Kyle Williams wrote:
I've been working on a 400MHz StrongARM XScale PXA255 CPU, 16MB of
Flash storage, and 64MB of RAM, and 2 x 100Mbps Ethernet ports.
That's a nice small platform, but you might also want to have a look at
systems based on VIA processors (C3, C7, or the new Nano), that have
blau wrote:
Mike . ha scritto:
In weeks 8 and 12 there appear to be roughly 50 new nodes added in the
space of roughly one day.
Any major press highlight, or word-of-mouth campaign, in any country?
Or something non-Tor that motivates people to work around blocks and
censorshi, for example,
Some more info about your link would help in the diagnosis.
If you are on ADSL, as I suppose you are, and available bandwidth is
quite asymmetric, you need most of your uplink BW to send the TCP
acknowledgements for the 4mbps downlink traffic. If your download also
needs data upload, e.g. for some
The italian description is a bit cryptic, but essentially it is about
faking IP address and changing routing accordingly near the user. This
can be done with many techiques, and an ISP is obviously capable to do
it without difficulty. It could be done in a man in the middle fashion
or by faking a
Scott Bennett wrote:
On Sat, 02 Feb 2008 18:08:26 -0800 F. Fox [EMAIL PROTECTED]
wrote:
Chad Z. Hower aka Kudzu wrote:
(snip)
Does TOR implement QOS or prioritization? That is only use bandwidth when
other traffic is not present?
This can be done further upstream of the
Hi,
I have a problem opening a TCP connection directly to a node which is
also a Tor exit node (using 0.1.2.19).
I have an experimental setup with 3 OR nodes, the middle one running
several Tor instances
OR1, OR2_a, OR2_b, OR2_c, OR3
and I have a constrained path setup:
EntryNodes OR1
private (local) networks, along with your
own public IP address, at the beginning of your exit policy. See above
entry on ExitPolicy. (Default: 1)
Csaba
Csaba Kiraly wrote:
Hi,
I have a problem opening a TCP connection directly to a node which is
also a Tor exit node (using
Hi,
As far as I can tell (I'm not a developer) the error message you see is
normal behavior, just logged in a way that scares people ;)
Of course it can also be something else, but you can find a possible
explanation in my previous mail in the no traffic? thread:
SPKills wrote:
Hi,
Well, i followed instruction to chroot TOR as explained at
http://wiki.noreply.org/noreply/TheOnionRouter/TorInChroot
No errors occur untill the test step where i got :
debian:/home/user/tor-0.1.2.18# chroot $TORCHROOT /tor/bin/tor
In this line you have a space, i.e.
Scott Bennett wrote:
On Mon, 5 Nov 2007 22:26:20 -0500 [EMAIL PROTECTED] wrote:
On Mon, Nov 05, 2007 at 05:52:52PM +0100, [EMAIL PROTECTED] wrote 0.6K bytes in
17 lines about:
: Nov 05 17:49:03.989 [debug] TLS error: unexpected close while reading
: Nov 05 17:49:03.989 [info]
: each VM logs into the hostlab directory as well.
These logs can be merged with the mergelogs.sh script.
I'm also planning to merge these high level logs with the packet logs
based on timestamps.
Csaba
Csaba Kiraly wrote:
Thanks for testing it!
Let me know if you have any problems or doubts
Hello FQ,
These below are NOT the SMTP hops your email followed. These are IP
hops, between your PC and the mail server of your friend in China. What
is sure is that this information was not retrieved from
the email you have sent directly, since no mail client or SMTP server
would put the
Thanks!
I hope you can check out the sources even now.
I try to see how to give privileges to browse through Trac as well, but
I'm not admin there... till then I remove that link.
Csaba
Marco Bonetti wrote:
nice work.
just one small issue: trac anonymous user needs BROWSER_VIEW privilege,
Dear all,
My virtual machine based Tor framework is available at
http://minerva.netgroup.uniroma2.it/discreet/wiki/TorLabProject
It provides an easy way to set up a whole private Tor network on one
Linux PC (it works only on Linux). I was calling it TorLab let me
know if this is in
Karsten Loesing wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Csaba,
I have seen similar error and warning messages to what you have
mentioned, both with 0.1.2.17 and with 0.2.0.8-alpha.
Quoting from your private mail (with your permission):
I've seen in your doc that
Thanks for testing it!
Let me know if you have any problems or doubts during install, so that I
can improve instructions!
Csaba
Ringo Kamens wrote:
Thanks, this seems like a cool tool. I'll try it out.
Comrade Ringo Kamens
On 10/29/07, Csaba Kiraly [EMAIL PROTECTED] wrote:
Dear all,
My
You might also try the following
- look at /etc/resolv.conf to see what are the nameservers listed there
- do some nslookup (e.g. nslookup www.google.com) and see what is the
server used to get the answer
- increase Tor log level to info and have a look at all the log
entries coming from
Robert Hogan wrote:
I was also setting up my own Tor network based on the instructions in
the FAQ, but I've been trying to reproduce it as a virtual network
running a number of User Mode Linux
based virtual machines on one PC. It is available as a Netkit
laboratory; I think it is quite easy to
Hi Shreyas,
Sorry for the late response, I've seen your mail on the list only now.
I was also setting up my own Tor network based on the instructions in
the FAQ, but I've been trying to reproduce it as a virtual network
running a number of User Mode Linux
based virtual machines on one PC. It
19 matches
Mail list logo