On 23/10/14 19:32, David Fifield wrote:
In the past few months of bridge user graphs, there is an apparent
negative correlation between obfs3 users and vanilla users: when one
goes up, the other goes down. If you draw a horizontal line at about
5500, they are almost mirror images of each
Hi everyone!
I am trying to understand the communication between an application and
Tor (especially connecting to a hidden service). I am tracing packets on
loopback between a torified netcat request to connect to a .onion
address. When the connection gets granted I am getting a response from
Hm... Did you try Wireshark on it?
2014-10-26 11:46 GMT+03:00 spriver spri...@autistici.org:
Hi everyone!
I am trying to understand the communication between an application and Tor
(especially connecting to a hidden service). I am tracing packets on
loopback between a torified netcat
address. When the connection gets granted I am getting a response from
the socks server:
(hex data of the tcp payload)
0x05 0x00 0x00 0x01 0x00 0x00 0x00 0x00 0x00 0x00
Regarding to the SOCKS specification this means that the request is
granted. But I don't understand the 0x01 in byte
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
1. I have noticed that the Vidalia Relay Bundles for Windows available
to download on torproject.org are using Tor 0.2.4.23, while we are on
0.2.5.10 as stable branch. I know 0.2.4.23 is still on the recommended
list in the consensus, but since
On Sun, 26 Oct 2014 17:16:46 +0200
s7r s...@sky-ip.org wrote:
3. Last thing, the page https://bridges.torproject.org/ does not
contain obfs4 in the drop-down list where the user needs to select the
pluggable transport. It only allows requests for obfs2, obfs3,
scramblesuit and fteproxy
On Sun, 26 Oct 2014 14:34:59 +0100
Rob van der Hoeven robvanderhoe...@ziggo.nl wrote:
So, the SOCKS protocol supports redirection to another SOCKS server.
An all-zero address/port simply means: use the server/port that you
are currently connected to.
That's a really interesting way of
s7r:
2. Configured some obfs4 bridges using obfs4proxy. They work very
good, however it's a little bit complicated since package obfs4proxy
exists in Debian sid, but not in deb.torproject.org, so you have to
add sid repo to sources.list, install obfs4proxy and then make sure
you edit apt
Hello again!
I want to reiterate very strongly that this page needs to be closed OR
at the very least should point to the official git.tpo code. Please, who
ever has admin right to the Google code torsocks page, manifest
yourself.
This is important, the 1.3 code is not safe and unmaintained.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/26/2014 7:56 PM, Lunar wrote:
s7r:
2. Configured some obfs4 bridges using obfs4proxy. They work
very good, however it's a little bit complicated since package
obfs4proxy exists in Debian sid, but not in deb.torproject.org,
so you have to
s7r:
Thank you! I can see the package in the main pool, but wanted to ask
something: any reason why this is not available using:
deb http://deb.torproject.org/torproject.org `$lsb_release -c` main
Basically the same where Tor, tor-arm and obfsproxy are available too?
Because obfs4proxy
11 matches
Mail list logo