On Tue, 10 Oct 2006 23:27:09 -0400, "Roger Dingledine" <[EMAIL PROTECTED]> said:
>
> Unfortunately, both of those answers use the old version 1 directory
> protocol (from Tor 0.1.0.x), which is deprecated at this point. So both
> of those techniques will be somewhat inaccurate.
>
My version of
On Tue, Oct 10, 2006 at 07:28:06PM -0700, Mr. Blue wrote:
> Hey thanks guys!
>
> You were both vey helpful!
Unfortunately, both of those answers use the old version 1 directory
protocol (from Tor 0.1.0.x), which is deprecated at this point. So both
of those techniques will be somewhat inaccurate.
Hey thanks guys!
You were both vey helpful!
Thanks again
__
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
I wrote a little script a while ago that may be useful to you:
http://infosecpotpourri.blogspot.com/2006/08/listing-active-tor-servers.html
Whenever you run it, the script queries one of the authoritative
directory servers and dumps that server's list of known nodes. A
quick-and-dirty hack, to b
>-Original Message-
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Mr. >Blue
>Sent: Tuesday, October 10, 2006 5:30 PM
>To: [EMAIL PROTECTED]
>Subject: List of NODES in IP form
>Hello,
>this is my first post here.
>So, client(user) obtains a list of Tor nodes from a
>di
5 matches
Mail list logo