On 01/09/2012 06:01 PM, Nick Mathewson wrote:
> On Mon, Jan 9, 2012 at 8:49 PM, Jacob Appelbaum wrote:
>>
>> Should I make such a branch and request it for review?
>
> I don't think this is a good idea for 0.2.3.x without data. Specifically:
>
>* What fraction of servers on the net right no
On Mon, Jan 9, 2012 at 8:49 PM, Jacob Appelbaum wrote:
>
> Should I make such a branch and request it for review?
I don't think this is a good idea for 0.2.3.x without data. Specifically:
* What fraction of servers on the net right now use 2048-bit RSA
link keys and 2048-bit DH groups? (Or
On 01/09/2012 04:33 PM, Nick Mathewson wrote:
> On Thu, Jan 5, 2012 at 5:05 PM, Nick Mathewson wrote:
>> Hi, all!
>>
>> Previously, I had set the deadline for merging small features into
>> 0.2.3.x as Jan 6. Due to work that had piled up or suddenly appeared
>> in the new year, I wasn't able to g
On Thu, Jan 5, 2012 at 5:05 PM, Nick Mathewson wrote:
> Hi, all!
>
> Previously, I had set the deadline for merging small features into
> 0.2.3.x as Jan 6. Due to work that had piled up or suddenly appeared
> in the new year, I wasn't able to get patches reviewed this week as
> much as I wanted,
Hi all,
here's a second chinese-probe discrimination behavior that should allow
to detect them, and block it.
http://pastebin.com/RNcNDYcw
Like the TCP SYN one, this blocking tricks is based on the fact that the
OS & software they run on their server pool to make active-tor-probing
have to be hi