On 9/13/07, scar [EMAIL PROTECTED] wrote:
...
so, if we are using a website that uses HTTPS, but, in firefox, for
example, in the cookies list under that website it shows Send
for: any type of connection, then the session is vulnerable?
vulnerable against a MITM that can request / inject an
3) Ich habe kompetenten Rechtsbeistand.
schön, ich habe noch keinen.
Hi Folks,
I am a (law)-student from Germany, and currently have time and money to
spend a TOR-node.
Because of legal reasons (see the threads before) it regret for only
being able to spend a middle-man node (and DNS-Lookup). I thought about
using a VServer and Strato seems to fit my needs.
What
On 14.09.2007 15:13:45, Ricky Fitz wrote:
Hi Folks,
I am a (law)-student from Germany, and currently have time and money to
spend a TOR-node.
Because of legal reasons (see the threads before) it regret for only
being able to spend a middle-man node (and DNS-Lookup). I thought about
using
Hi Folks,
I am a (law)-student from Germany, and currently have time and money to
spend a TOR-node.
Because of legal reasons (see the threads before) it regret for only
being able to spend a middle-man node (and DNS-Lookup). I thought about
using a VServer and Strato seems to fit my needs.
What
Am Freitag, den 14.09.2007, 15:17 +0200 schrieb Benjamin Schieder:
3. Nutzungsüberlassung an Dritte
Der Kunde darf den Server Dritten nicht ganz oder teilweise zur
Nutzung überlassen. STRATO kann einer Nutzungsüberlassung zustimmen.
Sie setzt den Abschluss eines gesonderten
On 14.09.2007 15:29:17, Ricky Fitz wrote:
Am Freitag, den 14.09.2007, 15:17 +0200 schrieb Benjamin Schieder:
3. Nutzungsüberlassung an Dritte
Der Kunde darf den Server Dritten nicht ganz oder teilweise zur
Nutzung überlassen. STRATO kann einer Nutzungsüberlassung zustimmen.
Sie
Am Freitag, den 14.09.2007, 15:36 +0200 schrieb Benjamin Schieder:
You're the law student, you tell us :-)
Well no, im just a student, now a lawyer ;-)
Thats why I sent this mail to ask for experiences.
But I agree that it can be extended to Tor/Open Proxies, even 'knowingly'
running
The only way to determine the integrity of their policy or claims is to
contest it.
There are many options to where you implement such a system, but if you can
control the logistics of your implementation it gives you a very good entry
point into your profession ;)
However, the basis of TOR is a
Am Freitag, den 14.09.2007, 10:15 -0400 schrieb Wilfred L. Guerin:
Your best option, in any case, is to test it! (maximal loss is 1 month
service fee?)
3 months, but that's okay. Probably we should start a Wiki-Page with
experiences about different Hosting-Provider?
Regards,
Ricky.
--
Falls
On 14.09.2007 at 16:47 Ricky Fitz wrote:
Probably we should start a Wiki-Page with
experiences about different Hosting-Provider?
There is already a corresponding wiki page:
http://wiki.noreply.org/noreply/TheOnionRouter/GoodBadISPs
Strato is not yet listed, but it would be nice to have
Another possible way would be, to integrate the server hoster into your
security considerations.
What about telling the provider what you are going to do, which risks
there are and how to handle abuse inquiries?
This way of open (and fair) play could give you some advantages in
serious situations
I tried to run a tor node on a Strato vserver 1 year ago.
It did not work, because the max. connections were limited to 145
TCP-connection IN and 145 TCP-connections OUT. A TOR server needs at
least 1024 connections. See:
Yes, you're right, currently. This wasn't meant to be a way to avoid
server confiscation at *this* time. But if Tor node operators get a more
official acceptance somedays, there could be a way to handle this a
better way (i hope). Think on professional service providers, they get
the chance to
On Fri, 14 Sep 2007 19:37:00 +0200 TOR Admin (gpfTOR1)
[EMAIL PROTECTED] wrote:
I tried to run a tor node on a Strato vserver 1 year ago.
It did not work, because the max. connections were limited to 145
TCP-connection IN and 145 TCP-connections OUT. A TOR server needs at
least 1024
On Fri, Sep 14, 2007 at 07:38:33PM +0200, BlueStar88 wrote:
better way (i hope). Think on professional service providers, they get
the chance to *cooperate*, not just get cut off. What 'cooperation'
means in detail, who knows...
The 'professional service providers' bend over backwards to
Am Freitag, den 14.09.2007, 19:37 +0200 schrieb TOR Admin (gpfTOR1):
The ISP 1blu offers a vserver, which may be used for a TOR node.
I read a message about a running TOR node without any error on a 1blu
vserver. It offers more traffic ;-)
Just saw a Sonderangebot (what do you call that in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
TOR Admin (gpfTOR1) wrote:
The ISP 1blu offers a vserver, which may be used for a TOR node.
I read a message about a running TOR node without any error on a 1blu
vserver. It offers more traffic ;-)
I can confirm that: I run the tor exit node
On Fri, Sep 14, 2007 at 07:37:00PM +0200, TOR Admin (gpfTOR1) wrote:
The ISP 1blu offers a vserver, which may be used for a TOR node.
I read a message about a running TOR node without any error on a 1blu
vserver. It offers more traffic ;-)
From the ISP's point of view, there is every
* Eugen Leitl schrieb am 2007-09-14 um 21:20 Uhr:
Assuming a 10 MByte/s throughput, you'll burn some 27 TBytes/month,
which would run down to about 2.7 kEUR/month burn rate. Even if
IMHO Hetzner would pay less than 300 Euro per month for this amount of
traffic (or better for the throughput). So
Truthfully, you might be better served in a predictive-analysis model
test...
Set up machines at diverse ISPs that are well connected to eachother, set up
VPN streams between external entry point nodes and these various core
distributors. Max out your available connections between known and
The best option is to run a squid server on localhost with a block by
country filter. Then, route your tor client through it.
Comrade Ringo Kamens
On 9/14/07, misc [EMAIL PROTECTED] wrote:
I'm using Tor on windows
I prefer to avoid tor nodes from certain countries. I know that I can
manually
There's a lot of errors when linking
gcc -g -O2 -Wall -g -O2 -o tor.exe buffers.o circuitbuild.o
circuitlist.o circuituse.o command.o config.o connection.o
connection_edge.o connection_or.o control.o cpuworker.o directory.o
dirserv.o dirvote.o dns.o dnsserv.o hibernate.o main.o ntmain.o
23 matches
Mail list logo