On Thu 20 Feb 2014 05:41:53 PM EST, grarpamp wrote:
> Would be nice to be able to fetch and print out the HS descriptor from the
> controller. I posted/ticketed a rough proposed command operation spec
> for that maybe 6mo ago that we had some mutual review/interest/code
> on this list. Don't know i
> and why users sometimes report that the access to them fails. The
As an anecdote, I seemed to feel a step improvement in HS access
sometime between 1-2 years ago, perhaps in the move to later
0.2.3.x. And that it's very good now.
I think a big user problem was the socks5 timeout issue with fire
Hello Nick,
Thanks for your response. This is very helpful and somewhat in line with
my expectations. I will forward this thread to the IETF list, please let
me know if there is more to add.
Thanks John
-Original Message-
From: Nick Mathewson
Reply-To:
Date: Sunday 16 February 2014 0
Hi,
we had some discussions during the dev meeting regarding hidden services
and why users sometimes report that the access to them fails. The
general problem might be that the specific hidden service doesn't exist
anymore. However in some cases the HS exists (see
http://tor.stackexchange.com/q/14
Hi Nick,
This sounds related to an old idea I presented at PETS 2006:
http://www.lightbluetouchpaper.org/2006/07/13/protecting-software-distribution-with-a-cryptographic-build-process/
However there's an important difference. The proposal below is how the
directory authorities advertise "good"
I don't understand the question.
Obfsproxy can be used in external mode or with
tor in managed mode. In external mode it can
be used to obfuscate other types of traffic like ssh etc.
There is no automatic negotiation of obfuscation PTs.
On Thu, Feb 20, 2014 at 2:51 AM, grarpamp wrote:
>> The sho