[no subject]

2010-11-19 Thread Curt Shaffer
unsubscribe or-talk
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


[no subject]

2010-09-09 Thread skaoth skaoth
http://www.vmh1.xpharmx.com
  

[no subject]

2010-02-24 Thread Mike
hi, i' am a student of information science at University of Salerno, Italy.

As i'm writing about tor for an exam i have read tor's document design but,
i don't understand how tor network generates the key to cipher circuits, who
generates this keys (identity key, onion key public/private pair and link
key)

i'd like understand, step by step, negotiation of TLS link between OR/OR -
OR/OP and, after this, how tor generates public/private onion keys for each
relay.

Thanks very much for answers.

-- 
Michele Falso


[no subject]

2010-01-30 Thread Richard Johnson
If you have Vidalia.app containing tor 0.2.1.22, and you've also
installed Apple's "Mac OS X Security Update 2010-001", you'll have
noticed that Apple made some errors in their TLS renegotiation.

Apple removed TLS renegotiation even for apps that both need TLS
renegotiation and do it safely.  Apple did this in spite of the upstream
OpenSSL project having fixed the renegotiation vulnerability more
sanely.  Apple is apparently using a partial back-port of the fix.

To work around Apple's TLS renegotiation back-port, it's easiest and
safest (in terms of side effects) to switch for now to using the real
OpenSSL in your existing Vidalia.app.  Here's how.


1) Make sure you have the latest versions of the real libevent and
openssl installed.  At present this gets you "OpenSSL 0.9.8l 5 Nov 2009"
(If you don't have MacPorts already, go here:
http://www.macports.org/install.php )

---
sudo port install libevent openssl
---

2) Get and verify the signatures on the tor source.
(If you haven't gotten the signers' keys directly from them, and there's
no-one you trust who has signed them yet, you can at least hit the tor
download site and see that the source archives back through the years
are signed by the same keys.  If you don't have wget and gpg, fix that
with 'sudo port install wget gnupg')

---
cd ~/src/
wget "http://www.torproject.org/dist/tor-0.2.1.22.tar.gz.asc";
wget "http://www.torproject.org/dist/tor-0.2.1.22.tar.gz";
gpg tor-0.2.1.22.tar.gz.asc
---

3) Extract and build tor.

---
tar xzvf tor-0.2.1.22.tar.gz && cd tor-0.2.1.22/
env CPPFLAGS="-I/opt/local/include" LDFLAGS="-L/opt/local/lib" ./configure
make all
---

4) Put your new tor executable into your existing Vidalia.app.

---
cp -p ~/Applications/Vidalia.app/Contents/MacOS/tor
~/Applications/Vidalia.app/Contents/MacOS/tor.old
cp src/or/tor ~/Applications/Vidalia.app/Contents/MacOS/tor
---

5) Run Vidalia.

---
open ~/Applications/Vidalia.app
---

You've just built and installed a tor executable that uses the real
OpenSSL, and is thus not afflicted with Apple's egregious kill of all
TLS renegotiation in the Mac OS X bundled OpenSSL.  You should now be
able to connect to other nodes when you launch tor.

Moving on, you'll be left with no tor side effects when you replace
Vidalia.app with a new version containing official fixes.  If you don't
keep macports around for other purposes, you can remove macports then.

Good luck!
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


[no subject]

2010-01-06 Thread Roberto Meza

Hello:
 
I just managed to make pandora work on my browser as I don't live in USA.
 
Is there any way to configure Tor to make the Pandora app work on the ipod 
touch?
 
Thanks,
Roberto
  

[no subject]

2009-11-27 Thread moris blues

hi,

i dindnt understand the "leaky pipe" Topology. How is it realized, is there 
some dummy traffic involved?

thanks



 
versendet mit www.oleco.de Mail - Anmeldung und Nutzung kostenlos!
Oleco www.netlcr.org - jetzt auch mit Spamschutz.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


[no subject]

2009-09-17 Thread hrg...@gmail.com
auth 809bb944ff73e094 subscribe or-talk hrg...@gmail.com


[no subject]

2009-07-29 Thread Bernd Schmelter
auth 16480d7e3f50890e subscribe or-talk b...@chefe.dyndns.org



[no subject]

2009-05-26 Thread Steffan Wood

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

What is the command to send to this message list to be removed from it?
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (Darwin)

iEYEARECAAYFAkocGZwACgkQCbAiBM3P46LvuwCbB2ftEBKTth+8gEZxGXUzUG5H
czwAoIHyVGq4jqp/++LHgABP8/cNk1QC
=c1Iv
-END PGP SIGNATURE-


[no subject]

2008-11-02 Thread Erilenz
If you run as an exit node, it's my understanding that you also act as a
middleman node. Would it be possible, and would it be a good idea, to
add an option such that you only act as an exit node?

