Monday, June 15, 2009

Hash My Files

I have a whole bunch of tools that I store on my ironkey and use on Windows and Linux. This one I used very frequently.

http://www.nirsoft.net/utils/hash_my_files.html

Responsibly using SecureSessions

There are a few tools that make Tor (SecureSessions) more effective.

Because Tor has no clue what data is flowing through its circuits, using Tor without Privoxy is nearly pointless in terms of improving security while browsing online resources. Privoxy is very good at filtering out many of outbound privacy leaks that allow tracking of your identity, online activity & interests. Why should you have to explain to anyone your fascination with underwater acoustic detonators? Privoxy is highly configurable, but unfortunately, unless you have a scripting background, its a little daunting to customize. However the No-Script add-on is an important tool in that it allows you halt the execution of all javascript, then pick and choose which scripts you'd like to allow to run. It also allows you to review the list of domains where the scripts are being served from, allowing you to avoid javascript injection attacks and other web surfing dangers.

Using insecure protocols through Tor is another consideration that one must make. For instance, browsing websites is a risk that users will have to decide. Using insecure authentication or messaging protocols through Tor is just plain stupid. Regardless of where you are in the world, if anyone is capturing traffic between the exit relay and your destination, they will get your creds if you authenticate through an insecure protocol. If someone cracks into the server on which you insecurely authenticate, they will have your creds. If someone is running an exit relay and capturing traffic that goes in and out of that relay, and say you access an account via an insecure authentication protocol, they will have your creds.

Is the message clear now? ha ha, just kidding.
Do not use unencrypted protocols through Tor.
Use NoScript
Never use Tor without Privoxy, Period.
Never, ever, ever (EVER) use Internet Explorer for public web surfing.
Always use the latest version of FireFox or Opera.
Use a separate FireFox profile when using Tor.
Set that profile to clean out everything when your session ends and begins, by checking the "Always clear my private data when I close Firefox" checkbox. Disable all cookies.
Force dns requests into Tor, in FireFox about:config, set network.proxy.socks_remote_dns to "True".

Read this posting.

Use a webproxy, like Privoxy.
Use NoScript.
Use Flashblock.
Be Security-Minded.
If you're not sure, DONT CLICK ON IT!

Monday, June 8, 2009

HowTo Freshen Tor/SecureSessions

I use Tor a lot. When I get 404's or 503's there are a number of things I check.

Does the browser/network connection work without Tor?
Is the site I'm trying to get to available without Tor?
Is Privoxy Running?
Are the tcp ports 9050 & 9051 bound on 127.0.0.1? (netstat -an or tcpview)


To start fresh and pull everything down again:

1. Delete the Nodes file.

\IronKey-System-Files\SecureSessions\SecureSessionsFiles\Nodes

This file contains a list of Authoritative Directory servers. This is where your Onion Proxy, otherwise known as the Tor Client, gets its info on all the other Onion Routers out there (essentially, the cached-routers file). This is usually the essential first and only step to get a fresh start with IronKey Tor in most cases. However, you may still experience issues, so take the following extra steps.

2. Delete all Network Descriptors.

\IronKey-System-Files\SecureSessions\SecureSessionsFiles\cached-status\*

Network descriptors are more detailed descriptions of the Onion Routers. Its basically the same info that's in the cached-routers file. Its very possible that if the Engineers at IronKey have made changes to their Tor network, some of the network descriptors may have become outdated and invalid. Collection of network descriptors is not subtractive...therefore, wiping these out and starting fresh is an excellent idea. Be sure to check the forum.ironkey.com website for Maintenance Notices and other network related info.

3. Delete the cached-routers file.

\IronKey-System-Files\SecureSessions\SecureSessionsFiles\cached-routers

Yes, I know...this file gets regenerated when the Nodes file is missing, but I have seen it not get updated...or worse, it gets created as a zero-byte file. Just delete it or move it, and shut up.

Finally, if you are still having problems, pull up the Network Map. To do this, right-click on the IronKey Icon in the Windows systray | Secure Sessions | Network Map. Watch the lower-middle content area. This view shows Vidalia's view of your current Identity. In case you aren't aware, your Identity is the collection of 3 Tor nodes that make up your "Virtual Circuit". Your identity changes every few minutes. The last node in the circuit is your actual identity, meaning....when you go to a web site, its the IP address of this server (the Exit node) that gets logged in the web server logs.

Have a secure day!