Re: we seem to have another huge traffic reduction

2008-10-08 Thread Roger Dingledine
On Tue, Oct 07, 2008 at 07:42:19PM -0500, Scott Bennett wrote: Over the last few days, the torstatus pages appear to have confirmed what I see when I watch the activity of my tor server: another precipitous drop in traffic load over the entire tor network. This is the second such

Re: Thunderbird Gmail

2008-10-08 Thread Gerardo Rodríguez
Thanks a lot, I´ll be running tests I´ll post the results anonym escribió: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/10/08 01:09, Jonathan Addington wrote: With Wireshark you can filter by port. .. To address the above, filter by ports, and then by your IP inside the

Re: we seem to have another huge traffic reduction

2008-10-08 Thread Roger Dingledine
On Wed, Oct 08, 2008 at 10:52:32AM +0200, Martin Mulazzani wrote: In the past few days there was a drop in the number of servers with the guard flag set. See the attatched picture. Number of running, running exit and running fast servers is as usual. That sounds like it might be related to bug

Re: we seem to have another huge traffic reduction

2008-10-08 Thread Martin Mulazzani
Hi! In the past few days there was a drop in the number of servers with the guard flag set. See the attatched picture. Number of running, running exit and running fast servers is as usual. If you are interested I can check what countries changed the number of guard servers compared to regular

same first hops

2008-10-08 Thread M
Is there any reason i get the same first hope for a number of days? Even when i form a new identity in vidalia, i still get the same first hops. i dont feel comfortable with that.

Re: same first hops

2008-10-08 Thread Gregory Maxwell
On Wed, Oct 8, 2008 at 4:50 PM, M [EMAIL PROTECTED] wrote: Is there any reason i get the same first hope for a number of days? Even when i form a new identity in vidalia, i still get the same first hops. i dont feel comfortable with that. It increases your security.

Re: same first hops

2008-10-08 Thread J B
someone tell me how to get off this list i dont see any instructions included in any emails on how to leave the emails are way way too much --- On Wed, 10/8/08, F. Fox [EMAIL PROTECTED] wrote: From: F. Fox [EMAIL PROTECTED] Subject: Re: same first hops To: or-talk@freehaven.net Date:

Re: same first hops

2008-10-08 Thread M
Thanx Gregory and F.Fox...understood the concept. Just one note though: Tor (like all current practical low-latency anonymity designs) fails when the attacker can see both ends of the communications channel. For example, suppose the attacker is watching the Tor relay you choose to enter the

Re: same first hops

2008-10-08 Thread Gregory Maxwell
On Wed, Oct 8, 2008 at 11:23 PM, M [EMAIL PROTECTED] wrote: Thanx Gregory and F.Fox...understood the concept. Just one note though: Tor (like all current practical low-latency anonymity designs) fails when the attacker can see both ends of the communications channel. For example, suppose the

Re: another DirPort DoS attacker

2008-10-08 Thread Roger Dingledine
On Tue, Sep 02, 2008 at 08:20:47AM -0500, Scott Bennett wrote: A short time ago, I found that 212.205.53.212 had several hundred open TCP connections to my tor server's DirPort, and very little relay traffic seemed to be getting past all of that. I've now taken steps to prevent such

Re: same first hops

2008-10-08 Thread M
but it says first hop On Thu, Oct 9, 2008 at 6:31 AM, Gregory Maxwell [EMAIL PROTECTED] wrote: On Wed, Oct 8, 2008 at 11:23 PM, M [EMAIL PROTECTED] wrote: Thanx Gregory and F.Fox...understood the concept. Just one note though: Tor (like all current practical low-latency anonymity

Re: same first hops

2008-10-08 Thread Gregory Maxwell
On Wed, Oct 8, 2008 at 11:34 PM, M [EMAIL PROTECTED] wrote: On Thu, Oct 9, 2008 at 6:31 AM, Gregory Maxwell [EMAIL PROTECTED] wrote: On Wed, Oct 8, 2008 at 11:23 PM, M [EMAIL PROTECTED] wrote: Thanx Gregory and F.Fox...understood the concept. Just one note though: Tor (like all current

Re: same first hops

2008-10-08 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 M wrote: Thanx Gregory and F.Fox...understood the concept. Just one note though: Tor (like all current practical low-latency anonymity designs) fails when the attacker can see both ends of the communications channel. For example, suppose the

Re: same first hops

2008-10-08 Thread M
ok understood, so in actuality he would have to be observing 3 things: 1) The user' s computer (timing and size) 2) the first hop ((timing and size) 3) the last hop ((timing, size and anythign else) He would have to be observing the user computer, as there would be no other way to correlate the

Re: same first hops

2008-10-08 Thread Gregory Maxwell
On Wed, Oct 8, 2008 at 11:50 PM, M [EMAIL PROTECTED] wrote: ok understood, so in actuality he would have to be observing 3 things: 1) The user' s computer (timing and size) 2) the first hop ((timing and size) 3) the last hop ((timing, size and anythign else) He would have to be observing

Re: same first hops

2008-10-08 Thread M
sorry for the many questions... How can i find the $fingerprint of TOR nodes i was to set as the entry? On Thu, Oct 9, 2008 at 7:11 AM, Gregory Maxwell [EMAIL PROTECTED] wrote: On Wed, Oct 8, 2008 at 11:50 PM, M [EMAIL PROTECTED] wrote: ok understood, so in actuality he would have to be