LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


Reply
  Search this Thread
Old 08-23-2010, 09:30 PM   #1
Johnny Faster
Member
 
Registered: May 2006
Location: Texas
Distribution: Ubuntu 6.06
Posts: 74

Rep: Reputation: 25
Firefox w/ TorButton (& Vidalia) Constantly using the same 3 (banned) IP Addresses


I'm on a forum that has banned IP Addresses (I assume) due to spamming. Maybe they are using a blacklist, I don't know. I use the site with Firefox and TorButton. About half the time I am able to access the site's pages, but about 50% of the time I get the error message: "Sorry. The Adminstrator has banned your IP Address...".

When I check my current IP Address, it seems to be the same 3 IP Addresses, over & over again. But when I check the graph of my Tor network, I see HUNDREDS of tor Users and I assume Tor could be using any or all of them, but for whatever reason it wants to use the same 3 banned IP Relays/Servers (whatever the correct term is) over & over again.

I thought the whole point was to randomize the IP Address in order to provide anonymity.

It ain't workin'.

Am I doing something wrong, is this thing broken, or what ?
 
Old 08-23-2010, 10:31 PM   #2
Jeebizz
Senior Member
 
Registered: May 2004
Distribution: Slackware15.0 64-Bit Desktop, Debian 11 non-free Toshiba Satellite Notebook
Posts: 4,187

Rep: Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379
I dunno, but it sounds like you are trying evading a ban and it is not really our purpose to help you with that. If you do feel you are wrongly banned, contact the administrator of that site, and also perhaps not use tor to get to that site.
 
Old 08-29-2010, 01:09 PM   #3
cantab
Member
 
Registered: Oct 2009
Location: England
Distribution: Kubuntu, Ubuntu, Debian, Proxmox.
Posts: 553

Rep: Reputation: 115Reputation: 115
Quote:
Originally Posted by Jeebizz View Post
I dunno, but it sounds like you are trying evading a ban
No, he's trying to use Tor.

It may be that a lot of Tor users are disallowing exiting to that site. But even so...same IPs all the time, I'd call that suspicious. Tor is all very well and good, but I rather suspect it could be completely subverted by your ISP if they wished to.
 
Old 08-29-2010, 03:17 PM   #4
Johnny Faster
Member
 
Registered: May 2006
Location: Texas
Distribution: Ubuntu 6.06
Posts: 74

Original Poster
Rep: Reputation: 25
Quote:
Originally Posted by cantab View Post
No, he's trying to use Tor.
Exactly.

I may have overstated it a bit. Tor does not default to the same 3 Servers each & every time, and it's not necessarily just the same 3 Servers, however it DOES seem to exit the same group of Servers more frequently than others.

Half the time it seems to exit the same group of banned servers, the other half it exits unbanned servers. The group of banned Servers is smaller (about 5 or so) than the unbanned Servers (I never seem to repeat these in any given session.

Tor seems to want to exit to the banned Servers more frequently when I have my Tor configured to allow others to use it. I have three options, and when I "Run as Client only", Tor seems to distribute which Server it exits more evenly, but if I am configured to "Help censored Users reach the Tor network", that is when it seems to repeat the same Servers over & over again most frequently.

I aplogise for my inadequate description of what is happening, but in my mind it's very clear.

I've learned a little bit since the first post. One thing I think I've figured out is that not all "participants" (what is the correct word for this) in the Tor network are Exit Servers. Originally I assumed that the messages came into randomly, got tossed around randomly and then exited randomly, but apparantly this is not the case. Everything exits via a "Exit Server", which is disappointing. I'd rather the message exit in an unpredictable manner from anywhere in the network, and wonder why Tor does not function like this.

Is this possible, and is a matter of time before it happens, or is there some reason why it can never work like this ?
 
Old 08-29-2010, 03:30 PM   #5
cantab
Member
 
Registered: Oct 2009
Location: England
Distribution: Kubuntu, Ubuntu, Debian, Proxmox.
Posts: 553

Rep: Reputation: 115Reputation: 115
Quote:
Originally Posted by Johnny Faster View Post
I've learned a little bit since the first post. One thing I think I've figured out is that not all "participants" (what is the correct word for this) in the Tor network are Exit Servers. Originally I assumed that the messages came into randomly, got tossed around randomly and then exited randomly, but apparantly this is not the case. Everything exits via a "Exit Server", which is disappointing. I'd rather the message exit in an unpredictable manner from anywhere in the network, and wonder why Tor does not function like this.

