[no subject]
unsubscribe or-talk *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
[no subject]
http://www.vmh1.xpharmx.com
[no subject]
hi, i' am a student of information science at University of Salerno, Italy. As i'm writing about tor for an exam i have read tor's document design but, i don't understand how tor network generates the key to cipher circuits, who generates this keys (identity key, onion key public/private pair and link key) i'd like understand, step by step, negotiation of TLS link between OR/OR - OR/OP and, after this, how tor generates public/private onion keys for each relay. Thanks very much for answers. -- Michele Falso
[no subject]
If you have Vidalia.app containing tor 0.2.1.22, and you've also installed Apple's "Mac OS X Security Update 2010-001", you'll have noticed that Apple made some errors in their TLS renegotiation. Apple removed TLS renegotiation even for apps that both need TLS renegotiation and do it safely. Apple did this in spite of the upstream OpenSSL project having fixed the renegotiation vulnerability more sanely. Apple is apparently using a partial back-port of the fix. To work around Apple's TLS renegotiation back-port, it's easiest and safest (in terms of side effects) to switch for now to using the real OpenSSL in your existing Vidalia.app. Here's how. 1) Make sure you have the latest versions of the real libevent and openssl installed. At present this gets you "OpenSSL 0.9.8l 5 Nov 2009" (If you don't have MacPorts already, go here: http://www.macports.org/install.php ) --- sudo port install libevent openssl --- 2) Get and verify the signatures on the tor source. (If you haven't gotten the signers' keys directly from them, and there's no-one you trust who has signed them yet, you can at least hit the tor download site and see that the source archives back through the years are signed by the same keys. If you don't have wget and gpg, fix that with 'sudo port install wget gnupg') --- cd ~/src/ wget "http://www.torproject.org/dist/tor-0.2.1.22.tar.gz.asc"; wget "http://www.torproject.org/dist/tor-0.2.1.22.tar.gz"; gpg tor-0.2.1.22.tar.gz.asc --- 3) Extract and build tor. --- tar xzvf tor-0.2.1.22.tar.gz && cd tor-0.2.1.22/ env CPPFLAGS="-I/opt/local/include" LDFLAGS="-L/opt/local/lib" ./configure make all --- 4) Put your new tor executable into your existing Vidalia.app. --- cp -p ~/Applications/Vidalia.app/Contents/MacOS/tor ~/Applications/Vidalia.app/Contents/MacOS/tor.old cp src/or/tor ~/Applications/Vidalia.app/Contents/MacOS/tor --- 5) Run Vidalia. --- open ~/Applications/Vidalia.app --- You've just built and installed a tor executable that uses the real OpenSSL, and is thus not afflicted with Apple's egregious kill of all TLS renegotiation in the Mac OS X bundled OpenSSL. You should now be able to connect to other nodes when you launch tor. Moving on, you'll be left with no tor side effects when you replace Vidalia.app with a new version containing official fixes. If you don't keep macports around for other purposes, you can remove macports then. Good luck! *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
[no subject]
Hello: I just managed to make pandora work on my browser as I don't live in USA. Is there any way to configure Tor to make the Pandora app work on the ipod touch? Thanks, Roberto
[no subject]
hi, i dindnt understand the "leaky pipe" Topology. How is it realized, is there some dummy traffic involved? thanks versendet mit www.oleco.de Mail - Anmeldung und Nutzung kostenlos! Oleco www.netlcr.org - jetzt auch mit Spamschutz. *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
[no subject]
auth 809bb944ff73e094 subscribe or-talk hrg...@gmail.com
[no subject]
auth 16480d7e3f50890e subscribe or-talk b...@chefe.dyndns.org
[no subject]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 What is the command to send to this message list to be removed from it? -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (Darwin) iEYEARECAAYFAkocGZwACgkQCbAiBM3P46LvuwCbB2ftEBKTth+8gEZxGXUzUG5H czwAoIHyVGq4jqp/++LHgABP8/cNk1QC =c1Iv -END PGP SIGNATURE-
[no subject]
If you run as an exit node, it's my understanding that you also act as a middleman node. Would it be possible, and would it be a good idea, to add an option such that you only act as an exit node? It seems a bit of a waste to use potential exit bandwidth as middleman relaying bandwidth when exit bandwdith is more scarce. -- Erilenz
[no subject]
unsubscribe or-talk
[no subject]
unsubscribe or-talk
[no subject]
auth 6bc7bd279542202 subscribe or-talk \ [EMAIL PROTECTED]
Re: (no subject)
I think you need to e-mail [EMAIL PROTECTED] On 26/01/2008, Paul Henning <[EMAIL PROTECTED]> wrote: > unsubscribe or-talk >
(no subject)
unsubscribe or-talk
[no subject]
unsubscribe
[no subject]
help - Shape Yahoo! in your own image. Join our Network Research Panel today!
