http://metrics.torproject.org/bridge-users-graphs.html#china
The figure almost doubles in the whole December. These extra usages
disappears after that. Does anyone know what happens?
On Thu, 11 Feb 2010 21:11:16 +0800 Runa Sandvik
wrote:
>On Thu, Feb 11, 2010 at 2:08 PM, Curious Kid
> wrote:
>
>
> > Why couldn't your exit policy just block the IPs of the journal sites?
>
> Because there's > 1000 of them (and each would be a /32). It was
> discussed in another thread at the time, and the developers led me to
> the conclusion that such hugely long exit policies were a bad idea.
Could you
On Thu, Feb 11, 2010 at 04:20:49PM -0500, Flamsmark wrote:
> On 11 February 2010 16:17, Michael Holstein
> wrote:
> > Let's not debate the stupidity of authenticating a network by IP address
> > .. but the above problem is ultimately what forced us to do the same
> > thing (although we just prohib
I meant clients for TOR were blocked. Yes, for all students and faculty. I
believe the attacks were from the TOR exit nodes, but I will try to get more
information from network administrators. I have not tried bridges yet, but
maybe I will obtain a bridge to connect to test in the future.
>>
> Why couldn't your exit policy just block the IPs of the journal sites?
Because there's > 1000 of them (and each would be a /32). It was
discussed in another thread at the time, and the developers led me to
the conclusion that such hugely long exit policies were a bad idea.
Cheers,
Michael Hol
On Thu, Feb 11, 2010 at 10:17 PM, Charles Eubanks
wrote:
> I just installed TOR on OSX and I am trying to connect. My ISP is AT&T Uverse.
> I never get past 10% "Establishing encrypted directory connection"
> I do not have outbound ports blocked for 80 or 443
> I have tried with and without setti
On 11 February 2010 16:17, Michael Holstein wrote:
>
> Let's not debate the stupidity of authenticating a network by IP address
> .. but the above problem is ultimately what forced us to do the same
> thing (although we just prohibit the operation of an exit). I should
> note that the original effo
I just installed TOR on OSX and I am trying to connect. My ISP is AT&T Uverse.
I never get past 10% "Establishing encrypted directory connection"
I do not have outbound ports blocked for 80 or 443
I have tried with and without setting bridges. and also with and
without restricted ports.
Included
> TOR is now blocked campus-wide at Auburn University (for all 24,000 students)
> because of apparent attacks emanating from the TOR network.
If your problem is anything like the one we had, I'm guessing the
"attacks" have more to do with the fact that many journal subscriptions
authenticate by
http://downloads.sourceforge.net/project/retroshare/RetroShare/0.5.0%20alpha%201/RetroShare_0.5.0_alpha_1_2282_setup.exe?use_mirror=ovh
http://retroshare.sourceforge.net/downloads.html
http://downloads.sourceforge.net/project/retroshare/RetroShare/0.5.0%20alpha%201/RetroShare_0.5-alpha1.2282_ubun
Hi Peter,
When you say blocked are you saying that faculty, staff, and students
are not allowed to run exit nodes in the TOR network? Or rather that the
above are not allowed to use TOR clients to connect into the TOR
network?
Cheers,
Harry
On Thu, 2010-02-11 at 13:15 -0600, Peter Farver wrote:
On Thu, Feb 11, 2010 at 11:15 AM, Peter Farver wrote:
> TOR is now blocked campus-wide at Auburn University (for all 24,000 students)
> because of apparent attacks emanating from the TOR network.
can you elaborate on that?
are these apparent attacks coming _from_ the Tor exits or are Tor
clients
TOR is now blocked campus-wide at Auburn University (for all 24,000 students)
because of apparent attacks emanating from the TOR network. Whenever trying to
run TOR, TOR cannot get past the 10% mark. Would it have been wiser for Auburn
University to block incoming connections from TOR nodes, b
On Thu, Feb 11, 2010 at 2:08 PM, Curious Kid
wrote:
>> From: Jon
>
>> To: or-talk@freehaven.net
>> Sent: Wed, February 10, 2010 2:10:16 AM
>> Subject: Re: Tor in China
>>
>> Am not sure if they are still blocking, but I presume there are some
>> blocks still on, as the bridge usage is very high f
> From: Jon
> To: or-talk@freehaven.net
> Sent: Wed, February 10, 2010 2:10:16 AM
> Subject: Re: Tor in China
>
> Am not sure if they are still blocking, but I presume there are some
> blocks still on, as the bridge usage is very high for users from
> there.
Are you talking about who uses a bri
thus Hannah Schroeter spake:
> Hi!
Hi,
> Just checked a bit.
> On Wed, Feb 10, 2010 at 11:13:05AM +0100, intrigeri wrote:
>> Hannah Schroeter wrote (09 Feb 2010 21:26:07 GMT) :
>>> 404 Not found for both the RSS and the Atom.
>
>> oops, sorry, the correct links are:
>
>> - RSS: https://amnesia.
Hi,
I'm using Tor 0.2.1.22 on Debian Lenny. I played a little bit with
Tor (so there are 10 instances of tor client running simultaneous). I
can see very often the following in log:
We tried for 15 seconds to connect to '111.222.333.444' using exit
'SoDesuKa'. Retrying on a new circuit.
This ve
17 matches
Mail list logo