Re: [Tails-testers] tor-log and dump of /var/log/syslog

Nachricht löschen

Nachricht beantworten
Autor: tom joad
Datum:  
To: Tails list for early testers
Betreff: Re: [Tails-testers] tor-log and dump of /var/log/syslog
I,

Sorry, I haven't been checking my mail here. Anyway, yes, 1.2 will not connecct at that one site. It works fine on all other that I have come accross. But that one site is an extreme case and one reason I began using Tails in earnest. I believe that the site steals a lot of private info from users. Many folks use the site are fully unaware of the potential hazards. What I have noticed is the site demands fulll access to the unsafe browser to connect. The site doesn't like NOscripts if it locked down to extreme. Lastly, when I connect to router, I am immediately redirected to another router to log on...all very odd. Also it is the only site that uses some odd, unstandard certificate to connect.

Tails 1.1.2 and all before it connected fine. Not Tails 1.2!

The site I use is panera.com and the internet provider is wanderingwifi.com out of Atlanta, Georgia, USA. That is the oddest, most knarly and invasive site I have ever run across. It creeps me out. If I am using Tails, I am ok with it. Otherwise I don't even turn on my computer.

I have a copy of 1.1.2 I can load on a zip drive to connect so I can send you a log or whatever you would like. I will do that tonight and get you a log from it by tomorrow.

TJ

P.S. I just love Tails!



17.10.2014, 14:32, "intrigeri" <intrigeri@???>:
> hi,
>
> tom joad wrote (13 Oct 2014 20:22:46 GMT) :
>>  I attempted a logon here using Taills 1.2 rc using the unsafe browser. I got the same
>>  result. Everyting worked fine until I put cnn.com in the url in an attempt to
>>  connect. I again got the messege the browser couldn't find
>>  the server.
>
> Can you confirm that this is happening in the *Unsafe* browser?
> Does it work differently with another test URL?
> Can it be reproduced on Tails 1.2 final?
>>  10/13/2014 19:12:19.487 [WARN] Tried connecting to router at 86.59.21.38:443, but
>>  identity key was not as expected: wanted 847B1F850344D7876491A54892F904934E4EB85D but
>>  got FDAC6132936C45D6E2EE855F9ABAE7769968CCE7.
>
> It seems that this captive portal captures TLS connections to the Tor
> network somehow. Given the attached logs, it's unclear to me if that
> happens before or after the Unsafe Browser has been shutdown and has
> restarted Tor.
>
> Cheers!
> _______________________________________________
> Tails-testers mailing list
> Tails-testers@???
> https://mailman.boum.org/listinfo/tails-testers
> To unsubscribe from this list, send an empty email to Tails-testers-unsubscribe@???.