Re: [tor-relays] bitcoin adopt a node idea

2014-06-26 Thread Jurre van Bergen
Hoi,

At hartvoorinternetvrijheid.nl we have been toying with the exact same
idea and I think Moritz had the same idea too. Cheap crowd sponsored
relays are interesting for several reasons, you feel part of the process
as a donator. Next to the fact that, at least we came up with that, that
you get statistics of how many people you have helped on to the Tor
network, with maybe a few links to relevant censorship news around the
world. The donor feels warm from the inside and we get to grow the Tor
network.

There is work to be done on this, but there is also already work done on
this, I guess we just need someone to coordinate all of this.

All the best,
Jurre

On 06/26/2014 03:09 PM, ja...@icetor.is wrote:
   Sorry perhaps I didn't explain well enough. What I was pointing to was
 that tor could benefit from the idea of cheaply crowd sponsored relays
 that use ansible, chef or  puppet to spin up for a month. That the
 article is about bitcoin is merely coincidental.
 -J
 On 06/26/2014 05:35 AM, Scott Bennett wrote:
 ja...@icetor.is wrote:

 This seems pretty damn similiar to something we should be offering for
 Tor relays, possibly even exits and bridges (if they only run for a
 month at a time). Possibly co-ordinated through the EFF?

 http://www.coindesk.com/adopt-node-project-aims-bolster-bitcoin-network-security/

  Assuming that the relevant bitcoin programs could be taught to talk
 SOCKS, then it seems that tor hidden services would, in principle if not
 in performance, be an ideal solution.  Running those bitcoin full nodes
 as hidden services might well make them less vulnerable to being shut
 down by currency counterfeiters (e.g., the Federal Reserve and the central
 banks of other states, U.S. Dept. of the Treasury).  Performance of hidden
 services, however, are severely constrained by the hidden services protocol,
 which can slow connection times enough to make one consider USnail as a
 possible alternative, and the need for circuits of 2n-1 relays, which makes
 access even slower than normal tor circuits of n relays.


   Scott Bennett, Comm. ASMELG, CFIAG
 **
 * Internet:   bennett at sdf.org   *or*   bennett at freeshell.org   *
 **
 * A well regulated and disciplined militia, is at all times a good  *
 * objection to the introduction of that bane of all free governments *
 * -- a standing army.   *
 *-- Gov. John Hancock, New York Journal, 28 January 1790 *
 **

 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Need help to get TorDNSEL compiled

2014-06-26 Thread BlueStar88
Hey there,

this is addressed to the operators of the exitlist nameserver [1] at 
'exitlist.torproject.org':


After more than one year (referring to the start of this thread) I made another 
try today to get that TorDNSEL thing compiled, but no success, still the same 
errors. I'm now using GHC 7.6.3-10 and the current source code from git repo.

Some days ago I hardened the torcheck-page at 'torcheck.xenobite.eu' using 
DNSSEC and DANE. But this makes only the half way sense, if the input 
information it gets from 'exitlist.torproject.org' wasn't securely transferred 
in the first place.

Since there's probably no way to get the exitlist subdomain (and the dynamic 
data below) served securely using DNSSEC, I'm again at the point to get 
TorDNSEL running on the checking host itself, or nearby.

The xenobite-check-page has 400-500 requests per hour, so there's at least some 
demand worth for improving this and I really like to do so.

Thanks in advance for any help or advice you can give me!

---
$ ./Setup.lhs configure
Configuring TorDNSEL-0.1.1...
Warning: Instead of 'ghc-options: -DVERSION=0.1.1-dev' use 'cpp-options:
-DVERSION=0.1.1-dev'
$ ./Setup.lhs build
Building TorDNSEL-0.1.1...
Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1...

src/TorDNSEL/Statistics/Internals.hs:2:16: Warning:
-fglasgow-exts is deprecated: Use individual extensions instead

no location info: 
Failing due to -Werror.
---


(removed option -Werror)


---
$ 
./Setup.lhs build
./tordnsel.cabal has been changed. Re-configuring with most recently used
options. If this fails, please run configure manually.
Configuring TorDNSEL-0.1.1...
Warning: Instead of 'ghc-options: -DVERSION=0.1.1-dev' use 'cpp-options:
-DVERSION=0.1.1-dev'
Building TorDNSEL-0.1.1...
Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1...

