On Tue, Nov 16, 2010 at 3:41 AM, Kyle Williams kyle.kwilli...@gmail.comwrote:
So when the value of BTC's starts to be cut in half, and with INFLATION now
at a record high, the cost of electricity is NOT GOING DOWN.
Hence, the chance of you generating bitcoins will go down because a CPU can
anything
else, like me.
Marek
On Sun, Nov 21, 2010 at 4:45 AM, slush sl...@centrum.cz wrote:
Bitcoins are 'fair' on level that everybody can go to shop and buy strong
GPU.
Hello ,
you should consider change of your DNS. Maybe it isn't problem in this
specific issue, but DNS hijacking isn't good at all.
I think there is not problem with your relay. Revvvolution appears on
torstatus.blutmagie.de without any problem so don't panic. In my case
it took many days until
I dont think you are right.
There are two extremes when checking if two files are the same:
* Both files are exact byte copies - we are happy, because everything is clear
* Both files are absolutely different - we are also happy, because we
know that something is bad
But scanner which consider
Hello,
yes, there is a way how to detect corrupted/malicious node. I wrote
Tor exit node scanner with some advanced techniques (for example
clustering or source tree analysis) as my thesis last year. During
debugging and testing I checked all exit nodes with many common pages
(google, few news
You can fully control Tor thru Tor Control Port. But it isnt end-user
functionality, you will have to write some controlling program. I used
this feature in my own app and works quite well.
Marek
On Fri, Aug 14, 2009 at 8:49 PM, Mmangobl...@gmail.com wrote:
Hi,
Could someone please answer
Hello Damian,
I just tried your application and want to say it is helpful for me. Im
running relay on standalone server and until today I missed something
to monitor Tor.
Thank you,
Marek
On Tue, Aug 4, 2009 at 9:23 PM, Damian Johnsonatag...@gmail.com wrote:
Hi, throughout the summer I've been
Hello,
I obtain following message from my provider:
[snip]
The following alert has been raised by the network security system for
the application/server in your network. It is suspected that some
malicious activity is happening from your network. The following IP
address is making SQL Injection
when you terminate and/or OS hibernate any circuits with your relay in
them will fail. if you are not a guard or stable exit the impact of
this might be minimal in practice.
Minimal impact in case you have no users :-).
Is there any positive case to run exit, when you hibernate often? When
Information available on exit node:
* Somebody is trying to communicate to some IP address
* Exit node knows identity of previous relay
* Exit node knows amount of transfered data
* In case of unsecured protocol (HTTP, FTP, Telnet) have exits full
access to transfered data and bad exits are able
Yes, Im attaching streams by myself. Should it be a reason for problems?
Marek
2009/4/8 Василий Озеров fr33...@gmail.com:
Have you specified option in torrc:
__LeaveStreamsUnattached=1
?
2009/4/8 slush sl...@slush.cz:
Thanks to reply. For now, I found one exit, which do it permanently
, that the exit node of your circuit can't be exit node.
Can you post servers descriptors wich are in the circuit?
something like this: getinfo desc/name/youservername.
2009/4/7 slush sl...@slush.cz:
Hi,
Im playing around Tor control port, own streams and own circuits. Im
surprised, that Tor sometimes
Hello,
full integration of Vidalia and Tor in Linux is very, very wanted.
Current status, where Vidalia controls own Tor process is not working
well for common user. Although I cannot participate on GSoC and I dont
know C++ so much, feel free to contact me with testing any changes you
will make.
Eh, wrong mailbox :]. Marek
On Tue, Mar 17, 2009 at 9:41 PM, Marek Palatinus ma...@palatinus.cz wrote:
Thank you everybody. There were many good ideas. One of the worst solution
is to close next and next exit ports, because by this, Tor will be closed
network without bridges to Internet one
Hello Matt,
Im interesting in your materials, because at this moment, Im working on
advocacy of Tor node on my university. So please send me a copy!
I think there are some materials about Tor advocacy, see
https://wiki.torproject.org/noreply/TheOnionRouter/TorGuideUniversities.
Merging all these
Sudo /mnt/cdrom/presentation/encryptswap.sh or encryptswap_random.sh
Are these scripts available? These files arent in zip...
