On 3/20/16, Mike Perry wrote:
> It could also be due to the fact that Tor is effectively
> single-threaded. If something on the user's guard node, intermediate
> node, or hidden service is taking large amounts of CPU time, this will
> prevent traffic from flowing while
On 3/20/16, Mike Perry wrote:
> For example, I wonder if users see such interrupts on all of their Tor
> traffic at that time, or just hidden service traffic? Or just hidden
> service traffic to specific services?
... the OP appears to know the onion url and refers to
Oskar Wendel:
> Roger Dingledine :
>
> >> Let's assume that the service is extremely popular, with over 6 terabytes
> >> of traffic each day, and a gigabit port almost constantly saturated.
> >
> > This assumed scenario seems extremely unlikely to be happening in
> > practice.
Tor and other overlays also uses only TCP, which may provide some sort
of enhanced end2end specific directable observability stream container.
Opposed to UDP or raw packet which may offer more options
to develop / layer various anti active / passive attack methods,
including traffic spreading and
On 3/18/16, Oskar Wendel wrote:
> Let's set up a service in a way that it will modulate the traffic, so the
> download would look like:
That's active manipulation in / at one endpoint node.
> Then, we monitor traffic flowing into various entry nodes (remember we're
> a global
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
krishna e bera :
> What evidence have you seen?
I only seen how it behaves, I have no evidence it's an active attack,
being mounted by the authorities, but given the site profile, I wouldn't
be surprised...
- --
Oskar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Roger Dingledine :
>> Let's assume that the service is extremely popular, with over 6 terabytes
>> of traffic each day, and a gigabit port almost constantly saturated.
>
> This assumed scenario seems extremely unlikely to be happening
> On 18 Mar 2016, at 15:17, Sebastian Niehaus
> wrote:
> Am 18.03.2016 um 14:11 schrieb tor_t...@arcor.de:
>
>> then start connect to tor. Also you can open AdvOR.ini and this to [torrc]
>> section.
>
> If there are problems with multiple authorities there might
On 03/17/2016 03:09 AM, Ben Stover wrote:
> Assume I wrote some instructions into "torrc" file with wrong syntax.
>
> How do I get informed about this mistake?
>
> Is there a logilfe?
>
> Can I enable a warning prompt?
>
> Or are such invalid instructions simply silently ignored?
tor
As far as I know TorBrowser switches automatically every 10 minutes the node
chain resp. the IP of the ExitNode.
Can I somehow extend this timeout time to another value e.g. 30 minutes?
Or (even better) can I let Tor auto-switch the IP and chain depending from the
time of inactivity (.e.g when
Tor refuses to start properly depending on the error you made. There is a log
file output depending on your config, usually this goes to the notices.log
Logs go to stdout at level "notice" unless redirected by something
Andre Mankel
a...@andremankel.de
Sent from
11 matches
Mail list logo