e handshake? I assume
there's something wrong with the firewall rule or the natd cmd line.
Any ideas?
--
Christopher Davis
Mangrin Remailer Admin
PGP: 0x0F8DA163
On Fri, May 15, 2009 at 02:00:23AM +0200, Josua Schmid wrote:
> Hi folks!
>
> I tried to set up a tor connection from within the "bundesagentur für
> arbeit" network, but something seems to block the tor network access.
>
> I introduced bridges in the torrc config file but it didn't change
>
t an hour
> without it crashing.
> . . . . .
> Wesley
>
I should be able to take a look at this if there's time.
--
Christopher Davis
Mangrin Remailer Admin
PGP: 0x0F8DA163
run-time.
There are some smaller bits I'd like to tackle, as well, including
adding a Windows installer and autotools support for automatically
finding dependencies.
I'm looking forward to the summer.
Thanks,
--
Christopher Davis
Mangrin Remailer Admin
PGP: 0x0F8DA163
On Sun, Mar 22, 2009 at 02:21:49PM -0400, Roger Dingledine wrote:
> On Thu, Mar 19, 2009 at 01:00:38AM +0000, Christopher Davis wrote:
> > I'm thinking of sending in a GSoC proposal for consideration by Tor/EFF
> > this year.
>
> Welcome!
>
> > I see in item #4
w a few nodes to achieve better cover.
>
If bridges could produce an Apache "It works!" page along with a
self-signed cert, it'd look like someone testing their web server.
One challenge would be making that cert look like something
generated from the OpenSSL command line tools.
--
Christopher Davis
Mangrin Remailer Admin
PGP: 0x0F8DA163
m us, then they
would send it when they connect to the bridge. The web application to
advertise bridges would need to be updated.
Are there any other things to think about?
Thanks,
--
Christopher Davis
Mangrin Remailer Admin
PGP: 0x0F8DA163
ddress),conn->port);
+
conn->state = EXIT_CONN_STATE_OPEN;
connection_watch_events(conn, EV_READ); /* stop writing, continue reading */
--
Christopher Davis
On Tue, Jan 13, 2009 at 05:16:06PM -0500, Roger Dingledine wrote:
> On Tue, Jan 13, 2009 at 12:26:15PM -0800, Christopher Davis wrote:
> > I'm working on a patch to enable SOCKS 4 and 5 support for
> > Tor's OR and directory connections. I got SOCKS working for OR
>
. Would that be acceptable?
--
Christopher Davis
es
automatically in response to (perceived) abuse. Auotmated tools
may be risky if the administrator doesn't have direct access to the
console, etc.
--
Christopher Davis
nonymity)? Because otherwise it could be used for dictionary attacks
> against SSH hosts.
>
>
> Mitar
How practical is SSH password cracking over Tor? Wouldn't the latency
deter attackers?
--
Christopher Davis
ning. The idea is
interesting, though. It would be prudent to enable spam filtering
and/or hashcash for a service like this, of course.
Alternatively, it should be possible to use google's relay after
creating an account anonymously.
--
Christopher Davis
; Kind regards,
>
> Hannah.
On FreeBSD, you can also put Tor in a jail with a high securelevel
to disable operations on /dev/pf that would alter the rules, while
permitting read operations, like DIOCNATLOOK. FreeBSD does allow
per-jail securelevel settings, independent of the host's level.
--
Christopher Davis
edge.c for details.
--
Christopher Davis
On Sun, Aug 10, 2008 at 12:28:05PM -0600, macintoshzoom wrote:
> Hi Christopher Davis,
>
> What it is exactly "trunk" vs "0.2.0.30"?
> I'm a bit confused about all this jargon and cvs repositories.
>
trunk is where the current Tor development goes in th
pray/index.php?do=details&id=782
>
> But as per [or-cvs] r16450 mail list it seems that it's to be resolved
> in latest tor ??:
> <<<
> Patch from Christopher Davis: open /dev/pf before dropping privileges.
> Fixes bug 782. Backport candidate.
> <<<
&g
> > Firefox browser, is that traffic not protected by the anonymized
> > circuit or otherwise less secure than a connection to a port 80 web
> > site?
> >
> > Thanks -nD
> >
I'd also suggest seeing if your browser has an option to disable
sending of the
den services.
--
Christopher Davis
19 matches
Mail list logo