On Sat, Feb 12, 2011 at 05:08:17AM +, M wrote:
> I thought i would bring this to the attention of those concerned in case
> they already did not know. I am still unable to download any attachments,
> whether yahoo or gmail, when running tor. The message which appears is
>
> "[JavaScript Appli
On Thu, Feb 10, 2011 at 06:19:27PM -0500, Joseph Lorenzo Hall wrote:
> I run a no-exit relay that can sustain about a hundred KB/s but I need
> to limit to about 4 GB/day to stay under bandwidth caps. I have
> accounting set up but what happens now is that it blows through that
> in 12 hours and th
On Thu, Feb 10, 2011 at 05:34:51PM -0500, grarpamp wrote:
> Tor seems to be doing a good job indicating the usefulness and
> application of anonymity to a wide variety of potential users.
> Moreso than before. But it does hesitate from suggesting that it
> can be used as a check and balance within
On Sat, Feb 05, 2011 at 07:44:57AM -0500, hi...@safe-mail.net wrote:
> Most hidden services use the standard port 80, like this:
> address.onion
> While other services are like this:
> address.onion:8080
>
> What do you gain by doing that?
Not much at all, as far as I can tell.
Maybe they're doi
On Wed, Feb 02, 2011 at 12:37:26AM -0500, forc...@safe-mail.net wrote:
> I have the following lines in my torrc file:
>
> ExitNodes node1
> AllowDotExit 1
> MapAddress .site.com .site.com.node2.exit
>
> When I connect to site.com, node2 is used as exit. I believed it should be
> node1, as ExitNo
Tor 0.2.2.22-alpha fixes a few more less-critical security issues. The
main other change is a slight tweak to Tor's TLS handshake that makes
relays and bridges that run this new version reachable from Iran again.
We don't expect this tweak will win the arms race long-term, but it will
buy us a bit
On Sat, Jan 22, 2011 at 01:57:57PM +0100, Bernd Kreuss wrote:
> line 589: (Alice establishes rendezvous point)
> ==
> "It does this by establishing a circuit to a randomly chosen OR"
>
> does this mean
> Alice -> OR1 -> OR2 -> Rend
> ^^^
Tor 0.2.2.21-alpha includes all the patches from Tor 0.2.1.29, which
continues our recent code security audit work. The main fix resolves
a remote heap overflow vulnerability that can allow remote code
execution (CVE-2011-0427). Other fixes address a variety of assert
and crash bugs, most of which
On Mon, Jan 03, 2011 at 04:06:44PM +0100, anonym wrote:
> One issue for anonymity-oriented LiveCDs (such as T(A)ILS[1] and Liberté
> Linux[2]) is the system time. Tor requires a reasonably correct system
> time, otherwise no circuits will be opened. This is a major problem for
> these LiveCDs since
On Wed, Jan 12, 2011 at 09:01:34PM -0500, Roger Dingledine wrote:
> For more on this topic, I'd point you to a short article a few years
> ago by Goodell and Syverson called "The Right Place at the Right Time:
> Examining the Use of Network Location in Authentication and Abuse
&
On Thu, Jan 13, 2011 at 01:17:33AM +0100, Mitar wrote:
> On Wed, Jan 12, 2011 at 6:26 AM, Mike Perry wrote:
> > and to suggest
> > solutions for their security problems that involve improving their
> > computer security for the Internet at large (open wifi, open proxies,
> > botnets),
>
> I am no
On Tue, Jan 04, 2011 at 02:14:09PM +0100, andr...@fastmail.fm wrote:
> I'm running Ubuntu 10.04 and Tor browser bundle with scripts forbidden.
>
> Does any of my web search results or web pages (or anything else during
> the web session) I look at get sent to or put on the SWAP partition of
> my m
On Tue, Jan 04, 2011 at 08:02:40AM -0500, Praedor Atrebates wrote:
> For something like skype or paying for ANYTHING via credit card/paypal
>or the like, your anonymity is lost upon making payment so having to pay
>online outside the tor network cannot be a privacy/anonymity violation.
