Re: Setting up a Tor private network

2006-10-06 Thread bagelcat
Am 06.10.2006 um 02:33 schrieb George Shaffer: Once I had Tor and Privoxy working as a simple client on the computer I intended to be the Tor server, I only had to change one line in the Privoxy config. All I did was change listen-address from 127.0.0.1 to the real IP address of the computer

Re: Setting up a Tor private network - recall

2006-10-06 Thread bagelcat
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ups - sorry. i was wrong wrong wrong. have missunderstood it. to early. where is my coffee. *pain* feel like my sign is true bernd Am 06.10.2006 um 02:33 schrieb George Shaffer: Of course to get the local client application to work, I had to

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Stephen
Greetings! Been experiencing this particular issue since Sunday following the topic here. From 05-Oct: exiting from hotmail account redirected link:

Re: EXPERIMENTAL Windows binary for 0.1.1.24; please let us know if it works.

2006-10-06 Thread Claude LaFrenière
Hi *Nick Mathewson and other Tor users* :) Please let us know whether it works for you. Especially, please let us know if 0.1.1.23 works for you, but this 0.1.1.24 package fails. Please *don't* spam the list with it worked/it didn't work mails, or people will think you didn't read these

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Claude LaFrenière
Hi *Stephen* : Greetings! Been experiencing this particular issue since Sunday following the topic here. From 05-Oct: exiting from hotmail account redirected link:

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Robert Hogan
Hmmm... I had this problem with Whistlemother exit node and this site: http://www.iamaphex.net with the same frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com blah blah blah filter ... =SUSPECTED+UNDESIRABLE+BOT i have the same experience using whistlersmother for the same site. --

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Robert Hogan
On Friday 06 October 2006 19:21, Robert Hogan wrote: Hmmm... I had this problem with Whistlemother exit node and this site: http://www.iamaphex.net with the same frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com blah blah blah filter ... =SUSPECTED+UNDESIRABLE+BOT i have the same

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Claude LaFrenière
Hi *Robert Hogan* : On Friday 06 October 2006 19:21, Robert Hogan wrote: Hmmm... I had this problem with Whistlemother exit node and this site: http://www.iamaphex.net with the same frame.aspx?u=http%3a%2f%2flanding.domainsponsor.com blah blah blah filter ... =SUSPECTED+UNDESIRABLE+BOT

Warning in in tor log

2006-10-06 Thread Kees de Koster
Hello, I have some warnings in my tor log like below: Oct 06 19:56:01.279 [notice] Tor 0.1.1.23 opening log file. Oct 06 19:56:01.610 [notice] Your Tor server's identity key fingerprint is 'minidragon 8A48 10D4 E942 9447 0224 2231 D594 6FB1 8058 36E8' Oct 06 19:56:10.213 [notice] We now have

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Claude LaFrenière
Hi *M* : How can I see which exit node is using? Check this with Vidalia ... http://www.debian-administration.org/ was mutilated by exit node into something similar that you are reporting. Quite alarming trend. Please let us remain calm like Norwegian sailors in the storm. I

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread bagelcat
ok i have played now for more than an half hour with nonsense domainnames. every time the connection goes through an exit node located in texas, one time in the state new york and one time in denver i have got the advertising page. maybe it will be a nice test, that someone unsing the same

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread missi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Maybe a problem with a DNS- Server? Greetz Missi Eben(am 6. 10. 2006 um 22:26 Uhr)hast du eingetippt: ok i have played now for more than an half hour with nonsense domainnames. every time the connection goes through an exit node located in texas,

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread M
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 How can I see which exit node is using? Check this with Vidalia ... Thanks for the info. I think that badly behaving exit nodes should be excluded automagically. How, I dont know =). For the moment nothings prove that any exit nodes are

Re: Analyzing TOR-exitnodes for anomalies

2006-10-06 Thread Tim McCormack
bagelcat wrote: ok i have played now for more than an half hour with nonsense domainnames. every time the connection goes through an exit node located in texas, one time in the state new york and one time in denver i have got the advertising page. I remember something about a major DNS server

Determining currentexit node w/o vidalia

2006-10-06 Thread Tim McCormack
How do I determine what the exit node is in my Tor client's current selection without using Vidalia? (I haven't gotten around to compiling it.) - Tim McCormack

Re: Determining currentexit node w/o vidalia

2006-10-06 Thread Geoffrey Goodell via Treo 650
First of all, at any given time, Tor maintains several circuits, with several exit nodes. You can use a tool like Blossom to browse your current list of open circuits. http://afs.eecs.harvard.edu/~goodell/blossom/ - Sent with ChatterEmail True push email for the Treo

Re: Determining currentexit node w/o vidalia

2006-10-06 Thread phobos
On Fri, Oct 06, 2006 at 06:50:05PM -0400, [EMAIL PROTECTED] wrote 0.2K bytes in 4 lines about: : How do I determine what the exit node is in my Tor client's current : selection without using Vidalia? (I haven't gotten around to compiling it.) You could use the contol interface to list

Re: 0.1.1.24 release announcement?

2006-10-06 Thread phobos
On Thu, Oct 05, 2006 at 11:03:07AM -0400, [EMAIL PROTECTED] wrote 0.6K bytes in 17 lines about: : I apologize if I missed the message due to filtering on my end, but : was 0.1.1.24 ever announced? I see it's on the download page, and There has not been an official announcement about