logs archiveIRC Archive / Oftc / #tor / 2015 / July / 11 / 1
tinman
hi
Does anyone here know about the status of the freenode IRC network and Tor?
"*** PLEASE NOTE THAT THE tor HIDDEN SERVICE IS CURRENTLY UNAVAILABLE AND THERE IS NO SET DATE FOR ITS RETURN ***"
"Connections to freenode directly from Tor exit nodes are not allowed"
am I correct in assuming that until hidden services are brought online, connecting "naked" from Tor is not possible?
https://freenode.net/irc_servers.shtml
tea__
better ask the freenode staff about the availability of the HS
tinman
@tea__ my logic makes sense otherwise?
mrphs
tinman: freenode seem to block tor. if you want it to learn about its status, you should contact them.
tinman
@mrphs @tea__ thanks
question about Torsocks
I'm receiving this error when trying to connect to a server with SSH
"[Jul 10 15:58:43] PERROR torsocks[10875]: socks5 libc connect: Connection refused (in socks5_connect() at socks5.c:185)"
anyone familiar with this?
cacahuatl
Suggests the server is refusing connections?
tinman
yes, correct, but connecting to the server works fine with torsocks
*without
cacahuatl
oh wait, that's torsocks 2.1 I assume?
tinman
good idea to check actually it's not 2.0.0
i used brew install torsocks
seems to be the latest
         

cacahuatl
socks5_connect is it connecting to the local Tor instance, you might want to check /etc/tor/torsocks.conf to ensure the ip/port for tor are correct
tinman
ok
directory paths is probably the issue
i'm using the Tor Browser Bundle
so the DIR you suggested doesn't exist
cacahuatl
So you've installed torsocks but you don't have that directory? How did you install it?
tinman
installed using "brew install torsocks"
cacahuatl
oh, is this OSX or something? I don't think the newer versions even work on OSX?
tinman
correct
cacahuatl
So you might be using 1.2 or 1.3 and it was like /etc/torsocks/tsocks.conf or something back then?
tinman
assumed it did considering there was a brew package, maybe you're right
brew says it has installed "torsocks 2.0.0"
cacahuatl
it handles envvars, right? you can try "export TORSOCKS_CONF_FILE=~/torsocks.conf" in the shell
tinman
found where it's located
./usr/local/etc/tor/torsocks.conf
cacahuatl
and make a file in your home dir containing "TorAddress 127.0.0.1" and "TorPort 9150"
tinman
@cacahuatl thanks very much that did the trick
sambuddhabasu1
bucketm0use: 11
Aaro
sup
Edgegap
hola
what is the default search engine in tor?
in the tor browser
hulo
is nobody out there
ncl
search.disconnect.me is default in torbrowser now i think
Edgegap
i think i have some sort of an issue - i have duckduckgo showing as the default search engine
ncl
from upgrading rather than a fresh install, probably?
xdus4qhopfl64m4f
ncl yes
Edgegap
i dowloaded the latest tor browser - both a fresh install and an upgrade within tor
i am on ubuntu, and i also have firefox installed, where i set the default search engine to duckduckgo
seems some settings are being shared?
also when i open tor and look at the icon bar on left is shows no windows for tor browser but instead shows windows open under firefox
         

dwanne
would it be more secure to use tor through an ssh tunnel on a server running or tor or use a tor bridge?
neatrist
do you mean ssh to tor? i don't know. Is that possible?
dwanne
as in, tor is running on server
setup dynamic ssh tunnel, it's possible
neatrist
yeah your question does not make sense to me sorry.
dwanne
let me rephrase. if you connect to tor from a public network or so, the network admin can see that you are connecting to the tor network
neatrist
yes
bridges are designed to handle that
dwanne
yes, but wouldn't a network admin or isp be able to tell if you are connected to tor still?
neatrist
not from the data between you and the bridge's destination
They see the bridge and think you are looking at cnn.com
dwanne
how can they not see a connection from your ip to the bridge?
if the bridges are public, someone in authority would be knowledgable to the ips, would it not show your ip connected to one? you could parse it out quickly
neatrist
as far as the admin are concerned, you are connecting to some IP address somewhere else
dwanne
and as for ISPs?
neatrist
the bridges are not really public
I think you have to email Tor-project or something to get a bridge but I am not sure on that.
dwanne
you are able to access them via the web. Tor also puts out the bulk CSVs of all nodes
neatrist
say you are china. You want to view some website with some IP address. When you attempt to do that, China detects you are using Tor and blocks that connection.
But China does allow you to connect to an IP address, as long as it is not with Tor
dwanne
I see
neatrist
a bridge provides you with that IP address to connect to, that the location of that IP is likely outside of China
once it is outside of china, you can likely use Tor, unless the bridge IP address is also in a country that blocks Tor, which is unlikely
this is my understanding btw which may or may not be correct
dwanne
im confused as to how you are connected to the bridge
neatrist
I have never used the feature. I think with your Tor client, there is p robably an option to let you choose to use a bridge first, provided that you provide the IP address to use a a brige
velope
correct
dwanne
yes
neatrist
ah, good
velope
using bridges is convenient with torbrowser
dwanne
i understand the configuration part
but is it transparent to the isp? they no see the connection?
velope
of course they see it. there is no such thing as invisible traffic.
neatrist
as far as your isp is concerned, they only see you connecting to some IP address while not using Tor
dwanne
that means they can also block it
neatrist
but why would they?
dwanne
no clue
velope
correct, there is also no such thing as unblockable traffic.
neatrist
bridges are not public I believe. They would not know it is a bridge
velope
not as public as the regular tor nodes
dwanne
in terms of keeping tor usage semi hidden, i go back to my original question
velope
bridges are intended just to circumvent automated blocking
dwanne
on tails site it says its best to find one a friend maybe runs and not a pbulic on
neatrist
I am suprised they say that
dwanne
it makes sense though
velope
they say that because the less known the bridge IP is, the less likely it gets blocked
neatrist
oh...yeah I suppose if you are using a bridge, or trying to use one, it is ok to reduce the anonymity set slightly in order to make the connection possible at all
« prev 1 2 3 next »