On Sun, Dec 01, 2013 at 05:09:55PM -0800, Damian Johnson wrote:
> You might want to look into PEP8 [1], Python's de-facto style guide.
> It's certainly up to you which bits you do/don't like, but coming
> close will make your code more uniform with the rest of the Python
> world. PyPI has a slick p
> I now have similar code which is based on stem:
> https://github.com/NullHypothesis/exitmap
Hi Philipp, sorry about the long delay before responding. ExitMap looks great!
You might want to look into PEP8 [1], Python's de-facto style guide.
It's certainly up to you which bits you do/don't like,
On Tue, Nov 26, 2013 at 03:21:04PM +0100, Lunar wrote:
>Philipp Winter:
>> I now have similar code which is based on stem:
>> https://github.com/NullHypothesis/exitmap
>>
>> However, the problem with a parallel single-Tor-process design
>> is that there is no easy way for scanning modules to figur
Philipp Winter:
> I now have similar code which is based on stem:
> https://github.com/NullHypothesis/exitmap
>
> However, the problem with a parallel single-Tor-process design
> is that there is no easy way for scanning modules to figure out
> which exit relay they were attached to. The Tor cont
On Thu, Oct 10, 2013 at 07:23:11AM +, Aaron wrote:
> I have been working on adding a "Tor Network Test Template" to
> ooni-probe; the basic concept is to extend the Tor controller
> library we use (txtorcon) to be able to build and attach
> circuits to specific streams, and iterate over the exi
On Mon, Oct 14, 2013 at 5:03 PM, meejah wrote:
> Philipp Winter writes:
>
> > I assume, your scanning would be sequential?
>
> There are many circuits in-flight in the single Tor instance; many
> outstanding requests are possible.
>
> --
> meejah
> ___
Philipp Winter writes:
> I assume, your scanning would be sequential?
There are many circuits in-flight in the single Tor instance; many
outstanding requests are possible.
--
meejah
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.
Why don't just use OONI and a single Tor instance to do so?
I expect it will take much less and you will be able to leverage
existing code and exitsting knowledge within the tor project.
Fabio
Il 10/9/13 11:44 PM, Philipp Winter ha scritto:
> I am working on a Python-based exit relay scanner whi
On Thu, Oct 10, 2013 at 9:57 AM, Philipp Winter wrote:
> On Thu, Oct 10, 2013 at 07:23:11AM +, Aaron wrote:
> > I have been working on adding a "Tor Network Test Template" to
> ooni-probe;
> > the basic concept is to extend the Tor controller library we use
> (txtorcon)
> > to be able to buil
On Wednesday 09 October 2013 23:44:18 Philipp Winter wrote:
> I am working on a Python-based exit relay scanner which should detect
> malicious and misbehaving exits. The design should have a reasonable
> balance between being fast/parallel and stressing the network as little as
> possible.
>
> I
On Thu, Oct 10, 2013 at 12:50:32PM +0400, meejah wrote:
>> I have been working on adding a "Tor Network Test Template" to
>> ooni-probe; the basic concept is to extend the Tor controller
>> library we use (txtorcon) to be able to build and attach circuits to
>> specific streams, and iterate over th
On Thu, Oct 10, 2013 at 07:23:11AM +, Aaron wrote:
> I have been working on adding a "Tor Network Test Template" to ooni-probe;
> the basic concept is to extend the Tor controller library we use (txtorcon)
> to be able to build and attach circuits to specific streams, and iterate over
> the exi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Aaron writes:
> I have been working on adding a "Tor Network Test Template" to
> ooni-probe; the basic concept is to extend the Tor controller
> library we use (txtorcon) to be able to build and attach circuits to
> specific streams, and iterate over
On Wed, Oct 9, 2013 at 9:44 PM, Philipp Winter
wrote:
> I am working on a Python-based exit relay scanner which should detect
> malicious
> and misbehaving exits. The design should have a reasonable balance between
> being fast/parallel and stressing the network as little as possible.
>
> I came
I am working on a Python-based exit relay scanner which should detect malicious
and misbehaving exits. The design should have a reasonable balance between
being fast/parallel and stressing the network as little as possible.
I came up with the following three steps:
1. Spawn a "parent" Tor proce
15 matches
Mail list logo