Results 50 comments of Damian

Thanks teor, this sounds neat. If you need anything from me let me know.

Interesting! Great catch David, I'd be delighted to merge a patch to address this.

Oh crap! My bad. On reflection since HSFETCH transparently works with v3 addresses and we go through the hidden_service's parse_file() method it looks like this already works. It's just a...

I just double checked and yup, v3 works... ``` from stem.control import Controller hs_address = 'jamie3vkiwibfiwucd6vxijskbhpjdyajmzeor4mc4i7yopvpo4p7cyd' with Controller.from_port() as controller: controller.authenticate() print(controller.get_hidden_service_descriptor(hs_address)) ``` ``` % python demo.py hs-descriptor 3 descriptor-lifetime...

Oops, a good catch from Zanella. Our get_hidden_service_descriptor method always provides a HiddenServiceDescriptorV2 object, even if we fetch a v3 descriptor. As a result none the attributes and decrypt method...

Hi juga. Tor has two types of exit policy: **full** and **micro**. Tor's **full policy** is a complete record of what a relay will and won't accept. These only reside...

> According to this, is it generally recommended to use the micro policy?, when the full policy would be recommended instead? Hi juga. Tor's grown organically over this last decade...

Hi juga. Stem already has a method to drop private entries... ``` import stem.descriptor.remote descriptors = stem.descriptor.remote.get_server_descriptors().run() exits = [desc for desc in descriptors if desc.exit_policy.can_exit_to(port = 443, strict =...

No worries in the least juga. Exit policies are deceptively confusing, and that method is easy to miss. :P

Oops, stupid me. I wanted to keep this ticket open to expand the exit policy docs - reopening.