Interesting presentation. I will probably need another life to fulfill all
these tips :-).
Marek
On Tue, Mar 17, 2009 at 11:51 PM, Ringo Kamens 2600den...@gmail.com
Hi,
Im running Tor on VPS and I have some problems with abusive Tor traffic.
Firstly, I had problem with DMCA and BitTorrents, so I close non-HTTP(s)
ports and everything was OK for few months. Now, some dumbass wrote abusive
message to some web forum, which was reported to police. They located
Hi Scott,
dont forget, that your's ISP last mile connectity is not sized for running
high-traffic servers. They count with aggregation, because dont expect many
users running any kind of server application. And I think there is nothing
illegal in their business. If you want to run fast server,
On Tue, Mar 10, 2009 at 3:20 PM, Gary Cooper garicoo...@gmail.com wrote:
Hi everyone,
I've two questions :
1/ How can i reduce the time for changing route originally set to 10
minutes? I can't find the line i am supposed to add in TORRC ?
Variable MaxCircuitDirtiness, integer in seconds.
Hello,
Im little bit confused with RAM usage of i686 box. Im running node with
almost same bandwidth and after 6 days uptime, Tor process consumes only
37MB. What is different? My Tor version is 0.2.1.12-alpha (r18423).
Marek
On Thu, Mar 5, 2009 at 8:27 PM, basile bas...@opensource.dyc.edu
Tor FAQ: I have more than one CPU. Does this help?
Yes. You can set your NumCpus config option in torrc to the number of CPUs
you have, and Tor will spawn this many cpuworkers to deal with public key
operations in parallel.
nope, just one core is used by tor for aes crypto. So the openssl speed
linode.com
But I dont want to propagate them in that way, because they probably dont
want to became a Tor hosting :-).
Marek
On Mon, Feb 23, 2009 at 5:27 PM, Andy Dixon a...@andydixon.com wrote:
I have subsequently cancelled my account with them.. Who do you use as a
VPS provider..?
It is in kilo _bytes_, isnt it? I think 84MB/s isnt that bad result :).
[snip]
The 'numbers' are in 1000s of bytes per second processed.
type 16 bytes 64 bytes256 bytes 1024 bytes 8192
bytes
aes-128 cbc 51108.77k68049.87k73548.62k73809.19k
75586.27k
Oh, also dont forget that openssl speed runs only on one core!
I tested it on my server 2x dualcore Xeon 3GHz and results:
type 16 bytes 64 bytes256 bytes 1024 bytes 8192
bytes
aes-128 cbc 92860.55k 120028.42k 130562.36k 132490.03k
135248.26k
aes-192 cbc
Hello Andy, simply change your VPS provider. I cannot imagine that my VPS
provider will stop services without any warning! Because Im running Tor on
production server with many other services, I'd like to kill him with some
painful way :-).
Marek
On Tue, Feb 17, 2009 at 4:22 PM, Andy Dixon
No one gets cut off when the rate is reduced. In fact, if you've ever
tried reducing the rate with the BandwidthRate statement in torrc, you may
have noticed that the actual data rate takes a while to slow down to the
newly
imposed limit.
I tried that today on my laptop relay with
Note also that when you do a non-emergency shutdown of tor, it will
publish a new descriptor with a data rate of 0 to scare off any new
attempts
to contact the relay that is quiescing. (tor also closes its DirPort if
that
was open.)
Thank you for info. Well, it isn probably what I
You really don't need to send an HTML copy of your message to the list.
Im not doing that myself. It is done by Evil Google :-).
To rate limits: I worked on it today and it really changed immediately. Im
using 2.1.x branch, it can be a reason...
I will try to make screenshot, but
Hi, I discuss to running high capacity Tor node on my univerzity in Czech
Republic. There is plenty of connectivity during night, but less during day.
In asking you, if you see any problem in switching tor speed automatically
during day period.
More information:
Im using that on my home server.
Great tip about torifying only connection to tracker. It works like a charm
in Deluge and I feel a little bit safer on torrents.
Thanks for interesting discussion.
Marek
Marco Bonetti
BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
My webstuff: http://sidbox.homelinux.org/
People like you should be banned from the
Well, that's what exit policies are for. As far as relay traffic goes,
the more traffic my relay handles, the more useful my relay seems to be and
the better it makes me feel about running a relay.
