Wednesday, June 24, 2009

A novices guide to setting up a proxy

A guy over at Anonymous Iran has posted a complete novices guide to setting up a proxy method. I might mention that this is one of the most tangible ways to help the Iranian protesters, because it gives them unfiltered access to the Internet.

You can find the guy here: http://www.jarfill.com/proxies-how-you-can-help-iran/

Contact your Congressmen about July 4th

The White House intends on inviting the Iranian delegation to the July 4th celebration. Doing so would be a strong affirmation of the legitimacy of the current regime.

Find your Senators: http://www.senate.gov/general/contact_information/senators_cfm.cfm

Find your Representatives: https://writerep.house.gov/writerep/welcome.shtml

Tell them that you are furious about the July 4th celebration, and that you vote.

Tuesday, June 23, 2009

Send a message to Neda's family

You can send a message, reportedly, to Neda's family at this website. Your English message will be translated into Persian:

http://probilpleie.no/neda/

Monday, June 22, 2009

Distribute pictures of Basiji (Iranian secret police)


Distribute this picture widely. It is a compilation of pictures of members of the Basiji (Iranian secret police)

Also, this is a great blog dedicated to identifying members of the Basiji. RT it on twitter whenever you get a chance in an effort to get the link to as many Iranian protesters as possible: http://idthebasiji.blogspot.com/.

Call the UN Secretary-General

Looks like the UN is making motions in Iran. Linked from UN News Service

22 June 2009 – Secretary-General Ban Ki-moon today urged an immediate end to the arrests, threats and use of force taking place in Iran amid the post-election violence that has already claimed a number of lives.

I urge you to call the Office of Secretary-General Ban Ki-moon and let him know exactly how you feel at 212-963-4475

A word of thanks

Hello everyone,

I'd like to thank everyone who has been publicizing this on twitter. I see that it has been well publicized, and I hope we can keep this up.

Sorry for a lack of recent updates, I had a previous engagement that kept me from checking twitter. I'll be doing some more updates tonight before heading to bed.

Keep up the work! Write letters, set up proxies, overload websites. We are on the verge of something absolutely major here, and YOU are actively participating.

Worth repeating...

PLEASE SET YOUR TWITTER ACCOUNT TO IRANIAN TIME (+3.50 Tehran)! It is SO EASY and SO VITAL!

Also, please e-mail me with comments and suggestions. seaofgreen123@gmail.com

I see that this blog is really picking up momentum. Keep up the good work, because I believe this is the only blog of its type.

Shut down Iranian government websites

The Iranian government has abandoned all pretenses of legitimacy.

Help shut down its website, lest it spread propoganda and misinformation to the uninformed:

Click this link, and click ReBoot. Keep it loaded in another window. This will help shut down the main websites of the murderous Iranian government: http://91.199.0.11/

Victory!

shenasaee.blogspot.com is shut down!

Good work!

Join Iranian cause on facebook

For those with facebook, this is a simple application, and one well worth joining: http://apps.facebook.com/causes/263469

Rallies all over the world

So in thinking about it, rather than post every single rally, I'm going to link you the forum where all the USA rallied are being planned, so you can check to see if anything is going on in your city. If I come across any major rallies, I'll be sure to post them here, but in the meantime check out Anonymous Iran's great forum on rallies in support of the Iranian people: http://iran.whyweprotest.net/world-wide-protest-planning/

Rally in Minneapolis, June 24

From Anonymous Iran, a rally in the Twin Cities, Minnesota:

Rally For Democracy in Iran!

Date: Wednesday, June 24, 2009Time: 11:30 - 1:30

Place: Minneapolis, MN. Hennepin County Government Center Plaza (between 3rd and 4th Aves on 5th St- right by the lightrail)Parking: Several ramps nearby including Government Center Municipal parking

Please refrain from slogans/pictures in support of any specific individual and/or group

No flags please

contact: mnrallyforiran@yahoo.com

REPORT the following blog as hate speech to blogspot

The following blog is exposing protesters, exposing them to violence, arrest, and possibly murder.

shenasaee.blogspot.com

Click the following link to report it as a hate blog. All you have to do is click submit: http://help.blogger.com/bin/request.py?contact_type=hate_speech&blog_ID=3002266448595168990&blog_URL=http://shenasaee.blogspot.com

Very easy, absolutely imperative.

UPDATE: Victory! This blog is GONE!

Opening up Canadian embassy for injured protesters

E-mail Canadian lawmakers and tell them to open up their embassy to injured Iranian protesters! From blogger Mollfyrtio:

Many injured in Tehran can not go to the hospitals as the brutal
paramilitary Basij control the hospitals. There are unconfirmed rumours that
injured people have been dragged off from hospitals to unknown location.

As an answer to that many countrys, including Denmark, Finland and
Australia, have opened up their embassies to the injured.

BUT NOT CANADA!Write to the canadian senators and tell them to let the
injured people of Iran in.

Here are the emails to the different senators AND the PM AND MP Reza
Moridi. If anyone of them prove to be wrong plz let me know. Just copy the whole
lot and paste it into the adressfield:rmoridi.mpp.co@liberal.ola.org; pm@pm.gc.ca; anguswd@sen.parl.gc.ca; atkinn@sen.parl.gc.ca; callbc@sen.parl.gc.ca;info@larrycampbell.ca; carsts@sen.parl.gc.ca; cochre@sen.parl.gc.ca; chapum@sen.parl.gc.ca; dayja@sen.parl.gc.ca; senatorcon@sen.parl.gc.ca; pdowne@sen.parl.gc.ca; dyckli@sen.parl.gc.ca; fairbj@sen.parl.gc.ca; fureyg@sen.parl.gc.ca; charrs@sen.parl.gc.ca; edward@ecconway.com; hublee@sen.parl.gc.ca;kennyco@sen.parl.gc.ca; kinsen@sen.parl.gc.ca; lavigr@sen.parl.gc.ca; losier@sen.parl.gc.ca; mitchg@sen.parl.gc.ca; senator@albertasenator.ca; thibel@sen.parl.gc.ca; senatornancyruth@sen.parl.gc.ca; olived@sen.parl.gc.ca; pepinl@sen.parl.gc.ca; poyv@sen.parl.gc.ca; ringup@sen.parl.gc.ca; sibnic@sen.parl.gc.ca; stgerg@sen.parl.gc.ca; SHAVEK@SEN.PARL.GC.CA; tardic@sen.parl.gc.ca; Layton.J@parl.gc.ca; ducepg1@parl.gc.ca; Ignatieff.M@parl.gc.ca

Need help getting the word out on this blog

Hello everyone,

I'd request any one who reads this blog to help me spread the word on twitter or facebook.

Please RT the following message, or some varient of it, whenever you have a chance:

"A blog listing ways Americans can help Iranian freedom fighters http://aidingiran.blogspot.com/ #iranelection"

A small victory!

Thanks to either a bandwith overflow or letters to thePlanet.com, http://www.bultannews.com/, a site that was reporting the identity of protesters, is now no longer working. As a result, the people fighting for Iranian liberty are now safer.

This is a truly global revolution. Thanks to everyone who helped make that happen.

Bringing down websites that identify protestors

Please e-mail abuse@theplanet.com and ask them to take down http://www.bultannews.com/, a website that this American based company currently hosts which identifies Iranian protestors.

Sample letter:


"Dear ThePlanet.com

The website
http://www.bultannews.com/ is actively aiding and abetting the Iranian police in identify and murdering protestors, and is in violation of your own policy. I request that you discontinue hosting this site immediately."

NedaNet - a network of hackers working for Iranian democracy

If you are a techie, check this out for sure.

This is the resource page for NedaNet, a network of hackers formed to support the democratic revolution in Iran. Our mission is to help the Iranian people by setting up networks of proxy severs, anonymizers, and any other approprite technologies that can enable them to communicate and organize — a network beyond the censorship or control of the Iranian regime.

NedaNet doesn't have leaders or a manifesto or even much in the way of organization. We're not affiliated with any nation or religion. We're just computer hackers and computer users from all over the planet doing what we can to help the Iranian people in their struggle for freedom.

NedaNet does have contacts on the ground in Iran. We are actively and directly cooperating with the revolutionaries (though for obvious security reasons most of us don't know who the contacts are). By helping us, you can help them.

http://www.catb.org/esr/nedanet/

Iranian agents on Twitter

@FindTheRats @EyeRanProtestr and @rey_diaz are known basiji and gov trolls, cant be trusted. Ignore, block, do NOT RT them

List of detained Iranians

Here is a list of detained reporters in Iran from a pretty legit organization. Consider giving this group a small donation.

http://tehranbureau.com/list-imprisoned-iranian-journalists-politicians/

Iranian proxies

Repost of "State of Iranian proxies" by Austin Heap. Very useful information for techies:

So there’s been good news and bad news from launching proxyheap. (Btw, you can check it your proxy is working here.)

The good news? We have lots of support! The bad news? There’s a HUGE chunk of proxies misconfigured… rendering them useless. There’s also a bunch of proxies on un-reliable connections — we pass these out to people in Iran and when they’re down, it just makes things harder.

That said, special thanks to r3boot (the original author) and esr (who put all the pieces in place) for putting together a reliable Squid configuration file for those in Iran seeking unfiltered Internet access.

To quote from the config file:

# 0. Do this installation only on a non-essential machine, as the host may be
# targeted for serious denial-of-service or cracking attempts. For maximum
# security, run it inside a virtual machine.
#
# 1. Install squid on your system. You will need to be root for this.
# Under Ubuntu, do "apt-get install squid"
# Under RedHat, Fedora, and Centos do "yum install squid"
# Under Gentoo, do "emerge squid"
# Under OpenBSD, do "pkg_add PKG_PATH=ftp://ftp.openbsd.org/pub/{version}/packages/i386/squid"
# Under FreeBSD, do this:
# wget http://www.squid-cache.org/Versions/v2/2.7/squid-2.7.STABLE6.tar.gz;
# tar zxvf squid-2.7.STABLE6.tar.gz
# cd squid-2.7.STABLE6
# ./configure '--sysconfdir=/etc/squid' '--enable-storeio=diskd,ufs,aufs' '--enable-delay-pools' '--enable-pf-transparent' '--enable-ipf-transparent' '--disable-ident-lookups' '--enable-removal-policies'
# make
# make install
# Under NetBSD, do "cd /usr/ports/www/squid; make install clean"
#
# 2. Red Hat and CentOS only:
# * Edit the iptables via system-config-securitylevel. As root, run
# /usr/bin/system-config-securitylevel
# * Set SELinux: to either Permissive(slightly better) or Disabled.
# Note, this is a crude solution. Someone with more SELinux
# knowledge might be able to write a pass-through rule.
# * Now go into Customize. In Other Ports, set it like this:
# portnum:protocol (eg. 42342:tcp, 42343:tcp, 42344:tcp).
# Do this for all of your nonstandard ports. Hit OK->OK
#
# 3. Replace your squid configuration with this file. It is likely
# to be in /etc/squid/squid.conf, but could be in /etc/squid.conf
# as well.
#
# 4. Fix the "visible_hostname" line in /etc/squid.conf: it should declare
# your machine's hostname (i.e. the part following "userid@" in your
# terminal prompt)
#
# 5. Choose a nonstandard port number to listen on, or better yet
# about a dozen of them. Fix the http_port line in /etc/squid.conf.
# Add more lines as needed.
#
# 6. Specify the IP of a machine where you have login privilages on the
# "acl remote_test" liner below. You will use this to verify that your
# proxy is working, and can remove it afterwards.
#
# 7. Type "sudo adduser squid" and specify a password
#
# 8. Restart squid by typing: "/etc/init.d/squid restart"
#
# 9. Stop the service by typing "/etc/init.d/squid stop"
#
# 10. Test it in debug mode by typing "squid -z" (which creates the cache files)
#
# 11. Type "squid -NCd10" to test squid in debug mode and leave it running.
#
# 12. Open Firefox and type the URL localhost:3128 It will fail to retrieve a
# page, but at the bottom it should confirm that the error is generated
# by squid. (To be extra-sure, re-do this test using one of the
# non-standard ports you declared in step 4.)
#
# 13. Back at the Terminal type CTRL-C to cancel the debug mode
#
# 14. Start squid for real with "/etc/init.d/squid start". It will start
# automatically from now on.
#
# 15. If your squid host is sitting behind a hardware router with firewalling
# capability, you must set up port forwarding of all your nonstandard
# ports to the squid host machine. The procedure for this varies
# depending on your router, but is most likely to involves pointing your
# browser at 192.168.1.1 and navigating to a "Port Forwarding" page.
#
# 16. The easiest way to test that your proxy server is working is to
# use the proxy tester at austinheap.com:
#
# If it says “Fatal error: couldn’t connect to host”, then your
# squid instance probably isn’t running; check for possible fatal
# error in the configuration parse, and if you don’t see that make
# sure that you have correctly configured your ruter or firewall
# to pass through packets. If it says “Your proxy is not accepting
# connections from the validation servers.”, you’re at least
# reaching squid, but your allow/denies aren’t right or you
# configuration file doesn’t live where you think it does.
#
# 17. Register your proxy server with proxyheap at
#
# You’ll have to do this once for each listener port you declared.
# You will receive an email notification from the proxyheap
# verification servers if all is well. Otherwise, email will tell you
# that your server could not be verified and drop the entry from the
# proxyyheap database. Once you are successfully registered,
# the Iranian revolutionaries can begin using your proxy with
# no further action required on your part.
#
# 18. Death threats have already been made against cooperating
# hackers. If you receive such a threat, report it to your local
# police immediately. Do not assume that your cooperation is unknown
# to the Iranian regime or their agents, and do not assume you will
# have warning if they act on their threats. If you are not already
# armed and prepared to defend yourself, fix both of these bugs.

I think this is a very good starting point for getting this effort organized and effective.

Link here: http://blog.austinheap.com/2009/06/22/state-of-the-iran-proxies/

Italian embassy letting in wounded Iranians - let your Iranian friends know

Reuters is reporting:

ROME, June 22 (Reuters) - Italy is willing to open its embassy in Tehran to wounded protesters in coordination with other European nations, the Italian Foreign Ministry said in a statement on Monday.
Link here: http://www.reuters.com/article/latestCrisis/idUSLM689534

Send this through twitter, Retweet like made, make sure the Iranian protesters know.

Here is a RT you can post:

Reuter reporting that Italian embassy taking in wounded. http://www.reuters.com/article/latestCrisis/idUSLM689534 Please RT #iranelection

pausing

Need some sleep.

I've left many things to do, and I'll be back tomorrow with more.

With love and solidarity.

God is Great.

If you happen to know any Iranians...

Refer them here (http://www.your-freedom.me/index.php?id=20&tx_ttnews[tt_news]=180&tx_ttnews[backPid]=6&cHash=0b5aa7779f). This company is giving away free VPN accounts to Iranians.

We have increased the bandwidth of our FreeFreedom offer for people connecting from Iran to 512 kbit/s, and time restrictions are not applicable. A package will automatically be added to your account when you connect from an IP address registered to Iran (this may take 10 minutes).

Best of luck to all those fighting for a free society! But keep a cool head, violence is never the answer. The freedom to use information sources and the freedom to speak up and make yourself heard without repression, however, are human rights and they are universal. Defending both is one of the finest causes.

(Oh, and I've just fixed a bug that would keep those from auto-upgrading their accounts who have logged in shortly before we have introduced our special offer. You should all get upgraded now. You might need to disconnect and reconnect though.)



Bandwith overload for other sites

Click these links to overload the bandwidth on other websites which undermine the protesters:


http://www.ayeneh.de/blog/wp-content...s_my_vote.html

http://kargahde.h779892.serverkompet...s_My_Vote.html

Contact information for the Iranian ambassador to the UN

Contact information for Mohammad Khazaee, the Ambassador and Permanent Representative from the Mission of the Islamic Republic of Iran to the United Nations:

Mohammed Khazaee
622 Third Avenue, 34th Floor
New York, NY 10017

Telephone: (212) 687-2020

email: iran@un.int

(Hat tip to ApotheosisAZ at Anonymous Iran)

Nokia Siemens aiding Iran track protestors, let them know what you think

According to the Wall Street Journal, Iran is using an electronic surveillance system to monitor communications by political dissidents on the internet. A monitoring center installed by Nokia Siemens Networks (NSN) for Irantelecom intercepts Web-based communications and archives them for the Iranian government (WSJ link here)

Let their folks know what you think of their complicity in this bloodbath:

Address:

PO Box 1, FI-02022 Nokia Siemens Networks

Phone:

Ben Roome
Mobile +447827300203
Stefan Zuber
Mobile: +49 1608080600
Riitta Mard
Phone: +358 7180 31452
Mobile: +358 50 514 9718

Country:

Finland HQ, Global Company

Email:

ben.roome@nsn.com
stefan.zuber@nsn.com
riitta.mard@nsn.com

Appeal to the UN

A new online petition, sign it here (http://www.petitionspot.com/petitions/omidadvocatescom/)

H.E. Mr. Martin Ihoeghian Uhomoibhi
President of the United Nations Human Rights Council

cc: Members of the Human Rights Council

Sub: Appeal for a Special Session of the United Nations Human Rights Council on the Human Rights Situation in the Islamic Republic of Iran

Your Excellency,

Omid Advocates for Human Rights and the undersigned groups and individuals call upon the UN Human Rights Council to hold a Special Session on the current human rights situation in the Islamic Republic of Iran.

We welcome the statement by Secretary-General Ban Ki-moon urging Iran’s leaders to reflect and respect in a “most transparent and fair and objective manner” the will of the Iranian people in the recent election. We also appreciate the Secretary-General’s expression of concern for the current situation in Iran.

Following Secretary-General’s statement, we appeal to Council members to address the ongoing human rights violations against Iranians concerning their right to life and freedom of expression and assembly. We urge Council members to examine closely the violent crackdown on peaceful demonstrations throughout Iran. We also urge Council members to protect the rights of individuals and groups in Iran to peacefully exercise their rights to freedom of expression, association, and assembly, including participation in activities, which dissent from state policies and practices. Finally, we urge you to call for the immediate release of all those currently detained for the peaceful exercise of their rights and for the protection of any detainee from torture or other ill-treatment.

Widespread and reliable information regarding ongoing human rights violations, including at least 8 deaths and numerous arrests against those demanding freedom of expression and the right to a fair election, makes it imperative that the Human Rights Council as the principal human rights organ of the United Nations take urgent measures by convening a special session to address the current situation in Iran.

