-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[EMAIL PROTECTED] schrieb:
> Did you happen to record the exit node in your circuit to the site?
>
> The simple explanation is it means someone didn't setup their PTR
> records correctly.
I think it was a chinese one, "Unwatc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi folks!
I'm running Debian testing i386. I update my system on a daily basis
using aptitude.
I added the noreply.org repository to my sources.list, and afterwards
installed tor with "aptitude install tor".
I followed the instructions given on tor.
Kasimir Gabert wrote:
>
> Would you mind looking over the new
> router detail page and seeing if it looks reasonable to you? You can
> view it at
> http://trunk.torstatus.kgprog.com/router_detail.php?FP=795513a52e5155af5e36937d5a7c76d3bf20d0c4
Sir, Yes Sir!
It appears to be slighly below my mr
unsubscribe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi!
Nathaniel Dube wrote:
> For some reason kmail is giving me a [Invalid signature.]
> warning about your email. :-/
Same here. So the problem is not on your end...
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFINNszCw4Qy
auth 6bc7bd279542202 subscribe or-talk \
[EMAIL PROTECTED]
Algenon,
I agree with Steve.
I recommend running tor server on Vista, so that You can report bugs to
the developers.
About security:
Ringo thinks running Tor on Windows is a security risk because of
backdoors. But every OS has bugs, including linux, unix, bsd, mac OS.
And probably almost
_downloads():
Launching 0 request for 0 router, 4 at a time
It's just a small part of my log. If you want more I can give you the rest.
/Vikingserver
Roger Dingledine skrev:
> On Wed, Nov 07, 2007 at 01:37:31PM +0100, [EMAIL PROTECTED] wrote:
>> I also have reproduced this error with 020
BTW, the problem is happening right now, if you want to test something
on my server.
The logging is at info level.
I can resist from restarting Tor, so that you can test the problem "live".
Tell me what to do if you need information.
/Vikingserver
[EMAIL PROTECTED] skrev:
>
?
/Viking
Scott Bennett skrev:
> On Mon, 5 Nov 2007 07:32:11 -0500 Roger Dingledine <[EMAIL PROTECTED]>
> wrote:
>> On Mon, Nov 05, 2007 at 12:57:33AM -0600, Scott Bennett wrote:
>>> This problem has now recurred twice for me with 0.2.0.9-alpha. The
>>&g
My server also had the "I learned some more directory information, but
not enough to build a circuit." problem today.
It continued for a long while, so I tried to restart Tor and it worked.
The problem with the "I learned some more directory information, but not
enough to build a circuit." messag
If you use the most recent torbutton, it should block dangerous scripts.
It can be found here:
https://torbutton.torproject.org/dev/torbutton-current-alpha.xpi
Current version is 1.1.9.1
You can instead use the firefox addon noscript which blocks all scripts
instead, together with the old torbutto
>>> http://check.torproject.org/
>
> i have gone to the check page also, and it states: you are probably using tor.
>
> viking: i have also sent an email at [EMAIL PROTECTED]
>
> regards
> FQ
>
> ----> Date: Wed, 31 Oct
hina
>
> 15. 125.123.1.158 China
>
> 17. 125.123.1.138 China
>
> End 125.123.40.183China
>
> Is there any trick to hide the header information while sending email through
> hotmail.
> Any suggestion?
>
> Regards
> FQ
>
>
> --
The win32 version of the bundle either is corrupted or has a bad
signature. Please fix this, and tell us if the signature or the bundle
was bad.
The win32 tor-only package has a good signature.
Roger Dingledine skrev:
> This eighth development snapshot fixes a crash bug that's been bothering
>
tor 0207a and vidalia 14 seem to work fine again.
The only change I made was to turn of the option of beeing a directory
server.
Perhaps a bug in 0207a that makes tor servers acting as dirservers not
respond in windows?
Anyone else that has experienced this with version 0207a?
[EMAIL PROTECTED
uter, or
if the computer crash caused Tor/Vidalia to stop working properly?
[EMAIL PROTECTED] skrev:
> On Thu, Oct 04, 2007 at 01:19:36AM +0200, [EMAIL PROTECTED] wrote 0.7K bytes
> in 20 lines about:
>
> Is there anything interesting in the tor log file?
>
I'm running vidalia0014 and tor0207a.
The last 5-7 times I started my server, both Vidalia and tor hangs.
Vidalia either starts responding or crashes when I shut down the tor.exe
process manually.
Tor starts working again if I start up Vidalia and start tor from the menu.
Perhaps this is a known
Your idea is good. Perhaps EU police also don't have enough time and
energy to decrypt SSL traffic. While it's easier for them to monitor
non-SSL traffic. But I guess EU police probably will be very interested
in IP numbers if they seize a mail server, so they might still get upset
if you run an ex
er for people behind restrictive firewalls to get access to
the internet. But I would probably run an exit server if I was sure not
to get a policeman knocking on my door one day.
/Viking server admin
Torified User skrev:
>
>
> */jeffery statin <[EMAIL PROTECTED]>/* wrote:
>
>
Interesting, but a very complicated method of filtering.
In the future, perhaps it would be possible to make a plugin for Tor
that makes it easy to block unwanted traffic. That would make it easier
for more people to dare to run Tor exit nodes.
For windows, if you only want to block IPs it's also
System time was about + 2 minutes, compared to real time.
/Viking
coderman skrev:
On 8/13/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
I have the same problem. 3 days of "not enough to build a circuit".
Server: Viking, WinXp Vidalia 0.0.13 Tor 0.2.0.4
B
I have the same problem. 3 days of "not enough to build a circuit".
Server: Viking, WinXp Vidalia 0.0.13 Tor 0.2.0.4
But right now Tor seems to work again...
/Viking
coderman skrev:
On 8/12/07, Josh McFarlane <[EMAIL PROTECTED]> wrote:
I recently updated
ks must be linked to from a hidden wiki.
Comrade Ringo Kamens
On 8/8/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
Hello Karsten, Ringo and Eduardo,
Feel free to experiment, it's fun... But:
In my opinion it's MUCH easier to:
-have one well known hidden wiki
-have o
Hello Karsten, Ringo and Eduardo,
Feel free to experiment, it's fun... But:
In my opinion it's MUCH easier to:
-have one well known hidden wiki
-have one or more well known backups of the hidden wiki, with the edit
function disabled
If the primary server is down, people can just go to a backup.
I
ystem. Right before the fall of the hidden wiki, this had
started to happen. The hidden wiki linked to other wikis and they all
interlinked with eachother. As a result they all had the same links
and it was a lot more censorship-resistant. So go forth.
Comrade Ringo Kamens
On 8/7/07, Fro
So both you and "coderman" know how this attack is done but simply
don't want to explain more? Now I understand why the answers were
confusing. ;-)
Thanks for answering anyways.
/Viking
Roger Dingledine skrev:
On Sat, Aug 04, 2007 at 04:40:04PM +0200, [EMAIL P
that port?
Someone else that knows more about this, please answer and explain.
What are the risks running a version pre 0.1.2.16 or pre .0.2.0.4alpha
if a server/client is protected by a physical firewall?
Thanks,
Viking
coderman skrev:
On 8/4/07, [EMAIL PROTECTED] <[EMAIL PROTECTED
this is correct, then the chance of getting attacked behind a
physical firewall is very low, right?
/Viking
coderman skrev:
On 8/4/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
Please describe a little bit.
Please describe how someone can reach port 9051 behind a fi
happens with my firewall, then it shouldn't be a big
problem for the tor-network. But if it's common, then it might be worth
to investigate further.
Thanks,
Viking
coderman skrev:
On 8/4/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
It's TCP.
i'd
It's TCP.
/Viking
coderman skrev:
On 8/4/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
...
I run a tor server myself on port 995.
About 1-10 packets per minute coming from other tor servers are blocked.
They all communicate to ports between 59000 and 65000, and
coderman skrev:
On 8/4/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
...
To my understanding any Tor client or server behind a well-configured
physical firewall aren't vulnerable to this type of attack.
...
(Please tell me if I'm wrong.
you're w
I went through my firewall's log today, and noticed a large number of
blocked packets coming from other tor servers.
I run a tor server myself on port 995.
About 1-10 packets per minute coming from other tor servers are blocked.
They all communicate to ports between 59000 and 65000, and my firewall
Dear Roger and every reader of this mailing list,
I read about the critical security vulnerability in your release notes.
I understand that some funny hackers have accessed tor's control port
9051 and modified the torrc. Is that right?
To my understanding any Tor client or server behind a wel
tings/administrator/application data/tor/torrc
If you did that correctly, it's strange that things don't work. Maybe
vidalia overwrites the torrc with the saved settings in:
/documents and settings/administrator/application data/vidalia/vidalia.conf
/Viking
Matthieu Dalissier skrev:
> [EMAIL
Matthieu,
I also have similar incompatibility between tor 0202alpha and vidalia 0012.
Vidalia is not updated to work with tor 0202alpha.
Did you notice that vidalia creates a new torrc file in it's own folder?
Did you edit the settings in that file, or in the old torrc place under
documents and s
Tor is very easy to block. Maybe your fascist firewall admins block the
Tor directory servers?
Without the information from them, your client doesn't know how to
connect to Tor servers/nodes, making it impossible for you to connect to
the Tor network.
Maybe you should check if you can reach Tor's
Is there a plan for TOR servers to be able to announce several OR-ports
and DIR-ports?
I have been running a server now for a year or so, with the purpose of
being an entry server for people behind restrictive firewalls.
I choose port 995 which is a port often used by SSL-email servers. I
choose t
Thanks! Now I understand. That link was good, it helped me understand a
lot more.
Roger Dingledine:
On Mon, Jun 04, 2007 at 04:03:07PM +0200, [EMAIL PROTECTED] wrote:
Before anything else, I must say a BIG THANK YOU to the developers of TOR.
I have been running a server now for a
Before anything else, I must say a BIG THANK YOU to the developers of TOR.
I have been running a server now for a year or so, with the purpose of
being an entry server for people behind restrictive firewalls. I choose
port 995 which is a port often used by SSL-email servers. I choose this
port beca
Thnx Bluestar,
Although I don't fully grasp the logic of that piece, I understand
that tor was meant to act this way. So I assume I'm fine.
- Original Message -
From: "[EMAIL PROTECTED]"
To: [EMAIL PROTECTED]
Subject: Keep getting the same entry nodes
Date:
Hello, I keep getting connected to the same entry nodes. They seem
to be chosen from a small group of four or five servers. I tried
adding an exclude line in my torrc file but that did not make a
difference (did not work).
Shouldn't the choise of severs be random?
Is this something to worry a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Anothony Georgeo wrote:
> Hi,
>
> Due to recent discussions about an ExcludeNodes list I
> thought I would post mine. Roger (or Nick?) mentioned
> they do not use an ExcludeNodes list because it can
> mess with Tor's load balancing but I hope this is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
Freemor wrote:
> On Thu, 2006-17-08 at 18:13 -0700, Anothony Georgeo wrote:
[...]
>
> I think the hardest part will be explaining clearly what Tor CAN do in
> a non technical way.
- From the FAQ:
7.2. Can exit nodes eavesdrop on communicatio
Brian C wrote:
> Hi,
>
> Shatadal wrote:
>
>> Hi,
>>
>> Whenever I use google image search via tor the search page serves up
>> empty pages. Without tor google image search behaves as it normally
>> does. Does anybody else face this problem?
>>
>> Thanks.
>>
>
> Just tried http://images.goo
45 matches
Mail list logo