[...]
I found this problem too but as I could understand the registration for
the accounts with gpg need to be made by hand by the operators so we
need to wait one or two weeks.
I also be waiting.
--
Ciao
leandro
pgpErNoxB1uU9.pgp
Description: PGP signature
Karsten Loesing ha scritto:
[...]
So, these options won't help you. You shouldn't enable them, or your Tor
will behave funny.
Well, so I understood right!
;-)
Can you instead learn the number of connections to your hidden service
from your webserver (or whatever kind of server that is)?
Ciao a tutti,
I would like to control the usage (the amount of connections or
something like) to a hidden service I have.
In the man page (0.2.2.1-alpha-1 version) I found these directives:
AuthoritativeDirectory 0|1
When this option is set to 1, Tor
Ciao a tutti
From today 17 august 2009 is active a new mirror of the
http://www.torproject.orgsitereachableattheaddress
http://torproject.cybervalley.org. The mirror is updated every four
ours
P.S.: do you know if it will be possible to have an ssl
Ciao a tutti,
I have a tor client running 24h and I would like to serve two different
hidden services via http on it. So I run two different web server, one
on 8183 and another on 8184 port and I wrote these lines in my torrc
HiddenServiceDir /var/lib/tor/server-1/
HiddenServicePort 80
jon ha scritto:
Just a couple of notes, since some Tor Project website mirror
operators may be subscribed to this list:
I would like to setup a mirror for tor website but I need to know how
much disk space needs.
[...]
--
Ciao
leandro
Io non voglio sapere tutto, io voglio capire tutto
John Brooks ha scritto:
Removing '-t nat' from the last rule should do what you need. Only the
first two really need to be in the NAT table (because they are
modifying the traffic, not filtering it).
[...]
iptables -t nat -A OUTPUT -p tcp -m owner --uid-owner anonymous -m tcp
--syn -j
leandro noferini ha scritto:
[...]
Ok, now ipfilter does not complain but I cannot connect anymore.
:-(
I will investigate more.
I applied these rules for iptables (in this order):
iptables -A OUTPUT -p tcp -m owner --uid-owner anonymous -m tcp --syn -j
REDIRECT --to-ports 9040
Ciao a tutti,
in tor wiki at the address
http://wiki.noreply.org/noreply/TheOnionRouter/TransparentProxy#head-235f10e71909d609c46847c9f91efe8ed5168004
explains the way to apply a trasparent proxy for a specific user.
The rules for iptables are
iptables -t nat -A OUTPUT -p tcp -m owner
Marco Bonetti ha scritto:
I use the trasparent proxy through tor to connect for a user but I would
like to exclude some networks (vpn with a 192.168.X.X address): I could
do?
Tor should already ignore the local net address like yours by default,
unless you explicity set
Ciao a tutti,
I am using the method explained at
http://wiki.noreply.org/noreply/TheOnionRouter/TransparentProxy to have
a trasparent proxy for a specifical user on a debian/i386 unstable.
I use these rules for iptables:
iptables -t nat -A OUTPUT -p tcp -m owner --uid-owner anoymous -m tcp
M. Peterson ha scritto:
Hi
want to know, if tor is as well an email mixmaster,
I wrote a small document about the use of some email programs for unix
shell (mutt, msmtp and fetchmail) and socat to concatenate these with
tor to send and receive anonymous emails.
The work is quite
Ciao a tutti,
I found this error in syslog
Nov 13 08:38:23 nemo Tor[2370]: Requested exit point
'$847B1F850344D7876491A54892F845934E4EB85D' is not known. Closing.
Nov 13 08:38:23 nemo Tor[2370]: Making tunnel to dirserver failed.
What does it mean?
--
Ciao
leandro
Un esteso e normale uso
Ciao a tutti,
I was making some experiments with fetchmail + tor and I found a strange
behaviour: at the address
https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO/EMail
there is this example:
set no spambounce
set no bouncemail
poll provider
plugin socat STDIO
14 matches
Mail list logo