Bugs tend to get fixed faster and/or more efficiently
when they are entered into the bug tracking system.
I copied this email into a new one at
https://trac.torproject.org/projects/tor/ticket/2542
It would be helpful if you can add information such as your
- Operating system version
- Tor
On Thu, Feb 03, 2011 at 05:59:03PM +0100, Eugen Leitl wrote:
On Thu, Feb 03, 2011 at 05:36:09PM +0100, Andrea Trentini wrote:
self suggestion: I asked hetzner if they accept a tor node, they
told me yes, but you're responsible (of course)
Interesting. Hetzner is officially down on
On Mon, Jan 03, 2011 at 04:06:44PM +0100, anonym wrote:
Hi list,
Liberté Linux has a novel solution to this problem[4] -- it sets the
system time according to the Tor consensus' valid-after/until values,
which essentially removes Tor's time skew check. We T(A)ILS developers
are tempted to
On Mon, Dec 20, 2010 at 11:49:36PM -0500, Justin Aplin wrote:
Because I like to tinker, and since the PPC version of Vidalia is out of date,
I'd thought about building Vidalia itself from source, but http://
www.vidalia-project.net/ isn't working for me. Is the current source publicly
How are bitcoins relevant to Tor?
Can a relay generate them just by processing traffic?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
The bad advice may be a misinterpretation or poor rephrasing
of this advice in the Tor FAQ Wiki:
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#WhyisitbettertoprovideahiddenserviceWebsitewithHTTPratherthanHTTPSaccess
On Sun, Oct 10, 2010 at 05:30:27PM +0200, Udo van den Heuvel wrote:
Hello,
0.2.2.15 ran fine on my Fedora 13 box.
0.2.2.17 has exited twice without much reason...
Any ideas why?
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#MyTorkeepscrashing.
On Tue, Oct 05, 2010 at 07:57:42PM +0100, Geoff Down wrote:
[warn] The configuration option 'StrictExitNodes' is deprecated; use
'StrictNodes' instead.
It would help if such an option were documented in
https://www.torproject.org/tor-manual.html.en
or shipped in the expert install package.
That new site does not respond.
Also, the same design flaw applies to ANY remote web-based proxy:
it is a single concentrator and can thus is a magnet to be attacked
or have its incoming connections monitored. If the connections
are SSL (https) it might be slightly more difficult to snoop on,
some alternatives that dont require blocking Tor:
- authenticate new members by non-electronic means
- disallow posting of links by new members
- moderate content
On Tue, Jun 29, 2010 at 01:10:28AM +0200, Moritz Bartl wrote:
(Forwarded with permission)
Original Message
On Wed, May 19, 2010 at 03:21:15PM -0400, Stephen Carpenter wrote:
On Wed, May 19, 2010 at 1:48 PM, Sebastian Hahn m...@sebastianhahn.net
wrote:
Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the number
of relays ?
Yes, unfortunately quite a few people use it.
It
On Sat, Apr 17, 2010 at 12:58:57PM -0500, Bill Weiss wrote:
My apologies if there's some canonical source for this I'm missing. I
didn't see anything in the archives of the list for the last couple of
months, and I don't remember seeing anything like this any time recently.
...
My
On Thu, Apr 15, 2010 at 09:45:56PM -0500, Edward Langenback wrote:
I've just upgraded to vidalia-bundle-0.2.1.25-0.2.7.exe and now TOR is
not starting at all. I've tried a full uninstall-reinstall with no
changes.
Any ideas what the problem is? I'm still getting the same behavior
after
Though the comic makes a good point,
some people are coerced by circumstances into running such software.
There is Free virus scanner called clamwin http://www.clamwin.com/
but it can only scan and remove, it does not block activity.
Since Windows Server users have money for licenses
most
On Sat, Jan 02, 2010 at 04:29:19PM +0100, Gitano wrote:
emigrant wrote:
is that possible?
Which question(s) beside 'http://www.privoxy.org/faq/index.html'?
see also
http://www.torproject.org/docs/tor-doc-unix.html.en#polipo
there is a sample Privoxy config for use with Tor
On Fri, Jan 01, 2010 at 06:39:39PM +, M wrote:
thanks for the info. I understand that it cant be safer than the real
stuff, but objectively, i do� believe its safer than other online proxies,
such as anonymouse? Am i correct?
It may even be less safe because
it is a single
On Thu, Dec 31, 2009 at 05:37:26PM +0530, emigrant wrote:
i am using the pidgin with ubuntu. and i installed TOR as well.
i want to set up TOR to one of the yahoo accounts in pidgin.
so i went to proxy settings and changed the gnome proxy setttings into
socks5 and host 127.0.0.1 and port 9050.
On Thu, Dec 31, 2009 at 08:30:57AM -0500, krishna e bera wrote:
Also, the link you quoted in your other message is out of date -
we do not use the wiki on noreply.org anymore.
Sorry, it was Freemor who gave the old URL.
Yahoo instant messaging on Pidgin under Ubuntu
seems to work via Tor
On Thu, Dec 31, 2009 at 11:33:49AM -0500, Xinwen Fu wrote:
Dear All,
We integrated Tor with a location based service to implement a location
privacy preserving location based service.
1. Tor is used to hide the identity (IP) of a user, who sends her location
to a location
On Wed, Dec 30, 2009 at 10:49:12PM +0530, arshad wrote:
forgive me for my ignorance.
are you having difficulties reading the website or understanding some pages,
perhaps due to your native language?
may i know why governmetns fund TOR. i read 49% funds coming from
government. TOR is usually
On Thu, Dec 10, 2009 at 10:48:54PM -0500, Andrew Lewman wrote:
On 10/26/2009 08:54 AM, Vita Cizek wrote:
In September, the Slovak Ministry of Transport, Post and
Telecommunication
prepared an amendment of the Electronic Communication Act.
The Ministry of Internal Affairs integrated their
On Thu, Nov 19, 2009 at 11:46:12AM -0500, Erilenz wrote:
This is one of those ideal/practical arguments. Idealistically, Tor
would only have 3 hop circuits and those who want simple circumvention
wouldn't use it. That doesn't make it the practical truth of what is
happening though.
Even if
On Tue, Nov 10, 2009 at 12:29:26PM -0500, Brian Mearns wrote:
On Sun, Oct 18, 2009 at 9:04 PM, John Case c...@sdf.lonestar.org wrote:
On Sun, 18 Oct 2009, Jacob Todd wrote:
[clip]
I'd like to change the design of the Internet by introducing
regulation--Internet passports, Internet police
On Sat, Oct 31, 2009 at 07:23:24AM -0400, downie - wrote:
Date: Sat, 31 Oct 2009 01:17:13 -0400
From: a...@mit.edu
To: or-talk@freehaven.net
Subject: (FWD) Load external content? message seems inappropriate
[Forwarding to the list since this address isn't subscribed.
On Tue, Sep 01, 2009 at 04:20:42PM +0200, Folkert van Heusden wrote:
Hi,
The Tor anonimity network is a generic carrier for all kinds of (TCP)
traffic. Its goal is enabling people to use the internet without anyone
between them and the destination point being able to determine what is
On Tue, Aug 11, 2009 at 01:23:40PM -0300, Wilson Goes wrote:
Using TOR
Is there any way to garantee that I will receive diferent IP adress
every time during a periodo off 24 hours ?
If you also use Vidalia or Tork or another Tor controller
you can tell it to get a new identity or send the
On Mon, Aug 10, 2009 at 01:39:44PM -0500, Scott Bennett wrote:
[...]
to the cablemodem. I was told that having *any* ports open facing the
Internet was a violation of Comcast's Acceptable Use Policy (AUP) for
residential accounts. [...]
This would be crippling if true - residential VOIP and
Could someone post the contact addresses for cashing in?
And perhaps some proof that they do (or do not) pay?
On Tue, Jun 23, 2009 at 03:55:57PM +0200, Timo Schoeler wrote:
thus Tom Hek spake:
On Jun 23, 2009, at 15:01 PM, Harry Hoffman wrote:
At $0.20USD/MB I was able to supplement my
On Sat, Jun 20, 2009 at 06:01:27PM +0200, Nils Vogels wrote:
On Sat, Jun 20, 2009 at 11:09 AM, Karsten N.
[1]tor-ad...@privacyfoundation.de wrote:
And I hope, tor will stay political neutral.
IMHO, Tor is, much like any other software, a tool. A tool is used to
accomplish
On Thu, May 21, 2009 at 07:30:45PM +0100, Steffan Wood wrote:
What is the link to manage Tor mailing lists? (delete account, set
digest format etc)
or-talk is a Majordomo mailing list,
so management of your subscription is done by emailing to
majord...@seul.org
with no subject and the body
On Tue, Mar 24, 2009 at 09:57:49PM +, Lee wrote:
I'm trying out the Tor Browser Bundle, and I see Javascript is enabled
in the browser. Can I turn this off or is that option required left on
for certain functionality in the bundle?
Torbutton, when enabled, protects you from many
i wrote:
However, javascript is not required for either Torbutton or
Tor Browser Bundle functionality, so you can turn javascript off
for additional security.
Ack! For some reason i thought Torbutton was implemented purely in XUL
but a lot of it is actually implemented in javascript.
