On Thu, 13 Dec 2012 16:22:09 +, Angus Gardner wrote:
...
Recently I have been noticing, in netstat output, a high level of
established but idle TCP connections to other tor-hosts.
(Out of 96 ESTABLISHED connections there are 90 with Recv-Q Send-Q of 0.)
That pretty normal. Recv-Q get
Ian Goldberg i...@cs.uwaterloo.ca writes:
On Wed, Dec 12, 2012 at 04:52:11AM +0200, George Kadianakis wrote:
Let p = 3 mod 4 be prime, with q=(p-1)/2 also prime, and p is at least
1536 bits. (2048 if there's room.) [Use group 5 or group 14 from RFC
3526.] Let g be a generator of the
Hello everybody,
We now have some flashproxy Tor Browser Bundles ready.
These are alpha bundles, made by adding our files to the existing
obfsproxy bundle. We would appreciate some testing and feedback.
You can get the bundles here:
Windows:
Hi Gus. If you're trying to make sense of tor's netstat output then
you might find arm to be useful. Its connection panel was made for
that...
http://www.atagar.com/arm/
http://www.atagar.com/arm/images/screenshot_page2_full.png
___
tor-dev mailing list
Here's a slightly updated version of the ntor proposal, as changed
while I was doing the implementation (see [A] for more information on
that). For a diff between the old version and the new one, see [B].
The interesting changes were:
* To specify that the key expansion uses HKDF from
Alexandre:
- Is configuring port forwarding insurmountable for you?
It was always too much to ask the user to set up a port forwarding. Try
asking your non-technical friends or family. You'll see. Alternatively
search for RetroShare, emule, filesharing port forwarding and see how
many people
It's unfortunately a limitation of the technology we are using.
The proxies run as javascript code in peoples' web browsers,
and use the WebSocket protocol to relay traffic from the client
to the relay.
This protocol is designed to allow bidirectional
communication from a browser to a web server
Have you considered Hole punching techniques? [1] TCP, UDP, ICMP hole
punching... There are many techniques. I don't know if the WebSocket
protocol would prevent it.
STUN [2] like techniques where a third non-firewalled server helps to
traversal the NAT. (Only NAT, not used a proxy.)
pwnat [3]
Alexandre:
Windows:
https://people.torproject.org/~dcf/flashproxy/tor-flashproxy-browser-2.4.6-alpha-2_en-US.exe
https://people.torproject.org/~dcf/flashproxy/tor-flashproxy-browser-2.4.6-alpha-2_en-US.exe.asc
Thanks my platform. (Windows 7 64bit)
Some specific things we would like feedback
On Thu, Dec 13, 2012 at 06:38:03PM +, adrelanos wrote:
Have you considered Hole punching techniques? [1] TCP, UDP, ICMP hole
punching... There are many techniques. I don't know if the WebSocket
protocol would prevent it.
STUN [2] like techniques where a third non-firewalled server helps
Hey Ian,
[There's no such thing as a bi-quadratic residue in this setting; all
quadratic residues in this group have one square root which is itself a
quadratic residue and one which is not.]
I guess you are right. Because (q,2) = 1, all quadratic residues are
bi-quadratic residues, hence no
lines 30-32:
# Let a,A=KEYGEN() yield a new private-public keypair in G, where a is
# the secret key and A = EXP(g,a). If additional checks are needed to
# insure a valid keypair, they should be performed.
s/insure/ensure/
Should those checks be specified? In particular, you need to ensure
Roger Dingledine:
Whether these various look, no hands punching tools and tricks can be
done using only websockets on the remote side is a great question for
somebody to answer.
By the way, I found it in their design paper.
Quote:
The fact that clients must not be behind NAT is an impediment
The scary console mentioned in the test report is probably
because of the console=true option in the pyinstaller
spec file. I'll have a look and confirm.
Alex
On 2012-12-13, at 7:01 PM, David Fifield da...@bamsoftware.com wrote:
Thank you for testing! This report is very helpful.
On Thu,
14 matches
Mail list logo