--- On Mon, 12/15/08, Sven Anderson wrote:
> As long as you allow
> arbitrary ports your bandwidth is always maxed out because
> of file transfers. If you only allow port 80 you have a very
> erratic bandwidth usage.
So if you have only port 80 open, your connection is being under-utilized.
> Of
This:
> I just wish there were a better way to
> inspect the
> traffic and disallow certain traffic.
seems to contradict:
> Don't get me
> wrong, I'm not
> advocating that any relay inspect any traffic,
Do you mean you want a way to *automatically*, without
recording/logging/inspecting persona
> Mozilla Firefox sends your computer's uptime while
> establishing TLS
> (SSL) connection. This could be used to correlate anonymous
> traffic with
> non-anonymous (e.g. LAN traffic) by correlating intercepted
> uptime
> values (or to search the originator of anonymous traffic by
> correlating
> u
Is it normal for dirport connections to consume 4x-5x
as much bandwidth as orport connections use on a
server? Whenever I enable the dirport I see my
outgoing traffic dominated by dirport connections.
B
> Yes, I got the messages as well. The solution is:
> the machine
> geoip.vidalia-project.net runs on had a hardware
> problem yesterday and isn't
> fixed yet and therefore not reachable.
After setting SafeLogging 0 as Roger suggested, I see
that it is geoip.vidalia-project.net too.
--- john smith <[EMAIL PROTECTED]> wrote:
> Also, vidalia 0.0.16.0 has crashed twice since I
> began running this
> version of Tor from around 07:00 on Tue, Feb 12,
> 2008. First time was
> 14/02/2008 & again on 19/02/2008. I have some logs
> from the Event
> Viewer if this is useful let me know &
I get the hourly scrubbed messages too. This instance
of Tor is only being used as a server and not a
client, so I don't expect to see these messages. What
could be going on?
Feb 20 00:11:51.103 [Notice] Have tried resolving or
connecting to address '[scrubbed]' at 3 different
places. Giving up.
--- tor user <[EMAIL PROTECTED]> wrote:
> Imagine what someone was doing with your new IP
> address the few hours before you had control of it,
> or
> the few hours after you release it, when such errors
> can happen.
Oops, sent the email too soon. I wanted to add:
I woul
--- [EMAIL PROTECTED] wrote:
> that's wrong: TOR also countermeasures traffic
> analysis and other sorts of information
> abuse.
> That's why i'm using TOR also for IRC and ICQ.
> To countermeasure taking a public IP number e. g.
> from an email header into a log file
> via an editor (e. g. for
--- Jon McLachlan <[EMAIL PROTECTED]> wrote:
> I have a bare-minimum linux box, much like a
> planetlab node that I'd
> like to use to deploy a Tor relay. In installing
> Tor, I am having
> trouble satisfying the dependencies for the latest
> stable tor linux
> source tarball (tor-0.1.2.18.ta
Sorry, I'd forgotten to mention that this was with the
latest Tor 0.2.0.15-alpha.
Though, the messages do not appear anymore, so it
looks like the poblem with the authority is fixed.
Be a better frien
Just started up my Tor client today and saw this
repeating in my log. Why are there signing keys made
up of zeroes? Is this a serious error, or just a
printing issue? It has been happening once or twice
per minute since I started it up.
Dec 30 19:38:49.286 [Notice] We're missing a
certificate fro
--- Paolo Palmieri <[EMAIL PROTECTED]> wrote:
> I'm not sure if you're actually coding the program
> or not.
Yup. Well, it is just something that I am
experimenting on.
> If you do,
> then you should probably have a look at the
> ProxySelector class:
>
http://java.sun.com/javase/6/docs/api/jav
--- tor user <[EMAIL PROTECTED]> wrote:
> (I don't want to VNC all the traffic from
> this system to the proxy, anyway).
Sorry to reply to myself. Of course, I meant to say
VPN, not VNC.
__
Do You Yahoo!?
Tired of spam? Yahoo!
--- James Muir <[EMAIL PROTECTED]> wrote:
> Java is not safe to use with Tor, or any other
> proxy-based anonymity
> system. It is possible for applets to override any
> proxy settings you
> might have set (i.e. an applet running in your
> browser can disregard
> your proxy settings and make a
Greetings,
(I'm not sure if this is exactly the right place to
discuss this, but it pertains to using proxies in Java
in a possibly unsafe manner, and this sort of thing
seems to only matter to users of Tor)
If I hava a Java program, and I do something like the
following:
Properties systemSett
..
a tor user
ps think nazis and the stealing wheelbarrows joke..
Andrew Del Vecchio wrote:
> Would it be off topic to discuss how various people obtain
> privacy/security in the "real world" as a way to better preserve it
> for the on-line world? I think this is a critica
Sveasoft is basically bug ridden and they like to lock binaries to mac
addresses(this is supposed to be GPL???)
try instead www.dd-wrt.com.. ful gpl compliance and works much better
than sveasoft..
a former very unhappy sveasoft customer..
Tony wrote:
> 1. a) Approx 50 metres. Depends on
is it just me or has the hidden-wiki disappeared?
a tor user wishes to know
Good idea. How can I do this without also breaking DNS lookups?
I am not sure if the following would work, but it is what I would try
first. With a bit of luck someone else can suggest a better solution,
or at least warn you if mine has an obvious fatal flaw. Anyway, as long
as you don't mind that
On 5/17/06, Peter Palfrader <[EMAIL PROTECTED]> wrote:
On Wed, 17 May 2006, Michael Holstein wrote:> >You are hurting the Tor network more than you realize. You are lying to> >clients and clients cache that answer. Don't do this.
I don't think it is as bad as that, seeing as the
'blocked' addre
2. Make all clients run a 1.5kb/s server as a minimum by default. Themore nodes the better the anonymity. Make this serving behaviour
mandatory as a minimum contribution to the network for any person usingit (see below for an idea of how to eliminate any node not relayingtraffic below)
Few ISPs wi
connecting to) as well as monitoring my computer (to see where the connections to my server came from)?Watson Ladd <[EMAIL PROTECTED]> wrote: Because anyone observing the SOCKS server will be able to see what you are doing just as well as if it was your computer.On 4/28/06, Tor User &l
nt is being used. Tor uses multiple endpoints for sucessive connections to avoid tracking a connection.On 4/27/06, Tor User <[EMAIL PROTECTED]>
wrote: I've been running an Tor server (middleman only) for a while and I've been wondering about using FreeCap and an account on an SSH
came from (to my knowledge). It does work on normal socks proxy chains because they aren't blind and many keep logs. Ringo On 4/27/06, Tor User <[EMAIL PROTECTED]> wrote: Thanks for the response. Just to clarify, I wasn't refering to routing other users circuts
as the exit point several times 3. It doesn't increase anonymity (perhaps generating cover traffic would be better) 4. Why don't you have your server fetch some SOCKS proxies from google and then route users through those instead? On 4/27/06, Tor User <[EMAIL PROTECTED]>
wrote:
Im wondering what the anonynimity implications the following:1) Running Tor using Freecap: By this I mean running a Tor client and using FreeCap to transparently redirect all of Tors network connections through a SOCKS proxy. This seems to work, and feels just like using Tor in the standa
IÂve been running an Tor server (middleman only) for a while and IÂve been wondering about using FreeCap and an account on an SSH server that has a SOCKS proxy to tunnel my Tor serverÂs connections over an SSH tunnel to the SOCKS proxy running on that SSH server. Hopefully I explained that cl
28 matches
Mail list logo