Well, me to.
As has been discussed to death here many times already, there is no
Simply I imagine that in same style like ExitPolicy. Did
you ask others, why
are they using ExitPolicies? I dont think so. It is part of
Tor and nobody
(as far as I know) is against - because it is free choice
of relay operator
which kind of traffic he will support.
Yes, but exit
Disagree. I wrote _port_ oriented QoS, not _content_. There can be config
is encrypted between the client and the exit
But not between exit and target (well, we are not speaking about tunelling
any kind of SSL connection).
option to prioritize some port (port range) above other. Just
Yes, wow my English was pretty poor in that post, sorry. ;)
I think Im undestanding you :-).
I guess I misunderstood you, sorry. It sounded like you
were suggesting that middle nodes treat such data
differently. I guess you were only referring to exit
nodes then?
Exactly!
Makes sense,
Umm, I probably dont undestand well. Should be there any speciality because
of Tor?
There is part of my firehol configuration related to Tor:
-
server_tor_ports=tcp/9001
client_tor_ports=default
server_tordir_ports=tcp/9030
client_tordir_ports=default
interface eth0 tor
Fortunately, I write thesis in my language, not English :-). 80% of work is
not about Tor. Part of the task is also writing Tor exit node scanner (I
wrote a little bit to or-talk about months - something like soat). If it
will be a little bit useful for Tor community, I will translate this part
streams (or generally
young streams) in dividing node throughtput will do miracles! I think
currently is Tor doing the right oposite...
Marek
On Fri, Feb 13, 2009 at 9:55 AM, slush sl...@slush.cz wrote:
I know that latency is the real reason of user experience. But my speed
tests were averages
Sorry for many typos...
that torrent stream is built once, request data on*C*e and lives for long
time.
WWW is much more about request/RESPONSE.
etc...
Marek
http://www.securityfocus.com/news/6779
Thank you, important for my thesis.
But the Tor behaviour looks ok, according on how I understand it should
work: the client will chain 3 ORs, the last one fetch the information and
send it back on the chain. So, until everything is set up and the exit
that
this is not typical case, right?
Marek
On Fri, Feb 13, 2009 at 2:59 PM, slush sl...@slush.cz wrote:
Well, Firefox rendes HTML as fast as it is possible (instead of IE6), so I
dont think it is the reason. You can also try wget or something - it takes
hell long time to receive first byte
By the way, do you have any evidence for that? I read
http://www.securityfocus.com/news/6779, but I cannot find mentioned things
in source codes (http://anon.inf.tu-dresden.de/develop/jap.src.tgz).
There can be backdoor in cascades, of course, but it is similar situation
as backdoor (~ logging,
You cannot check only once and then conclude anything from that. Tor
network is really a place where you should do a statistical research
as is almost as far from deterministic as it can be.
During last year of my playing with Tor network I did plenty of test in
different days, random
Hello,
for my thesis, I tested speed of Tor and JAP (free service). Although JAP
was a little bit slower than circuits of Tor in benchmark tests, I was
surprised that JAP had much better user experience and acted as faster. So I
looked after reason and I think I found. JAP has almost constant
wrote:
Hi!
On Tue, Feb 3, 2009 at 8:50 PM, slush sl...@slush.cz wrote:
Yes, Im using linode.com, plan Linode 720. Tor runs without any
problem
(but my bandwidth is only about 150kB/s; there are another network
services
too).
Interesting. That is $40/month with 400 GB limit. I have
Yes, Im using linode.com, plan Linode 720. Tor runs without any problem
(but my bandwidth is only about 150kB/s; there are another network services
too).
I received two DMCAs (some torrent sharing). Linode stuff was very polite,
but they said me they have to solve this. Because server is very
Hi,
today I receive message from my internet provider:
We have received a complaint in connection with the below-pasted details
from HBO regarding materials contained in the specified web site that are
infringing upon the claimant's intellectual property rights.
We are required by
Thank you for quick response.
have terms against running servers in your TOS
Nop. It is server housing provider :-).
Marek
2008/12/27 Ted Smith ted...@gmail.com
See http://www.torproject.org/eff/tor-dmca-response.html.en , and
http://www.torproject.org/eff/tor-legal-faq.html.en#DMCA . You
Nice solution!
Im looking forward docs, how to run systemTor on this type of hardware.
Marek
No.
2008/12/19 Eugen Leitl eu...@leitl.org
This is off-topic, but isn't UDP making data retention more difficult
than TCP/IP.
If I understood well, Psiphon is eye-catching installer for web proxy with
authentication. And without any standard way, how to obtain public list of
psiphonodes (~ Tor directory servers). If you are interested in this level
of breaking censorship, consider http://samair.ru/proxy/ . Hundreds of
use multiple threads (one to do the connect, and one to listen to Tor
controller events and assign the stream to the circuit)
You are a genius! (An I'm and an idiot because I didn't found this solution
by self!)
I will post final solution after it will works. Currently there is at least
one
if Connecting and Repeat are
bad translations. But I dont know, why Tor cannot connect final destination,
because in Vidalia it seems to do so.
I will be very happy for any help.
Marek
2008/12/6 slush [EMAIL PROTECTED]
I will post final solution after it will works. Currently there is at least
Hello Geoff,
thank you for posting. I see you solved problem by complicated way that I
wanted to do. In your case it is right decision, because your program is
much more complicated and you manage circuit/streams more complex. I tried
to do is simply, but it probably dont work :-).
So I used
Hi, Im scared with these methods of Linux marketing. I expect there is
something worse than national thinking. Are complete source codes of Red
Flag Linux available, so Internet cafes are able to compile it by self? If
yes, it should be quite easy (well, better, not impossible) to find major
Hi guys, I have quite special question. As I wrote many times before, Im
trying to do some utility in python using Tor. Currently, Im playing again
with core of utility - talking with Tor and downloading some files thru it.
Im trying to download HTTP file thru exact path (defined by router
Next possibility is that some relay on path was stopped/restarted.
Personally it make me sense that network like Tor is not as stable as normal
Internet connection.
Marek
2008/12/6 [EMAIL PROTECTED]
On Fri, Dec 05, 2008 at 10:53:18PM +0300, [EMAIL PROTECTED] wrote 1.3K
bytes in 24 lines
I found another problem in torsocks bash script. There is missing backslash
in sed construction around . torsocks off. More in googlecode issue
http://code.google.com/p/torsocks/issues/detail?id=1
Bye,
Marek
2008/10/26 slush [EMAIL PROTECTED]
Hi,
nice work! I tried and works perfectly
Hi Roger,
Im in same situation as Matt. Im running Tor exit on VPS, version 0.2.0.x.
So each MB of memory is quite bit expensive for me :). Do you personally
think that running 0.2.1.x (so experimental branch, but less memory usage)
on production machine is a good idea? Stability is the main
Doesn't matter for me, if Tor fails under Windows because Im using
mainstream :-). I will try it for week on my home server before running on
production.
Thanks,
Marek
2008/11/10 Roger Dingledine [EMAIL PROTECTED]
Tor 0.2.0.x is somewhat more stable than 0.2.1.x-alpha in general. For
I forgot to note, that all available control commands of tor are specified
in file /usr/share/doc/tor/spec/control-spec.txt or here
http://www.torproject.org/svn/trunk/doc/spec/control-spec.txt
Marek
2008/10/29 slush [EMAIL PROTECTED]
2008/10/29 Jonathan Addington [EMAIL PROTECTED]
So my
Hi guys,
Im talking with teachers about running tor node on my university. There is
plenty of unused bandwidth, especially at night :-). But there are some
arguments against tor, so Im trying to find some solutions.
One of arguments was, that tor is used for downloading porn and p2p networks
and
1. 8 tor processes, each using separate spool directory
Btw, using more processes for one user is a little bit nasty. Of course, it
can raise up speed of browsing (because parallel processing), but it will
overload tor network (which is still overloaded). This can cause that every
user will
Thanks for post.
I know it is solution, but I prefer exit node, because I think it is more
universal (it can be used as middleman and also as exit).
There is no question about law (I think there is no problem in my country,
expecially when it is university server). It is only about people on
I didnt read Tor path selection very well, but I suppose, that exit nodes
which allow some special address are not preffered by tor clients. So
argument that whitelisting will raise network thoughput is problably false.