src/TorDNSEL/Statistics/Internals.hs:2:16: Warning:
-fglasgow-exts is deprecated: Use individual extensions instead

src/TorDNSEL/System/Timeout.hs:1:12: Warning:
-fglasgow-exts is deprecated: Use individual extensions instead

src/TorDNSEL/TorControl/Internals.hs:4:16: Warning:
-fglasgow-exts is deprecated: Use individual extensions instead

src/TorDNSEL/ExitTest/Initiator/Internals.hs:2:16: Warning:
-fglasgow-exts is deprecated: Use individual extensions instead
[ 1 of 39] Compiling TorDNSEL.DistinctQueue ( src/TorDNSEL/DistinctQueue.hs, 
dist/build/tordnsel/tordnsel-tmp/TorDNSEL/DistinctQueue.o )
[ 2 of 39] Compiling TorDNSEL.DeepSeq ( src/TorDNSEL/DeepSeq.hs, 
dist/build/tordnsel/tordnsel-tmp/TorDNSEL/DeepSeq.o )
[ 3 of 39] Compiling TorDNSEL.Compat.Exception ( 
src/TorDNSEL/Compat/Exception.hs, 
dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Compat/Exception.o )
[ 4 of 39] Compiling TorDNSEL.Util( 
dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Util.hs, 
dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Util.o )

src/TorDNSEL/Util.hsc:143:24:
Module `GHC.Handle' does not export `fillReadBuffer'

src/TorDNSEL/Util.hsc:143:40:
Module `GHC.Handle' does not export `readCharFromBuffer'

src/TorDNSEL/Util.hsc:145:27:
Module `GHC.IOBase' does not export `Buffer(..)'
---



Regards

BlueStar88



On Tue, 30 Jul 2013 10:05:39 +0200
BlueStar88 bluesta...@xenobite.eu wrote:

On Tue, 30 Jul 2013 09:34:06 +0200
Lunar lu...@torproject.org wrote:

Remove -Werror from the cabal file.

Thank you.

I took off the ghc-option '-Werror' from the tordnsel.cabal file.

Now I get this:


---
# ./Setup.lhs configure
Configuring TorDNSEL-0.1.1...
Warning: Instead of 'ghc-options: -DVERSION=0.1.1-dev' use 'cpp-options:
-DVERSION=0.1.1-dev'
---


---
# ./Setup.lhs build
Building TorDNSEL-0.1.1...
Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1...

src/TorDNSEL/Statistics/Internals.hs:2:16:
Warning: -fglasgow-exts is deprecated: Use individual extensions instead

src/TorDNSEL/System/Timeout.hs:1:12:
Warning: -fglasgow-exts is deprecated: Use individual extensions instead

src/TorDNSEL/TorControl/Internals.hs:4:16:
Warning: -fglasgow-exts is deprecated: Use individual extensions instead

src/TorDNSEL/ExitTest/Initiator/Internals.hs:2:16:
Warning: -fglasgow-exts is deprecated: Use individual extensions instead
[ 4 of 39] Compiling TorDNSEL.Util( 
dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Util.hs, 
dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Util.o )

src/TorDNSEL/Util.hsc:143:24:
Module `GHC.Handle' does not export `fillReadBuffer'

src/TorDNSEL/Util.hsc:143:40:
Module `GHC.Handle' does not export `readCharFromBuffer'

src/TorDNSEL/Util.hsc:145:27:
Module `GHC.IOBase' does not export `Buffer(..)'
---


Sorry, I'm quite helpless on all this compiling stuff.

The only thing I know is, that warnings are not that worse, than the three 
errors following them. ;-)



Greetings

BlueStar88


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org

[tor-relays] Spam

2014-06-26 Thread kingqueen
hi,

well having run a relay for just under 2 weeks, I've got my first spam
on this email address. As you will no doubt have guessed, this is not
my usual email address, it is only used for the Tor relay contact
details, this email list and a very few other projects that will not
have published my email address anywhere.

So I guess that this spam is as a result of my email address appearing
on Atlas or Globe or similar as a result of it being the contact
address for my Tor relay.

I know this possibility is mentioned in the Tor documentation; I read
it somewhere. I guess there's not much to be done about it; I wouldn't
want to remove contact details - the address is already in the public
domain anyway, and I want to be contactable with any problems. I guess
I just have to use the standard spam filtering and combating measures.

Could those with experience of running a relay for longer, please
advise if this will become a major problem? Will spam increase
substantially? Also, any suggestions very gratefully received.

Thank you!

KQ


---
This email is free from viruses and malware because avast! Antivirus protection 
is active.
http://www.avast.com

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] bitcoin adopt a node idea

2014-06-26 Thread David Hill
On Thu, Jun 26, 2014 at 12:35:00AM -0500, Scott Bennett wrote:
 ja...@icetor.is wrote:
 
  This seems pretty damn similiar to something we should be offering for
  Tor relays, possibly even exits and bridges (if they only run for a
  month at a time). Possibly co-ordinated through the EFF?
 
  http://www.coindesk.com/adopt-node-project-aims-bolster-bitcoin-network-security/
 
  Assuming that the relevant bitcoin programs could be taught to talk
 SOCKS, then it seems that tor hidden services would, in principle if not
 in performance, be an ideal solution.  Running those bitcoin full nodes
 as hidden services might well make them less vulnerable to being shut
 down by currency counterfeiters (e.g., the Federal Reserve and the central
 banks of other states, U.S. Dept. of the Treasury).  Performance of hidden
 services, however, are severely constrained by the hidden services protocol,
 which can slow connection times enough to make one consider USnail as a
 possible alternative, and the need for circuits of 2n-1 relays, which makes
 access even slower than normal tor circuits of n relays.
 


I am using btcd, an alternative full-node implementation written in
golang.  Find it at https://github.com/conformal/btcd.  It has built in
proxy support.  The wallet, btcwallet, is separate.  It also has proxy
support, so that you may connect to btcd over tor or as a tor hidden
service.  That can be found at https://github.com/conformal/btcwallet.

bitcoind nodes are a nice target to look for wallets.  But with btcd, I
run that at home while btcwallet runs on my encrypted laptop which
connects to btcd over tor.  There is no wallet on my btcd node machine.

If you're interested in development, testing, or features, see
https://github.com/conformal/btcd/wiki#Contact

- David
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Spam

2014-06-26 Thread Roman Mamedov
On Thu, 26 Jun 2014 15:06:44 +0100
kingqueen kingqu...@btnf.tw wrote:

 hi,
 
 well having run a relay for just under 2 weeks, I've got my first spam
 on this email address. As you will no doubt have guessed, this is not
 my usual email address, it is only used for the Tor relay contact
 details, this email list and a very few other projects that will not
 have published my email address anywhere.
 
 So I guess that this spam is as a result of my email address appearing
 on Atlas or Globe or similar as a result of it being the contact
 address for my Tor relay.
 
 I know this possibility is mentioned in the Tor documentation; I read
 it somewhere. I guess there's not much to be done about it; I wouldn't
 want to remove contact details - the address is already in the public
 domain anyway, and I want to be contactable with any problems. I guess
 I just have to use the standard spam filtering and combating measures.
 
 Could those with experience of running a relay for longer, please
 advise if this will become a major problem? Will spam increase
 substantially? Also, any suggestions very gratefully received.

You put your IP on a web page, crawlers can harvest it and use for spam. I've
just tried and easily found your E-Mail using search engines such as Google
and others. If you didn't want it to be harvested for spam purposes, you could
have used at least some minimal obfuscation, e.g. user AT example DOT com.
But instead you just published it there in the clear form. Nothing surprising
or even strictly speaking Tor-related.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Spam

2014-06-26 Thread Roman Mamedov
On Thu, 26 Jun 2014 21:28:36 +0600
Roman Mamedov r...@romanrm.net wrote:

 You put your IP on a web page

Sorry, meant E-Mail address of course :)

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Spam

2014-06-26 Thread kingqueen
Hello Roman,

 You put your IP on a web page, crawlers can harvest it and use for spam. I've
 just tried and easily found your E-Mail using search engines such as Google
 and others.

Really? kingqu...@btnf.tw ?
https://www.google.co.uk/search?q=kingqueen%40btnf.tw#q=%22kingqueen%40btnf.tw%22
lists only a Tor node list.

 But instead you just published it there in the clear form.

in .torrc and thus in node lists, yes.

kingqu...@btnf.tw is only published on webpages in relation to tor. It
is not on any other webpages. That address - the one I am using to
correspond on this list - is the one I am now receiving spam on.

I suggest you double check your facts.


---
This email is free from viruses and malware because avast! Antivirus protection 
is active.
http://www.avast.com

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] [tor-relay] Spam

2014-06-26 Thread tor


The spam to my own Tor relay operator email address (same one as in 
this list) isn't meaningful in volume. I haven't seen any amounts that 
a delete key couldn't easily handle.


In my experience, you should be careful with spam filtering, as you 
could end up dumping abuse complaints that you wanted to see and maybe 
respond to, or have legitimate relay list email not come through. I 
ended up having to whitelist some stuff for this list to work right 
because of automatic spam behavior of this mail service.


It's not like the sight of spam email in your tor relay box is toxic 
to your workstation. It's usually obvious from the subject what it is, 
and that it can be safely and immediately deleted.





___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Spam

2014-06-26 Thread cbr...@hush.com
I was receiving some spam after a couple weeks so I changed it to
user at domain dot com e.g. cbritt at hush dot com

It seems to have solved the problem. I think I remember reading
somewhere that newer versions automatically reformat email addresses
to combat the aforementioned spam issue.

Hopefully that helps!

On 06/26/2014 at 10:56 AM, kingqueen  wrote:hi,

well having run a relay for just under 2 weeks, I've got my first spam
on this email address. As you will no doubt have guessed, this is not
my usual email address, it is only used for the Tor relay contact
details, this email list and a very few other projects that will not
have published my email address anywhere.

So I guess that this spam is as a result of my email address appearing
on Atlas or Globe or similar as a result of it being the contact
address for my Tor relay.

I know this possibility is mentioned in the Tor documentation; I read
it somewhere. I guess there's not much to be done about it; I wouldn't
want to remove contact details - the address is already in the public
domain anyway, and I want to be contactable with any problems. I guess
I just have to use the standard spam filtering and combating measures.

Could those with experience of running a relay for longer, please
advise if this will become a major problem? Will spam increase
substantially? Also, any suggestions very gratefully received.

Thank you!

KQ
---
This email is free from viruses and malware because avast! Antivirus
protection is active.
http://www.avast.com

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] [tor-relay] Spam

2014-06-26 Thread kingqueen

 The spam to my own Tor relay operator email address (same one as in 
 this list) isn't meaningful in volume. I haven't seen any amounts that
 a delete key couldn't easily handle.

That is good to know, thank you.


---
This email is free from viruses and malware because avast! Antivirus protection 
is active.
http://www.avast.com

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] bitcoin adopt a node idea

2014-06-26 Thread grarpamp
On Thu, Jun 26, 2014 at 10:44 AM, David Hill dh...@mindcry.org wrote:
 On Thu, Jun 26, 2014 at 12:35:00AM -0500, Scott Bennett wrote:
 ja...@icetor.is wrote:

  http://www.coindesk.com/adopt-node-project-aims-bolster-bitcoin-network-security/
 
  Assuming that the relevant bitcoin programs could be taught to talk
 SOCKS, then it seems that tor hidden services would, in principle if not
 in performance, be an ideal solution.  Running those bitcoin full nodes
 as hidden services might well make them less vulnerable to being shut

bitcoind works fine with tor and has some onion full nodes.

  Performance of hidden
 services, however, are severely constrained by the hidden services protocol,
 which can slow connection times enough to make one consider USnail as a
 possible alternative, and the need for circuits of 2n-1 relays, which makes
 access even slower than normal tor circuits of n relays.

Performance of hidden services is actually rather good. ymmv.

 I am using btcd, an alternative full-node implementation written in
 golang.  Find it at https://github.com/conformal/btcd.  It has built in
 proxy support.  The wallet, btcwallet, is separate.  It also has proxy
 support, so that you may connect to btcd over tor or as a tor hidden
 service.  That can be found at https://github.com/conformal/btcwallet.

 bitcoind nodes are a nice target to look for wallets.  But with btcd, I
 run that at home while btcwallet runs on my encrypted laptop which
 connects to btcd over tor.  There is no wallet on my btcd node machine.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Spam

2014-06-26 Thread kingqueen


On 26 June 2014 16:51:11 BST, cbr...@hush.com cbr...@hush.com wrote:
I was receiving some spam after a couple weeks so I changed it to
user at domain dot com e.g. cbritt at hush dot com

It seems to have solved the problem. I think I remember reading
somewhere that newer versions automatically reformat email addresses
to combat the aforementioned spam issue.

Hopefully that helps!

It does. Thank you!
-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Directory Server and bandwidth accounting

2014-06-26 Thread Kali Tor
Hi,

Is my understanding correct that if I set AccountingMax, the relay will never 
be used as a DR?

It kind of feels odd because in my situation I can donate 500GB (and maybe 
even more) but I do want to keep a max limit and at the same time let the relay 
be a DR as well. Any way to achieve this?

-kali-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Directory Server and bandwidth accounting

2014-06-26 Thread mal
On 06/26/2014 01:13 PM, s7r wrote:
 On 6/26/2014 7:46 PM, Kali Tor wrote:
 Hi,
 
 Is my understanding correct that if I set AccountingMax, the relay
 will never be used as a DR?
 
 It kind of feels odd because in my situation I can donate 500GB
 (and maybe even more) but I do want to keep a max limit and at the
 same time let the relay be a DR as well. Any way to achieve this?
 
 -kali- ___ tor-relays
 mailing list tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
 Hi Kali
 
 Where did you learn that AccountingMax argument will prevent you from
 being a directory server?
 
 I can not confirm or infirm this information, but as far as I see in
 the manual there is no such reference for accountingmax.
 
 500GB per month is little amount of traffic, seriously. My 100mbit
 relays made on virtual servers consume 6-7TB of total traffic per month.
 
 Use the accountingmax argument and you should be fine, it's better
 than capping bandwidth and it is a great help for the network.
 
 Thanks for running a relay.
 

I had not read anything about this either, until I tried to enable it
and got this in my log:

10:15:43 [NOTICE] Not advertising DirPort (Reason: AccountingMax enabled)



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Directory Server and bandwidth accounting

2014-06-26 Thread s7r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 6/26/2014 7:46 PM, Kali Tor wrote:
 Hi,
 
 Is my understanding correct that if I set AccountingMax, the relay
 will never be used as a DR?
 
 It kind of feels odd because in my situation I can donate 500GB
 (and maybe even more) but I do want to keep a max limit and at the
 same time let the relay be a DR as well. Any way to achieve this?
 
 -kali- ___ tor-relays
 mailing list tor-relays@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

Hi Kali

Where did you learn that AccountingMax argument will prevent you from
being a directory server?

I can not confirm or infirm this information, but as far as I see in
the manual there is no such reference for accountingmax.

500GB per month is little amount of traffic, seriously. My 100mbit
relays made on virtual servers consume 6-7TB of total traffic per month.

Use the accountingmax argument and you should be fine, it's better
than capping bandwidth and it is a great help for the network.

Thanks for running a relay.

- -- 
s7r
PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11
PGP Pubkey: http://www.sky-ip.org/s...@sky-ip.org.asc
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEbBAEBAgAGBQJTrFSwAAoJEIN/pSyBJlsRfVAH+PZzfzkCV6i6p8fC16PmVEBa
1cmbYloi+/edIniSrpo4KnYTSJVRBg/6Sg7CrZYlTymdM5mr5HIrAOFiIrEb5iu1
jUAryPsU9UQzSlgNzX/WwZQrwz0KSoGpp5t9fiF+DdQhObE3r16DVjQkjh7aIQQR
c0pqWGoLfGgx3KbXpLqLczQio9++wf9wQ0gKB9tcnTOxYGHl1qFDKpqwFqQ7Y8LB
55XbG70+ncSKWGMhIc6Hkg9XxhRigKo7A97dj+vBupEu8fUdhp1sWGdZUFEmYXKv
L5kaZBsD9jsdMWHW7N4U3fATylyNjceOu7ZIU6wouQG/LRH6c26467xOa/W6cQ==
=vEBO
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Is my tor exit relay set up correctly?

2014-06-26 Thread Matt Puckey
On Wed, 25 Jun 2014 16:26:14 -0800
I beatthebasta...@inbox.com wrote:

 Matt,
 
 No, I mean every ab initio Tor relay operator.
 
 From my experience getting into Tor and from watching the list it is
 obvious that there is quite often a chasm between those with the
 goodwill to run a relay and those confident with Linux and Tor
 jargon/lexicon.
 
 Even asking questions on the list is not very useful because it is
 not really possible to either ask all you need to or to depend on the
 answers completely if you don't know who's who. The repetitive
 questions are annoying to some as well.
 
 So why not offer reassurance for the security of the Tor network, and
 confidence and encouragement to the people who might give up? In my
 case it has been by accident that I have come across some important
 aspects of torrc settings and now ARM use.
 
 It is better to shepherd people consciously than to keep pointing
 them bluntly to look at the web of links which depends on them
 understanding.
 
 Robert

It might be that I'm completely misunderstanding what you are saying.
Unless (somehow) automated, I don't think checking with every Tor relay
operator 'scales'. How would you go about being a shepherd to every new
Tor relay operator?

--Matt

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Spam

2014-06-26 Thread grarpamp
Spammers subscribe to mailing lists. You post to mailing lists. Have fun.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Directory Server and bandwidth accounting

2014-06-26 Thread Kali Tor

 
 I had
  not read anything about this either, until I tried to enable
  it
  and got this in my log:
 
  10:15:43 [NOTICE] Not
  advertising DirPort (Reason: AccountingMax enabled)
 
Exactly what I experienced at my side and hence my assumption that enabling 
AccountingMax disables DirPort and the DS capability.

-kali-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays