hello, thanks for the response!
> DirServer [nickname] [v1] address:port fingerprint > Use a nonstandard authoritative directory server at the provided > address and port, with the specified key fingerprint. This option can be > repeated many times, for multiple authoritative directory servers. If > the "v1" option is provided, Tor will use this server as an authority > for old-style (v1) directories as well. (Only directory mirrors care > about this.) If no dirserver line is given, Tor will use the default > directory servers: moria1, moria2, and tor26. NOTE: this option is > intended for setting up a private Tor network with its own directory > authorities. and the DirServer entry in the manpage goes on to say ... this option is intended for setting up a private Tor network with its own directory authorities. If you use it, you will be distinguishable from other users, because you won't believe the same authorities they do. ... so i assume this implies that one could actually have a "private" tor network on the internet? if so, then it would be interesting to know what customized code the us navy and darpa have built into their networks. i wonder this, having worked for the us army strategic defense command where we contributed to darpa funding, and realize that tor is an interesting concept for fault tolerant command, control, and communications (what we called c-cubed). i would imagine that darpa has some tor models that dynamically regenerate communication channels should intermediate nodes go silent. i have no doubt that the tor work that mit has released is all there is to the tor work being done, but it is an interesting concept to make parts of the system open source and get people to help solve critical gotchas. regards, murrah boswell > > Cheers, > > ~Mike.