> On 9 Sep 2016, at 09:35, Jesse V wrote:
>
>
> Tor clients can only build circuits once they know enough about the
> network. This "know enough" threshold is determined by the
> PathsNeededToBuildCircuits setting. From reading Tor's manual, it seems
> that a setting of X tells Tor clients to w
> On 9 Sep 2016, at 01:11, Nick Mathewson wrote:
>
> On Wed, Aug 31, 2016 at 2:16 PM, Nick Mathewson wrote:
>> Hi, all!
>>
>> I've just turned on some code [1] that makes all of the "bug" warnings
>> that occur during the unit tests get logged to console. Previously,
>> all warnings from the
isis agora lovecruft transcribed 8.6K bytes:
> For the repeated suggestion of SIDH, [3] I expect we'll soon see concrete
> details and improvements to the attacks mentioned in (and which they establish
> "direct validation" measures to defend against in ยง9 of) "Efficient algorithms
> for supersingu
Tor clients can only build circuits once they know enough about the
network. This "know enough" threshold is determined by the
PathsNeededToBuildCircuits setting. From reading Tor's manual, it seems
that a setting of X tells Tor clients to wait until they have enough
descriptors/microdescriptors s
Well, this certainly triggered more conversation than I was expecting. I
was simply wondering if there was such a method call, and apparently
there isn't. That's okay.
I thought about this and decided to go with Yawning's suggestion to just
use ADD_ONION and then record the returned RSA private ke
On Thu, 08 Sep 2016 22:44:42 +0400
meejah wrote:
> > Anyone who wants to open a ticket here, or has a counter
> > argument? :)
>
> As a *slight* counter-argument to adding on-disk services to the
> GETINFO, that would make it harder to distinguish between on-disk
> services and ADD_ONION -based
Ivan Markin writes:
> IMO an onion service should publish its first descriptor instantly. If
> something happens afterwards and one has to fix the descriptor - deal
> with it with backoff/delay to prevent DoS on HSDirs.
+1
txtorcon only ever waits for the first descriptor to be published (since
George Kadianakis writes:
> I guess a side question here is why those GETINFO commands only return the
> ephemeral onion services and not all of them.
>
> We should probably provide a common interface for getting the hostname of
> onion
> services, regardless of whether they are ephemeral or per
On Thu, 08 Sep 2016 13:55:05 +0300
George Kadianakis wrote:
> I guess a side question here is why those GETINFO commands only
> return the ephemeral onion services and not all of them.
Because when I added it, it was part of the ADD_ONION code, and I was
too lazy to make it cover the other stuff.
On Wed, Aug 31, 2016 at 2:16 PM, Nick Mathewson wrote:
> Hi, all!
>
> I've just turned on some code [1] that makes all of the "bug" warnings
> that occur during the unit tests get logged to console. Previously,
> all warnings from the unit tests were off by default.
>
> Now there are a lot of war
meejah writes:
> [ text/plain ]
> Jesse V writes:
>
>> TL;DR: Please let me know how to fetch the hostname of my hidden service
>> from Tor's control port.
>
> There are two types of onion services: "on disk" ones configured via
> torrc/SETCONF and the HiddenServiceDir and related options **or**
teor:
>> * Should we do something now or postpone it to prop224?
>
> It would be nice to have this change in 0.2.9 for Single Onion Services and I
> think also for HSs with OnionBalance
It would also improve the UX of Tails Server. It would be awesome if we
could have this in 0.2.9.
Cheers
___
teor:
>> * Can we set it back to 5s thus avoiding issues that can arise after
>> removing the delay?
>
> Let's base the delay on the amount of time it takes for a HS descriptor to
> stabilise.
> This is the situation we're trying to prevent:
> * the HS opens all its intro point circuits
> * it s
I've just tried the patch from ticket 20082 and it works great for me. I
was actually wondering why it was taking so long for a ephemeral hidden
service to get registered in my SIM4Things project (I register an ephemeral
service first to get Tor to setup the introduction points, then re-register
it
14 matches
Mail list logo