Re: (no subject)
email [EMAIL PROTECTED] , with the line "unsubscribe or-talk" in the body. On 6/24/07, Anas Matar <[EMAIL PROTECTED]> wrote: unsubscribe
RE: (no subject)
unsubscribe -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of KT Sent: Saturday, June 23, 2007 7:51 PM To: or-talk@freehaven.net Subject: Re: (no subject) email [EMAIL PROTECTED] , with the line "unsubscribe or-talk" in the mail body. On 6/23/07, Marcus Streips <[EMAIL PROTECTED]> wrote: > unsubscribe > > Disclaimer: This E-mail and any attachments hereto are intended solely for the addressee and it may contain confidential material. If you are not the intended addressee or receive this in error, please delete the message and notify the sender. You must not disclose, forward or copy this E-mail or attachments to any third party. Statements, opinions or comments expressed in this E-mail are those of the sender and do not necessarily represent those of Arabian Advanced Systems "AAS". AAS accepts no liability for any damage caused by this E-mail or its attachments
Re: (no subject)
email [EMAIL PROTECTED] , with the line "unsubscribe or-talk" in the mail body. On 6/23/07, Marcus Streips <[EMAIL PROTECTED]> wrote: unsubscribe
(no subject)
unsubscribe
[no subject]
Unsuscribe _ Get a preview of Live Earth, the hottest event this summer - only on MSN http://liveearth.msn.com?source=msntaglineliveearthhm
[no subject]
unsiscribe _ Need a break? Find your escape route with Live Search Maps. http://maps.live.com/default.aspx?ss=Restaurants~Hotels~Amusement%20Park&cp=33.832922~-117.915659&style=r&lvl=13&tilt=-90&dir=0&alt=-1000&scene=1118863&encType=1&FORM=MGAC01
(no subject)
I am new to Tor so please forgive my ignorance... When I use Vidalia to start and then stop Tor I get the following messages in my Log. Mar 05 15:13:24:072 [Notice] Tor v0.1.2.9-rc. This is experimental software. Do not rely on it for strong anonymity. Mar 05 15:13:24:078 [Notice] Enabling experimental OS X kqueue support with libevent 1.3a. If this turns out to not work, set the environment variable EVENT_NOKQUEUE, and tell the Tor developers. Mar 05 15:13:24:083 [Notice] Initialized libevent version 1.3a using method kqueue. Good. Mar 05 15:13:24:088 [Notice] Opening Socks listener on 127.0.0.1:9050 Mar 05 15:13:24:091 [Notice] Opening Control listener on 127.0.0.1:9051 Mar 05 15:13:25:787 [Notice] We now have enough directory information to build circuits. Mar 05 15:13:28:491 [Notice] Tor has successfully opened a circuit. Looks like client functionality is working. Mar 05 15:16:43:073 [Error] Catching signal TERM, exiting cleanly. Is everything working correctly? Why do I get an error message when I stop Tor? Thanks for the time... Jay
[no subject]
unsubscribe or-talk
[no subject]
unsubscribe
[no subject]
unsubscribe
[no subject]
unsubscribe
[no subject]
I wanted to announce an hidden ssh service on port 666 being at this onion kfb3binbmka5d4st.onion argo.gabrix.ath.cx it is protected by password at the moment ,it's my lan's frontdoor , how should i make it pubblic ... any advice ? gab
[no subject]
i apologise if i've posted this already I use tor most often for irc, although I have recently shifted my customary irc hangout to the ORC away from a little one i used to hang out at, and on ORC tor proxying is a prerequesite. As a user of tor with irc, it has become the most common bitch of anyone i've talked to about the endless process of dying circuits, and while thinking about it recently i realised there was one thing that could be built into tor that would reduce the number of mis-guesses of long-lived tor nodes: accounting! If a node has bandwidth accounting, it should not be listed as long lived, because obviously it is likely to go down at any moment. I don't know if it will make that much difference to persistent session use on tor or not, but I think that it is only logical that bandwidth accounting should flag a 'not long lived' flag on the server information so that circuits to irc and ssh and other long lived connections don't use it. i know this might 'reduce anonymity' through the weakening of defenses against traffic analysis, but endless reconnections to irc servers, in my experience, is annoying both to myself and to the endless timeouts in the ORC which is exclusively tor-accessible. Regards, David Vennik -- http://davidvennik.blogspot.com/ begin:vcard fn:David Vennik n:Vennik;David org:The Monastic Order of Chaos;Administration adr:;;2/37 Dibar Street;Wynnum;QLD;4178;Australia email;internet:[EMAIL PROTECTED] title:Chief Executive tel;cell:0422751118 x-mozilla-html:FALSE url:http://davidvennik.blogspot.com/ version:2.1 end:vcard
[no subject]
I want to be honest : i hate privoxy and his content filtering. i have commented user.action file and default-action but navigation stops anyway very often .I'm an adult person so babes or porno are allright for me . I don't need content filtering but fast browsing instead.I never understood why squid never gets on playing unless in congiunction with privoxy.Squid is the father of anonymous proxism.it makes top http header cleaning , powerfull caching and this is what makes browsing fast,also in a way it makes content/website cleaning too but around i have not found one guide saying how i can make tor , squid parent.Well i know tor is not a http proxy and here it is my question: How can i configure squid to work with tor without privoxy Do i need socat? How does socat work in this scenario ??? Thanks !
