tor-dev
Thread
Date
Earlier messages
Messages by Thread
[tor-dev] ORB - Onion Reply Block
Stefan Claas via tor-dev
[tor-dev] Re: ORB - Onion Reply Block
Stefan Claas via tor-dev
[tor-dev] Proposal 363: Required/recommended protocols for onion services
Nick Mathewson via tor-dev
[tor-dev] Proposal 364: CreateOnehop handshake to replace CREATE_FAST
Nick Mathewson via tor-dev
[tor-dev] Proposal 362: Update onion service proof-of-work control loop
Wesley Aptekar-Cassels via tor-dev
[tor-dev] Proposal 361: Onion Association SANs in Certificates (OASIC)
Micah Anderson via tor-dev
[tor-dev] Proposal 361: Onion Association SANs in Certificates (OASIC)
Micah Anderson via tor-dev
[tor-dev] [GSoC 2025] Graph-Based Relay Partitioning – Proposal and Repository
Valentina Schiavon via tor-dev
[tor-dev] Proposal 360: Limiting HSDesc size and amplification
Nick Mathewson via tor-dev
[tor-dev] Proposal 359: Counter Galois Onion, Updated
Nick Mathewson via tor-dev
[tor-dev] Call for comments on proposals 346, 354, and 358.
Nick Mathewson via tor-dev
[tor-dev] can tor use secondary groups to read FamilyKeyDirectory?
nusenu via tor-dev
[tor-dev] Re: can tor use secondary groups to read FamilyKeyDirectory?
Nick Mathewson via tor-dev
[tor-dev] Re: can tor use secondary groups to read FamilyKeyDirectory?
Roger Dingledine via tor-dev
[tor-dev] Re: can tor use secondary groups to read FamilyKeyDirectory?
nusenu via tor-dev
[tor-dev] Proposal 358: Unifying circuit handshake extensions
Nick Mathewson via tor-dev
[tor-dev] Proposal 356: Increasing netdoc strictness not considered (very) harmful
Nick Mathewson via tor-dev
[tor-dev] Proposal 355: Options for postquantum circuit extension handshakes
Nick Mathewson via tor-dev
[tor-dev] Proposal 357: Circuit key exporters: A better way to use KH
Nick Mathewson via tor-dev
[tor-dev] Make torsocks mutli-arch ready
Hefee via tor-dev
[tor-dev] Re: Make torsocks mutli-arch ready
Jim Newsome via tor-dev
[tor-dev] Re: Make torsocks mutli-arch ready
Hefee via tor-dev
[tor-dev] Re: Make torsocks mutli-arch ready
Jim Newsome via tor-dev
[tor-dev] Re: Make torsocks mutli-arch ready
Hefee via tor-dev
[tor-dev] Proposal 354: Relaxing Path Restrictions in Arti
Mike Perry via tor-dev
[tor-dev] About the key derivation algorithm used in the Control Port password authentication
techmetx11 via tor-dev
[tor-dev] Re: About the key derivation algorithm used in the Control Port password authentication
Alexander Hansen Færøy via tor-dev
[tor-dev] Metadata Cleaner is looking for a new co-maintainer
intrigeri via tor-dev
[tor-dev] New BUG() call and stack-trace seen in the wild on 0.4.8.13 exit relay.
George Hartley via tor-dev
[tor-dev] [tor-project] Reminder: mailman 3 upgrade imminent (TPA-RFC-71)
Antoine Beaupré
[tor-dev] Sharing Circuits Between Onion Servers and Clients
stifle_savage042--- via tor-dev
Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients
Georg Koppen
Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients
Holmes Wilson
Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients
Watson Ladd
Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients
stifle_savage042--- via tor-dev
Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients
Watson Ladd
Re: [tor-dev] Sharing Circuits Between Onion Servers and Clients
stifle_savage042--- via tor-dev
[tor-dev] Proposal: Handling Complex DNS Traffic for VPN usage in Tor
Alexander Færøy
[tor-dev] Tor over QUIC
Q Misell via tor-dev
Re: [tor-dev] Tor over QUIC
George Hartley via tor-dev
Re: [tor-dev] Tor over QUIC
trinity pointard
Re: [tor-dev] Tor over QUIC
George Hartley via tor-dev
Re: [tor-dev] Tor over QUIC
Nick Mathewson
Re: [tor-dev] Tor over QUIC
David Goulet
Re: [tor-dev] Tor over QUIC
David Schinazi
[tor-dev] changes in user-agent spoofing in the Tor Browser 14.0 series
Morgan
[tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible
Nick Mathewson
Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible
Q Misell via tor-dev
Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible
Nick Mathewson
Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible
Jim Newsome
Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible
Nick Mathewson
Re: [tor-dev] Proposal 351: Making SOCKS5 authentication extensions extensible
Michael Rogers
[tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)
Nick Mathewson
Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)
Michael Rogers
Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)
Nick Mathewson
Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)
Roger Dingledine
Re: [tor-dev] Restricting SOCKS access now and later (was Re: Proposal 351: Making SOCKS5 authentication extensions extensible)
Michael Rogers
[tor-dev] terminology explaination: identifier.
eff_03675549
Re: [tor-dev] terminology explaination: identifier.
Georg Koppen
[tor-dev] Proposal for a New Web App to Configure Tor Nodes
Alessandro Greco via tor-dev
Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes
boldsuck via tor-dev
Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes
Sergey Ponomarev
Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes
George Hartley via tor-dev
Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes
Q Misell via tor-dev
Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes
boldsuck via tor-dev
Re: [tor-dev] Proposal for a New Web App to Configure Tor Nodes
Alessandro Greco via tor-dev
[tor-dev] Cancel
tj
Re: [tor-dev] Cancel
George Hartley via tor-dev
[tor-dev] txtorcon 24.8.0
meejah
[tor-dev] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes
Sam
[tor-dev] Tor community papers at Usenix Security
Roger Dingledine
[tor-dev] Some Gosling Updates!
Richard Pospesel
[tor-dev] Proposal 350: A phased plan to remove TAP onion keys
Nick Mathewson
Re: [tor-dev] Proposal 350: A phased plan to remove TAP onion keys
Nick Mathewson
[tor-dev] Key Blinding Secrets
Bellebaum, Thomas
Re: [tor-dev] Key Blinding Secrets
Nick Mathewson
[tor-dev] Proposal for Tor (Relay) Watchdog (Telegram) Bot
Alessandro Greco via tor-dev
Re: [tor-dev] Proposal for Tor (Relay) Watchdog (Telegram) Bot
Hiro/Silvia
[tor-dev] Proposal #349: Command state validation (for dropmark attacks)
Mike Perry
[tor-dev] Announcing Onionspray 1.6.0 with a SECURITY fix for Onion Services rewriting proxies
rhatto
Re: [tor-dev] UDP Application Support in Tor
Vilgot Bergquist via tor-dev
Re: [tor-dev] UDP Application Support in Tor
Micah Elizabeth Scott
Re: [tor-dev] UDP Application Support in Tor
Roger Dingledine
[tor-dev] docker bridge suddenly fails startup with "Directory /var/lib/tor cannot be read: Permission denied"
gentle . luck4713
[tor-dev] New Proposal - UDP Application Support in Tor
Micah Elizabeth Scott
[tor-dev] Timers in Arti?
Michael Rogers
Re: [tor-dev] Timers in Arti?
Micah Elizabeth Scott
Re: [tor-dev] Timers in Arti?
Michael Rogers
Re: [tor-dev] Timers in Arti?
Micah Elizabeth Scott
Re: [tor-dev] Timers in Arti?
Nick Mathewson
Re: [tor-dev] Timers in Arti?
Michael Rogers
Re: [tor-dev] Timers in Arti?
Holmes Wilson
Re: [tor-dev] Timers in Arti?
Michael Rogers
Re: [tor-dev] Timers in Arti?
Michael Rogers
[tor-dev] txtorcon 23.11.0
meejah
[tor-dev] Proposal 347: Domain separation for certificate signing keys
Nick Mathewson
Re: [tor-dev] Proposal 347: Domain separation for certificate signing keys
Alexander Færøy
[tor-dev] Proposal 346: Clarifying and extending the use of protocol versioning
Nick Mathewson
[tor-dev] Fact-checking a claim about relay/bridge fingerprint authentication
David Fifield
Re: [tor-dev] Fact-checking a claim about relay/bridge fingerprint authentication
David Fifield
Re: [tor-dev] Fact-checking a claim about relay/bridge fingerprint authentication
Roger Dingledine
Re: [tor-dev] Fact-checking a claim about relay/bridge fingerprint authentication
David Fifield
[tor-dev] PT bridge reporting significant numbers of <OR> IP addresses after upgrade to 0.4.8.6; Conflux related?
David Fifield
Re: [tor-dev] PT bridge reporting significant numbers of <OR> IP addresses after upgrade to 0.4.8.6; Conflux related?
trinity pointard
[tor-dev] funion: A Tor Client in Elixir
Emil Engler
[tor-dev] Automating dependency updates in Tor
micah anderson
[tor-dev] When RFC 7686 and transparent proxies collide
Matt Jolly
Re: [tor-dev] When RFC 7686 and transparent proxies collide
rhatto
Re: [tor-dev] When RFC 7686 and transparent proxies collide
kaizushi
Re: [tor-dev] When RFC 7686 and transparent proxies collide
Shawn Webb
Re: [tor-dev] When RFC 7686 and transparent proxies collide
Alec Muffett
Re: [tor-dev] When RFC 7686 and transparent proxies collide
Shawn Webb
Re: [tor-dev] When RFC 7686 and transparent proxies collide
Alec Muffett
Re: [tor-dev] When RFC 7686 and transparent proxies collide
kaizushi
Re: [tor-dev] When RFC 7686 and transparent proxies collide
Q Misell via tor-dev
[tor-dev] Rewriting to e.as207960.net (was: When RFC 7686 and transparent proxies collide)
Matt Traudt
[tor-dev] Prop#344: Prioritizing Protocol Information Leaks in Tor
Mike Perry
[tor-dev] Calling Tor Volunteers and Developers! Help Shape the Future of Tor Relay Updates!
Ravi Kumar via tor-dev
[tor-dev] Network Health team and analysis work
Georg Koppen
[tor-dev] [Update] Network Status APIs
Mattia Righetti
[tor-dev] [Update] Network Status APIs
Mattia Righetti
[tor-dev] Network Status APIs
Mattia Righetti
[tor-dev] txtorcon v23.5.0
meejah
[tor-dev] Suggestions for Arti Example Programs
Saksham Mittal
[tor-dev] Hacks to reduce Tor's initial download on slow Internet, sacrificing privacy?
Holmes Wilson
Re: [tor-dev] Hacks to reduce Tor's initial download on slow Internet, sacrificing privacy?
Mike Perry
Re: [tor-dev] Hacks to reduce Tor's initial download on slow Internet, sacrificing privacy?
Holmes Wilson
[tor-dev] New Proposal - CAA Extensions for the Tor Rendezvous Specification
Q Misell via tor-dev
Re: [tor-dev] New Proposal - CAA Extensions for the Tor Rendezvous Specification
Ian Goldberg
Re: [tor-dev] New Proposal - CAA Extensions for the Tor Rendezvous Specification
Q Misell via tor-dev
Re: [tor-dev] New Proposal - CAA Extensions for the Tor Rendezvous Specification
Q Misell via tor-dev
Re: [tor-dev] New Proposal - CAA Extensions for the Tor Rendezvous Specification
Shelikhoo
Re: [tor-dev] New Proposal - CAA Extensions for the Tor Rendezvous Specification
Q via tor-dev
Re: [tor-dev] New Proposal - CAA Extensions for the Tor Rendezvous Specification
Shelikhoo
Re: [tor-dev] New Proposal - CAA Extensions for the Tor Rendezvous Specification
David Goulet
[tor-dev] goptlib moved to gitlab.torproject.org
David Fifield
[tor-dev] MSVC compile failure
Gisle Vanem
Re: [tor-dev] MSVC compile failure
Gabriela Moldovan
Re: [tor-dev] MSVC compile failure
Gisle Vanem
Re: [tor-dev] MSVC compile failure
Gabriela Moldovan
[tor-dev] Cross-user TLS traffic mixing in snowflake-server until 2023-03-13
David Fifield
[tor-dev] Is Arti expected to have better multi-CPU support than C-tor?
David Fifield
Re: [tor-dev] Is Arti expected to have better multi-CPU support than C-tor?
Nick Mathewson
Re: [tor-dev] Is Arti expected to have better multi-CPU support than C-tor?
Emil Engler
Re: [tor-dev] Is Arti expected to have better multi-CPU support than C-tor?
David Fifield
[tor-dev] [CRITICAL] Deep Fingerprinting Traffic Correlation
Guard via tor-dev
[tor-dev] [CRITICAL] DeepCorr Traffic Confirmation Attack
Guard via tor-dev
Re: [tor-dev] [CRITICAL] DeepCorr Traffic Confirmation Attack
Holmes Wilson
Re: [tor-dev] [CRITICAL] DeepCorr Traffic Confirmation Attack
Syverson, Paul F CIV USN NRL (5543) Washington DC (USA) via tor-dev
[tor-dev] A way to connect quickly to a newly-online hidden service?
Holmes Wilson
Re: [tor-dev] A way to connect quickly to a newly-online hidden service?
Michael Rogers
[tor-dev] The future of Tor client software?
Steven Engler
Re: [tor-dev] The future of Tor client software?
Nick Mathewson
Re: [tor-dev] The future of Tor client software?
Nick Mathewson
Re: [tor-dev] The future of Tor client software?
Steven Engler
[tor-dev] Simple tool for mobile remote desktops
Micah Elizabeth Scott
Re: [tor-dev] Simple tool for mobile remote desktops
rhatto
[tor-dev] Proposal 342: Decouple hs_interval and SRV lifetime
Nick Mathewson
Re: [tor-dev] Proposal 342: Decouple hs_interval and SRV lifetime
Holmes Wilson
Re: [tor-dev] Proposal 342: Decouple hs_interval and SRV lifetime
Nick Mathewson
Re: [tor-dev] Proposal 342: Decouple hs_interval and SRV lifetime
Holmes Wilson
Re: [tor-dev] Proposal 342: Decouple hs_interval and SRV lifetime
Nick Mathewson
Re: [tor-dev] Proposal 342: Decouple hs_interval and SRV lifetime
David Goulet
Re: [tor-dev] Proposal 342: Decouple hs_interval and SRV lifetime
Nick Mathewson
Re: [tor-dev] Proposal 342: Decouple hs_interval and SRV lifetime
David Goulet
[tor-dev] Typo in relay metrics (circs_creared)
Andreas Bollhalder
Re: [tor-dev] Typo in relay metrics (circs_creared)
trinity pointard
Re: [tor-dev] Typo in relay metrics (circs_creared)
Andreas Bollhalder
[tor-dev] Tor Bridges and Snowflakes detection attack
tor
Re: [tor-dev] Tor Bridges and Snowflakes detection attack
EfraimVagner via tor-dev
Re: [tor-dev] Tor Bridges and Snowflakes detection attack
Christian Pietsch
Re: [tor-dev] Tor Bridges and Snowflakes detection attack
Cecylia Bocovich
Re: [tor-dev] Tor Bridges and Snowflakes detection attack
tor
[tor-dev] C99 compatibility issue in torsocks
Florian Weimer
Re: [tor-dev] C99 compatibility issue in torsocks
trinity pointard
[tor-dev] Applications team no longer updating gitolite repos
Richard Pospesel
[tor-dev] Latest releases missing from changelog
Michael Rogers
Re: [tor-dev] Latest releases missing from changelog
David Goulet
[tor-dev] Blacklist all domains, whitelist .onion,.exit
nyxnor via tor-dev
[tor-dev] Release new version of stem
Hefee
Re: [tor-dev] Release new version of stem
Georg Koppen
Re: [tor-dev] Release new version of stem
Hefee
Re: [tor-dev] Release new version of stem
Damian Johnson
Re: [tor-dev] Release new version of stem
Georg Koppen
Re: [tor-dev] Release new version of stem
meejah
Re: [tor-dev] Release new version of stem
juga
Re: [tor-dev] Release new version of stem
Hefee
Re: [tor-dev] Release new version of stem
Georg Koppen
[tor-dev] Shortcuts to data-heavy parts of the bootstrapping process
Holmes Wilson
Re: [tor-dev] Shortcuts to data-heavy parts of the bootstrapping process
Roger Dingledine
Re: [tor-dev] Shortcuts to data-heavy parts of the bootstrapping process
Holmes Wilson
[tor-dev] Introducing a Conjure PT for Tor
Cecylia Bocovich
[tor-dev] TOR socket for P2P in Python
Martin Neuenhofen via tor-dev
Re: [tor-dev] TOR socket for P2P in Python
Martin Neuenhofen via tor-dev
Re: [tor-dev] TOR socket for P2P in Python
Matt Traudt
Re: [tor-dev] TOR socket for P2P in Python
Martin Neuenhofen via tor-dev
[tor-dev] Proposal 341: A better algorithm for out-of-sockets eviction
Nick Mathewson
Re: [tor-dev] Proposal 341: A better algorithm for out-of-sockets eviction
Roger Dingledine
[tor-dev] bridge:// URI and QR codes
meskio
Re: [tor-dev] bridge:// URI and QR codes
Torsten Grote
Earlier messages