--- glymr [EMAIL PROTECTED] wrote:
i'm pretty sure someone has written some dns proxy
that queries through
tor, i have a vague memory that it was only
implemented in windows
however. i'm going to look into this because i think
it'd be rather cool
to actually resolve all dns queries
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
it's pissing me off that the dns leak problem hasn't been plugged yet,
to the point that i'm teetering on the edge of deciding to dedicate my
weekend to writing a dns proxy to sort this crap out permanently, in
c... a language i'm only moderately
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
I am not adding anything useful, but I wish to add my feeling about this
situation that people are so rapidly responding to a threat so early.
:) tor will never die if people like you all are on it. (which reminds
me i've blathered about writing
On Wed, Oct 04, 2006 at 08:45:03PM -0400, Claude LaFrenière wrote:
Hmmm... Bogus exit nodes or bogus DNS servers ?
One or the other way, brute forcing my way through all exit-nodes should
reveil it. Hopefully...
Is it possible that the strange side effects comes, not from the exit nodes
Currently i'm improving my torstat page to mark nodes with bad
http-behavior, using automatic http-throughput comparison of every
http-servicing exit-node against a reference exit-node.
Then it's up to the users to add a ExcludeNodes statement in
torrc using this information.
Greets
Hi *Alexander W. Janssen* :
On Wed, Oct 04, 2006 at 08:45:03PM -0400, Claude LaFrenière wrote:
Hmmm... Bogus exit nodes or bogus DNS servers ?
One or the other way, brute forcing my way through all exit-nodes should
reveil it. Hopefully...
This is a lot a job. May be a very long
On Thu, Oct 05, 2006 at 09:31:47PM +0800, Deephay wrote:
Also, the logo linux-magazine.com what you need, when you
need it is a image or just text?
Exactly the same page is at http://www.wdr.tv/.
The content of that page is (gathered with tcpdump):
frameset rows=100%,* frameborder=no border=0
On Oct 3, 2006, at 20:33:56, [EMAIL PROTECTED] wrote:
Are you on OSX x86 or PPC? The 0.1.1.24 packages for OSX are
fat binaries.
I apologize if I missed the message due to filtering on my end, but
was 0.1.1.24 ever announced? I see it's on the download page, and
there
Hi *David O Smith* :
I've just started using Tor on my MacTel system, running OS 10.4.8
I saw somewhere instructions for using Camino with Tor, but I can't find
them now. Anyone help me?
Some hints here (founded with Google...):
Hi *Alexander W. Janssen* :
Got it !
I was going to this web site: http://www.iamaphex.net
(This is the web site for Torcap, a program to socksify application in Windows
O.S.)
with the exit node exit node: whistlermother
Info: http://node2.xenobite.eu/torstat.php
1195whistlersmother
Hi all,
i checked 1161 nodes in total.
269 of them where responsive exit-nodes, all behaving correctly.
9 exitnodes where responsive, but their had some proxy installed which didn't
behave quite correct when you accessed a webpage with the notation
original.url.$nodename.exit; the
On Thu, 2006-10-05 at 02:07, jon smith wrote:
I still don't get it. Tor is for anonymity. DNS leaks
compromise anonymity (apparently anyone with 2 brain
cells on nodding terms can figure out where you're
going). The Tor documentation implies, however, the
setting ftp to fail (port 8118)
On 10/5/06, Alexander W. Janssen [EMAIL PROTECTED] wrote:
...
i checked 1161 nodes in total.
269 of them where responsive exit-nodes, all behaving correctly.
or just behaving when you were looking? ;)
9 exitnodes where responsive, but their had some proxy installed which didn't
behave
Hi *coderman* :
some kind of automated testing for rogue exits would be useful though.
May be but read this thread first to have a the complete story:
From: Alexander W. Janssen
Newsgroups: gmane.network.tor.user
Subject: Analyzing TOR-exitnodes for anomalies
Message-ID: [EMAIL PROTECTED]
14 matches
Mail list logo