o is turn on info-level logging? That gives you just port numbers,
but turning off safe logging will give you the rest. Try it, and see for
yourself.
Scott Bennett, Comm. ASMELG, CFIAG
On Fri, 08 Aug 2008 09:09:28 -0400 Teddy Smith <[EMAIL PROTECTED]>
wrote:
>On Fri, 2008-08-08 at 04:34 -0500, Scott Bennett wrote:
>> On Thu, 7 Aug 2008 15:26:37 +0200 Steffen Schoenwiese
>> <[EMAIL PROTECTED]> wrote:
>> >On Thursday 07 Augu
it.
>
>Feel free to slap me with a wet fish if I'm being way off base and
>clueless here :) But I'm wearing pretty strong deodorant now.
>
Perhaps we could get Nick's and Roger's thoughts on that. My gu
On Thu, 7 Aug 2008 15:26:37 +0200 Steffen Schoenwiese
<[EMAIL PROTECTED]> wrote:
>On Thursday 07 August 2008 12:19:22 Scott Bennett wrote:
>> [...]
>> >The point is, this is written in way that hardly anyone, even native
>> > germans, would bother to read it,
On Thu, 7 Aug 2008 11:59:34 +0200 Hans Schnehl <[EMAIL PROTECTED]>
wrote:
>On Thu, Aug 07, 2008 at 03:49:17AM -0500, Scott Bennett wrote:
>> Here's a "heads up" about a German exit that adds material to at least
>> the www.barnesandnoble.com home p
ather
from cognates that it is some sort of politically motivated message that gets
added to the home page. I've now added "tortila" [sic] to my ExcludeNodes
list.
Scott Bennett, Comm. ASMELG, CFIAG
un.
>-outboundbindaddress 10.0.0.2
>
I think you're barking up the wrong tree here. I don't know of
any way to tell the resolver routines to bind only to a particular
network interface for sending their queries. If you really need to do
that, you need to have the source
e distributed hidden
>service directory available rather soon. It answers questions like yours.
>
>Hope that helps!
Not particularly at present, but I'll revisit your graph af
ly a brief time will remain available to provide hidden service
directory service as much of the time as possible? Or, better yet, why not
simply handle this issue the same way that it is handled for normal directory
(mirror) service?
Scott Bennett,
ienced it the
>first time? What was the first Tor version that had this problem, and
No, I do not know how to cause it to happen.
>can you confirm that previous versions didn't have it?
I've never seen it happen before now (0.2.1.2-alpha).
is bug. or-talk is
>> not the best place to discuss bugs. :)
Bugs are both reported and discussed on or-talk all the time. That's
one of the more useful things about the list, IMO, and helps serve as an
early warning system.
>>
>> | On Thu, Jul 24, 2008 at 06:53:36AM -05
pdated
>version of the file in the same format is currently in the location shown
>above.
>
I've also left the 644 permissions, but I've changed both the owner and
group to "_tor". It still doesn't work and gives the same error message.
duced output in the same format, so an updated
version of the file in the same format is currently in the location shown
above.
Scott Bennett, Comm. ASMELG, CFIAG
*
jack "no
answer" queries or queries for A RR's for certain popular web sites. If
you have entered a host+domainname on the Address line in torrc, tor also
needs to be able to resolve that address.
Scott B
time. Thanks in advance.
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: bennett at cs.niu.edu *
**
* "A well regulated
me problem?
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: bennett at cs.niu.edu *
**
* "A
handle a load like that of blutmagie, for example,
if only it had a 100 Mb/s or faster connection. :-)
Scott Bennett, Comm. ASMELG, CFIAG
*
ner would attempt to block it in the
future. Even the Subject: header contained junk, a common massmail
property.
Now please stop. This is off-topic and should be unnecessary to
explain in the first place, just as the reasons for not top-posting
should be obvious.
