On Feb 1, 2012, at 2:48 AM, Watson Ladd wrote:
> On Tue, Jan 31, 2012 at 2:57 PM, Nick Mathewson wrote:
>> Another possibility is this:
>>
>> Browser's resolver -> Tor Client (as DNSPort): "Resolve
>> www.example.com, give me an A, and give me DNSSec stuff too."
>> Tor Client-> Tor net-> Tor Exi
Hi Esteban. Another option, if you're interested in python integration
testing and hacking on a project that's currently active, is stem.
It's a controller library that also provides integration testing for
tor. For more information see...
https://gitweb.torproject.org/stem.git
https://trac.torpro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12-01-31 03:08 PM, Watson Ladd wrote:
> On Tue, Jan 31, 2012 at 1:46 PM, David Goulet wrote:
> Hi everyone,
>
> To help the tor project, I'll contribute some of my spare time to improve
> multithreading for the Tor code base.
>> Color me confused:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12-01-31 03:42 PM, Nick Mathewson wrote:
> On Tue, Jan 31, 2012 at 2:46 PM, David Goulet wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> Hi everyone,
>>
>> To help the tor project, I'll contribute some of my spare time to improve
>
On Tue, Jan 31, 2012 at 2:57 PM, Nick Mathewson wrote:
> On Tue, Jan 31, 2012 at 3:35 PM, Roger Dingledine wrote:
>> On Tue, Jan 31, 2012 at 10:04:21AM -0500, Nick Mathewson wrote:
>>> On Mon, Jan 30, 2012 at 1:34 AM, Roger Dingledine wrote:
>>> > So it looks like Tor would get two new libraries
On 01/31/2012 09:35 PM, Roger Dingledine wrote:
>
> I totally agree that writing our own dnssec code would be absurd.
>
> But I'm confused here about why we're adding dns support to Tor itself.
> Are we doing it to be able to proxy more requests from applications to
> dns servers? Or are we doing
On Tue, Jan 31, 2012 at 6:20 PM, Jacob Appelbaum wrote:
> On 01/31/2012 06:42 AM, Nick Mathewson wrote:
>> On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote:
>>>
>>> I think that seems OK. I think the first step is a proposal,
>>
>> Anybody volunteering for this, or should I throw it on my
On 01/31/2012 06:42 AM, Nick Mathewson wrote:
> On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote:
>>
>> I think that seems OK. I think the first step is a proposal,
>
> Anybody volunteering for this, or should I throw it on my pile?
I think it might make sense for you, me and Ondrej to wr
On Tue, Jan 31, 2012 at 4:21 PM, Esteban Manchado Velázquez
wrote:
> Hey guys,
>
> I wanted to try and help a bit, but I'm not exactly a C wizard or know much
> about networking code. However, I am an experienced developer, do understand
> C and have quite a bit of experience with automated testin
On Tue, Jan 31, 2012 at 4:22 PM, Ondrej Mikle wrote:
> On 01/31/2012 03:42 PM, Nick Mathewson wrote:
>> On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote:
>>>
>>> I think that seems OK. I think the first step is a proposal,
>>
>> Anybody volunteering for this, or should I throw it on my pil
Hey guys,
I wanted to try and help a bit, but I'm not exactly a C wizard or know
much about networking code. However, I am an experienced developer, do
understand C and have quite a bit of experience with automated testing.
Luckily, according to
https://www.torproject.org/getinvolved/volu
On 01/31/2012 03:42 PM, Nick Mathewson wrote:
> On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote:
>>
>> I think that seems OK. I think the first step is a proposal,
>
> Anybody volunteering for this, or should I throw it on my pile?
I volunteer for writing the proposal.
Ondrej
__
On Tue, Jan 31, 2012 at 3:35 PM, Roger Dingledine wrote:
> On Tue, Jan 31, 2012 at 10:04:21AM -0500, Nick Mathewson wrote:
>> On Mon, Jan 30, 2012 at 1:34 AM, Roger Dingledine wrote:
>> > So it looks like Tor would get two new libraries linked in, and exit
>> > relays would inherit whatever secur
On Tue, Jan 31, 2012 at 2:46 PM, David Goulet wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi everyone,
>
> To help the tor project, I'll contribute some of my spare time to improve
> multithreading for the Tor code base.
>
> I've speak a bit with Nick M. and it seems the crypto li
On Tue, Jan 31, 2012 at 10:04:21AM -0500, Nick Mathewson wrote:
> On Mon, Jan 30, 2012 at 1:34 AM, Roger Dingledine wrote:
> > So it looks like Tor would get two new libraries linked in, and exit
> > relays would inherit whatever security/stability issues libunbound has
> > since clients can basic
On Tue, Jan 31, 2012 at 1:46 PM, David Goulet wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi everyone,
>
> To help the tor project, I'll contribute some of my spare time to improve
> multithreading for the Tor code base.
Color me confused: This is for taking advantage of multiproc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi everyone,
To help the tor project, I'll contribute some of my spare time to improve
multithreading for the Tor code base.
I've speak a bit with Nick M. and it seems the crypto lib is an important part
to begin with. The wiki page
(https://trac.tor
On 01/31/2012 05:17 PM, Watson Ladd wrote:
> I've got a more basic question: does the OP get enough information to
> validate the DNSSEC data, or does it have to trust the OR? I don't
> quite know enough to tell from the above.
I forgot to mention: validation on the client side is not finished in
On Thu, Jan 26, 2012 at 3:42 PM, Ondrej Mikle wrote:
> Hi,
>
> I decided to give it a shot in implementing full DNS/DNSSEC resolution support
> for Tor, here's the branch:
>
> https://github.com/hiviah/tor
>
> ATM the biggest limitation is that reply DNS packet must fit in a single cell
> (i.e. ma
On Mon, Jan 30, 2012 at 1:34 AM, Roger Dingledine wrote:
> So it looks like Tor would get two new libraries linked in, and exit
> relays would inherit whatever security/stability issues libunbound has
> since clients can basically hand them packets that they have to parse
> and deal with.
FWIW, I
On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote:
>
> I think that seems OK. I think the first step is a proposal,
Anybody volunteering for this, or should I throw it on my pile?
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists
21 matches
Mail list logo