![]() |
Tor
Just a quick question, I was wondering if any one had tried to get Tor (www.torproject.org) working on there N800? As I am interested in running Tor and maybe later on down the line a Tor end node. An don't want to reinvent the wheel if some one out there has already done it.
Thanks |
Re: Tor
Have you checked out some of the rumours(?) about Tor nodes?
|
Re: Tor
Which rumor? I'm curious?
Tor set you a better anonymity, not privacy. Keep this in mind!! And if you're talking about MiTM attack, just take care if you get a certificate popup warning arriving. |
Re: Tor
Quote:
=================== Lol, I'd love to see if you could run the Tor End-Node Service on the N800..... And before you point out it's a crazy idea, I'd do it for the same reason I installed Windows 3.11 under DosBox.... |
Re: Tor
I hope he doesn't want to run a tor end-node on the n800 :eek:
|
Re: Tor
your best bet is to run privoxy (or another socks4a proxy) and tor together on a full pc. leave the port for privoxy (8119) exposed and set the proxy on the n800 to the ip and port of the pc. i have this running at home. it works very well for my needs.
|
Re: Tor
I don't have links at hand as I read this stuff several months ago. I'm also no expert (no dummy either :-) ) but what I read at them time was enough to stop me from considering using Tor. IIRC many end-nodes are hosted by dodgy outfits (us/ru) who can exploit your connection in some way. Maybe FUD, I don't know, but no harm in checking around before risking anything.
|
Re: Tor
muki: Yer I am aware about what happens when people don't use Tor for what it is made for. People seem to mix it up as a secure way of transmitting data, but the last hop from the Tor endnode to the destination is send in plain text meaning all end nodes can sniff your data if you do not use some end to end encryption.
BOFH: That is part of the reason yes, I have been carrying out tests with Tor for abit now an wanting to see how portable this can be. A roaming Tor endnode in a university with there high speed connection should gather more traffic BUT would also like to have the use of tor when I need to be seen coming from another location an don't have a good proxy at hand free: yer I do want to run one on the n800, it would not be running full time like brendan: Thanks for that, I will set that up at home anyway. muki: Yer I know what ya mean some of these Tor endnode are hosted on very VERY costly servers that have a dam site lot of traffic pass through them an like you said hosted by some very shady charectors. |
Re: Tor
A collegue is hosting a tor endnode on a hosted server for 30 euros/month.
But he stopped it after several TBytes.. probably after a few days only. And the dodgy end-node that was doing MiTM attack was located in .. germany :D |
Re: Tor
Quote:
|
Re: Tor
A live example for people. I would first like to state this cookie has had the first 3 charetors replaced with X's and the last three charectors replaced with X's to make sure no harm comes to the inaccent.
GET /mail/ru/images/logon.gif HTTP/1.1 Host: img.mail.ru User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; ru; rv:1.8.1.11) Gecko/20071127 Firefox/2.0.0.11 Accept: image/png,*/*;q=0.5 Accept-Language: ru-ru,ru;q=0.8,en-us;q=0.5,en;q=0.3 Accept-Encoding: gzip,deflate Accept-Charset: windows-1251,utf-8;q=0.7,*;q=0.7 Referer: http://mail.ru/ If-Modified-Since: Wed, 02 May 2007 17:31:16 GMT Cookie: p=XXXDAFj0BXXX; c8=XXXGRwAAAADQEgIAAAAAAd6WAQAAAAAB3wABAXXX; Mpop=XXX9953936:020340704341777119050219091d031b0b 044f6c5150445e000e03091b02007c1f5c484d585b445b105a 545e591f4XXX:XXX@mail.ru:; mrcu=XXX8478471E25D8BC4EE59DBDXXX; t=XXXD1AAAAAAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAABAAABAAAAAAAAAAAAAAkGwXXX; c56=XXXPRwAAAAHe/QEAAXXX; Mpopl=XXX760XXX Connection: close But this is just a example of how easy the data can be obtained, this was done through a unmodifyed Tor endnode. |
Re: Tor
Quote:
|
Re: Tor
Maybe I need to have my tinfoil hat adjusted, but I have always just assumed that Tor was a NSA project to get people with something to hide to funnel all their traffic through NSA sponsored servers. I would be kind of disapointed in the NSA if they didn't do something like this.
|
Re: Tor
As I said from the start
Quote:
Use HTTPS and watch out for popup about wrong certificate. I don't see the point of dumping packets.. Just launch tcpdump and that's it.. The same can be achieved for the people in an ISP or on a core router. There's no exploit here, nothing new |
Re: Tor
Quote:
AFAIK, the NSA and FBI are currently trying to "hack" tor, so that the features of anonymity are rendered useless. from what i get, they haven't been successful. if you use privoxy effectively, and disable many of the browser add-ons like java and flash, you can mitigate the amount of information available to the sites you connect to. i run two versions of privoxy on my box. one is forwarded to from squid on the loopback only. the other forwards traffic through tor from the ip. for the most part the filtering is the same for both instances, but the big difference is that the logging for the second (that routes through tor) is sent to /dev/null. the point is anonymity, so why would i log what gets requested, right? i have also found a utility called torK from sourceforge.net that allows you to manipulate the tor configuration via GUI. it also manages bandwidth and shows the route through the tor network that your requests make. kinda neat, but one of the issues i keep running into is the cookie based auth that it uses to attach to the instance of tor that is running. |
Re: Tor
Guys,
I have gotten these popups about wrong certificates(maybe one or two), but I get them on my Mac too. I'm new to this so bear with my newbie question. Do I disconnect the browser immediately or do I answer no and continue? lol, Dan |
Re: Tor
As for the original question: I started to port tor for OS2007 a while back, just to see if it could be done out of the box. As it turned out there are a couple of libs it'll need that are not directly available, so I stopped at that point. However, I intend to revisit this later when I get some more time, unless someone beats me to it.
|
Re: Tor
It don't seem like any one has done it yet so you will have to keep us up to date on how it goes
|
Re: Tor
I've recompiled it for our devices, fetch it from the repo below. In case of installation problems, please paste the log. I had to change a few stuffs in the user handling/ removal scripts so that it can install. It will create a user debian-tor for more security.
The default service conf file is in /etc/default/tor. If RUN_DAEMON is set to yes, tor will start when the device starts. Otherwise you'll have to do it manually (/etc/init.d/tor start as root) We have to make a special configuration with privoxy support. |
Re: Tor
|
Re: Tor
Whenever I attempt to download tor, it seems to try a few times and then fails to download. Is this just due to the repository being flaky?
|
Re: Tor
The "torify" program doesn't seem to be included does it?
|
Re: Tor
Seems to work fine for me and torify was in the download too
|
All times are GMT. The time now is 16:44. |
vBulletin® Version 3.8.8