Mgeni: a perspective access browser

Mgeni is a little browser, forked from Arora, that makes it quick and easy to browse websites and access web services that are geographically restricted. For example, Mgeni allows you to view BBC iplayer even if you’re not in the UK.

How does it work? When browsing the Internet with Mgeni your requests are directed through the Tor network so that they appear to websites to be coming from the country of your choice. Naturally, this means you will need to install Tor, as well as Mgeni, to get going.

Mgeni is meant to make perspective access easy, and as a side-benefit incentivize users to run Tor servers of their own.

Mgeni is a spin-off from my other project, Torora

Mgeni in use

Mgeni in use

No Comments

Wireshark Dissector: TN5250 Protocol

Finished this a while ago, and it’s close to reaching wireshark trunk. The patch is available here. The TN5250 specs and whatnot are available here . I’ve also created a TN5250 reference page on the Wireshark Wiki . As a protocol, TN5250 is only marginally less bizarre than it’s daddy TN3270. Oddly, it was also harder to code for – maybe state machines were all the rage at the time but they make a dissector’s life much more fussy. In summary, yet another typing-trial by endurance. Still haven’t figured out my motivation for doing it!

TN5250 Dissector

TN5250 Dissector

No Comments

Wireshark Dissector: TN3270 Protocol

My protocol analyser for the TN3270 protocol is now available in Wireshark. TN3270 is the protocol created by IBM in 1972 for a class of terminals normally used to communicate with IBM mainframes. There was a time when TN3270 accounted for a significant portion of the world’s network traffic and it is still widely used today – mainly because big iron just refuses to lie down and die. The omission from Wireshark of such an important protocol in the history of network communications always struck me as a little odd. So with the help of the trusty “3270 Information Display System: Data Stream Programmer’s Reference” (all 500 or so pages of it) I set to work. It rapidly became an exercise in typing, rather than coding. And the only reason I finished it was because I started it. Next up – TN5250.

TN3270 Dissector

TN3270 Dissector

No Comments

Torora: a lightweight cross-platform browser for dedicated use with Tor

Torora is a lightweight cross-platform browser for dedicated anonymous browsing with Tor.
As a dedicated Tor browser, Torora provides explicit state separation for the user. This means they cannot fall into the trap of mixing anonymous and non-anonymous browsing with the same application. Torora prevents the user from browsing until it has verified the presence of a working Tor installation. Torora disables/modifies all browser behaviour that may allow the user to leak information to remote eavesdroppers. The Torora project includes a patch for webkit that allows users to enable javascript while protecting against common javascript-based profiling attacks.

Torora

Torora

No Comments

Torsocks

I’ve started maintaining Torsocks , a utility which allows you to use most socks-friendly applications in a safe way with Tor. It ensures that DNS requests are handled safely and explicitly rejects UDP traffic from the application you’re using.

Torsocks is commonly used with command-line utilities such as telnet, ssh and irssi. However it’s also suitable for ‘torifying’ popular GUI aplications such as pidgeon.

Torsocks is hosted in the Tor project’s source code repository and is the default socks client supported by Tor. It runs on Linux, BSD and Mac OSX.

Once you have installed torsocks, just launch it like so:

usewithtor [application]

So, for example you can use ssh to connect to some.ssh.com by doing:

usewithtor ssh username@some.ssh.com

1 Comment

Wireshark Dissector: Tor Protocol

View and analyze Tor traffic in Wireshark. It should be useful for researchers analyzing the behaviour of various versions of the Tor client. This patchset will not allow you to decrypt the traffic of an Onion Router (i.e. a relay node on the Tor network), only the traffic coming to and from the Tor client on your machine (i.e. an Onion Proxy). Doing the former would require a different patch to Tor and apart from being unethical might even be illegal in your jurisdiction! (You would be snooping on the traffic of other Tor users.)

Tor Dissector

Tor Dissector

No Comments

TorK – An Anonymity Manager for KDE

This is my most active project at the moment. TorK is an Anonymity Manager for the KDE Desktop. Browse anonymously on Konqueror/Firefox/Opera. Send anonymous email via the MixMinion network. Use ssh/irc/IM anonymously. Control and monitor your anonymous traffic on the Tor network.

Tor is a software application that allows you to anonymize your activity on the internet. For a full description of what Tor does, see here . TorK allows you to configure, run and update Tor. It makes anonymizing your internet use easier. It also allows you to view the Tor network and choose how you would like to interact with the network.

http://tork.sf.net

Tork

Tork

Tork

Tork

No Comments

KlamAV – A KDE Anti-Virus Manager

My stab at an anti-virus manager for KDE. It sits on top of the ClamAV scanning engine and provides a number of useful features such as scheduled updates, automatic upgrades, on-access scanning, manual scanning, scheduled scanning, virus research, event logging, quarantine management and integration with KMail, KDE’s mail client. It received a number of nice write-ups in online and print media – as well as an approving nod from the ClamAV founder, Tomasz Kojm. It is a default component in Mandriva 2006 (a popular Linux distribution) and is packaged by a number of others, including Kubuntu. Follow the link for more details.

http://www.klamav.net

KlamAV

No Comments

V3 – An Atonement

This turned out quite well in the end. It’s a series of obituaries (ha!) linked together by … oh just print it out if you’re curious. The scene-setting is almost as convoluted as Corlis’ Purga – but it’s much more readable, by dint of the fact that it’s much shorter. The PDF in the link below was the one I used to create photocopies for binding – so not ideal for online browsing. The finished article itself is remarkably genick – so if you want a copy send me a postal order to cover postage and packing and I’ll send one out to you. Only a few left mind.

PDF of V3 – An Atonement
Read V3 – An Atonement Online

V3 Cover
V3 Cover
V3 Cover

No Comments

Corlis’ Purga

This is a commentary on the ‘Purga’, a fragment of verse by an ancient Euxian poet, Corlis. Neither exist of course. A patent cure for insomnia if ever there was one.

Read Corlis’ Purga Online
PDF of Corlis’ Purga

The 'Purga'

The Commentary

No Comments