Tor 0.1.2.4-alpha is out

2006-12-05 Thread Roger Dingledine
This is the fourth development snapshot for the 0.1.2.x series. It fixes
some bugs. The Windows and OS X bundles include the new Privoxy 3.0.6.

http://tor.eff.org/download.html

Changes in version 0.1.2.4-alpha - 2006-12-03
  o Major features:
- Add support for using natd; this allows FreeBSDs earlier than
  5.1.2 to have ipfw send connections through Tor without using
  SOCKS. (Patch from Zajcev Evgeny with tweaks from tup.)

  o Minor features:
- Make all connections to addresses of the form .noconnect
  immediately get closed. This lets application/controller combos
  successfully test whether they're talking to the same Tor by
  watching for STREAM events.
- Make cross.sh cross-compilation script work even when autogen.sh
  hasn't been run. (Patch from Michael Mohr.)
- Statistics dumped by -USR2 now include a breakdown of public key
  operations, for profiling.

  o Major bugfixes:
- Fix a major leak when directory authorities parse their
  approved-routers list, a minor memory leak when we fail to pick
  an exit node, and a few rare leaks on errors.
- Handle TransPort connections even when the server sends data before
  the client sends data. Previously, the connection would just hang
  until the client sent data. (Patch from tup based on patch from
  Zajcev Evgeny.)
- Avoid assert failure when our cached-routers file is empty on
  startup.

  o Minor bugfixes:
- Don't log spurious warnings when we see a circuit close reason we
  don't recognize; it's probably just from a newer version of Tor.
- Have directory authorities allow larger amounts of drift in uptime
  without replacing the server descriptor: previously, a server that
  restarted every 30 minutes could have 48 interesting descriptors
  per day.
- Start linking to the Tor specification and Tor reference manual
  correctly in the Windows installer.
- Add Vidalia to the OS X uninstaller script, so when we uninstall
  Tor/Privoxy we also uninstall Vidalia.
- Resume building on Irix64, and fix a lot of warnings from its
  MIPSpro C compiler.
- Don't corrupt last_guessed_ip in router_new_address_suggestion()
  when we're running as a client.



signature.asc
Description: Digital signature


Re: Off Topic: Getting PGP and GnuPG Public Keys

2006-12-05 Thread xiando
 I've noticed a fair number of list members use GnuPG or PGP and I got
 tired of manually trying to find a keyserver that had the poster's
 public key. I know they are supposed exchange keys, but this seems very
 hit or miss. So I wrote the little script below. It includes several

(..)

 I hope someone finds this useful.

Thanks. It was a tad long, but.. thanks. Nice list of keyservers.


 if gpg --keyserver tickets.rutgers.edu --recv-key $1
 then
echo tickets.rutgers.edu
exit
 fi

 if gpg --keyserver pgp.mit.edu --recv-key $1
 then
echo pgp.mit.edu
exit
 fi

 if gpg --keyserver keyserver.veridis.com  --recv-key $1
 then
echo keyserver.veridis.com
exit
 fi

 if gpg --keyserver pgp.keyserver.ch  --recv-key $1
 then
echo pgp.keyserver.ch
exit
 fi

 if gpg --keyserver pgp.surfnet.nl --recv-key $1
 then
echo pgp.surfnet.nl
exit
 fi

 if gpg --keyserver www.stinkfoot.org --recv-key $1
 then
echo www.stinkfoot.org
exit
 fi

 if gpg --keyserver pgp.es.net --recv-key $1
 then
echo pgp.es.net
exit
 fi

 if gpg --keyserver pgp.rediris.es --recv-key $1
 then
echo pgp.rediris.es
exit
 fi

 if gpg --keyserver pgp.nic.ad.jp --recv-key $1
 then
echo pgp.nic.ad.jp
exit
 fi

 if gpg --keyserver pgp.uk.demon.net --recv-key $1
 then
echo pgp.uk.demon.net
exit
 fi