>
> I would
On Wed, Dec 29, 2010 at 10:32:41AM +, Orionjur Tor-admin wrote:
> As I know sometimes ago there were plans of the Tor developers to make
> TB for Thunderbird, am I wrong?
It's still in the plans, but we don't have anybody to work on it
currently, so don't hold your breath.
Perhaps some nice p
On Tue, Dec 28, 2010 at 08:57:24PM -0500, Alek wrote:
> I'm curious- in what way can Tor be used for emailing? When someone is
> connected to the Tor network is there email routed along the Tor network
> too? Or, does it go through their the normal connection with their ISP?
The only recommended
On Tue, Dec 28, 2010 at 08:51:30PM -0500, Nick Mathewson wrote:
> It would be neat if somebody could send a pointer to the authors'
> actual results.
Based on
http://www-wiwi.uni-regensburg.de/Forschung/Publikationen/Dominik-Herrmann.html.en
I'm guessing they're basing the talk on their CCSW 2009
On Tue, Dec 28, 2010 at 08:51:30PM -0500, Nick Mathewson wrote:
> From the wired.com article, this sounds _exactly_ like the old website
> fingerprinting attack, which has been known since 2002:
> http://freehaven.net/anonbib/#hintz02
>
> It would be neat if somebody could send a pointer to th
On Tue, Dec 28, 2010 at 03:41:22AM +0100, Mitar wrote:
> About P2P users: why does Tor not award users who are exit nodes with
> more bandwidth available for themselves? So that P2P users would be
> motivated to run exit nodes by themselves. And in the long run they
> would learn that it is enough
On Mon, Dec 27, 2010 at 11:20:36AM -0500, and...@torproject.org wrote:
> On Mon, Dec 27, 2010 at 09:56:55AM -0500, prae...@yahoo.com wrote 0.5K bytes
> in 12 lines about:
> : Subject says it all. Why is only TCP sent over tor and not UDP? Why not
> simply suck up and send ALL net traffic, regar
Tor 0.2.2.20-alpha does some code cleanup to reduce the risk of remotely
exploitable bugs. Thanks to Willem Pinckaers for notifying us of the
issue. The Common Vulnerabilities and Exposures project has assigned
CVE-2010-1676 to this issue.
We also fix a variety of other significant bugs, change th
On Thu, Dec 16, 2010 at 10:18:17PM -0800, Luis Maceira wrote:
> When,in Vidalia,we click on one of the active circuits,does that action
> effectively
> change the current Tor circuit?If we are using one circuit,clicking (in
> Vidalia GUI
> interface) on another one,does this change Tor circuits t
On Tue, Dec 07, 2010 at 11:12:37PM +, John Case wrote:
>> Let me be even broader: if you want to be safe, you must never use Tor
>> with any browser except Firefox, and you must also use Torbutton. If
>> you don't do both, you can lose from a wide variety of application-level
>> attacks.
>
> Wa
On Tue, Dec 07, 2010 at 05:12:57PM +0100, Karsten N. wrote:
> a warning for using Google Chrome, Safari or other Webkit based browsers
> with Tor. Because of a bug in the FTP proxy settings user can
> deanonymized by FTP links.
[snip]
> May be, Torproject.org can blog a warning for Tor users too.
On Sun, Dec 05, 2010 at 03:16:01PM +, Orionjur Tor-admin wrote:
> > Are you rate limiting your exit node? Perhaps you should start. It seems
> > like your network is really overloaded.
>
> I rated limiting my node the following:
> BandwidthRate 200 KBytes
> BandwidthBurst 400 KBytes
Try
Rela
On Sun, Dec 05, 2010 at 03:06:14AM +0800, Moses wrote:
> Thanks for reply. This is weird. Every new bridge I got just work for
> 2-5 minutes, and then becomes unreachable and the reconnection is
> stuck at 85%. Are bridges under attack?
>
> And after removed bridges, the things getting even worse,
On Sat, Dec 04, 2010 at 07:00:17AM +, Orionjur Tor-admin wrote:
> I have the above record in '/var/tor/log' on my exit-node.
