On Sun, 11 Jan 2015, Nick Mathewson wrote:
> On Sun, Jan 11, 2015 at 4:23 AM, Peter Palfrader
> wrote:
> > On Sat, 10 Jan 2015, Nick Mathewson wrote:
> >
> >>This proposal describes a simple way for directory authorities to
> >>perform signing key revocation.
> >>
> >> 2. Specification
>
On Sun, Jan 11, 2015 at 6:33 AM, Ian Goldberg wrote:
> On Sat, Jan 10, 2015 at 03:46:32PM -0500, Nick Mathewson wrote:
>> 5. Circular revocation
>>
>>My first attempt at writing a proposal here included a lengthy
>>section about how to handle cases where certificate A revokes the key
>>
On Sun, Jan 11, 2015 at 4:23 AM, Peter Palfrader wrote:
> On Sat, 10 Jan 2015, Nick Mathewson wrote:
>
>>This proposal describes a simple way for directory authorities to
>>perform signing key revocation.
>>
>> 2. Specification
>>
>>We add the following lines to the authority signing c
Hi,
I have to study for an exam on Tuesday so it would be ideal for me if we
could move the next ooni dev meeting to Tuesday.
Does that work for those interested in attending?
I would suggest we do it at the same time (19:00 CET).
~ Arturo
___
tor-dev
OnionMail is a mail server encrypted and anonymous made to run through
the TOR network without losing the ability to communicate with the Internet.
This type of server provides greater privacy for users and also protects
against eavesdropping of the NSA or other threats.
Important update Oni
>> Date: Sun, 11 Jan 2015 14:09:56 +0100
>> From: Mohiuddin Ebna Kawsar
>>
>> Hi teor,
>>
>> Thanks for quick reply. i just download new chutney from github and able to
>> run chutney for nodes = a(3) + r(1) + c(1) but when i set nodes = a(3) +
>> c(1) i got following message
>> ###
> Date: Sun, 11 Jan 2015 14:09:56 +0100
> From: Mohiuddin Ebna Kawsar
>
> Hi teor,
>
> Thanks for quick reply. i just download new chutney from github and able to
> run chutney for nodes = a(3) + r(1) + c(1) but when i set nodes = a(3) +
> c(1) i got following message
>
*sorry forgot to include*tor -f
/home/raboon/chutney-master/net/nodes/000a/torrc
Jan 11 14:10:18.730 [notice] Tor v0.2.6.2-alpha-dev running on Linux with
Libevent 2.0.21-stable, OpenSSL 1.0.1f and Zlib 1.2.8.
Jan 11 14:10:18.730 [notice] Tor can't help you if you use it wrong! Learn
how to be safe
Hi teor,
Thanks for quick reply. i just download new chutney from github and able to
run chutney for nodes = a(3) + r(1) + c(1) but when i set nodes = a(3) +
c(1) i got following message
##
./chutney start networks/basic-min
Starting node
> Date: Sun, 11 Jan 2015 12:29:34 +0100
> From: Mohiuddin Ebna Kawsar
>
> Thank's for your answer with good explanation. yes it worked for
> (Authority.getN(3) + Relay.getN(1) + Client.getN(1) ) . For this i have
> installed tor-0.2.6.2-alpha-dev and download newest chutney where exit-v4.i
> or e
On Sat, Jan 10, 2015 at 03:46:32PM -0500, Nick Mathewson wrote:
> 5. Circular revocation
>
>My first attempt at writing a proposal here included a lengthy
>section about how to handle cases where certificate A revokes the key
>of certificate B, and certificate B revokes the key of cert
Hi teor,
I forgot to mention that i added
ExitPolicy accept 127.0.0.0/8:*
ExitPolicy accept [::1]:*
IPv6Exit 1
#
to torc of each authority in net/nodes
before ExitPolicy reject *:*
On Sun, Jan 11, 2015 at 12:29 PM, Mohiuddin Ebna Kawsar <
mohiud
Hi teor,
Thank's for your answer with good explanation. yes it worked for
(Authority.getN(3) + Relay.getN(1) + Client.getN(1) ) . For this i have
installed tor-0.2.6.2-alpha-dev and download newest chutney where exit-v4.i
or exit-v6.i don't exist .
now i can see thorough wire-shark that which serv
On Sat, 10 Jan 2015, Nick Mathewson wrote:
>This proposal describes a simple way for directory authorities to
>perform signing key revocation.
>
> 2. Specification
>
>We add the following lines to the authority signing certificate
>format:
>
> revoked-signing-key SP algname
14 matches
Mail list logo