*sigh*
See below :)
On Sep 23, 2009, at 8:29 AM, Paul Syverson wrote:
On Wed, Sep 23, 2009 at 11:11:29AM -0400, Praedor Atrebates wrote:
It would appear that the tor network should include some timing
randomization and reordering of packets to thwart such analysis.
Not so much to really
I figure it's an arms race between those seeking control and those
valuing freedom.
I disagree. I'd say that valuing control and seeking freedom more
accurately describe the actual state of affairs.
Hey everyone,
Is the email based bridge discovery mechanism described here* not
functional? I've tried from a few valid gmail accounts but have
received no responses.
* https://www.torproject.org/bridges#FindingMore
Hey everyone,
Our research team is a bit stuck on a problem of bootstrapping
generic Tor on a private network in planetlab. The two authoritative
directory servers that we are running continuously complain that,
Nov 10 12:22:35.487 [info] router_pick_trusteddirserver(): No trusted
authoritative directory servers into
config.c? You may need to run the them first to generate the
fingerprints.
Have you looked at the IP addresses your ORs are publishing to?
-Original Message-
From: [EMAIL PROTECTED] [mailto:owner-or-
[EMAIL PROTECTED] On
Behalf Of Jon McLachlan
on
dir servers instantly?
~Jon
On Nov 10, 2008, at 11:36 AM, Jon McLachlan wrote:
Hey everyone,
Our research team is a bit stuck on a problem of bootstrapping
generic Tor on a private network in planetlab. The two
authoritative directory servers that we are running continuously
Hey everyone,
This is a long shot, but...
I'm developing on top of Tor through it's API. I am running Tor as an
OP, and I am continuously being rejected by the socks port during the
handshake, returning the SOCKS4a error code 91 (or 0x5b = [generic]
request rejected or failed). The
Many thanks for the very prompt and very helpful feedback! :)
~Jon
Roger Dingledine wrote:
On Thu, Oct 16, 2008 at 06:03:13PM -0500, Jon McLachlan wrote:
I'm developing on top of Tor through it's API. I am running Tor as an
OP, and I am continuously being rejected by the socks port during
Hey Everyone,
Does anyone know why automatic attaching of streams to circuits may
fail, aside from the stale timeout that is currently on TorCircuits,
defaulted at 10 min? I am using the Tor Controller to construct custom
private circuit (with purpose=general, from posted TorDescriptors
Hey,
I am seeking the most light weight proxy to use with Tor, and I am
curious if anyone knows of something better than the following: I am
familiar with 2 proxy services that have 4a-socks forward abilities:
privoxy and polipo. Neither are what I would consider very light
weight, as
Thanks :) My ISP reconnected me again but I had to promise to never run
Tor again. Tomorrow I'm going to call them and try to change their
minds. XS4ALL is a ISP who stands for freedom of speech, they are
against censorship, etc etc. If they knew what Tor was they wouldn't
disconnect me for
Just a very small fyi,
It seems the certificate has expired for bridges.torproject.org
~Jon
Many thanks for the help on understanding the issues and concerns around
tearing down an ultimate node on a circuit :)
~Jon
Paul Syverson wrote:
On Mon, Jan 28, 2008 at 03:53:51PM -0500, Roger Dingledine wrote:
On Wed, Jan 23, 2008 at 03:47:42PM -0600, Jon McLachlan wrote:
Maybe more
F. Fox wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Florian Reitmeir wrote:
(snip)
FAQ:
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ
4.10. Can I control what nodes I use for entry/exit?
... We don't actually recommend you use these for normal use -- you get the
best
Hey all,
Maybe more for developers... but, does anyone know a way to tear down
only the last relay on an already constructed anonymous Tor circuit, in
such a way that the circuit remains unchanged except for the
disappearance of the last hop? It doesn't seem like this is
documented/viable
In fact, autonomous system diversity in a Tor circuit is a wonderful
thing, for better anonymity against pseudo-global adversaries (such as
ISP's). Then, different ISP's would have to collude to short circuit a
Tor tunnel. Just be careful of those Internet eXchanges, as IX level
adversaries
Ahh, I have discovered what was causing this issue. The [ip]:[port]
location was a service running on the Exit OR. I believe setting the
configuration variable,
ExitPolicyRejectPrivate 0
fixed the problem reported below.
Best Regards,
~Jon
Jon McLachlan wrote:
Running, version 0.2.0.16
Running, version 0.2.0.16-alpha, I am...
1) extend one new tunnel, of length 2 through (1st hop) OR w/
purpose=bridge, (2nd hop) OR w/ purpose=controller
Note, Tor indicates one built circuit of length 2:
250-circuit-status=50 BUILT $[some-hex-value],$[some-other-hex-value]
250 OK
2)
From the contolPort + API, I am able to grab descriptors of or's using,
GETINFO desc/name/[someNickName],
I am then able to parse these descriptors out of the response, and send
these descriptors to other onion routers (ones, that are not fetching
descriptors from the dirservers). At these
Hey,
I have been having some trouble with a python based Tor controller.
After setting my local ControlPort in the Tor settings, and connecting,
I am able to successfully authenticate, but then I am unable to get Tor
to recognize any other commands.
More precisely,
Referring to the spec
http://www.torproject.org/svn/trunk/doc/spec/control-spec.txt, (in 3.10)
it seems like we may have the ability to build/extend circuits through
specific Tor relays. The spec seems ambiguous if the defined ServerSpec
is specifically a Tor relay and/or Tor bridge. Reading
[EMAIL PROTECTED] wrote:
Another point is that without a tor server my home would be vulnerable to traffic
analysis and a further point is that a tor server is more safe than only a client.
I think this depends largely on what type of traffic analysis we're
talking about. Traffic analysis,
Scott Bennett wrote:
On Tue, 08 Jan 2008 14:15:05 -0600 Jon McLachlan [EMAIL PROTECTED]
wrote:
[EMAIL PROTECTED] wrote:
Another point is that without a tor server my home would be vulnerable to traffic
analysis and a further point is that a tor server is more safe than only
I have a bare-minimum linux box, much like a planetlab node that I'd
like to use to deploy a Tor relay. In installing Tor, I am having
trouble satisfying the dependencies for the latest stable tor linux
source tarball (tor-0.1.2.18.tar.gz). I (believe I) have successfully
installed the
24 matches
Mail list logo