On Wed, 23 Jul 2008 12:00:58 +0200 Florian Reitmeir <[EMAIL PROTECTED]>
wrote:
>On Wed, 23 Jul 2008, Scott Bennett wrote:
>> Then you should send your suggestion to Sun Microsystems, Inc., not
>>to me, because this particular implementation is the Solaris version. Y
On Wed, 23 Jul 2008 11:47:15 +0200 [EMAIL PROTECTED] wrote:
>Scott Bennett:
>> It is indeed a UNIX standard, so live with it.
>
>And MIME is an IETF standard, so live with it. A very adopted one, btw.
I do, thank you, but only when I need it to transfer non-ASCII file
ty
On Wed, 23 Jul 2008 00:32:36 + scar <[EMAIL PROTECTED]> wrote:
>Scott Bennett @ 2008/07/22 23:21:
>> On Tue, 22 Jul 2008 14:02:10 +0200 Ansgar Wiechers <[EMAIL PROTECTED]>
>> wrote:
>>> On 2008-07-21 Scott Bennett wrote:
>>>> On T
On Tue, 22 Jul 2008 14:02:10 +0200 Ansgar Wiechers <[EMAIL PROTECTED]>
wrote:
>On 2008-07-21 Scott Bennett wrote:
>> On Tue, 22 Jul 2008 05:24:22 +0200 "=?UTF-8?Q?Tom=C3=A1s_Arribas?="
>
der of junk deleted --SB]
Is there some good reason for posting crap like the above to this list?
It's bad enough that some insist upon posting their message along with an
HTML duplicate, but at least there is usually some original text content.
Scot
Looks like 0.2.1.2-alpha also gives the weird message before shutting
down. After starting it the first two times, I had to shut it down almost
immediately in order to shut the system down again. Here are the log file
entries from the second shutdown.
Jul 03 05:51:51.772 [notice] Tor 0.2.1.
On Thu, 3 Jul 2008 03:48:04 -0400 Roger Dingledine <[EMAIL PROTECTED]>
wrote:
>On Thu, Jul 03, 2008 at 02:18:29AM -0500, Scott Bennett wrote:
>> I just shut down 0.2.1.1-alpha in order to boot Win XP for a while, and
>> then after rebooting FreeBSD, to try 0.2.
exit now.
Jul 03 02:02:02.053 [notice] Clean shutdown finished. Exiting.
Jul 03 02:02:02.159 [warn] Still had some address policies cached at shutdown.
Can anyone tell me what it means, please?
Scott Bennett, Comm. ASMELG, CFIAG
On Sat, 14 Jun 2008 22:26:56 -0400 Roger Dingledine <[EMAIL PROTECTED]>
wrote:
>On Sat, Jun 14, 2008 at 08:57:31PM -0500, Scott Bennett wrote:
>> I just came home and found tor had crashed. I've been running
>> 0.2.0.20-rc
>> lately, which is the first
er version already?
Thanks in advance.
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: ben
ile
>these all died.
>
>So, my question is, does tor depend explicitly or implicitly on time
>synchronization? Perhaps via the "published" line in the
>cached-routers list?
>
Did you check the log file(s)? There were most likely at least
several complaints issued b
ld have thought that OpenBSD
would have been the operating system of choice.
Scott Bennett, Comm. ASMELG, CFIAG
**
On Mon, 09 Jun 2008 23:11:35 -0700 Jack Straw <[EMAIL PROTECTED]>
wrote:
[duplicate copy of previous postings deleted --SB]
>Scott Bennett wrote:
> > On Mon, 09 Jun 2008 20:51:10 -0700 Jack Straw
><[EMAIL PROTECTED]>
> > wrote:
> >> F. Fox wr
ter your little accident occurred: roll a 20-sided die to
determine how many more times you will access the account via the tor
network before abandoning the account, so that the cessation of accesses
will not so obviously point to your IP address.
