Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Usage: fortune -P [-f] -a [xsz] Q: file [rKe9] -v6[+] file1 ...


computers / alt.privacy.anon-server / dizium gateway working with QSL if you see this

SubjectAuthor
* dizium gateway working with QSL if you see thisNomen Nescio
`* Re: dizium gateway working with QSL if you see thisNomen Nescio
 +* Re: dizium gateway working with QSL if you see thisMarkC
 |+- Re: dizium gateway working with QSL if you see thisD
 |+* Re: dizium gateway working with QSL if you see thisNomen Nescio
 ||`- Re: dizium gateway working with QSL if you see thisMarkC
 |+- Re: dizium gateway working with QSL if you see thisD
 |+- Re: dizium gateway working with QSL if you see thisD
 |+- Re: dizium gateway working with QSL if you see thisD
 |`* Re: dizium gateway working with QSL if you see thisFritz Wuehler
 | `* Re: dizium gateway working with QSL if you see thisMarkC
 |  `- Re: dizium gateway working with QSL if you see thisNomen Nescio
 +* Re: dizium gateway working with QSL if you see thisNomen Nescio
 |`- Re: dizium gateway working with QSL if you see thisNomen Nescio
 +* Re: dizium gateway working with QSL if you see thisAnonymous
 |`- Re: dizium gateway working with QSL if you see thisFritz Wuehler
 `* Re: dizium gateway working with QSL if you see thisNomen Nescio
  `* Re: dizium gateway working with QSL if you see thisSEC3
   `* Re: dizium gateway working with QSL if you see thisNomen Nescio
    +* Re: dizium gateway working with QSL if you see thisNomen Nescio
    |`- Re: dizium gateway working with QSL if you see thisParanoid Pete
    `* Re: dizium gateway working with QSL if you see thisSEC3
     +* Re: dizium gateway working with QSL if you see thisAnonymous
     |`* Re: dizium gateway working with QSL if you see thisFritz Wuehler
     | +- Re: dizium gateway working with QSL if you see thisD
     | `* Re: dizium gateway working with QSL if you see thisNomen Nescio
     |  `- Re: dizium gateway working with QSL if you see thisD
     `* Re: dizium gateway working with QSL if you see thisNomen Nescio
      `- Re: dizium gateway working with QSL if you see thisAnonymous

Pages:12
dizium gateway working with QSL if you see this

<9f333ac191594c973131d902d4b4ed25@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15052&group=alt.privacy.anon-server#15052

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
Subject: dizium gateway working with QSL if you see this
Message-ID: <9f333ac191594c973131d902d4b4ed25@dizum.com>
Date: Sat, 19 Aug 2023 00:32:03 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Fri, 18 Aug 2023 22:32 UTC

dizum gateway test

Template used:
Fcc: alt.privacy.anon-server
Host: tnet
From: anonymous@anonymous.com
Chain: *,*,dizum; copies=3;
To: mail2news@dizum.com
Newsgroups: alt.privacy.anon-server
Subject: dizium gateway working with QSL if you see this

Re: dizium gateway working with QSL if you see this

<958ce45c86de79f8aec2342012acb35f@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15055&group=alt.privacy.anon-server#15055

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
Subject: Re: dizium gateway working with QSL if you see this
Message-ID: <958ce45c86de79f8aec2342012acb35f@dizum.com>
Date: Sat, 19 Aug 2023 01:07:31 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Fri, 18 Aug 2023 23:07 UTC

On 8/18/2023 3:32 PM, Nomen Nescio wrote:

> dizum gateway test
>
> Template used:
> Fcc: alt.privacy.anon-server
> Host: tnet
> From: anonymous@anonymous.com
> Chain: *,*,dizum; copies=3;
> To: mail2news@dizum.com
ormation> Newsgroups: alt.privacy.anon-server
> Subject: dizium gateway working with QSL if you see this

That is helpful information.

Thanks for posting.

My template looks like so, and has been rock solid for me.

Fcc: outbox
Host: 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
From: anonymous@anonymous.com
Chain: *,*; copies=2;
To:
mail2news@dizum.com,mail2news@m2n.mixmin.net,mail2news@neodome.net
References:
Newsgroups: alt.privacy.anon-server
Subject:

Re: dizium gateway working with QSL if you see this

<so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15058&group=alt.privacy.anon-server#15058

  copy link   Newsgroups: alt.privacy.anon-server
From: Mar...@invalid.com
Newsgroups: alt.privacy.anon-server
Subject: Re: dizium gateway working with QSL if you see this
Date: Fri, 18 Aug 2023 19:06:27 -0500
Message-Id: <so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
References: <9f333ac191594c973131d902d4b4ed25@dizum.com> <958ce45c86de79f8aec2342012acb35f@dizum.com>
X-Newsreader: Forte Agent 1.93/32.576 English (American)
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Lines: 7
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!feeder.usenetexpress.com!tr3.iad1.usenetexpress.com!news.newsgroupdirect.com!not-for-mail
Nntp-Posting-Date: Sat, 19 Aug 2023 00:06:25 +0000
X-Received-Bytes: 815
X-Complaints-To: abuse@newsgroupdirect.com
Organization: NewsgroupDirect
 by: Mar...@invalid.com - Sat, 19 Aug 2023 00:06 UTC

On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
<nobody@dizum.com> wrote:

>3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion

What is that 'onion' stuff? How does it differ from a usual Host
entry?

Re: dizium gateway working with QSL if you see this

<7f6ae02dc1996ea8744d1fd7c55de86c@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15059&group=alt.privacy.anon-server#15059

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
Subject: Re: dizium gateway working with QSL if you see this
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
Message-ID: <7f6ae02dc1996ea8744d1fd7c55de86c@dizum.com>
Date: Sat, 19 Aug 2023 02:18:04 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Sat, 19 Aug 2023 00:18 UTC

In article <958ce45c86de79f8aec2342012acb35f@dizum.com>
Nomen Nescio <nobody@dizum.com> wrote:
>
> On 8/18/2023 3:32 PM, Nomen Nescio wrote:
>
> > dizum gateway test
> >
> > Template used:
> > Fcc: alt.privacy.anon-server
> > Host: tnet
> > From: anonymous@anonymous.com
> > Chain: *,*,dizum; copies=3;
> > To: mail2news@dizum.com
> ormation> Newsgroups: alt.privacy.anon-server
> > Subject: dizium gateway working with QSL if you see this
>
>
> That is helpful information.
>
> Thanks for posting.
>
> My template looks like so, and has been rock solid for me.
>
>
> Fcc: outbox
> Host: 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
> From: anonymous@anonymous.com
> Chain: *,*; copies=2;
> To:
> mail2news@dizum.com,mail2news@m2n.mixmin.net,mail2news@neodome.net
> References:
> Newsgroups: alt.privacy.anon-server
> Subject:

I figured I'd post this info because the high tech info in here
baffles the heck outta me. I figured I'd keep it simple.

So far my dizum and neodome gateway posts have shown up. My mixmin
gateway pody has not shown up yet.

Re: dizium gateway working with QSL if you see this

<d11a69aa556de5ada4ab02aba68094da@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15062&group=alt.privacy.anon-server#15062

  copy link   Newsgroups: alt.privacy.anon-server
From: J...@M (D)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
Subject: Re: dizium gateway working with QSL if you see this
Content-Transfer-Encoding: 7bit
Message-ID: <d11a69aa556de5ada4ab02aba68094da@dizum.com>
Date: Sat, 19 Aug 2023 03:23:34 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: D - Sat, 19 Aug 2023 01:23 UTC

On Fri, 18 Aug 2023 19:06:27 -0500, MarkC@invalid.com wrote:
>On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
><nobody@dizum.com> wrote:
>>3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>
>What is that 'onion' stuff? How does it differ from a usual Host
>entry?

