On my Debian system, programs like Firefox and Chromium do not work
> > with TorSocks. For AORTA I haven't been able to find a program that
> > does not work under AORTA. Please let me know if you have a program
> > that does not work with AORTA.
>
> Well, I'm not sure what is cause this:
>
> $ a
> Note to the author of AORTA (Rob van der Hoeven), I've had AORTA to
> work on CentOS 7 which shows a kernel version 3.10 but RedHat often
> backports lots of features into older versioned software. This
> might be worth noting on the webpage.
>
Well, the importan
simple program.
I wrote the following article about AORTA:
https://hoevenstein.nl/aorta-a-transparent-tor-proxy-for-linux-programs
Regards,
Rob van der Hoeven.
https://hoevenstein.nl
On Mon, 2018-01-22 at 23:18 +, intmai...@gmail.com wrote:
> Hello,
>
> After configuring and compiling
Hi,
Your problem might have something to do with the DNS configuration. The
article on the Tor website uses: DNSPort 5353
Unfortunately port 5353 is the standard port for multicast DNS(mDNS)
and thus might already be in use by a program involved with mDNS. You
can check which program is listening
Hi Folks,
I'm proud to announce a new program of mine called AORTA.
AORTA (Another Onion Router Transproxy Application) is a small Linux
utility that transparently routes all TCP and DNS traffic from a
program under its control through the Tor network.
Usage:
==
aorta [aorta parameters] [p
> I'm curious, do you know what is failing? Are the connection requests
> timing out? If you attach a controller to the tor client and watch
> for circuit events, do you see the connection failing at the same
> point frequently?
>
> (I haven't run any tests, if I have some time I will)
The last
On Wed, 2017-10-25 at 22:15 -0400, Roger Dingledine wrote:
> On Wed, Oct 25, 2017 at 07:22:18PM +0200, Rob van der Hoeven wrote:
> > > Keep in mind the false positives caused by crappy networks that
> > > just resolve _all_ domains and then serve ads, a captive portal,
>
On Wed, 2017-10-25 at 22:32 +0100, Geoff Down wrote:
>
> On Wed, Oct 25, 2017, at 10:01 PM, Rob van der Hoeven wrote:
> > On Wed, 2017-10-25 at 16:50 -0400, Allen wrote:
> > > and what happens if you use dig alone to talk directly to tor?
> > > something like "
On Wed, 2017-10-25 at 16:54 -0400, Allen wrote:
> or maybe better "dig @localhost:torport hostname +tcp"
>
> On Wed, Oct 25, 2017 at 4:50 PM, Allen wrote:
> > and what happens if you use dig alone to talk directly to tor?
> > something like "dig -p torport hostname +tcp" (see man dig)
> >
Hmmm,
On Wed, 2017-10-25 at 16:50 -0400, Allen wrote:
> and what happens if you use dig alone to talk directly to tor?
> something like "dig -p torport hostname +tcp" (see man dig)
>
A good idea, but the Tor daemon expects that all traffic arriving on
torport has been redirected by iptables. It asks IP
Hi Folks,
I'm testing a small single-program transproxy program that I wrote (not
released yet). This program forwards DNS requests to the DNSPort of the
Tor daemon. During my tests I noticed something that worries me.
With my program I can basically redirect network traffic from any
program to
> > That's a good question. I want to know if the Tor network handles
> > all TCP and DNS traffic. Only the Tor network can resolve an .onion
> > address, and only the Tor network can reach an .onion address. So,
> > if both resolve and requesting work, I am quite confident that Tor
> > handles al
On Wed, 2017-10-25 at 13:27 +, nusenu wrote:
>
> Rob van der Hoeven:
> > I'm currently working on a small Linux utility that does single-
> > program
> > transparent proxying. My utility tests if Tor handles all Internet
> > traffic by requesting an
On Wed, 2017-10-25 at 09:19 -0400, Allen wrote:
> sounds like a useful program. I have no idea what you're looking for
> though. A fast onion server to ping? As you correctly pointed out,
> the facebook onion address would work for that.
Yep, Facebook is fine for speed, but can block my requests.
On Wed, 2017-10-25 at 13:18 +, nusenu wrote:
> > Some examples:
> >
> > myprogram firefox https://check.torproject.org
> > myprogram chromium expyuzz4wqqyqhjn.onion
> > myprogram -t w3m expyuzz4wqqyqhjn.onion
> > myprogram -t git clone http://dccbbv6cooddgcrq.onion/tor.git
> >
On Wed, 2017-10-25 at 08:50 -0400, Allen wrote:
> As long as you keep the tor processing running on your web server,
> the
> response should be relatively quick. If you shutdown the tor process
> on your web server and then restart it, it might take a few minutes
> for machines on the tor network t
Some extra info...
> I use expyuzz4wqqyqhjn.onion (www.torproject.org) as test .onion
> address but this address does not seem very stable to me. Getting a
> response will frequently take several minutes. Is there an .onion
> address available with better (and more stable) response times?
I have
On Wed, 2017-10-25 at 10:34 +, nusenu wrote:
> maybe any of the others are more suitable for your needs?
> https://onion.torproject.org/
>
I came across that list, but I really had no idea which of the entries
were stable. My best bet was the Tor project onion, but this onion
turned out to be
(and more stable) response times?
I like to have an .onion address hosted by the Tor project, and not
by a third party.
Kind regards,
Rob van der Hoeven
https://hoevenstein.nl
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torp
Hi folks,
Lately I started running Tor on an OpenWrt router.
Moving Tor from your computer(s) to the router can change the
Tor-network landscape. Routers have the most direct Internet connection
and they run 24/7. This opens up the opportunity to donate bandwidth to
the Tor-network, and while a
On Sat, 2016-04-23 at 19:56 +0200, Cain Ungothep wrote:
> > Hi,
> >
> > Today I got an idea of how to measure "The CloudFlare problem". It turns
> > out that every time you visit a website that's behind CloudFlare a
> > cookie is set with the name __cfduid
> >
> > If you use Firefox these cookies e
On Sat, 2016-04-23 at 14:03 -0500, Joe Btfsplk wrote:
> On 4/23/2016 8:15 AM, Rob van der Hoeven wrote:
> > Hi,
> >
> > Today I got an idea of how to measure "The CloudFlare problem". It turns
> > out that every time you visit a website that's behind Cl
Hi,
Today I got an idea of how to measure "The CloudFlare problem". It turns
out that every time you visit a website that's behind CloudFlare a
cookie is set with the name __cfduid
If you use Firefox these cookies end up in a SQLite database which can
be queried with the SQLite Manager add-on. M
Hi,
I'm looking for statistics on the Tor users. The metrics website only
has data on the network, not on the users. I am interested in the
following data:
The OS distribution - What percentage of users are using
Windows/Linux/Apple/Android
The web-browser distribution - It would be interesting
Hi folks,
Two months ago I wrote an article named: Thoughts on Tor router
hardware.
https://hoevenstein.nl/thoughts-on-tor-router-hardware
In the article I described an ideal Tor router configuration and argued
that having Tor on the router benefits both security and usability.
Since the artic
Hi folks,
The last month I have been playing with cheap Tor router hardware. This
turned out to be quite a nice experience and it got me thinking about
the benefits of running Tor on the router.
My conclusions are that running Tor on the router can enhance both
security and usability. It further
On Mon, 2016-01-18 at 15:46 +0100, Aeris wrote:
> > Hardware offering Tor routing is becoming very cheap and I think it's
> > time to reexamine what we can do with it.
> >
> > If you want to play, here is some hardware I recently bought that can
> > run Tor firmware:
> >
> > http://www.amazon.co
On Mon, 2016-01-18 at 10:15 +0100, coderman wrote:
> On 1/18/16, Christian Stöveken wrote:
> > ...
> > I was talking to one of the tor developers at the Wauholland place the
> > last day @32C3 about his opinion on transparent tor wlan boxes like
> > anonabox or invinzbox and others.
>
> a recurre
28 matches
Mail list logo