incompatibility,
but I don't know that much.
--- Drake Wilson
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
on a personal level that I am hardly unbiased, and that I
will refuse to accept or produce tor: URIs if non-HTTP protocols get
the short/long end of the stick/schema, not that that particularly
matters.)
--- Drake Wilson
-technical people would
recognize.
Is there a reason not to use something like tor+http and tor+https for
the schema, thus opening up the space for (as a facetious example)
tor+nntp or analogous usages later?
--- Drake Wilson
.
--- Drake Wilson
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
the Tor directory request protocol specify
something else? The dir-spec.txt document from Tor 0.2.1.20 doesn't
seem to be clear on how fp is interpreted in URIs.
--- Drake Wilson
***
To unsubscribe, send an e-mail to majord
--- Drake Wilson
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Quoth Olaf Selke olaf.se...@blutmagie.de, on 2009-11-10 16:22:34 +0100:
Drake Wilson wrote:
# echo 24576 65000 /proc/sys/net/ipv4/ip_local_port_range
one question again: why don't set it to 1024 65535? Is there any good
reason to exclude a certain port range besides the ports below
with lower bandwidth and cpu load.
You're probably an exit node, right? It sounds like you're running
out of outgoing ports to use for connections.
--- Drake Wilson
***
To unsubscribe, send an e-mail to majord...@torproject.org
, and why this filter
should be enabled when using Privoxy for Tor purposes.
--- Drake Wilson
but don't care won't spend the energy
to add the records, so you'd still have to supplement it with some
other list forms if you wanted to have serious Internet coverage.
--- Drake Wilson
. The consensus for
programs appears to be that you should accept *_proxy variables in
either URL format or in raw host[:port] format with the equivalent URL
scheme defaulting to that for the protocol for which the variable is
set.
--- Drake Wilson
, appear to require a separate https_proxy
setting as well.
--- Drake Wilson
of problems without that basic information.
For completeness: what version of Wget is it, and can you safely
reveal which origin server you're trying to contact?
Thanks
Sambuddho
--- Drake Wilson
be significantly
improved in FreeBSD 8. I don't use LINUX, so I can't comment on that.
(LINUX folks, please chime in!)
The Linux 2.6 kernel that I use on my Debian GNU/Linux systems has
native SCTP kernel-side.
--- Drake Wilson
failing. Now I'm not going to run a relay anymore.
No?
Jon
--- Drake Wilson
to be extended discussion on this topic, though, it
might be better to do it off-list, since it's not directly
Tor-related.
--- Drake Wilson
that any streams coming in to you must
be exiting from you, as opposed to making it harder for them to know
whether they're exiting there or being bounced somewhere else.
(Note that the attacker may be the middle node, though I'm not sure
that makes a difference.)
--- Drake Wilson
know whether either of these is the case, and I don't know anything
about their activation software.
--- Drake Wilson
who are placed
in this bogus state; other users may be directed to other nameservers.
Possibly nobody should or would be querying those ones normally, and
those ones (and only those ones) are configured to always respond that
way.
--- Drake Wilson
.
Can I switch off these tests in tor?
Short answer: don't.
--- Drake Wilson
feels like buffers are being scrambled somewhere in the
part of the connection coming back from the remote server through
tortila.
--- Drake Wilson
). Tor is and should be for transport only.
Recommending certain configurations is probably reasonable if there's
enough consensus on them.
--- Drake Wilson
. This
is kind of interesting, though off-topic; is GMail starting to send
these out consistently? I've only mostly seen it used for S/MIME.
--- Drake Wilson
Quoth _ [EMAIL PROTECTED], on 2008-02-03 03:20:54 -0800:
Is it possible to make UDP go over Tor?
The short answer is no.
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#head-ebe87162a46f267eb697e23fb77e85e4cf643dd0
--- Drake Wilson
disambiguation of your question, the answer
is generally no, Tor clients and relays cannot easily hide themselves
from the Tor network.
--- Drake Wilson
that the Windows
firewall for whichever network interface is going to be receiving your
onion router connections will permit inbound connections on port 9001?
Khaled Moussa
--- Drake Wilson
in Windows XP.
Please try to do some basic research before asking these things,
especially on topics (such as general firewall operation) that are not
Tor-specific.
--- Drake Wilson
specifically to the local
host from any IPv4-networked machine, so by definition, a host cannot
be accessed from anywhere outside itself as 127.0.0.1 (or any of the
other predefined loopback addresses).
greets
--- Drake Wilson
is in your Tor config? Which are you testing?
Is it even consistent?
If you're getting them confused, that sounds like the first thing to
fix!
--- Drake Wilson
connection. That would also be
consistent with seeing similar behavior through other types of
proxies. (I seem to recall some of this stuff being transmitted
in-band for IRC, but I may be wrong and I can't recall the details
right now.)
--- Drake Wilson
accelerators; Tor supposedly can use those through the OpenSSL
library, but I don't see references to it ever having been confirmed
to work. http://archives.seul.org/or/talk/Jun-2005/msg00252.html
Best regards,
Theodor 'morphium' Reppe
--- Drake Wilson
instead. Something like (untested):
iptables -t nat -A PREROUTING -d tor-address \
-p tcp --dport 443 -j DNAT --to-destination :1443
Thanks,
Andrew
--- Drake Wilson
those 2 entry nodes.
You might want to look at the FAQ entry on entry guards:
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#head-9927a2f6d044e4c5b1fc610d92175b7c8d4f49d9
--- Drake Wilson
/TorInChroot has instructions about
that also.
--- Drake Wilson
Quoth Brad Freeman [EMAIL PROTECTED], on 2007-10-01 21:09:24 +0200:
Unsubscribe
No. Do it yourself. :-P
It's in the header of every message.
X-To-Get-Off-This-List:
mail [EMAIL PROTECTED], body unsubscribe or-talk
--- Drake Wilson
connecting to an
address that is equivalent to an existing Tor node, it always adds an
extra hop to the circuit to end it at that node. I take it that's
possibly overriding the ExcludeNodes in this case. I might be wrong,
of course.
Best regards
Tristan
--- Drake Wilson
of the license in the context in
which they were indicated in the previous message, then Torpark is not
free software.
--- Drake Wilson
signature.asc
Description: Digital signature
37 matches
Mail list logo