More in path-specification on
Hi,
nice work! I tried and works perfectly.
Just one typo. in src/usewithtor.in - there is missing # on line four. It
works, but print warning in runtime.
If is anybody interested, on
http://www.slush.cz/torsocks_1.0-beta-1_i386.deb is DEB package (made by
checkinstall tool) for Debian (tested
2008/10/25 [EMAIL PROTECTED]
On Fri, Oct 24, 2008 at 11:10:21PM +0200, [EMAIL PROTECTED] wrote 2.5K
bytes in 49 lines about:
: as far as I read Tor documentation, I cannot find mechanism, how can be
: exit node marked as Bad exit. Is there any standardized mechanism for
: detecting bad
Any suggestion?
Thanks,
Marek
2008/10/23 slush [EMAIL PROTECTED]
Hi all,
as far as I read Tor documentation, I cannot find mechanism, how can be
exit node marked as Bad exit. Is there any standardized mechanism for
detecting bad exits and marking them in directory servers?
I found one
Hi all,
as far as I read Tor documentation, I cannot find mechanism, how can be exit
node marked as Bad exit. Is there any standardized mechanism for detecting
bad exits and marking them in directory servers?
I found one man's activity on tor forum (
Hi,
do anobody know, where I can found sources of TorCtl, which was months ago
on https://www.torproject.org/svn/torflow/TorCtl/ ? It looks like Tor svn
structure has changed and I cannot find important library for my
application.
Thank you,
Marek
Thank you so much, it is exactly what I want. I didnt find that in docs.
Marek
2008/8/10 Nick Mathewson [EMAIL PROTECTED]
On Sat, Aug 09, 2008 at 12:47:10PM +0200, slush wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
is there any possibility to tell Tor, that I dont want
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
is there any possibility to tell Tor, that I dont want rotate circuits
(relays and exit nodes) every few minutes? I want to build circuits
(with notation host.node.exit) and use it long time (for good reason).
Thanx for help,
Marek
-BEGIN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
It looks like you have DoSed some of the faster Tor relays out there,
and then Tor stopped working as well for you. Perhaps these were your
entry guards, so you were particularly strongly affected?
Tor did not stop serving me. He served me with
iD8DBQFIfwBnr7KgZiv8EokRAhPqAJ9AAqXridDS29CXudRICqPvu5PFywCgjZ3i
BnICmZm48Ehi9rOPjLEckmU=
=N8Qu
-END PGP SIGNATURE-
On Thu, Jul 17, 2008 at 8:38 AM, Roger Dingledine [EMAIL PROTECTED] wrote:
On Thu, Jul 17, 2008 at 08:08:38AM +0200, slush wrote:
Tor did not stop serving me. He served me with errors
,
Marek
On Thu, Jul 17, 2008 at 2:16 AM, slush [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi all,
I dont have better contact (I cannot find any bugzilla for Tor), but I
have to say, that there is serious problem in Tor (using last 0.2.0.30
version). It looks
At first sight this appears to be an exit node problem but then, as I
read it, you say it occurs with more than one exit node and only at this
higher level of throughput.
I can repeat this problem (I could do it yesterday) by opening large amount
of circuits between my computer and another
OK, understood. I thought you had specified the Python code you were
using.. it appears to use multiple exits.
Yes, I have to make tests, if bug depends on multiple exits or just on
number of circuits... But I think it should make somebody who knows Tor
better than me, because I cannot find
- Are you using Opera to Privoxy to Tor, or Opera directly to Tor?
Opera - Privoxy - Tor
- Are bytes getting clobbered inside a given stream, or is Opera loading
several streams and some of them are entirely the wrong bytes? For
example, if you could fetch the page with wget and see if
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
More information:
I tried to repeat this bug (really sorry for all relays operators).
I found that this part of python code breaks connection of standalone
browser.
snip
for i in range(300):
ctl.extend_circuit(0,[sabotage, 'tortila'])
Unfortunately, mail mplsfox is not registered as contact of any tor relay,
so if mplsfox dont say name of his exit node, there are no chance to get it.
There is only one exit node with contact on sneakemail.com:
Unnilquadium kjo3tan02 at sneakemail dot com
but there not have to be any
80 matches
Mail list logo