Delivery-Date: Tue, 15 Jul 2014 07:26:41 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 7762A1E045A
	for <archiver@seul.org>; Tue, 15 Jul 2014 07:26:39 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 3CFD430666;
	Tue, 15 Jul 2014 11:26:34 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 27B5130630
 for <tor-talk@lists.torproject.org>; Tue, 15 Jul 2014 11:22:23 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id Wc-LDYuIPsF8 for <tor-talk@lists.torproject.org>;
 Tue, 15 Jul 2014 11:22:23 +0000 (UTC)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net", Issuer "Gandi Standard SSL CA" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id E82623062E
 for <tor-talk@lists.torproject.org>; Tue, 15 Jul 2014 11:22:22 +0000 (UTC)
Received: from fulvetta.riseup.net (fulvetta-pn.riseup.net [10.0.1.75])
 (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
 (Client CN "*.riseup.net", Issuer "Gandi Standard SSL CA" (not verified))
 by mx1.riseup.net (Postfix) with ESMTPS id CDA6F528C3
 for <tor-talk@lists.torproject.org>; Tue, 15 Jul 2014 04:22:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=riseup.net; s=squak;
 t=1405423339; bh=tX8mku/fEhSUKUzgG+0HIBzgO6ykr6+1p/3V4za744g=;
 h=Message-ID:Date:From:MIME-Version:To:Subject:References:
 In-Reply-To:Content-Type:Content-Transfer-Encoding;
 b=p+wvajPDkY1Fh8DzVzXP2dHqw/bCA65Wmu/xSQUVVd9rj9WAxjrQjfgJegYKlnpHZ
 9hEtE+ulfQb2uvEe8YKkMmkHPEeSoTj6u69l0/8fHeHC3pWdzrh6FlNYCXLxv+TBJH
 HRO1rMuqivBtSkQrg4nqwi0wJB4Y6t464xcizYnA=
Received: from [127.0.0.1] (localhost [127.0.0.1])
 (Authenticated sender: mirimir@fulvetta.riseup.net)
 with ESMTPSA id 03B2B553
Message-ID: <53C50EDF.2000902@riseup.net>
Date: Tue, 15 Jul 2014 05:22:07 -0600
From: Mirimir <mirimir@riseup.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
 rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <53C3C7C1.4020707@bitmessage.ch> <53C49132.30407@riseup.net>
 <53C4A6C5.5000505@bitmessage.ch> <53C4B03A.8090006@riseup.net>
 <53C4E2E8.8050105@bitmessage.ch>
In-Reply-To: <53C4E2E8.8050105@bitmessage.ch>
X-Enigmail-Version: 1.6
X-Virus-Scanned: clamav-milter 0.98.1 at mx1
X-Virus-Status: Clean
Subject: Re: [tor-talk] Fast and clean free provider for a couple of HTML
 pages
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 07/15/2014 02:14 AM, Red Sonja wrote:
> Now I'm getting somewhere.

:)

> Mirimir:
>>> I did. I have no idea how to sort them out.
>>
>> Well, they're free. So just pick one at random, and try to sign up via
>> Tor. Repeat until success. Then create a test page, and try to upload
>> with FTP via Tor. Repeat until success. That's what I would do, anyway.
> =

> Yes, but I have no idea what the server is seeing from me.

As long as you're using Tor browser or Tails, I doubt that the server is
seeing anything except a Tor exit IP.

> So I was hoping for somebody who already went through this to share
> info. The couple I have tried so far do not even use HTTPS for the
> control panel.

Using HTTPS for the control panel is another important criterion.

> I searched for ssh support and it is a web console that simulates ssh
> in the browser. FTP so far is plain and open.

I doubt that you'll find free web hosting that works with command line
tools. You won't get that until VPS hosting.

> And to make things nicer, they do email me the account and password.

That's all too common :( There's less need for support that way. It's
really bad when they email you the new password whenever you change it.

>>> So FTP is safe with Tor? What other protocols are fine over Tor? SSH is=
 one.
>>
>> That is a very complicated question. See the thread on SSH, for example.
>> As long as Tor has been properly configured for DNS lookup, any app that
>> has a SOCKS5 option is probably safe. However, complex apps that use
>> multiple protocols in the background (such as BitTorrent) are not safe,
>> except perhaps for highly expert users. If in doubt, use Wireshark to
>> test for leaks. If you're in a hurry, your best bet is to use Whonix.
>> Anything configured by default is probably safe, and the documentation
>> is excellent.
> =

> Yes.
> =

> But when most people ask the answers are like this. How's =ABproperly
> configured=BB? How do I know it is properly configured?

Ultimately, you know that when it works, and it doesn't leak, no matter
how you try to break it. Sorry :(

Actually, the "properly configured" part is easy:

SocksPort 127.0.0.1:9050
DnsPort 127.0.0.1:53

The hard part is the iptables rules. I'll post something useful ASAP.

> The wiki is quite messy. And you have old stuff and new stuff. None is
> dated so the new stuff can be old as well.

I agree. It's confusing.

> I fully agree with you: complex apps are simply complex. I want basic
> tools and for that I am ready to pass the GUI and go for the shell. But
> how do I test for leaks?

You install Wireshark, and then capture on eth0. You should see no
non-local traffic except with your entry guards.

To install Wireshark, open a terminal and run these commands:

sudo apt-get update
sudo apt-get install wireshark

To configure wireshark to allow a non-root user to sniff packets, run
these commands:

sudo dpkg-reconfigure wireshark-common
sudo adduser $USER wireshark

> Please understand, I have nothing against you: on the contrary, you are
> the only one who answered me. But the whole thing is a mess. A year or
> so I asked the Tails guys why doesn't my USB installed from VirtualBox
> doesn't work. They were rather cold and the main guy said something
> along the lines: it's not free and we don't support it. Yes, the USB
> part of VirtualBox is not supported.

I'm not sure that I understand that. USB support in VirtualBox does
require the extensions plug-in, and that's free but not "free" in a
purist sense. Is that it?

> Whonix needs it. And it's a 3Gb download.

As long as you're not hiding Tor from your ISP, I don't see why you need
to download Whonix via Tails. And yet, Whonix is large. The Tor gateway
VM could be much smaller. I can point you to instructions for setting up
a pfSense VM as a Tor gateway, if you're interested.

> I feel so lost...

It's very good to know that you're lost, when you're lost ;)
-- =

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

