On Thu, Jun 14, 2007 at 04:00:46PM +0200, [EMAIL PROTECTED] wrote 0.4K bytes in
15 lines about:
: I am testing the options RelayBandwidthRate and RelayBandwidthBurst. I
: note, using the utility iftop that the band-width consumed by Tor (in
: the absence of any client connection) largely exceeds t
On Thu, Jun 14, 2007 at 05:18:20PM -0700, Mr. Blue wrote:
> Can someone tell me what this data represents?
If you want to know what the control port interface does, the best
place to look is in the documentation at:
http://tor.eff.org/svn/trunk/doc/spec/control-spec.txt
The ns/* stuff is in
You also might have some luck routing tor through an external SOCKS
server that listens on port 80/443.
Comrade Ringo Kamens
On 6/14/07, Mike Perry <[EMAIL PROTECTED]> wrote:
Hey Jay!
Thus spake Jay Goodman Tamboli ([EMAIL PROTECTED]):
> I'm stuck behind a FascistFirewall part of the day, and
Hey Jay!
Thus spake Jay Goodman Tamboli ([EMAIL PROTECTED]):
> I'm stuck behind a FascistFirewall part of the day, and I've been
> trying to get Tor to work as a client. I've added a line to my torrc:
>
> ReachableAddresses *:443
>
> Oddly, I can see that Skype is using TCP connections on port
It's probably just blocking by IP address.
Comrade Ringo Kamens
On 6/14/07, Jay Goodman Tamboli <[EMAIL PROTECTED]> wrote:
I'm stuck behind a FascistFirewall part of the day, and I've been
trying to get Tor to work as a client. I've added a line to my torrc:
ReachableAddresses *:443
Oddly, I c
Can someone tell me what this data represents?
I get this from Tor control port:
Example:
r tornado324235 AQ7032pcDbAYFeXBX0OXd4iyttk XF86u6Z9ghMFa8Xw+62oQGBOlmI
2007-06-14 14:12:11 130.88.133.14 9001 9030
s Valid V2Dir
As I know for each node you get 2 lines.
First starting with r is:
r nicname
I'm stuck behind a FascistFirewall part of the day, and I've been
trying to get Tor to work as a client. I've added a line to my torrc:
ReachableAddresses *:443
Oddly, I can see that Skype is using TCP connections on port 443. I
can't tell if they're working, but Skype is keeping them up (and Sk
Thus spake Freemor ([EMAIL PROTECTED]):
>anyways just thoughts in the wind.. I'm sure the Tor Devs are
> probably gnashing teeth and pulling hair as a hundred reasons why it's a
> bad idea stream through their minds.
Code moves faster than law. No need to panic, or speculate on
technical solu
On Thu, Jun 14, 2007 at 06:46:00PM +0100, Smuggler wrote:
> Ringo Kamens wrote:
> > Just off the bat, who here (in
> > Germany) is up for street protests?
If you make it in Munich, I'll be there. Will take a day off
work for that.
> I think that Germans learned from the recent G8 mess that stre
Hi Everyone,
Just wanted to throw out some thoughts. Since, from what's been said
here, the draft is about keeping connection data and not content
wouldn't it be possible to make Tor nodes (servers and clients) make
trivial connections to other servers even just something like a
syn<->syn,ack<-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ringo Kamens wrote:
> Just off the bat, who here (in
> Germany) is up for street protests?
I think that Germans learned from the recent G8 mess that street
protests are very dangerous.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
i
I emailed them, hopefully somewhere there speaks English. I think we
have the data retention laws under control here, but I may eat my
words on that. Regardless, the situation in Germany is much more
urgent. I'll set up a mailing list for the campaign once we get off
the ground and we'll get a sit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ringo Kamens wrote:
> So are the people who vote on this elected representatives like we
> have in the US congress and senate or the UK house of commons?
Yes. More or less.
> The
> campaigns look interesting, but I can't read German. I can coordinat
So are the people who vote on this elected representatives like we
have in the US congress and senate or the UK house of commons? The
campaigns look interesting, but I can't read German. I can coordinate
an English campaign for the US/Intl though.
Comrade Ringo Kamens
On 6/14/07, Smuggler <[EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ringo Kamens wrote:
> Yeah, and they certainly should get involved with this, although I'm
> not sure how. This is a dark day for germany. I keep hearing the word
> draft being thrown around, so I'm guessing this isn't law yet.
Exactly, it is no law y
Yeah, and they certainly should get involved with this, although I'm
not sure how. This is a dark day for germany. I keep hearing the word
draft being thrown around, so I'm guessing this isn't law yet. Has the
time for public comment ended? Which german officials can/do stand in
the way of this be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Eugen Leitl wrote:
> Do you have a link to the draft? You don't mention private individuals,
> just organisations.
Draft and comments sent via private email.
Private individuals: It seems to me that private individuals fall under
the same rule when pr
On Thu, Jun 14, 2007 at 03:07:25PM +0100, Smuggler wrote:
> Actually it is a up to 500k EURO fine for the company/organisation and
> additionally up to 1 year in prison for the directors/managers of the
> company.
Do you have a link to the draft? You don't mention private individuals,
just organi
Ringo Kamens wrote:
> If it's a 500,000 OR Jail time, then we could organize a defense fund
On Thu, Jun 14, 2007 at 07:51:11AM -0500, Arrakis wrote:
> Expect crickets. The fines will be 500,000 Euro + 2 years prison for
Actually it is a up to 500k EURO fine for the company/organisation and
additi
Roger Dingledine wrote:
> These releases provide new features for people running Tor as both a
> client and a server (check out the new RelayBandwidth config options); let
>
Hello,
I am testing the options RelayBandwidthRate and RelayBandwidthBurst. I
note, using the utility iftop that the band
If it's a 500,000 OR Jail time, then we could organize a defense fund
to pay for violations as an act of civil disobedience. I'm willing to
chip in $20 and I think that we could get lots of backing on that.
Comrade Ringo Kamens
On 6/14/07, Eugen Leitl <[EMAIL PROTECTED]> wrote:
On Thu, Jun 14, 2
On Thu, Jun 14, 2007 at 07:51:11AM -0500, Arrakis wrote:
> Expect crickets. The fines will be 500,000 Euro + 2 years prison for
For providers failing to comply, I would think. Not for small-time
amateurs like us. But, I don't want to find this out the hard way,
in person.
> disobeying, I've hear
JT
Expect crickets. The fines will be 500,000 Euro + 2 years prison for
disobeying, I've heard. Pretty outrageous, considering Germany is such a
strong proponent for privacy.
XeroBank has a solution we are hoping we won't have to implement, but it
will allow Tor nodes to continue to operate in Ge
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I try to log as little as I can and use encrypted partition for logging.
Tor logs are also shredded on every stop / start.
M
Ringo Kamens wrote:
> Perhaps there should be some type of flag the logging server can set
> in their information so users
Perhaps there should be some type of flag the logging server can set
in their information so users can block them or tor can know to only
use one in each circuit.
Comrade Ringo Kamens
On 6/14/07, Eugen Leitl <[EMAIL PROTECTED]> wrote:
On Thu, Jun 14, 2007 at 01:23:30AM -0700, JT wrote:
> Under
On Thu, Jun 14, 2007 at 01:23:30AM -0700, JT wrote:
> Under the proposed new data retention law which will take effect 01/2008
> anonymizing services will be either banned or tor server operators will
> be required to log data which would render the tor software useless as
Just connection data, n
Under the proposed new data retention law which will take effect 01/2008
anonymizing services will be either banned or tor server operators will
be required to log data which would render the tor software useless as
an anonymizing tool.
Other European countries will surely follow once the law is i
27 matches
Mail list logo