--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
. :)
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
want/need some reviews. :)
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
implement some kind of web links
that could quickly add a new name in the local address book (after user
confirmation).
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing
the change was actually needed! :)
GHC was recently changed to not allow you to use newtypes in FFI
imports unless the constructor of the newtype is in scope. [1]
[1] http://ghc.haskell.org/trac/ghc/ticket/5610
I am looking forward to the moment you'll have a patch set that builds.
--
Lunar
-history/
This is quite thorough:
https://wiki.openstack.org/wiki/GitCommitMessages
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev
special i have to do in the config to benefit from
the new changes mad to quicker peerform the handshakes between the circuits?
Tor 0.2.4.17-rc will prioritize ntor handshakes over TAP handshakes. But
TAP handshakes are still processed, and they are not scarce at the
moment.
--
Lunar
Karsten Loesing:
Feedback in the form of patches to the LaTeX sources is most preferred,
though email replies are of course fine, too.
See attachments.
--
Lunar lu...@torproject.org
From 22fed7b7155481904cb92136f9d04777fad72fde Mon Sep 17 00:00:00
-” would not really be appropriate then.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
not have the problem and seems like a good idea.
At least, shipping it through addons.mozilla.org give the user some
basic trust path.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
is not great to follow, that's why I
stopped the effort of trying to write a fix once Mikkel Krautz
acknowledged the issue.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev
#TorBirdywithTorandTorLauncher
I'd like to add that we can probably also leverage the work done on
using Mozilla's updater in TBB to perform automatic updates of an
Instantbird bundle.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
. This opens the door to more traffic correlation
attacks. See the relevant FAQ for more details about entry
guards: https://www.torproject.org/docs/faq.html.en#EntryGuards
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
://stackoverflow.com/a/10008252
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo
Lunar:
David Goulet:
Now the issue was detected with firefox which uses a custom malloc hook
meaning that it handles its own memory allocation. This hook uses mmap()
that firefox redefines to be a direct syscall(__NR_mmap, ...) and
remember that this symbol is hijacked by torsocks
then.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
with the attached (trivial) solution. Could someone please check if it's ok?
Best course of action is probably to attach the patch to the ticket, and
set the status to “needs_review”. Andrea or Nick are likely to take a
look the next time they'll scan open tickets, if not earlier.
--
Lunar
flows
through high capacity servers, hosted in datacenters behind high
capacity links. So I think picturing a laptop might be misleading…
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
wrapper object, actually) to the scanning module, and have the scanning
module pass that to the stream attacher when it has a stream ready?
(Feel free to ignore me if that sounds like non-sense. I only had a
quick look at the code.)
--
Lunar lu
at:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719845#39
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
to augment pyptlib? I guess Extended
ORPort is probably something that all Python pluggable transport
implementations might want.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
Hartmut Prochaska:
I changed a function in sandbox.c to not use a goto statement. I didn't
understood what use it had. Attached the patch file.
See https://www.kernel.org/doc/Documentation/CodingStyle, Chapter 7,
“Centralized exiting of functions” for a rationale.
--
Lunar
to
tunnel TCP connections to a remote system through SSH over Tor.
I am not sure what is the right move here. Perhaps allowing listen on
Unix sockets and localhost? Or maybe allowing listen() entirely?
--
Lunar lu...@torproject.org
signature.asc
Description
, you don't care about ports. You
don't care about internal IP addresses. You just want to say: “I want to
make a blog available”; and have the software reply: “Done, it's at:
idnxcnkne4qt76tg.onion. Spread the address around.” I should not need to
know anything else.
--
Lunar
It outlines future research work in evaluating the efficiency of
fingerprinting attacks, and also mention a couple of promising defenses.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
://packages.qa.debian.org/t/torsocks/news/20140317T212304Z.html
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
Ahmed:
Is this the latest version of Tor specification protocol?
https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=tor-spec.txt
You will find the latest specifications in that Git repository, yes.
--
Lunar lu...@torproject.org
system next time.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
that is visible to a censor.
This is a beautiful and helpful piece of work. Thank you!
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
the privacy of
users be respected if a website contains a link to a per-visitor
generated hostname (using DNS wildcards)?
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing
Lunar:
Tariq Elahi:
What we would really like in order of importance is 1) a design review
of our proposal, […]
Maybe it's a non-issue but “better ask than sorry”.
If I get it, the idea is to publish a list of visited domain names and
how frequently they have been visited (with noise
This is mostly David Fifield's words from an email exchange.
---
I re-read proposal 203 the other day and wondered how it was related to
the meek pluggable transport. As I might not be the only one, I thought
it could be worthwhile to share David's answer. Feel free to improve!
]: https://github.com/rustybird/corridor
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin
Tim:
I've found a few typos in the first few sections of 224-rend-spec-ng.txt at
https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt
Feel free to provide your fixes in the form of a patch.
`git format-patch` can help crafting an email.
--
Lunar
accepting obfs2 because some people
are using obfs2 bridges right now. But we shouldn't add more people to
the set of users of a broken protocol.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
. Any pointers?
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
hand out the holy grail, I'm never going to hand
anything out.
The holy grail will never exist, indeed. I fail too see why this would
be a reason to continue giving out solutions that are known to be bad
when they have suitable replacement.
--
Lunar
addresses of
insecure bridge still be distributed when we can just avoid them?
What do users get out of retrieving obfs2 bridge addresses that they
can't get when retrieving obfs3?
What does the Tor Project get when misleading users?
[1]: https://bugs.debian.org/725779
--
Lunar
isis:
Lunar transcribed 2.9K bytes:
Matthew Finkel:
I agree, and I think it's safe to assume that some nation-state
adversaries do not have these capabilities yet. Users should choose
obfs3 over obfs2, but if a user has a reason for requesting obfs2 then
I don't think we should deny
subscribers. Maybe the Guardian Project's mailing list is more
appropriate?
https://lists.mayfirst.org/mailman/listinfo/guardian-dev
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
-expanded-dns.txt
Please contribute if you can!
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org
design is available:
https://gitweb.torproject.org/torspec.git
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
on a developer's mailing list:
https://lists.mayfirst.org/mailman/listinfo/guardian-dev
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
your question to tor-talk. That's fine, be
patient.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https
version of the
Tor Browser (run on GNU/Linux).
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi
for Debian
You should now be able to get obfs4proxy by using:
deb http://deb.torproject.org/torproject.org obfs4proxy main
The package should work on most Ubuntu and Debian versions. It is
available for amd64 and i386.
--
Lunar lu...@torproject.org
is in Go and statically linked. The same package can
be used on many distributions. It could not be built on every suite
though, as they don't have the needed build dependencies.
--
Lunar lu...@torproject.org
signature.asc
Description: Digital signature
Hi!
Karsten Loesing:
2. Install Sikuli (http://www.sikuli.org/; thanks for Lunar for the
suggestion!) either directly on these machines or on the virtual
machine host or on a separate host in the same network.
3. Write a Sikuli script for each operating system and language,
probably re
the other way around: if Tor distributes the signatures, is there I way
to stick them in the binaries I just built so that the signature is
valid and the bytes are the same as the ones distributed by Tor.
--
Lunar <lu...@torproject.org>
I want to humbly ask you to use
> the tag regardless of the help you may or may not need for that ticket.
Tor Browser folks have been tagging tickets with tbb-usability:
https://trac.torproject.org/projects/tor/tags/tbb-usability
Do you want an extra tag for those?
--
Lunar
kage should not be very hard.
Hope that helps,
--
Lunar <lu...@torproject.org>
signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
ban...@openmailbox.org:
> Thanks Lunar for the update. I thought the effort to upstream TBB had
> completely stalled because there was no activity on #3994. Good to know its
> still alive.
>
> Is there somewhere I could look to track progress besides that ticket?
Don't m
ec.git/tree/proposals
Once in a while Nick updates the status document giving a general
overview:
https://gitweb.torproject.org/torspec.git/plain/proposals/proposal-status.txt
--
Lunar <lu...@torproject.org>
signature.a
ered hardcoded strings through different HTML files.
Great! :) As long as it's properly i18nized, localizations can come
later. Although doing a first localization while i18ning might help you
spot missing strings.
--
Lunar <lu...@torproject.org
who type “riseup” in the Google search bar of
their browser to access their mailbox… They don't even want to/can't remember
an URL. Hardly a chance they will remember an onion address, whatever
its size.)
Maybe it would be worthwhile to ask the UX team for input on the topic?
work for having a
discussion. (Should we move this to -project? Not sure.)
[1]: https://blog.torproject.org/blog/tor-social-contract
[2]: https://blog.torproject.org/blog/hidden-services-need-some-love
See “Attacks by Hidden Service Directory Servers”
- --
Lunar
hs running as a way to measure the
amount of Tor Browser users, I wonder if we should not also try to
work with Tails' people to add their boot statistics, and maybe other
projects who include Tor Browser without using the automated update
mechanism.
- --
Lunar
ating systems if you
consider it a reasonable thing to do.
Seeing these graphs really made my day, I had been hoping for them for
a long time (#10675 which maybe should be closed). Thanks a lot!
Thanks,
--
Lunar <lu...@to
dees so they can access the minutes
and write up reports together in the future.
You really don't want to have all attendees bring their computer or
require them to meet with Elena at a later time.
Hope that helps,
--
Lunar <lu...
60 matches
Mail list logo