Re: Orbot transparent proxy working on rooted android?
> If noone else goes for a patched version, I'd test my build host with > Orbot 0.0.8 next weekend. Dumb me. I was stuck on Orbot 0.0.8 as latest version (from http://www.torproject.org/docs/android.html.en) and missed 1.0.3 being released in the market. So the former post is quite useless. Sorry for that. --pk signature.asc Description: Digital signature
Re: Orbot transparent proxy working on rooted android?
Hi, > Then I turned on transparent proxy, > So far I can't get tor check to say I am using tor. Has anyone had success? Android 2.2 uses iptables 1.4.7., iptables changed the behaviour regarding the nat table on 1.4.3, so simply the old rules don't work. A workaround would be to set the iptables-rules via adb shell or your terminal/shell script/... (like https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy, but your "DNS"-destination-port is 5400) If noone else goes for a patched version, I'd test my build host with Orbot 0.0.8 next weekend. HTH --pk signature.asc Description: Digital signature
Re: another unusual connection
Hi, > > However, given the obviously false information being provided by > > anon-tor-proxy.maximator.org (212.112.242.159), could it please be > > flagged as "Invalid" and "Bad Exit" by the directory authorities? oh, no need to flag. There is nothing malicious at maximator. > My guess is that it's doing a proxypass from its apache on port 80 to > whatever port Tor is running on locally, xinetd-forwarding 80->DIR and 443->OR, so the node sees a wrong (i.e. his own) IP due to the forward. I've started forwarding with iptables now, so this problem seems to be solved - at this node. > running Tor servers since 2005. 2004, and yes, I'm nice enough ;) Peter. pgpbt7QlNXTHo.pgp Description: PGP signature
Re: 20090101
On Fri, Nov 09, 2007 at 03:59:44PM CET, you (Eugen Leitl) wrote: > This will be contested as unconstitutional, but in cases it > will become law all Tor operators are required by law to start > logging 20090101. 20080101 :(
Re: confiscating middleman-tor-nodes
Hi, wuschelpuschel (running an exit config) was busted either. I called the Staatsanwaltschaft (public prosecutors authority) Konstanz and the Landeskriminalamt (state Office of Criminal Investigation) Baden-Wuerttemberg, there's a big thing happening at the moment, as they had to have a *long* look at the list of busted computers to find mine. Plus, the LKAs don't care about the small and simple stuff. Both know about Tor and are hunting for traces. Didn't get more to know via fone. We should be on the safe side, I guess there will be less trouble than with the normal police/criminal investigators involved. Good luck, Peter.