I realize that may not seem to be much consolation, but you shoul
On Sat, 07 Jun 2008 16:15:10 +0300 Eugen <[EMAIL PROTECTED]> wrote:
>Scott Bennett wrote:
>> On Sat, 07 Jun 2008 14:00:05 +0300 Eugen <[EMAIL PROTECTED]> wrote:
>>
>>> I want to run a Tor middle node on a NSLU2 device (266Mhz, 32 MB RAM).
>>&
ing factor is that
once the A RR has been updated to reflect the new IP address, tor takes up
to ten minutes to notice that change and reinitialize everything. Check the
web site at www.dyndns.org for more information. There are other services
out there, too, if
t, though, that a list of
>trusted exit nodes will be publicly compiled. I think you have to do =
>your
>own investigations and come up with your own list.
>=20
I assume you missed all the Summer of Code project descriptions and
discussions about exit scanners on this list over the
rongly the need for freedom of speech.
>
It surely does *not* sound like you give much thought to other
people's rights at all. Maybe "Curious Kid", rather than "Thoughtful,
On Mon, 02 Jun 2008 13:26:36 -0700 "F. Fox" <[EMAIL PROTECTED]>
wrote:
>Scott Bennett wrote:
>> I just noticed a case of six connections to my server's ORPort that all
>> came from the same IP address. I'm trying to think of some legitimate reas
ant distinction, but only in the context of assuming
the responsibility for all your traffic, as noted above.
>
>However the following weekend my house was broken into and someone obviously
>was looking for something I no
On Sun, 1 Jun 2008 13:19:05 -0700 coderman <[EMAIL PROTECTED]> wrote:
>On Sun, Jun 1, 2008 at 1:08 PM, Scott Bennett <[EMAIL PROTECTED]> wrote:
>> ...
>> What would a tor process making connections from behind a NAT server
>> have to do with whether there
On Sun, 1 Jun 2008 10:51:33 -0400 Geoffrey Goodell
<[EMAIL PROTECTED]> wrote:
>To: or-talk@freehaven.net
>Cc: [EMAIL PROTECTED]
Not sure here why you posted twice, but...
>On Sun, Jun 01, 2008 at 08:44:09AM -0500, Scott Bennett wrote:
>> I just noticed a case
Any ideas out there?
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: bennett at cs.niu.edu *
*---
;t start doing
it more often, I'll stick with 0.2.0.20-rc for now. 0.2.0.21-rc through
0.2.0.25-rc are all unusable for servers as far as I'm concerned. Unless
someone has identified the cause of and fixed this bug in 0.2.0.26-rc, I
think I should assume that it wou
n't run an exit. Relay-only servers are still
helpful.
Scott Bennett, Comm. ASMELG, CFIAG
**
* Inte
now ...
>
>Quoting Jonathan Addington <[EMAIL PROTECTED]>:
>
>> (1) Make sure your firewall isn't blocking said ports.
>> (2) If you have a router make sure that said ports are being
>> forward to the
>> computer running Tor. This is usually easier if yo
ast
>Guard
>Hibernating
>Named
>Stable
>Running
>Valid
>V2Dir
These have been explained in the documentation available at the
www.torproject.org web site. Have you read it? If you have read it and
still do not understand the explanations, please let us know.
On Wed, 21 May 2008 12:04:30 +0100 Mike Cardwell <[EMAIL PROTECTED]>
wrote:
>Scott Bennett wrote:
>
>>> The standardised port for SMTP submission is 587. See
>>> http://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol specifically
>>> "Altho
On Wed, 21 May 2008 11:02:11 +0100 Mike Cardwell <[EMAIL PROTECTED]>
wrote:
>Scott Bennett wrote:
>
>>>> Can I get some feedback regarding the deployment of an exit node
>>>> restricted to port 443?
>>>>
>>>> My rationale is fairly
he server operator) exits,
as is 993 (imaps). I think there are other harmless ones, too, like 123 (ntp,
though why would anyone bother to use it?:-), 989 (ftps-data) and 990 (ftps),
22 (ssh), 481 (ph), and doubtlessly some others.