It seems a bit of a waste to use potential exit bandwidth as middleman
relaying bandwidth when exit bandwdith is more scarce.

-- 
Erilenz


[no subject]

2008-08-30 Thread Khaled Moussa

unsubscribe or-talk


[no subject]

2008-08-30 Thread Bjarte Lund
unsubscribe or-talk


[no subject]

2008-04-28 Thread [EMAIL PROTECTED]
auth 6bc7bd279542202 subscribe or-talk \
[EMAIL PROTECTED]


Re: (no subject)

2008-01-26 Thread Kraktus
I think you need to e-mail [EMAIL PROTECTED]


On 26/01/2008, Paul Henning <[EMAIL PROTECTED]> wrote:
> unsubscribe or-talk
>


(no subject)

2008-01-26 Thread Paul Henning
unsubscribe or-talk


[no subject]

2007-08-04 Thread gypsy
unsubscribe


[no subject]

2007-08-03 Thread Xenos Alien
help
   
-
Shape Yahoo! in your own image.  Join our Network Research Panel today!

Re: (no subject)

2007-06-24 Thread KT

email [EMAIL PROTECTED] , with the line "unsubscribe or-talk" in the body.

On 6/24/07, Anas Matar <[EMAIL PROTECTED]> wrote:

unsubscribe


RE: (no subject)

2007-06-23 Thread Anas Matar
unsubscribe


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of KT
Sent: Saturday, June 23, 2007 7:51 PM
To: or-talk@freehaven.net
Subject: Re: (no subject)

email [EMAIL PROTECTED] , with the line "unsubscribe or-talk" in the mail
body.

On 6/23/07, Marcus Streips <[EMAIL PROTECTED]> wrote:
> unsubscribe
>
>


Disclaimer: This E-mail and any attachments hereto are intended solely for the 
addressee and it may contain confidential material.  If you are
not the intended addressee or receive this in error, please delete the message 
and notify the sender. You must not disclose, forward or copy
this E-mail or attachments to any third party. Statements, opinions or comments 
expressed in this E-mail are those of the sender and do not
necessarily represent those of Arabian Advanced Systems "AAS". AAS accepts no 
liability for any damage caused by this E-mail or its attachments




Re: (no subject)

2007-06-23 Thread KT

email [EMAIL PROTECTED] , with the line "unsubscribe or-talk" in the mail body.

On 6/23/07, Marcus Streips <[EMAIL PROTECTED]> wrote:

unsubscribe




(no subject)

2007-06-23 Thread Marcus Streips

unsubscribe



[no subject]

2007-06-17 Thread James Edwards

Unsuscribe

_
Get a preview of Live Earth, the hottest event this summer - only on MSN 
http://liveearth.msn.com?source=msntaglineliveearthhm




[no subject]

2007-06-17 Thread James Edwards

unsiscribe

_
Need a break? Find your escape route with Live Search Maps. 
http://maps.live.com/default.aspx?ss=Restaurants~Hotels~Amusement%20Park&cp=33.832922~-117.915659&style=r&lvl=13&tilt=-90&dir=0&alt=-1000&scene=1118863&encType=1&FORM=MGAC01




(no subject)

2007-03-06 Thread Jason Edwards

I am new to Tor so please forgive my ignorance...

When I use Vidalia to start and then stop Tor I get the following 
messages in my Log.


Mar 05 15:13:24:072 [Notice] Tor v0.1.2.9-rc. This is experimental 
software. Do not rely on it for strong anonymity.
Mar 05 15:13:24:078 [Notice] Enabling experimental OS X kqueue support 
with libevent 1.3a.  If this turns out to not work, set the environment 
variable EVENT_NOKQUEUE, and tell the Tor developers.
Mar 05 15:13:24:083 [Notice] Initialized libevent version 1.3a using 
method kqueue. Good.

Mar 05 15:13:24:088 [Notice] Opening Socks listener on 127.0.0.1:9050
Mar 05 15:13:24:091 [Notice] Opening Control listener on 127.0.0.1:9051
Mar 05 15:13:25:787 [Notice] We now have enough directory information to 
build circuits.
Mar 05 15:13:28:491 [Notice] Tor has successfully opened a circuit. 
Looks like client functionality is working.

Mar 05 15:16:43:073 [Error] Catching signal TERM, exiting cleanly.

Is everything working correctly?

Why do I get an error message when I stop Tor?

Thanks for the time...

Jay


[no subject]

2007-03-03 Thread Wolfgang Ihloff

unsubscribe or-talk


[no subject]

2007-02-11 Thread Rob
unsubscribe


[no subject]

2007-02-07 Thread Hardev Sian
unsubscribe



[no subject]

2007-02-06 Thread Emmanuel Borgetto

unsubscribe



[no subject]

2006-11-28 Thread gabrix

I wanted to announce an hidden ssh service on port 666 being at this onion


kfb3binbmka5d4st.onion   argo.gabrix.ath.cx


it is protected by password at the moment ,it's my lan's frontdoor , how 
should i make it pubblic ... any advice ?


gab


[no subject]

2006-10-21 Thread David Vennik
i apologise if i've posted this already

I use tor most often for irc, although I have recently shifted my
customary irc hangout to the ORC away from a little one i used to hang
out at, and on ORC tor proxying is a prerequesite.

As a user of tor with irc, it has become the most common bitch of anyone
i've talked to about the endless process of dying circuits, and while
thinking about it recently i realised there was one thing that could be
built into tor that would reduce the number of mis-guesses of long-lived
tor nodes: accounting!

If a node has bandwidth accounting, it should not be listed as long
lived, because obviously it is likely to go down at any moment. I don't
know if it will make that much difference to persistent session use on
tor or not, but I think that it is only logical that bandwidth
accounting should flag a 'not long lived' flag on the server information
so that circuits to irc and ssh and other long lived connections don't
use it. i know this might 'reduce anonymity' through the weakening of
defenses against traffic analysis, but endless reconnections to irc
servers, in my experience, is annoying both to myself and to the endless
timeouts in the ORC which is exclusively tor-accessible.

Regards,

David Vennik
-- 
http://davidvennik.blogspot.com/
begin:vcard
fn:David Vennik
n:Vennik;David
org:The Monastic Order of Chaos;Administration
adr:;;2/37 Dibar Street;Wynnum;QLD;4178;Australia
email;internet:[EMAIL PROTECTED]
title:Chief Executive
tel;cell:0422751118
x-mozilla-html:FALSE
url:http://davidvennik.blogspot.com/
version:2.1
end:vcard



[no subject]

2006-09-16 Thread gabrix
I want to be honest : i hate privoxy and his content filtering. i have
commented user.action file and default-action but navigation stops
anyway very often .I'm an adult person so babes or porno are allright
for me  . I don't need content filtering but fast browsing instead.I
never understood why squid never gets  on playing  unless in
congiunction with privoxy.Squid is the  father of anonymous proxism.it
makes top http header cleaning , powerfull caching and this is what
makes browsing fast,also in a way it makes content/website cleaning too
but around i have not found one guide saying how i can make tor , squid
parent.Well i know tor is not a http proxy and here it is my question:
How can i configure squid to work with tor without privoxy 
Do i need socat?
How does socat work in this scenario ???
Thanks !


[no subject]