see https://community.torproject.org/onion-services/
>How do Onion Services work?
>Learn how Onion Services work.
>https://community.torproject.org/onion-services/overview/
>Onion services are services that can only be accessed over Tor. Running
>an Onion Service gives your users all the security of HTTPS with the
>added privacy benefits of Tor Browser.
>Why Onion Services?
>Onion services offer various privacy and security benefits to their users.
>Location hiding
>An Onion Service's IP address is protected. Onion services are an overlay
>network on top of TCP/IP, so in some sense IP addresses are not even
>meaningful to Onion Services: they are not even used in the protocol.
>End-to-end authentication
>When a user visits a particular onion, they know that the content they
>are seeing can only come from that particular onion. No impersonation is
>possible, which is generally not the case. Usually, reaching a website
>does not mean that a man-in-the-middle did not reroute to some other
>location (e.g. DNS attacks).
>End-to-end encryption
>Onion service traffic is encrypted from the client to the onion host.
>This is like getting strong SSL/HTTPS for free.
>NAT punching
>Is your network filtered and you can't open ports on your firewall? This
>could happen if you are in a university campus, an office, an airport,
>or pretty much anywhere. Onion services don't need open ports because
>they punch through NAT. They only establish outgoing connections.
>The Onion Service Protocol: Overview
>Now the question becomes what kind of protocol is needed to achieve all
>these properties? Usually, people connect to an IP address and are done,
>but how can you connect to something that does not have an IP address?
>In particular, an Onion Service's address looks like this:
>vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion
>This looks weird and random because it's the identity public key of the
>Onion Service. That's one of the reasons we can achieve the security
>properties above.
>The Onion Service protocol uses the Tor network so that the client can
>introduce itself to the service, and then set up a rendezvous point with
>the service over the Tor network. Here is a detailed breakdown of how
>this happens:
>Act 1: Where the Onion Service sets up its introduction points
>Let's imagine that your local newspaper decides to set up an Onion
>Service (using SecureDrop) to receive anonymous tips. As the first step
>in the protocol, the Onion Service will contact a bunch of Tor relays
>and ask them to act as its introduction points by establishing long-term
>circuits to them. These circuits are anonymized circuits, so the server
>does not reveal the service location to the introduction points.
>The Onion Service will hide and protect itself behind the Tor network by
>only allowing access through three introduction points that it connects
>to through a two-hop Tor circuit.
>Act 2: Where the Onion Service publishes its descriptors
>Now that the introduction points are set up, we need to create a way for
>clients to be able to find them.
>For this reason, the Onion Service assembles an Onion Service descriptor,
>containing a list of its introduction points (and "authentication keys"),
>and signs this descriptor with the Onion Service's identity private key.
>The identity private key used here is the private part of the public key
>that is encoded in the Onion Service address.
>The Onion Service upload that signed descriptor to a distributed hash
>table, which is part of the Tor network, so that clients can also get it.
>It uses an anonymized Tor circuit to do this upload so that it does not
>reveal its location.
>Act 3: Where a client wants to visit the Onion Service
>Say you want to anonymously send some tax fraud data to your local
>newspaper through its SecureDrop. You find the onion address for the
>newspaper's SecureDrop from a public website or friend.
>Act 4: Where the client introduces itself to the Onion Service
>All the previous steps were just set up for the Onion Service so that
>it's reachable by clients. Now let's fast-forward to the point where an
>actual client wants to visit the service.
>In this case, the client has the onion address of SecureDrop and want
>to visit it, so they connect to the service with Tor Browser. Now the
>next thing that needs to happen is that the client goes to the
>distributed hash table from Step 2 and ask for the signed descriptor of
>SecureDrop's Onion Service.
>Act 5: Where the client verify onion address signature
>When the client receives the signed descriptor, they verify the
>signature of the descriptor using the public key that is encoded in the
>onion address. This provides the end-to-end authentication security
>property, since we are now sure that this descriptor could only be
>produced by that Onion Service and no one else.
>And inside the descriptor, there are the introduction points that allow
>the client to introduce themselves to SecureDrop's Onion Service.
>Act 6: Where the client establishes a rendezvous point
>Before the introduction takes place, the client (in this case, you)
>picks a Tor relay and establishes a circuit to it. The client asks the
>relay to become their rendezvous point and give it an "one-time secret"
>that will be used as part of the rendezvous procedure.
>Act 7: Where the Onion Service rendezvous with the client
>The introduction point passes your details (secret string and
>rendezvous address) on to the Onion Service, which runs multiple
>verification processes to decide whether you're trustworthy or not.
>Act 8: Where the rendezvous point verifies the client's secret
>The Onion Service connects to the rendezvous point (through an
>anonymized circuit) and sends the "one-time secret" to it. The
>rendezvous point makes one final verification to match the secret
>strings from you and service (the latter also comes from you but has
>been relayed through the service).
>The rendezvous point simply relays (end-to-end encrypted) messages
>from client to service and vice versa.
>Act 9: Where the Onion Service rendezvous with the client
>In general, the complete connection between client and Onion Service
>consists of 6 relays: 3 of them were picked by the client, with the
>third being the rendezvous point, and the other 3 were picked by the
>Onion Service. This provides location hiding to this connection.
>Finally, using the rendezvous point, a Tor circuit is formed between
>you and your newspaper's SecureDrop Onion Service.
>Further resources
>This was just a high-level overview of the Tor Onion Services
>protocol. Here are some more resources if you want to learn more:
> The Tor design paper describing the original design.
> The Tor v3 Onion Services protocol specification.
> Presentations about Onion Services: Understanding Tor Onion
>Services and Their Use Cases - HOPE XI 2016, DEF CON 25 - Roger
>Dingledine - Next Generation Tor Onion Services.
[end quote]

Tor Browser 12.5.2 (2023-8-2):
https://blog.torproject.org/new-release-tor-browser-1252/
https://www.torproject.org/
https://www.torproject.org/download/

Re: dizium gateway working with QSL if you see this

<29445bae9a222907f2ffebdafb18098c@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15067&group=alt.privacy.anon-server#15067

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
Subject: Re: dizium gateway working with QSL if you see this
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<7f6ae02dc1996ea8744d1fd7c55de86c@dizum.com>
Message-ID: <29445bae9a222907f2ffebdafb18098c@dizum.com>
Date: Sat, 19 Aug 2023 04:08:46 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Sat, 19 Aug 2023 02:08 UTC

In article <7f6ae02dc1996ea8744d1fd7c55de86c@dizum.com>
Nomen Nescio <nobody@dizum.com> wrote:
>
> In article <958ce45c86de79f8aec2342012acb35f@dizum.com>
> Nomen Nescio <nobody@dizum.com> wrote:
> >
> > On 8/18/2023 3:32 PM, Nomen Nescio wrote:
> >
> > > dizum gateway test
> > >
> > > Template used:
> > > Fcc: alt.privacy.anon-server
> > > Host: tnet
> > > From: anonymous@anonymous.com
> > > Chain: *,*,dizum; copies=3;
> > > To: mail2news@dizum.com
> > ormation> Newsgroups: alt.privacy.anon-server
> > > Subject: dizium gateway working with QSL if you see this
> >
> >
> > That is helpful information.
> >
> > Thanks for posting.
> >
> > My template looks like so, and has been rock solid for me.
> >
> >
> > Fcc: outbox
> > Host: 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
> > From: anonymous@anonymous.com
> > Chain: *,*; copies=2;
> > To:
> > mail2news@dizum.com,mail2news@m2n.mixmin.net,mail2news@neodome.net
> > References:
> > Newsgroups: alt.privacy.anon-server
> > Subject:
>
> I figured I'd post this info because the high tech info in here
> baffles the heck outta me. I figured I'd keep it simple.
>
> So far my dizum and neodome gateway posts have shown up. My mixmin
> gateway pody has not shown up yet.

In case you're wondering, 'pody' means post. :o(

Re: dizium gateway working with QSL if you see this

<7f431864b09d9ffd0875f8cffe25fce3@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15068&group=alt.privacy.anon-server#15068

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
References: <so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
Subject: Re: dizium gateway working with QSL if you see this
Message-ID: <7f431864b09d9ffd0875f8cffe25fce3@dizum.com>
Date: Sat, 19 Aug 2023 04:54:10 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Sat, 19 Aug 2023 02:54 UTC

On 8/18/2023 5:06 PM, MarkC@invalid.com wrote:

> On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
> <nobody@dizum.com> wrote:
>
>> 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>
> What is that 'onion' stuff? How does it differ from a usual Host
> entry?

Mark: 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion

This is Zax�s Tor Hidden Service address.

Many people send their remailer messages through Tor in order to
hide or obscure their IP address.

If you connect directly to a mail host, the mail host operator can
see your IP address.

Using a Tor hidden service improves your anonymity.

