Re: [tor-talk] Tor transparent proxy leaks?
A) The rules might be wrong B) Lsof may be seeing pre-nat connection addresses C) Don't include unrelated datas like rpcbind, ssh, etc when your concern is some other app. Those attempting to debug their setup should be running tcpdump or wireshark on their internal and external interfaces, etc. Lsof isn't the sort of tool to use to see what just flew by. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Can OpenVPN servers be run as Tor hidden services?
On Wednesday 27 March 2013 07:36:42 mirimir wrote: > On 03/27/2013 05:38 AM, Bernhard R. Fischer wrote: > > On Wednesday 27 March 2013 04:59:41 mirimir wrote: > >> OpenVPN clients connect with servers via Tor in TCP mode. > >> > >> But can OpenVPN servers be run as Tor hidden services? > >> > >> I searched quite a bit, but didn't find anything. That's surprising, > >> because (in retrospect) the idea seems so obvious. > >> > >> What am I missing? > > > > > If you are trying to build an IP connection between hosts based on hidden > > services, you may also use OnionCat. It does exactly what you are looking > > for. > > > > https://www.cypherpunk.at/onioncat/ > > Thank you. I didn't think of OnionCat, although I've read about it before. > > Using OnionCat, would I be establishing a private point-to-point > connection to the remote IPv6 address? Or would I be connecting to a > common multi-point VPN, through which I could reach the remote IPv6 > address? OC works point-to-point but of course several "clients" could connect to one central point. I put "clients" under quotes because OC implements the peer-to- peer-model and not the client-server-model. Since it offers a transparent IP connection you can additionally setup any kind of routing. Regards, Bernhard signature.asc Description: This is a digitally signed message part. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Can OpenVPN servers be run as Tor hidden services?
On Wednesday 27 March 2013 17:20:10 grarpamp wrote: > >> https://www.cypherpunk.at/onioncat/ > > > > Using OnionCat, would I be establishing a private point-to-point > > connection to the remote IPv6 address? Or would I be connecting to a > > common multi-point VPN, through which I could reach the remote IPv6 > > address? > > Read through the given link, the connection model is detailed there. > OnionCat does not yet perform optional source authentication HS > handshake, so if you want that you'll need another layer. Yes, you are right. The destination OC reuses the TCP session of the incoming connection. But it would be not much effort to implement this into OC. Actually I did it by intense because using a separate connection back would double the HS connection setup time which was extremely high (up to 30 seconds) at the time OC was developed. We are currently polishing the website, the code of OC and so on up. Probably I'll add this feature. Bernhard signature.asc Description: This is a digitally signed message part. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] unable to create bitmessage forum account via Tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Jonathan, (CC tor-talk) thanks for your work on bitmessage. I reviewed your papers and wanted to give you some feedback and suggestions (problems we try to prevent in torbirdy [1]) in your forum at [2] but I was unable to do so (forum thinks I'm a spamer [3]). I didn't want to send my feedback via direct email because I wanted to have an open discussion. It would be great if you could allow me (and others) to create a forum account via Tor. thanks! btw: is there a bitmessage pseudo-mailing list about bitmessage? (besides announce) [1] https://trac.torproject.org/projects/tor/wiki/torbirdy [2] https://bitmessage.org/forum [3] "The user tagnaq with Email tag...@gmail.com (IP ) is a Spam, please contact forum administrator." -BEGIN PGP SIGNATURE- iF4EAREKAAYFAlFbKAAACgkQyM26BSNOM7Yb4wD+JiJJR8Pi+lUAlecGUaxmsfcy wtlA0C1hfcAIwgxFh2wA/0mb74KOfDltih9q0C0HJ7EVqVYdLs4wUuQJeZ9TiJIO =BzPs -END PGP SIGNATURE- ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Image blocking on Wordpress-based hidden services
Back in January, I created a couple of WordPress plugins that strip images and other media from posts programmatically (without removing theme images). https://github.com/glamrock/wp-imageless "wp-imageless" removes image/img tags, while "wp-medialess" removes img/image/object/embed/video/iframe tags. I wrote it to scratch my own itch, to make moderation easier. If you're running a hidden service using wordpress, you might find it useful. This will work with WP multi-site and is backwards-compatible to v1.5. As a sidenote, if you're running a blog network as a hidden service, please send me a link as I've yet to hear of one. :D best, Griffin -- Please note that I do not have PGP access at this time. OTR: sa...@jabber.ccc.de / fonta...@jabber.ccc.de ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk