbound router's LAN IP as its own default gateway in turn
pffft
never mind
stupid idea
« prev 1 2 next »