worth keeping in favour of diversity - but that view does
contradict the project's I think.
Best
Gareth
--
Dr Gareth Owen
Senior Lecturer
Forensic Computing Course Leader
School of Computing, University of Portsmouth
*Office:* BK1.25
*Tel:* +44 (0)2392 84 (6423)
*Web*:
only took a sample (rather than the whole batch) because each HS
descriptor is in its own file and it takes ages to process - nevertheless,
because of the way its collected the sample should be representative.
--
Dr Gareth Owen
Senior Lecturer
Forensic Computing Course Leader
School of Comp
> PGP fingerprint (ECC): BDF5 F867 8A52 4E4A BECF DE79 A4FF BC34 F01D D536
> PGP fingerprint (RSA): 3611 95A4 0740 ED1B 7EA5 DF7E 4191 13D9 D0CF BDA5
>
> ___
> tor-dev mailing list
> tor-dev@lists.torproject.org
> https://l
amp wrote:
> On Sun, Nov 9, 2014 at 3:22 PM, Gareth Owen
> wrote:
> > I have several hundred thousand (or million? Haven't counted) hs
> descriptors
> > saved on my hard disk from a data collection experiment (from 70k HSes).
> > I'm a bit nervous about sh
I have several hundred thousand (or million? Haven't counted) hs descriptors
saved on my hard disk from a data collection experiment (from 70k HSes). I'm a
bit nervous about sharing these en masse as whilst not confidential they're
supposed to be difficult to obtain in this quantity. However,
cert
I'm sending.
Best
Garth
On 17 August 2014 17:06, Yawning Angel wrote:
> On Sun, 17 Aug 2014 16:19:56 +0100
> Gareth Owen wrote:
>
> > I'm trying to generate the fingerprint given just the pubilc key in
> > Java and after almost a whole day I'm about t
Hi all
I wonder if someone might be able to help me with the above. I understand,
that to generate the digest, the PK must be encoded in PKCS#1 format. And
further to this, the public keys in the router descriptors are NOT in
PKCS#1 format, but plain ASN.1.
I'm trying to generate the fingerprin
complete dead-end.
I've cc-ed Tim, so he might pick your brains !
Thanks
Gareth
On 11 August 2014 18:19, George Kadianakis wrote:
> Gareth Owen writes:
>
> > Hi all
> >
> > I thought I'd give you an update on where the Tor Research Framework is
> no
s.
Naturally, we'll also look later down the line at optionally integrating
with the shadow simulator for research which shouldn't be done on the live
network.
--
If anyone is interested in helping out then please dont hesitate to get in
touch.
Best
Gareth
--
Dr Gareth Owen
Senior Lec
The request to the dirport definitely has to come via tor not via a simple
request to the dirport over the net.
Have a look in the HiddenService class here for an example:
https://github.com/drgowen/tor-research-framework/blob/master/src/main/java/tor/HiddenService.java
Its fairly easy to use th
useful to someone - patches/pull requests always welcome!
Source:
https://github.com/drgowen/tor-research-framework
Best wishes
Gareth
--
Dr Gareth Owen
Senior Lecturer
School of Computing, University of Portsmouth
Tel: 02392 846423
Web: ghowen.me
proach be discouraged?
Best
Gareth
On 24 July 2014 12:20, Gareth Owen wrote:
> Hi all
>
> Quick question, how does one turn channel_t into an IP address, e.g. given
> a circuit_t how do I get the IP address of the previous and next hop
> (noting that they might not be in the con
don't
know how to get that from the channel/circuit.
Any help appreciated.
Thanks
Gareth
--
Dr Gareth Owen
Senior Lecturer
School of Computing, University of Portsmouth
Tel: 02392 846423
Web: ghowen.me
___
tor-dev mailing list
to
know, this is not used in practice. Therefore to think there
> > is only one pair of windows at the OP and at the exit approximates the
> > current behavior sufficiently.
> >
> > Cheers,
> > Florian.
> >
> >
> > On 03.07.2014 12:36, Gareth O
on this to save others the
effort. The offending sentence is:
*"The OP behaves identically, except that it must track a packaging window
and a delivery window for every OR in the circuit."*
Best
Gareth
On 1 July 2014 09:51, Gareth Owen wrote:
> (sorry re-post - forgot subject)
>
RELAY but not what type. So, if only RELAY_DATA decrements the
window size, and intermediate nodes cannot spot these, what point is there
in intermediate nodes having a window?
Any help greatly appreciated.
Gareth
---
Dr Gareth Owen
Senior Lecturer
School of Computing, University of Por
termediate nodes only know
that its a RELAY but not what type. So, if only RELAY_DATA decrements the
window size, and intermediate nodes cannot spot these, what point is there
in intermediate nodes having a window?
Any help greatly appreciated.
Gareth
---
Dr Gareth Owen
Senior Lecturer
School of
Arlo
Thanks for your feedback. It appears that it isn't possible to game the
uptime since this commit:
https://gitweb.torproject.org/tor.git/commit/f7a3cdc8f27c2306cf06d742af63846c82ebdc56
Thanks for the pointer to shadow.
All the best
Gareth
On 3 March 2014 14:02, Gareth Owen
I couldn't find the answer in the code. I
guess what I'm getting at, is can I fake the uptime to get the HSDir flag?
Best
Gareth
---
Dr Gareth Owen
School of Computing
University of Portsmouth
___
tor-dev mailing list
tor-dev@lists.
19 matches
Mail list logo