[tor-relays] Please help profile Tor 0.2.5.4
Nick could use your help identifying potential bottlenecks in the 0.2.5.4-alpha release by profiling your relay. This is especially useful on high bandwidth relays (> ~50 Mbit/s). https://trac.torproject.org/projects/tor/ticket/11332 Ideally, attach your report(s) to the ticket (you can use cypherpunks/writecode as login if you don't want to create a user). Thanks! -- Moritz Bartl https://www.torservers.net/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Ops request: Deploy OpenVPN terminators
Jeroen Massar once said: > Even though you are guessing that other people, who operate a site, > don't make a "balanced and thoughtful decision", it is not for you to > attempt to circumvent that decision. > > That is like saying "they should not have connected it to the network at > all if they did not want me to access it" or "hey look the space shuttle > designs, they should not have allowed me to exploit that hole to get > access to it". > > If an operator does not want you on their site, do not circumvent it. It > will only cause more problems for other people who are allowed access to it. By this logic, support for pluggable transports should be removed. Surely if a country or ISP doesn't want Tor users on their network we shouldn't try to circumvent their blocks, right? I don't buy it. I'm glad that people are thinking about censorship resistance for both ends of a Tor circuit. Anthony ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Usefulness of very limited exit policy nodes?
On Tue, 27 May 2014 16:04:00 +1000 Phil wrote: > Opinions please - is it worthwhile running an exit node on a home DSL > connection with limited bandwidth and exit policies? It all depends on whether or not you want to 'put up' with the potential 'hassle', which could be slightly different compared to as if it was in a datacenter somewhere. If your ISP is informed that you're an exit node, then great. Just remember, you will be mixing your own personal traffic with Tor traffic, that is the main issue I think you might face. I honestly think that you would be better off being a bridge, especially if you have a change of public IP address every now and then, like most home lines. --Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Usefulness of very limited exit policy nodes?
> Opinions please - is it worthwhile running an exit node on a home DSL Nodes are nice to have around. > potential abuse from exit traffic more so than limited bandwidth. I've only That's up to you. If you don't mind the odds of the queens best afp waking you up and borrowing all your stuff for a while till they figure out it probably wasn't you who posted that crap on the web... then you're fine. Letting your ISP know you're running an exit would probably also help you there. > had it up for a few days and the bandwidth is being used. That answers that part of your usage question, some people get no traffic thus do other things. > running as a relay? Depends on you mostly. You could also be a bridge, obfsproxy, maintain the wiki, fix bugs, etc. > would make this node more useful, while not greatly increasing the risk of > abuse reports coming my way? Most abuse comes from http/s web cretins and sometimes filesharing. Though the infocalypse horsemen are always a threat. Specific authenticated and encrypted protocols like ssh, imaps, pop3s, submission, xmpp, and so on tend to be quiet. Just read through the archives of this list, other answers are all there. Exit boilerplate and complaint templates, exonerator, and so on. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays