Re: [tor-dev] onion_client_auth_add Flags=Permanent fails with 553 Unable to store creds for

2020-06-07 Thread Rusty Bird
Hi Patrick, > 553 Unable to store creds for Did you set ClientOnionAuthDir in torrc (to a directory with "private enough" permissions)? Rusty signature.asc Description: PGP signature ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists

Re: [tor-dev] UX improvement proposal: Onion auto-redirects using Alt-Svc HTTP header

2018-09-21 Thread Rusty Bird
Georg Koppen: > FYI: the proposal is now the first Tor Browser proposal: > https://gitweb.torproject.org/tor-browser-spec.git/tree/proposals/100-onion-location-header.txt Sounds great. One nit: | Website operators should be aware that tools like tordnsel have | false positive potential (they migh

Re: [tor-dev] Dealing with DNS requests by Tor unaware programs

2018-06-25 Thread Rusty Bird
teor: > So we recommend SOCKSPort or HTTPTunnelPort instead, because > they support sending DNS names to exits as part of the connection > request. Looks like this can also be achieved for TransPort by configuring: AutomapHostsOnResolve 1 AutomapHostsSuffixes . Then tor will tor (instant

Re: [tor-dev] How to build a Router that will only allow Tor users

2016-03-20 Thread Rusty Bird
Hi Tim, >>> But the authority IP addresses hardcoded in the Tor client source code >>> differ from the authority IP addresses published in the networkstatus >>> consensus... >>> >>> https://github.com/rustybird/corridor/commit/a56d751df399ab1c54f64b0d4dc59f732dc0adc3 > > Is this still an issue? >

Re: [tor-dev] How to build a Router that will only allow Tor users

2016-03-15 Thread Rusty Bird
Hi Martin, > I try to configure OpenWRT in a way that it will only allow outgoing > connections if it is Tor. Basically it is the opposite of "blacklisting > exit relays on servers": "whitelisting (guard) relays for clients". It > should *not* run Tor itself. Maybe corridor would work for you: ht