Sorry
I have gotten two abuse complaints relating to posting of spam onto Craigslist
via my Tor exit node. In each case i sent the complainant and my ISP a note
about
Tor (modified EFF DMCA response) as well as a suggestion that part of the
problem
is the website's failure to require users to
On Sat, Jan 03, 2009 at 05:15:15PM +0100, sigi wrote:
Hi,
On Sat, Jan 03, 2009 at 05:26:57AM -0500, Ringo Kamens wrote:
3. One of the common criticisms of NoScript+Tor is that a malicious exit
node can pretend to be any site it wishes. What about enabling js on
file:// urls? If I
On Sun, Dec 21, 2008 at 01:00:38PM -0800, Curious Kid wrote:
Industry organization putting pressure on Tor exit node operators to filter
leads to chilling effects.
As nodes start to filter, that traffic will seek out non-filtering exits.
That would work like a funnel, as a majority of
On Sun, Dec 14, 2008 at 10:36:13AM -0800, Christopher Davis wrote:
How practical is SSH password cracking over Tor? Wouldn't the latency
deter attackers?
SSH password attacks from single sources can be deterred with watcher programs
such as Fail2Ban which modify the firewall to discard
It is unlikely that the content in question was ever on your computer at all,
because Tor does not transfer UDP packets (used by bittorrent for data) and
the default exit policy rejects the common bittorrent ports.
The MPAA investigators are likely seeing the Tor users' access to the tracker
On Sun, Oct 19, 2008 at 01:45:22PM +0200, Dominik Schaefer wrote:
As already said, much more difficult is the part about anonymizing
services, which brings us right to the still missing 'technical
directive'.
That will define the specifics: who is exempted (e.g. WLAN hotspots in
hotels are
On Tue, Oct 07, 2008 at 04:21:32PM -0400, Michael Holstein wrote:
[...]
http://help.twcable.com/html/twc_misp_aup.html
However, like many ISPs, it still contains this clause :
The ISP Service may not be used to breach or attempt to breach the
security, the computer, the software or the
This is not a site, it is a mailing list.
In every message that appears on this list,
you will find a header with the instructions you seek.
The header starts like this:
X-To-Get-Off-This-List
If you are using flawed email software such as Microsoft Outlook Express,
you may have to select
Thanks for running a check site and helping with privacy/anonymity!
I believe torbutton does this sort of scrubbing.
You can see what it does and why at
https://torbutton.torproject.org/dev/design/
It would be nice to have a torbutton for Konqueror.
On Mon, Jul 07, 2008 at 12:12:54AM -0400, [EMAIL PROTECTED] wrote:
I noticed this in my tor client log [Tor v0.2.0.28-rc (r15188) with
SafeLogging 0 in torrc]:
[notice] No Tor server exists that allows exit to 127.0.0.1:80. Rejecting.
[snip]
like this. -
AVG (and other antivirus software) inserts a proxy that catches the email
traffic you mention.
The risk with any examining or altering of traffic is that you may be
giving up your legal and moral claim to status as a common carrier or safe
harbour
which is perhaps the only thing protecting you
According to the announcement:
Trademarks will not be automatically reserved. But there will be an
objection-based mechanism for trademark owners where their arguments for
protection will be considered.
How expensive or practical is it to trademark .onion for purposes of the Tor
network?
On Sat, Jun 21, 2008 at 09:13:02PM -0700, Luis Maceira wrote:
The question: can I use the FQDN or IP preferably,
instead of nicknames,in torrc entrynodes,exclude
nodes,exitnodes options?I have read something
lately about the functioning of the Tor system,
and it seems the directory
Please explain how these clients can be used to spy the Tor network.
I think the only risk of exposing real ip adddresses would be to
other users of bittorrent.
The latest version of KTorrent is supposed to support socks5 directly,
but we do not want the data packets going over the Tor network
On Wed, Jun 18, 2008 at 12:25:37AM -0400, Roger Dingledine wrote:
Changes in version 0.2.1.1-alpha - 2008-06-13
o Memory fixes and improvements:
- Add a malloc_good_size implementation to OpenBSD_malloc_linux.c,
to avoid unused RAM in buffer chunks and memory pools.
- Speed up
On Thu, Jun 12, 2008 at 04:26:48PM -0700, Mike Perry wrote:
3. Based on my measurements last year, only the top ~5-10% nodes are
capable of transmitting this much data in an individual stream, and
only if all of the nodes in your path are from this set. Furthermore,
as load balancing improves
Would it be useful to add an item to the Step Three: Once it's working
document
https://www.torproject.org/docs/tor-doc-relay.html.en#after
such as
18. Protect your exit node's reputation by ensuring that its DNS resolution
isn't hijacked.
Examples:
- if you use OpenDNS, turn off the
You allege there is an exploitable flaw in current Tor versions
and have not informed Tor developers of details yet??
I would hope DefCon does not accept presenters having such ethics.
On Tue, Jun 10, 2008 at 12:50:10PM -0500, Arrakis wrote:
Yes, it can be done.
If the talk is accepted at
50 matches
Mail list logo