Re: Tor meetup in San Francisco this Thursday
Nick Mathewson wrote: Hi, all! I'll be in San Francisco for most of this week, and I thought it would be neat to have a Tor Folks meetup on Thursday, probably in the late afternoon or early evening. Let me know (off-list) if there's any interest, and I'll figure out where -- probably a coffee shop or something. I, as well as others, certainly have an interest. I'd vote for somewhere near the EFF, if the EFF itself isn't an option. -jake
compile issue on Solaris with tor-0.2.0.16-alpha and tor-0.2.0.17-alpha
All, I could build tor-0.2.0.15-alpha without any issue. With tor-0.2.0.16-alpha and tor-0.2.0.17-alpha I'm getting the following error when compiling tortls.c: (I'm runnung Solaris 10 x86) make make all-recursive Making all in src Making all in common gcc -DHAVE_CONFIG_H -I. -I../..-I../common -I/opt/csw/include -I/usr/local/ssl/include -g -O2 -Wall -g -O2 -W -Wfloat-equal -Wundef -Wpointer-arith -Wstrict-prototypes -Wmissing-prototypes -Wwrite-strings -Wredundant-decls -Wchar-subscripts -Wcomment -Wformat=2 -Wwrite-strings -Wmissing-declarations -Wredundant-decls -Wnested-externs -Wbad-function-cast -Wswitch-enum -Werror -MT tortls.o -MD -MP -MF .deps/tortls.Tpo -c -o tortls.o tortls.c tortls.c: In function `tor_tls_new': tortls.c:701: error: `TLS1_TXT_ECDHE_ECDSA_WITH_AES_256_CBC_SHA' undeclared (first use in this function) tortls.c:701: error: (Each undeclared identifier is reported only once tortls.c:701: error: for each function it appears in.) tortls.c:701: error: syntax error before string constant *** Error code 1 make: Fatal error: Command failed for target `tortls.o' Current working directory /usr/local/lib/tor-0.2.0.17-alpha/src/common *** Error code 1 The following command caused the error: failcom='exit 1'; \ for f in x $MAKEFLAGS; do \ case $f in \ *=* | --[!k]*);; \ *k*) failcom='fail=yes';; \ esac; \ done; \ dot_seen=no; \ target=`echo all-recursive | sed s/-recursive//`; \ list='common or tools win32 config'; for subdir in $list; do \ echo Making $target in $subdir; \ if test $subdir = .; then \ dot_seen=yes; \ local_target=$target-am; \ else \ local_target=$target; \ fi; \ (cd $subdir make $local_target) \ || eval $failcom; \ done; \ if test $dot_seen = no; then \ make $target-am || exit 1; \ fi; test -z $fail make: Fatal error: Command failed for target `all-recursive' Current working directory /usr/local/lib/tor-0.2.0.17-alpha/src *** Error code 1 The following command caused the error: failcom='exit 1'; \ for f in x $MAKEFLAGS; do \ case $f in \ *=* | --[!k]*);; \ *k*) failcom='fail=yes';; \ esac; \ done; \ dot_seen=no; \ target=`echo all-recursive | sed s/-recursive//`; \ list='src doc contrib'; for subdir in $list; do \ echo Making $target in $subdir; \ if test $subdir = .; then \ dot_seen=yes; \ local_target=$target-am; \ else \ local_target=$target; \ fi; \ (cd $subdir make $local_target) \ || eval $failcom; \ done; \ if test $dot_seen = no; then \ make $target-am || exit 1; \ fi; test -z $fail make: Fatal error: Command failed for target `all-recursive' Current working directory /usr/local/lib/tor-0.2.0.17-alpha *** Error code 1 make: Fatal error: Command failed for target `all' (I'm runnung Solaris 10 x86) Any help is welcome. Thanks otto _ Testen Sie Live.com - das Zentrum Ihrer Online-Welt, das Sie mit aktuellen Nachrichten, Sport- und Wetterinfos und vielem mehr versorgt. http://www.live.com/getstarted
Re: TorStatus version 4 has been released
Kasimir Gabert wrote: Hello all [especially TorStatus mirror operators], A new version of TorStatus (http://torstatus.kgprog.com) has been released. More information can be found at http://project.torstatus.kgprog.com, and any comments are greatly welcome. Thanks, Kasimir In my *very humble opinion* I think the web page is a bit too heavy for two reasons: · it takes a bit too much to load because it contains a lot of data. Perhaps it should be cut at some point and should be put something like «show all exit nodes» especially because usually surfing through tor isn't fast. · it takes a bit too much to process the whole pages: Firefox freezes for some moments...maybe for non-fast computer this can be a problem. I am no web developer so, again, this comments are IMVHO. Noiano signature.asc Description: OpenPGP digital signature
Re: TorStatus version 4 has been released
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 21/01/08 23:59, Kasimir Gabert wrote: Hello all [especially TorStatus mirror operators], A new version of TorStatus (http://torstatus.kgprog.com) has been released. More information can be found at http://project.torstatus.kgprog.com, and any comments are greatly welcome. I think it's very useful. The only things I lack is the ability in the advanced search for all exit node with certain exit policies. Except for that it fulfills all my needs and more. Thanks, Kasimir -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.7 (GNU/Linux) iD8DBQFHlkohp8EswdDmSVgRAi72AJ9ERg+8oUYSZbkmHv2CFWGt7VTgYgCgxOtF XCw2dIpo6YwGQmUZGwvanZk= =YUnE -END PGP SIGNATURE-
Re: TorStatus version 4 has been released
Noiano [EMAIL PROTECTED] wrote: Kasimir Gabert wrote: A new version of TorStatus (http://torstatus.kgprog.com) has been released. More information can be found at http://project.torstatus.kgprog.com, and any comments are greatly welcome. In my *very humble opinion* I think the web page is a bit too heavy for two reasons: · it takes a bit too much to load because it contains a lot of data. At least it compresses quite well: 21:28:27.567 283b5400 Re-Filter: Decompression successful. Old size: 230926, new size: 2642640. (saved: 91.26%) Of course if you'd be using Privoxy 3.0.6 or earlier with filtering enabled, you'd download the whole two megs ... Fabian signature.asc Description: PGP signature
Hostname
Is there a way for hiding the IP of host and ISP name from Tor network and TorStatus for security reasons?
