FYI: It seemed to take the 24 hours the clock was out to go back to
normal. I think I upset the network with the clock error. Unlike other
clock errors, it didn't immediately show in the log. I think that is
because it was exactly 24 hours out, and the time was correct but not
the date.
On 04/12/2
>> [1] https://consensus-health.torproject.org/
>
> Thanks, Matthew. It *almost* gives me what I'm looking for.
On a side note it's pretty simple to fetch the current directory
authority votes via a little Stem script. Here's an example that does
something similar...
https://stem.torproject.org/
On 4/12/2014 2:58 PM, Roger Dingledine wrote:
> I have a cron job to copy moria1's perspective on the votes at 57
> minutes after each hour to
> http://freehaven.net/~arma/moria1-v3-status-votes
>
> --Roger
Thanks, Roger, that's perfect!
--
tor-talk mailing list - tor-talk@lists.torproject.org
hi...@safe-mail.net writes:
> > Unless tor was linked statically to openssl, using for instance the
> > --enable-static-openssl or --enable-static-tor configure options.
> >
> > Checking that tor is not linked statically can be done with ldd:
> >
> > $ ldd /usr/bin/tor
> > [...]
> > libssl.so
On Sat, Apr 12, 2014 at 12:29:58PM -0400, Michael Wolf wrote:
> > [1] https://consensus-health.torproject.org/
>
> Thanks, Matthew. It *almost* gives me what I'm looking for.
I have a cron job to copy moria1's perspective on the votes at 57
minutes after each hour to
http://freehaven.net/~arma/m
Original Message
From: Nicolas Vigier
Apparently from: tor-talk-boun...@lists.torproject.org
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Does Tor need to be recompiled *after* the
opensslupdate?
Date: Sat, 12 Apr 2014 17:51:46 +0200
> On Sat, 12 Apr 2014, Matthew
On 4/12/2014 12:18 PM, Matthew Finkel wrote:
> On Sat, Apr 12, 2014 at 11:59:32AM -0400, Michael Wolf wrote:
> It sounds like you're looking for consensus-health[0] :)
>
> [1] https://consensus-health.torproject.org/
>
Thanks, Matthew. It *almost* gives me what I'm looking for. I'd like
to se
On Sat, Apr 12, 2014 at 11:59:32AM -0400, Michael Wolf wrote:
> Is there a way to view just the most recent directory authority votes?
> I found the archives here:
> https://metrics.torproject.org/data.html
>
> April is 1.5 GB, which is a lot when I only want to see set of votes.
> If there is cur
On Sat, Apr 12, 2014 at 05:51:46PM +0200, Nicolas Vigier wrote:
> On Sat, 12 Apr 2014, Matthew Finkel wrote:
>
> > On Sat, Apr 12, 2014 at 05:04:27AM -0400, hi...@safe-mail.net wrote:
> > > For those of us who compile Tor from source, does Tor need to be
> > > recompiled
> > > *after* the openss
Is there a way to view just the most recent directory authority votes?
I found the archives here:
https://metrics.torproject.org/data.html
April is 1.5 GB, which is a lot when I only want to see set of votes.
If there is currently no way to download only the most recent votes, it
would be a really
On Sat, 12 Apr 2014, Matthew Finkel wrote:
> On Sat, Apr 12, 2014 at 05:04:27AM -0400, hi...@safe-mail.net wrote:
> > For those of us who compile Tor from source, does Tor need to be recompiled
> > *after* the openssl update from our OS vendors?
>
> "Maybe". If you are upgrading OpenSSL from a m
On Sat, Apr 12, 2014 at 12:16:18PM +0300, s...@sky-ip.org wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Hi,
>
> After seeing the challenge done by CloudFlare, to setup a server open
> to the internet with that vulnerable OpenSSL version so everyone could
> try and get its private
On Sat, Apr 12, 2014 at 05:04:27AM -0400, hi...@safe-mail.net wrote:
> For those of us who compile Tor from source, does Tor need to be recompiled
> *after* the openssl update from our OS vendors?
"Maybe". If you are upgrading OpenSSL from a much older version then you
may need to recompile Tor (
On 14-04-12 02:53 AM, elrippo wrote:
> Though this doesn't relate directly to TOR, [snip]
Then do not post it here, please.
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists
On Sat, Apr 12, 2014 at 08:53:52AM +0200, elrippo wrote:
> Hy community.
>
> Though this doesn't relate directly to TOR, it is a warning sign for the
> Future. None of this is in the news, broad media, people don't even talk
> about
> it.
>
> Watch the videos, read the articels and build your
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
After seeing the challenge done by CloudFlare, to setup a server open
to the internet with that vulnerable OpenSSL version so everyone could
try and get its private keys (to see if it's actually possible), after
speaking earlier with people in #
At first, the local interceptor can extracts private authentication key
from heartbleeded guard. Then emulate connection to IP of this guard (a
substituted faked MiTM-ed version of the Guard) for the targeted users.
Something like this can be done at the any parts of the Tor-network for
MiTMing an
For those of us who compile Tor from source, does Tor need to be recompiled
*after* the openssl update from our OS vendors?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hy community.
Though this doesn't relate directly to TOR, it is a warning sign for the
Future. None of this is in the news, broad media, people don't even talk about
it.
Watch the videos, read the articels and build your own opinion.
https://www.youtube.com/watch?v=fzgQwDeP7eM
https://www.you
19 matches
Mail list logo