On Wednesday 21 January 2015 21:39:30 Yawning Angel wrote:
> On Wed, 21 Jan 2015 15:26:56 -0500
>
> David Goulet wrote:
> > > +/*
> > > + * Using TCP Fast Open (TFO) uses sendto() instead of connect()
> > > with 'flags'
> > > + * set to MSG_FASTOPEN. Without this code, using TFO simply
> > > bypa
On Wed, 21 Jan 2015 15:26:56 -0500
David Goulet wrote:
> > +/*
> > + * Using TCP Fast Open (TFO) uses sendto() instead of connect()
> > with 'flags'
> > + * set to MSG_FASTOPEN. Without this code, using TFO simply
> > bypasses TOR
> > + * without letting the user know.
> > + *
> > + * This soluti
On 14 Jan (16:25:17), Tim Ruehsen wrote:
> Upps, I made a last second failure...
>
> Here is the amended (and working) patch.
Hey!
Sorry for the delayed response, too many things at once! :)
I've done some fixes on the patch that I'll be merging in a jiffy, I've
outlined them to you below. (mos
Upps, I made a last second failure...
Here is the amended (and working) patch.
Tim
On Wednesday 14 January 2015 14:55:58 Tim Ruehsen wrote:
> Hi,
>
> no answer yet, so I created a first 'works for me' patch to let torified TFO
> aware clients not leak silently.
>
> (I hope I am on the right list
Hi,
no answer yet, so I created a first 'works for me' patch to let torified TFO
aware clients not leak silently.
(I hope I am on the right list here)
Please review and apply|comment.
Tim
On Tuesday 13 January 2015 15:25:35 Tim Ruehsen wrote:
> Hi,
>
> I tried to torify my wget-like applicatio