> What it can mean?!
Tor clients build circuits when they first start up, to estimate the
average amount of time it takes to build a circuit. Once they have a good
estim
On Sun, Dec 05, 2010 at 12:57:12AM +0800, Moses wrote:
> Recently I got many this kind of error, and the connection is stuck at
> 85%, WHY?
>
> [notice] new bridge descriptor 'Unnamed' (cached)
> [notice] We now have enough directory information to build circuits.
> [notice] Bootstrapped 80%: Conn
On Fri, Nov 26, 2010 at 07:09:00PM +, James Brown wrote:
> Sometimes ago I ren a VDS under Debian Lenny,
> ~# uname -a
> Linux 2.6.18-028stab070.4-ent #1 SMP Tue Aug 17 19:03:05 MSD 2010 i686
> GNU/Linux
>
> I set up on that VDS only exit tor-node and nothing more. I didn't stop
> apache, prof
Yet another OpenSSL security patch broke its compatibility with Tor:
Tor 0.2.2.19-alpha makes relays work with OpenSSL 0.9.8p and 1.0.0.b.
https://www.torproject.org/download/download
Changes in version 0.2.2.19-alpha - 2010-11-21
o Major bugfixes:
- Resolve an incompatibility with openssl
On Thu, Nov 25, 2010 at 05:52:36PM +, Anon Mus wrote:
> Matthew wrote:
>> I think I am correct to say that StrictExitNodes has been negated in
>> favour of StrictNodes.
>>
>> However, when I use StrictExitNodes 1 I have no problems.
>>
>> When I use StrictNodes 1 and have viable ExitNodes the
On Mon, Nov 22, 2010 at 09:51:16PM +, Matthew wrote:
> "## Configuration file for a typical Tor user
> ## Last updated 12 April 2009 for Tor 0.2.1.14-rc.
> ## (May or may not work for much older or much newer versions of Tor.) "
>
> Do I need to get a new .torrc version? I have had a look onli
On Thu, Nov 18, 2010 at 06:19:03PM -0800, Theodore Bagwell wrote:
> Some of you may be aware of the paper,"Cyber Crime Scene Investigations
> (C2SI) through Cloud Computing"
> (http://www.cs.uml.edu/~xinwenfu/paper/SPCC10_Fu.pdf) which illustrates
> a feasible method of invalidating the anonymity a
On Wed, Nov 17, 2010 at 07:50:05PM -0500, Roger Dingledine wrote:
> If by "Tor-only" packages you mean the old "expert" packages, we decided
> to drop support for them:
For background, see
https://trac.torproject.org/projects/tor/ticket/1274
Sounds like we should do a
On Thu, Nov 18, 2010 at 12:38:09AM +, Geoff Down wrote:
> Thanks. The Tor-only packages for OSX PPC seem to have disappeared since
> the website was revamped (nice look btw).
> Is there a more recent version than 0.2.2.15-alpha available to test?
If by "Tor-only" packages you mean the old "exp
Tor 0.2.2.18-alpha fixes several crash bugs that have been nagging
us lately, makes unpublished bridge relays able to detect their IP
address, and fixes a wide variety of other bugs to get us much closer
to a stable release.
https://www.torproject.org/download/download
Packages will be appearing
Hi folks,
If you use our debs on Debian or Ubuntu, can you please do
ls -la /var/lib/tor/core*
as root, and let us know if you have any?
I want to get a sense of how many core files (from crashes) are piling up
for you.
If you do have core files, don't share them with anybody -- they could
inc
On Wed, Nov 17, 2010 at 11:45:32AM -0500, Nick Mathewson wrote:
> > I noticed that Tor had crashed on my system. I am using Debian Lenny
> > with Tor 0.2.1.26-1~~lenny+1. The only thing I could find out about this
> > crash is the following line running `dmesg`.
> >
> Without more information, ther
On Tue, Nov 16, 2010 at 04:05:11AM -0500, zzzjethro...@email2me.net wrote:
> Hello to all.
