How do I configure my hidden service to use the latest Dos defense in tor
0.4.2.5.
In my tor/torrc file underneath my hiddenservice info I added
HiddenServiceEnableIntroDoSDefense 1
HiddenServiceEnableIntroDoSRatePerSec 25
HiddenServiceEnableIntroDoSBurstPerSec 200
and tried to reload tor which
tldr: new TLS certificate is stuck in the pipeline for a few days, because
onion certificates are special and weird:
https://twitter.com/AlecMuffett/status/1205443143816110085?s=19
(Includes links to sources)
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other
On Fri, Dec 13, 2019 at 11:29:34AM +, Alec Muffett wrote:
> tldr: new TLS certificate is stuck in the pipeline for a few days, because
> onion certificates are special and weird:
Onion certificates are an oxymoron. The onion address
is self-validating. It is a bug that web browsers apply
the l
carlo von lynX:
> On Fri, Dec 13, 2019 at 11:29:34AM +, Alec Muffett wrote:
>> tldr: new TLS certificate is stuck in the pipeline for a few days, because
>> onion certificates are special and weird:
>
> Onion certificates are an oxymoron. The onion address
> is self-validating. It is a bug tha
> Facebook has started hosting and linking images and media on a clearnet
If true, this split horizoning should be quit,
not least for breaking security and access
expectations about onions.
> This is not necessarily the case. There exist threat models (e.g.
Cert fingerprint pinning, onionland