On Fri, Mar 10, 2017 at 03:46:03PM -0500, Boter42 wrote:
> I'm also trying to implement an automatic scan of specific lists of websites
> to
> check their behaviour towards Tor. I'm using ooniprobe but I lack some
> technical skills (mainly to filter out false positives), I'll see if I can set
> u
On Mon, Dec 19, 2016 at 09:53:25AM -0800, David Fifield wrote:
> The badge was deactivated by Stanford (without my knowledge, but I found
> out a while ago). I arranged with them to move it to alternate hosting
> and have them install a redirect, but that has been a low priority
>
On Sun, Mar 26, 2017 at 02:28:00PM +, anonym wrote:
> Tails uses the Tor Launcher shipped in Tor Browser, but it's run as a
> stand-alone XUL application (`firefox --app ...`), so the *web*
> browser isn't started as part of it.
Sorry to change the subject, but should we be running meek-http-h
t will be interesting
to see 1) how far a simple system can get us, and 2) what additional
changes we would have to make to be provably secure against censors
using more sophisticated computational models than regex.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
-1416
Unfortunately I don't have the conference DVD which presumably contains
the slides he used, but videos usually show up online after some number
of months.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torp
to the browser. It's a really
> deployable way to see nasty stuff.
>
> One warning is that if hijacking is DNS based, and not transparent proxy
> based,
> you don't see anything with this stunt (though favicon.ico detection still
> works).
>
> On Mon, Jul 30, 2012 a
present our framework for steganographic encoding of messages using
> regular languages, along with initial findings for a Python/C++ based
> implementation.
Is there published source code for the implementation?
David Fifield
___
On Tue, Sep 11, 2012 at 09:39:45AM -0700, Kevin P Dyer wrote:
> On Thu, Sep 6, 2012 at 3:30 PM, David Fifield wrote:
> > On Thu, Sep 06, 2012 at 09:25:58AM -0700, Kevin P Dyer wrote:
> >> Following my email to this list, dated 29/07/2012, I direct your
> >> attention
om a flash proxy at a previously unseen IP address. What
makes this different than other circumvention ideas is that nothing is
sent directly to any published or unpublished Tor relay.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject
a Tor Browser Bundle.
Perhaps we should try to coordinate this into a combined
pyobfsproxy/flash proxy bundle?
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
requested.
debug1: channel 3: new [dynamic-tcpip]
I guess that the difference is that previously, the second connection
happens after bootstrapping is complete, while now it happens at 85%.
(That is only a guess, I haven't verified it.)
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
as setting up a relay (figure that there will be many more
websocket relays than facilitators).
The command in the ticket
cat $HOME/auto-naming/moria1/cached-des* | python
$HOME/git/contrib/exitlist : > exitlist
seems to me that it is reading a list of exits from a local Tor. Thi
g Onionoo as a data source is the thing to do.
You should be able to adapt your program from
https://trac.torproject.org/projects/tor/ticket/7549#comment:4. You can
assume that the Python json library is present.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
xtract.
>
> I also saw a, to some maybe scary, console. Might be alpha stuff.
Oh, thank you. This is good to know. Probably I created the
self-extracting executable in a different way than the official bundles.
(BTW the procedure for making the Win
e a bit lucky.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Tue, Dec 11, 2012 at 09:37:16PM -0500, Nick Mathewson wrote:
> On Mon, Dec 3, 2012 at 12:20 PM, David Fifield wrote:
> > I noticed a change in behavior in cb62a0b69a7d67b427224ca4c3075b49853a3a1f
> > or thereabouts. tor opens a new SOCKS connection to a client transport
&
ill I be a proxy? no no yes
If we switch to opt-in by default in the future, we'll ignore the
cookierequired parameter and always use the no/no/yes part of the table.
It will also help us switch to opt-in-only if we can get lots of people
to opt in in advan
y requests to them ^_^;
At this point, it will help if you can keep it pointing to the same
embed page. As we are on the verge of deployment, we may need to make
changes to the proxy program quickly.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
ire
proxies always to wait until their second SIGINT before quitting.
(Concretely in the websocket-server example, remove the"numHandlers != 0"
condition from the second sigint loop.)
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject
://trac.torproject.org/projects/tor/ticket/7160 is the ticket.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
s
now:
https://blog.torproject.org/blog/new-pluggable-transports-bundles-02411-alpha-flashproxy-obfsproxy.