[no subject]
How cai i limit bandwith to tor network ??? I'm sorry but sometimes gateway eth0 get exausted so many extablished connections ... > [EMAIL PROTECTED]:~# netstat -anplt | grep tor > tcp0 0 0.0.0.0:90900.0.0.0:* > LISTEN 25047/tor > tcp0 0 0.0.0.0:90910.0.0.0:* > LISTEN 25047/tor > tcp0 0 192.168.0.2:40217 66.199.184.254:9001 > ESTABLISHED25047/tor > tcp0 44760 192.168.0.2:909184.92.117.142:4113 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40157 82.103.132.227:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40171 88.191.12.12:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40187 80.237.206.93:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909072.21.33.202:41449 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40169 213.222.11.43:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40239 88.191.12.200:39090 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909070.176.89.55:16437 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:9090201.57.114.2:2850 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39873 207.44.180.3:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40061 217.160.167.28:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:9090217.88.151.241:2765 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909085.25.141.60:37767 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40083 140.247.60.64:443 > ESTABLISHED25047/tor > tcp0 48996 192.168.0.2:9090138.202.192.210:35369 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909082.241.116.14:3141 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39958 202.180.82.161:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39881 85.214.26.97:443 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:9090217.164.210.221:1557 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39875 85.214.60.196:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:9090192.42.113.248:59164 > ESTABLISHED25047/tor > tcp0 48468 192.168.0.2:909165.27.75.69:61397 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909018.187.1.68:50171 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40119 18.78.1.92:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909064.142.71.221:18831 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909082.128.211.13:56250 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909065.116.56.251:2700 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39871 64.34.180.99:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909081.169.158.102:54134 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40085 166.111.249.39:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39894 85.214.49.175:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:9090209.66.200.6:47690 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40168 212.112.175.240:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909070.179.119.185:60283 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909062.75.129.201:33509 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909062.75.171.154:48028 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39858 194.109.206.212:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40008 62.48.34.110:443 > ESTABLISHED25047/tor > tcp0586 192.168.0.2:909085.195.11.15:60479 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39869 130.64.158.200:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40176 72.60.167.161:9090 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909066.226.101.247:3828 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39938 193.219.28.245:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39872 84.19.177.90:443 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:40048 85.10.240.250:443 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39911 213.200.97.98:9001 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:909018.244.0.188:51789 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:39863 71.133.227.217:9090 > ESTABLISHED25047/tor > tcp0 0 192.168.0.2:9090217.160.169.57:40170 >
[no subject]
I'm not sure what you mean. Do you mean if they use the page to generate a script and then later use Vidalia to re-configure it at a later date? tor_user On Tue, 11 Jul 2006 17:30:17 -0400, "y0himba" <[EMAIL PROTECTED]> said: > How is this going to effect the Tor/Vidalia/Privoxy setup in Windows? You > may want to put a little blurb there about the preconfigured bundle or > the > Vidalia generated conf... -- tor_user [EMAIL PROTECTED] -- http://www.fastmail.fm - Access your email from home and the web
[no subject]
Subject: TOR ExcludeNodes Hi everybody, This is my first message to or-talk so I hope I did it all right... and to my question: I added the ExcludeNodes rule to the torrc file with some nodes I don't want TOR to build a circuit with. After adding this rule I connected to the control port and by using the "GETINFO circuit-status" command I noticed TOR built circuits using routers I didn't want it to use... what did I do wrong? Do you Yahoo!? Next-gen email? Have it all with the all-new Yahoo! Mail Beta.
[no subject]
Hello. I've created a (hopefully) simple to use torrc generator using PHP. The link is here: http://rootatlocalhost.bouldernet.org/tor_configurator.html It is still very much in alpha; I would very much appreciate feedback on UI, logical correctness, and any other problems or issues which you think could be improved. Thanks! -- tor_user [EMAIL PROTECTED] -- http://www.fastmail.fm - Access your email from home and the web
[no subject]
Hi Folks! I just set up my system (because my harddisk crashed), and after reinstalling tor I replayed my backuped signatures, keys and configfiles (yee, i really backuped it!) But tor prints the message: "Mar 21 18:14:45.280 [warn] connection_dir_client_reached_eof(): http status 400 ("Rejected: There is already a named server with this nickname and a different fingerprint.") response from dirserver '86.59.5.130:80'. Please correct." Can you tell me how to solve this? greetings! Ricky -- Ich bin Jack's vergeudetes Leben. -Fight Club- PGP-Fingerprint: 475A 89EC 8E4D AD64 FCCE BEB7 A699 13D9 84A8 A349 Jabber-ID: [EMAIL PROTECTED] signature.asc Description: Dies ist ein digital signierter Nachrichtenteil