We urge the Council to immediately call upon the Iranian authorities to receive a joint mission of Special Procedures mandate-holders on extrajudicial, summary or arbitrary execution and other relevant mandates such as the Special Rapporteur on Torture, the Special Rapporteur on Freedom of Opinion and Expression and the Special Representative of Secretary-General on Human Rights Defenders.

We remain at your disposal for any further information or consultation on this urgent matter.

Thank you very much for attention to this appeal.

Yours sincerely,

Overload the bandwith of a website posting names of protestors

If you click this link and just keep it in the background, the site (which is posting names of Iranian freedom fighters) should be overloaded from an over-consumption of bandwith and shut down.

Sunday, June 21, 2009

Setting up proxy servers on Mac

Setting up proxy servers on Mac. From Austin Heap, a GREAT resource on setting up proxies:

Mac instructions (UNCONFIRMED)

1) Grab this dmg compile of Squid for OS X, and run the package inside it.

2) Look in your Applications folder for a folder called Squid. Inside THAT folder, there is a folder called etc. Inside the etc folder, there is a file called squid.conf. Open it in your text editor of choice.

3) To restrict access to people with Iranian IP addresses find line 1885 (which is blank), just above # And finally deny all other access to this proxy. Copy/paste this code:

acl TRUSTED src 62.60.128.0/17 62.193.0.0/19 62.220.96.0/19 77.36.128.0/17 77.77.64.0/18 77.104.64.0/18 77.237.64.0/19 77.237.160.0/19 77.245.224.0/20 78.38.0.0/15 78.109.192.0/20 78.110.112.0/20 78.111.0.0/20 78.154.32.0/19 78.157.32.0/19 78.158.160.0/19 79.127.0.0/17 79.132.192.0/19 79.170.144.0/21 79.175.128.0/18 80.66.176.0/20 80.69.240.0/20 80.71.112.0/20 80.75.0.0/20 80.191.0.0/16 80.242.0.0/20 80.253.128.0/20 80.253.144.0/20 81.12.0.0/17 81.28.32.0/20 81.28.48.0/20 81.31.160.0/20 81.31.176.0/20 81.90.144.0/20 81.91.128.0/20 81.91.144.0/20 82.99.192.0/18 82.115.0.0/19 83.147.192.0/18 84.47.192.0/18 84.241.0.0/18 85.9.64.0/18 85.15.0.0/18 85.133.128.0/17 85.185.0.0/16 85.198.0.0/18 86.109.32.0/19 87.107.0.0/16 87.247.160.0/19 87.248.128.0/19 89.144.128.0/18 89.165.0.0/17 89.221.80.0/20 89.235.64.0/18 91.98.0.0/15 91.184.64.0/19 91.186.192.0/19 91.206.122.0/23 91.208.165.0/24 91.209.242.0/24 91.212.16.0/24 91.212.19.0/24 91.212.252.0/24 92.42.48.0/21 92.50.0.0/18 92.61.176.0/20 92.62.176.0/20 93.110.0.0/16 93.190.24.0/21 94.74.128.0/18 94.101.128.0/20 94.101.176.0/20 94.101.240.0/20 94.139.160.0/19 94.182.0.0/15 94.184.0.0/17 94.232.168.0/21 94.241.128.0/18 95.38.0.0/16 95.80.128.0/18 95.81.64.0/18 95.82.0.0/18 95.82.64.0/18 95.130.56.0/21 95.130.240.0/21 188.34.0.0/16 188.93.64.0/21 188.121.96.0/19 188.121.128.0/19 188.136.128.0/17 188.158.0.0/15 193.189.122.0/23 194.225.0.0/16 195.146.32.0/19 212.16.64.0/19 212.33.192.0/19 212.50.224.0/19 212.80.0.0/19 212.95.128.0/19 212.120.192.0/19 213.176.0.0/19 213.176.32.0/19 213.176.64.0/18 213.195.0.0/18 213.207.192.0/18 213.217.32.0/19 213.233.160.0/19 217.11.16.0/20 217.24.144.0/20 217.25.48.0/20 217.64.144.0/20 217.66.192.0/20 217.66.208.0/20 217.146.208.0/20 217.172.96.0/19 217.174.16.0/20 217.218.0.0/15

4) Go to the next line, which says http_access deny all and replace it with the following: http_access allow TRUSTED

5) On line 705, change the line # cache_access_log /Applications/Squid/var/logs/access.log to cache_access_log none. This is what makes users ‘anonymous’.

6) Open up your Terminal and type sudo /Applications/Squid/sbin/squid -z. Type in your password and hit return. It should give you some output. As long as it doesn’t say “error”, you are fine. If it gives you a “squid is already running” error, try sudo /Applications/Squid/sbin/squid -k reconfigure instead.

7) Go to whatismyip.com and get your IP Address. Note it down.

Tell @austinheap on Twitter or via email the IP address you got in step seven. I’ll see that it gets to the right people. Please do not publicize your IP!

Another great post regarding Tor

Another post on Tor, via Slicehost (http://www.tequilafish.com/2009/06/21/slicehost-setting-up-a-tor-relay-on-fedora-to-help-keep-iran-connected-iranelection/)

As many of you know, most of the information from within Iran is coming from on-the-ground new-media and social networking sites such as Twitter, YouTube, and Facebook. This is happening despite crackdowns on communications networks by the Iranian government. The way this information is able to escape the firewalls of Iran is via proxies which relay and “hide” the destination of the communications so that it becomes difficult to block. This allows those on the ground in Iran to communicate with the world instantly and effectively, without fear of government crackdown. But it is a constant arms race. As soon as a relay becomes known by the Iranian government it gets shut down. The only way to keep the lines of communication open are to strengthen the distributed Tor network by adding more relays and bridges, making it more difficult for the Iranian government to block them all.

There have already been great write-ups on how you can contribute to the distributed proxy network Tor:
http://anonygreen.wordpress.com/2009/06/18/how-to-setup-a-tor-relay-or-tor-bridge/
http://smokingfish.blogspot.com/2009/06/brief-introduction-to-tor-and-why-its.html

Please read over those documents for an overview. I wanted to provide detailed instructions on how to get a Tor network set up quickly, easily, and cheaply for those of you who would like to contribute. You can provide invaluable assistance to the people of Iran for as little as 15 minutes of your time and $20/month.

First off, this document assumes you have some system administration knowledge with Linux (Fedora) and are comfortable installing and configuring packages from the command line. If that’s you, you can have a Tor relay up and running in about 15 minutes.

Key:
Shell commands are in purple
Config file settings are in blue

  1. Register at Slicehost

    Slicehost is a VPS provider that allows you to quickly build/deploy webservers very cheaply. Sign up here and purchase the cheapest $20 slice to get started. Pick Fedora 10 as your Linux Distribution. Do not pick Fedora 11, as it is incompatible with the current version of Tor. Once you are registered, Slicehost will email you your IP and root password. It can take a few minutes to build your new slice, so be patient.

  2. Slice Security

    Log in to your new slice. Please note that this document covers the bare minimum of commands to get Tor up and running. You should follow due diligence when it comes to securing your new slice, something which is outside the scope of this document. Common practice security configurations are recommended. Security is your own responsibility, and I will not be held liable for any security issues with your slice. There are a few bare-minimum security things you should do to your slice:

    Change the root password:
    passwd root

    Create your own account & set password:
    adduser yourusername
    passwd yourusername

    Disable root login to ssh
    vim /etc/ssh/sshd_config
    Change to this: PermitRootLogin no
    service sshd restart

    These steps are the BARE MINIMUM you should do to secure your slice.

  3. Update your system

    yum -y update

  4. Install prerequisites

    yum install wget vim-enhanced gcc make libevent libevent-devel openssl openssl-devel zlib zlib-devel rpm-build

  5. Download, build, and install Tor


    wget https://www.torproject.org/dist/rpm/tor-0.2.0.34-tor.0.fc10.src.rpm
    rpmbuild --rebuild tor-0.2.1.15.rc-tor.0.fc10.src.rpm
    rpm -i rpmbuild/RPMS/x86_64/tor-0.2.1.15.rc-tor.0.fc10.x86_64.rpm

  6. Configure Tor

    vim /etc/tor/torrc

    Change the following settings, substituting your own values for Nickname and Address:

    DataDirectory /var/lib/tor
    ORPort 9001
    DirPort 9030
    Nickname YOUR_NICKNAME
    Address YOUR.IP.ADDRESS.XX

    Save & Exit

  7. Set bandwidth limits for Tor

    These settings are largely dependent on which slice you have purchased. The ones you see below are for a 20GB slice, and they allow 2GB of transfer per day, so you should be well within the 20GB slice limit of 100GB/month. If you have purchased a larger slice, these settings can be increased accordingly. Be careful here, incorrect settings can push you over your monthly bandwidth limit very quickly! I did over 12GB of transfer in a little over 8 hours before limiting bandwidth with these settings.

    RelayBandwidthRate 40Kbytes
    RelayBandwidthBurt 100KBytes
    AccountingStart day 12:00
    AccountingMax 2 GB

  8. Configure your firewall


    iptables-save > /etc/sysconfig/iptables.default
    iptables-save > /etc/sysconfig/iptables.test
    vim /etc/sysconfig/iptables.test

    Insert the following settings:

    # tor ORPort & DirPort
    -A INPUT -p tcp –dport 9001 -j ACCEPT
    -A INPUT -p tcp –dport 9030 -j ACCEPT


    # tor Allow all outbound traffic
    -A OUTPUT -j ACCEPT

    Save & Exit.

    iptables-restore < /etc/sysconfig/iptables.test
    iptables -L
    (verify the rules are correct)
    iptables-save > /etc/sysconfig/iptables

  9. Increase the number of open file descriptors

    vim /etc/security/limits.conf

    Add this line:

    _tor hard nofile 8192

    Save & Exit

  10. Start up the Tor service

    service tor start

    If everything starts correctly, you should see output like this:

    Starting tor: Jun 21 15:44:04.219 [notice] Tor v0.2.1.15-rc. This is experimental software. Do not rely on it for strong anonymity. (Running on Linux x86_64)
    Jun 21 15:44:04.219 [notice] Your ContactInfo config option is not set. Please consider setting it, so we can contact you if your server is misconfigured or something else goes wrong.
    Jun 21 15:44:04.223 [notice] Initialized libevent version 1.4.5-stable using method epoll. Good.
    Jun 21 15:44:04.223 [notice] Opening OR listener on 0.0.0.0:9001
    Jun 21 15:44:04.223 [notice] Opening Directory listener on 0.0.0.0:9030
    Jun 21 15:44:04.223 [notice] Opening Socks listener on 127.0.0.1:9050
    /usr/bin/torctl start: tor started [ OK ]

    Also, you should view the tor.log and verify that you see the following (after 20-minutes):

    cat /var/log/tor/tor.log

    Jun 21 15:44:13.835 [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
    Jun 21 15:44:13.835 [notice] Bootstrapped 100%: Done.
    Jun 21 15:44:13.835 [notice] Now checking whether ORPort XXX.XXX.XXX.XXX:9001 and DirPort XXX.XXX.XXX.XXX:9030 are reachable.. (this may take up to 20 minutes -- look for log messages indicating success)
    Jun 21 15:44:18.492 [notice] Self-testing indicates your DirPort is reachable from the outside. Excellent.
    Jun 21 15:44:18.492 [notice] Not advertising DirPort (Reason: AccountingMax enabled)
    Jun 21 15:44:26.804 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor.
    Jun 21 15:44:43.813 [notice] Performing bandwidth self-test.. done.

    If you see some errors or it doesn’t start correctly, post in the comments and I’ll see if I can help you out. Here are some references to help you get it going:
    http://www.torproject.org/docs/tor-doc-unix.html.en#installing
    http://www.torproject.org/docs/tor-doc-relay.html.en

That’s it! You now have a fully functioning Tor Relay and are helping the Iranian people get news and information out to the rest of the world. The cool thing about Slicehost is that you can easily upgrade your Slice with the click of a button to allow more bandwidth, RAM, and other resources. They also have a Clone option so that once you have your initial Tor slice running, you can clone it multiple times so that you can have multiple Tor servers at a time.

Petition to the International Court of Justice

A new petition on the web, sign here (http://www.petitiononline.com/akcriems/petition.html)

To: Prosecutors of the International Court of Justice Dear Madams/Sirs, Prosecutors of the International Court of Justice,

Based on the constitution of the Islamic regime ruling Iran, Ali Khamenei, the leader designated as The Absolute Theocratic Guardianship, has unlimited authority, his commands must be unconditionally enforced and he cannot be challenged or opposed in any way. As such, Ali Khamenei acts in nothing more than in his own self-interest, in dereliction of his duty to safeguarding the lives, property and dignity of the people of Iran and maniacally runs rough shod over our nation; and with the aid of his oppressive henchmen, they add to the multitudes of the tortured and murdered of this land. This is a dictator whose inept and brutal policies has stiffled any expression of dissent and has squarely put our country in the path of destruction.

This suffocation and continued injustice has drowned out the voices of protesting groups such as the legions of workers, teachers, students, writers, journalists, bloggers, etc. Each day the number of the executed and tortured, in the prisons increases, all simply as a result of differences of opinion or opposition to the regime’s course of action.

As a result, in view of the recent warrant issued by your court, in the case of Omar al-Bashir, the criminal leader of The Sudan, we the below signatories, call upon you to also investigate crimes committed by Ali Khamenei, and to also issue a warrant for his arrest.

