> On the other hand the "protocol audit" mess is even worse.
This 'mess' doesn't seem to have anything to do with Tor,
nor is it Torproject's responsibility to do any such audit
on any app other than Tor itself, or by extension those it
maintains or chooses to partner with.
As said before, torsoc
On Mon, 03 Dec 2012 20:58:10 +
adrelanos wrote:
> I think if a Tor library and instructions how to design a protocol
> and/or application Tor-safe from scratch would have been created in
> past, we wouldn't have this "protocol review" mess now.
Yeah, until somebody links with your Tor librar
grarpamp:
>> I think instead of inventing torsocks it would have been much
>> better if there was a Tor connection library and applications
>> could easily use it.
>
> Preload (as in torsocks) was invented to hook the network system
> calls for apps where there was no socks5 support. Expecting an
> I think instead of inventing torsocks it would have been much better if
> there was a Tor connection library and applications could easily use it.
Preload (as in torsocks) was invented to hook the network system calls
for apps where there was no socks5 support. Expecting an app developer
to code
i agree with adrelanos i use tor manly to run a bridge and a relay at my
work {we set up a server for that} but i find it difficult to Macaulay
go into sock but on the occasion i use it which is rare besides to
connect to an employe computer but if we had a library of tor connection
optioned w
Matthew Finkel:
> On 12/01/2012 06:14 PM, John Case wrote:
>>
>> On Fri, 2 Nov 2012, grarpamp wrote:
>>
> I don't agree. torsocks is still useful to prevent identity correlation
> through circuit sharing. Pushing all traffic through Trans- and DnsPort
> is not the answer.
Also
On 12/01/2012 06:14 PM, John Case wrote:
>
> On Fri, 2 Nov 2012, grarpamp wrote:
>
I don't agree. torsocks is still useful to prevent identity correlation
through circuit sharing. Pushing all traffic through Trans- and DnsPort
is not the answer.
>>>
>>> Also, I don't want all of my
On Sat, 2012-12-01 at 23:14 +, John Case wrote:
> On Fri, 2 Nov 2012, grarpamp wrote:
>
> >>> I don't agree. torsocks is still useful to prevent identity correlation
> >>> through circuit sharing. Pushing all traffic through Trans- and DnsPort
> >>> is not the answer.
> >>
> >> Also, I don't w
I wanted this too. According to the documentation (ssh_config) you can
use the ProxyCommand option and nc (netcat) to accomplish this. I
haven't really used it yet though or audited it to make sure it doesn't
leak.
On 12/1/2012 15:14, John Case wrote:
>
> On Fri, 2 Nov 2012, grarpamp wrote:
>
On Fri, 2 Nov 2012, grarpamp wrote:
I don't agree. torsocks is still useful to prevent identity correlation
through circuit sharing. Pushing all traffic through Trans- and DnsPort
is not the answer.
Also, I don't want all of my applications using Tor -- just some of
them. Using Tails or Trans
Maybe a bit late, but what about proxychains?
https://sourceforge.net/projects/proxychains/forums/forum/644747
https://sourceforge.net/projects/proxychains/
https://github.com/rofl0r/proxychains
Looks a bit better maintained. Haven't found a big issue tracker,
doesn't mean there aren't many (more
Hi,
Jacob Appelbaum wrote (03 Nov 2012 11:17:05 GMT) :
> Can you give me a list of things that matter most to you in order of
> your priority? The bug list is mighty long...
Sure, here's my top six. From highest priority to lowest.
Most issues have patches attached.
I'll refer to the Debian pack
intrigeri:
> Hi,
>
> Maxim Kammerer wrote (03 Nov 2012 12:16:23 GMT) :
>> inb4 incoming stream of Debian-centric patches: please be wary of
>> glibc differences:
>> https://bugs.gentoo.org/show_bug.cgi?id=395953
>
>> Wrt. this specific bug, perhaps you will want to use Anthony Basile's
>> solutio
Nick Mathewson:
> On Sat, Nov 3, 2012 at 11:23 PM, Matthew Finkel
> wrote:
>
>> On 11/03/2012 08:38 PM, Nick Mathewson wrote:
>>
> [...]
>
>>> Okay, sounds like we've got some enthusiasm. Let's get started. I
>>> volunteer to review commits and if people ask me to, and suggest that
>>> asking
Hi,
Maxim Kammerer wrote (03 Nov 2012 12:16:23 GMT) :
> inb4 incoming stream of Debian-centric patches: please be wary of
> glibc differences:
> https://bugs.gentoo.org/show_bug.cgi?id=395953
> Wrt. this specific bug, perhaps you will want to use Anthony Basile's
> solution instead of the patch i
On Sat, Nov 3, 2012 at 11:23 PM, Matthew Finkel wrote:
> On 11/03/2012 08:38 PM, Nick Mathewson wrote:
>
[...]
> > Okay, sounds like we've got some enthusiasm. Let's get started. I
> > volunteer to review commits and if people ask me to, and suggest that
> > asking me to review stuff for a whi
On 11/03/2012 08:38 PM, Nick Mathewson wrote:
> On Fri, Nov 2, 2012 at 11:10 PM, Matthew Finkel
> wrote:
>
>> On 11/02/2012 07:36 PM, Jacob Appelbaum wrote:
>>> Nick Mathewson:
On Fri, Nov 2, 2012 at 1:34 PM, adrelanos wrote:
>
>
> Could you blog it please?
I'd li
On Fri, Nov 2, 2012 at 11:10 PM, Matthew Finkel wrote:
> On 11/02/2012 07:36 PM, Jacob Appelbaum wrote:
> > Nick Mathewson:
> >> On Fri, Nov 2, 2012 at 1:34 PM, adrelanos wrote:
> >>>
> >>>
> >>> Could you blog it please?
> >>
> >>
> >> I'd like to see more discussion from more people here first,
>> Can you give me a list of things that matter most to you in order of
>> your priority? The bug list is mighty long...
>
> inb4 incoming stream of Debian-centric patches: please be wary of
> glibc differences:
And wary that Linux/GNU mod Debian is not the only OS that has
current users. The BSD'
Matthew Finkel:
> On 11/02/2012 07:36 PM, Jacob Appelbaum wrote:
>> Nick Mathewson:
>>> On Fri, Nov 2, 2012 at 1:34 PM, adrelanos wrote:
Could you blog it please?
>>>
>>>
>>> I'd like to see more discussion from more people here first, and see
>>> whether somebody steps up to say, "
On Sat, Nov 3, 2012 at 1:17 PM, Jacob Appelbaum wrote:
> Can you give me a list of things that matter most to you in order of
> your priority? The bug list is mighty long...
inb4 incoming stream of Debian-centric patches: please be wary of
glibc differences:
https://bugs.gentoo.org/show_bug.cgi?i
intrigeri:
> Hi,
>
> Matthew Finkel wrote (03 Nov 2012 03:10:53 GMT) :
>> On 11/02/2012 07:36 PM, Jacob Appelbaum wrote:
>
>>> If Robert wants someone to maintain it, I'd be happy to do so.
>
>> I saw this thread earlier but didn't have a chance to reply. I was
>> thinking about volunteering to
Hi,
Matthew Finkel wrote (03 Nov 2012 03:10:53 GMT) :
> On 11/02/2012 07:36 PM, Jacob Appelbaum wrote:
>> If Robert wants someone to maintain it, I'd be happy to do so.
> I saw this thread earlier but didn't have a chance to reply. I was
> thinking about volunteering to patch it up and maintain
On 11/02/2012 07:36 PM, Jacob Appelbaum wrote:
> Nick Mathewson:
>> On Fri, Nov 2, 2012 at 1:34 PM, adrelanos wrote:
>>>
>>>
>>> Could you blog it please?
>>
>>
>> I'd like to see more discussion from more people here first, and see
>> whether somebody steps up to say, "Yeah, I can maintain that"
Nick Mathewson:
> On Fri, Nov 2, 2012 at 1:34 PM, adrelanos wrote:
>>
>>
>> Could you blog it please?
>
>
> I'd like to see more discussion from more people here first, and see
> whether somebody steps up to say, "Yeah, I can maintain that" here, or
> whether somebody else who knows more than me
On Fri, 2012-11-02 at 18:12 -0400, grarpamp wrote:
> >> I don't agree. torsocks is still useful to prevent identity correlation
> >> through circuit sharing. Pushing all traffic through Trans- and DnsPort
> >> is not the answer.
> >
> > Also, I don't want all of my applications using Tor -- just so
>> I don't agree. torsocks is still useful to prevent identity correlation
>> through circuit sharing. Pushing all traffic through Trans- and DnsPort
>> is not the answer.
>
> Also, I don't want all of my applications using Tor -- just some of
> them. Using Tails or TransPort wouldn't allow me to d
On Fri, 2012-11-02 at 19:49 +, adrelanos wrote:
> grarpamp:
> >> I'd like to see more discussion from more people here first, and see
> >> whether somebody steps up to say, "Yeah, I can maintain that" here, or
> >> whether somebody else who knows more than me about the issues has something
> >>
grarpamp:
>> I'd like to see more discussion from more people here first, and see
>> whether somebody steps up to say, "Yeah, I can maintain that" here, or
>> whether somebody else who knows more than me about the issues has something
>> to say. Otherwise I don't know whether to write a "looking f
> I'd like to see more discussion from more people here first, and see
> whether somebody steps up to say, "Yeah, I can maintain that" here, or
> whether somebody else who knows more than me about the issues has something
> to say. Otherwise I don't know whether to write a "looking for maintainer"
On Fri, Nov 2, 2012 at 1:34 PM, adrelanos wrote:
>
>
> Could you blog it please?
I'd like to see more discussion from more people here first, and see
whether somebody steps up to say, "Yeah, I can maintain that" here, or
whether somebody else who knows more than me about the issues has something
Ted Smith:
> On Fri, 2012-11-02 at 13:09 -0400, Nick Mathewson wrote:
>> On Fri, Nov 2, 2012 at 1:02 PM, adrelanos wrote:
>>
>>> Hi,
>>> [
>>
>>
>> [...]
>>
>>> What are the consequences?
>>>
>>
>> Probably somebody should fork it?
>>
>
> I consider myself someone moderately familiar with the Tor
Nick Mathewson:
> On Fri, Nov 2, 2012 at 1:02 PM, adrelanos wrote:
>
>> Hi,
>> [
>
>
> [...]
>
>> What are the consequences?
>>
>
> Probably somebody should fork it?
>
Could you blog it please?
___
tor-talk mailing list
tor-talk@lists.torproject.o
On Fri, 2012-11-02 at 13:09 -0400, Nick Mathewson wrote:
> On Fri, Nov 2, 2012 at 1:02 PM, adrelanos wrote:
>
> > Hi,
> > [
>
>
> [...]
>
> > What are the consequences?
> >
>
> Probably somebody should fork it?
>
I consider myself someone moderately familiar with the Tor culture.
However,
On Fri, Nov 2, 2012 at 1:02 PM, adrelanos wrote:
> Hi,
> [
[...]
> What are the consequences?
>
Probably somebody should fork it?
--
Nick
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo
35 matches
Mail list logo