I tried to attach a screenshot, but that put my message over the 50KB
needs-approval limit. See my message below (minus the attachment).
2012/1/4 Greg :
> Hi Andrew,
> Thank you for taking a stab at this issue! I just tried this now, and
> it still doesn't work. I don't remember precisely what
Hi Andrew,
Thank you for taking a stab at this issue! I just tried this now, and
it still doesn't work. I don't remember precisely what the chain
looked, so I can't be sure I'm seeing anything different at all. I
restarted Chrome (but not Windows). Both www.torproject.org and
trac.torproject.org
I think this is fixed for www.torproject.org now. Digicert apparently
updated their ca chained certs at some point. I've put the updated
ca-certs on the www servers. If this works, we can update them on all
torproject servers.
And for fun, I've attached the gnutls-cli output of the old cert in
pla
On Thu, Jan 5, 2012, at 12:14 AM, Gozu-san wrote:
> On 04/01/12 19:24, Geoff Down wrote:
>
> > Let's try that again...
> > http://pastebin.com/jBPFsUSg
> > "We did crack Tor's encryption to reveal 190 IP addresses of individuals
> > using Tor for Child Pornography"
>
> They didn't "crack Tor's
On 04/01/12 19:24, Geoff Down wrote:
> Let's try that again...
> http://pastebin.com/jBPFsUSg
> "We did crack Tor's encryption to reveal 190 IP addresses of individuals
> using Tor for Child Pornography"
They didn't "crack Tor's encryption". They posted a fake "Tor security
update" on one of the
well, this is certainly beyond my certificate debugging skill level.
Would engaging a Chrome mailing list be helpful?
Thanks for all the info so far,
Greg
2012/1/4 Ondrej Mikle :
> On 01/04/12 21:30, Pascal wrote:
>>
>> Running www.digicert.com through that tool shows the 2nd intermediate
>> cert
On Wed, Jan 4, 2012 at 21:24, Geoff Down wrote:
> http://pastebin.com/jBPFsUSg
> "We did crack Tor's encryption to reveal 190 IP addresses of individuals
> using Tor for Child Pornography"
How can one even begin to assess a press-release that's essentially an
incomprehensible diatribe? Are these
On Wed, 04 Jan 2012 19:24:56 +
"Geoff Down" wrote:
> Let's try that again...
> http://pastebin.com/jBPFsUSg
> "We did crack Tor's encryption to reveal 190 IP addresses of
> individuals using Tor for Child Pornography"
"There are two recent stories claiming the Tor network is compromised.
It s
On 01/04/12 21:30, Pascal wrote:
Running www.digicert.com through that tool shows the 2nd intermediate
certificate that needs to be included.
Their tool is quite good, but not all-powerful. The suggested "2nd intermediate
certificate" must have subject CN="DigiCert High Assurance EV Root CA".
The tool at http://www.digicert.com/help/ does a good job of showing
what is going on with a web site's certs. Traditionally a website is
expected to send its own server cert and all intermediate certs, but not
the root cert. You can run www.google.com through that tool to see how
this looks.
On 01/04/12 07:40, Greg wrote:
Hi,
I searched google for people having problems accessing torproject.org
from Chrome on Windows, but I didn't see much besides a discussion on
December 21 about an outage
(http://comments.gmane.org/gmane.network.tor.general/2514).
I can access torproject.org from
Running www.digicert.com through that tool shows the 2nd intermediate
certificate that needs to be included.
-Pascal
On 1/4/2012 2:21 PM, Pascal wrote:
The tool at http://www.digicert.com/help/ does a good job of showing
what is going on with a web site's certs. Traditionally a website is
exp
--
http://www.fastmail.fm - mmm... Fastmail...
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Let's try that again...
http://pastebin.com/jBPFsUSg
"We did crack Tor's encryption to reveal 190 IP addresses of individuals
using Tor for Child Pornography"
--
http://www.fastmail.fm - Or how I learned to stop worrying and
love email again
___
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> If you have a Linux machine with an IPv6 address, and you're using
> the iptables technique described on that page, then you're going to
> leak. "iptables" only applies to IPv4 traffic. You need to put in
> an explicit rule using "ip6tables" to block
On 04/01/12 14:19, h...@safe-mail.net wrote:
> https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
>
> Since Tor does not support IPv6 yet...
>
> What about IPv6 traffic? Is it blocked when following these instructions?
>
> If not, how to do so?
If you have a Linux machine with
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
Since Tor does not support IPv6 yet...
What about IPv6 traffic? Is it blocked when following these instructions?
If not, how to do so?
___
tor-talk mailing list
tor-talk@lists.torprojec
An article about TOR, *Project Vigilant and BBHC Global* in french by
Primavera De Filippi:
http://adam.hypotheses.org/1149
Best regards.
--
François Huguet
Doctorant | Telecom ParisTech
Dépt. Sc. Economiques et Sociales | UMR CNRS LTCI
46, Rue Barrault - 75634 PARIS Cedex 13
✉ francois.hug..
which
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
19 matches
Mail list logo