TIME Magazine: 5 Reasons to Suspect the Election Was Rigged

From TIME Magazine: http://www.time.com/time/specials/packages/article/0,28804,1904645_1904644,00.html?cnn=yes

"A hackers life" on aiding Iran

Another great blogger posts some suggestions (http://mces.blogspot.com/2009/06/how-to-help-iran-2_18.html):

There are three different ways right now that people can help Iranians stay connected to the outside world a little longer:
  • Setup a Squid proxy: HOWTO (read even if you know how to setup Squid, it has Iran-specific info)
  • Setup a Tor bridge: HOWTO
  • Setup a Twitter relay: HOWTO
After you set something up, it's important NOT to make the info public. Email to gr88proxies@googlegroups.com. Helps if you clear-sign with their PGP key and/or attach other evidence that they are not insiders. Anything, for example hosting it on a server that is clearly not run by AN supporters, etc.

From another blogger

From blogger ReunifyGally (http://reunifygally.wordpress.com/2009/06/17/help-iran/)

I am neutral on the Iranian election. But I am very pro freedom of speech. Whether we agree or disagree with any given Iranian citizen, they ought to have the right to express their views. Here are simple ways you can help them defeat attempts at censorship in Iran:

1. Do you twitter? Change your twitter location to any city in Iran. If all of us are Iranians then it is a little harder for government censors to track down Iranian tweeters. (See list of Iranian cities at http://is.gd/13UCt.) Some people say you should also change your time zone to Tehran time, which is 3.5 hours past GMT (GMT +3:30). Other people say the time zone is irrelevant. Decide for yourself.

2. Read a list of a few more simple ideas for how you can help at http://is.gd/13TK4 (This is the “BoingBoing” post for those of you who have been around enough to see it already; those of you looking for more ambitious ideas for how to be involved consult http://iran.sharearchy.com/ or http://is.gd/14PMh; see #4 and #5 below)

3. Finished with #1 and #2 above? Recruit others to help too. Spread the word. Here are a few ways you can do this:

  • Tweet this phrase:

    Simple ways to help Iranian free speech: http://is.gd/13U0V #IranElection #gr88 Pls RT

  • Also consider copy/pasting this announcement into your blog or facebook page so more people will see it. Or simply link to its original home at http://is.gd/13U0V. (If you copy/paste, please copy the text from its original home to ensure that you have any updated URLs or other information.)
  • Also, consider voting for this blog post (http://is.gd/13U0V) at one or more of the following: http://www.stumbleupon.com/, http://www.reddit.com/; http://is.gd/13WVR (digg.com) That will help more people find it.

4. Looking for more ideas how to help? Consult http://iran.sharearchy.com/. This provides instructions on how you can set up your own proxy server to help Iranians blog more safely (easier than you might think, though with certain caveats which you will need to read at the link). It also has more tips for how to participate in global dialogue and mobilize support in a way that protects the safety of Iranian bloggers and tweeters.

5. Are you bilingual? Please consider providing translation assistance so that people all around the world can learn about ideas for how to support free speech no matter what language they communicate in. For more details, go to http://is.gd/14PMh.

6. Want to follow the “tweets” about Iran? At twitter.com, do a search for #IranElection or #gr88 These are the two official hash tags used by Iranian bloggers themselves. (Hash tags are used to help find tweets on specific topics). As the “boing boing” post says, do be on guard. Some tweets are very legitimate, but others are rumors, speculation, or even outright disinformation.

Very good digest

Here is a very good digest of what the tweets from Iran have been telling us, well worth a read:

http://iran.whyweprotest.net/news-current-events/1751-green-brief-5-niteowl.html#post13395

A good sight explaining how to set up a Tor bridge

A blog explaining how to set up a Tor bridge, a very powerful tool for Iranian bloggers:

http://anonygreen.wordpress.com/2009/06/18/how-to-setup-a-tor-relay-or-tor-bridge/

Change your twitter time zone

This is very important and very simple:

If you have a twitter account, change your settings and make your location o Tehran & your time zone to GMT +3.30 (Tehran). This will help prevent the Iranian government from choking off Iranian twitter accounts.

Petition Canada

Petition Canada and ask them to open their embassy to open their embassy to injured Iranians:

http://www.petitiononline.com/cndnemb/petition.html

Green Thumbnails on Twitter

Simple show of solidarity on Twitter. Tint your twitter avatars green to show solidarity with the Iranian freedom fighters:

iran.greenthumbnails.com

Arrest in Iran

FOX News reporting (via http://www.foxnews.com/story/0,2933,528047,00.html:)

"TEHRAN — Iranian state radio said Monday that 457 people were arrested in clashes between demonstrators and security forces in Tehran that took place late Saturday."


For those overwhelmed keeping up with twitters

Here is a good sight that posts major and reliable tweets on Iran;

http://iran.robinsloan.com/

Submit a proxy

For all techies, please submit proxies:

http://proxyheap.austinheap.com/phase1.php