Re: dizium gateway working with QSL if you see this

<57a8d9261b2f4bdc8aca1c58a5a71e37@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15069&group=alt.privacy.anon-server#15069

  copy link   Newsgroups: alt.privacy.anon-server
From: J...@M (D)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
Subject: Re: dizium gateway working with QSL if you see this
Content-Transfer-Encoding: 7bit
Message-ID: <57a8d9261b2f4bdc8aca1c58a5a71e37@dizum.com>
Date: Sat, 19 Aug 2023 05:04:13 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.mixmin.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: D - Sat, 19 Aug 2023 03:04 UTC

On Fri, 18 Aug 2023 19:06:27 -0500, MarkC@invalid.com wrote:
>On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
><nobody@dizum.com> wrote:
>>3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>
>What is that 'onion' stuff? How does it differ from a usual Host
>entry?

p.s.
see https://www.danner-net.de/omom/tutortor.htm
>OmniMix * Tutorial * Tor PreviousTopNext
>Tor is a real-time onion-routing system, which thereby allows anonymous
>Internet communication without any delay. That makes it useful to hide
>your identity especially while surfing the web or using other services,
>that aren't available by mail. But the lack of latency on the other
>hand substantially increases the chances for an adversary. So for
>anonymous mailing setting up a free email account through Tor is only
>the second best solution.
>Nevertheless OmniMix enables you to benefit from Tor with various kinds
>of communication, which require immediate response, e.g. the retrieval
>of remailer statistics or a stealthy Mixmaster packet delivery to entry
>remailers. The program is preconfigured to run its own Tor instance and
>use that for every Internet connection it establishes. You have to read
>the 'Configuration' chapter only when problems arise or in case you're
>interested in what's going on 'under the hood'.
>But there are further services provided by OmniMix based on Tor, which
>you can read about in the 'TorPlus' chapter.
>Configuration
https://www.danner-net.de/omom/tutortorconfig.htm
>OmniMix * Tutorial * Tor * Configuration PreviousTopNext
>In order to hide your communication with the Mixmaster network, OmniMix
>has to bypass your ISP's mail server and connect directly to the entry
>remailer via the Tor network. Provided that Tor is installed on your
>system and running, activate the routing through Tor for the specific
>task by specifying the SOCKS protocol, which OmniMix has to use for the
>communication with Tor.
>E.g. to access the 'Anon Mail Host' by selecting SOCKS version 4, you
>have to enter the IP address of the remailer into the 'Host' field of
>the 'Anon Mail S(MTP)' tab, version 4a requires the host name, whereas
>with version 5 you have the choice. To access a hidden service, enter
>its name (ending with '.onion') as the remailer's host name. Since in
>this case Tor has to resolve a name, the protocol alternatives are only
>SOCKS version 4a and 5.
>Like Vidalia, the controller software that comes with Tor, OmniMix is
>capable of interacting with Tor in many ways, launching, remote
>controlling and shutting down the Tor instance it uses. That's what the
>options under the 'Tor' tab are designated for.
>There's always a risk that the Tor connections of different
>simultaneous tasks use the same routing up to the exit node, which may
>allow an adversary sitting there to figure out relations. Therefore,
>even if you already use Tor with your webbrowser, it's advisable to
>separate communication by running another instance for exclusive access
>by OmniMix, which is easy to achieve:
>At the 'Run' tab set the paths to Tor ('tor.exe') and its configuration
>file ('torrc'). With a 'Start' button click OmniMix launches that Tor
>executable and, with 'Autoconnect' at the 'Control' tab activated,
>establishes a connection with its control port. After clicking
>'Shutdown' OmniMix orders Tor to shut down, then closes the control
>port connection. To start and stop Tor automatically in conjunction
>with OmniMix itself activate 'Autostart' and 'Autoclose'.
>At least for your first experiments it can be wise to check the 'Tor
>Window' box, which opens a command window when starting Tor, showing
>the logged data and allowing to terminate the program by closing this
>window instead of having to end the 'tor.exe' process from within the
>Windows Task Manager. Finally when Tor runs and connects correctly
>uncheck the box to get rid of that window.
>With 'Check DNS' it's possible to recognize unsecure domain name
>resolutions, as it makes Tor generate a notice-level event for each
>connection to the SOCKS port, indicating whether the request uses a
>domain name or an IP address. Thereby it allows to detect the
>revelation of communication targets via unsecured DNS requests. If
>Tor gets an IP address it may have been resolved with a direct DNS
>server access bypassing the Tor gateway, which means that your target
>address has become public.
>A message like the following appearing in the Tor log therefore
>indicates, that everything is all right:
>17:01:25.062 650 NOTICE Your application (using socks5 to port 25)
>instructed Tor to take care of the DNS resolution itself if necessary.
>This is good.
>This option only takes effect with Tor instances newly launched by
>OmniMix.
>When Tor is started and a control port connection established the
>color of both Tor activity scales in the indicator field change from
>grey to yellow. If that doesn't happen first check whether a new
>'tor.exe' entry shows up in the Processes list of the Windows Task
>Manager. Furthermore look whether the paths to Tor and its
>configuration file are set correctly and whether SOCKS and control
>port through which Tor tries to communicate are available and not
>already occupied by another application.
>Setting 'Host', the address of the Tor instance, and 'Port', its
>SOCKS port, at the 'Config' tab is mandatory to allow OmniMix to
>route external connections with servers on the Internet through
>Tor's anonymizing SOCKS proxy service. The Tor SOCKS port number of
>the OmniMix system defaults to 9054, as 9050 and 9150 are usually
>occupied by a standard Tor installation resp. the Tor Browser. Shut
>down Tor before changing the port number.
>Using the 'Host' location from the 'Config' tab, the 'Port'
>parameter at the 'Control' tab is required to connect with Tor's
>control port in order to send commands and retrieve status data,
>which then are displayed at the 'Tor' list. The Tor control port
>number of the OmniMix system defaults to 9055, as 9051 and 9151 are
>usually occupied by a standard Tor installation resp. the Tor
>Browser. Shut down Tor before changing the port number.
>To protect Tor's control port from unauthorized access there are
>two authentication methods, both supported by OmniMix. Switching
>between them requires editing the 'torrc' configuration file
>manually.
>If you intend to control Tor from different computers, 'Password'
>authentication would be the right choice. At the 'ConTor' tab
>select 'Password' authentication and enter your password, e.g.
>'my_password'. Be aware, that leading and trailing spaces are
>relevant! Then at the command prompt within the Tor directory
>calculate the hash value for the chosen password with the command
>g:\Programs\OmniMix\tor>tor --hash-password my_password
>Oct 06 22:36:45.707 [notice] Tor v0.1.1.23. This is experimental
>software. Do not rely on it for strong anonymity.
>16:56DDB73813D8F525606245C49111696B791B87D7DCEFF575083DB78D31
>Finally, to enable Tor to check, whether the sent password is
>correct, add the 'HashedControlPassword' option with the
>resulting hash code to the 'torrc' file
>HashedControlPassword
>16:56DDB73813D8F525606245C49111696B791B87D7DCEFF575083DB78D31
>The alternative to a constant password would be the 'Cookie'
>authentication method, where at each launch Tor generates a file
>named 'control_auth_cookie' anew within its data directory
>containing 32 random bytes. Those bytes then have to be read by
>the controller application in order to use them for
>authentication. That's why apart from the activation of that
>method by adding
>CookieAuthentication 1
>to the 'torrc' file, the location of this file has to be set by
>means of the 'Cookie' file selector.
>Cookie authentication, which usually is limited to local
>controllers, as it requires access to a file in Tor's data
>folder, is the default method when using the OmniMix system's
>Tor instance.
>There are further torrc parameters relevant for anonymity
>reasons:
>*MaxCircuitDirtiness defines for how long (in seconds) Tor
> continues reusing a circuit for new
> connections.
> 'MaxCircuitDirtiness 0' makes Tor set
> up a new route for every connection
> request.
>*NewCircuitPeriod determines how often (in seconds) Tor
> retries making new circuits if current
> ones are dirty, which means already used.
>At the 'Command' tab you find all instruments to influence a running
>Tor instance, but for sending commands a connection to the control
>port of the respective Tor instance has to be established.
>At the 'Events' list select the data you want to be logged at the 'Tor'
>tab. If you're connected press 'Set' to transfer the new settings to
>Tor. With 'Off' no more data are listed. That's advisable in particular
>for the period you request certain data from Tor by selecting an item
>from the dropdown list and pressing the 'Info' button. Otherwise you'd
>get a mixture of Tor events and the specific data you requested.
>Once connected
>*Info requests the information specified by the pulldown menu
> adjacent to it.
>*NewNym initiates the switch to a clean server circuit. This is a
> secure way to use separate Tor circuits for different jobs
> that are done one after another.
>The available 'Info' data are
>*Version The version of the server's software, including the
> name of the software.
>*Config location The path to Tor's configuration file 'torrc' on your
> disc.
>*Network Status A short space-separated listing of all router
> identities.
>*Known Routers A detailed listing of all routers known to Tor and
> their characteristics.
>*IP Address The best guess at our external IP address.
>*Circuit Status Information about the circuits built.
>*Stream Status Information about the stream status.
>*Connection Status Information about the onion routing connection
> status.
>*Entry Guards Listing of the currently chosen entry guards.
>A smart way to access the OmniMix system at home from throughout the
>Internet are Tor Hidden Services. You don't have to know the server's
>IP address and the communication is completely hidden and end-to-end
>encrypted, as it never leaves the Tor network.
>The 'Hidden' tab allows to attach four local server ports, which don't
>necessarily have to be offered by OmniMix, to the Tor network, making
>them available from the Internet.
>For each of the local services you intend to offer you just have to
>check the 'Active' box, enter the port number under which it has to be
>accessed from the Internet at 'Port Ext', the local IP address of your
>service at 'Address Int' and its local port number at 'Port Int'. To
>install the Hidden Service Tor finally has to be restarted. It now
>initializes the Hidden Service by creating an encryption key associated
>with a random .onion address, the future address of your Hidden Service.
>These credentials are stored in the files 'hostname' and 'private_key',
>located in the folder defined in the 'Hidden Svc Dir' field. You may
>backup them in a safe place.
>Instead of reading your Hidden Service's .onion address directly from
>the 'hostname' file you can also get it from the 'Data' tab. With a
>click on 'Update' OmniMix not only requests the Hidden Service's address,
>which you can copy to the clipboard by using the '*' button. It also
>tries to retrieve Tor's current SOCKS and control port number as well as,
>if available, the WAN IP address of Tor's host computer. By the way, the
>latter offers OmniMix a great opportunity to replace external DDNS
>services, which is explained in the 'TorIP' chapter.
>If you want to change the .onion address because you don't like the
>randomly created term, or you need a new one for a different task, press
>the '-' button next to the 'HS Address' field and restart Tor. But keep
>in mind, only backing up the files 'hostname' and 'private_key' from the
>Hidden Service directory before they are removed with a reset allows you
>to reactivate the old address some day.
[end quote]


Click here to read the complete article
Re: dizium gateway working with QSL if you see this

<20230819.050858.f38280fe@remailer.frell.eu.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15070&group=alt.privacy.anon-server#15070

  copy link   Newsgroups: alt.privacy.anon-server
From: J...@M (D)
Message-Id: <20230819.050858.f38280fe@remailer.frell.eu.org>
Date: Sat, 19 Aug 2023 05:08:58 +0200
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
Subject: Re: dizium gateway working with QSL if you see this
Content-Transfer-Encoding: 7bit
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: D - Sat, 19 Aug 2023 03:08 UTC

On Fri, 18 Aug 2023 19:06:27 -0500, MarkC@invalid.com wrote:
>On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
><nobody@dizum.com> wrote:
>>3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>
>What is that 'onion' stuff? How does it differ from a usual Host
>entry?

see https://community.torproject.org/onion-services/
>How do Onion Services work?
>Learn how Onion Services work.
>https://community.torproject.org/onion-services/overview/
>Onion services are services that can only be accessed over Tor. Running
>an Onion Service gives your users all the security of HTTPS with the
>added privacy benefits of Tor Browser.
>Why Onion Services?
>Onion services offer various privacy and security benefits to their users.
>Location hiding
>An Onion Service's IP address is protected. Onion services are an overlay
>network on top of TCP/IP, so in some sense IP addresses are not even
>meaningful to Onion Services: they are not even used in the protocol.
>End-to-end authentication
>When a user visits a particular onion, they know that the content they
>are seeing can only come from that particular onion. No impersonation is
>possible, which is generally not the case. Usually, reaching a website
>does not mean that a man-in-the-middle did not reroute to some other
>location (e.g. DNS attacks).
>End-to-end encryption
>Onion service traffic is encrypted from the client to the onion host.
>This is like getting strong SSL/HTTPS for free.
>NAT punching
>Is your network filtered and you can't open ports on your firewall? This
>could happen if you are in a university campus, an office, an airport,
>or pretty much anywhere. Onion services don't need open ports because
>they punch through NAT. They only establish outgoing connections.
>The Onion Service Protocol: Overview
>Now the question becomes what kind of protocol is needed to achieve all
>these properties? Usually, people connect to an IP address and are done,
>but how can you connect to something that does not have an IP address?
>In particular, an Onion Service's address looks like this:
>vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion
>This looks weird and random because it's the identity public key of the
>Onion Service. That's one of the reasons we can achieve the security
>properties above.
>The Onion Service protocol uses the Tor network so that the client can
>introduce itself to the service, and then set up a rendezvous point with
>the service over the Tor network. Here is a detailed breakdown of how
>this happens:
>Act 1: Where the Onion Service sets up its introduction points
>Let's imagine that your local newspaper decides to set up an Onion
>Service (using SecureDrop) to receive anonymous tips. As the first step
>in the protocol, the Onion Service will contact a bunch of Tor relays
>and ask them to act as its introduction points by establishing long-term
>circuits to them. These circuits are anonymized circuits, so the server
>does not reveal the service location to the introduction points.
>The Onion Service will hide and protect itself behind the Tor network by
>only allowing access through three introduction points that it connects
>to through a two-hop Tor circuit.
>Act 2: Where the Onion Service publishes its descriptors
>Now that the introduction points are set up, we need to create a way for
>clients to be able to find them.
>For this reason, the Onion Service assembles an Onion Service descriptor,
>containing a list of its introduction points (and "authentication keys"),
>and signs this descriptor with the Onion Service's identity private key.
>The identity private key used here is the private part of the public key
>that is encoded in the Onion Service address.
>The Onion Service upload that signed descriptor to a distributed hash
>table, which is part of the Tor network, so that clients can also get it.
>It uses an anonymized Tor circuit to do this upload so that it does not
>reveal its location.
>Act 3: Where a client wants to visit the Onion Service
>Say you want to anonymously send some tax fraud data to your local
>newspaper through its SecureDrop. You find the onion address for the
>newspaper's SecureDrop from a public website or friend.
>Act 4: Where the client introduces itself to the Onion Service
>All the previous steps were just set up for the Onion Service so that
>it's reachable by clients. Now let's fast-forward to the point where an
>actual client wants to visit the service.
>In this case, the client has the onion address of SecureDrop and want
>to visit it, so they connect to the service with Tor Browser. Now the
>next thing that needs to happen is that the client goes to the
>distributed hash table from Step 2 and ask for the signed descriptor of
>SecureDrop's Onion Service.
>Act 5: Where the client verify onion address signature
>When the client receives the signed descriptor, they verify the
>signature of the descriptor using the public key that is encoded in the
>onion address. This provides the end-to-end authentication security
>property, since we are now sure that this descriptor could only be
>produced by that Onion Service and no one else.
>And inside the descriptor, there are the introduction points that allow
>the client to introduce themselves to SecureDrop's Onion Service.
>Act 6: Where the client establishes a rendezvous point
>Before the introduction takes place, the client (in this case, you)
>picks a Tor relay and establishes a circuit to it. The client asks the
>relay to become their rendezvous point and give it an "one-time secret"
>that will be used as part of the rendezvous procedure.
>Act 7: Where the Onion Service rendezvous with the client
>The introduction point passes your details (secret string and
>rendezvous address) on to the Onion Service, which runs multiple
>verification processes to decide whether you're trustworthy or not.
>Act 8: Where the rendezvous point verifies the client's secret
>The Onion Service connects to the rendezvous point (through an
>anonymized circuit) and sends the "one-time secret" to it. The
>rendezvous point makes one final verification to match the secret
>strings from you and service (the latter also comes from you but has
>been relayed through the service).
>The rendezvous point simply relays (end-to-end encrypted) messages
>from client to service and vice versa.
>Act 9: Where the Onion Service rendezvous with the client
>In general, the complete connection between client and Onion Service
>consists of 6 relays: 3 of them were picked by the client, with the
>third being the rendezvous point, and the other 3 were picked by the
>Onion Service. This provides location hiding to this connection.
>Finally, using the rendezvous point, a Tor circuit is formed between
>you and your newspaper's SecureDrop Onion Service.
>Further resources
>This was just a high-level overview of the Tor Onion Services
>protocol. Here are some more resources if you want to learn more:
> The Tor design paper describing the original design.
> The Tor v3 Onion Services protocol specification.
> Presentations about Onion Services: Understanding Tor Onion
>Services and Their Use Cases - HOPE XI 2016, DEF CON 25 - Roger
>Dingledine - Next Generation Tor Onion Services.
[end quote]

Tor Browser 12.5.2 (2023-8-2):
https://blog.torproject.org/new-release-tor-browser-1252/
https://www.torproject.org/
https://www.torproject.org/download/

Re: dizium gateway working with QSL if you see this

<d5d0eitrnd74etomodctv2rn06vrakc4r9@4ax.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15072&group=alt.privacy.anon-server#15072

  copy link   Newsgroups: alt.privacy.anon-server
From: Mar...@invalid.com
Newsgroups: alt.privacy.anon-server
Subject: Re: dizium gateway working with QSL if you see this
Date: Fri, 18 Aug 2023 22:21:47 -0500
Message-Id: <d5d0eitrnd74etomodctv2rn06vrakc4r9@4ax.com>
References: <so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com> <7f431864b09d9ffd0875f8cffe25fce3@dizum.com>
X-Newsreader: Forte Agent 1.93/32.576 English (American)
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 8bit
Lines: 29
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!feeder.usenetexpress.com!tr2.iad1.usenetexpress.com!news.newsgroupdirect.com!not-for-mail
Nntp-Posting-Date: Sat, 19 Aug 2023 03:21:44 +0000
X-Received-Bytes: 1391
Organization: NewsgroupDirect
X-Complaints-To: abuse@newsgroupdirect.com
 by: Mar...@invalid.com - Sat, 19 Aug 2023 03:21 UTC

On Sat, 19 Aug 2023 04:54:10 +0200 (CEST), Nomen Nescio
<nobody@dizum.com> wrote:

>On 8/18/2023 5:06 PM, MarkC@invalid.com wrote:
>
>> On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
>> <nobody@dizum.com> wrote:
>>
>>> 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>>
>> What is that 'onion' stuff? How does it differ from a usual Host
>> entry?
>
>
>Mark: 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>
>This is Zax’s Tor Hidden Service address.
>
>Many people send their remailer messages through Tor in order to
>hide or obscure their IP address.
>
>If you connect directly to a mail host, the mail host operator can
>see your IP address.
>
>Using a Tor hidden service improves your anonymity.

That's nice to know.

Thanks!

Re: dizium gateway working with QSL if you see this

<20230819.104739.f14f83d8@remailer.frell.eu.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15075&group=alt.privacy.anon-server#15075

  copy link   Newsgroups: alt.privacy.anon-server
From: J...@M (D)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
Subject: Re: dizium gateway working with QSL if you see this
Content-Transfer-Encoding: 7bit
Message-Id: <20230819.104739.f14f83d8@remailer.frell.eu.org>
Date: Sat, 19 Aug 2023 10:47:39 +0200
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: D - Sat, 19 Aug 2023 08:47 UTC

On Fri, 18 Aug 2023 19:06:27 -0500, MarkC@invalid.com wrote:
>On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
><nobody@dizum.com> wrote:
>>3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>
>What is that 'onion' stuff? How does it differ from a usual Host
>entry?

p.s.
see https://www.danner-net.de/omom/tutortor.htm
>OmniMix * Tutorial * Tor PreviousTopNext
>Tor is a real-time onion-routing system, which thereby allows anonymous
>Internet communication without any delay. That makes it useful to hide
>your identity especially while surfing the web or using other services,
>that aren't available by mail. But the lack of latency on the other
>hand substantially increases the chances for an adversary. So for
>anonymous mailing setting up a free email account through Tor is only
>the second best solution.
>Nevertheless OmniMix enables you to benefit from Tor with various kinds
>of communication, which require immediate response, e.g. the retrieval
>of remailer statistics or a stealthy Mixmaster packet delivery to entry
>remailers. The program is preconfigured to run its own Tor instance and
>use that for every Internet connection it establishes. You have to read
>the 'Configuration' chapter only when problems arise or in case you're
>interested in what's going on 'under the hood'.
>But there are further services provided by OmniMix based on Tor, which
>you can read about in the 'TorPlus' chapter.
>Configuration
https://www.danner-net.de/omom/tutortorconfig.htm
>OmniMix * Tutorial * Tor * Configuration PreviousTopNext
>In order to hide your communication with the Mixmaster network, OmniMix
>has to bypass your ISP's mail server and connect directly to the entry
>remailer via the Tor network. Provided that Tor is installed on your
>system and running, activate the routing through Tor for the specific
>task by specifying the SOCKS protocol, which OmniMix has to use for the
>communication with Tor.
>E.g. to access the 'Anon Mail Host' by selecting SOCKS version 4, you
>have to enter the IP address of the remailer into the 'Host' field of
>the 'Anon Mail S(MTP)' tab, version 4a requires the host name, whereas
>with version 5 you have the choice. To access a hidden service, enter
>its name (ending with '.onion') as the remailer's host name. Since in
>this case Tor has to resolve a name, the protocol alternatives are only
>SOCKS version 4a and 5.
>Like Vidalia, the controller software that comes with Tor, OmniMix is
>capable of interacting with Tor in many ways, launching, remote
>controlling and shutting down the Tor instance it uses. That's what the
>options under the 'Tor' tab are designated for.
>There's always a risk that the Tor connections of different
>simultaneous tasks use the same routing up to the exit node, which may
>allow an adversary sitting there to figure out relations. Therefore,
>even if you already use Tor with your webbrowser, it's advisable to
>separate communication by running another instance for exclusive access
>by OmniMix, which is easy to achieve:
>At the 'Run' tab set the paths to Tor ('tor.exe') and its configuration
>file ('torrc'). With a 'Start' button click OmniMix launches that Tor
>executable and, with 'Autoconnect' at the 'Control' tab activated,
>establishes a connection with its control port. After clicking
>'Shutdown' OmniMix orders Tor to shut down, then closes the control
>port connection. To start and stop Tor automatically in conjunction
>with OmniMix itself activate 'Autostart' and 'Autoclose'.
>At least for your first experiments it can be wise to check the 'Tor
>Window' box, which opens a command window when starting Tor, showing
>the logged data and allowing to terminate the program by closing this
>window instead of having to end the 'tor.exe' process from within the
>Windows Task Manager. Finally when Tor runs and connects correctly
>uncheck the box to get rid of that window.
>With 'Check DNS' it's possible to recognize unsecure domain name
>resolutions, as it makes Tor generate a notice-level event for each
>connection to the SOCKS port, indicating whether the request uses a
>domain name or an IP address. Thereby it allows to detect the
>revelation of communication targets via unsecured DNS requests. If
>Tor gets an IP address it may have been resolved with a direct DNS
>server access bypassing the Tor gateway, which means that your target
>address has become public.
>A message like the following appearing in the Tor log therefore
>indicates, that everything is all right:
>17:01:25.062 650 NOTICE Your application (using socks5 to port 25)
>instructed Tor to take care of the DNS resolution itself if necessary.
>This is good.
>This option only takes effect with Tor instances newly launched by
>OmniMix.
>When Tor is started and a control port connection established the
>color of both Tor activity scales in the indicator field change from
>grey to yellow. If that doesn't happen first check whether a new
>'tor.exe' entry shows up in the Processes list of the Windows Task
>Manager. Furthermore look whether the paths to Tor and its
>configuration file are set correctly and whether SOCKS and control
>port through which Tor tries to communicate are available and not
>already occupied by another application.
>Setting 'Host', the address of the Tor instance, and 'Port', its
>SOCKS port, at the 'Config' tab is mandatory to allow OmniMix to
>route external connections with servers on the Internet through
>Tor's anonymizing SOCKS proxy service. The Tor SOCKS port number of
>the OmniMix system defaults to 9054, as 9050 and 9150 are usually
>occupied by a standard Tor installation resp. the Tor Browser. Shut
>down Tor before changing the port number.
>Using the 'Host' location from the 'Config' tab, the 'Port'
>parameter at the 'Control' tab is required to connect with Tor's
>control port in order to send commands and retrieve status data,
>which then are displayed at the 'Tor' list. The Tor control port
>number of the OmniMix system defaults to 9055, as 9051 and 9151 are
>usually occupied by a standard Tor installation resp. the Tor
>Browser. Shut down Tor before changing the port number.
>To protect Tor's control port from unauthorized access there are
>two authentication methods, both supported by OmniMix. Switching
>between them requires editing the 'torrc' configuration file
>manually.
>If you intend to control Tor from different computers, 'Password'
>authentication would be the right choice. At the 'ConTor' tab
>select 'Password' authentication and enter your password, e.g.
>'my_password'. Be aware, that leading and trailing spaces are
>relevant! Then at the command prompt within the Tor directory
>calculate the hash value for the chosen password with the command
>g:\Programs\OmniMix\tor>tor --hash-password my_password
>Oct 06 22:36:45.707 [notice] Tor v0.1.1.23. This is experimental
>software. Do not rely on it for strong anonymity.
>16:56DDB73813D8F525606245C49111696B791B87D7DCEFF575083DB78D31
>Finally, to enable Tor to check, whether the sent password is
>correct, add the 'HashedControlPassword' option with the
>resulting hash code to the 'torrc' file
>HashedControlPassword
>16:56DDB73813D8F525606245C49111696B791B87D7DCEFF575083DB78D31
>The alternative to a constant password would be the 'Cookie'
>authentication method, where at each launch Tor generates a file
>named 'control_auth_cookie' anew within its data directory
>containing 32 random bytes. Those bytes then have to be read by
>the controller application in order to use them for
>authentication. That's why apart from the activation of that
>method by adding
>CookieAuthentication 1
>to the 'torrc' file, the location of this file has to be set by
>means of the 'Cookie' file selector.
>Cookie authentication, which usually is limited to local
>controllers, as it requires access to a file in Tor's data
>folder, is the default method when using the OmniMix system's
>Tor instance.
>There are further torrc parameters relevant for anonymity
>reasons:
>*MaxCircuitDirtiness defines for how long (in seconds) Tor
> continues reusing a circuit for new
> connections.
> 'MaxCircuitDirtiness 0' makes Tor set
> up a new route for every connection
> request.
>*NewCircuitPeriod determines how often (in seconds) Tor
> retries making new circuits if current
> ones are dirty, which means already used.
>At the 'Command' tab you find all instruments to influence a running
>Tor instance, but for sending commands a connection to the control
>port of the respective Tor instance has to be established.
>At the 'Events' list select the data you want to be logged at the 'Tor'
>tab. If you're connected press 'Set' to transfer the new settings to
>Tor. With 'Off' no more data are listed. That's advisable in particular
>for the period you request certain data from Tor by selecting an item
>from the dropdown list and pressing the 'Info' button. Otherwise you'd
>get a mixture of Tor events and the specific data you requested.
>Once connected
>*Info requests the information specified by the pulldown menu
> adjacent to it.
>*NewNym initiates the switch to a clean server circuit. This is a
> secure way to use separate Tor circuits for different jobs
> that are done one after another.
>The available 'Info' data are
>*Version The version of the server's software, including the
> name of the software.
>*Config location The path to Tor's configuration file 'torrc' on your
> disc.
>*Network Status A short space-separated listing of all router
> identities.
>*Known Routers A detailed listing of all routers known to Tor and
> their characteristics.
>*IP Address The best guess at our external IP address.
>*Circuit Status Information about the circuits built.
>*Stream Status Information about the stream status.
>*Connection Status Information about the onion routing connection
> status.
>*Entry Guards Listing of the currently chosen entry guards.
>A smart way to access the OmniMix system at home from throughout the
>Internet are Tor Hidden Services. You don't have to know the server's
>IP address and the communication is completely hidden and end-to-end
>encrypted, as it never leaves the Tor network.
>The 'Hidden' tab allows to attach four local server ports, which don't
>necessarily have to be offered by OmniMix, to the Tor network, making
>them available from the Internet.
>For each of the local services you intend to offer you just have to
>check the 'Active' box, enter the port number under which it has to be
>accessed from the Internet at 'Port Ext', the local IP address of your
>service at 'Address Int' and its local port number at 'Port Int'. To
>install the Hidden Service Tor finally has to be restarted. It now
>initializes the Hidden Service by creating an encryption key associated
>with a random .onion address, the future address of your Hidden Service.
>These credentials are stored in the files 'hostname' and 'private_key',
>located in the folder defined in the 'Hidden Svc Dir' field. You may
>backup them in a safe place.
>Instead of reading your Hidden Service's .onion address directly from
>the 'hostname' file you can also get it from the 'Data' tab. With a
>click on 'Update' OmniMix not only requests the Hidden Service's address,
>which you can copy to the clipboard by using the '*' button. It also
>tries to retrieve Tor's current SOCKS and control port number as well as,
>if available, the WAN IP address of Tor's host computer. By the way, the
>latter offers OmniMix a great opportunity to replace external DDNS
>services, which is explained in the 'TorIP' chapter.
>If you want to change the .onion address because you don't like the
>randomly created term, or you need a new one for a different task, press
>the '-' button next to the 'HS Address' field and restart Tor. But keep
>in mind, only backing up the files 'hostname' and 'private_key' from the
>Hidden Service directory before they are removed with a reset allows you
>to reactivate the old address some day.
[end quote]


Click here to read the complete article
Re: dizium gateway working with QSL if you see this

<cc5bf276081eb3176c3fb0c8ded249a1@msgid.frell.theremailer.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15077&group=alt.privacy.anon-server#15077

  copy link   Newsgroups: alt.privacy.anon-server
From: fri...@spamexpire-202308.rodent.frell.theremailer.net (Fritz Wuehler)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
Subject: Re: dizium gateway working with QSL if you see this
Message-ID: <cc5bf276081eb3176c3fb0c8ded249a1@msgid.frell.theremailer.net>
Date: Sat, 19 Aug 2023 14:09:41 +0200
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Fritz Wuehler - Sat, 19 Aug 2023 12:09 UTC

In article <so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
MarkC@invalid.com wrote:
>
> On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
> <nobody@dizum.com> wrote:
>
> >3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>
> What is that 'onion' stuff? How does it differ from a usual Host
> entry?

Use with Tor proxy connection

Host:
3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion

Re: dizium gateway working with QSL if you see this

<7tm1ei9drvhuuaa02cu48iqs1d403sochp@4ax.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15078&group=alt.privacy.anon-server#15078

  copy link   Newsgroups: alt.privacy.anon-server
From: Mar...@invalid.com
Newsgroups: alt.privacy.anon-server
Subject: Re: dizium gateway working with QSL if you see this
Date: Sat, 19 Aug 2023 10:19:07 -0500
Message-Id: <7tm1ei9drvhuuaa02cu48iqs1d403sochp@4ax.com>
References: <9f333ac191594c973131d902d4b4ed25@dizum.com> <958ce45c86de79f8aec2342012acb35f@dizum.com> <so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com> <cc5bf276081eb3176c3fb0c8ded249a1@msgid.frell.theremailer.net>
X-Newsreader: Forte Agent 1.93/32.576 English (American)
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Lines: 26
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!feeder.usenetexpress.com!tr1.iad1.usenetexpress.com!news.newsgroupdirect.com!not-for-mail
Nntp-Posting-Date: Sat, 19 Aug 2023 15:19:05 +0000
X-Received-Bytes: 1486
Organization: NewsgroupDirect
X-Complaints-To: abuse@newsgroupdirect.com
 by: Mar...@invalid.com - Sat, 19 Aug 2023 15:19 UTC

On Sat, 19 Aug 2023 14:09:41 +0200, Fritz Wuehler
<fritz@spamexpire-202308.rodent.frell.theremailer.net> wrote:

>In article <so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
>MarkC@invalid.com wrote:
>>
>> On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
>> <nobody@dizum.com> wrote:
>>
>> >3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>>
>> What is that 'onion' stuff? How does it differ from a usual Host
>> entry?
>
>Use with Tor proxy connection
>
>Host:
>3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion

Somebody else already filled me in on that, but it later occured to me
that no one has mentioned a necessary port or TSL /SSL stuff.

My other Hosts have that info. Don't I need the same info for this
onion one?

??

Re: dizium gateway working with QSL if you see this

<e3132c6f27389d56537ed99a78512708@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15083&group=alt.privacy.anon-server#15083

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
<cc5bf276081eb3176c3fb0c8ded249a1@msgid.frell.theremailer.net>
<7tm1ei9drvhuuaa02cu48iqs1d403sochp@4ax.com>
Subject: Re: dizium gateway working with QSL if you see this
Message-ID: <e3132c6f27389d56537ed99a78512708@dizum.com>
Date: Sun, 20 Aug 2023 01:40:30 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Sat, 19 Aug 2023 23:40 UTC

In article <7tm1ei9drvhuuaa02cu48iqs1d403sochp@4ax.com>
MarkC@invalid.com wrote:
>
> On Sat, 19 Aug 2023 14:09:41 +0200, Fritz Wuehler
> <fritz@spamexpire-202308.rodent.frell.theremailer.net> wrote:
>
> >In article <so10eidq9su34f4ucrnu0hrkln4sm2803b@4ax.com>
> >MarkC@invalid.com wrote:
> >>
> >> On Sat, 19 Aug 2023 01:07:31 +0200 (CEST), Nomen Nescio
> >> <nobody@dizum.com> wrote:
> >>
> >> >3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
> >>
> >> What is that 'onion' stuff? How does it differ from a usual Host
> >> entry?
> >
> >Use with Tor proxy connection
> >
> >Host:
> >3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
>
> Somebody else already filled me in on that, but it later occured to me
> that no one has mentioned a necessary port or TSL /SSL stuff.
>
> My other Hosts have that info. Don't I need the same info for this
> onion one?
>
> ??

If you're already using a Tor proxy, the port number will be the
same for this one.

There are any number of Tor Proxy solution available, each use
different listener ports. Tor browser at various releases
listens on the ports below for example.

