> If you get strange Google certs, please report them to me including the full
> PEM chain (openssl s_client -showcerts will output them.)

Yeah, x509 is no problem. Now if Tor would have a config
option to log just the socks_request that was made to the exit_node that
was used, that would make things easy. I'd log all my stuff because it's
immensely useful, especially with 'Tamper Data' and packet tools.

As it is now, either:
- hopping manually into the Tor console is too late because the data expired.
- we have to console log two things and trim a lot of fat to get the pairing.
usefeature extended_events
usefeature verbose_names
setevents circ
setevents stream
getinfo circuit-status
getinfo stream-status

Unless we're already watching the console, much easier to just newnym and
forget it. Something like 'LogReq2Exit <file|facility:level>' would be nice.
_______________________________________________
tor-talk mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to