Is this possible, and is a matter of time before it happens, or is there some reason why it can never work like this ?
Choice of the users. Some people are quite happy to relay Tor traffic, but don't want to act as exit nodes. Some jurisdictions may hold the person running an exit node responsible for the traffic it creates, and as you've seen, Tor exit nodes are commonly IP banned from certain websites due to people using Tor to cause trouble on said websites. Indeed, some sites, notably Wikipedia, have a policy of blocking all Tor exit nodes.
 
Old 08-29-2010, 03:58 PM   #6
Johnny Faster
Member
 
Registered: May 2006
Location: Texas
Distribution: Ubuntu 6.06
Posts: 74

Original Poster
Rep: Reputation: 25
Quote:
Originally Posted by cantab View Post
Indeed, some sites, notably Wikipedia, have a policy of blocking all Tor exit nodes.
Thanks.

But what makes an "Exit Node" ? I can fire-up Vidalia and push one button and I'm a Relay Node? and push another button and I'm an "Exit Node".

How does Wikipedia et al ... know who is and who is not an "exit node" ? Is this information gathered by Tor and distributed ? Given how fast things change, this would have to be updated pretty frequently (once every minute ?)

And if I'm an Exit Node today and get banned from Wikipedia, and tomorrow it's just me and I'm not even running Tor, am I still banned ?
 
Old 08-29-2010, 04:30 PM   #7
Johnny Faster
Member
 
Registered: May 2006
Location: Texas
Distribution: Ubuntu 6.06
Posts: 74

Original Poster
Rep: Reputation: 25
Quote:
Originally Posted by cantab View Post
Indeed, some sites, notably Wikipedia, have a policy of blocking all Tor exit nodes.
So I fired-up Vidalia to see if this was true. The first attempt at accessing the "Discussion" page of the wikipedia article: "Tor (anonymity network)" resulted in a blocked message (see attached).

Push Vidalia's "New Identity" button and with a new IP of "174.138.169.2xx" I could have vandalized to my heart's content. I was logged on under my account, so that may be why I was able to access wiki using a Tor Exit Node, but I doubt it. I don't think they can update fast enough to ban all Tor Nodes, nor do I think it's practical to set-up permanent bans, either.

I'm also still curious regarding the previous questions regarding Tor's future. P2P clients require Users to upload a certain amount of data in order to maintain their ability to download and it seems to me that Tor is going to have to evolve in this direction in order to maintain any kind of functionality.

Several times I have read that Tor Users can be tracked and possibly identified by being monitored where they enter Tor, and by where they exit. If the number of Exit Nodes is limited, that dramatically reduces the level of anonymity for everyone.
Attached Thumbnails
Click image for larger version

Name:	Tor.jpg
Views:	10
Size:	84.5 KB
ID:	4459  
 
Old 08-29-2010, 05:00 PM   #8
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Does it (the issue regarding the three IPs being reused) happen only with that forum site or with all sites? If it only happens on that specific site, perhaps it's an exit policy issue? What I mean is that if the site is using ports which are by default filtered, I think Tor would need to stick to exit nodes with a liberal enough policy, limiting the available number of viable exit nodes.

Quote:
Originally Posted by Johnny Faster View Post
But what makes an "Exit Node" ?
A host which forwards traffic from within the Tor network to the final destination outside the Tor network. Practically speaking, it's the IP which a site sees your request as originating from.

Last edited by win32sux; 08-29-2010 at 05:20 PM.
 
Old 08-29-2010, 06:42 PM   #9
Johnny Faster
Member
 
Registered: May 2006
Location: Texas
Distribution: Ubuntu 6.06
Posts: 74

Original Poster
Rep: Reputation: 25
Quote:
Originally Posted by win32sux View Post
Does it (the issue regarding the three IPs being reused) happen only with that forum site or with all sites?
I don't know. I only have this problem with one particular site. I'm willing to test it, but other than cruising forums looking for block messages I wouldn't know how to test for it.

