Jan Weiher wrote:
Hi,
no core files on my Ubuntu 8.04 relay.
regards,
Jan
Has anybody checked to see whether the Tor instances running on Ubuntu
have the ability to leave core files? I've never delved into the
details, but I know on older versions of Ubuntu, running ulimit in a
shell
grarpamp wrote:
Besides plugging DNS leaks, the two programs serve somewhat different
purposes.
Indeed, however neither program's purpose is to 'plug dns leaks'.
They simply feed what connection [dns] requests they receive on towards Tor.
I thought the reason you could not send
Jan Reister wrote:
Il 28/09/2009 15:25, Eugen Leitl ha scritto:
Why the switch to Polipo from Privoxy? Is Privoxy officially
deprecated now?
I just found out today and am wondering myself. From hearsay, Polipo
should perform faster and better.
There was a somewhat extended discussion
downie - wrote:
You have to send to a different address. Instructions [to unsubscribe]
are in the headers.
Having seen this situation on this list multiple times, it occurs to me
that beyond To, From, and Date, many people have probably never
seen the headers. Most non-techies probably don't
Scott Bennett wrote:
a) are running an obsolete version of tor (0.1.2.19) under LINUX,
which is far enough back to be a security problem due to the SSL
key generation bug in LINUX,
If the key generation problem refers to what I think, and just for the
record, that
Michael Cozzi wrote:
Hello Tor Team.
I'm not sure who to thank, but I noticed my suggested text regarding
what IT Professionals use Tor for was included whole cloth on the web
page.
Thank you, that gave me geek-warm-fuzzies.
Michael
Very nicely done.
It has been
downie - wrote:
Date: Fri, 10 Jul 2009 11:15:25 -0400
From: eril...@gmail.com
To: or-talk@freehaven.net
Subject: Re: Yahoo Mail and Tor
If I'm proxying through Tor and I type this into my browser:
www.google.com.example.exit
My browser asks the proxy for a connection to
Andrew Lewman wrote:
A) The Privoxies after 3.06 have a local web control interface
which we believe is a security risk. We think that remote websites can
probably reconfigure your privoxy via that interface, maybe even without
your noticing. If newer versions have the ability to disable
bao song michaelw...@yahoo.com.au wrote:
The standard Tor bundle download for non-Windows still includes
Privoxy 3.0.6, which mangles Yahoo mail.
I am running privoxy 3.0.6. If you want to email me off-list I will be
happy to send you my user.action file which seems to more or less work
grarpamp wrote:
GMail doesn't do this anymore. You can sign up through Tor just fine.
Yes, there was a time years ago where they were invite only :(
Then they opened up. This does not refer to that historical thing.
I tried making four different acct names over the span of a day
James Brown wrote:
I use the gmail within Tor very easy but I have some problems sometimes
with other services of Google.
For maybe I couple of years it has been almost impossible for me to use
Google's search via Tor. (It keeps calling me a virus.) Somebody
eventually told me about Scroogle
Arjan wrote:
Jim McClanahan wrote:
[...]
Certainly, protecting
the network is a priority. Protecting uninformed or unsuspecting
users gets trickier IMHO. I'll admit this is a bit of a hot-button
issue for me and I may have overreacted. But I think care needs to be
taken before
Scott Bennett wrote:
On Mon, 29 Jun 2009 07:13:42 -0600 Jim McClanahan jimmy...@copper.net
Scott Bennett wrote:
On Mon, 29 Jun 2009 05:14:25 -0600 Jim McClanahan
jimmy...@copper.net
wrote:
Scott Bennett wrote:
Ouch. This provides another example in support
Edward Langenback wrote:
Jim McClanahan wrote:
I probably should have canned the sarcasm, but I do think that any
disabling of the client from the network should be easily reversible.
Part of that is just my philosophy. But it also has a practical element
in terms of what is required
I was trying to email you and it bounced:
Final-Recipient: rfc822; benn...@cs.niu.edu
Original-Recipient:
rfc822;benn...@cs.niu.edu
Action: failed
Status: 5.7.1
Remote-MTA: dns; mp.cs.niu.edu
Diagnostic-Code: smtp; 550 5.7.1
benn...@cs.niu.edu... Access denied
Ah, I see. It is the duplicate messages from you that were confusing
me.