Scott Bennett, Comm. ASMELG, C
vulnerable at present for me to provide exit service for port 80,
but do provide it for many other ports on my server (MYCROFTsOtherChild --
look for its exit policy in your cached-descriptors file if you're curious).
I have not gotten any complaints about it from my ISP so far either.
On Sun, 18 May 2008 13:10:01 -0700 Ben Wilhelm <[EMAIL PROTECTED]>
wrote:
>Scott Bennett wrote:
>> It's
>> worth noting that the BSD users and even LINUX users don't have Windows
>> users' problem of always having to watch where they step to avoid
On Sun, 18 May 2008 16:25:58 +0200 Andrew <[EMAIL PROTECTED]> wrote:
>Scott Bennett wrote:
>> For those who are interested in seeing how little difference in
>> principle
>> there is between the U.S. government of today and that of Stalin's U.S.S.R.
&
rce's desire to be able to take over any and every
computer on the net, regardless of where those computers may be. They want
not only to be able to take control of those computers, but also to be able
to install undetectable spyware.
Scott Bennett, Comm. ASM
On Fri, 16 May 2008 09:03:46 +0200 [EMAIL PROTECTED] wrote:
>On Thu, May 15, 2008 at 11:50:12PM -0500, Scott Bennett wrote:
>> On Fri, 16 May 2008 04:11:15 +0200 [EMAIL PROTECTED] wrote:
>> >I seem to remember that, when I set up my tor node, the instructions
>>
;
>Any one have thoughts, besides NOT running an exit node?
>
You could use ExitPolicy lines in torrc either to a) prevent exits to
the port(s) in question or b) prevent exits to those particular IP addresses
or, more specifically, to those IP address and port combinations.
ate
server and should probably be changed.
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: bennett at cs.niu.edu *
*
g new ones to be
generated that don't match the ones they registered with the authority
administrators. New keys mean new fingerprints, of course.
Scott Bennett, Comm. A
compromised would have been enough to have
>spoofed the entire Tor network.
>
>
>OR-Talk users should always suspect a group of people who attempt a
>character assassination of a lone individual on this forum. Its often
>accompanied by flamers and accusations that the targe
there. After seeing your note, I tried
that site, too, and it told me I was connecting from MIT. (I'm in
Illinois.:-)
>where I start using Privoxy and/or other techniques described in the
>TOR-FAQ?
>
privoxy is only useful for HTTP and HTTPS connections. tor itsel
onf file and telling tor about it with ServerDNSresolvConfFile?
Note that ServerDNSSearchDomains may also be helpful, depending upon your
setup.
Scott Bennett, Comm. ASMELG, CFIAG
**
* Interne
rge number of exits running at any given time, so you may
want to choose only exits with at least some fairly good bandwidth, say,
300 KB/sec or so. In my experience, though, if the file is available for
download, it is much better to do that and then play the file locally than
it is to try to play it in streaming mode
Can someone tell me what the default value(s) is(/are) for DirPolicy?
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: bennett at cs.niu.edu
protections found in the
U.S. Constitution. (Not that that really matters here, I suppose, now that
our Constitution has been abandoned and our lawful government displaced by
the world's most powerful merger of crime syndicates.)
ny now that the use of a minority fraction of the total server count
is not a significant risk factor.
It looks to me as though we may have a design embryo already. Perhaps
Roger and Nick could comment and give their thoughts on what else may be
needed for it.
ree time on
their hands.
And now we return you to the subject of the list...
Scott Bennett, Comm. ASMELG, CFIAG
ver) via fully encrypted paths the
queried server's local directory of extra hops to such local exit servers.
(N.B. that "local" simply means "directly connected"; i.e., "
es to pass packets to the ORPort because the packets from the original
exit node would simply travel along the connection established by that
particular limited exit node.
Scott Bennett, Comm. ASMELG, CFIAG
**
On Fri, 25 Apr 2008 02:59:03 -0400 Roger Dingledine <[EMAIL PROTECTED]>
wrote:
>On Fri, Apr 25, 2008 at 12:40:47AM -0500, Scott Bennett wrote:
>> That's possible. Nevertheless, with 0.2.0.19-alpha and earlier, the
>> speculative interaction didn't happ
ave asked me to do that for some
problem, I was unable to get a response to that question after I'd collected
the log output for them, so I'm hesitant to tie up that much space again unless
I know in advance what to do with it.
Sc
gain to
0.2.0.19-alpha, the last release that didn't have the clock jump problem.
Sigh.
Apr 24 14:28:06.232 [notice] Interrupt: will shut down in 1500 seconds.
Interrupt again to exit now.
Apr 24 14:31:00.686 [warn] Your system clock just jumped 146 seconds forward;
assuming established cir
depend upon RDRs in a router somewhere,
and b) the OutboundBindAddress line, which actually is more likely to defeat
balancing than to aid in it.
Comments?
Scott Bennett, Comm. ASMELG, CFIAG
the other way around, i.e., PETA and
Sinn Fein (allegedly) avoid illegal activity themselves, but provide
above-ground propaganda to the world regarding their respective
terrorist sister organizations, which *do* act illegally. Some tor
server operators may privately agree with the terrorist act
t; Best wishes for a successful project!
>
>Thanks you very much for your suggestions, they are relevant, and I
>would enjoy to have such data available for my relay :)
>
De rien. My guess is that most system administrator types with any
interest in tor would
On Sat, 5 Apr 2008 19:49:46 -0700 coderman <[EMAIL PROTECTED]> wrote:
>On Sat, Apr 5, 2008 at 1:47 PM, Scott Bennett <[EMAIL PROTECTED]> wrote:
>> ... Here is some of yesterday's notice-level log from my tor (0.2.0.23-rc)
>> ...
>> Those are a
.2.0.22-rc,0.2.0.23-rc
Those are all of the messages issued thus far, so 0.2.0.19-alpha has been
running with no problems for over 25 hours. I will continue to watch the list
for news of a new release to try, but for now, the *-rc versions are quite
unusable as servers.
(polippix.org) It is based on Tor and
>> Kubuntu.
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: bennett at cs.niu.edu *
*---
dresses are, after all, the only way that TCP
connections of any kind do get made. If all you have
is a host+domain name, you have to resolve it to an IP
address in order to establish a connection. TCP and
IP know nothing about names.
Also, SmartFilter would have to maintain a *lot*
of state in
>
>36035
>[PSH, ACK] Seq=1 Ack=1 Win=33120 Len=586 TSV=174886023 TSER=4294847018
>
>156153.579866 192.168.0.100 193.137.211.90 TCP 36035 >
>spytechphone
>[ACK] Seq=1 Ack=587 Win=336 Len=0 TS
message to appear. Something
very weird is going on here.
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: bennett at
ge might possibly have been
made earlier than that, but with the symptoms not appearing for some reason
until 0.2.0.21-rc.
Scott Bennett, Comm. ASMELG, CFIAG
***
on cpu1. Hmmm...I suppose I ought to comment out the "NumCPUs 2" line
in torrc until I reenable hyperthreading, but with the machine running at over
99% idle most of the day, it probably makes no real difference anyway.
Scott Bennett, Comm. ASMELG, CFIAG
*
On Mon, 31 Mar 2008 22:49:05 -0700 Lucky Greeen <[EMAIL PROTECTED]>
wrote:
>Scott Bennett wrote:
>> It appears that the "clock jump" problem does persist into 0.2.0.23-rc.
>> Here are the notice-level log messages since I started up the new version
&
On Tue, 1 Apr 2008 08:25:21 +0200 Peter Palfrader <[EMAIL PROTECTED]>
wrote:
>On Mon, 31 Mar 2008, Scott Bennett wrote:
>
>> >Your client or cache probably got the bogus v2 networkstatus by going
>> >to one of the caches and asking for "all" v2 network
r work.
So I now have one example of the same problem with the new release
candidate that was present in 0.2.0.22-rc.
Does anyone have any ideas/thoughts/suggestions? Are any others running
tor under FreeBSD 6.3-STABLE or any other FreeBSD release seeing these
ever run VMware. The messages I've been getting, however, do not involve
backward jumps, just forward jumps, and do not stem from any sort of VM
software because I'm not running any VM software at present. (None seems
to
On Mon, 31 Mar 2008 22:20:53 -0400 Roger Dingledine <[EMAIL PROTECTED]>
wrote:
>On Mon, Mar 31, 2008 at 07:56:29PM -0500, Scott Bennett wrote:
>> It has now been several hours since I posted a message about an impostor
>> authority. Having received no response thus
seeing this weird clock jump message when no clock jumps
appear to be happening, please post any information you have about it to the
list.
Thanks much.
Scott Bennett, Comm. ASMELG, CFIAG
*
lid V2Dir
Notice the "Authority" flag in the "r" line above. This flag does not appear
for this router in any of the other four cached-status files.
So how do I block this bogus cached-status file and its illegitimate
"Authority" flag for a screwed
file and its illegitimate
"Authority" flag for a screwed up router with bad contact information?
Scott Bennett, Comm. ASMELG, CFIAG
statistics regarding cells dropped for each of the possible
reasons, and
j) statistics on various directory service operations.
Best wishes for a successful project!
Scott Bennett, Comm. ASMELG, CFIAG
*
spoken? Using this method,
does it make a difference whether the language of your request matches the
language of the server's country?
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet: bennett at cs.niu.
On Mon, 17 Mar 2008 00:12:06 -0400 Roger Dingledine <[EMAIL PROTECTED]>
wrote:
>On Sun, Mar 16, 2008 at 01:27:38AM -0500, Scott Bennett wrote:
>> Something weird seems to be happening several times a day since
>> I installed 0.2.0.21-rc. The tor traffic drops to no
at could
possibly be affecting tor's mechanism for determining whether it has been
unexpectedly dormant?
Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:
political action pages at www.capwiz.com/ala/home,
which includes links on the topics of National Security Letter oversight
legislation and anti-national ID legislation, as well as other interesting
matters.
its own
>uptime? The system uptime looks valid to me. What causes this to happen?
>Is there a way to fix it while it's running? Or does it just have to be
>restarted?
Scott Bennett, Comm. ASMELG, CFIAG
**
*
. What exactly is it complaining about? An error in its own
uptime? The system uptime looks valid to me. What causes this to happen?
Is there a way to fix it while it's running? Or does it just have to be
restarted?
Scott Bennett, Comm. ASMELG,
statement?
>
>I must say, I feel that 3 very deliberate and clumbsy attempts have
>been
>to shoot down such a VERY obvious and sound scenario.
>
>Why so?
>
>Are we here not interested in protecting our
ing to
> send to an OR as soon as we are connected". Might help with bug 600.
>- Add an in-place version of aes_crypt() so that we can avoid doing a
> needless memcpy() call on each cell payload.
>
Looks wonderful, Roger! Thanks, you gu
On Sun, 10 Feb 2008 07:54:06 GMT "Paul Ferguson" <[EMAIL PROTECTED]>
wrote:
>- -- Scott Bennett <[EMAIL PROTECTED]> wrote:
Huh. Nice of you to delete the attribution to Roger Dingledine.
> =
>
>>
>> $ telnet 212.112.242.159 80
>
se.
>
But, Roger, will the 0.2.0.19-alpha release at least confirm during
the reachability tests that it is talking to itself and not to some other
server?
Scott Be
case would
be reachable, but the tor server would not.
It makes me wonder what other glaring holes may exist in tor's various
checking/testing routines.
Scott Bennett, Comm. ASMELG, CFIAG
501 - 600 of 750 matches
Mail list logo