Quote:
Originally Posted by win32sux View Post
If it only happens on that specific site, perhaps it's an exit policy issue? What I mean is that if the site is using ports which are by default filtered, I think Tor would need to stick to exit nodes with a liberal enough policy, limiting the available number of viable exit nodes.
It sounds like you are saying a forum (site) can refuse connection attempts on particular ports as well as IP address ? How then would an Exit Node (or any other computer) know which ports are open ? Do computers attempt to connect and run through multiple ports until they find one ? I don't know much about ports. I guess I figured everyone is on the same port ? How does that all work ? Link would be great, I'm self-motivated and like to read.

Quote:
Originally Posted by win32sux View Post
A host which forwards traffic from within the Tor network to the final destination outside the Tor network. Practically speaking, it's the IP which a site sees your request as originating from.
Yes, but people seem to talk about Exit Nodes as if they were static. These 3 "primary" exit nodes (more like 5) seem to carry a disproportionate amount of my traffic. I'm still not clear on how ports would figure into this.

If the issue is that or ports and not just of IP, would it be possible to control which ports my browser (Mozilla) is using ? (This is getting confusing, btw...)

Last edited by Johnny Faster; 08-29-2010 at 06:43 PM.
 
Old 08-30-2010, 08:57 AM   #10
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
My understanding is that Tor won't select an exit node if it knows that the node's exit policy will reject your request. For example, if you are attempting to connect to example.com:25, Tor would need to find an exit node which allows outbound connections to port 25. Since presumably most exit nodes don't allow outbound connections to port 25 (for obvious reasons), then the amount of exit nodes which can be used to fulfill your request will be limited. This is why I'd recommend testing to determine whether or not you experience the same issue when you browse other sites. You can use the same method you used to learn that you were being limited to three exit nodes.
 
Old 09-01-2010, 07:19 PM   #11
Johnny Faster
Member
 
Registered: May 2006
Location: Texas
Distribution: Ubuntu 6.06
Posts: 74

Original Poster
Rep: Reputation: 25
Quote:
Originally Posted by win32sux View Post
My understanding is that Tor won't select an exit node if it knows that the node's exit policy will reject your request. For example, if you are attempting to connect to example.com:25, Tor would need to find an exit node which allows outbound connections to port 25.
If Tor Exit Nodes reject traffic based on ports, this implies that there are very few Tor Exit Nodes that are accepting traffic on the port(s) that are used for forums (like this one). Again, I don't know much about ports. I get the idea that certain things go on certain ports, but I don't think the port(s) used to web-browse a chat forum are going to be treated any differently than if you web-browsed to facebook or whatever. I would assume that browser traffic is all the same, and it would go on all the same port(s).

For me this thread is evolving in other directions. It occured to me that it might be possible to configure a client to not use certain Exit Nodes, to prefer others, etc...

Is it Vidalia that makes these decisions ? What is the difference in function between Tor, Vidalia and Privoxy ? I've never understood why it was necessary to have 3 separate softwares running, and why they all were not consolidated into a single and streamlined package ?

If one makes the decision to remain in the Tor network, are there other alternatives to Vidalia ?

Last edited by Johnny Faster; 09-01-2010 at 07:21 PM.
 
Old 09-02-2010, 10:20 AM   #12
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
The TOR network doesn't gain much new exit nodes so blocking it shouldn't be hard. Lots of blocklists around and the main TOR management nodes emit a list of all nodes or else just have TOR listening to get the current list... Anyway TOR is what builds the circuits to make your traffic travel to its destination. Privoxy (or Polipo) is "just" a proxy for, a conduit into, TOR and Vidalia is "just" a GUI for managing TOR configurations. So the minimal combo you need to access the TOR network is TOR plus a conduit. Unless you use network commands to manipulate tor directly all the decision making tor bases on what it reads from /etc/tor/torrc, and according to the documentation there's not much tweaking necessary. If you're interested in TOR beyond documentation and the OR website doesn't cut it for you then I suggest reading the mailing list (archives). It's active and it holds lots of interesting stuff.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Torbutton not on FireFox PJHAMVS Linux - Laptop and Netbook 2 01-21-2009 07:58 AM
Torbutton and Firefox security bug workaround ananai Linux - Security 5 11-13-2008 12:10 AM
fail2ban questions - How to find banned IP addresses vonedaddy Linux - Security 3 01-11-2008 04:10 AM
LXer: Torbutton Firefox plugin LXer Syndicated Linux News 0 05-06-2006 12:03 PM
Why is Firefox&Thunderbird constantly shutting down FC4 mickeyboa Fedora 4 07-09-2005 01:17 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 03:20 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration