I solved my own problem - the relevant log sections are these:
Jun 17 x:16:45.000 [warn] Failed to open GEOIP file ./Data/Tor/geoip.
We've been configured to use (or avoid) nodes in certain countries, and
we need GEOIP information to figure out which ones they are.
Jun 17 x:16:45.000 [warn] Failed
On Sat, 15 Jun 2013 17:44:14 -0700
Micah Lee wrote:
> But soon (maybe Monday with your blog post) they will be here too?
> https://www.torproject.org/dist/torbrowser/linux/
Really, you should be using archive.torproject.org, not www. archive
links aren't likely to change ever. The main web serve
On Sun, 16 Jun 2013 15:04:08 +0200
"Sebastian G. " wrote:
> You had ask.TPO with Askbot already running and it is still running.
> All it seems to take is an active community that feeds it with
> questions and answers them.
The askbot software needs work itself, and there's the enhancements we'd
On Sun, 16 Jun 2013 15:03:13 +0200
"Sebastian G. " wrote:
> I'd like to raise concerns about third-party Q&As and discuss them.
We've had this discussion for the past year or so, see
https://trac.torproject.org/projects/tor/ticket/5995
and
https://trac.torproject.org/projects/tor/ticket/3592
On 06/17/2013 12:50 AM, e...@tormail.org wrote:
>> If you run a VPN client and Tor client on the same machine, you will
>> connect to the Tor network through the VPN. I should have mentioned that
>> in my initial reply.
> Could you take a look at my iptables rules ? I don't have much knowledge
> o
e...@tormail.org:
>> e...@tormail.org:
>>> I am worried about this. It's why I don't want to rely on obfuscated
>>> bridges to hide my Tor usage, as they're not private and one day I could
>>> get flagged as using Tor if the ISP/military/police is monitoring
>>> connections to the bridge that I'm u
On 06/17/2013 12:26 AM, adrelanos wrote:
> e...@tormail.org:
>> I am worried about this. It's why I don't want to rely on obfuscated
>> bridges to hide my Tor usage, as they're not private and one day I could
>> get flagged as using Tor if the ISP/military/police is monitoring
>> connections to th
> If you run a VPN client and Tor client on the same machine, you will
> connect to the Tor network through the VPN. I should have mentioned that
> in my initial reply.
Could you take a look at my iptables rules ? I don't have much knowledge
of firewalls and I am not good at writing them myself, so
I emailed one of the developers about this but it seems fairer to ask
the group.
Is there any reason why setting an EntryNodes configuration in the torrc
for the new alpha TBBs would prevent the browser from opening at all?
This is the only part of the configuration I have altered. The loading
dia
> e...@tormail.org:
>> I am worried about this. It's why I don't want to rely on obfuscated
>> bridges to hide my Tor usage, as they're not private and one day I could
>> get flagged as using Tor if the ISP/military/police is monitoring
>> connections to the bridge that I'm using at the time.
>> VP
On 06/16/2013 11:57 PM, e...@tormail.org wrote:
>> The simplest solution would be to use a VM. Run the VPN client on the
>> host machine, and the Tor setup in the VM. You could also run the VPN
>> client in a pfSense VM, and the Tor setup in another VM that uses the
>> pfSense VM as its LAN router
e...@tormail.org:
> I am worried about this. It's why I don't want to rely on obfuscated
> bridges to hide my Tor usage, as they're not private and one day I could
> get flagged as using Tor if the ISP/military/police is monitoring
> connections to the bridge that I'm using at the time.
> VPN seems
> The simplest solution would be to use a VM. Run the VPN client on the
> host machine, and the Tor setup in the VM. You could also run the VPN
> client in a pfSense VM, and the Tor setup in another VM that uses the
> pfSense VM as its LAN router.
This wouldn't work for me, I only have access to a
Does a VPN help with fingerprinting?
I know that Tor has had some success in reducing the variables that are
used for fingerprinting but we have not found a perfect solution yet.
If we go into a VPN and then in to Tor would that help to minimize some
additional variables used for fingerprinting?
Congratulations to all the contributers and project managers.
Thanks for all the hard work you have put in on this up date
Andrew
On Sun, Jun 16, 2013 at 10:18 PM, Mike Perry wrote:
> Roger Dingledine:
> > Tor 0.2.4.13-alpha fixes a variety of potential remote crash
> > vulnerabilities, makes
On Sun, Jun 16, 2013 at 6:49 PM, Roman Mamedov wrote:
> On Sun, 16 Jun 2013 15:18:47 -0700
> Mike Perry wrote:
>
>> Roger Dingledine:
>> > Tor 0.2.4.13-alpha fixes a variety of potential remote crash
>> > vulnerabilities, makes socks5 username/password circuit isolation
>> > actually actually wor
On Sun, Jun 16, 2013 at 6:55 PM, krishna e bera wrote:
>
> What if relays revert to the "stable" 0.2.3.latest for now?
Personally, I'd suggest that relays just stick with 0.2.4.12-alpha and
wait 0.2.4.14-alpha: we should have it out pretty darn soon.
--
Nick
On 13-06-16 06:49 PM, Roman Mamedov wrote:
> On Sun, 16 Jun 2013 15:18:47 -0700
> Mike Perry wrote:
>
>> Roger Dingledine:
>>> Tor 0.2.4.13-alpha fixes a variety of potential remote crash
>>> vulnerabilities, makes socks5 username/password circuit isolation
>>> actually actually work (this time fo
On Sun, 16 Jun 2013 15:18:47 -0700
Mike Perry wrote:
> Roger Dingledine:
> > Tor 0.2.4.13-alpha fixes a variety of potential remote crash
> > vulnerabilities, makes socks5 username/password circuit isolation
> > actually actually work (this time for sure!), and cleans up a bunch
> > of other issu
On 06/16/2013 07:53 AM, Lunar wrote:
> e...@tormail.org:
>> Is it possible to do Tor transparent proxying over OpenVPN i.e. My
>> connection -> OpenVPN -> Tor ?
>> The purpose of this would be to stop the ISP from seeing that Tor is being
>> used.
>
> If that's your goal, I strongly suggest using
Roger Dingledine:
> Tor 0.2.4.13-alpha fixes a variety of potential remote crash
> vulnerabilities, makes socks5 username/password circuit isolation
> actually actually work (this time for sure!), and cleans up a bunch
> of other issues in preparation for a release candidate.
>
> https://www.torpro
On Jun 16, 2013 4:38 PM, "Moritz Bartl" wrote:
>
> On 16.06.2013 21:33, Sebastian G. wrote:
> >> It was decided that we have no resources to maintain our own Q&A, and
> >> that having a third-party Q&A is better than none. I disagree, but
> >> that's not the point.
> > I'm not sure what you disag
On 16.06.2013 21:33, Sebastian G. wrote:
>> It was decided that we have no resources to maintain our own Q&A, and
>> that having a third-party Q&A is better than none. I disagree, but
>> that's not the point.
> I'm not sure what you disagree with.
> That there are not enough resources?
> That it i
Mike Perry:
> Matt Pagan:
>> On 6/16/13, Andreas Krey wrote:
>>> On Sat, 15 Jun 2013 19:09:28 +, Mike Perry wrote:
>>> ...
For everyone who is experiencing these crashes: Do you have a system tor
installed? If so, if you uninstall it and reboot, does TBB still crash?
>>>
>>> Not sure
16.06.2013 20:38, Moritz Bartl:
Hi Moritz,
>
> It was decided that we have no resources to maintain our own Q&A, and
> that having a third-party Q&A is better than none. I disagree, but
> that's not the point.
I'm not sure what you disagree with.
That there are not enough resources?
That it i
Tor 0.2.4.13-alpha fixes a variety of potential remote crash
vulnerabilities, makes socks5 username/password circuit isolation
actually actually work (this time for sure!), and cleans up a bunch
of other issues in preparation for a release candidate.
https://www.torproject.org/dist/
Changes in ve
On Sun, Jun 16, 2013 at 6:44 AM, Moritz Bartl wrote:
> On 16.06.2013 07:20, Jeffrey Walton wrote:
>> In this case, FirefoxPortable should probably be writing its lock file
>> to a temporary directory or the User's application data directory
>
> The idea is not to leave any traces outside the Tor B
Hi David,
This will soon be "solved" with the new Tor Browser Bundle. Feel free to
test it:
https://lists.torproject.org/pipermail/tor-talk/2013-June/028440.html
On 16.06.2013 16:39, David Balažic wrote:
> Hi!
>
> I use tor-browser-2.3.25-8_en-US on Windows 8.
>
> I pinned the "Start Tor Browse
Hi bastik,
It was decided that we have no resources to maintain our own Q&A, and
that having a third-party Q&A is better than none. I disagree, but
that's not the point. I agree that the community should have been
involved in this process more. In the end, from what I see, most Tor
developers have
On 06/15/2013 07:22 PM, Mike Perry wrote:
>> > And do you think it would be possible to only update
>> > RecommendedTBBVersions when there's an associated tarball available
>> > for download in a predictable place so that we don't get into a
>> > situation where there's an updated version but TBL c
On Sun, Jun 16, 2013 at 11:09 AM, adrelanos wrote:
> Hi!
[...]
> Well, I guess
> having any non-ideal Q/A forum is better than forever having no Q/A forum.
Hi, Adrelanos!
You have hit the nail on the head with that part.
So because I'm not principally involved with the decision to move away
fr
Hi!
> I'd like to raise concerns about third-party Q&As and discuss them.
I was also wondering [1] about that already.
After all the years of arguing over a forum, you now finally end up
using some free service with no control about its servers? Didn't the
trac ticket say, you have sponsoring fo
Hi!
I use tor-browser-2.3.25-8_en-US on Windows 8.
I pinned the "Start Tor Browser.exe" file to the task bar, for easy start.
When it is started by clicking it, the actual running instance creates
another icon on the task bar, so a t the en there are:
- originally pinned onion icon
- another on
Hi!
I experienced quite a few times that after successful browsing (using
the tor-browser bundle) suddenly no connections can be made. Then I
click the "Use a new Identity" button and then everything works again.
Is this due to an exit node becoming unavailable? If yes, could this
be detected and
This is also the case with tor-browser-linux32-3.0-alpha-1_fa.tar.xz -
no text is displayed on the first screen that opens after running the
program, and both the 'connect' and 'configure' buttons are blank.
Arjan:
> On 2013-06-15 04:39, Mike Perry wrote:
>> The new TBB 3.0 series is almost ready
Hi,
I'd like to raise concerns about third-party Q&As and discuss them.
This is independent from stackexchange. (I don't mind using stackexchange)
Points regarding third-party operated and/or hosted Q&As
Advantages:
- No server costs
- No bandwidth costs
- No installing or updating software
- L
Hello,
I'd like to raise awareness and discuss the scope Stackexchange has (or
seems to have).
Initially I planed to await a reply by Runa, but now I assume that
there's no reason to just wait for a reply. Runa will be still able to
reply.
Regarding the use-case and their guidelines.
The FAQ [1
Hi,
to get this nice and clean a third topic.
No further topic regarding Q&A will follow today.
You had ask.TPO with Askbot already running and it is still running. All
it seems to take is an active community that feeds it with questions and
answers them.
Do you plan to use Stackexchange instea
On 2013-06-15 04:39, Mike Perry wrote:
> The new TBB 3.0 series is almost ready for its first alpha release!
>
> Please try these out, test them, and give us feedback! The plan is to
> post them on the blog by Monday, unless something goes horribly wrong.
>
> https://people.torproject.org/~mikepe
On Sat, 15 Jun 2013 23:05:12 +, Mike Perry wrote:
...
> Are any of you who experience crashes installing to the Desktop (the
> default)?
I have it in the desktop, just renamed the folder (and did installation
and execution as the same user). But I will try a different machine on
monday; this o
On 16.06.2013 07:20, Jeffrey Walton wrote:
> In this case, FirefoxPortable should probably be writing its lock file
> to a temporary directory or the User's application data directory
The idea is not to leave any traces outside the Tor Browser Bundle
directory. TBB is not meant to be "installed" i
e...@tormail.org:
> Is it possible to do Tor transparent proxying over OpenVPN i.e. My
> connection -> OpenVPN -> Tor ?
> The purpose of this would be to stop the ISP from seeing that Tor is being
> used.
If that's your goal, I strongly suggest using obfsucated bridges
instead:
https://www.torproj
42 matches
Mail list logo