Peter Palfrader transcribed 0.8K bytes:
> On Sat, 09 Aug 2014, ihave2p wrote:
>
> > I was referred to this list by velope@oftc and have spoken directly with
> > isis@oftc with regard to administering a relay bot for #tor/#tor-dev
> > between Irc2p (i2p) and OFTC.
>
> JFTR, I have removed that r
Hello,
I studied about section 3.5.3 computing bandwidth weights in Tor Directory
Protocol Version 3. I know now how to compute the values of these weights.
1) I am not able to understand how these values are used in path selection
by the client. Anybody please highlight on this.
2) There are gu
On 13 Aug 2014, at 22:33 , George Kadianakis wrote:
> My plan was to make a Peach fuzzer to achieve this [0], but as I
> mentioned in a previous email I never got past the V3 link handshake
> since I actually had to implement Tor's crypto to get past.
>
> Someone would need to implement all this
Hi!
Back when the Heartbleed vulnerability went public, I thought to
myself: "If we keep generating writing C code to parse binary formats
by hand, the same thing will happen to us sooner or later."
So on and off, I've been working on a little tool to automatically
generate binary encoding and pa
On Wed, Aug 13, 2014 at 10:47 AM, Gisle Vanem wrote:
> The 'U64_PRINTF_TYPE' is defined twice for MSVC.
> An 'I64_PRINTF_TYPE' is needed too:
>
> --- orig/src/test/test.h 2014-05-13 23:24:22 +
> +++ src/test/test.h 2014-05-13 23:26:51 +
> @@ -61,7 +61,7 @@
>
> #ifdef _MSC_VER
> #defin
Hi all,
We have been discussing lately some changes that we would like to make
to the ooni-probe test deck format [1] and would like to have some
feedback on what we have come up with.
For those of you not familiar with ooni-probe, a test deck is basically
a way of telling it "Run this list of OO
Hi All,
Below is the proposal for #12538 [0], with some changes after George's
review and some other revisions.
Feedback welcome!
Thanks,
Matt
[0] https://trac.torproject.org/projects/tor/ticket/12538
---
Filename: xxx-dire
On 13 Aug (15:47:43), George Kadianakis wrote:
> Hello friends :)
>
> This is a post to discuss how Tor should treat its entry guards when
> its network goes down. This is part of ticket #12595 [0] which aims to
> design better interfaces and data structures for entry guards.
>
> This thread inve
On Tuesday, July 29, 2014 at 6:31 AM, Matthew Finkel wrote:
> On Tue, Jul 08, 2014 at 11:16:12PM +0200, Arlo Breault wrote:
> > I started working on something like this a little while ago,
> > https://github.com/arlolra/bulb
> >
> > but didn't manage to stir up much interest.
> >
> > I'm happy
The 'U64_PRINTF_TYPE' is defined twice for MSVC.
An 'I64_PRINTF_TYPE' is needed too:
--- orig/src/test/test.h 2014-05-13 23:24:22 +
+++ src/test/test.h 2014-05-13 23:26:51 +
@@ -61,7 +61,7 @@
#ifdef _MSC_VER
#define U64_PRINTF_TYPE uint64_t
-#define U64_PRINTF_TYPE int64_t
+#define
On 18 Apr 2014, at 21:56, Nick Mathewson wrote:
> Thanks! I've added this as proposal 235.
Code review down to 0.2.3.x has shown that the naming-related code
hasn't changed much at all, and no issues were found which would mean a
Named-flag free consensus would cause any problems.
gabelmoo and
The next weekly OONI development meeting is supposed to happen on the
15th of August.
Since the this day is holiday in a lot of countries I am going to
propose we skip next weeks meeting and move it to the week after: the
22nd of August.
The time will be the same 5 PM CET (3 PM UTC).
The upcomin
Hello friends :)
This is a post to discuss how Tor should treat its entry guards when
its network goes down. This is part of ticket #12595 [0] which aims to
design better interfaces and data structures for entry guards.
This thread investigates what should happen when the network goes down
and To
Tim writes:
>> On 13 Aug 2014, at 0:10, George Kadianakis wrote:
>>
>> Gareth Owen writes:
> ...
>>> The framework implements the tor protocol so should be easy to modify to do
>>> fuzzing of the actual protocol but I'm skeptical how successful this would
>>> be, I can only think of a couple o
> On 13 Aug 2014, at 0:10, George Kadianakis wrote:
>
> Gareth Owen writes:
...
>> The framework implements the tor protocol so should be easy to modify to do
>> fuzzing of the actual protocol but I'm skeptical how successful this would
>> be, I can only think of a couple of places that could be
15 matches
Mail list logo