My future plan for not having separate bundles is
https://trac.torproject.org/projects/tor/ticket/8019#comment:3
I don't anticipate having stable pluggable transports bundles before the
p
be
> controlled in some way, else an attacker could keep polling enough address to
> know the majority of them).
Have you seen https://trac.torproject.org/projects/tor/ticket/5578? Much
of this research has been done already, and we made a plan for a
prototype implementation. A full imp
otherwise.
Aside, there are this ticket and blog post, about how it may be hard to
optimize for both use cases at once.
"Config option to declare whether you're using bridges for reachability
or for security"
https://trac.torproject.org/projects/tor/ticket/4624
https://blog.torprojec
2/494
I haven't tried it yet, but they do have an implementation and are
inviting testers.
http://fte.kpdyer.com/
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
ion of exits is worth the additional code.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
tly running Tor Exits to detect if the
> client is a Tor user and if so redirect them to the .onion address."
If I read this right, Tor2web is doing it not only for exits, but for
all relays:
https://github.com/globaleaks/Tor2web-3.0/blob/c6e26b35e83fd897f9c4f9cb6787eb0132d8a9d0/tor2web/ut
njecture is that WebSocket looks enough like HTTP to evade
protocol filters, at least for a while. (WebSocket starts with an HTTP
header.)
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
bundle, copies pluggable transports into it, and packs it
back up.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
n a future release. If you can do this, see the section
"How to run a relay" from
https://gitweb.torproject.org/flashproxy.git/blob/93be0302:/README#l100
Send the IP address and port of your relay to
tor-assista...@lists.torproject.org.
David Fifield
___
On Tue, Jun 11, 2013 at 05:46:49PM +0100, Steven Murdoch wrote:
> On 11 Jun 2013, at 12:49, Steven Murdoch <[1]steven.murd...@cl.cam.ac.uk>
> wrote:
>
> There certainly are quite a few open questions, so it would be good to
> start planning early. Implementing HTTP is a deceptively difficu
"apt-get install git".
I tried installing without the -g option. This seemed to copy a
directory tree into the current directory.
npm install flashproxy
npm start flashproxy
>From there I started seeing debug messages.
Anyone else care to test this procedure? This is a way of runnin
It would solve a lot of problems for us to have the PT bundles built at
the same place and time as the vanilla bundles.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
first steps to this are to get the same build system to
> churn out both sets of bundles (probably by copying each OS's
> gitian-bundle.yml to gitian-bundle-pt.yml and adding the PT packages in
> that step):
> https://gitweb.torproject.org/builders/tor-browser-bu
On Thu, Apr 25, 2013 at 01:32:08AM -0700, David Fifield wrote:
> I moved the flash proxy facilitator to a new domain, fp-facilitator.org.
> This is to get it away from bamsoftware.com, which also has a lot of
> unrelated stuff. The old facilitator name tor-facilitator.bamsoftware.c
ng to a host, authenticating with a RSA public/private key pair and
> opening a direct-tcp channel to the ORPort of the bridge.
Is there a public server running this code that people can test against?
David Fifield
___
tor-dev mailing list
tor-dev@lists
ian version
number is rather than 7.0.0. It would help if you cna keep track of what
parts of the instructions didn't work for you.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
rtup, whether you are able to
connect directly to Tor or whether you have to do your own manual
configuration (like adding bridges). The option to launch only one
specific safe transport could in principle be added to such a UI.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
urrently our obfs3|websocket implementation works, as in Tor bootstraps
and passes traffic, but you have to start up a flash proxy manually
because the facilitator part is missing. We really need that part for a
serious deployment.
David Fifield
___
tor-de
ile:///home/user/flashproxy/proxy/embed.html?debug&client=127.0.0.1:9000&relay=127.0.0.1:9901
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
browser-bundle.git/blob/HEAD:/gitian/descriptors/linux/gitian-tor.yml
https://gitweb.torproject.org/builders/tor-browser-bundle.git/blob/HEAD:/gitian/descriptors/linux/gitian-firefox.yml
https://gitweb.torproject.org/builders/tor-browser-bundle.git/blob/HEAD:/gitian/d
On Wed, Oct 09, 2013 at 12:02:20PM -0400, Kevin P Dyer wrote:
> On Sun, Oct 6, 2013 at 3:30 PM, David Fifield wrote:
> This is a good start and goes a long way towards automating the build
> process. However, I'm looking for "Press a button, make a sandwich,
> have all bui
sk to go with the organization we know works, especially given that we
are changing other things within the bundle.