2006-09-15 Thread gabrix
How cai i limit bandwith to tor network  ??? I'm sorry but sometimes
gateway eth0 get exausted so many extablished connections ...
> [EMAIL PROTECTED]:~# netstat -anplt | grep tor
> tcp0  0 0.0.0.0:90900.0.0.0:*  
> LISTEN 25047/tor
> tcp0  0 0.0.0.0:90910.0.0.0:*  
> LISTEN 25047/tor
> tcp0  0 192.168.0.2:40217   66.199.184.254:9001
> ESTABLISHED25047/tor
> tcp0  44760 192.168.0.2:909184.92.117.142:4113 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40157   82.103.132.227:9001
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40171   88.191.12.12:9001  
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40187   80.237.206.93:9001 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909072.21.33.202:41449 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40169   213.222.11.43:9001 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40239   88.191.12.200:39090
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909070.176.89.55:16437 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:9090201.57.114.2:2850  
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39873   207.44.180.3:9001  
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40061   217.160.167.28:9001
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:9090217.88.151.241:2765
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909085.25.141.60:37767 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40083   140.247.60.64:443  
> ESTABLISHED25047/tor
> tcp0  48996 192.168.0.2:9090138.202.192.210:35369  
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909082.241.116.14:3141 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39958   202.180.82.161:9001
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39881   85.214.26.97:443   
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:9090217.164.210.221:1557   
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39875   85.214.60.196:9001 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:9090192.42.113.248:59164   
> ESTABLISHED25047/tor
> tcp0  48468 192.168.0.2:909165.27.75.69:61397  
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909018.187.1.68:50171  
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40119   18.78.1.92:9001
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909064.142.71.221:18831
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909082.128.211.13:56250
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909065.116.56.251:2700 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39871   64.34.180.99:9001  
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909081.169.158.102:54134   
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40085   166.111.249.39:9001
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39894   85.214.49.175:9001 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:9090209.66.200.6:47690 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40168   212.112.175.240:9001   
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909070.179.119.185:60283   
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909062.75.129.201:33509
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909062.75.171.154:48028
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39858   194.109.206.212:9001   
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40008   62.48.34.110:443   
> ESTABLISHED25047/tor
> tcp0586 192.168.0.2:909085.195.11.15:60479 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39869   130.64.158.200:9001
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40176   72.60.167.161:9090 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909066.226.101.247:3828
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39938   193.219.28.245:9001
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39872   84.19.177.90:443   
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:40048   85.10.240.250:443  
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39911   213.200.97.98:9001 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:909018.244.0.188:51789 
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:39863   71.133.227.217:9090
> ESTABLISHED25047/tor
> tcp0  0 192.168.0.2:9090217.160.169.57:40170   
> 

[no subject]

2006-07-12 Thread tor_user
I'm not sure what you mean.   Do you mean if they use the page to
generate
a script and then later use Vidalia to re-configure it at a later date?

tor_user

On Tue, 11 Jul 2006 17:30:17 -0400, "y0himba" <[EMAIL PROTECTED]>
said:
> How is this going to effect the Tor/Vidalia/Privoxy setup in Windows? You
> may want to put a little blurb there about the preconfigured bundle or
> the
> Vidalia generated conf...
-- 
  tor_user
  [EMAIL PROTECTED]

-- 
http://www.fastmail.fm - Access your email from home and the web



[no subject]

2006-07-03 Thread Joe Clark
Subject: TOR ExcludeNodes     Hi everybody,     This is my first message to or-talk so I hope I did it all right...  and to my question:     I added the ExcludeNodes rule to the torrc file with some nodes I don't want TOR to build a circuit with.  After adding this rule I connected to the control port and by using the "GETINFO circuit-status" command I noticed TOR built circuits using routers I didn't want it to use...     what did I do wrong? 
		Do you Yahoo!? Next-gen email? Have it all with the  all-new Yahoo! Mail Beta.

[no subject]

2006-06-15 Thread tor_user
Hello.  I've created a (hopefully) simple to use torrc generator
using PHP.  The link is here:

http://rootatlocalhost.bouldernet.org/tor_configurator.html

It is still very much in alpha; I would very much appreciate feedback
on UI, logical correctness, and any other problems or issues which
you think could be improved.

Thanks!
-- 
  tor_user
  [EMAIL PROTECTED]

-- 
http://www.fastmail.fm - Access your email from home and the web



[no subject]

2006-03-21 Thread Ricky Fitz
Hi Folks!

I just set up my system (because my harddisk crashed), and after
reinstalling tor I replayed my backuped signatures, keys and configfiles
(yee, i really backuped it!)

But tor prints the message:


"Mar 21 18:14:45.280 [warn] connection_dir_client_reached_eof(): http
status 400 ("Rejected: There is already a named server with this
nickname and a different fingerprint.") response from dirserver
'86.59.5.130:80'. Please correct."

Can you tell me how to solve this?

greetings!
Ricky

-- 
Ich bin Jack's vergeudetes Leben.
-Fight Club-

PGP-Fingerprint: 475A 89EC 8E4D AD64 FCCE BEB7 A699 13D9 84A8 A349
Jabber-ID: [EMAIL PROTECTED]


signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil