On Sat, 10 Jan 2015, Nick Mathewson wrote:
This proposal describes a simple way for directory authorities to
perform signing key revocation.
2. Specification
We add the following lines to the authority signing certificate
format:
revoked-signing-key SP algname SP
Hi teor,
Thank's for your answer with good explanation. yes it worked for
(Authority.getN(3) + Relay.getN(1) + Client.getN(1) ) . For this i have
installed tor-0.2.6.2-alpha-dev and download newest chutney where exit-v4.i
or exit-v6.i don't exist .
now i can see thorough wire-shark that which
Hi teor,
I forgot to mention that i added
ExitPolicy accept 127.0.0.0/8:*
ExitPolicy accept [::1]:*
IPv6Exit 1
#
to torc of each authority in net/nodes
before ExitPolicy reject *:*
On Sun, Jan 11, 2015 at 12:29 PM, Mohiuddin Ebna Kawsar
Hi teor,
Thanks for quick reply. i just download new chutney from github and able to
run chutney for nodes = a(3) + r(1) + c(1) but when i set nodes = a(3) +
c(1) i got following message
##
./chutney start networks/basic-min
Starting
Date: Sun, 11 Jan 2015 14:09:56 +0100
From: Mohiuddin Ebna Kawsar mohiuddin.kaw...@gmail.com
Hi teor,
Thanks for quick reply. i just download new chutney from github and able to
run chutney for nodes = a(3) + r(1) + c(1) but when i set nodes = a(3) +
c(1) i got following message
Date: Sun, 11 Jan 2015 12:29:34 +0100
From: Mohiuddin Ebna Kawsar mohiuddin.kaw...@gmail.com
Thank's for your answer with good explanation. yes it worked for
(Authority.getN(3) + Relay.getN(1) + Client.getN(1) ) . For this i have
installed tor-0.2.6.2-alpha-dev and download newest chutney
Date: Sun, 11 Jan 2015 14:09:56 +0100
From: Mohiuddin Ebna Kawsar mohiuddin.kaw...@gmail.com
Hi teor,
Thanks for quick reply. i just download new chutney from github and able to
run chutney for nodes = a(3) + r(1) + c(1) but when i set nodes = a(3) +
c(1) i got following message
*sorry forgot to include*tor -f
/home/raboon/chutney-master/net/nodes/000a/torrc
Jan 11 14:10:18.730 [notice] Tor v0.2.6.2-alpha-dev running on Linux with
Libevent 2.0.21-stable, OpenSSL 1.0.1f and Zlib 1.2.8.
Jan 11 14:10:18.730 [notice] Tor can't help you if you use it wrong! Learn
how to be
On Sun, 11 Jan 2015, Nick Mathewson wrote:
On Sun, Jan 11, 2015 at 4:23 AM, Peter Palfrader wea...@torproject.org
wrote:
On Sat, 10 Jan 2015, Nick Mathewson wrote:
This proposal describes a simple way for directory authorities to
perform signing key revocation.
2.
OnionMail is a mail server encrypted and anonymous made to run through
the TOR network without losing the ability to communicate with the Internet.
This type of server provides greater privacy for users and also protects
against eavesdropping of the NSA or other threats.
Important update
Hi,
I have to study for an exam on Tuesday so it would be ideal for me if we
could move the next ooni dev meeting to Tuesday.
Does that work for those interested in attending?
I would suggest we do it at the same time (19:00 CET).
~ Arturo
___
On Sun, Jan 11, 2015 at 4:23 AM, Peter Palfrader wea...@torproject.org wrote:
On Sat, 10 Jan 2015, Nick Mathewson wrote:
This proposal describes a simple way for directory authorities to
perform signing key revocation.
2. Specification
We add the following lines to the authority
12 matches
Mail list logo