[tor-onions] Debugging an ubuntu / apache2 / tor / ssl setup
Peter brooks
peter.h.m.brooks at gmail.com
Tue Oct 2 19:18:34 UTC 2018
Thank you. That is a good idea. Using curl does make the local poxy clear.
I’ve also used the tor browser.
The problem, though, isn’t with the client. I can reach other tor / SSL sites.
I can’t seem to pick up the refusal on the server end.
Sent from my iPad
> On 2 Oct 2018, at 16:58, Alec Muffett <alec.muffett at gmail.com> wrote:
>
> Possibly irrelevant aside: much as I love the theory of torsocks (and am in a former life a big fan of LD_PRELOAD) - I latterly have given up on it and swapped entirely to 'curl -x' and variations upon 'nc' to perform onion testing; I just got fed up with version incompatibilities between the libraries and the command line. Torsocks sadly very much feels like a second class citizen product with respect to the rest of the Tor ecosystem.
>
> There's examples of what I do instead, in:
>
> https://lists.torproject.org/pipermail/tor-onions/2018-September/000311.html
>
> -a
>
> _______________________________________________
> tor-onions mailing list
> tor-onions at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-onions/attachments/20181002/dca53faf/attachment.html>
More information about the tor-onions
mailing list