Hi Patrick,
> 553 Unable to store creds for
Did you set ClientOnionAuthDir in torrc (to a directory with "private
enough" permissions)?
Rusty
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists
Georg Koppen:
> FYI: the proposal is now the first Tor Browser proposal:
> https://gitweb.torproject.org/tor-browser-spec.git/tree/proposals/100-onion-location-header.txt
Sounds great. One nit:
| Website operators should be aware that tools like tordnsel have
| false positive potential (they migh
teor:
> So we recommend SOCKSPort or HTTPTunnelPort instead, because
> they support sending DNS names to exits as part of the connection
> request.
Looks like this can also be achieved for TransPort by configuring:
AutomapHostsOnResolve 1
AutomapHostsSuffixes .
Then tor will tor (instant
Hi Tim,
>>> But the authority IP addresses hardcoded in the Tor client source code
>>> differ from the authority IP addresses published in the networkstatus
>>> consensus...
>>>
>>> https://github.com/rustybird/corridor/commit/a56d751df399ab1c54f64b0d4dc59f732dc0adc3
>
> Is this still an issue?
>
Hi Martin,
> I try to configure OpenWRT in a way that it will only allow outgoing
> connections if it is Tor. Basically it is the opposite of "blacklisting
> exit relays on servers": "whitelisting (guard) relays for clients". It
> should *not* run Tor itself.
Maybe corridor would work for you: ht