> I use the Tor Browser Bundle on a USB as I can only access the internet from
> cafes in the country in which I live. Using a proxy is now illegal here.
> I have several questions.
> I know that Tor uses
On Thu, Oct 28, 2010 at 10:10:52AM +0100, startx wrote:
> the answer in the FAQ refers to privoxy. so i wonder now: is this
> answer obsolete meanwhile?
Yes, it's wrong. It's a wiki -- please fix it. :)
In fact, none of the Tor developers added this particular question in
the first place. That's
On Wed, Oct 27, 2010 at 07:19:02PM +0100, Matthew wrote:
> There is a "Hints and Tips for Whistleblowers Guide" available at
> http://ht4w.co.uk/.
>
> The section on proxies includes Tor-related information which I fail to
> understand:
>
> "You may actually get more anonymity when using the To
On Tue, Oct 05, 2010 at 11:31:25PM +0200, Andreas Jonsson wrote:
> Hi List!
>
> I've been working with Erinn to sandbox the TBB much like chrome and
> ironfox are on osx, but now I think we need some opinions regarding
> where to go next.
>
> See this page for more information on what the sandbox
[In the future, please send your mail to only one list, not two. I just
subscribed you to or-talk, since you'd sent the mail there but aren't
on the list.]
On Wed, Oct 20, 2010 at 10:18:53AM +0800, torsecurity wrote:
> hello, I want to set up a hidden server in my private network. I have
>successf
On Sat, Oct 16, 2010 at 07:49:12AM -0700, Robert Ransom wrote:
> On Sat, 16 Oct 2010 07:02:10 -0400
> hi...@safe-mail.net wrote:
>
> > Every now and then, when you start Tor, it searchers for
> > relays/descriptors.
> > And I've heard that it does that every now and then while it tuns as well.
>
Tor 0.2.2.17-alpha introduces a feature to make it harder for clients
to use one-hop circuits (which can put the exit relays at higher risk,
plus unbalance the network); fixes a big bug in bandwidth accounting
for relays that want to limit their monthly bandwidth use; fixes a
big pile of bugs in ho
Tor 0.2.2.16-alpha fixes a variety of old stream fairness bugs (most
evident at exit relays), and also continues to resolve all the little
bugs that have been filling up trac lately.
https://www.torproject.org/download.html.en
Packages will be appearing over the next few days or weeks (except
on
On Mon, Sep 20, 2010 at 03:22:57AM -0500, David Bennett wrote:
> Q: What is to stop operatives working for the bad guys from running
> tor proxies from 3rd party locations? Granted, they would only be able
> to sample a portion of the traffic, but traffic that they did sample
> could lead to identi
On Mon, Sep 13, 2010 at 12:00:48PM +0200, tor_ml wrote:
> On 09/13/2010 12:55 AM, and...@torproject.org wrote:
>> On Sun, Sep 12, 2010 at 05:19:00PM +0200, tor...@ymail.com wrote 0.4K bytes
>> in 12 lines about:
>>> solved:
>>> It is irritating but one has to tick:
>>> "Start the Tor software when
On Fri, Sep 10, 2010 at 02:57:52AM -0500, Scott Bennett wrote:
> If what you say is actually the case, then it would seem that a problem
> described on this list on many occasions during the last few years may, in
> fact, have been due to this horrible limitation. Several of us have
> compla
On Fri, Sep 10, 2010 at 03:27:01AM -0500, Scott Bennett wrote:
> >Yup, that's the actual behaviour. Good thing we added the warn,
> >otherwise
> >it might have gone unnoticed longer.
> >
> Wow. This is a scandalously bad situation. Is there any chance
> that it will get a high priority for
On Fri, Sep 10, 2010 at 01:36:18AM -0500, Scott Bennett wrote:
> I had planned to upgrade my node from 0.2.2.14-alpha this evening to
> 0.2.2.15-alpha, but there is an unfortunate and apparently gratuitous, new
> restriction upon "ExcludeNodes" and "ExcludeExitNodes" that, for the moment
> at
On Thu, Sep 02, 2010 at 05:34:53PM +0200, Udo van den Heuvel wrote:
> Tor chokes and stops when it finds ipv6 numbers in resolv.conf.
> Is this a known issue?
>
> I found out about this as the Fedora dhclient-script (part of ISC
> dhcp-4.2.0) wipes out resolv.conf and replaces it with whatever the
On Mon, Aug 30, 2010 at 08:51:47AM +0100, Matthew wrote:
> I have StrictExitNodes = 1 and this is the exit node "wollwoll".
>
> When I look at the Vidalia GUI the connections show:
>
> Lifuka, india533, 5aColuna01
> williamhaines, bp1, PPrivCom032
> birdbrain, torserversNet4, wollwoll
> Roo8Peik,
On Sat, Aug 28, 2010 at 11:20:41AM -0400, Paul Syverson wrote:
> What you describe is known in the literature as website fingerprinting
> attacks,
[snip]
> Roughly, while Tor is not invulnerable to such an attack, it fairs
> pretty well, much better than other systems that this and earlier
> papers
On Sun, Aug 22, 2010 at 01:56:59PM +, Orionjur Tor-admin wrote:
> Oh, sorry, $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4 is an old
> fingerprint of my node named "Orion Tor Node", my current fingerfrint is
> another (after upgrading a stable Tor-version to alfa).
> Is it normal that after upgradi
On Sat, Aug 21, 2010 at 10:53:48PM -0600, Jim wrote:
> I connect to the Internet with dialup. I have been successfully using
> Tor clients for 4+ years. One of the issues with using Tor over a slow
> connection is the amount of time it takes to update the information
> about the network whe
Tor 0.2.2.15-alpha fixes a big bug in hidden service availability, fixes a
variety of other bugs that were preventing performance experiments from
moving forward, fixes several bothersome memory leaks, and generally
closes a lot of smaller bugs that have been filling up trac lately.
https://www.to
On Sat, Aug 14, 2010 at 12:26:57PM +0100, Anon Mus wrote:
> It looks like 90% of the funding is from the US, nearly all US government.
If you know any funders outside the US who care about privacy, anonymity,
or circumvention, we're all ears. :)
> Add to this the number of Tor nodes run from US i
On Tue, Jul 27, 2010 at 12:03:18PM +0100, Matthew wrote:
> However, with Tor and Polipo, then DNS request is routed through Polipo
> then through Tor's three nodes then the final exit node does the DNS
> resolution with the DNS server where the domain is registered (bypassing
> the local cach
On Wed, Jul 21, 2010 at 11:37:24AM +0200, Jerzy ??ogiewa wrote:
> strange, when I type for example tsocks
> /Applications/Safari.app/Contents/MacOS/Safari the application gui never
> seems to appear.
Looks like you're trying to use tsocks on os x? It doesn't (easily)
work on os x, even for non-g
Tor 0.2.2.14-alpha greatly improves client-side handling of circuit build
timeouts, which are used to estimate speed and improve performance. We
also move to a much better GeoIP database, port Tor to Windows CE,
introduce new compile flags that improve code security, add an eighth
v3 directory auth
On Mon, Jul 12, 2010 at 02:53:05PM -0400, grarpamp wrote:
> Are there any official (non-mirror) .onions run by the torproject itself?
https://trac.torproject.org/projects/tor/wiki lists some hidden services,
some of which are quite official, like the hidden service that points
to archive.torprojec
On Fri, Jul 02, 2010 at 02:00:54PM +0200, Udo van den Heuvel wrote:
> On 2010-06-30 19:55, Udo van den Heuvel wrote:
> >>> Can you see your node on the public lists?
> >>
> >> Nope.
> >
> > Still the same logging:
> >
> > Jun 30 18:45:04.097 [notice] New control connection opened.
> > Jun 30 18:5
On Mon, Jun 28, 2010 at 08:45:51PM -0400, and...@torproject.org wrote:
> On Mon, Jun 28, 2010 at 08:36:15PM -0400, torh...@safe-mail.net wrote 0.4K
> bytes in 6 lines about:
> : Since my node is not an exit node, does that really matter that my ISP is
> hijacking DNS requests? Does anyone know ho
On Mon, Jun 14, 2010 at 10:26:59PM +0100, Al MailingList wrote:
> > How would you block connections to Shadowserver's honeypots?
>
> Why would you want to do that? The point is someone is using an exit
> node for abuse. If you just prevent abuse to a honey pot, you are just
> covering up the probl
On Thu, Jun 10, 2010 at 03:44:43PM -0400, Sambuddho Chakravarty wrote:
> I am running a Tor relay and have set the "RelayBandwidthRate" to 40 MBytes
> and "RelayBandwidthBurst" to 60 MBytes. However the Tor status page only
> lists it to be 122 Kbytes/sec.
Which Tor status page? There are a bunch
On Tue, Jun 08, 2010 at 04:26:11PM -0500, Jon wrote:
> I was wondering why on a windows os, the network map shows only 681
> relays on one system and on another system, it shows 1853 relays. This
> seems to be a major difference, which is also above a previous message
> about only 80+ relay differe
On Tue, Jun 08, 2010 at 07:51:33AM +0100, Andy Dixon wrote:
> I'm trying to set up a pretty decent server on our 50 meg leased line
> and I am having difficulty in doing it.
>
> We have a bunch of IP addresses and we have to use port forwarding to
> rote it to an internal IP address.
>
> I have d
On Tue, Jun 01, 2010 at 11:37:45PM -0400, forc...@safe-mail.net wrote:
> We run a Tor node ("Privacyhosting" on 64.46.39.238) on a dedicated
> server since about one year, and suddenly the node isn't listed anymore
> in any Tor directory. Why?
>
> Our server admin confirmed me that tor is running
On Tue, May 25, 2010 at 04:01:43PM -0400, Ted Smith wrote:
> > I couldn't figure
> > out why the author, Kurt Knutson of WGN TV, was so taken in by something
> > that
> > isn't even available yet and about which there is so little publicly
> > available
> > information.
> >
> Maybe Tor Project
On Mon, May 24, 2010 at 10:24:00AM +0800, ?? wrote:
> I got a warning, "ControlPort is open, but no authentication
> method has been configured. This means that any program on your
> computer can reconfigure your Tor. That's bad! You should upgrade
> your Tor controller as soon as possib
On Mon, May 17, 2010 at 09:44:21PM +0200, Moritz Bartl wrote:
> Original Message
> Subject: Re: - Medium - Tor servers, Tor community wants to disable your
> nodes - General
> Date: Mon, 17 May 2010 13:46:04 +0200
> From: Perfect Privacy Administration
> Organization: PP Internet
On Sun, May 16, 2010 at 12:45:22AM -0500, Scott Bennett wrote:
> The tor man page gives a not very edifying description of the NodeFamily
> statement. The man page says that the NodeFamily statement may be used more
> than once in a given torrc file. Does each use define a different Family?
On Sat, May 15, 2010 at 06:37:54PM -0700, Damian Johnson wrote:
> Hmmm... so we aren't interested in having a clearer definition of what makes
> up a bad exit? From the following I thought this is something we were
> interested in John looking into:
>
> "On the bright side though, it's looking goo
On Sat, May 15, 2010 at 07:38:57PM -0400, W wrote:
> I am getting a lot of these messages lately -- how can I increase the wait
> time?
>
> 502 Server dropped connection
>
> The following error occurred while trying to access http://xxx
>
> 502 Server dropped connection
>
> Generated Sat, 15 M
On Fri, Apr 30, 2010 at 05:40:28PM -0500, Jon Cosby wrote:
> I'm getting frequent "504: Connection refused" errors on a few sites.
> This usually happens when I've been logged onto the site for an hour or
> two. Restarting Firefox doesn't fix the problem, the only thing that seems
> to work is rest
On Sat, May 01, 2010 at 02:55:53PM -0700, Damian Johnson wrote:
> An easy place to start would be to solicit input on or-talk for a better
> definition and enumerable attributes we can look for. Some obvious starting
> ones would be ssl stripping, certificate tampering (checking for differences
> l
On Thu, May 13, 2010 at 06:03:49PM -0400, W wrote:
> Is there a "torify" equivalent for Mac OS X,
Check out "dsocks", by Dug Song.
> or does Torify work on
>that platform...
Not currently, I believe. It would be great if somebody wanted to combine
torsocks and dsocks so there's less work for the
Tor 0.2.2.13-alpha addresses the recent connection and memory overload
problems we've been seeing on relays, especially relays with their DirPort
open. If your relay has been crashing, or you turned it off because it
used too many resources, give this release a try.
https://www.torproject.org/down
On Fri, Apr 23, 2010 at 12:23:40AM -0500, Scott Bennett wrote:
> On Thu, 22 Apr 2010 19:39:07 -0400 Roger Dingledine
> wrote:
> >Tor 0.2.2.12-alpha fixes a critical bug in how directory authorities
> >handle and vote on descriptors. It was causing relays to drop out o
On Fri, Apr 23, 2010 at 08:51:32PM -0500, Scott Bennett wrote:
> I hope that, in the future, openssl.org will make some effort to
> coordinate such things with the various operating system developers in
> a way that avoids turning the situation into such a cl*f*** again.
> It's obviously b
-talk@freehaven.net
Subject: Re: Declining traffic
Date: Fri, 23 Apr 2010 21:35:46 +0200
Roger Dingledine writes:
> So if you upgraded to the latest 0.2.2.x-alpha to get the fixes for other
> bugs, you would get the fix for this bug too. Let us know if it works.
I upgraded to latest torprojec
On Fri, Apr 23, 2010 at 02:35:01PM +0200, Timo Schoeler wrote:
> I'm seeing declining traffic over the last few weeks, please see graph:
> It dropped from a sustainted 2,5Mbps (or more) to about a fifth, with a
> massive drop today.
>
> I'm running
>
> tor-0.2.1.25-1.el5.rf
>
> on a 64Bit CentOS
Tor 0.2.2.12-alpha fixes a critical bug in how directory authorities
handle and vote on descriptors. It was causing relays to drop out of
the consensus.
Tor 0.2.2.11-alpha fixes yet another instance of broken OpenSSL libraries
that was causing some relays to drop out of the consensus.
(Windows bu
On Thu, Apr 22, 2010 at 06:08:09AM +, James Brown wrote:
> The exit-node which have ip 192.251.226.206 and named
> anonymizer2.blutmagie.de behaves itself as probably an evil exit-node.
> I can't change it practically at all. When I give command "pkill -1 tor"
> to my system many times it rem
On Thu, Apr 15, 2010 at 11:59:31PM -0500, Scott Bennett wrote:
> My weather satellite images got blocked again, due to the PrivacyNow
> exit using OpenDNS with a misconfigured account and the fact that
> ExcludeExitNodes still doesn't work reliably. Will the the authority
> operators *please*
On Sun, Apr 11, 2010 at 11:14:31PM +0100, Matthew wrote:
>> If you change the options, you should see polipo query your local dns
>> resolver either directly, or via gethostbyname.
>>
> But if you change it to "false" would that not be the safest option -
> from what I can gather in this situatio
On Sun, Apr 11, 2010 at 03:23:16PM +0200, Olaf Selke wrote:
> maybe I take your advice and add php code at blutmagie tns to sum up the
> extra-info average rate data and print the so calculated bandwidth
> instead of max observed one.
Here's my chance to remind people about
http://archives.seul.or
Hi folks,
Several people on irc have pointed out "prifoxy":
http://code.google.com/p/prifoxy/
Can somebody take a look at it, and decide whether it's for real,
whether it looks competently done, trustworthy, safe to recommend, etc?
My brief look showed me a binary blob and not much else, so my g
On Fri, Apr 09, 2010 at 08:58:32PM -0700, Christian Kujau wrote:
> > the ratio of real bandwidth divided by
> > advertised bandwidth has increased within the last three month by a
> > factor of three. The "MaxAdvertisedBandwidth 2000 KB" config parameter
> > leads to 135 MBit/s real bandwidth. Well
[Forwarding since Wyllys isn't subscribed at this address -RD]
- Forwarded message from owner-or-t...@freehaven.net -
Date: Mon, 05 Apr 2010 11:05:25 -0400
From: Wyllys Ingersoll
To: or-talk@freehaven.net
CC: thomas.hluch...@netcologne.de
Subject: Re: Good news: tor 0.2.1.25 works on Spa
On Sun, Apr 04, 2010 at 01:15:52PM +0200, Gitano wrote:
> DC wrote:
>
> > to start learning and trying it myself i will get a cheap vps to start with.
> > what's the os version specifically that works best with Tor?
>
> I prefer Ubuntu-server, but Debian is as simple.
> Please have a look at: htt
On Fri, Apr 02, 2010 at 03:09:18AM +, john smith wrote:
> > What happens when you try to visit https://bridges.torproject.org/
> with your (non-torified) browser?
>
> I can confirm that it's possible to access this site at the present time.
Turns out this was something we could fix in Vidalia
On Fri, Apr 02, 2010 at 05:04:53PM +0500, M wrote:
>>> - Yesterday i opened the network map and it showed that TOR had created
>>> like over a hundred circuits. First time i have seen that!
>>>
>> Were the circuits to destinations somewhat related to this 'fasterfox'?
>
> No...
See also
http
On Fri, Apr 02, 2010 at 12:56:25PM -0400, downie - wrote:
> > > I am having a problem with variable PHP pages being cached, and would
> > > prefer not to have to add Cache-Control headers everywhere. The manual
> > > doesn't seem to allow for that eventuality.
I believe the answer is that you can'
On Thu, Apr 01, 2010 at 01:50:06PM +, john smith wrote:
> I've been unable to download bridges in the 1.3.3 version of the
> tor-browser bundle for windows, when attempting to download bridges
> via Settings>Network>Find Bridges Now.
>
> Each time I attempt to download bridges I receive the fo
On Sat, Mar 13, 2010 at 01:03:18AM +0100, mister maniac wrote:
> the vidalia bundle (or polipo to be exact) stopped working for me on 2
> computers. a few days ago tor started to build circuits like crazy and
> using up all cpu time. the message log is full of the following
> message:
>
> Notice:
let people test the RefuseUnknownExits idea
Delivery-Date: Wed, 10 Mar 2010 22:45:21 -0500
Author: Roger Dingledine
Date: Wed, 10 Mar 2010 22:43:23 -0500
Subject: let people test the RefuseUnknownExits idea
Commit: 1108358e96e818f1d433a3025310c81e55891df9
[...]
Changes in version 0.2.2.11-alpha - 20
On Tue, Mar 09, 2010 at 08:23:30PM +0100, thomas.hluch...@netcologne.de wrote:
> I always run a tor node on my Sparc engine which is connected to the
>net via DSL and always runs without problems. So the 0.2.1.22 did. Now
>I got the sources of 0.2.1.24 and installed them doing the same commands
>as
Tor 0.2.2.9-alpha makes Tor work again on the latest OS X, updates the
location of a directory authority, and cleans up a bunch of small bugs.
Tor 0.2.2.10-alpha fixes a regression introduced in 0.2.2.9-alpha that
could prevent relays from guessing their IP address correctly. It also
starts the gr
On Sat, Mar 06, 2010 at 05:01:05PM -0500, TorOp wrote:
> On 3/6/2010 4:07 PM, and...@torproject.org wrote:
>> On Sat, Mar 06, 2010 at 03:00:19PM -0500, to...@optonline.net wrote 0.4K
>> bytes in 7 lines about:
>>> Mar 06 14:27:37.436 [Warning] We just marked ourself as down. Are your
>>> external
1 - 100 of 758 matches
Mail list logo