Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-21 Thread Fabio Pietrosanti (naif) - lists
On 1/20/15 1:15 AM, Nik wrote: > Hi tor-dev, > > I care deeply about the ability for people to have anonymity online, and > I've always been really interested in exactly how Tor works. > > So for a class project last semester I wrote oppy, an onion proxy in > 100% Python. I spent most of my winte

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-21 Thread Damian Johnson
> Yes, thanks for the reminder. I meant to do this earlier but apparently > forgot. I just added an issue on Trac with a more complete description > and code to reproduce: https://trac.torproject.org/projects/tor/ticket/14314 Thanks Nik! Think I know what's going on and agreed that it doesn't mat

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-21 Thread Yawning Angel
On Wed, 21 Jan 2015 10:20:36 -0800 Damian Johnson wrote: > > Now that I think about it, something that would be great to have in > > Stem would be path selection capabilities. So something like, say, > > given a list of RelayDescriptors and some constraints that must > > hold for a path, return s

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-21 Thread Damian Johnson
> There's a mostly complete implementation in torps, that uses stem. The > code isn't very Python-like as afaik it's a straightforward conversion > of the tor path selection code. The last time I tried this, > downloading and processing all the documents took forever and consumed > a hilarious am

Re: [tor-dev] [PATCH] torify/torsocks and TCP Fast Open

2015-01-21 Thread David Goulet
On 14 Jan (16:25:17), Tim Ruehsen wrote: > Upps, I made a last second failure... > > Here is the amended (and working) patch. Hey! Sorry for the delayed response, too many things at once! :) I've done some fixes on the patch that I'll be merging in a jiffy, I've outlined them to you below. (mos

Re: [tor-dev] [PATCH] torify/torsocks and TCP Fast Open

2015-01-21 Thread Yawning Angel
On Wed, 21 Jan 2015 15:26:56 -0500 David Goulet wrote: > > +/* > > + * Using TCP Fast Open (TFO) uses sendto() instead of connect() > > with 'flags' > > + * set to MSG_FASTOPEN. Without this code, using TFO simply > > bypasses TOR > > + * without letting the user know. > > + * > > + * This soluti

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-21 Thread Nik
Yawning Angel, This is great, thanks for posting. I wasn't aware of torps, and this will save a bunch of work. Best, Nik On 01/21/2015 01:08 PM, Yawning Angel wrote: > On Wed, 21 Jan 2015 10:20:36 -0800 > Damian Johnson wrote: > >>> Now that I think about it, something that would be great to h

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-21 Thread Nik
Hi meejah, Thanks for checking it out! > For sure "prototyping stuff" was the first thing that sprang to my mind > as being useful; I've always had good success using Python to do > proof-of-concept things -- and sometimes it's simply fast enough > already. Yes...I've actually been somewhat plea

Re: [tor-dev] oppy - an Onion Proxy in Python

2015-01-21 Thread Nik
Hi naif, Thanks for the input. This is good to know. The ability to build internal circuits and at least access hidden services as a client is a feature that I definitely consider "must-have" at some point in the future. There are a number of things that have precedence over implementing this, th

[tor-dev] lifespan of deprecated "ORListenAddress" configuration option

2015-01-21 Thread Frédéric CORNU
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Dear all, The Tor Manual [1], as of today, says that ORListenAddress option is deprecated and that same behaviour can be achieved by specifying the listening address within the ORPort option. Although using ORPort to specify listening address works