Error 403 - Primitive Security Measures on the Forum
-
jonallport, You can't understand what it is that I am talking about.
kejianshi, No, as I say, I can not even get past the Error 403 with TOR Browser. I have to spin up a separate Xen machine to run Firefox in order to get this far, and I still get those rudimentary questions.
See, this is what I mean: TOR isn't all about "naughty players doing naughty things". What a naive point of view. TOR is used by law enforcement, journalists, people in repressive countries, and so on. Serious and professional security people know this. Winduhs people, don't.
If I were to put spam in the forum, is there no control? Are there no moderators who could ban me? Would a spam post upset things such that everyone is thrown off-balance and the world goes higgledy-piggldy, and nothing could be done about it? If TOR Browser was never allowed, how would you know it is a source of spam?
This blockage of TOR Browser is an indication to me that either the forum, or the forum and firewall are by innocents who fear anything mildly controversial, due to not understanding it. Not a good sign.
-
Quantum, if your intention was to come here, shit all over everything and guarantee that none of the regular volunteers will ever help you, you may have succeeded. Honestly, I have never understood why guys like you come in like this. Are you expecting to wow us with your display of ego and hubris? I'm sure that even a genius of your level can understand that people who make a firewall aren't also making their own web forum software, nor are they poring over every line of the forum's code. I have yet to see any forum software that is perfect, immune from attacks etc. As for blocking the Tor browser, I'm sure they have their reasons and the fact that you don't understand them doesn't make them stupid. It just makes you look like an ass. And beside, who really uses Tor browser for day to day stuff??? Are you a dissident afraid of your government? Or are you some skiddie hacker ninja wannabe that thinks it's l33t to run Tor browser? I run a high-speed Tor exit node btw, so I am a little familiar with it.
-
See, this is what I mean: TOR isn't all about "naughty players doing naughty things". What a naive point of view. TOR is used by law enforcement, journalists, people in repressive countries, and so on. Serious and professional security people know this. Winduhs people, don't.
…
This blockage of TOR Browser is an indication to me that either the forum, or the forum and firewall are by innocents who fear anything mildly controversial, due to not understanding it. Not a good sign.
With TOR the whole point is that an enormous amount of traffic leaves a single exit node in order to hide anonymous single users. Most websites don't actively block TOR, TOR just happens to show the same properties as traffic coming from suspicious networks, or in this case the TOR traffic itself actually does include spam - click through the links presented to you when using the TOR browser and it will tell you what caught the honeypot's attention.
Many websites challenge with a CAPTCHA when I use TOR. There is no clash of ideology or misunderstanding of the benefits of TOR, the server presumably neither knows nor cares about exit nodes. They do not block you because you use an anonymiser, they block you because they do not know you are using one. I am embarassed to say when I first started using TOR I made the same mistake as you have, leaping to the conclusion my "rights and freedoms" were being denied.
I'm not sure at this point if I want to learn the firewall..
I hope you will not give up on pfSense, it is an excellent firewall and I learn new things from it all the time. My study of networking often plateaus for a while, then something unexpected will open my eyes and I am suddenly enlightened to the next level of understanding of the subject. I would recommend you begin with some background to the issues you have been experiencing:
https://www.torproject.org/docs/faq.html.en#GoogleCAPTCHA
-
Exactly - When a exit node has lots of people on it, some of them get up to no good and ruin it for everybody.
So that IP gets associated with the malicious activities of a few people who are actually in fact not being nice.
BTW - You can also get error 403 because something is broken somewhere along the line in the network totally unrelated to this site.
-
This thread is a nice example why tor's blocked…
-
TOR isn't all about "naughty players doing naughty things". What a naive point of view. TOR is used by law enforcement, journalists, people in repressive countries, and so on.
When a exit node has lots of people on it, some of them get up to no good and ruin it for everybody.
As an example, when I first got TOR working I google'd "how do I know TOR is working?", and I came across a thread that had some excellent advice on using TOR. After several useful posts, a member posted comments extremely derogatory towards black people. I was disappointed, but was sure a mod would warn or ban this user shortly and moved on, only to find the thread devolve from being a useful source of information on anonymity to one where dozens of members supported this individual and included their own terrible thoughts on gays, Jews and Asians.
It was only then I realised I was on stormfront.com, a known white supremacist community. I was fortunate in two ways, one by not having my real IP associated with a hate group and two, as I am neither heterosexual or caucasian, for not revealing my IP to said hate group (not that I stayed to register and comment of course).
TOR is a tool and will be used in as many different ways as people can find to apply it. Reputation tools such as Project Honeypot exist to defend the resources they protect. Many tools used in security such as IPS, IP blocklists or even just a simple firewall simply perform as they are supposed to - they do not block by the human intent of the traffic, only the behavior of it. If your TOR exit nodes' IP was blocked, you could say so and request for it to be unblocked on those grounds:
http://www.projecthoneypot.org/ip_77.247.181.163
Honey Pot System commented…
WHITELIST NOTICE: This IP has been whitelisted. Future bad activity will result in automatic removal.
December 03 2013 02:50 AM
Honey Pot System commented...
WHITELIST NOTICE: This IP has been marked to be included on Project Honey Pot whitelists. The whitelist is scheduled with a delay of 00:10:25. Documented reason for whitelist: Mistaken Listing
December 03 2013 02:35 AM
A.ATLAS HILL commented...
This is the IP of a Tor Exit Node. Blacklisting this IP causes a lot of false positives, preventing some Tor users from visiting Project HoneyPot-protected sites.
November 13 2013 07:56 AM -
KOM, I am voicing my concern about this. If it's offensive to you, that's a shame. I am trying to get feedback on the nature of the forum, versus the firewall, to determine whether it's worth investigating the firewall. Of course I am not going to tell you which category of TOR user I am, nor why I use it. And Yes, I use it for everything, including mail, IRC, and so on. Feel free to underestimate me.
jonesr, yours is the most reasoned and non-psychotic of the responses here. Sure, alot of websites are shielded by CloudFront, which is a nuisance but sometimes it's worth it for me to answer their question. Same on those few occasions when I use G**gle. But I am completely excluded from this forum by "Project Honey Pot", and that is just senseless. And in the case of "Project Honey Pot" (nice name…), they got one of the lists of TOR exit nodes and added to their blacklist, on General Principles, simply because it is TOR. I did click through and it gives the "list as a source of spam or other malicious activity. To resolve this problem, first clean your computer of viruses and other malware." Fools. They haven't even tried. It's useless to try and whitelist IPs on "Project Honey Pot" because there are so many and they change all the time, and I wouldn't waste my time anyway as they are so primitive.
jonesr, it is encouraging that someone like you endorses pfSense. I do see alot of bad signs here though.
-
How do you know they didn't try it or that actual activity didn't get it added to the list?
-
Because no other forums make such a foolish move.
-
I am trying to get feedback on the nature of the forum, versus the firewall
pfSense shares no code with SMF, as far as I know. It's kind of a silly question, dosed with a heavy helping of attitude. Do you barge into parties and immediately insult the hosts at the top of your lungs everywhere you go? Or is it only places where you think you're anonymous?
-
My experience is that if you run a open proxy a big enough percentage of people abuse it such that the activity present on that IP lands it on block lists.
For every 10 people using that IP for legit purposes, there is one abusing it. 10% stacks up pretty fast when the bandwidth of the IP in question is high enough.
I'm not against proxy, I just understand how they end up getting banned.
-
I, too, run a high-speed node. At the moment I don't feel like dealing with running an exit node so it's transit-only.
-
So "Derelict", you think I think I'm anonymous…
And I keep seeing ESF and SMF here, with no explanation of what these symbols might be. Not worth it to look up, coming from you. So you run a "high-speed" node, heh? lolkejianshi, that is true, but no other forum, in fact no other website that I've found in the years I've run TOR, has found it necessary to summarily block a whole category of TOR users like this. Any system can be abused. Are there no moderators who can block usernames and email addresses?
-
Electric Sheep Fencing
Gotta keep the sheeples safe.
-
@Quantum`:
So "Derelict", you think I think I'm anonymous…
And I keep seeing ESF and SMF here, with no explanation of what these symbols might be. Not worth it to look up, coming from you. So you run a "high-speed" node, heh? lolYeah. In a datacenter on multiple-gigabit. You?
ESF: They develop pfSense
SMF: Simple Machines Forum - see the bottom of this page.If you want people to hold your hand when you cross the street, you might try not being such a childish prick.
-
Yeah. In a datacenter on multiple-gigabit. You?
Nice, but this has nothing to do with TOR. I am trying to tell you that you have your terminology wrong, as you pretend to participate in TOR.
-
Oh goodie. My first smite. I feel like I'm somebody now.
-
In defense of derelict
TOR system elects nodes based on bandwidth.
Side note:
Probably the easiest way to subvert TOR is to establish a bunch of very high bandwidth nodes.
But who has the money for that right? I mean you would have to have deep pockets, alot of bandwidth, a big bunch of hardware…
Who could or would do such a thing just to subvert an anonymity system? Geeeeee.... I'm drawing a blank...
Wanna see something funny? Look at a map of tor nodes world wide.
Now, look at your map and find the two highest concentrations of nodes and highest bandwidth. Where are they?
Tor is easily owned by who ever has the most money.
-
Well "Derelict" doesn't know the first thing about TOR terminology. His put-up is a Fail.
So you know, a 'group' created a slew of exit nodes recently and were immediately recognized and busted by TOR devs. Instantly excluded.
And, I am not here to bicker, in any case. NO MORE SOUP FOR fanboyz.
-
TOR is cool and everything - It fills a need.
However, if you want to run EVERYTHING through a proxy/vpn, I'd suggest buying a VPS or setting up a private machine somewhere in a place that values privacy and limiting its use to only you and a maybe a few you trust. Then you probably won't run into very many roadblocks on the internet. After lots and lots of headaches with public proxies and vpns, I slowly eventually realized if I want my stuff to work well, I had to make my own and limit the users on it.