Good news! I have identified the issue and fixed it. Turns out that the RPATH
wasn't actually embedded in the binary, so the loader couldn't find the common
library on most machines.
Before:
$ objdump -x /usr/bin/onions-client | grep RPATH
$
After:
$ objdump -x /usr/bin/onions-client | grep RP
On Wed, 30 Sep 2015 17:12:53 +, Tim Wilson-Brown - teor wrote:
...
> Are there any use cases that:
> * need NAT punching,
> * don???t need service location anonymity, and
> * would benefit from lower latency?
Of course. All the cases where you set up a hidden service
exactly because your host
Heads-up everyone,
After some debugging with s7r, it appears that sometimes the programs
(onions-server, onions-hs, or onions-client) fail to start because they cannot
load the common library. So if you run any of the programs in the terminal, you
will see an error that libonions-common.so can
Hi All, Hi Tim!
> Do you know a use case which needs Single Onion Services and NAT punching?
chyaa! NAT has ruined the Internet, violates the end to end principal
and make it more difficult to develop decentralized systems.
*deep sigh*...
Obviously, centralized systems design contributes to human
Hi,
Nick Mathewson:
Draft proposal -- no number yet: How to safely drop support
for old clients.
I feel like "safely" sounds too fluffy and not reflective of the
proposal.
- How to force-drop support for old clients.
or
- How to depreciate support for old clients.
The secon
On Wed, 2015-09-30 at 15:39 +0200, Tim Wilson-Brown - teor wrote:
> > First, Tor adds the line "ACE :" to the
> > node's
> > Second, Tor allows connections to ip:port as if the torrc contains
> > :
> >ExitPolicy allow:
> > As ExitPolicyRejectPrivate defaults to 1, these policies should be
> On 30 Sep 2015, at 17:27, Tom van der Woerdt wrote:
>
> ...
>
> Filename: xxx-intro-rendezvous-controlsocket.txt
> Title: Load-balancing hidden services by splitting introduction from
> rendezvous
> Author: Tom van der Woerdt
> Created: 2015-09-30
> Status: draft
>
> 1. Overview and mo
I developed a scheme to rate limit hidden services using proof-of-work;
https://gist.github.com/evandentremont/a3ad12a5cc3a924dae34
The server sends a semi-prime to the client, which then factors it. The
client submits the factored primes back with the next request. The 'rate'
can be throttled by
Hey all,
I'd like your thoughts and comments on this proposal.
Tom
PS: If you want to deliver them in person, I'm in Berlin.
Filename: xxx-intro-rendezvous-controlsocket.txt
Title: Load-balancing hidden services by splitting introduction from
rendezvous
Author: Tom van der Woerdt
Cr
Hi All,
Do you know a use case which needs Single Onion Services and NAT punching?
We’re wondering if there are mobile or desktop applications / services that
would use a single onion service for the performance benefits, but still need
NAT punching. (And don’t need the anonymity of a hidden se
Hi,
comments inline.
On 09/30/2015 12:01 PM, Nick Mathewson wrote:
Early versions of Tor checked the recommended-versions field in the
directory to see whether they should keep running. If they didn't
recognize
you did the thing where you
To override this, a Tor instance m
> On 30 Sep 2015, at 12:01, Nick Mathewson wrote:
>
> [This isn't done yet, but I've shown it to enough people that I should
> share it with the list.]
>
> 1. Introduction and background
>
> 1.1. Motivation
>
> Frequently, we find that very old versions of Tor should no longer be
> suppor
> On 30 Sep 2015, at 14:53, Jeff Burdges wrote:
> ...
> Filename: xxx-anycast-exit.txt
> Title: Anycast Exit
> Author: Jeffrey Burdges
> Created: 28 September 2015
> Status: ?
> Implemented-In: ?
> …
> Server Side
>
> We propose an AnycastExit Tor configuration option
>
>AnycastExit :
>
The Third International Conference on Green Computing, Technology and
Innovation (ICGCTI2015)
Universiti Putra Malaysia, Selangor, Malaysia
8-10 December 2015
http://sdiwc.net/conferences/icgcti2015/
The proposed conference on the above theme will held over three days,
with presentations deliv
I have attached below the second half of the Special-Use TLD proposal
that discusses how a local name service tool contact a peer-to-peer
application running on an exist node
There is nothing specific here to providing name services, any peer-to
-peer application might potentially want an anycas
Yes I did. Here's the modified proposal.
Filename: ExtraRelayDescriptorFields.txt
Title: Adding X-namespace to extra-info descriptor for key:value pairs
Author: Virgil Griffith
Created: 2015-09-30
Status: Open
1. Motivation
We wish to allow developers to build new applications atop relays. Towa
Dear Virgil,
On 9/30/15, Virgil Griffith wrote:
> Filename: ExtraRelayDescriptorFields.txt
> Title: Adding x-namespace to relay descriptor for key:value pairs
> Author: Virgil Griffith
> Created: 2015-09-30
> Status: Open
>
>
> 1. Motivation
> We wish to allow developers to build new applications
Filename: ExtraRelayDescriptorFields.txt
Title: Adding x-namespace to relay descriptor for key:value pairs
Author: Virgil Griffith
Created: 2015-09-30
Status: Open
1. Motivation
We wish to allow developers to build new applications atop relays. Towards
this end, we wish to add the ability for use
[This isn't done yet, but I've shown it to enough people that I should
share it with the list.]
1. Introduction and background
1.1. Motivation
Frequently, we find that very old versions of Tor should no longer be
supported on the network. To remove relays is easy enough: we
simply upda
Op 12/07/15 om 23:48 schreef John Brooks:
Hello!
George and I, along with the other participants of this hidden services
meeting, have written a proposal for the idea to merge hidden service
directories and introduction points into the same entity along with proposal
224.
Comments are encourage
20 matches
Mail list logo