Why duplicate messages? As somebody else has pointed out recently, the
fact that I can post on or-talk means I am subscribed to or-talk.
Scott Bennett wrote:
Ouch. This provides another example in support of having a way
for the directory authorities to render insecure versions ...
and only usable as clients to connect to the tor project's web site to
download a current version of tor.
This kind of thinking baffles me.
Scott, when I did a reply on your email, it (tried to) sent it your
personal email account rather than the list.
--
Scott Bennett wrote:
On Mon, 29 Jun 2009 05:14:25 -0600 Jim McClanahan jimmy...@copper.net
wrote:
Scott Bennett wrote:
Ouch. This provides another example
Hi,
I have read on this mailing list several times about how some previous
versions of Tor contain vulnerabilities that can threaten the host
machine itself. I am reminded of this again with Pei Hanru's excellent
work tracking down the tbreg mystery. (I too say thank you.) While
I understand
Michael wrote:
Jim McClanahan wrote:
Hi,
I have read on this mailing list several times about how some
previous versions of Tor contain vulnerabilities that can
threaten the host machine itself.
snip
Hi Jim,
Not so much related to Tor itself, but more toward general
Phil wrote:
I realize this needs a fix not a workaround, but if a workaround is enough
for now you could try running lynx via proxychains -- tor
Proxychains might grab all the DNS requests.
Thanks for your response. Now that I know lynx doesn't leak DNS when
the protocol (e.g. http://)
Hi,
Quite by accident I discovered that the lynx browser is leaking DNS
addresses. I have verified this on:
Lynx Version 2.8.4dev.7 (03 Aug 2000) and
Lynx Version 2.8.5rel.1 (04 Feb 2004)
lynx is called from scripts with the following statements:
export
Fabian Keil wrote:
Jim McClanahan jimmy...@copper.net wrote:
Quite by accident I discovered that the lynx browser is leaking DNS
addresses. I have verified this on:
Lynx Version 2.8.4dev.7 (03 Aug 2000) and
Lynx Version 2.8.5rel.1 (04 Feb 2004)
Is there a reason why you
Strange the the provided link didn't have injection... Adaptation on
the nodes part?
A few minutes ago I tried http://www.torproject.org.TRHCourtney01.exit/
and got a banner ad. Maybe they do it on a sporadic basis?
Chris Humphry wrote:
Hi Kroy!
snip
I
informened Tor team how RefContorl will spoof the root of the site you
are visiting as the referrer.
I will also point out functionality Privoxy has as an option. When you
come from another site, it spoofs the referrer as the root of the site
being
Freemor wrote:
On Thu, 28 May 2009 22:25:49 -0700 (PDT)
Curious Kid letsshareinformat...@yahoo.com wrote:
This policy model, applied globally, may put and end to Tor. Imagine
if exit nodes in every country were shut down, yet their operators
were still required to pay for an Internet
unknown wrote:
INET_IFACE=eth0 #our internet interface
$IPTABLES -A INPUT -i $INET_IFACE -p TCP --dport 9050 -j DROP
$IPTABLES -A INPUT -i $INET_IFACE -p TCP --dport 9040 -j DROP
$IPTABLES -A INPUT -i $INET_IFACE -p TCP --dport 53 -j DROP
$IPTABLES -A INPUT -i $INET_IFACE -p UDP --dport
Tripple Moon wrote:
IMHO, all and i mean *all* modifications of the original code and/or design
should be committed to the development-tree, that's how things get improved
and fixed etc by the community that maintains the development of the project.
The problem with your logic (leaving
By remotely calculated CRC-value of the client i mean that the
destination does the CRC calculation of the connecting client.
Yes this means the client needs to send all of its binary-self to the
destination.
That would be a pretty big upload for a dial-up user!
I am also wondering what
29 matches
Mail list logo