Hi *coderman* :
> some kind of automated testing for rogue exits would be useful though.
May be but read this thread first to have a the complete story:
From: "Alexander W. Janssen"
Newsgroups: gmane.network.tor.user
Subject: Analyzing TOR-exitnodes for anomalies
Message-ID: <[EMAIL PROTECT
On 10/5/06, Alexander W. Janssen <[EMAIL PROTECTED]> wrote:
...
i checked 1161 nodes in total.
269 of them where responsive exit-nodes, all behaving correctly.
or just behaving when you were looking? ;)
9 exitnodes where responsive, but their had some proxy installed which didn't
behave qu
On Wed, 2006-10-04 at 11:38, Jim Spring wrote:
> I'm in the process of playing around with Tor (beyond just using it
> as a client -- using it as a client has been no problem). In so
> doing, I am attempting to first set up a "tor private network" on a
> system and see how things work when r
On Thu, 2006-10-05 at 02:07, jon smith wrote:
> I still don't get it. Tor is for anonymity. DNS leaks
> compromise anonymity (apparently anyone with 2 brain
> cells on nodding terms can figure out where you're
> going). The Tor documentation implies, however, the
> setting ftp to fail (port 8118) s
Hi all,
i checked 1161 nodes in total.
269 of them where responsive exit-nodes, all behaving correctly.
9 exitnodes where responsive, but their had some proxy installed which didn't
behave quite correct when you accessed a webpage with the notation
original.url.$nodename.exit; the error-messages
Hi Claude!
On Thu, Oct 05, 2006 at 11:29:22AM -0400, Claude LaFrenière wrote:
> Got it !
Aha? I'm still scanning with no result so far, although i found a couple of
exitnodes which have misconfigured local proxies...
[...snip...]
OK, well, i checked that whistlersmother as well and got this pic
Hi *Alexander W. Janssen* :
Got it !
I was going to this web site: http://www.iamaphex.net
(This is the web site for Torcap, a program to socksify application in Windows
O.S.)
with the exit node exit node: whistlermother
Info: http://node2.xenobite.eu/torstat.php
1195whistlersmother
Hi *David O Smith* :
> I've just started using Tor on my MacTel system, running OS 10.4.8
>
> I saw somewhere instructions for using Camino with Tor, but I can't find
> them now. Anyone help me?
Some hints here (founded with Google...):
http://info-ninja.net/blog/2006/05/05/using-tor-with-ca
On Oct 3, 2006, at 20:33:56, [EMAIL PROTECTED] wrote:
Are you on OSX x86 or PPC? The 0.1.1.24 packages for OSX are
fat binaries.
I apologize if I missed the message due to filtering on my end, but
was 0.1.1.24 ever announced? I see it's on the download page, and
there have
On Thu, Oct 05, 2006 at 09:31:47PM +0800, Deephay wrote:
> Also, the logo "linux-magazine.com what you need, when you
> need it" is a image or just text?
Exactly the same page is at http://www.wdr.tv/.
The content of that page is (gathered with tcpdump):
http://searchportal.information.com/?a_id
I've just started using Tor on my MacTel system, running OS 10.4.8
I saw somewhere instructions for using Camino with Tor, but I can't find
them now. Anyone help me?
Also does anyone know how to make the following work with Tor:
Mailsmith
iChat
Mt-Newswatcher
Mudwalker
TIA,
Dave
--
Dave Smith
On 10/5/06, Claude LaFrenière <[EMAIL PROTECTED]> wrote:
Hi *Alexander W. Janssen* :
> Hi all,
>
> considering that I heard from several people that they notice strange
> sideeffects since a couple of days - altered webpage, advertisement where no
> ads should be - I started a little investig
Hi *glymr* :
> I am not adding anything useful, but I wish to add my feeling about this
> situation that people are so rapidly responding to a threat so early.
>
> :) tor will never die if people like you all are on it. (which reminds
> me i've blathered about writing a dns proxy patch for to
Hi *Alexander W. Janssen* :
> On Wed, Oct 04, 2006 at 08:45:03PM -0400, Claude LaFrenière wrote:
>> Hmmm... Bogus exit nodes or bogus DNS servers ?
>
> One or the other way, brute forcing my way through all exit-nodes should
> reveil it. Hopefully...
This is a lot a job. May be a very long i
Currently i'm improving my torstat page to mark nodes with bad
http-behavior, using automatic http-throughput comparison of every
http-servicing exit-node against a reference exit-node.
Then it's up to the users to add a ExcludeNodes statement in
torrc using this information.
Greets
Alexand
On Wed, Oct 04, 2006 at 08:45:03PM -0400, Claude LaFrenière wrote:
> Hmmm... Bogus exit nodes or bogus DNS servers ?
One or the other way, brute forcing my way through all exit-nodes should
reveil it. Hopefully...
> Is it possible that the strange side effects comes, not from the exit nodes
> th
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
I am not adding anything useful, but I wish to add my feeling about this
situation that people are so rapidly responding to a threat so early.
:) tor will never die if people like you all are on it. (which reminds
me i've blathered about writing
17 matches
Mail list logo