Stop TOR from building circuits in the background?
Hello, I am using the -controlport Commands to build custom Circuits. My problem with this is that I cannot trust TOR to use these circuits. It keeps building new ones which were not requested by me via the command interface. I can drop all circuits, build 2 new ones, refresh the circuit list and there are more than 2. Can I deactivate this feature without recompiling? thanks in advance Brian -- Neu: GMX De-Mail - Einfach wie E-Mail, sicher wie ein Brief! Jetzt De-Mail-Adresse reservieren: http://portal.gmx.net/de/go/demail *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Stop TOR from building circuits in the background?
On Wed, Oct 6, 2010 at 8:47 AM, Brian Johnson brian_john...@gmx.net wrote: Hello, I am using the -controlport Commands to build custom Circuits. My problem with this is that I cannot trust TOR to use these circuits. It keeps building new ones which were not requested by me via the command interface. I can drop all circuits, build 2 new ones, refresh the circuit list and there are more than 2. Can I deactivate this feature without recompiling? Keep reading control-spec.txt till you get to section 5.4. Look at the documentation for __LeaveStreamsUnattached and __DisablePredictedCircuits. You'll want both, and you'll need to use ATTACHSTREAM to attach streams yourself. peace, -- Nick *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Stop TOR from building circuits in the background?
Hi, I think you are looking for: __DisablePredictedCircuits __LeaveStreamsUnattached see Section 5.4 in the control protocol [1] specification for details. Regards, Benne [1] http://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=doc/spec/control-spec.txt Am Mittwoch, den 06.10.2010, 14:47 +0200 schrieb Brian Johnson: Hello, I am using the -controlport Commands to build custom Circuits. My problem with this is that I cannot trust TOR to use these circuits. It keeps building new ones which were not requested by me via the command interface. I can drop all circuits, build 2 new ones, refresh the circuit list and there are more than 2. Can I deactivate this feature without recompiling? thanks in advance Brian *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Me - Tor - VPN - Internet?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - From what I have read, it is at least theoretically possible for someone running a Tor exit node to monitor any plaintext, non-SSL/https connections that are passed through that node. The solution that seems to be usually suggested is to always use end-to-end encryption, such as https. However, some sites do not support https. I have also noticed that there exist some free VPN services which can be used reasonably anonymously, such as ItsHidden. Thus, I was wondering - is there an easy way to, for lack of a better description, chain proxies, so that the traffic between myself and the VPN is anonymized through Tor, and my traffic between Tor and the internet is encrypted through the VPN? - -- LOADBEAR,8,1;RUN -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkytNwIACgkQ8Li/YMVVHuZGCgCgqcGoIEXD13bs3Vb8YklIiMuo gZsAn312Q69Nr0I6ODHR+AQ+xkkGStOm =r2iJ -END PGP SIGNATURE- *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Me - Tor - VPN - Internet?
On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote: I have also noticed that there exist some free VPN services which can be used reasonably anonymously, such as ItsHidden. Thus, I was wondering - is there an easy way to, for lack of a better description, chain proxies, so that the traffic between myself and the VPN is anonymized through Tor, and my traffic between Tor and the internet is encrypted through the VPN? Then the traffic between the VPN and the actual destination won't be encrypted, so the VPN sees everything you do. Same problem, different place. There is no way you can encrypt traffic sent to a destination that doesn't know how to decrypt it. - John Brooks
Re: Me - Tor - VPN - Internet?
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 2010/10/06 11:02 PM, John Brooks wrote: On Wed, Oct 6, 2010 at 8:57 PM, Load Bear loadbear...@gmail.com wrote: I have also noticed that there exist some free VPN services which can be used reasonably anonymously, such as ItsHidden. Thus, I was wondering - is there an easy way to, for lack of a better description, chain proxies, so that the traffic between myself and the VPN is anonymized through Tor, and my traffic between Tor and the internet is encrypted through the VPN? Then the traffic between the VPN and the actual destination won't be encrypted, so the VPN sees everything you do. Same problem, different place. There is no way you can encrypt traffic sent to a destination that doesn't know how to decrypt it. I am aware of that limitation. However, I am currently less concerned about eavesdroppers between a given VPN and the destination than I am about Tor exit-node eavesdroppers. Knowing the limitations involved, do you know of some method to accomplish my expressed goal? - -- LOADBEAR,8,1;RUN -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkytOlEACgkQ8Li/YMVVHub8FACgg/j/wu+SQFa/vJ40x6Yc5xQq p3YAn1Rrw2g8KtiycWn2AbOK5fmLMpBo =AtlC -END PGP SIGNATURE- *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Me - Tor - VPN - Internet?
On Wed, Oct 6, 2010 at 9:11 PM, Load Bear loadbear...@gmail.com wrote: I am aware of that limitation. However, I am currently less concerned about eavesdroppers between a given VPN and the destination than I am about Tor exit-node eavesdroppers. Knowing the limitations involved, do you know of some method to accomplish my expressed goal? Assuming it's not a free VPN, you also run the risk of being identified by your billing information. If it is free, I would say that there is just as much if not more risk of your traffic being used maliciously. You would need to find VPN software that uses TCP and will allow you to send it through SOCKS. I don't know of any, but perhaps somebody else does. - John Brooks *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/