 if gpg --keyserver pgp.zdv.uni-mainz.de --recv-key $1
 then
echo pgp.zdv.uni-mainz.de
exit
 fi

 if gpg --keyserver keyserver.linux.it --recv-key $1
 then
echo keyserver.linux.it
exit
 fi

 if gpg --keyserver keys.iif.hu --recv-key $1
 then
echo keys.iif.hu
exit
 fi

 if gpg --keyserver pgp.eteo.mondragon.edu --recv-key $1
 then
echo pgp.eteo.mondragon.edu
exit
 fi

 echo exiting failure

#!/bin/bash
#
# Thanks to George Shaffer
#
if [ $1 ==  ];then
  echo Enter a key as argument!
  exit 1
fi

echo 'tickets.rutgers.edu
tickets.rutgers.edu
pgp.mit.edu
keyserver.veridis.com
pgp.keyserver.ch
pgp.surfnet.nl
www.stinkfoot.org
pgp.es.net
pgp.rediris.es
pgp.nic.ad.jp
pgp.uk.demon.net
pgp.zdv.uni-mainz.de
keyserver.linux.it
keys.iif.hu
pgp.eteo.mondragon.edu'|while read keyserver;do

if gpg --keyserver $keyserver --recv-key $1
then
   echo Found key at $keyserver
   exit
fi
done



pgpP3SNRLOnuu.pgp
Description: PGP signature


Re: Off Topic: Getting PGP and GnuPG Public Keys

2006-12-05 Thread Peter Palfrader
On Tue, 05 Dec 2006, xiando wrote:

 tickets.rutgers.edu
broken.  Do not use.

 pgp.mit.edu
broken.  Do not use.

 keyserver.veridis.com
broken.  Do not use.

 pgp.keyserver.ch
broken.  Do not use.

 pgp.surfnet.nl
SKS.  good.

 www.stinkfoot.org
SKS.  good.

 pgp.es.net

broken.  Do not use.

 pgp.rediris.es
SKS.  good.

 pgp.nic.ad.jp
broken.  Do not use.

 pgp.uk.demon.net
broken.  Do not use.

 pgp.zdv.uni-mainz.de
SKS.  good.

 keyserver.linux.it
SKS.  good.

 keys.iif.hu
broken.  Do not use.

 pgp.eteo.mondragon.edu
broken.  Do not use.


Sorry, giving out lists of keyservers is usually just bad advice.
Better tell people to use subkeys.pgp.net, or
random.sks.keyserver.penguin.de.  These are two rotations that include
only servers that are known to properly handle PGP keys, including
subkeys and attribute UIDs.

All the keyserver marked as broken are known to either ignore keyupdates
to certain keys, to only partially update keys, or even worse to mangle,
i.e. add garbage to keys.  Do not use them for anything.

Only use subkeys.pgp.net or random.sks.keyserver.penguin.de and tell
your friends the same.
-- 
   |  .''`.  ** Debian GNU/Linux **
  Peter Palfrader  | : :' :  The  universal
 http://www.palfrader.org/ | `. `'  Operating System
   |   `-http://www.debian.org/


looking for volunteers for practicing gnupg mail encryption

2006-12-05 Thread gabrix
Hi !I was looking for volunteers for practicing gnupg mail
encryption.I'm actually using thunderbird-enigmail and kgpg and i had
some questions also , is anyone up for it ?


Re: looking for volunteers for practicing gnupg mail encryption

2006-12-05 Thread Dan Collins

I can help a bit, though I'm not convinced that thunderbird is actually
checking my signatures, so ph34r.

On 12/5/06, gabrix [EMAIL PROTECTED] wrote:


Hi !I was looking for volunteers for practicing gnupg mail
encryption.I'm actually using thunderbird-enigmail and kgpg and i had
some questions also , is anyone up for it ?





--
ST47
Editor, en.wikipedia