The "scary console" mentioned in the test report is probably
because of the console=true option in the pyinstaller
spec file. I'll have a look and confirm.
Alex
On 2012-12-13, at 7:01 PM, David Fifield wrote:
> Thank you for testing! This report is very helpful.
>
> On Thu, Dec 13, 2012 at 07:
Thank you for testing! This report is very helpful.
On Thu, Dec 13, 2012 at 07:59:31PM +0100, Sebastian G. wrote:
> > - If it didn't work, was it at least clear what was wrong?
>
> I thought the progress would have stopped here, but it just took much
> longer than expected.
>
> [Notice] Bootstr
Roger Dingledine:
> Whether these various "look, no hands" punching tools and tricks can be
> done using only websockets on the remote side is a great question for
> somebody to answer.
By the way, I found it in their design paper.
Quote:
The fact that clients must not be behind NAT is an impedi
Alexandre:
> You can get the full details on flash proxies here:
>
> https://crypto.stanford.edu/flashproxy/
I read the full paper. It's amazing.
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo
lines 30-32:
# Let a,A=KEYGEN() yield a new private-public keypair in G, where a is
# the secret key and A = EXP(g,a). If additional checks are needed to
# insure a valid keypair, they should be performed.
s/insure/ensure/
Should those checks be specified? In particular, you need to ensure
Hey Ian,
> [There's no such thing as a "bi-quadratic residue" in this setting; all
> quadratic residues in this group have one square root which is itself a
> quadratic residue and one which is not.]
I guess you are right. Because (q,2) = 1, all quadratic residues are
bi-quadratic residues, hence
Roger Dingledine:
> On Thu, Dec 13, 2012 at 06:38:03PM +, adrelanos wrote:
>> Have you considered Hole punching techniques? [1] TCP, UDP, ICMP hole
>> punching... There are many techniques. I don't know if the WebSocket
>> protocol would prevent it.
>>
>> STUN [2] like techniques where a third
On Thu, Dec 13, 2012 at 06:38:03PM +, adrelanos wrote:
> Have you considered Hole punching techniques? [1] TCP, UDP, ICMP hole
> punching... There are many techniques. I don't know if the WebSocket
> protocol would prevent it.
>
> STUN [2] like techniques where a third non-firewalled server he
Alexandre:
> Windows:
> https://people.torproject.org/~dcf/flashproxy/tor-flashproxy-browser-2.4.6-alpha-2_en-US.exe
> https://people.torproject.org/~dcf/flashproxy/tor-flashproxy-browser-2.4.6-alpha-2_en-US.exe.asc
Thanks my platform. (Windows 7 64bit)
> Some specific things we would like feedb
Have you considered Hole punching techniques? [1] TCP, UDP, ICMP hole
punching... There are many techniques. I don't know if the WebSocket
protocol would prevent it.
STUN [2] like techniques where a third non-firewalled server helps to
traversal the NAT. (Only NAT, not used a proxy.)
pwnat [3] al
It's unfortunately a limitation of the technology we are using.
The proxies run as javascript code in peoples' web browsers,
and use the WebSocket protocol to relay traffic from the client
to the relay.
This protocol is designed to allow bidirectional
communication from a browser to a web server
Alexandre:
> - Is configuring port forwarding insurmountable for you?
It was always too much to ask the user to set up a port forwarding. Try
asking your non-technical friends or family. You'll see. Alternatively
search for RetroShare, emule, filesharing port forwarding and see how
many people hav
Here's a slightly updated version of the ntor proposal, as changed
while I was doing the implementation (see [A] for more information on
that). For a diff between the old version and the new one, see [B].
The interesting changes were:
* To specify that the key expansion uses HKDF from RFC5869.
Hi Gus. If you're trying to make sense of tor's netstat output then
you might find arm to be useful. Its connection panel was made for
that...
http://www.atagar.com/arm/
http://www.atagar.com/arm/images/screenshot_page2_full.png
___
tor-dev mailing list
Hello everybody,
We now have some flashproxy Tor Browser Bundles ready.
These are alpha bundles, made by adding our files to the existing
obfsproxy bundle. We would appreciate some testing and feedback.
You can get the bundles here:
Windows:
https://people.torproject.org/~dcf/flashproxy/tor-flash
Ian Goldberg writes:
> On Wed, Dec 12, 2012 at 04:52:11AM +0200, George Kadianakis wrote:
>> >> > Let p = 3 mod 4 be prime, with q=(p-1)/2 also prime, and p is at least
>> >> > 1536 bits. (2048 if there's room.) [Use group 5 or group 14 from RFC
>> >> > 3526.] Let g be a generator of the order
On Thu, 13 Dec 2012 16:22:09 +, Angus Gardner wrote:
...
> Recently I have been noticing, in netstat output, a high level of
> established but idle TCP connections to other tor-hosts.
>
> (Out of 96 ESTABLISHED connections there are 90 with Recv-Q & Send-Q of 0.)
That pretty normal. Recv-Q ge
17 matches
Mail list logo