I don't think openvpn supports socks5 on its input yet.
Anyone know of a shim to put in front of openvpn that will accept
socks5 on its input and send to an IP nexthop / interface as its output
(thus making it configurable to point into openvpn)?
Already possible with routing / vm's, but that's a
OK, you may be able to match the following times with your logs - each
had multiple connection failures (looks like any pending connection
died). Times are in UTC
1436393744 - Wed, 08 Jul 2015 22:15:44
1436396224 - Wed, 08 Jul 2015 22:57:04
1436399231 - Wed, 08 Jul 2015 23:47:11
1436400042 - Thu,
9. Jul 2015 00:43 by juanmi.3...@gmail.com:
> Tor access at Freenode has been taken down for 6 months because of abuse
> though:
>
> https://twitter.com/freenodestaff/status/564848187710906368
> https://freenode.net/irc_servers.shtml#tor
>
That's super depressing.. :/
--
tor-talk mailing l
I've had issues for a long while now, which is why I'm just typically
not on OFTC at all (because all connections fail as they're routed
through Tor). Unfortunately, the trade-off of maintaining location
security but not being available on IRC is one I have to make. Worth
noting that OFTC d
Tor access at Freenode has been taken down for 6 months because of abuse
though:
https://twitter.com/freenodestaff/status/564848187710906368
https://freenode.net/irc_servers.shtml#tor
As for OFTC, it's just exit node luck. Maybe if you know what node is
it, just exclude it on your torrc.
El 09/0
On Wed, Jul 8, 2015 at 5:51 AM Pickfire wrote:
>
> I hope that there is also a way to use tor with freenode other than
> oftc.
>
> I wanted to use tor with freenode and oftc in pidgin. And it seems that
> the method "really hope that the exit I have isn't blocked" have a very,
> very low probabil
Seems plausible, though from what I have logged it's hard to tell. All
the time calculations are 0, which may mean that curl completely failed
to connect, or that it's counters don't work if the connection fails
(I'm not sure which is true).
I forgot to tell it to add a timestamp, so comparison ag
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I wonder if the curl 000 codes match up against our 408 codes for a
timeout? So the connection was made, the request was about to be made
then the circuit failed? I'm not overly familiar with the precise
nature of curl or apache logging systems.
On 08
>From the client end, I've seen occasions where I couldn't connect to the
HS, though it's a very small percentage (around 1.5%).
Count Status code
590 000
408391 200
000 being the code curl returns when it couldn't connect. In terms of
time to serve, there's a fair range of variation in ter
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Just to expand on s7r's number, I just pulled the latest logs from the
servers and compiled a quick breakdown of the HTTP codes, bandwidth
etc for anyone interested:
HTTP Code: 200 (OK)
Bandwidth used (bytes): 690,400,220,422
Hits: 4,784,288
HTTP Co
On Tue, Jul 07, 2015 at 11:44:26PM +0400, meejah wrote:
My usual method of connecting to OFTC via Tor is "really hope the exit I
have isn't blocked".
However, this "strategy" has been failing for weeks. Is there a better
way to connect? I'm using SSL and authorizing via SASL.
thanks,
meejah
On 04-07-2015 01:45, Mirimir wrote:
> On 07/03/2015 02:36 PM, Lars Luthman wrote:
>> Can PDF.js bypass Tor? How? I thought it used the same networking code
>> and proxy settings as the rest of Firefox.
>
> Maybe so. But without firewall rules, there's risk. There's also risk of
> downloading th
On 7/7/15, chloe wrote:
> ...
> how would this method work if an infected client tries to visit a hidden
> service?
there are at least three common ways:
1. using an evil proxy, as directed above. they install a rogue CA so
they can sign for any SSL/TLS required. this works for hidden
services
13 matches
Mail list logo