[tor-dev] Tor hangs at startup
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi, the Tor software has a odd behaviour on my Debian machine; it hangs when I start it via "service start tor" on my Debian (Wheezy 3.2.0-4-amd64 #1 SMP Debian 3.2.65-1+deb7u2) with Tor (0.2.4.26-1): service tor start [ ok ] Starting tor daemon... And then nothing happens anymore, I have to kill the dialog with ^C. As I figured out Tor starts correctly in the background (the logfile tells me so) and also opens my ORport and Dirport (netstat told me). Is this a bug or a behaviour that is supposed to be that way? Cheers, spriver -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJVHEYUAAoJEMkUf8VoejgP1GYP+wWnfllpVIC942S6PvHW9lx0 wPp6aHYBFL46Fg/r2pO8+rz7L1E1M72V0lYiqkiuzRs7IW2DYgfBVMpTz5+EoPk4 vGf+vPnyDR5hmVEM4sJbtfawb7CsK6dps/4sU6QuxfPCQE8IEII4JxbP8krobrcL 7nQAr8PPwVnuwbZGf9eqHNN4fZUnmZv8bPTtwpPB7ie8lOMzeJVCiEMU8NXKIe3K 9Wui7vatgNvTqldrHLI0DJZRJJ86V/+Q4aSJ6hvH0C7JuB+tO7sOLlplIKLxYkb5 eXFzBUhqESslsGc07k8wVhytaYSEhsG3Y0xh18gcA2rZF3kf6zi4roK2wWECyV+/ 7WsVQhQ0zJm2CUbprYKCAMqBHGm2fKdRLo+OyXQCzfO/Gn75NX2aWZBaAjZ3Ppt5 IMTdQh9UZzEPnrogjLVRwq8JvQBKNgMVe72zstMvnGtqevJuvu8bY/2EjAoK9085 UBiJyaOM8VoCf0CeEgiXijzf3dtzL6FSA78kQFlb1KWNm20PJxWaZ4YqK1vWHP/o vHWz8w0252WaM1WF1raQFqVuMz4z5QFrjMOeGxkDoq2kDVaYDfwifQntzgspqOgG CJzefHrob3cAEDPoFlPiod8k/RxHg9e1nJnLYORCbCuh5pqGL95NCA6f6/zE7xxb eeu7eDN823KTBbwriyrU =RZWR -END PGP SIGNATURE- 0x687A380F.asc Description: application/pgp-keys ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Re: [tor-dev] PT-themed stuffed animals: huggable transports
On 01/04/15 16:50, Rishab Nithyanand wrote: > Next, we went on to study possible replacements and found that the > Scramblesuit rabbit [1] did significantly better! As a side benefit, it > made all the censors go a and let it right through. > > Expect our full results at USENIX Security. > > [1] http://en.wikipedia.org/wiki/Rabbit That's a plaintext rabbit - surely you meant [2]? Cheers, Michael [2] https://en.wikipedia.org/wiki/File:Hare_Tonic.jpg signature.asc Description: OpenPGP digital signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Re: [tor-dev] PT-themed stuffed animals: huggable transports
Agreed! In fact, our team at Stony Brook just completed a study on the huggability of current PTs. One of our results is that the Scramblesuit bumblebee fared worst. It caused some of our study participants to report us to the IRB. We in turn chose to blame David for encouraging this study. Next, we went on to study possible replacements and found that the Scramblesuit rabbit [1] did significantly better! As a side benefit, it made all the censors go a and let it right through. Expect our full results at USENIX Security. [1] http://en.wikipedia.org/wiki/Rabbit On Wed, Apr 1, 2015 at 9:24 AM, David Fifield wrote: > In an effort to improve pluggable transports' visual identity, we should > introduce a line of stuffed animals. The only rule that the the animal's > name has to be made out of the transport name. > > The meek meerkat! [1] > The obfs blobfish! [2] > The FTE eft! [3] > The flash proxy banded quail (Philortyx fasciatus)! [4] > The ScrambleSuit bumblebee (Bombus centralis)! [5] > > Call now, operators are standing by. > > [1] https://en.wikipedia.org/wiki/Meerkat > [2] https://en.wikipedia.org/wiki/Blobfish > [3] https://en.wikipedia.org/wiki/Eft > [4] https://en.wikipedia.org/wiki/Philortyx_fasciatus > [5] https://en.wikipedia.org/wiki/Bombus_centralis > ___ > tor-dev mailing list > tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev > ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
[tor-dev] Raptor
Some people say to track tor users there is a tool named raptor. It uses the packet data recognition to track via AS the data streams between tor hosts. Can be a good idea to split, merge, change the packet order, the data streams etc... to obfuscate the traffic with an algotithm to create false data recostruction? Example: Alice --->node-> node -> node --> Bob1 > False/EndOfStream ^ ^v ^v ^v ^v | \--- node <- node <- node <-- node -/ If a complex network is created and some random data and connection are added to negotiate the data obfuscation, is very difficult to track a single data stream or packet. When the data arrival, send some data (same payload size)to a random loop circuit. What do you think? ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
[tor-dev] PT-themed stuffed animals: huggable transports
In an effort to improve pluggable transports' visual identity, we should introduce a line of stuffed animals. The only rule that the the animal's name has to be made out of the transport name. The meek meerkat! [1] The obfs blobfish! [2] The FTE eft! [3] The flash proxy banded quail (Philortyx fasciatus)! [4] The ScrambleSuit bumblebee (Bombus centralis)! [5] Call now, operators are standing by. [1] https://en.wikipedia.org/wiki/Meerkat [2] https://en.wikipedia.org/wiki/Blobfish [3] https://en.wikipedia.org/wiki/Eft [4] https://en.wikipedia.org/wiki/Philortyx_fasciatus [5] https://en.wikipedia.org/wiki/Bombus_centralis ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev