On Sat, Feb 12, 2011 at 05:08:17AM +, M wrote:
I thought i would bring this to the attention of those concerned in case
they already did not know. I am still unable to download any attachments,
whether yahoo or gmail, when running tor. The message which appears is
[JavaScript
On Thu, Feb 10, 2011 at 05:34:51PM -0500, grarpamp wrote:
Tor seems to be doing a good job indicating the usefulness and
application of anonymity to a wide variety of potential users.
Moreso than before. But it does hesitate from suggesting that it
can be used as a check and balance within the
On Thu, Feb 10, 2011 at 06:19:27PM -0500, Joseph Lorenzo Hall wrote:
I run a no-exit relay that can sustain about a hundred KB/s but I need
to limit to about 4 GB/day to stay under bandwidth caps. I have
accounting set up but what happens now is that it blows through that
in 12 hours and then
On Sat, Feb 05, 2011 at 07:44:57AM -0500, hi...@safe-mail.net wrote:
Most hidden services use the standard port 80, like this:
address.onion
While other services are like this:
address.onion:8080
What do you gain by doing that?
Not much at all, as far as I can tell.
Maybe they're doing it
Tor 0.2.2.22-alpha fixes a few more less-critical security issues. The
main other change is a slight tweak to Tor's TLS handshake that makes
relays and bridges that run this new version reachable from Iran again.
We don't expect this tweak will win the arms race long-term, but it will
buy us a bit
On Sat, Jan 22, 2011 at 01:57:57PM +0100, Bernd Kreuss wrote:
line 589: (Alice establishes rendezvous point)
==
It does this by establishing a circuit to a randomly chosen OR
does this mean
Alice - OR1 - OR2 - Rend
^^
Tor 0.2.2.21-alpha includes all the patches from Tor 0.2.1.29, which
continues our recent code security audit work. The main fix resolves
a remote heap overflow vulnerability that can allow remote code
execution (CVE-2011-0427). Other fixes address a variety of assert
and crash bugs, most of which
On Thu, Jan 13, 2011 at 01:17:33AM +0100, Mitar wrote:
On Wed, Jan 12, 2011 at 6:26 AM, Mike Perry mikepe...@fscked.org wrote:
and to suggest
solutions for their security problems that involve improving their
computer security for the Internet at large (open wifi, open proxies,
botnets),
On Mon, Jan 03, 2011 at 04:06:44PM +0100, anonym wrote:
One issue for anonymity-oriented LiveCDs (such as T(A)ILS[1] and Liberté
Linux[2]) is the system time. Tor requires a reasonably correct system
time, otherwise no circuits will be opened. This is a major problem for
these LiveCDs since
On Tue, Jan 04, 2011 at 08:02:40AM -0500, Praedor Atrebates wrote:
For something like skype or paying for ANYTHING via credit card/paypal
or the like, your anonymity is lost upon making payment so having to pay
online outside the tor network cannot be a privacy/anonymity violation.
I would
On Tue, Jan 04, 2011 at 02:14:09PM +0100, andr...@fastmail.fm wrote:
I'm running Ubuntu 10.04 and Tor browser bundle with scripts forbidden.
Does any of my web search results or web pages (or anything else during
the web session) I look at get sent to or put on the SWAP partition of
my
On Tue, Dec 28, 2010 at 08:51:30PM -0500, Nick Mathewson wrote:
From the wired.com article, this sounds _exactly_ like the old website
fingerprinting attack, which has been known since 2002:
http://freehaven.net/anonbib/#hintz02
It would be neat if somebody could send a pointer to the
On Tue, Dec 28, 2010 at 08:51:30PM -0500, Nick Mathewson wrote:
It would be neat if somebody could send a pointer to the authors'
actual results.
