On Thu, Jul 9, 2015 at 3:42 AM, coderman wrote:
> this would be useful; i recall a http-proxy/socks-proxy front-end to
> OpenVPN but can't seem to find it. it did not create a tun/tap device
> on host.
>
> would love a current copy if found
More search yield zero, so then this...
https://communit
couldnt we just code some protection against this
On Thursday, July 09, 2015 01:41:44 AM Apple Apple wrote:
> I feel like the wrong issue is being discussed here; the real danger is not
> really IP leaks. If you skipped Seth's post because of its length I suggest
> you go back and read it.
>
> If
On Thu, Jul 9, 2015 at 3:42 AM, coderman wrote:
> a http-proxy/socks-proxy
privoxy can stuff http over socks, so whether or not this socks to
vpn tool supports http-proxy is moot.
(nb: ip traffic of socks can't be stuffed over http without a far
end de-encapsulator. Same reason why socks provide
This was me, testing the possibility of leaving information in the logs
that could be used for evaluation later.
Mentioned in my previous post.
On 07/09/2015 11:58 AM, Thomas White wrote:
> 127.0.0.1 - - [redacted redacted] "GET /id=123 HTTP/1.1" 404 432 "-"
> "Mozilla/5.0 (Windows NT 6.1; rv: 31.
Hello @all,
I've currently 10 processes which requests the hidden service via the
same TOR daemon. The TOR daemon receives every hour a HUP signal.
As fas as I understand my current setup doesn't help very much because
the circuits are always reused and only built new every hour after the
HUP sign
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
304 is people visiting using the Tor browser where the data is cached,
304 just lets it know the cache data is still valid instead of
redownloading.
404 look like they might be either scanners or some cases, and in
other just look like random attempts
I feel like the wrong issue is being discussed here; the real danger is not
really IP leaks. If you skipped Seth's post because of its length I suggest
you go back and read it.
If someone manages to trick your PDF viewer into running arbitrary code
with a malicious PDF file, that person may then h
> Also, Thomas, I am wondering if you can explain what the 304 (Not
Modified), 404 (Not Found), and 403 (Forbidden) codes were caused by.
I'd assume the 304 was probably someone pressing refresh in a browser,
it'll cause a conditional get (either based on Etag or last-modified)
which would result
On 7/8/15, grarpamp wrote:
> I don't think openvpn supports socks5 on its input yet.
>
> Anyone know of a shim to put in front of openvpn that will accept
> socks5 on its input and send to an IP nexthop / interface as its output
> (thus making it configurable to point into openvpn)?
this would be
Ben wrote:
I forgot to tell it to add a timestamp, so comparison against your logs
would be nigh on impossible - have set the same script running with
timestamps added, will keep an eye to see whether any failed connections
have been logged.
I do, however, have some entries in my tor client logs
10 matches
Mail list logo