Re: Hostname
Quoth Khaled Moussa [EMAIL PROTECTED], on 2008-01-22 23:42:33 +0200: Is there a way for hiding the IP of host and ISP name from Tor network and TorStatus for security reasons? That's an extremely vague question. IP of _what_ host, and for _what_ reasons? Anyway, based on my predicted disambiguation of your question, the answer is generally no, Tor clients and relays cannot easily hide themselves from the Tor network. --- Drake Wilson
Re: Hostname
In fact, autonomous system diversity in a Tor circuit is a wonderful thing, for better anonymity against pseudo-global adversaries (such as ISP's). Then, different ISP's would have to collude to short circuit a Tor tunnel. Just be careful of those Internet eXchanges, as IX level adversaries can [probabilistically] short circuit Tor's tunnels. ~Jon Drake Wilson wrote: Quoth Khaled Moussa [EMAIL PROTECTED], on 2008-01-22 23:42:33 +0200: Is there a way for hiding the IP of host and ISP name from Tor network and TorStatus for security reasons? That's an extremely vague question. IP of _what_ host, and for _what_ reasons? Anyway, based on my predicted disambiguation of your question, the answer is generally no, Tor clients and relays cannot easily hide themselves from the Tor network. --- Drake Wilson
Re: Hostname
On Tue, Jan 22, 2008 at 03:57:46PM -0600, Drake Wilson wrote: Quoth Khaled Moussa [EMAIL PROTECTED], on 2008-01-22 23:42:33 +0200: Is there a way for hiding the IP of host and ISP name from Tor network and TorStatus for security reasons? That's an extremely vague question. IP of _what_ host, and for _what_ reasons? I believe this is about not to show up in the publicly available lists (TorStatus) on blutmagie, kprog and others. Anyway, based on my predicted disambiguation of your question, the answer is generally no, Tor clients and relays cannot easily hide themselves from the Tor network. Of course the network must know 'itself', so there is no point in hiding from the Tor network and in the same time being a member. But if my assumption is correct, you might want to set up your node as a bridge. These are not listed in the mentioned status lists. http://archives.seul.org/or/talk/Dec-2007/msg00268.html http://archives.seul.org/or/talk/Dec-2007/msg00269.html give hints how to do this. --- Drake Wilson Regards Hans
RE: Tor meetup in San Francisco this Thursday
Hi again Nick, Just a thought, how about meeting at the pub instead of coffee?? Steve -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Nick Mathewson Sent: Monday, January 21, 2008 10:13 PM To: or-talk@freehaven.net Subject: Tor meetup in San Francisco this Thursday Hi, all! I'll be in San Francisco for most of this week, and I thought it would be neat to have a Tor Folks meetup on Thursday, probably in the late afternoon or early evening. Let me know (off-list) if there's any interest, and I'll figure out where -- probably a coffee shop or something. yrs, -- Nick Mathewson smime.p7s Description: S/MIME cryptographic signature
Re: Hostname
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Khaled Moussa wrote: | Is there a way for hiding the IP of host and ISP name from Tor network | and TorStatus for security reasons? | Clients do not show up in TorStatus, that's for servers; however, an observer could tell you're connecting to the Tor network. They could not, however, tell what you're doing through your connection to the Tor network (that's the whole idea). Servers cannot hide from the Tor network or TorStatus, with the exception of the bridge servers mentioned by Hans Schnehl (these are not listed in TorStatus, but can be determined by looking at your connection). - -- F. Fox: A+, Network+, Security+ Owner of Tor node kitsune http://fenrisfox.livejournal.com -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.7 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFHlovrbgkxCAzYBCMRCFxhAJ9uNry5zIAFwqFJajGboBpUDMMHsQCfZNWx ORDAodC9A9sJDjAYyDRkavM= =k1G7 -END PGP SIGNATURE-