which
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
Since Tor does not support IPv6 yet...
What about IPv6 traffic? Is it blocked when following these instructions?
If not, how to do so?
___
tor-talk mailing list
On 04/01/12 14:19, h...@safe-mail.net wrote:
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
Since Tor does not support IPv6 yet...
What about IPv6 traffic? Is it blocked when following these instructions?
If not, how to do so?
If you have a Linux machine with an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
If you have a Linux machine with an IPv6 address, and you're using
the iptables technique described on that page, then you're going to
leak. iptables only applies to IPv4 traffic. You need to put in
an explicit rule using ip6tables to block all
Let's try that again...
http://pastebin.com/jBPFsUSg
We did crack Tor's encryption to reveal 190 IP addresses of individuals
using Tor for Child Pornography
--
http://www.fastmail.fm - Or how I learned to stop worrying and
love email again
--
http://www.fastmail.fm - mmm... Fastmail...
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Running www.digicert.com through that tool shows the 2nd intermediate
certificate that needs to be included.
-Pascal
On 1/4/2012 2:21 PM, Pascal wrote:
The tool at http://www.digicert.com/help/ does a good job of showing
what is going on with a web site's certs. Traditionally a website is
On 01/04/12 07:40, Greg wrote:
Hi,
I searched google for people having problems accessing torproject.org
from Chrome on Windows, but I didn't see much besides a discussion on
December 21 about an outage
(http://comments.gmane.org/gmane.network.tor.general/2514).
I can access torproject.org from
On 01/04/12 21:30, Pascal wrote:
Running www.digicert.com through that tool shows the 2nd intermediate
certificate that needs to be included.
Their tool is quite good, but not all-powerful. The suggested 2nd intermediate
certificate must have subject CN=DigiCert High Assurance EV Root CA.
On Wed, 04 Jan 2012 19:24:56 +
Geoff Down geoffd...@fastmail.net wrote:
Let's try that again...
http://pastebin.com/jBPFsUSg
We did crack Tor's encryption to reveal 190 IP addresses of
individuals using Tor for Child Pornography
There are two recent stories claiming the Tor network is
On Wed, Jan 4, 2012 at 21:24, Geoff Down geoffd...@fastmail.net wrote:
http://pastebin.com/jBPFsUSg
We did crack Tor's encryption to reveal 190 IP addresses of individuals
using Tor for Child Pornography
How can one even begin to assess a press-release that's essentially an
incomprehensible
On 04/01/12 19:24, Geoff Down wrote:
Let's try that again...
http://pastebin.com/jBPFsUSg
We did crack Tor's encryption to reveal 190 IP addresses of individuals
using Tor for Child Pornography
They didn't crack Tor's encryption. They posted a fake Tor security
update on one of the Hidden
I think this is fixed for www.torproject.org now. Digicert apparently
updated their ca chained certs at some point. I've put the updated
ca-certs on the www servers. If this works, we can update them on all
torproject servers.
And for fun, I've attached the gnutls-cli output of the old cert in
Hi Andrew,
Thank you for taking a stab at this issue! I just tried this now, and
it still doesn't work. I don't remember precisely what the chain
looked, so I can't be sure I'm seeing anything different at all. I
restarted Chrome (but not Windows). Both www.torproject.org and
14 matches
Mail list logo