s7r:
> Thank you! I can see the package in the main pool, but wanted to ask
> something: any reason why this is not available using:
>deb http://deb.torproject.org/torproject.org `$lsb_release -c` main
>
> Basically the same where Tor, tor-arm and obfsproxy are available too?
Because obfs4pro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/26/2014 7:56 PM, Lunar wrote:
> s7r:
>> 2. Configured some obfs4 bridges using obfs4proxy. They work
>> very good, however it's a little bit complicated since package
>> obfs4proxy exists in Debian sid, but not in deb.torproject.org,
>> so you
Hello again!
I want to reiterate very strongly that this page needs to be closed OR
at the very least should point to the official git.tpo code. Please, who
ever has admin right to the Google code torsocks page, manifest
yourself.
This is important, the 1.3 code is not safe and unmaintained.
Tha
s7r:
> 2. Configured some obfs4 bridges using obfs4proxy. They work very
> good, however it's a little bit complicated since package obfs4proxy
> exists in Debian sid, but not in deb.torproject.org, so you have to
> add sid repo to sources.list, install obfs4proxy and then make sure
> you edit apt
On Sun, 26 Oct 2014 14:34:59 +0100
Rob van der Hoeven wrote:
> So, the SOCKS protocol supports redirection to another SOCKS server.
> An all-zero address/port simply means: use the server/port that you
> are currently connected to.
That's a really interesting way of interpreting that part of th
On Sun, 26 Oct 2014 17:16:46 +0200
s7r wrote:
> 3. Last thing, the page https://bridges.torproject.org/ does not
> contain obfs4 in the drop-down list where the user needs to select the
> pluggable transport. It only allows requests for obfs2, obfs3,
> scramblesuit and fteproxy bridges. Don't know
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
1. I have noticed that the Vidalia Relay Bundles for Windows available
to download on torproject.org are using Tor 0.2.4.23, while we are on
0.2.5.10 as stable branch. I know 0.2.4.23 is still on the recommended
list in the consensus, but since someone
> address. When the connection gets granted I am getting a response from
> the socks server:
> (hex data of the tcp payload)
>
> 0x05 0x00 0x00 0x01 0x00 0x00 0x00 0x00 0x00 0x00
>
> Regarding to the SOCKS specification this means that the request is
> granted. But I don't understand the 0x01 i
On Sun, 26 Oct 2014 02:07:26 -0700
David Fifield wrote:
> On Sun, Oct 26, 2014 at 08:41:08AM +, Yawning Angel wrote:
> > Hello,
> >
> > "You are in a maze of twisty little firmwares, all terrible".
> >
> > I'm at the point where the new and improved firewall helper could
> > use some addit
On Sun, Oct 26, 2014 at 08:41:08AM +, Yawning Angel wrote:
> Hello,
>
> "You are in a maze of twisty little firmwares, all terrible".
>
> I'm at the point where the new and improved firewall helper could use
> some additional testing by various users, though there's some issues
> with the de
Hm... Did you try Wireshark on it?
2014-10-26 11:46 GMT+03:00 spriver :
> Hi everyone!
>
> I am trying to understand the communication between an application and Tor
> (especially connecting to a hidden service). I am tracing packets on
> loopback between a torified netcat request to connect to a
Hi everyone!
I am trying to understand the communication between an application and
Tor (especially connecting to a hidden service). I am tracing packets on
loopback between a torified netcat request to connect to a .onion
address. When the connection gets granted I am getting a response from
Hello,
"You are in a maze of twisty little firmwares, all terrible".
I'm at the point where the new and improved firewall helper could use
some additional testing by various users, though there's some issues
with the design that still need to be resolved. But not being one
to keep issues inheri
On 23/10/14 19:32, David Fifield wrote:
> In the past few months of bridge user graphs, there is an apparent
> negative correlation between obfs3 users and vanilla users: when one
> goes up, the other goes down. If you draw a horizontal line at about
> 5500, they are almost mirror images of each ot
14 matches
Mail list logo