Based on
http://www-wiwi.uni-regensburg.de/Forschung/Publikationen/Dominik-Herrmann.html.en
I'm guessing they're basing the talk on their CCSW 2009
On Tue, Dec 28, 2010 at 08:57:24PM -0500, Alek wrote:
I'm curious- in what way can Tor be used for emailing? When someone is
connected to the Tor network is there email routed along the Tor network
too? Or, does it go through their the normal connection with their ISP?
The only recommended
On Mon, Dec 27, 2010 at 11:20:36AM -0500, and...@torproject.org wrote:
On Mon, Dec 27, 2010 at 09:56:55AM -0500, prae...@yahoo.com wrote 0.5K bytes
in 12 lines about:
: Subject says it all. Why is only TCP sent over tor and not UDP? Why not
simply suck up and send ALL net traffic,
On Tue, Dec 28, 2010 at 03:41:22AM +0100, Mitar wrote:
About P2P users: why does Tor not award users who are exit nodes with
more bandwidth available for themselves? So that P2P users would be
motivated to run exit nodes by themselves. And in the long run they
would learn that it is enough
On Thu, Dec 16, 2010 at 10:18:17PM -0800, Luis Maceira wrote:
When,in Vidalia,we click on one of the active circuits,does that action
effectively
change the current Tor circuit?If we are using one circuit,clicking (in
Vidalia GUI
interface) on another one,does this change Tor circuits to
On Tue, Dec 07, 2010 at 05:12:57PM +0100, Karsten N. wrote:
a warning for using Google Chrome, Safari or other Webkit based browsers
with Tor. Because of a bug in the FTP proxy settings user can
deanonymized by FTP links.
[snip]
May be, Torproject.org can blog a warning for Tor users too.
Let
On Tue, Dec 07, 2010 at 11:12:37PM +, John Case wrote:
Let me be even broader: if you want to be safe, you must never use Tor
with any browser except Firefox, and you must also use Torbutton. If
you don't do both, you can lose from a wide variety of application-level
attacks.
Wait, what
On Sun, Dec 05, 2010 at 03:16:01PM +, Orionjur Tor-admin wrote:
Are you rate limiting your exit node? Perhaps you should start. It seems
like your network is really overloaded.
I rated limiting my node the following:
BandwidthRate 200 KBytes
BandwidthBurst 400 KBytes
Try
On Sun, Dec 05, 2010 at 12:57:12AM +0800, Moses wrote:
Recently I got many this kind of error, and the connection is stuck at
85%, WHY?
[notice] new bridge descriptor 'Unnamed' (cached)
[notice] We now have enough directory information to build circuits.
[notice] Bootstrapped 80%:
On Sat, Dec 04, 2010 at 07:00:17AM +, Orionjur Tor-admin wrote:
I have the above record in '/var/tor/log' on my exit-node.
What it can mean?!
Tor clients build circuits when they first start up, to estimate the
average amount of time it takes to build a circuit. Once they have a good
On Sun, Dec 05, 2010 at 03:06:14AM +0800, Moses wrote:
Thanks for reply. This is weird. Every new bridge I got just work for
2-5 minutes, and then becomes unreachable and the reconnection is
stuck at 85%. Are bridges under attack?
And after removed bridges, the things getting even worse,
On Fri, Nov 26, 2010 at 07:09:00PM +, James Brown wrote:
Sometimes ago I ren a VDS under Debian Lenny,
~# uname -a
Linux 2.6.18-028stab070.4-ent #1 SMP Tue Aug 17 19:03:05 MSD 2010 i686
GNU/Linux
I set up on that VDS only exit tor-node and nothing more. I didn't stop
apache, proftpd
On Thu, Nov 25, 2010 at 05:52:36PM +, Anon Mus wrote:
Matthew wrote:
I think I am correct to say that StrictExitNodes has been negated in
favour of StrictNodes.
However, when I use StrictExitNodes 1 I have no problems.
When I use StrictNodes 1 and have viable ExitNodes then Vidalia
Yet another OpenSSL security patch broke its compatibility with Tor:
Tor 0.2.2.19-alpha makes relays work with OpenSSL 0.9.8p and 1.0.0.b.
https://www.torproject.org/download/download
Changes in version 0.2.2.19-alpha - 2010-11-21
o Major bugfixes:
- Resolve an incompatibility with openssl
On Mon, Nov 22, 2010 at 09:51:16PM +, Matthew wrote:
## Configuration file for a typical Tor user
## Last updated 12 April 2009 for Tor 0.2.1.14-rc.
## (May or may not work for much older or much newer versions of Tor.)
Do I need to get a new .torrc version? I have had a look online and
On Thu, Nov 18, 2010 at 06:19:03PM -0800, Theodore Bagwell wrote:
Some of you may be aware of the paper,Cyber Crime Scene Investigations
(C2SI) through Cloud Computing
(http://www.cs.uml.edu/~xinwenfu/paper/SPCC10_Fu.pdf) which illustrates
a feasible method of invalidating the anonymity
On Wed, Nov 17, 2010 at 11:45:32AM -0500, Nick Mathewson wrote:
I noticed that Tor had crashed on my system. I am using Debian Lenny
with Tor 0.2.1.26-1~~lenny+1. The only thing I could find out about this
crash is the following line running `dmesg`.
Without more information, there's not
Tor 0.2.2.18-alpha fixes several crash bugs that have been nagging
us lately, makes unpublished bridge relays able to detect their IP
address, and fixes a wide variety of other bugs to get us much closer
to a stable release.
https://www.torproject.org/download/download
Packages will be appearing
On Wed, Nov 17, 2010 at 07:50:05PM -0500, Roger Dingledine wrote:
If by Tor-only packages you mean the old expert packages, we decided
to drop support for them:
For background, see
https://trac.torproject.org/projects/tor/ticket/1274
Sounds like we should do a better job of declaring a policy
On Tue, Nov 16, 2010 at 04:05:11AM -0500, zzzjethro...@email2me.net wrote:
Hello to all.
I use the Tor Browser Bundle on a USB as I can only access the internet from
cafes in the country in which I live. Using a proxy is now illegal here.
I have several questions.
I know that Tor uses
On Thu, Oct 28, 2010 at 10:10:52AM +0100, startx wrote:
the answer in the FAQ refers to privoxy. so i wonder now: is this
answer obsolete meanwhile?
Yes, it's wrong. It's a wiki -- please fix it. :)
In fact, none of the Tor developers added this particular question in
the first place. That's
On Tue, Oct 05, 2010 at 11:31:25PM +0200, Andreas Jonsson wrote:
Hi List!
I've been working with Erinn to sandbox the TBB much like chrome and
ironfox are on osx, but now I think we need some opinions regarding
where to go next.
See this page for more information on what the sandbox is
On Wed, Oct 27, 2010 at 07:19:02PM +0100, Matthew wrote:
There is a Hints and Tips for Whistleblowers Guide available at
http://ht4w.co.uk/.
The section on proxies includes Tor-related information which I fail to
understand:
You may actually get more anonymity when using the Tor cloud
[In the future, please send your mail to only one list, not two. I just
subscribed you to or-talk, since you'd sent the mail there but aren't
on the list.]
On Wed, Oct 20, 2010 at 10:18:53AM +0800, torsecurity wrote:
hello, I want to set up a hidden server in my private network. I have
On Sat, Oct 16, 2010 at 07:49:12AM -0700, Robert Ransom wrote:
On Sat, 16 Oct 2010 07:02:10 -0400
hi...@safe-mail.net wrote:
Every now and then, when you start Tor, it searchers for
relays/descriptors.
And I've heard that it does that every now and then while it tuns as well.
Does
Tor 0.2.2.17-alpha introduces a feature to make it harder for clients
to use one-hop circuits (which can put the exit relays at higher risk,
plus unbalance the network); fixes a big bug in bandwidth accounting
for relays that want to limit their monthly bandwidth use; fixes a
big pile of bugs in
Tor 0.2.2.16-alpha fixes a variety of old stream fairness bugs (most
evident at exit relays), and also continues to resolve all the little
bugs that have been filling up trac lately.
https://www.torproject.org/download.html.en
Packages will be appearing over the next few days or weeks (except
on
On Mon, Sep 20, 2010 at 03:22:57AM -0500, David Bennett wrote:
Q: What is to stop operatives working for the bad guys from running
tor proxies from 3rd party locations? Granted, they would only be able
to sample a portion of the traffic, but traffic that they did sample
could lead to
On Mon, Sep 13, 2010 at 12:00:48PM +0200, tor_ml wrote:
On 09/13/2010 12:55 AM, and...@torproject.org wrote:
On Sun, Sep 12, 2010 at 05:19:00PM +0200, tor...@ymail.com wrote 0.4K bytes
in 12 lines about:
solved:
It is irritating but one has to tick:
Start the Tor software when Vidalia
On Fri, Sep 10, 2010 at 01:36:18AM -0500, Scott Bennett wrote:
I had planned to upgrade my node from 0.2.2.14-alpha this evening to
0.2.2.15-alpha, but there is an unfortunate and apparently gratuitous, new
restriction upon ExcludeNodes and ExcludeExitNodes that, for the moment
at least,
On Fri, Sep 10, 2010 at 03:27:01AM -0500, Scott Bennett wrote:
Yup, that's the actual behaviour. Good thing we added the warn,
otherwise
it might have gone unnoticed longer.
Wow. This is a scandalously bad situation. Is there any chance
that it will get a high priority for being
On Fri, Sep 10, 2010 at 02:57:52AM -0500, Scott Bennett wrote:
If what you say is actually the case, then it would seem that a problem
described on this list on many occasions during the last few years may, in
fact, have been due to this horrible limitation. Several of us have
On Thu, Sep 02, 2010 at 05:34:53PM +0200, Udo van den Heuvel wrote:
Tor chokes and stops when it finds ipv6 numbers in resolv.conf.
Is this a known issue?
I found out about this as the Fedora dhclient-script (part of ISC
dhcp-4.2.0) wipes out resolv.conf and replaces it with whatever the
On Mon, Aug 30, 2010 at 08:51:47AM +0100, Matthew wrote:
I have StrictExitNodes = 1 and this is the exit node wollwoll.
When I look at the Vidalia GUI the connections show:
Lifuka, india533, 5aColuna01
williamhaines, bp1, PPrivCom032
birdbrain, torserversNet4, wollwoll
Roo8Peik,
On Sat, Aug 28, 2010 at 11:20:41AM -0400, Paul Syverson wrote:
What you describe is known in the literature as website fingerprinting
attacks,
[snip]
Roughly, while Tor is not invulnerable to such an attack, it fairs
pretty well, much better than other systems that this and earlier
papers
On Sun, Aug 22, 2010 at 01:56:59PM +, Orionjur Tor-admin wrote:
Oh, sorry, $90ECA7259B93B08FEC9872B2A1C065A0C05B2EE4 is an old
fingerprint of my node named Orion Tor Node, my current fingerfrint is
another (after upgrading a stable Tor-version to alfa).
Is it normal that after upgrading a
On Sat, Aug 21, 2010 at 10:53:48PM -0600, Jim wrote:
I connect to the Internet with dialup. I have been successfully using
Tor clients for 4+ years. One of the issues with using Tor over a slow
connection is the amount of time it takes to update the information
about the network when
Tor 0.2.2.15-alpha fixes a big bug in hidden service availability, fixes a
variety of other bugs that were preventing performance experiments from
moving forward, fixes several bothersome memory leaks, and generally
closes a lot of smaller bugs that have been filling up trac lately.
