[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Injecting client data through your own server
- To: or-talk@xxxxxxxx
- Subject: Injecting client data through your own server
- From: Arrakis Tor <arrakistor@xxxxxxxxx>
- Date: Tue, 30 Aug 2005 00:52:38 -0500
- Delivered-to: archiver@seul.org
- Delivered-to: or-talk-outgoing@seul.org
- Delivered-to: or-talk@seul.org
- Delivery-date: Tue, 30 Aug 2005 01:53:24 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=oGde82XPtIFk2N/TiaZGF3210uqY9iLrMY7stp7r8ZI/RECkfQDthsDCiq2FREO+dWfMEu0xKpwijyi9//te4umSrLSdKsaZjuxaBPMNmTiZePYER5YanO9WO/Wa8C2I0DpJ+pAkv71h3NmQ+dgSOIEJdFS6AlAqUv+jCPDrLQw=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
I was reading some of the archive on routing through your own machine
and I was interested to implement it. Encrypting the data before it
leaves your own machine sounds advantageous. However I am encountering
a problem. When i config my entrynode to by my own server, i see
errors in the log of "add_nickname_list_to_smartlist(): Nichname list
includes 'arrakis' which is known but down." So it appears that Tor
refuses to let me use my own server. When I set it for strict policy
the error logs go crazy and tor pukes.
Is the way I am doing it working, and only occaisonally reporting an error?
Is there a better solution to be able to make it strict?