127.0.0.1:9050
127.0.0.1:9150

Re: dizium gateway working with QSL if you see this

<6d9040be44a5ea5705539f076288d65c@remailer.paranoici.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15109&group=alt.privacy.anon-server#15109

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@remailer.paranoici.org (Anonymous)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
Subject: Re: dizium gateway working with QSL if you see this
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Message-ID: <6d9040be44a5ea5705539f076288d65c@remailer.paranoici.org>
Date: Tue, 22 Aug 2023 19:29:57 +0000 (UTC)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Anonymous - Tue, 22 Aug 2023 19:29 UTC

>
> Thanks for posting.
>
> My template looks like so, and has been rock solid for me.
>

I tried your template and I obrain this error

Sending mixmaster packet 1 of 4
Proxy: none
Connecting to
3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25
ERROR: 11001 Host not found
Error at Session Connected
ERROR: 11001 Host not found
Error at Session Closed
Connection closed!
Failed

0 in message queue
1 in problem queue
0 sent

ERROR: 11001 Host not found
Error at Request Done

Re: dizium gateway working with QSL if you see this

<6d9040be44a5ea5705539f076288d65c@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15110&group=alt.privacy.anon-server#15110

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
Subject: Re: dizium gateway working with QSL if you see this
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Message-ID: <6d9040be44a5ea5705539f076288d65c@dizum.com>
Date: Tue, 22 Aug 2023 21:51:49 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Tue, 22 Aug 2023 19:51 UTC

>
> Thanks for posting.
>
> My template looks like so, and has been rock solid for me.
>

I tried your template and I obrain this error

Sending mixmaster packet 1 of 4
Proxy: none
Connecting to
3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25
ERROR: 11001 Host not found
Error at Session Connected
ERROR: 11001 Host not found
Error at Session Closed
Connection closed!
Failed

0 in message queue
1 in problem queue
0 sent

ERROR: 11001 Host not found
Error at Request Done

Re: dizium gateway working with QSL if you see this

<JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15112&group=alt.privacy.anon-server#15112

  copy link   Newsgroups: alt.privacy.anon-server
Date: Tue, 22 Aug 23 21:21:50 UTC
Mime-Version: 1.0
X-Ufhash: k0Fb8TWYSWCnNH7v8zzdutunzi4mJ%2FzgTa7mg60SMe0WrsDeQQ%2BKkHyisCU0D6oiDD5WjTEI8RseQJQiStGopTfhxQYisqic7Z52AlptqA%2B4wz95TMNWdElFu9XWM9YWoEaadzarl%2F8MRltAkyKiJAPNOPVFRFhBK7qWUjq6JQ%2Ffl1vdoTncvZL52m21vU2WigLHk%2FtWfP76EH0wlG215%2FRMCU0nujU%3D
Message-Id: <JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm>
References: <9f333ac191594c973131d902d4b4ed25@dizum.com> <958ce45c86de79f8aec2342012acb35f@dizum.com> <6d9040be44a5ea5705539f076288d65c@dizum.com>
Content-Language: en-US
From: adm...@sec3.net (SEC3)
In-Reply-To: <6d9040be44a5ea5705539f076288d65c@dizum.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Organization: Usenet.Farm
User-Agent: Mozilla Thunderbird
Subject: Re: dizium gateway working with QSL if you see this
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!3.eu.feeder.erje.net!feeder.erje.net!news-1.dfn.de!news.dfn.de!npeer.as286.net!npeer-ng0.as286.net!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!feeder4.usenet.farm!feed.usenet.farm!news.usenet.farm
X-Received-Bytes: 1785
 by: SEC3 - Tue, 22 Aug 2023 21:21 UTC

On 8/22/23 15:51, Nomen Nescio wrote:

> I tried your template and I obrain this error
>
>
> Sending mixmaster packet 1 of 4
> Proxy: none
> Connecting to
3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25
> ERROR: 11001 Host not found
> Error at Session Connected
> ERROR: 11001 Host not found
> Error at Session Closed
> Connection closed!
> Failed

"Proxy: none" indicates that you haven't configured QSL to use Tor.

Click on Tools | Proxies | new

and fill it out like this:

<https://www.sec3.net/misc/QSL_proxy.png>

Now try to send a message again. But this time choose "SMTP-onion" from
the Proxy dropdown box.

--
SEC3

YAMN Help Tutorial - https://www.sec3.net/yamnhelp/

Re: dizium gateway working with QSL if you see this

<d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15113&group=alt.privacy.anon-server#15113

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<6d9040be44a5ea5705539f076288d65c@dizum.com>
<JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm>
Subject: Re: dizium gateway working with QSL if you see this
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Message-ID: <d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
Date: Wed, 23 Aug 2023 00:17:35 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Tue, 22 Aug 2023 22:17 UTC

>
> "Proxy: none" indicates that you haven't configured QSL to use Tor.
>
> Click on Tools | Proxies | new
>
> and fill it out like this:
>
> <https://www.sec3.net/misc/QSL_proxy.png>
>
> Now try to send a message again. But this time choose "SMTP-onion" from the
> Proxy dropdown box.

Thank You. Something changed, but I obtain an error:

Sending mixmaster packet 1 of 2
Proxy: SMTP-onion
Connecting to
3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25
Connection closed!
ERROR: 10061 Connection refused
Error at Request Done
Failed

0 in message queue
1 in problem queue
0 sent

Re: dizium gateway working with QSL if you see this

<8cef9ff9f8acfba258893de0a8704eaa@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15115&group=alt.privacy.anon-server#15115

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@dizum.com (Nomen Nescio)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<6d9040be44a5ea5705539f076288d65c@dizum.com>
<JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm>
<d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
Subject: Re: dizium gateway working with QSL if you see this
Message-ID: <8cef9ff9f8acfba258893de0a8704eaa@dizum.com>
Date: Wed, 23 Aug 2023 04:13:15 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Nomen Nescio - Wed, 23 Aug 2023 02:13 UTC

In article <d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
Nomen Nescio <nobody@dizum.com> wrote:
>
> >
> > "Proxy: none" indicates that you haven't configured QSL to use Tor.
> >
> > Click on Tools | Proxies | new
> >
> > and fill it out like this:
> >
> > <https://www.sec3.net/misc/QSL_proxy.png>
> >
> > Now try to send a message again. But this time choose "SMTP-onion" from the
> > Proxy dropdown box.
>
> Thank You. Something changed, but I obtain an error:
>
> Sending mixmaster packet 1 of 2
> Proxy: SMTP-onion
> Connecting to
> 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25
> Connection closed!
> ERROR: 10061 Connection refused
> Error at Request Done
> Failed
>
> 0 in message queue
> 1 in problem queue
> 0 sent

Try b42o7yhesx3fon7bzak4rkq7ax2yoanzapykqpzyznil6obcybe3zlyd.onion

Re: dizium gateway working with QSL if you see this

<NMlReUipUMrDKbZMNJtSYpvgdyOMDJie@news.usenet.farm>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15116&group=alt.privacy.anon-server#15116

  copy link   Newsgroups: alt.privacy.anon-server
Mime-Version: 1.0
References: <9f333ac191594c973131d902d4b4ed25@dizum.com> <958ce45c86de79f8aec2342012acb35f@dizum.com> <6d9040be44a5ea5705539f076288d65c@dizum.com> <JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm> <d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
In-Reply-To: <d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
Content-Transfer-Encoding: 7bit
X-Ufhash: CbyNBK%2BCLsasDiKYmm%2B9QC4nu%2FgF3bRjfs0iBmV2LmLUr5rG9SSu9eoUJ7I4IRqLkGgC2V3tF67A%2FIGxmmvN91GO3egdCExKx8oQoGY%2BZ64VARwNgnAzqeJZbzCSUzdjALASoVp4z6H1AZxcps0K%2B6ENMn1hZK1eQ%2F5mxszXlKkDAE1L6Jfqi%2FX50OXMQJwNyJsxgM3gefdRHvOlI7dh2MITehnEI%2FA%3D
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!newsreader4.netcologne.de!news.netcologne.de!peer03.ams1!peer.ams1.xlned.com!news.xlned.com!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!feeder3.usenet.farm!feeder4.usenet.farm!feed.usenet.farm!news.usenet.farm
Subject: Re: dizium gateway working with QSL if you see this
Newsgroups: alt.privacy.anon-server
Message-Id: <NMlReUipUMrDKbZMNJtSYpvgdyOMDJie@news.usenet.farm>
Organization: Usenet.Farm
Date: Wed, 23 Aug 23 03:07:11 UTC
User-Agent: Mozilla Thunderbird
Content-Language: en-US
From: adm...@sec3.net (SEC3)
Content-Type: text/plain; charset=UTF-8; format=flowed
X-Received-Bytes: 2117
 by: SEC3 - Wed, 23 Aug 2023 03:07 UTC

On 8/22/23 18:17, Nomen Nescio wrote:
>>
>> "Proxy: none" indicates that you haven't configured QSL to use Tor.
>>
>> Click on Tools | Proxies | new
>>
>> and fill it out like this:
>>
>> <https://www.sec3.net/misc/QSL_proxy.png>
>>
>> Now try to send a message again. But this time choose "SMTP-onion"
>> from the Proxy dropdown box.
>
> Thank You. Something changed, but I obtain an error:
>
> Sending mixmaster packet 1 of 2
> Proxy: SMTP-onion
> Connecting to
> 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25
> Connection closed!
> ERROR: 10061 Connection refused
> Error at Request Done
> Failed
>
> 0 in message queue
> 1 in problem queue
> 0 sent
>

Hmmm. Have you downloaded and installed Tor?
<https://www.torproject.org/download/>

To interface with Tor, QSL expects users to already have Tor running in
the background.

