-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
tor user schrieb:
Don't get me wrong, I'm not advocating that any relay inspect any
traffic,
Do you mean you want a way to *automatically*, without
recording/logging/inspecting personally, deny certain traffic and
allow other? (but isn't that
Hi!
On Mon, Dec 15, 2008 at 3:10 PM, Marco Bonetti
marco.bone...@slackware.it wrote:
On Mon, December 15, 2008 14:35, Mitar wrote:
But why port 80? Because that is what the original user has been using
and he/she sends this port number to the tracker?
yes.
On why the user chooses that
It works against me running linux, tor, and using firefox IF I elect to open
the document directly via Openoffice.
praedor
On Sunday 14 December 2008 21:08:45 Freemor wrote:
On Sun, 14 Dec 2008 18:57:18 -0600
Roc Admin onionrou...@gmail.com wrote:
I just noticed that HDMoore re-released
Am 15.12.2008 um 12:57 schrieb Hannah Schroeter:
After all, a running Exitnode relaying on the standard ports like
HTTP
seems to be (for me) better than a completely switched off node
because
of legal troubles regarding file sharing.
But in the end, the situation is all the same for
Could I not simply remap unwanted services (by you) to different ports and
skip through? I mean, I can run an ssh tunnel through any port, and probably
set up at least some of the file sharing apps to work on different ports than
the default...or am I missing something?
praedor
On Saturday
In another vein, being an exit for even a brief period of time puts your IP on
a website identifying you as such and you will find yourself banned from some
(many?) irc servers and/or banned from posting at certain blogs. Irritating
but there you go.
On Saturday 13 December 2008 15:46:14 Jon
Am 15.12.2008 um 14:11 schrieb David Kammering:
And, if I see things right, the bandwidth argument doesn't compute.
IIRC, only the client-tracker traffic is relayed via tor, and
that's
not the mass traffic of the actual big files.
Hmm, I must admit that I'm not too deep into p2p via Tor,
On Mon, Dec 15, 2008 at 08:41:16AM +0100, Marco Bonetti wrote:
Hi,
there should be an ongoing new bruteforce attack against ssh, take a
look at http://www.theregister.co.uk/2008/12/08/brute_force_ssh_attack/
I don't see any reason, for now, on worrying about it. Use the programs
already
Hi!
On Mon, Dec 15, 2008 at 8:58 AM, Marco Bonetti
marco.bone...@slackware.it wrote:
The torified client will send out the exit node ip, so the exit will
receive unsuccessful connection attempts, I think this is the only
annoying part of the process and this is why the azureus wiki is
On Mon, December 15, 2008 14:35, Mitar wrote:
OK, so the problem is that the tracker has recorded IP of an exit node
as a Bittorrent peer and it is giving that to other Bittorrent peer
which then want to connect to it and download from it?
yes.
But why port 80? Because that is what the
Hi!
On Mon, Dec 15, 2008 at 09:04:55AM +0100, David Kammering wrote:
[...]
After all, a running Exitnode relaying on the standard ports like HTTP
seems to be (for me) better than a completely switched off node because
of legal troubles regarding file sharing.
But in the end, the situation is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hannah Schroeter schrieb:
After all, a running Exitnode relaying on the standard ports like HTTP
seems to be (for me) better than a completely switched off node because
of legal troubles regarding file sharing.
But in the end, the situation is
Interesting, it works with Open Office on Linux revealing the true ip
addr.
There's a option in OO to use a proxy, it was set to system at the time
and I tried just using foxyproxy.
But yeah, like someone else mentioned, using iptables to redirect all
attempts so that you don't have to worry
Thank you for all of your suggestions regarding exit policies and
contacting the EFF. I am a member and will be beating down Kurt
Opsahl's door if the MPAA decides to pursue this any further.
So just to clarify, it is possible to transfer bit torrent file content
over Tor, right? And the
Am 15.12.2008 um 14:35 schrieb Mitar:
Without adding those IP to ExitRules it is not really nice that I
would be blocking them just with a firewall but this could be maybe
also seen as a feature: making Tor network unstable for Bittorrent
users (for data transmissions).
I also had these
--- On Mon, 12/15/08, Sven Anderson s...@anderson.de wrote:
As long as you allow
arbitrary ports your bandwidth is always maxed out because
of file transfers. If you only allow port 80 you have a very
erratic bandwidth usage.
So if you have only port 80 open, your connection is being
On Mon, Dec 15, 2008 at 11:08:01AM -0600, mate...@mrmccabe.com wrote 0.4K bytes
in 10 lines about:
So just to clarify, it is possible to transfer bit torrent file content
over Tor, right? And the only way to reduce or eliminate this traffic
is by using a white-list exit policy? Roger,
17 matches
Mail list logo