logs archiveIRC Archive / Oftc / #tor / 2010 / June / 27 / 1
Malkovich
lalalala
atagar
mikeperry: Are STATUS_SERVER events currently being reported by TorCtl via unknown_event?
... and another question: what can cause a relays fingerprint to change? Just sighups?
... and the idhash of NetworkStatus entries is the relay's fingerprint, right? Or is it the orhash?
DarkNemesis
hi
m3ga
DarkNemesis: hi
DarkNemesis
anyone able to connect to freenode via tor
?
(Action) is hung over and needs to connect to freenode - less thinking = good
m3ga, can ya help??
m3ga
DarkNemesis: i have never tried to connect to freenode over tor.
DarkNemesis
m3ga, ahh cool
dr|z3d
DarkNemesis: Don't bother, freenode have all but banned Tor. You'll need a gpg key to connect, if they still permit that. Their website will indicate what you need to do.
L0rD`
yes u still can use tor with freenode, connecting to p4fsi4ockecnea7l.onion , but no gpg magic needed anymore, just use your nickserv account information to auth with sasl
in other words: u need a freenode account + an irc client which supports sasl auth or use a plugin for that
         

DarkNemesis
L0rD`, i am on gnome-xchat
howd i do that?
dr|z3d
L0rD`: Ah. Been a while since I looked.
L0rD`
DarkNemesis: read this carefully: http://freenode.net/irc_servers.shtml#tor
DarkNemesis
(Action) has hangover
(Action) needs simplicity
L0rD`
hehe
DarkNemesis
3 pints of cider and im dead
L0rD`
ok... if you need a x-chat plugin go http://adipose.attenuate.org/~stephen/ircd-seven/sasl/ there and leech the plugin and read the readme file carefully
I used the same plugin before, but now I use irssi with freenode, cause I didn't find a xchat plugin supporting DH-BLOWFISH encryption with sasl, just plaintext
DarkNemesis
L0rD`, thanks
L0rD`
np
DarkNemesis
umm one issue
(Action) is a linux user
L0rD`
(Action) dito
DarkNemesis
isnt dll window$?
ahh coolies
L0rD`
u don't need the ddl file, it is for mirc
for xchat use the cap_sasl.py
yeah it is a bit a pain in the ass to set it up, I guess the freenode guys wanted to stop misabuse through tor users...
Goldstein
it also means you have to connect untorified 1st before using tor basically compromising you to some extent. I rec going traveling..
DarkNemesis
freenode wont let me join even though i stopped tor
Runa
DarkNemesis: are you running a relay?
wanoskarnet
Alarm. Sybil attack detected.
DarkNemesis
sybil???? 0.o
dont mention the war
atagar
DarkNemesis: if you've run a relay at all then freenode keeps you black listed for quite a while (sucks, but they can remove you from the list if you poke them enouogh)
DarkNemesis
24 hours apparently
         

arma
used to be a week
DarkNemesis
umm thing is atagar i run a exit node on one pc NOT on the other
and have one on all the time
arma
do they all share the same external ip address?
DarkNemesis
yup
arma
then "you" run a tor exit relay, from freenode's perspective
you could stop exiting to freenode, but they are really bad at understanding exit policies, so you basically have to stop allowing web browsing, irc, IM, etc to do that
they are frustrating at many levels
kmm
if you have ssh access to any system with an ip address that isn't shared with a tor relay you can treat it as a SOCKS proxy using ssh -D
murb
arma: what is more frustrating is when you're unable to connect via their hidden service.
and you also have the chicken and egg thing of getting a registered username / anonymous email address.
DarkNemesis
murb it's like that with the government
(Action) works on human rights issues - the government says no
Howe14
On the network tab If I click on "I use a proxy to access the internet' Does my webtraffic go through the proxy then through tor or does it skip tor all together?
arma
the former
you're configuring tor to use a proxy
Howe14
Woundering because on the network tab it says skepstorbridge and I did not know what that ment
arma
what's a skepstorbridge?
are you using a translated vidalia?
(a poorly translated vidalia, i mean ;)
Howe14
it says "skepstorbridge,welladjusted,foebud3
arma
ah. that is likely a tor relay nickname.
are you configuring your tor to use a bridge too?
Howe14
So using a proxy ontop of tor will defeat tor being able to snooped on by watching both ends of the connection right?
No letting tor pick the adresses itself
arma
i cannot parse your question. try again?
Howe14
On the website it says tor is volunerable to the entrance node and the exit node so I was asking does using a proxy ontop of tor fix that?
being watched
arma
no, probably not. unless your proxy is magically a) unwatchable by all adversaries, and b) not affiliated with you in any way
and if it is, stop using tor and use your magic proxy. :)
(well, ok, not quite. tor still adds something even to this magic proxy.)
(specifically, it adds the feature that your magic proxy doesn't get to learn what you do.)
Howe14
But would using a random free proxy make me more secure ontop of tor?
arma
i'm not sure. against some adversaries, probably. depends what you think the odds are of your adversary knowing about that proxy.
using a random free proxy will probably hurt your performance.
Howe14
actually helped it
tor runs slow using a bridge is faster at first then slows down
same thing with every bridge is faster then slows down after a little bit like its being thorttled
arma
ah, so you *are* using a birdge
are you using a lot of bandwidth?
Howe14
3meg connection hardly using much of it
arma
probably depends on your bridge.
Howe14
Same for every bridge though
arma
if you configure your tor to use a proxy, that is a separate decision from whether you're using a bridge. that is, you can use a proxy and a bridge at once.
also, i bet you haven't tried every bridge. :)
Howe14
Well I use the retrieve function every day and must have tried at least 15 different adresses with the same result
arma
but when you use a proxy *and* a bridge, it works better?
Howe14
Was using just the proxy and not the bridge but yeah its better
Seems like any bridge has its bandwith throrttled
« prev next »