On Mon, Mar 31, 2014 at 08:48:44PM -0400, me wrote:
> Bare with me as I ramble my way toward hidden services.
>
> First a plain server connect:
>
> Assuming a simple web client using Tor to contact a normal web page, NOT
> HTTPS for simplicity.
>
> Client <=> Node A <=> Node B <=> Node C <-> HTT
Hi,
AK wrote (01 Apr 2014 01:53:06 GMT) :
> Let me just clarify some points.
> Is the goal to be more secure than a standard Linux distro such as Ubuntu
> or Debian? Yes.
OK. What I'd be delighted to read now is what "more secure" means.
I'll wait for your next write-up :)
Cheers,
--
intriger
Mike Perry:
> I've discovered that the Linux kernel appears to have a leak in how it
> applies transproxy rules to the TCP CLOSE_WAIT shutdown condition under
> certain circumstances.
Quite the bombshell!
I've reproduced those packets on kernel 3.13 using your iptables rules.
Strangely enough my
On Saturday 29 March 2014 03:10:47 grarpamp wrote:
> On Fri, Mar 28, 2014 at 5:20 PM, intrigeri wrote:
> > grarpamp wrote (28 Mar 2014 21:02:35 GMT) :
> >> [...] what happens with entire vm IP transproxy (perhaps like
> >> Tails)?
> >
> > Tails only uses a transproxy for the automapped .onion add
On Sunday 16 February 2014 13:42:59 Patrick Schleizer wrote:
> Rusty Bird:
> > Patrick Schleizer:
> >> The problem is, any Whonix-Workstation behind Whonix-Gateway -
> >> once compromised - can claim to be another Whonix-Workstation,
> >> thus not being stream isolated anymore.
> >>
> >> This coul
Thank you!
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk