Re: Tracing internal errors

2009-11-15 Thread Marco Bonetti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Jon Cosby wrote:
 Internal error is kind of vague.
Agree. Some times ago I got stuck in a similar problem: privoxy didn't
restart cleanly and I keep wondering what the hell was that internal
error, a quick netstat showed me that the torbutton chosen proxy wasn't
up and running.
Maybe this is not your case, but I'd check out if the proxy is running
when I get internal errors.

ciao

- --
Marco Bonetti
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/

My GnuPG key id: 0x0B60BC5F
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkr/uBIACgkQTYvJ9gtgvF8d5wCgl0PHoPTfvrYJH+SfGiQ9ONB0
pk4AoKexM3DpivEDqVHyW4lwHXqKhMe8
=8t3q
-END PGP SIGNATURE-
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Tracing internal errors

2009-11-15 Thread Fabian Keil
Jon Cosby j...@jcosby.com wrote:

 I'm trying to get Tor working in Firefox/Torbutton on openSUSE 11.2.
 There's something about the privoxy settings that it doesn't seem to
 like. In the privoxy config, I've tried
 
 forward-socks4a / localhost:9050 . (internal error)
 forward-socks4a / 127.0.0.1:9050 . (check settings)
 forward-socks5  / localhost:9050 . (internal error)
 forward-socks5  / 127.0.0.1:9050 . (check settings)
 
 Internal error is kind of vague. There's nothing in the privoxy log. I
 seem to remember running into this when there was an issue with the
 system time, but that's not the case here. What's the next place to
 look?

Sounds like the following OpenSUSE packaging bug still hasn't been fixed:
https://sourceforge.net/tracker/index.php?func=detailaid=2783703group_id=8atid=28

You are most likely getting the internal error because Privoxy is
configured to use an improperly populated chroot directory, so it
can't access its template files. If that's the case, you are probably
also looking at the wrong log file.

I'd suggest you file a bug report with OpenSuSE. 

Fabian


signature.asc
Description: PGP signature


Re: directory server tor.dizum.com

2009-11-15 Thread Alex de Joode
I restarted the fw/ rules and tor, does it work now ?


On Wed, Nov 11, 2009 at 07:33:23PM +0100, Olaf Selke wrote:
 hi list,
 
 since a couple of days my tor node logs a problem with tor.dizum.com:
 
 Nov 11 13:30:42.034 [warn] http status 404 (Not Found) reason
 unexpected while uploading descriptor to server '194.109.206.212:80').
 
 Is the directory server tor.dizum.com being down?
 
 Olaf
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: all traffic through a VPN on top of tor, done!

2009-11-15 Thread Andrea Ratto
Il giorno ven, 13/11/2009 alle 16.28 +, John Case ha scritto:
 On Fri, 13 Nov 2009, Andrew Lewman wrote:
 
  Second, it sounds like you want to protect against a local attacker from
  seeing your traffic.  If so, go to proxy.org, find an https:// or
  vpn-based provider and enjoy your encrypted protection against your
  local ISP seeing your destination.

You have a point, that is something I could do probably, but so far all
ssl proxy I have seen, are actually websites with a form. I need to use
the proxy from the command line and pipe a ssh connection through it.

  If you actually want anonymity, then use Tor as is, for it's designed to
  provide anonymity online by default.

That is why am glad my script has tor support now. Anonymity is there.
It's just really slow. :-)
I added tortunnel support as well, which is probably slower than those
websites but serves the purpose.

I am pretty happy with the result. I'll be posting a link as soon as I
have it online, if someone needs it. It's just a nice script for a vpn
on top of ssh, even if you don't need tor.

 
 Yes, but back to my thread hijack :)
 
 Let's say my protection model does indeed require Tor, but at the same 
 time requires more speed.
 
 Forcing Tor to only use fast nodes probably doesn't work, since those fast 
 nodes are probably inundated just like the slow ones are.  This also 
 suggests that organic growth in the Tor network is not going to solve much 
 of the speed problem in the near term...  existing users will certainly 
 use more and more traffic.
 
 But lets say one sets up X Tor nodes in X different locales and configure 
 my Tor to use one of those X for my entry, and one of those X for my exit 
 ... I'm still throttled by my middle hop, but the odds are much higher in 
 my favor, and I may only need to rebuild my connection once or twice to 
 get an acceptable speed.
 
 The question is, what values of X are required in order for correlation, 
 etc., to not be laughable ?
 
 (the assumption here is that I put my X Tor nodes on the actual Tor 
 network, but reserve some percentage of their bandwidth exclusively for my 
 own use ... so they look and act like actual Tor nodes ...)
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/