Hi Yuri. If you just set a ControlPort in your torrc but not password
or cookie auth then its open. Please see...
https://stem.torproject.org/faq.html#can-i-interact-with-tors-controller-interface-directly
By default tor restricts access to localhost but none the less, having
authentication *or*
>> Actually it's openSUSE :)
>
> Did I lose you with that?
Nope, I was waiting for you to do the instructions I gave. Shifting my
focus to work - apologies, but I don't have the time to walk you
further through this.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or chang
rrc'.
On Sun, Jul 23, 2017 at 12:22 PM, James wrote:
> Damian Johnson:
>> That's fine. It's just an example. Try this...
>>
>> % killall tor
>> % cat /etc/tor/torrc
>> % tor -f /etc/tor/torrc &
>> % telnet localhost
>> AUTHENTICAT
That's fine. It's just an example. Try this...
% killall tor
% cat /etc/tor/torrc
% tor -f /etc/tor/torrc &
% telnet localhost
AUTHENTICATE "my_password"
On Sun, Jul 23, 2017 at 11:38 AM, James wrote:
> Damian Johnson:
>> Hi James. Most likely tor isn't
Hi James. Most likely tor isn't using the torrrc file you think it is
or you forgot to restart the tor process after changing the torrc.
Give this a try to troubleshoot further...
https://stem.torproject.org/faq.html#i-m-using-password-authentication
On Sat, Jul 22, 2017 at 5:31 PM, James wrote
Great stuff! Thanks especially for the Stem bug report. It was a great catch. :)
On 2/20/17, m.aj...@tuta.io wrote:
> Hello, Tor Talk and Privacy Enthusiasts!
>
> Here are some small updates about my hobbyist project "Teach and encourage
> people to use Tor."
>
> 1. I
Hi Neel, nice work! One quick note...
"TorNova has logfile and circuit viewing. OnionLauncher would require
third party programs (like arm to get this functionality)."
For what it's worth that is not true. I wrote Stem to be the new
backend of Nyx (aka arm). Just about anything arm can do Stem pr
For what it's worth you might find the following helpful...
https://stem.torproject.org/faq.html#i-m-using-a-controlsocket
Cheers! -Damian
On Mon, Feb 15, 2016 at 3:51 AM, wrote:
> Hi. Some old discussions on "stem" and "vidalia" suggest that Tor may be
> controlled via a Unix domain socket.
Do you want to make Tor even better, and get paid in the process? If you are a
student, we have good news for you: the Tor Project is pleased to announce our
first Summer of Privacy!
https://trac.torproject.org/projects/tor/wiki/org/TorSoP
Thanks to Google, over the last eight years Tor has men
Hi Anonymous Kyoto. I'm having a tough time following this thread but
it's an understandable point of confusion, the bandwidth stats are
indeed odd. For Stem's part it just uses the same terminology as the
directory specification...
https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n380
And please get involved early! We particularly love it when folks get
involved before GSoC to help out and show how awesome they are. ;)
On Fri, Jan 16, 2015 at 4:54 AM, Nick Mathewson wrote:
> On Thu, Jan 15, 2015 at 11:46 PM, Akhil Koul wrote:
>> Hello
>>
>> I am a third year undergrad Comput
Yup, longclaw is down. Its operator has been notified...
https://lists.torproject.org/pipermail/tor-consensus-health/2015-January/005500.html
On Thu, Jan 15, 2015 at 12:42 PM, l.m wrote:
> After missing signature it's now not listed in current consensus. Did
> I miss some event?
>
> -- leeroy
>
> Hey,
>
> This looks like a pretty good start so far! I'm looking forward to seeing
> further development on this. For what it's worth, I think there were some
> other people vaguely hacking on Tor ControlPort libraries in Go; perhaps they
> will speak up and you all can work together. :)
>
> Th
> I could look this up via the trac, but I suspect someone on the list
> "just knows" the answer.
Hi Virgil. Is there something in particular you're wondering? Spec
changes can be perused on...
https://gitweb.torproject.org/torspec.git/log/
The dir-spec is on version 3, so the transition from v2
> Dear all,
>
> Many of you by now are probably aware than I run a large exit node
> cluster for the Tor network and run a collection of mirrors (also ones
> available over hidden services)...
Thanks Thomas for the head's up! I'll forward this to the dirauths so
we can get these relays dropped fro
https://trac.torproject.org/projects/tor/ticket/13905
On Fri, Dec 5, 2014 at 9:36 PM, Ch'Gans wrote:
> Hi there,
>
> Is it just me or atlas and globe are both down?
> They all give me a backend error message.
>
>
> Chris
>
> --
> QtCreator/qmakeparser.cpp:42
> // Parser ///
> #def
> This is to the side of your main point (with which I am largely in
> agreement), and I mean this in the most serious and respectful way
> possible: can you point to statistics, metrics, data that support this
> point?
>
> I suspect the opposite is true, but I very much want to know the real
> fac
I suppose another updated 'tor ecosystem' presentation could be an
option (*). Question I've learned to ask for presentations is: what is
your goal? What are you hoping to get out of this? Recruit volunteers?
Dispel some myth? Entertain?
Cheers! -Damian
* For those who aren't familiar with it, th
> Attention Damian Johnson ;)
>
> How about "Consensus fetched from ..." or "Consensus downloaded from..."?
>
> (If that requires discussion I happily open a ticket)
>
> I don't see any benefit (at first glance) to change (and most likely
>
Hi Sebastian. Generally I don't worry about a transient error like
this since it could be due to, say, tor26 restarting for maintenance
or to upgrade. If we consistently get notices then I notify the
respective directory authority.
Cheers! -Damian
On Sat, Aug 16, 2014 at 1:56 PM, Sebastian G.
>> Does anyone want to argue against making who we flag and why
>> public?
>
> Would be great to also hear about
>
> "Does anyone want to argue against making who we reject
> (AuthDirReject) and why public?"
> (if the above question doesn't include that already)
It does. Rejection is just another
> I think this is a really important point.
>
> I'm usually on the side of transparency, and screw whether publishing
> our methods and discussions impacts effectiveness.
>
> But in this particular case I'm stuck, because the arms race is so
> lopsidedly against us.
>
> We can scan for whether exit
>> I believe that the mere fact that a relay was blocked (via BadExit
>> or reject) can be published.
>
> Will dir auth ops make the list of rejected relays including its
> reason for removal available to the public for transparency?
We did this for a time...
https://trac.torproject.org/projects/
Hi grarpamp. Actually we do have a rudimentary Sybil checker and it
*did* pick up on those relays back in January...
https://lists.torproject.org/pipermail/tor-consensus-health/2014-January/003954.html
We had some internal discussions about them but the thread lost
momentum before they were flagg
>Thanks for your kindly explanation. I have tried method c. you
>mentioned, and found that the returned exit node list with specified
>exit policy is not as the same as the result i obtained by quering
>"https://check.torproject.org/cgi-bin/TorBulkExitList.py";. The
>mismatch of
it claimed.
> Therefore, I am looking forward to the way to get the whole list
> containing all of the exit nodes for my program to have more chance
> for choosing the most suitable exit node. Thank you.
>
> --
> BR, BT
>
> On Fri, Jul 11, 2014, at 12:38 PM, Damia
Hi Bron. What in particular are you trying to do?
On Wed, Jul 9, 2014 at 7:01 PM, Bron Taylor wrote:
> Dear All,
>
> I am running a Tor client on my system and deveploping a software
> with Stem library. I found that Tor didn't download a whole list of
> consensus to local, but a cac
Hi all. After months of work I'm please to announce the release of Stem 1.2.0!
For those who aren't familiar with it, Stem is a Python library for
interacting with Tor. With it you can script against your relay,
descriptor data, or even write applications similar to arm and
Vidalia.
https://ste
Hi all, after a couple months down in the engine room I'm delighted to
announce a new Stem feature for advanced Tor users and developers!
https://stem.torproject.org/tutorials/down_the_rabbit_hole.html
The control interpreter is a new method for interacting with Tor's
control interface that combi
> And here’s a higher res version of it: http://cl.ly/VK82/firefox.png
>
> Feedback very welcome.
Very neat! My only two cents is that without a stem it didn't look
obviously like an onion to me. First impressions were a globe or a
blue wooden ball. That said, with a stem I think it would be a
fan
>> [1] https://consensus-health.torproject.org/
>
> Thanks, Matthew. It *almost* gives me what I'm looking for.
On a side note it's pretty simple to fetch the current directory
authority votes via a little Stem script. Here's an example that does
something similar...
https://stem.torproject.org/
>> http://heartbleed.com/
>> ...
>
> Patch your stuff.
Indeed. Please see...
https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
> Can anyone explain what is causing this?
I'll mostly need to leave this to Mike but for what it's worth yes, he
is well aware that turtles is having issues. :)
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi
> Sir, where can find the bugs of your application so that I can try fixing
> them out
I'm not entirely sure what you're trying to ask, but if you're asking
where our bugtracker is then it's...
https://trac.torproject.org/projects/tor
--
tor-talk mailing list - tor-talk@lists.torproject.org
To u
Interested in coding on Tor and getting paid for it by Google? If you
are a student, we have good news for you: We have been accepted as a
mentoring organization for Google Summer of Code 2014!
https://www.google-melange.com/gsoc/homepage/google/gsoc2014
https://www.google-melange.com/gsoc/org2/go
> ...
> very much fond of mathematics and while going through the organisations
> accepted
>
> for the GSOC-2014 I found this one very interesting and attractive. I
> thought this
> ...
Hi Yimmidisetti. The way that GSoC applications work is...
1. Pick a project from
https://www.torproject.org/ge
Hi Sebastian, glad there's other's keeping an eye on the reports.
> the doctor tells me a lot of stuff, like
> "not reporting bandwidth scanner results: turtles"
I notified Mike a couple times about that. He's aware of it, though it
hasn't been much of a priority for him since the network can mak
> I know change logs are included in packages but are they viewable online
> anywhere? Or do you have to download and extract/install the full package to
> see them?
If you mean tor's ChangeLog then it's available at...
https://gitweb.torproject.org/tor.git/blob/HEAD:/ChangeLog
--
tor-talk maili
Hi all. After seven months of work I'm pleased to announce Stem's 1.1.0 release!
For those who aren't familiar with it, Stem is a Python library for
interacting with Tor. With it you can script against your relay,
descriptor data, or even write applications similar to arm and
Vidalia.
https://ste
> Hi,
>
> here:
> https://lists.torproject.org/pipermail/tor-consensus-health/2013-September/003506.html
>
> DocTor doesn't say entries.
Thanks Sebastian, fixed...
https://lists.torproject.org/pipermail/tor-commits/2013-September/061598.html
> (did not know where to put this)
A trac ticket or i
On Wed, Aug 7, 2013 at 6:09 PM, LEE wrote:
> I found that there is a blacklist in Tor system
>
> I guess blacklist is like prison of onion routers. in other world, if
> Tor system detect some onion router runs
>
> abnormally, Tor system put that router in blacklist and never use again.
>
> Is this
Interested in coding on Tor and getting paid for it by Google? If you
are a student, we have good news for you: We have been accepted as a
mentoring organization for Google Summer of Code 2013!
https://www.google-melange.com/gsoc/homepage/google/gsoc2013
https://www.google-melange.com/gsoc/org/goo
> 1. Python (local machine) proxy to access hidden services without
> installing TOR on the machine.
>
> 2. DNS resolution via TOR, without installing TOR.
>
> 3. Maybe, a Python proxy to create hidden services without installing
> TOR. This point could be detrimental to TOR ecosystem, nevertheless
Hi all. After eighteen months of work and a number of delays rivaling
that of the Big Dig I'm pleased to announce the initial release of
stem!
For those who aren't familiar with it, stem is a python controller
library for tor. With it you can write scripts and applications that
interact with your
Roc Admin, glad you're interested in bad relay detection!
> I'm working on an updated version of SnakesOnATor (SOAT) that was used
> to monitor the Tor network for bad exit nodes.
Does this mean that you're planning to expand the SoaT codebase? Write
a revised version? If the project is going to
> 1. Specify the time interval between identity changes.
Set the MaxCircuitDirtiness option in your torrc...
MaxCircuitDirtiness NUM
Feel free to reuse a circuit that was first used at most NUM seconds
ago, but never attach a new stream to a circuit that is too old. For
hidden services, this app
Hi Lunar. Glad that you're finding stem to be useful!
Sathyanarayanan suggested putting together a page with stem examples
(https://trac.torproject.org/8322). If you wouldn't mind check_tor
would be perfect for that. Some more inline comments would be nice,
but otherwise it's a fine script. :)
>
> Can anyone tell me what mechanisms we (or the Tor Project members)
> have in scanning for malicious exit nodes. Such as nodes that are
> manipulating DNS requests, stripping SSL, etc. I know of the SOAT
> project from Mike Perry but the last I heard there was a GSOC dev
> working on the project.
If you use the cached-consensus then why not just set
'FetchUselessDescriptors 1' in your torrc?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi Jiang. See "SocksPort" on...
https://www.torproject.org/docs/tor-manual.html.en
The browser bundle sets it to 'auto' to avoid port conflicts. You can
set it to a static value in your torrc. That said, if you're still
trying to script against tor then I'd suggest not using the browser
bundle. It
> I have try to get the fingerprint ($ with 40 caracters) of the "Unamed"
> nickname , with no success,
> I think there is a way to calculate it, but i don't how to do that ?
>
> Does someone know how to do that ?
Hi Alex. I'm not entirely sure what you're trying to ask, but if
you're wondering h
> Who knows about Advanced Onion Router?
>
> http://sourceforge.net/projects/advtor/
http://archives.seul.org/or/talk/Oct-2010/msg00026.html
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
> I think it must be the option, seems to be bridge specific as I cannot see
> it on my normal relay.
Yup. It only shows up if you're either a bridge or guard since those
are generally the only positions where you'll see client traffic.
> Result is: "Usage stats aren't available yet" (after 2 d u
> BandwidthRate is 20 KB
That is the very minimum bandwidth rate. Circuits are picked
heuristically based on the available bandwidth so by setting it to
such a tiny value you'll be largely unused.
___
tor-talk mailing list
tor-talk@lists.torproject.org
h
> Is there any option to make this visible the same way in ARM ?
Hi Toby. On the connection panel (page two) try pressing 'c'. If you
press 'h' to get the help you should see...
c => client locale usage summary
... hope that's what you wanted! -Damian
_
> Is part of this network load also related to cached-descriptors periodic
> update?
Some. Relays by default won't fetch server descriptors but all clients
do. See the following for an effort to decrease the load...
https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt#l1042
__
> If you just care about the first step then there's a tor-exitscanner@
> list
Oops, correction - didn't mean the tor-assistants@ reporting step. The
SoaT exit scanners report their results to tor-exitscanner@ so it's a
firehose that's mostly false alarms. I'm pretty sure that at present
Aaron is
> i wanted to ask if there is a mailing list and/or some notification
> schema to know when a new Bad Relay is detected and blocked:
> https://trac.torproject.org/projects/tor/wiki/doc/badRelays
Hi naif. Nope, the usual process is...
- Someone reports a bad exit on tor-assistants@.
- That email si
> When using Microsoft Outlook Web App with a university account, with the Tor
> browser I get kicked out after a few minutes and have to log back into the
> mail account. This happens repeatedly, and am curious what is the reason.
Tor changes the circuits that you're using every ten minutes, w
> Is his forum still the temp defacto beta unofficial Tor forum (re #3592)? It
> has 380 members but no posts?!
Yikes, I didn't realize that people had signed up to it! There's other
forum plans in the works, though Andrew is the only person who knows
the details. I'm happy to take mine down if
Hi Eric. Sorry to hear that you're having troubles after the upgrade.
> => File "/usr/share/arm/cli/menu/actions.py" line 8 in
> import cli.wizzard
> => File "/usr/share/arm/cli/wizzard.py" line 9 in
> import random
Did you copy this over by hand? There's a "wizard.py" module, but no
such thing
> Try excluding {??}. That should do it for you.
I'm not entirely clear how Maxmind allocates the codes, but depending
on your goal you might want to also exclude {A1}, {A2}, and {O1}...
https://www.maxmind.com/app/iso3166
___
tor-talk mailing list
tor-t
Hi all. A new release of arm [1] is now available which includes
numerous fixes of mounting importance [2]. In particular this corrects
several issues around arm's connection panel, terminal glitches due to
disruption of the curses module by readline [3], and incompatibility
with tor's new developm
> My question is how do I get around this running just Tor with ARM on a
> terminal only server..
Hi Eric. Arm should only be prompting you for a password if tor is
requiring it to authenticate. Couple questions...
* Do you have a 'HashedControlPassword' in your torrc? If so then
that's why. If n
> Hello guys,
>
> I just installed Tor-Arm on debian; of which I have used many times before
> and love the project. (http://www.atagar.com/arm/).
>
> I cannot recall what the key is to access the menu interface. Can anyone
> tell me?
Hi Matt. The menu key is 'm', it's mentioned below the header
> SafeCookie is making Tor choke with or without the normal Cookie
> authentication setting..
Evidently telling tor to use cookie auth makes it accept both normal
and safe cookie auth, triggering this issue.
> Fantastic.. However though, how do I get it to work again.. I used to have a
> pkg inst
Sorry about this, it's actually my bad. Code that I wrote for torctl
and copied into arm raised an IOError when it encountered an
unrecognized authentication method. According to Robert you should
have both SafeCookie *and* normal Cookie authentication but the former
is making arm choke.
Fixed thi
> Starting the Anonymous Relay Monitor (arm) which I run as a front-end to
> keep check on things, it complains with
> the following: Unrecognized authentication type: SAFECOOKIE.. And yes I do
> have CookieAuthentication as a setting in my torrc, so what else needs to
> be done..?
'Safe cookie' i
> This year wlan slovenija is again participating in Google Summer of
> Code
This isn't especially relevant to tor, but what *is* relevant is that
we're participating in GSoC too. ;)
https://blog.torproject.org/blog/tor-google-summer-code-2012
Interested
> Are you sure that the projects's maintainers won't be participating this
> year ??
I'm not positive, that is why I'm cc-ing the project maintainer
(Nathan). But he has given indications that they won't be taking part.
___
tor-talk mailing list
tor-talk
Hi Rajat. I'm not following - Orbot is a project but it doesn't have
any ideas listed in the section below it. This is because the
project's maintainers (Guardian) probably won't be taking part in GSoC
this year. -Damian
On Wed, Mar 21, 2012 at 10:32 AM, Rajat Jain wrote:
> Hi there,
> I have bee
> Nope, all of them do
Incorrect. With Duckduckgo JS is optional. This wasn't always the
case, and they changed it to make people like us happy.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo
> Would you use Tor supplied by these people?
Personally no. But if you're using a whole image that you don't trust
then a trojaned tor should be the least of your worries.
> How would you ever know for certain?
https://www.torproject.org/docs/verifying-signatures.html.en
But that said even if
> Are there any working Google scraper alternatives
https://startpage.com/
> ... or some alterantive actually
> usable Tor-friendly search engine out there?
https://duckduckgo.com/
https://ixquick.com/
___
tor-talk mailing list
tor-talk@lists.torprojec
> Bytes sent/received stats as captured in the tor log are not
> persistent across service restarts - every time Tor exits, the it
> starts counting from zero.
>
> What's the best way to keep aggregate Tor bandwidth usage statistics
> for my relay?
The following is a simple script for using TorCtl
> I am interested in overtaking the project TorVM.
I'm not sure what you mean by 'taking over' the project. Besides
having a copy of the source archived in svn we aren't associated with
it.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://
> I just thought I would notify the list that leaseweb is not a safe place to
> host a Tor exit node.
Hi. Please add this to...
https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs
Reports like this are what it's there for.
___
tor-talk mailing
Hi tagnaq, from what I was aware of it's in there...
https://trac.torproject.org/projects/tor/ticket/3391
That said, I'm not quite sure where it's located.
On Mon, Feb 20, 2012 at 3:13 PM, tagnaq wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hi,
>
> I used to install packages fr
> Tor people, is there some kind of "automagic family"
> for EC2 nodes?
Not at present. However, Tor Cloud is only bridge instances so a
family wouldn't matter (they're only used for the first hop).
___
tor-talk mailing list
tor-talk@lists.torproject.org
The wiki articles vary widely in terms of the TLC they get. I have a
few that I watch out for (arm [1], stem [2], and bad relays [3]) and
the good/bad isps gets a lot of activity [4]. The rest have mostly
collected dust since they were written.
> There is no quality policy.
Correct. If you care a
> What iptables rules have to be used to forward everything through Tor?
I've never tried it but I'm pretty sure this is what you're looking for...
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
___
tor-talk mailing list
tor-talk@list
Hi all. As per ticket 4788 [1] we'll soon be removing relays that are
out of date and no longer safe to run, which includes anything older
than version 0.2.1.30. When I last checked this included 257 relays
[2] and I've already notified the 107 of those that had contact
information available.
If y
> I think the best approach is to send off an email with the new proposal to
> all node operators.
Please do not send a mass-email to all relay operators, especially
while you're still in a planning phase. This seems pretty obvious, but
I wanted to make sure that it was clear - relay operators sha
I'm not too eager to jump into this discussion but just a thought:
what about making this opt-in via Tor Weather? Relay operators already
subscribe for status notification emails there, so port scan results
could be another type of notice. -Damian
___
tor
> Just for your information:
> I have running TOR on debian 6 and ubuntu 8.04. Only on ubuntu 8.04 the
> connection list is empty.
Thanks, Stephan and I have been talking off-list and it sounds like
there's a few gotchas braking the connection resolution besides the
tor change...
- proc contents o
> The resolver dump is working for proc, netstat and lsof (root and
> debian-tor). I had to run the script with LANG=C, or it would not work in my
> German locale. But running arm with LANG=C does not change the problem.
Hi Stephan. In your case this definitely sounds unrelated to the tor
change
Thanks all for the report. Reproed the issue and it's caused by a new
feature tor introduced...
https://trac.torproject.org/projects/tor/ticket/3313
https://gitweb.torproject.org/tor.git/commitdiff/f79a75f59731eab85c019c41827c0c0e89d90498
... uggg.
You can work around this by setting "DisableDebu
> I am not interested in reopening the debate, but now that some time has
> passed, I *would* like to find out if this policy was ever codified and
> enacted ?
Yes, though neither of the relays that were flagged for that reason
are still around.
https://trac.torproject.org/projects/tor/wiki/doc/ba
> For what it's worth, I don't think this is actually related to the arm
> upgrade, I would guess that Stephan may have also recently updated to
> Tor 0.2.3.9; when I upgraded a node to 0.2.3.9 I also found that the
> connections panel behavior changed
Hmm, I wouldn't expect that. I'll try running
Hi Stephan. This is the first that I've heard of connection panel
issues related to upgrading. Here's some things to check...
- When connection resolution fails several times arm falls back to
another connection resolver, logging a notice as it does so. Do you
have any connection related log messag
Hi Fabio. What you're describing is a sybil attack. An attacker
definitely *wouldn't* get a majority of the exit traffic for those
destinations - clients weigh relay selection by heuristics reported by
the bandwidth authorities. Those authorities take a long time to warm
up to new relays, so it wou
> how can Tor be configured to avoid using "Italy"?
In your torrc use the following options:
ExcludeExitNodes {it}
StrictNodes 1
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Done and good luck. :)
-1 for the gpg hassling. Worst case scenario is an evil Moritz
impostor puts out a fair bit of effort to harvest some email
addresses. Oh nos!
If he wanted to sign his messages then fine, but this is hardly critical.
___
tor-talk
Hi all. A new release of arm (http://www.atagar.com/arm/) is now
available. Besides the normal batch of bug fixes and minor features
this includes an interactive interpretor for raw control port
access...
http://www.atagar.com/arm/images/screenshot_interpretor_full.png
http://www.atagar.com/arm/rel
Nope. The geoip db distributed with tor only narrows down by country so
you'll need to feed the exit ips into one that's more precise. There's also
a small chance that a relay's ip differs from where you'll egress so you'd
need to check for that too if it's important. -Damian
On Wed, Sep 14, 2011
> The other problem with the setup is passwords can only be letters or numbers,
> no special characters.
Is there a limit on the password length? If not then the recent xkcd
comes to mind...
http://xkcd.com/936/
___
tor-talk mailing list
tor-talk@lists.
H
> or perhaps the best way to run it is via cron.
>
> --- On *Wed, 8/17/11, Damian Johnson * wrote:
>
>
> From: Damian Johnson
> Subject: Re: [tor-talk] Setting up a Tor relay on the hosting server.
> To: tor-talk@lists.torproject.org
> Date: Wednesday, August 17, 2011, 11:23
Lets start with: what OS and do you have root on this box? If it's, for
instance, a debian based distro then that makes the setup a lot nicer.
On Wed, Aug 17, 2011 at 9:57 AM, William Wrightman <
williamwright...@yahoo.com> wrote:
> I have a couple of questions about setting up a Tor relay. I've
> What's it take to convince Vidalia to talk to a Tor that the Vidalia didn't
> start
To start with does the tor instance open a control port?
> My interest here is in monitoring the bandwidth use by Tor. I run Tor as a
> service on headless Ubuntu Debian Linux.
For bandwidth monitoring on he
> Alas, There is no Windows version. Any plans for one in the future?
https://trac.torproject.org/projects/tor/wiki/doc/arm#Windows
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
1 - 100 of 119 matches
Mail list logo