On Sat, Aug 14, 2010 at 12:26:57PM +0100, Anon Mus wrote:
It looks like 90% of the funding is from the US, nearly all US government.
If you know any funders outside the US who care about privacy, anonymity,
or circumvention, we're all ears. :)
Add to this the number of Tor nodes run from US
On Tue, Jul 27, 2010 at 12:03:18PM +0100, Matthew wrote:
However, with Tor and Polipo, then DNS request is routed through Polipo
then through Tor's three nodes then the final exit node does the DNS
resolution with the DNS server where the domain is registered (bypassing
the local cache
On Wed, Jul 21, 2010 at 11:37:24AM +0200, Jerzy ??ogiewa wrote:
strange, when I type for example tsocks
/Applications/Safari.app/Contents/MacOS/Safari the application gui never
seems to appear.
Looks like you're trying to use tsocks on os x? It doesn't (easily)
work on os x, even for non-gui
Tor 0.2.2.14-alpha greatly improves client-side handling of circuit build
timeouts, which are used to estimate speed and improve performance. We
also move to a much better GeoIP database, port Tor to Windows CE,
introduce new compile flags that improve code security, add an eighth
v3 directory
On Mon, Jul 12, 2010 at 02:53:05PM -0400, grarpamp wrote:
Are there any official (non-mirror) .onions run by the torproject itself?
https://trac.torproject.org/projects/tor/wiki lists some hidden services,
some of which are quite official, like the hidden service that points
to
On Fri, Jul 02, 2010 at 02:00:54PM +0200, Udo van den Heuvel wrote:
On 2010-06-30 19:55, Udo van den Heuvel wrote:
Can you see your node on the public lists?
Nope.
Still the same logging:
Jun 30 18:45:04.097 [notice] New control connection opened.
Jun 30 18:50:03.649 [notice]
On Mon, Jun 28, 2010 at 08:45:51PM -0400, and...@torproject.org wrote:
On Mon, Jun 28, 2010 at 08:36:15PM -0400, torh...@safe-mail.net wrote 0.4K
bytes in 6 lines about:
: Since my node is not an exit node, does that really matter that my ISP is
hijacking DNS requests? Does anyone know how
On Mon, Jun 14, 2010 at 10:26:59PM +0100, Al MailingList wrote:
How would you block connections to Shadowserver's honeypots?
Why would you want to do that? The point is someone is using an exit
node for abuse. If you just prevent abuse to a honey pot, you are just
covering up the problem -
On Thu, Jun 10, 2010 at 03:44:43PM -0400, Sambuddho Chakravarty wrote:
I am running a Tor relay and have set the RelayBandwidthRate to 40 MBytes
and RelayBandwidthBurst to 60 MBytes. However the Tor status page only
lists it to be 122 Kbytes/sec.
Which Tor status page? There are a bunch and
On Tue, Jun 08, 2010 at 07:51:33AM +0100, Andy Dixon wrote:
I'm trying to set up a pretty decent server on our 50 meg leased line
and I am having difficulty in doing it.
We have a bunch of IP addresses and we have to use port forwarding to
rote it to an internal IP address.
I have done
On Tue, Jun 01, 2010 at 11:37:45PM -0400, forc...@safe-mail.net wrote:
We run a Tor node (Privacyhosting on 64.46.39.238) on a dedicated
server since about one year, and suddenly the node isn't listed anymore
in any Tor directory. Why?
Our server admin confirmed me that tor is running and
On Tue, May 25, 2010 at 04:01:43PM -0400, Ted Smith wrote:
I couldn't figure
out why the author, Kurt Knutson of WGN TV, was so taken in by something
that
isn't even available yet and about which there is so little publicly
available
information.
Maybe Tor Project should talk
On Mon, May 24, 2010 at 10:24:00AM +0800, ?? wrote:
I got a warning, ControlPort is open, but no authentication
method has been configured. This means that any program on your
computer can reconfigure your Tor. That's bad! You should upgrade
your Tor controller as soon as possible,
On Sun, May 16, 2010 at 12:45:22AM -0500, Scott Bennett wrote:
The tor man page gives a not very edifying description of the NodeFamily
statement. The man page says that the NodeFamily statement may be used more
than once in a given torrc file. Does each use define a different Family?
On Mon, May 17, 2010 at 09:44:21PM +0200, Moritz Bartl wrote:
Original Message
Subject: Re: - Medium - Tor servers, Tor community wants to disable your
nodes - General
Date: Mon, 17 May 2010 13:46:04 +0200
From: Perfect Privacy Administration ad...@perfect-privacy.com
On Sat, May 01, 2010 at 02:55:53PM -0700, Damian Johnson wrote:
An easy place to start would be to solicit input on or-talk for a better
definition and enumerable attributes we can look for. Some obvious starting
ones would be ssl stripping, certificate tampering (checking for differences
like
On Fri, Apr 30, 2010 at 05:40:28PM -0500, Jon Cosby wrote:
I'm getting frequent 504: Connection refused errors on a few sites.
This usually happens when I've been logged onto the site for an hour or
two. Restarting Firefox doesn't fix the problem, the only thing that seems
to work is
On Thu, May 13, 2010 at 06:03:49PM -0400, W wrote:
Is there a torify equivalent for Mac OS X,
Check out dsocks, by Dug Song.
or does Torify work on
that platform...
Not currently, I believe. It would be great if somebody wanted to combine
torsocks and dsocks so there's less work for the poor
Tor 0.2.2.13-alpha addresses the recent connection and memory overload
problems we've been seeing on relays, especially relays with their DirPort
open. If your relay has been crashing, or you turned it off because it
used too many resources, give this release a try.
On Fri, Apr 23, 2010 at 08:51:32PM -0500, Scott Bennett wrote:
I hope that, in the future, openssl.org will make some effort to
coordinate such things with the various operating system developers in
a way that avoids turning the situation into such a cl*f*** again.
It's obviously been
On Fri, Apr 23, 2010 at 12:23:40AM -0500, Scott Bennett wrote:
On Thu, 22 Apr 2010 19:39:07 -0400 Roger Dingledine a...@mit.edu
wrote:
Tor 0.2.2.12-alpha fixes a critical bug in how directory authorities
handle and vote on descriptors. It was causing relays to drop out of
the consensus
On Fri, Apr 23, 2010 at 02:35:01PM +0200, Timo Schoeler wrote:
I'm seeing declining traffic over the last few weeks, please see graph:
It dropped from a sustainted 2,5Mbps (or more) to about a fifth, with a
massive drop today.
I'm running
tor-0.2.1.25-1.el5.rf
on a 64Bit CentOS
To: or-talk@freehaven.net
Subject: Re: Declining traffic
Date: Fri, 23 Apr 2010 21:35:46 +0200
Roger Dingledine a...@mit.edu writes:
So if you upgraded to the latest 0.2.2.x-alpha to get the fixes for other
bugs, you would get the fix for this bug too. Let us know if it works.
I upgraded to latest
On Thu, Apr 22, 2010 at 06:08:09AM +, James Brown wrote:
The exit-node which have ip 192.251.226.206 and named
anonymizer2.blutmagie.de behaves itself as probably an evil exit-node.
I can't change it practically at all. When I give command pkill -1 tor
to my system many times it remains
Tor 0.2.2.12-alpha fixes a critical bug in how directory authorities
handle and vote on descriptors. It was causing relays to drop out of
the consensus.
Tor 0.2.2.11-alpha fixes yet another instance of broken OpenSSL libraries
that was causing some relays to drop out of the consensus.
(Windows
On Thu, Apr 15, 2010 at 11:59:31PM -0500, Scott Bennett wrote:
My weather satellite images got blocked again, due to the PrivacyNow
exit using OpenDNS with a misconfigured account and the fact that
ExcludeExitNodes still doesn't work reliably. Will the the authority
operators *please*
On Sun, Apr 11, 2010 at 03:23:16PM +0200, Olaf Selke wrote:
maybe I take your advice and add php code at blutmagie tns to sum up the
extra-info average rate data and print the so calculated bandwidth
instead of max observed one.
Here's my chance to remind people about
On Sun, Apr 11, 2010 at 11:14:31PM +0100, Matthew wrote:
If you change the options, you should see polipo query your local dns
resolver either directly, or via gethostbyname.
But if you change it to false would that not be the safest option -
from what I can gather in this situation Polipo
Hi folks,
Several people on irc have pointed out prifoxy:
http://code.google.com/p/prifoxy/
Can somebody take a look at it, and decide whether it's for real,
whether it looks competently done, trustworthy, safe to recommend, etc?
My brief look showed me a binary blob and not much else, so my
On Fri, Apr 09, 2010 at 08:58:32PM -0700, Christian Kujau wrote:
the ratio of real bandwidth divided by
advertised bandwidth has increased within the last three month by a
factor of three. The MaxAdvertisedBandwidth 2000 KB config parameter
leads to 135 MBit/s real bandwidth. Well known
[Forwarding since Wyllys isn't subscribed at this address -RD]
- Forwarded message from owner-or-t...@freehaven.net -
Date: Mon, 05 Apr 2010 11:05:25 -0400
From: Wyllys Ingersoll wyllys.ingers...@oracle.com
To: or-talk@freehaven.net
CC: thomas.hluch...@netcologne.de
Subject: Re: Good
On Sun, Apr 04, 2010 at 01:15:52PM +0200, Gitano wrote:
DC wrote:
to start learning and trying it myself i will get a cheap vps to start with.
what's the os version specifically that works best with Tor?
I prefer Ubuntu-server, but Debian is as simple.
Please have a look at:
On Fri, Apr 02, 2010 at 03:09:18AM +, john smith wrote:
What happens when you try to visit https://bridges.torproject.org/
with your (non-torified) browser?
I can confirm that it's possible to access this site at the present time.
Turns out this was something we could fix in Vidalia.
On Fri, Apr 02, 2010 at 12:56:25PM -0400, downie - wrote:
I am having a problem with variable PHP pages being cached, and would
prefer not to have to add Cache-Control headers everywhere. The manual
doesn't seem to allow for that eventuality.
I believe the answer is that you can't turn
On Fri, Apr 02, 2010 at 05:04:53PM +0500, M wrote:
- Yesterday i opened the network map and it showed that TOR had created
like over a hundred circuits. First time i have seen that!
Were the circuits to destinations somewhat related to this 'fasterfox'?
No...
See also
On Thu, Apr 01, 2010 at 01:50:06PM +, john smith wrote:
I've been unable to download bridges in the 1.3.3 version of the
tor-browser bundle for windows, when attempting to download bridges
via SettingsNetworkFind Bridges Now.
Each time I attempt to download bridges I receive the
On Sat, Mar 13, 2010 at 01:03:18AM +0100, mister maniac wrote:
the vidalia bundle (or polipo to be exact) stopped working for me on 2
computers. a few days ago tor started to build circuits like crazy and
using up all cpu time. the message log is full of the following
message:
Notice: All
On Tue, Mar 09, 2010 at 08:23:30PM +0100, thomas.hluch...@netcologne.de wrote:
I always run a tor node on my Sparc engine which is connected to the
net via DSL and always runs without problems. So the 0.2.1.22 did. Now
I got the sources of 0.2.1.24 and installed them doing the same commands
as I
Tor 0.2.2.9-alpha makes Tor work again on the latest OS X, updates the
location of a directory authority, and cleans up a bunch of small bugs.
Tor 0.2.2.10-alpha fixes a regression introduced in 0.2.2.9-alpha that
could prevent relays from guessing their IP address correctly. It also
starts the
On Sat, Mar 06, 2010 at 05:01:05PM -0500, TorOp wrote:
On 3/6/2010 4:07 PM, and...@torproject.org wrote:
On Sat, Mar 06, 2010 at 03:00:19PM -0500, to...@optonline.net wrote 0.4K
bytes in 7 lines about:
Mar 06 14:27:37.436 [Warning] We just marked ourself as down. Are your
external addresses
On Thu, Mar 04, 2010 at 12:12:43AM -0500, Ted Smith wrote:
On Wed, 2010-03-03 at 18:03 +0100, moris blues wrote:
i re that it is not secure to use a hidden service
with ssl.
That's wrong. It might be superfluous at times, since you get end-to-end
crypto from Tor, but it's not at all
On Wed, Mar 03, 2010 at 12:18:17AM -0500, zzzjethro...@email2me.net wrote:
Here it is: The last two versions of TOR have not been documented,
thus cannot be trusted. Versions 0.2.1.22 and 0.2.1.21 are the only ones
that can be trusted (possibly only 0.2.1.21).
Someone want to check or point me
On Wed, Feb 17, 2010 at 02:13:30PM +, Soviet Union wrote:
https://bugs.torproject.org/flyspray/index.php?do=detailsid=1252
Hopefully our debian maintainer will get it sorted out in the next
few days.
Did the new subversion tor-geoipdb_0.2.1.23-2~~lenny+1_all.deb be maked
as
http://blog.freenode.net/2010/01/connecting-to-freenode-using-tor-sasl/
It looks like the freenode irc channel is trying a new approach for
handling its Tor users. (This is great, since for a long time it looked
like they were planning to just let Tor users slowly starve to death.)
Has anybody
On Tue, Feb 16, 2010 at 10:36:23PM +0100, Karsten Loesing wrote:
On 2/16/10 6:17 PM, Olaf Selke wrote:
am I right the bridge relay config option GeoIPFile means the path to
GeoIP.dat provided by MaxMind?
No. Tor can only handle the text-based ip-to-country database, but none
of Maxmind's
On Tue, Feb 16, 2010 at 11:21:56PM +0100, Olaf Selke wrote:
The free
maxmind one is intentionally crippled, which makes me not so optimistic
about its future.
the free of charge MaxMind's db works perfectly to match the country.
Determining state/region, city, US postal code, and so on
On Tue, Feb 16, 2010 at 07:38:18AM -0500, and...@torproject.org wrote:
On Tue, Feb 16, 2010 at 01:22:42PM +0100, b...@chefe.dyndns.org wrote 3.6K
bytes in 65 lines about:
: [warn] TLS error: unexpected close while renegotiating
This means your openssl disabled renegotiation. Which is odd
On Mon, Feb 15, 2010 at 12:00:27PM +0100, Runa Sandvik wrote:
On Mon, Feb 15, 2010 at 11:25 AM, Sameer Ali nasir...@googlemail.com wrote:
hi all,
Hello,
I am new and start research in the field of anonymous communication. Could
someone tell me please, why TOR use fixed size cell (all
On Mon, Feb 15, 2010 at 08:17:32PM +0100, Nico Weinreich wrote:
{This is based on re-reading circuit_get_best in circuituse.c.}
OK, thanks for this very detailed explaination. But is there a way to
get (before or after a HTTP request) the circuit which will be (or was)
used?
Not
On Mon, Feb 15, 2010 at 03:41:55PM -0500, Roger Dingledine wrote:
On Mon, Feb 15, 2010 at 08:17:32PM +0100, Nico Weinreich wrote:
{This is based on re-reading circuit_get_best in circuituse.c.}
OK, thanks for this very detailed explaination. But is there a way to
get (before or after
1 - 100 of 572 matches
Mail list logo