> Other less-vital things which improve robustness/quality:
>
> - connection reliability under churn: #9964, #5426, #8285
> - flexibility of ecosystem: #9942, #
On Sat, Oct 19, 2013 at 12:46:33PM +0100, Ximin Luo wrote:
> On 19/10/13 06:31, David Fifield wrote:
> > On Mon, Oct 14, 2013 at 09:14:25PM +0100, Ximin Luo wrote:
> >> Specific remaining tasks:
> >>
> >> - merge #9349, #6810, #9974
> >> - push #7167
e-transports-browser.
Either option, I think, puts us in a good place to step to a unified
bundle in the future. What do you think?
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Tue, Dec 10, 2013 at 07:38:21PM -0800, Kevin P Dyer wrote:
> dcf1 - I finally have the gitian build process producing vanilla
> binaries. However, I don't see anything specific to pluggable
> transports in [1] or [2]. Is there a fork of this code that has logic
> for building the pluggable trans
?
I think it's possible to have linux-image-generic package installed, but
not actually be running 3.2.0. What does "uname -a" say?
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
e
whether we are able to construct such a chain. The current idea is to
only support a small number of predefined chains in a configuration
file, so that we can in fact declare them all in advance.
https://trac.torproject.org/projects/tor/ticket/9744
David Fifie
On Wed, Dec 18, 2013 at 07:41:42PM -0800, David Fifield wrote:
> I've been thinking about a couple of tricky use cases for pluggable
> transport libraries, and whether we should do anything to try to support
> them.
>
> The first use case is the flashproxy/websocket use case.
't work so
well.)
You can run a flash proxy just by going to a web page like
http://crypto.stanford.edu/flashproxy/, and there is also code to run a
proxy in the background without a browser:
https://trac.torproject.org/projects/tor/ticket/7944.
David Fifield
___
will tell you all the things you need to
install (it's where I copied that command from).
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
67d5b938889e99b47021b7:/obfsproxy/network/extended_orport.py
https://gitweb.torproject.org/pluggable-transports/goptlib.git/blob/abeea884f554b4119ebd84974c612c0dca6ce941:/pt.go#l581
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https:
-in HTTPS support). There are
some constant buffer sizes and polling timeouts; they can probably be
tuned for better performance.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Fri, Jan 31, 2014 at 09:59:34AM -0800, David Fifield wrote:
> Here is a repository containing a simple HTTP-based transport.
> git clone https://www.bamsoftware.com/git/meek.git
> cd meek/meek-client
> export GOPATH=~/go
> go get
> go build
&g
There were a couple
of changes related to openssl that may or may not affect you.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
rtable if there first were a code audit on miniupnpc and libnatpmp
as well.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
rt on the
PluggableTransports wiki page. I split it out into its own page.
https://trac.torproject.org/projects/tor/wiki/doc/DnsPluggableTransport
Feel free to add to the page by creating an account or with the
anonymous credentials on the home page.
Davi
at on the issue because there's really only one way to
do concurrent networking in Go. (But also, nobody has used goptlib as
much as I have, so it might not be as clear-cut as I think.)
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
; negative answers won't be the end of the
project. The first option might not be too bad if we use NSS directly.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
e
[https://developer.mozilla.org/en-US/docs/WebAPI/TCP_Socket TCP sockets].
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
an that.
https://trac.torproject.org/projects/tor/ticket/10362
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Tue, Feb 25, 2014 at 07:09:39PM -0800, David Fifield wrote:
> > 1. What have you been working on last week that other TBB people should
> > be aware of?
>
> I made bundles with tor-fw-helper and flash proxy. They worked for some
> users, but there are questions a
o solve the BridgeDB captures I haven't
> actually tested it yet.
You can use one of the bridges from
https://trac.torproject.org/projects/tor/wiki/doc/TorBrowserBundle3FAQ#HowdoIusepluggabletransports.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
;ll take the proxy patch and modify it so that the proxy address is not
hardcoded, so that you can configure it from the command line. It could
also be useful for users who need pluggable transports but are stuck
behind an HTTP proxy.
Special thanks to Ox from Lantern who p
On Sat, Mar 01, 2014 at 10:27:05PM -0800, David Fifield wrote:
> Lantern is an HTTP proxy. As luck would have it, I have lately been
> working on a transport that encodes data in HTTP requests
> (https://lists.torproject.org/pipermail/tor-dev/2014-January/006159.html).
> meek was de
e (goagent.exe).
https://github.com/goagent/goagent/tree/3.0/local
GitHub is great because it's HTTPS only, projects are subdirectories
rather than subdomains (so no DNS poisoning), and it's important
infrastructure that's difficult to block.
David Fifield
__
On Fri, Mar 07, 2014 at 02:39:18PM +, infini...@torproject.org wrote:
> commit 05b9c101ba9afe4653d1eff6f5414f90f22ef042
> Author: Ximin Luo
> Date: Fri Mar 7 13:39:31 2014 +
>
> remove failed connections from proxy_pairs as well
> - this is a pretty major fix, as the previous be
issue would matter most.
Your patch seems correct, so you don't have look into the WebSocket
implementations unless you want to.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Fri, Feb 21, 2014 at 08:08:59PM -0800, David Fifield wrote:
> We're making progress on meek
> (https://trac.torproject.org/projects/tor/wiki/doc/meek),
> the transport that hides your traffic in HTTPS requests to an
> unblockable web site. It's already doing
On Mon, Mar 10, 2014 at 08:23:35PM -0700, David Fifield wrote:
> I started trying to write a Firefox extension that makes HTTP requests
> outside of the proxy settings. I have one that works in Iceweasel 24.3
> and does the Host header trick used by the transport. However it doesn't
On Tue, Mar 11, 2014 at 05:22:37PM -0400, Mark Smith wrote:
> On 3/10/14, 11:23 PM, David Fifield wrote:
> >I started trying to write a Firefox extension that makes HTTP requests
> >outside of the proxy settings. I have one that works in Iceweasel 24.3
> >and does the Host hea
On Tue, Mar 11, 2014 at 10:31:16PM -0700, David Fifield wrote:
> On Tue, Mar 11, 2014 at 05:22:37PM -0400, Mark Smith wrote:
> > On 3/10/14, 11:23 PM, David Fifield wrote:
> > >I started trying to write a Firefox extension that makes HTTP requests
> > >outside of the
On Fri, Jan 31, 2014 at 09:59:34AM -0800, David Fifield wrote:
> Here is a repository containing a simple HTTP-based transport.
> git clone https://www.bamsoftware.com/git/meek.git
> cd meek/meek-client
> export GOPATH=~/go
> go get
> go build
&g
to close it. Is there a way to
accomplish the same thing (keep the browser running, but don't show a
browser window) without raising a conspicuous dialog?
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Wed, Apr 09, 2014 at 04:31:57PM +0100, Ximin Luo wrote:
> On 09/04/14 07:29, David Fifield wrote:
> > It gets the job done, but it sucks because the first thing you see is
> > the dialog and you have to know not to close it. Is there a way to
> > accomplish the same th
On Tue, Apr 08, 2014 at 11:29:25PM -0700, David Fifield wrote:
> We talked a while ago about using a browser extension to make HTTPS
> requests on behalf of a pluggable transport, so that the TLS doesn't
> stand out as unusual (#11183). I have that working pretty well and you
&g
if we can make them
usable, and maybe someday somebody will show us it was a bad idea."
"Tor build variant to support lightweight socks bridge"
https://trac.torproject.org/projects/tor/ticket/3466
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
lity
to pass parameters in the Bridge line. I think it's something we should
support though. meek-client can take parameters on a Bridge line, but I
had to make it possible to do also through the command line, because the
version of tor shipped in the browser bundle doesn't support pass
is bug
#11429).
These bundles are experimental and you shouldn't use them to replace
your main browser just yet. We're most interested in hearing about what
didn't work for you or what was surprising. I'll write another post
about code review and other things that need to happen befo
EAD:/chrome/app/background.js
https://gitweb.torproject.org/pluggable-transports/meek.git/blob/HEAD:/chrome/extension/background.js
Browser bundle packaging (#10935)
https://gitweb.torproject.org/user/dcf/tor-browser-bundle.git/commitdiff/tbb-3.5.4-meek-1?hp=tbb-3.5.4-build3
David Fifield
/meek
https://lists.torproject.org/pipermail/tor-dev/2014-April/006718.html
https://lists.torproject.org/pipermail/tor-dev/2014-April/006719.html
How to get on #tor-dev IRC:
https://www.torproject.org/about/contact#irc
David Fifield
___
tor-dev mailing
t=fte#userstats-bridge-transport
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
e are sections for obfs3, ScrambleSuit, FTE, flash proxy, meek, and
Bananaphone. The page is missing a few more from
https://www.torproject.org/docs/pluggable-transports. If you know how to
run any of those transports, and you know an effective way to visualize
it, please add it to the page.
> > the meek pluggable transport. As I might not be the only one, I thought
> > it could be worthwhile to share David's answer. Feel free to improve!
>
> David, do you sign off on this? If so, I'll add it to the proposal.
Yes, I wrot
oxy.
"analyze security tradeoffs from using a socks proxy vs a bridge to
reach the Tor network"
https://trac.torproject.org/projects/tor/ticket/2764
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
k.
I supose this is because you want to make FTE bridges dynamic?
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
p;colspec=ID+Opened+Reporter+Modified+Summary+Stars&cells=tiles
https://code.google.com/p/goagent/issues/detail?id=14732
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
on it not going away. If it becomes too expensive,
we'll have to shut it down until we can find a way to fund operation
long-term. (The same goes for App Engine, BTW.)
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://list
On Sat, Aug 02, 2014 at 11:28:08PM -0700, David Fifield wrote:
> I made some test meek bundles that are capable of using the Amazon
> CloudFront CDN as a backend, in addition to Google App Engine that was
> supported before.
>
> https://people.torproject.org/~dcf/pt-bund
On Tue, Aug 05, 2014 at 11:07:57AM -0400, Mark Smith wrote:
> On 8/3/14, 2:37 AM, David Fifield wrote:
> >On Sat, Aug 02, 2014 at 11:28:08PM -0700, David Fifield wrote:
> >>I made some test meek bundles that are capable of using the Amazon
> >>CloudFront CDN as a backend
d-alpha"
again. See:
https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/BuildingWithGitian#AssemblyErrorsinMismatchedArchitectureCode
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/m
$0.01
Total to date
$2.54
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
idgeDB, I suppose.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
or Amazon will be pointed at it.
My PGP key is at https://www.bamsoftware.com/david/david.asc if you want
to talk about it.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Tue, Sep 16, 2014 at 05:43:45AM +0200, Karsten Loesing wrote:
> On 16/09/14 03:36, David Fifield wrote:
> > In comparing the user graphs of pluggable transports, I found that there
> > seems to be a correlation between the graphs of flashproxy and meek.
> > [...]
> >
On Tue, Sep 16, 2014 at 06:21:04AM +0200, Karsten Loesing wrote:
> On 16/09/14 06:07, David Fifield wrote:
> > We'll see :) For the time being I'll try isolating the transports and
> > see what effect it has.
>
> Please keep us posted how that works out.
I spli
jects/tor/ticket/12391
Check if there are any qemu/kvm processes running, use run-on-target to
shut them down (or just kill them), and try the "make build" again.
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Wed, Sep 17, 2014 at 09:05:39PM -0500, Tom Ritter wrote:
> On 15 September 2014 21:12, David Fifield wrote:
> > Since meek works differently than obfs3, for example, it doesn't help us
> > to have hundreds of medium-fast bridges. We need one (or maybe two or
> >
On Thu, Sep 18, 2014 at 02:02:42PM +0100, Ximin Luo wrote:
> On 18/09/14 03:31, David Fifield wrote:
> > Currently in the bundles we're not setting a bridge fingerprint, so
> > relays wouldn't have to share a key.
> >
>
> This is something to be *fixed*, not
ook very hard to
see if there are other good front domains.
More information on Azure:
https://trac.torproject.org/projects/tor/wiki/doc/meek#MicrosoftAzure
David Fifield
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject
On Mon, Sep 15, 2014 at 07:12:23PM -0700, David Fifield wrote:
> The meek pluggable transport is currently running on the bridge I run,
> which also happens to be the backend bridge for flash proxy. I'd like to
> move it to a fast relay run by an experienced operator. I want to do
101 - 200 of 298 matches
Mail list logo