[tor-onions] Debugging an ubuntu / apache2 / tor / ssl setup

Peter brooks peter.h.m.brooks at gmail.com
Tue Oct 2 19:18:34 UTC 2018


Thank you. That is a good idea. Using curl does make the local poxy clear.

I’ve also used the tor browser.

The problem, though, isn’t with the client. I can reach other tor / SSL sites.

I can’t seem to pick up the refusal on the server end.

Sent from my iPad

> On 2 Oct 2018, at 16:58, Alec Muffett <alec.muffett at gmail.com> wrote:
> 
> Possibly irrelevant aside: much as I love the theory of torsocks (and am in a former life a big fan of LD_PRELOAD) - I latterly have given up on it and swapped entirely to 'curl -x' and variations upon 'nc' to perform onion testing; I just got fed up with version incompatibilities between the libraries and the command line. Torsocks sadly very much feels like a second class citizen product with respect to the rest of the Tor ecosystem.
> 
> There's examples of what I do instead, in:
> 
> https://lists.torproject.org/pipermail/tor-onions/2018-September/000311.html
> 
> -a
> 
> _______________________________________________
> tor-onions mailing list
> tor-onions at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-onions/attachments/20181002/dca53faf/attachment.html>


More information about the tor-onions mailing list