Hi all,
I'm occasionally seeing bursts of that in my log:
Jul 08 08:37:59.000 [warn] Your computer is too slow to handle
this many circuit creation requests! Please consider using the
MaxAdvertisedBandwidth config option or choosing a more restricted
exit policy.
I already have
On Sun, 08 Jul 2012 09:24:58 +, Andreas Krey wrote:
...
> This time I only stumbled over that because of how
> the traffic on my DSL link looked:
>
> http://nr1.h.apk.li/traf-21600s-2012-07-08.png
The vertical grid lines are twentieths of a day, or 72 minutes each.
The incident did thus go
>> And what about FF's 'are you sure want to connect
>> to this strange cert'... 'accept one time' or 'add and accept
>> forever' option? So why not dump the cert in the forever file?
>> But if that's not checking _at least_ the fingerprint, and hopefully
>> the cert chain, then it's useless for s
On 2012-07-08 09:24, Andreas Krey wrote:
> I'm occasionally seeing bursts of that in my log:
>
> Jul 08 08:37:59.000 [warn] Your computer is too slow to handle
> this many circuit creation requests! Please consider using the
> MaxAdvertisedBandwidth config option or choosing a more re
On Sun, 08 Jul 2012 10:41:32 +, Gitano wrote:
...
> Did you reboot your dsl router? IIRC, there was a similar problem when I
> run a Tor relay behind my Fritz!Box (AVM).
Nope. The DSL router is NetBSD/sparc, and it doesn't NAT; the tor relay
machine has its own public IP, so many TCP connectio
Hello,
did you ever use or test the torsocks socks auth/pass feature?
Here is my torsocks.conf:
local = 127.0.0.0/255.128.0.0
local = 127.128.0.0/255.192.0.0
local = 169.254.0.0/255.255.0.0
local = 172.16.0.0/255.240.0.0
local = 192.168.0.0/255.255.0.0
server = 127.0.0.1
server_type = 5
server_p
Just out of curiosity: Do you also get
"[notice] cull_wedged_cpuworkers(): Bug: closing wedged cpuworker. Can
somebody find the bug?
[err] cpuworker_main(): Bug: writing response buf failed. Exiting.
[warn] Tried to establish rendezvous on non-OR or non-edge circuit."
after several days of Tor runn
On Sun, 08 Jul 2012 16:08:14 +, Julian Wissmann wrote:
> Just out of curiosity: Do you also get
> "[notice] cull_wedged_cpuworkers(): Bug: closing wedged cpuworker. Can
> somebody find the bug?
Cute one. :-)
> [err] cpuworker_main(): Bug: writing response buf failed. Exiting.
> [warn] Tried t
Okay.
If that bug is triggered, it would show after 24-48 hours of Tor
running. It is actually (in theory) fixed now, but so far apparently
nobody has actually reported it to be fixed (in practise).
Its this one: https://trac.torproject.org/projects/tor/ticket/4345
As it triggers on FreeBSD, I'd as
On Sun, 08 Jul 2012 20:32:30 +, Julian Wissmann wrote:
...
> As it triggers on FreeBSD, I'd assume it to also do so on NetBSD.
Oh; you jumped the wrong trigger. :-) The router is NetBSD, the
tor node is linux. I didn't manage to get tor running on the router
itself due to problems getting eith
Ah, okay, so then you can probably just forget about it. Never had
that bug trigger on Linux.
Would've been interested about Tor performance on SPARC, though ;-)
> On Sun, 08 Jul 2012 20:32:30 +, Julian Wissmann wrote: ...
>> As it triggers on FreeBSD, I'd assume it to also do so on
>> NetBSD.
One man left a message for you
Only you can see the sender and content of your message, and you can delete it
anytime. You can instantly reply using our message exchange system:
http://eu1.badoo.com/0246897483/in/8sC4y.PIER4/?lang_id=3&m=63&mid=4ff9eb03329cd160
Some other people
* Andreas Krey wrote:
> I'm more interested in why I get smothered in circuits all of a sudden.
No idea what might be the root cause, but I've stumbled upon the very
same log message a few times.
Have a look at this:
https://lists.torproject.org/pipermail/tor-relays/2012-May/001352.html
HTH
-
Hallo,
I see some hidden services name like "name47ghg7i.onion" and I wanna have my
own onion address with "name" in front. how can I do this? sorry I looked in
list archives and docs.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://li
On Sun, Jul 8, 2012 at 5:08 PM, Juenca R wrote:
> Hallo,
>
> I see some hidden services name like "name47ghg7i.onion" and I wanna have my
> own onion address with "name" in front. how can I do this? sorry I looked in
> list archives and docs.
https://github.com/katmagic/Shallot
On 7/8/12 11:14 PM, Gregory Maxwell wrote:
> On Sun, Jul 8, 2012 at 5:08 PM, Juenca R wrote:
>> Hallo,
>>
>> I see some hidden services name like "name47ghg7i.onion" and I wanna have my
>> own onion address with "name" in front. how can I do this? sorry I looked in
>> list archives and docs.
>
kewl thanks you a lot!
On Sun, Jul 8, 2012 at 5:08 PM, Juenca R wrote:
> Hallo,
>
> I see some hidden services name like "name47ghg7i.onion" and I wanna have my
> own onion address with "name" in front. how can I do this? sorry I looked in
> list archives and docs.
https://github.com/katmagic
On Sun, Jul 08, 2012 at 09:35:07PM +0200, Julian Wissmann wrote:
> Would've been interested about Tor performance on SPARC, though ;-)
I run a Tor proxy (not router) on a FreeBSD/sparc64 machine (Sun V240,
2x1.5GHz) and have been pretty happy with it. Is there a benchmark I should
run?
--nwf;
__
On Mon, Jul 9, 2012 at 12:35 AM, Fabio Pietrosanti (naif)
wrote:
> It would be theoretically possible to speed up the process via GPU
> processing?
Yes, see the following thread:
https://lists.torproject.org/pipermail/tor-talk/2012-March/023805.html.
--
Maxim Kammerer
Liberté Linux: http://dee.
i'm wonder if it makes any sense to allow users to access a public web server
access normal at same time as hidden service on same machine?
The idea not about hiding the location of the server but protect user so server
can't know where user comes from (yes, I can also disable logging)
the hi
On Sun, 08 Jul 2012 21:35:07 +, Julian Wissmann wrote:
> Ah, okay, so then you can probably just forget about it. Never had
> that bug trigger on Linux.
> Would've been interested about Tor performance on SPARC, though ;-)
You may possibly help out there. :-)
With 1.0.0.g -> can't compile.
Wi
> The idea not about hiding the location of the server but protect user so
> server can't know where user comes from (yes, I can also disable logging)
also adding plausible deniability that users ever used the website?
___
tor-talk mailing list
to
wrote:
> i'm wonder if it makes any sense to allow users to access a public web server
> access normal at same time as hidden service on same machine?
Yes.
- saves exit bandwidth
- will continue to work even if all exits are shut down
- exit policy/ports do not matter
- more diversity
- more legi
I'm looking at setting up TOR and have
a couple of questions I couldn't find
ready answers to with web searching or
the FAQ.
1) Will the TOR bundle co-exist peacefully
and separately with a Firefox 13 install under
Windows (2008 SP2 x64)? Ideally I'd like for them
to not interact at all and for t
24 matches
Mail list logo