--
SEC3

YAMN Help Tutorial - https://www.sec3.net/yamnhelp/

Re: dizium gateway working with QSL if you see this

<1be7028bf91d0a7394f1dacd42c37f83@remailer.paranoici.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15117&group=alt.privacy.anon-server#15117

  copy link   Newsgroups: alt.privacy.anon-server
From: nob...@remailer.paranoici.org (Anonymous)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<6d9040be44a5ea5705539f076288d65c@dizum.com>
<JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm>
<d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
<NMlReUipUMrDKbZMNJtSYpvgdyOMDJie@news.usenet.farm>
Subject: Re: dizium gateway working with QSL if you see this
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Message-ID: <1be7028bf91d0a7394f1dacd42c37f83@remailer.paranoici.org>
Date: Wed, 23 Aug 2023 08:10:37 +0000 (UTC)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Anonymous - Wed, 23 Aug 2023 08:10 UTC

>
> Hmmm. Have you downloaded and installed Tor?
> <https://www.torproject.org/download/>
>
> To interface with Tor, QSL expects users to already have Tor running in the
> background.

I am executing both Tor Browser and Omnimix, when I use QSL
using this template

Fcc: outbox
Host: 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
From: anonymous@anonymous.com
Chain: *,*; copies=2;
To: mail2news@dizum.com, mail2news@neodome.net
Newsgroups: alt.test
Subject: test

having tor browser and omnimix in execution is it not sufficient?

Re: dizium gateway working with QSL if you see this

<2c5de6eab9daf03c38a5b7ebf5ffc6e6@msgid.frell.theremailer.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15118&group=alt.privacy.anon-server#15118

  copy link   Newsgroups: alt.privacy.anon-server
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<6d9040be44a5ea5705539f076288d65c@dizum.com>
<JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm>
<d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
<8cef9ff9f8acfba258893de0a8704eaa@dizum.com>
From: Paranoid...@hidden.invalid (Paranoid Pete)
Subject: Re: dizium gateway working with QSL if you see this
Message-ID: <2c5de6eab9daf03c38a5b7ebf5ffc6e6@msgid.frell.theremailer.net>
Date: Wed, 23 Aug 2023 11:05:44 +0200
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Paranoid Pete - Wed, 23 Aug 2023 09:05 UTC

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

In article <8cef9ff9f8acfba258893de0a8704eaa@dizum.com>
Nomen Nescio <nobody@dizum.com> wrote:
>
> In article <d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
> Nomen Nescio <nobody@dizum.com> wrote:
> >
> > >
> > > "Proxy: none" indicates that you haven't configured QSL to use Tor.
> > >
> > > Click on Tools | Proxies | new
> > >
> > > and fill it out like this:
> > >
> > > <https://www.sec3.net/misc/QSL_proxy.png>
> > >
> > > Now try to send a message again. But this time choose "SMTP-onion" from the
> > > Proxy dropdown box.
> >
> > Thank You. Something changed, but I obtain an error:
> >
> > Sending mixmaster packet 1 of 2
> > Proxy: SMTP-onion
> > Connecting to
> > 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25
> > Connection closed!
> > ERROR: 10061 Connection refused
> > Error at Request Done
> > Failed
> >
> > 0 in message queue
> > 1 in problem queue
> > 0 sent
>
> Try b42o7yhesx3fon7bzak4rkq7ax2yoanzapykqpzyznil6obcybe3zlyd.onion

That worked! Thanks a lot.

Paranoid Pete

-----BEGIN PGP SIGNATURE-----
Version: N/A
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=Jm2d
-----END PGP SIGNATURE-----

Re: dizium gateway working with QSL if you see this

<a49dff2040dd87c5fe5024f78a94b089@msgid.frell.theremailer.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15121&group=alt.privacy.anon-server#15121

  copy link   Newsgroups: alt.privacy.anon-server
From: fri...@spamexpire-202308.rodent.frell.theremailer.net (Fritz Wuehler)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<6d9040be44a5ea5705539f076288d65c@remailer.paranoici.org>
Subject: Re: dizium gateway working with QSL if you see this
Message-ID: <a49dff2040dd87c5fe5024f78a94b089@msgid.frell.theremailer.net>
Date: Wed, 23 Aug 2023 19:11:35 +0200
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Fritz Wuehler - Wed, 23 Aug 2023 17:11 UTC

In article
<6d9040be44a5ea5705539f076288d65c@remailer.paranoici.org>
Anonymous <nobody@remailer.paranoici.org> wrote:
>
> >
> > Thanks for posting.
> >
> > My template looks like so, and has been rock solid for me.
> >
>
> I tried your template and I obrain this error
>
>
> Sending mixmaster packet 1 of 4
> Proxy: none
> Connecting to
> 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25
> ERROR: 11001 Host not found
> Error at Session Connected
> ERROR: 11001 Host not found
> Error at Session Closed
> Connection closed!
> Failed
>
> 0 in message queue
> 1 in problem queue
> 0 sent
>
> ERROR: 11001 Host not found
> Error at Request Done

Your error is here

Proxy: none

You have failed to configure a Tor proxy.

Proxy: 127.0.0.1:WHATEVER THE PORT# IS

Re: dizium gateway working with QSL if you see this

<0e22a6ce652e5e6408c9cf9275d28549@msgid.frell.theremailer.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15124&group=alt.privacy.anon-server#15124

  copy link   Newsgroups: alt.privacy.anon-server
From: fri...@spamexpire-202308.rodent.frell.theremailer.net (Fritz Wuehler)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<6d9040be44a5ea5705539f076288d65c@dizum.com>
<JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm>
<d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
<NMlReUipUMrDKbZMNJtSYpvgdyOMDJie@news.usenet.farm>
<1be7028bf91d0a7394f1dacd42c37f83@remailer.paranoici.org>
Subject: Re: dizium gateway working with QSL if you see this
Message-ID: <0e22a6ce652e5e6408c9cf9275d28549@msgid.frell.theremailer.net>
Date: Thu, 24 Aug 2023 06:39:22 +0200
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: Fritz Wuehler - Thu, 24 Aug 2023 04:39 UTC

In article
<1be7028bf91d0a7394f1dacd42c37f83@remailer.paranoici.org>
Anonymous <nobody@remailer.paranoici.org> wrote:
>
> >
> > Hmmm. Have you downloaded and installed Tor?
> > <https://www.torproject.org/download/>
> >
> > To interface with Tor, QSL expects users to already have Tor running in the
> > background.
>
> I am executing both Tor Browser and Omnimix, when I use QSL
> using this template
>
> Fcc: outbox
> Host: 3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion
> From: anonymous@anonymous.com
> Chain: *,*; copies=2;
> To: mail2news@dizum.com, mail2news@neodome.net
> Newsgroups: alt.test
> Subject: test
>
> having tor browser and omnimix in execution is it not sufficient?

You need more modern software.

http://frogadmin.chez.com/MyDownLoad.html

Re: dizium gateway working with QSL if you see this

<22cae68cf745a57bfdb890b877fa2ca5@dizum.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15126&group=alt.privacy.anon-server#15126

  copy link   Newsgroups: alt.privacy.anon-server
From: J...@M (D)
References: <9f333ac191594c973131d902d4b4ed25@dizum.com>
<958ce45c86de79f8aec2342012acb35f@dizum.com>
<JlLsbpLCYcERoFKLjrnTDWMWsGVGCHeY@news.usenet.farm>
<d1aa7b2100a6df3d70598fad72e42ee4@dizum.com>
<NMlReUipUMrDKbZMNJtSYpvgdyOMDJie@news.usenet.farm>
<1be7028bf91d0a7394f1dacd42c37f83@remailer.paranoici.org>
<0e22a6ce652e5e6408c9cf9275d28549@msgid.frell.theremailer.net>
Subject: Re: dizium gateway working with QSL if you see this
Content-Transfer-Encoding: 7bit
Message-ID: <22cae68cf745a57bfdb890b877fa2ca5@dizum.com>
Date: Thu, 24 Aug 2023 16:03:26 +0200 (CEST)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: D - Thu, 24 Aug 2023 14:03 UTC

On Thu, 24 Aug 2023 06:39:22 +0200, Fritz Wuehler <fritz@spamexpire-202308.rodent.frell.theremailer.net> wrote:
>In article
><1be7028bf91d0a7394f1dacd42c37f83@remailer.paranoici.org>
>Anonymous <nobody@remailer.paranoici.org> wrote:
>> > Hmmm. Have you downloaded and installed Tor?
>> > <https://www.torproject.org/download/>
>> >
>> > To interface with Tor, QSL expects users to already have Tor running in the
>> > background.
snip
>>
>You need more modern software.
>http://frogadmin.chez.com/MyDownLoad.html

https://web.archive.org/web/20040603171614/http://frogadmin.free.fr/MyDownLoad.html

Pages:12
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor