Hey *,
the most recent openssl security update [0] breaks Tor. According to
our analysis so far, Tor isn't affected by the actual security issue,
but
the patch as applied in openssl versions 1.0.0b and 0.9.8p causes
Tor to fail its handshake as a relay.
If you run a relay and have already
On Oct 27, 2010, at 8:19 PM, Matthew wrote:
Hello,
There is a “Hints and Tips for Whistleblowers Guide” available at http://ht4w.co.uk/
.
The section on proxies includes Tor-related information which I fail
to understand:
You may actually get more anonymity when using the Tor cloud by
On Oct 5, 2010, at 8:57 PM, Geoff Down wrote:
[warn] The configuration option 'StrictExitNodes' is deprecated; use
'StrictNodes' instead.
It would help if such an option were documented in
https://www.torproject.org/tor-manual.html.en
or shipped in the expert install package.
Where is it
On Oct 5, 2010, at 9:05 PM, krishna e bera wrote:
On Tue, Oct 05, 2010 at 07:57:42PM +0100, Geoff Down wrote:
[warn] The configuration option 'StrictExitNodes' is deprecated; use
'StrictNodes' instead.
It would help if such an option were documented in
On Sep 11, 2010, at 3:47 AM, Sebastian Hahn wrote:
On Sep 10, 2010, at 10:40 AM, Roger Dingledine wrote:
In any case, Sebastian started a trac entry for this one:
https://trac.torproject.org/projects/tor/ticket/1929
wherein he starts out by listing a reason that we shouldn't fix it.
Please
On Sep 12, 2010, at 10:32 AM, James Brown wrote:
I have a transparently torified user setting up as described there
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
When I run command `dig somedomainname mx` or `dig somedomainname
ns` or
`host -t mx
On Sep 12, 2010, at 11:45 AM, forc...@safe-mail.net wrote:
Hello,
I am running a tor node (unfortunately not exit node because of the
hostign company) since a few months on a dedicated server, all is
fine.
I would like that some Perl scripts running on some websites also
hosted on
On Sep 12, 2010, at 1:24 PM, tor_ml wrote:
Hi,
I'm curious in which cases tor would _never_ use certain nodes to
create one circuit and therefore makes the 'MyFamily' setting
unnecessary.
I heard only of one rule (I guess on this list but I'm not sure):
- tor would not use nodes within
On Sep 12, 2010, at 3:49 PM, tor_ml wrote:
Hi,
is it possible to connect/attach Vidalia to a tor process that
gets started by an init script and is running as user A, while
Vidalia is running as user B?
Yes. You need to configure your Tor to open a ControlPort and set
a password, then
On Sep 13, 2010, at 5:36 AM, Gregory Maxwell wrote:
Making families more scalable would also admit things like semi-public
families. E.g. you could share a family key with all the node
operators in a common building. Detecting things like same network can
be done automatically with enough
On Sep 10, 2010, at 9:57 AM, Scott Bennett wrote:
On Fri, 10 Sep 2010 03:39:44 -0400 Roger Dingledine a...@mit.edu
wrote:
As I understand it, we changed no behavior except printing out a warn
for people who had multiple lines, to tell them that they're
expecting
behavior that they're
On Sep 10, 2010, at 10:27 AM, Scott Bennett wrote:
On Fri, 10 Sep 2010 10:05:09 +0200 Sebastian Hahn m...@sebastianhahn.net
wrote:
On Sep 10, 2010, at 9:57 AM, Scott Bennett wrote:
On Fri, 10 Sep 2010 03:39:44 -0400 Roger Dingledine
a...@mit.edu
wrote:
As I understand it, we
On Sep 10, 2010, at 10:40 AM, Roger Dingledine wrote:
In any case, Sebastian started a trac entry for this one:
https://trac.torproject.org/projects/tor/ticket/1929
wherein he starts out by listing a reason that we shouldn't fix it.
Please add more pros and cons to the trac entry.
it'd be
On Mon, June 7, 2010 4:26 am, emigrant wrote:
i mean apart from anonymity, can it have something to do the work of
SSL?
i mean for all connection.
thanks a lot
No, this is not possible. To do the work of SSL,
you need a destination that supports encryption,
and unfortunately many still don't
All that would do would be to say to all clients, Don't include
this node in the same circuit as any of the blutmagie nodes. How would
that be an attack?
I can list all the nodes I don't control...
***
To unsubscribe,
Hi Niklas,
On May 19, 2010, at 6:06 PM, Attac Heidenheim wrote:
Hi everybody,
I just tried a little tool called Tortunnel which allows a user to
tunnel Tor via Privoxy/Polipo to any selected exitnode. Just one hop
instead of three relays.
This works by pretending to the exit relay that you've
On May 8, 2010, at 7:54 PM, Dyno Tor wrote:
On Sat, May 8, 2010 at 9:03 AM, John Case c...@sdf.lonestar.org
wrote:
Let's say you run a tor relay with no exit policy:
reject *:*
And then later you alter that exit policy a bit:
accept *:80,reject *:*
My understanding is that this system
On Apr 23, 2010, at 3:21 PM, Timo Schoeler wrote:
thus Brian Mearns spake:
Any chance your ISP is throttling you?
100% *not*.
Another possibility would be that your relay is heavily
overloaded. See the big thread on tor-relays about
the problems and potential solutions [0].
Sebastian
On Apr 17, 2010, at 4:26 AM, krishna e bera wrote:
i have been seeing these for a couple of years
while running Tor servers on debian and ubuntu and
nobody deemed them important enough to worry about
and they didnt seem to affect the machine much.
We did worry about it, and found and fixed
On Apr 15, 2010, at 8:17 AM, Scott Bennett wrote:
Unfortunate (IMO), the latest versions have the support for .exit
either disabled or deleted, apparently leaving us no easy way to
perform
such tests. I've asked recently on this list whether some other
easy way
were available, but have
On Apr 15, 2010, at 9:11 AM, Scott Bennett wrote:
On Thu, 15 Apr 2010 08:25:07 +0200 Sebastian Hahn m...@sebastianhahn.net
wrote:
On Apr 15, 2010, at 8:17 AM, Scott Bennett wrote:
Unfortunate (IMO), the latest versions have the support for .exit
either disabled or deleted, apparently
On Apr 15, 2010, at 3:32 PM, Clemens Eisserer wrote:
Hi,
I would like to build a statically linked binary of tor.
Is there an easy way to accomplish this, e.g. by passing a simply
command line option to configure?
Thank you in advance, Clemens
Hey Clemens,
yesterday a patch was accepted
On Apr 15, 2010, at 11:46 PM, Clemens Eisserer wrote:
Hmm, I would prefer to have all libraries statically linked (including
libc) - so that the resulting executable would have no external
dependencies (except for the kernel-syscall interface of course ^^).
Sad this isn't possible ... maybe I
On Sun, March 21, 2010 9:09 am, James Brown wrote:
My OS - Debian Lenny AMD64, Tor v0.2.1.25, openssl 0.9.8g-15+lenny6
I have the next record in the log of Tor:
OpenSSL OpenSSL 0.9.8g 19 Oct 2007 [90807f] looks like it's older than
0.9.8l, but some vendor
s have backported 0.9.8l's
On Mar 4, 2010, at 2:08 PM, Paul Menzel wrote:
Dear Tor folks,
I updated from 0.2.0.35-1~lenny2 to 0.2.1.23-2~~lenny+1 and use the
same
configuration. But now I am seeing
Your IP address seems to have changed to xxx.xxx.xxx.xxx. Updating.
every 10 seconds in `/var/log/tor/log`.
I
On Feb 12, 2010, at 3:42 PM, Michael Holstein wrote:
Could you bind your exit traffic to IPs outside your University's
primary block?
Not sure what you mean by bind to outside IP, but our network is a
contiguous /16. We would have to register for extra /24s from ARIN,
and
that costs
On Feb 12, 2010, at 5:27 PM, Michael Holstein wrote:
Why not simply block that entire network in the Exit policy?
You're missing the point .. we already blocked our *own* /16 in the
exit. The problem was the thousands of academic journals, all of which
have distinct addresses, that
On Jan 21, 2010, at 6:25 AM, grarpamp wrote:
As I wrote someone earlier...
It would be easier to just sign the git revision hashes at various
intervals.
Such as explicitly including the revision hash that each release is
made from in the release docs itself. And then signing that release.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Jan 8, 2010, at 6:45 PM, Luis Maceira wrote:
The well-known TLS renegotiating error which the tor-0.2.1.21
version was supposed to address persists on FreeBSD-8.0 updated as
of today.The unstable version (0.2.2.6) same thing the error
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Scott,
On Jul 7, 2009, at 8:24 AM, Scott Bennett wrote:
I submitted tor bug report #1026 via Jon scr...@nonvocalscream.com
,
who volunteered to post it to bugs.torproject.org for me because
that web
site refuses to log me in. (Should I
On Jul 7, 2009, at 5:55 PM, Scott Bennett wrote:
[snip]
But *which* descriptor? The last successful one? Or the one that
failed?
They generate a new one, based on their current config options.
BTW, thank you for looking at this so quickly. This one indeed is
much less urgent than
Hi Timo,
On Jun 18, 2009, at 8:00 AM, Timo Schoeler wrote:
Hi,
IMHO it's not the problem of 'how TOR works' or the (unquestionable)
benefits it provides, it's more the problem of the 'image' of the ISP
that hosts (customer's) exit nodes and therefore might have problems
with the local law
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Jun 17, 2009, at 8:28 PM, Sören Weber wrote:
On Wed, Jun 17, 2009 at 5:58 PM, Fabian
Keilfreebsd-lis...@fabiankeil.de wrote:
Alleged copyright infringements.
Yes, of course. He stated that he doesn't believe that these mails are
caused by the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On May 26, 2009, at 8:35 AM, Nils Vogels wrote:
On Tue, May 26, 2009 at 4:04 AM, scr...@nonvocalscream.com wrote:
On Mon, 25 May 2009 16:59:33 -0400, Roger Dingledine a...@mit.edu
wrote:
snip
But you're right, this is a real problem. Some of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi list,
I'm happy and thankful that I'll be able to work on Bittorrent
integration for Thandy as a Google Summer of Code student! It's great
to have this awesome opportunity again, after working on Puppetor
during last year's Summer of Code.
On Apr 19, 2009, at 10:21 AM, Tripple Moon wrote:
Your list doesn't include for example 22 (ssh), which
is absolutely essential for many of us.
Well see...from my point of view SSH is abuse of the tor-network,
namely aiding in hacking other systems. (see my other posts for my
logic)
To use
On Dec 27, 2008, at 6:43 PM, Arun SAG wrote:
Hi,
I have found my network admin has added a squid ACL something like
acl numeric_IPs url_regex ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+
http_access deny CONNECT numeric_IPs all
And now vidalia is not able connect to tor network (cant create
circuits),
On Dec 15, 2008, at 4:41 AM, Jon wrote:
[snip]
...DMCA, hacking, child exploitation transiting my link.
Don't get the context wrong... quote it all if your going to pick it
line item. These things (with perhaps the loose exception of DMCA) are
illegal in all jurisdictions I believe? If there
-Ursprüngliche Nachricht-
Von: Praedor Atrebates [EMAIL PROTECTED]
Gesendet: 20.11.08 21:10:08
An: or-talk@freehaven.net
Betreff: Problems with irc because of tor?
I have been fighting to get tor-0.2.1.7-alpha working on my system for a
while
and finally appear to have it
Sebastian Hahn wrote:
Unfortunately, some service providers choose to not accept Tor users
as part of their userbase and block connections from exit nodes.
That wasn't the question, he was wondering why he was using Tor at all
though he told his client not to use it.
Sorry I didn't
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Jul 18, 2008, at 7:39 PM, [EMAIL PROTECTED] wrote:
Of course you can. And if you are able to bring yourself under the
top 100 of 500 exit nodes in one day, you can solve it even in two
days. Just use a different destination IP for each exit
Hi, a correction included below:
On May 23, 2008, at 10:26 AM, F. Fox wrote:
[snip]
Exit
Nodes which can be the last node in a circuit. They take the encrypted
traffic from the network, take the last layer of encryption off, and
send it toward its final destination.
That is wrong. A node
On May 22, 2008, at 1:26 AM, Nathaniel Dube wrote:
I noticed some of you have GPG keys. I tried searching key servers
so I can
add your public keys to my list. It would seem either I'm not
searching the
right servers or none of you have uploaded them. So I'm asking that
all of
you
On May 14, 2008, at 7:10 PM, Arjan wrote:
Two questions:
Do I have to do something to get the old key blacklisted to make sure
that someone can't impersonate it?
(Old fingerprint: $C33ABC15B69DA274588CA1869CC1EE7B1DC11DAD)
no, that key is already blackliste
Should I rename my node? It
Hi everybody,
I'm excited to be able to work for the Tor project in this year's
Google Summer of Code! Thanks to everybody who has helped me get
familiar with Tor so far, and special thanks to Nick Matthewson as he
will be mentoring me in my attempts to create an application able of
On Apr 22, 2008, at 10:51 AM, Sebastian Hahn wrote:
If you have any comments, I'm glad to hear from you! I will post
some notes indicating progress during the summer, so people can see
where I am. If you want to discuss the project with me or generally
have a little chat, #Tor on freenode
Hi,
On Apr 20, 2008, at 1:32 PM, Alexander Bernauer wrote:
[snip]
The basic idea is to develop a browser plugin which while active turns
the computer into both an Tor client and a Tor exit node. The target
group is a Windows XP or Vista user with almost no technical skills
but
fear of
On Apr 7, 2008, at 12:49 PM, Dark Clouds wrote:
hi there
there's someone thinking of helping out tor by running a server.
will one of the admins care to or please recommend someone nice
enough to help on setting up one?
Hi,
I'm not an admin, but I can help you in the process if you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Apr 8, 2008, at 1:17 AM, F. Fox wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Dark Clouds wrote:
hi there
there's someone thinking of helping out tor by running a server. will
one of the admins care to or please recommend someone nice
On Apr 4, 2008, at 11:16 AM, [EMAIL PROTECTED] wrote:
Hi, thank you for the reply!
Also, when the user agent changes on a website that you logged
onto, they
are going to link the two
This is a good point, if the rotation occurs during the period of
login,
but one may choose a longer
On Apr 4, 2008, at 12:10 PM, [EMAIL PROTECTED] wrote:
hi, thank you for your reply, my comments follow below:
On Apr 4, 2008, at 11:16 AM, [EMAIL PROTECTED] wrote:
Hi, thank you for the reply!
Also, when the user agent changes on a website that you logged
onto, they
are going to link the
Hi Wojtek,
there are already 5 applications for improvements to the Scanner, so
if you think something else interests you, you may be better suited to
choose that.
Sebastian
On Apr 2, 2008, at 6:24 PM, Wojciech Walczak wrote:
Hello All,
I just wanted to ask if there is anybody working
I think you have an error in your forwarding setup... If you want to
talk about it, please join #tor on irc.oftc.net. If not, please post
some log messages indicating the failure
Sebastian
On Mar 29, 2008, at 5:01 PM, Pollo wrote:
I use tor 0.1.2.19 under SuSE linux 10.3.
I istalled it
On Mar 22, 2008, at 4:15 AM, [EMAIL PROTECTED] wrote:
On Sat, Mar 22, 2008 at 06:58:25AM +1100, [EMAIL PROTECTED]
wrote 0.6K bytes in 23 lines about:
: I downloaded the
: vidalia-bundle-0.2.0.22-rc-0.1.1-tiger.dmg and
: installed it. I now have Tor 0.2.0.22-rc and Vidalia
: 0.1.1. I also have
On Mar 12, 2008, at 5:07 PM, Rochester TOR Admin wrote:
I've been doing some work on a better system to check the privacy of
a browser [server side DNS tests, flash tests, etc] and humbly think
that I may have some good contributions.
Looking at the tor volunteer page i see that #6 is the
On Feb 18, 2008, at 7:40 PM, Nick Mathewson wrote:
On Sun, Feb 17, 2008 at 06:36:13PM +0100, Olaf Selke wrote:
Narf!
debugging the [warn] Error creating network socket: Too
many open files messages I just found the max number of
file descriptors apparently being hard coded in or.h to a
value
On Feb 17, 2008, at 6:03 PM, [EMAIL PROTECTED] wrote:
On Sat, Feb 16, 2008 at 12:03:02PM -0800,
[EMAIL PROTECTED] wrote:
I'm seeing this message in terminal running Tor when trying to
connect
to any .onion sites:
[notice] Tried for 120 seconds to get a connection to [scrubbed]:80.
Giving
Hi,
after reading this I went ahead and with the help of Phobos compiled
an installed trunk.
On Feb 16, 2008, at 11:02 PM, [EMAIL PROTECTED] wrote:
On Sat, 16 Feb 2008 21:46:54 +0100, Karsten Loesing
[EMAIL PROTECTED] said:
Some days ago there was a guy on #tor with a similar problem.
58 matches
Mail list logo