it liked.
There is a slightly increased network load involved in running two instances,
and there could be security implications of running separate tor clients - but
mainly if their connections are distinguishable.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor23
single-page dashboard status for the overall tor network?
For example, x/y authorities signed consensus, z bandwidth, trends, …
This would be a useful part of globe/atlas, but also as a HS.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
te
another relay gets
an extra hop, and the hidden service chooses the introduction point, not the
client.
I could be wrong about this - the path code has a few special cases that I
haven't quite got my head around.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2
n
serious security implications.
Also, the increase in outgoing connections from a local bridge could very
likely make your issue with the number of outgoing connections worse, not
better. This depends on the number of Tor users you have - a bridge could make
a connection to each of up to 5000 re
clients and the bridge. So make sure (detailed) logging
is turned off on any clients, intermediate routers or firewalls, and on the
bridge itself.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930
can program on
Windows!)
But this fix is not urgent. As far as I can tell, Tor is functioning as
designed to make sure that users can't be linked when they change IP addresses.
(Even though GetAdaptersAddresses isn't working.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PG
C78uSl
> TYAX53qmz8/YHZGtMwxM3xvThT9UWvXR5
> 6UnRI+TaXGMfn3+QeMZx6Nsz2h37r3yk
> lJVXnblAzgyb5Zbg4fi6x+PhEofvl7XdxUQ2NhTvcKSkrlEMF0cx6tT4S/3l7B58
> xerrYrZM2hcy1amIUZ/WpZpz1DfQZgCodMPZjQhxIlbNRFsQ/R7xbFI3kkKZHqD4
> tP4cwsY/y7Bwiqh9SbA1fAclo6QqhNrAr069GuxVer88RAs= =wbcX
> -END PGP PUBLIC
r suited to a system
> where the users contribute their research and knowledge
> about the network into the network metadata db, and the
> users can query it to make their own decisions, follow
> other users prebuilt selection templates, or stick
> with the provided defaults.
> _
odes in the guard Position
This is intended to be the weighting for bridge relays, which are non-flagged
nodes in the guard position.
(There's a comment in the source code about it.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081
t I think that is as
> > it should be (configuration line is „DirPort 9030”).
>
> There's no support for DirPort's on IPv6.
In 0.2.8, clients assume that the IPv6 DirPort is the same as the IPv4 DirPort.
This isn't ideal, but it does seem to work well in testing.
Tim
Tim Wilson-Bro
a non-transparent proxy, as it requires the network's IP addresses to
be reconfigured.
Alternately, some combination of DNSPort and SOCKSPort is another
non-transparent proxy option for applications with SOCKS proxy support.
Oh, and please don't cross-post to multiple lists. Answering on t
Tor users, it's for Tor relay operators.
For any more emails on this question, please reply to
tor-talk@lists.torproject.org.
Have you tried whitelisting the other processes that tor runs, like tor.exe?
You might also need to ask Norton how to properly whitelist Tor Browser, rather
than askin
12 matches
Mail list logo