Re: [tor-relays] reaching out to relay ops that run outdated versions

2014-08-19 Thread Christian Sturm
On 08/19/2014 12:37 AM, krishna e bera wrote:
 On 14-08-18 03:30 PM, Nusenu wrote:
 ja...@icetor.is:
 actually after poking at this for a bit tonight it looks like
 newer packages haven't been rolled out for deb.torproject.org
 repo's yet. I'll be waiting for them first. -Jason

 could you describe your problem a bit? if even you have problems with
 updates maybe others are having the same?

 and: please consider enabling automated updates via your package manager.
 
 i get the latest 0.2.5.x version with these apt sources lines:
 
 deb http://deb.torproject.org/torproject.org squeeze main
 deb http://deb.torproject.org/torproject.org
 tor-experimental-0.2.5.x-squeeze main
 
 i am curious why they arent https though.

I guess that wouldn't provide too many benefits. It would be really
clear that you will install/update Tor and the signatures should make
sure you get the correct package.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] reaching out to relay ops that run outdated versions

2014-08-18 Thread Nusenu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

ja...@icetor.is:
 actually after poking at this for a bit tonight it looks like
 newer packages haven't been rolled out for deb.torproject.org
 repo's yet. I'll be waiting for them first. -Jason

could you describe your problem a bit? if even you have problems with
updates maybe others are having the same?

and: please consider enabling automated updates via your package manager.

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJT8lRyAAoJEDcK3SCCSvoeFXkP/3jPz0tybqAYfLxvUH17KZVx
p7+ItZPjM/brU2EkOgIm9LRZxArk4GP4Tg9IwDEoYpUdFv8zK4UPV5fWExsbSQff
gSV4xT9vbCQ9OdR/5a0o+LHP1bUlW9F5QbTgz4ZkZZ+Sll81+kXwNPRSHxoHKr5v
r9esZU74YOwXXHVPZFQkFUEkYhbcuhQ5LYiMd4EZ6y9T4YFrgOdVvDzKAuu5/Xjt
2ghIR4E4ZX59dq44yNAZMzdB+sH8a6eeMSwxl9CPg/WpSVeIBnSaCJUfI2ec1zjh
6uPW4AGrcG4L83JSFubO64y/aPbmh6BDE9H7le+/gyf5ypow0ZYyWRl16grNNF+0
hnAIgRPYEUEqyYI4XbPLDs7zLnUrvoswoXMtJzJybsEswN3qSBCeEvDq/Isdx3/H
mB6ycX4lI1/i82RXew48fssWveLuyAe5Sk2hiO60YhtWApbnGpyyfNqTD8YPE1SS
bBeLKrUEnVZvWidI0yBAzh17bcJaA9sShwhrInywcGl7uiIgCZjRGUyjhukBh9Du
5xYOCZ8A+ozDlLBFCyFiNeuTNcjD/EqhApJ5+1T6uNepyeSwLjcfnQDPSL+uaDN+
H2hTyj/rJ7oG4gWvydxxLZfp/P/UW4eRmzvF+iDSu24Ui3L0i5pKHX+b61sR0HB3
6VBKdf7fvfQgbLkvxwtB
=a4IC
-END PGP SIGNATURE-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] reaching out to relay ops that run outdated versions

2014-08-18 Thread krishna e bera
On 14-08-18 03:30 PM, Nusenu wrote:
 ja...@icetor.is:
 actually after poking at this for a bit tonight it looks like
 newer packages haven't been rolled out for deb.torproject.org
 repo's yet. I'll be waiting for them first. -Jason
 
 could you describe your problem a bit? if even you have problems with
 updates maybe others are having the same?
 
 and: please consider enabling automated updates via your package manager.

i get the latest 0.2.5.x version with these apt sources lines:

deb http://deb.torproject.org/torproject.org squeeze main
deb http://deb.torproject.org/torproject.org
tor-experimental-0.2.5.x-squeeze main

i am curious why they arent https though.



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] reaching out to relay ops that run outdated versions

2014-08-17 Thread Nusenu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

FYI: I just sent out the email bellow to ~160 relay operators - I hope
this results in some actual improvements.

It is a bit disappointing to see even torservers.net, DFRI, icetor,
Frenn vun der Enn, Calyx, Cymru in the recipients list.

The recipient list is based on the following output (limited to relays
faster than 999KB/s):

grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v
0.2.6.0|head -n 344
(csv is from torstatus.blutmagie.de)

 Hello,
 
 you are receiving this email because you are using an outdated tor 
 version on your tor relay. (your email address was taken from your
 relay's contact info field)
 
 Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a 
 security issue that makes de-anonymization attacks easier [2] -
 please update to Tor v0.2.4.23 or v0.2.5.6.
 
 To find out your current version run the following command on your
 relay: tor --version
 
 If you are using Linux: Package managers can be used to
 automatically update Tor without requiring manual admin
 intervention.
 
 
 It is recommended to use the official APT/YUM repos from 
 torproject.org to get timely updates: APT: 
 https://www.torproject.org/docs/debian.html.en YUM: 
 https://www.torproject.org/docs/rpms.html.en
 
 
 thanks for running a relay and making the tor network safer!
 
 
 [1] 
 https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html

 
[2]
 https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html

-BEGIN PGP SIGNATURE-
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=BK/o
-END PGP SIGNATURE-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] reaching out to relay ops that run outdated versions

2014-08-17 Thread jason
Let it never be said that public shaming doesn't work, I'll update our
exits tonight!
-Jason

On 08/17/2014 10:45 AM, Nusenu wrote:
 FYI: I just sent out the email bellow to ~160 relay operators - I hope
 this results in some actual improvements.
 
 It is a bit disappointing to see even torservers.net, DFRI, icetor,
 Frenn vun der Enn, Calyx, Cymru in the recipients list.
 
 The recipient list is based on the following output (limited to relays
 faster than 999KB/s):
 
 grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v
 0.2.6.0|head -n 344
 (csv is from torstatus.blutmagie.de)
 
 Hello,
 
 you are receiving this email because you are using an outdated tor 
 version on your tor relay. (your email address was taken from your
 relay's contact info field)
 
 Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a 
 security issue that makes de-anonymization attacks easier [2] -
 please update to Tor v0.2.4.23 or v0.2.5.6.
 
 To find out your current version run the following command on your
 relay: tor --version
 
 If you are using Linux: Package managers can be used to
 automatically update Tor without requiring manual admin
 intervention.
 
 
 It is recommended to use the official APT/YUM repos from 
 torproject.org to get timely updates: APT: 
 https://www.torproject.org/docs/debian.html.en YUM: 
 https://www.torproject.org/docs/rpms.html.en
 
 
 thanks for running a relay and making the tor network safer!
 
 
 [1] 
 https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html
 
 
 [2]
 https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html
 
 
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] reaching out to relay ops that run outdated versions

2014-08-17 Thread jason
actually after poking at this for a bit tonight it looks like newer
packages haven't been rolled out for deb.torproject.org repo's yet.
I'll be waiting for them first.
-Jason

On 08/18/2014 02:55 AM, ja...@icetor.is wrote:
 Let it never be said that public shaming doesn't work, I'll update
 our exits tonight! -Jason
 
 On 08/17/2014 10:45 AM, Nusenu wrote:
 FYI: I just sent out the email bellow to ~160 relay operators - I
 hope this results in some actual improvements.
 
 It is a bit disappointing to see even torservers.net, DFRI,
 icetor, Frenn vun der Enn, Calyx, Cymru in the recipients list.
 
 The recipient list is based on the following output (limited to
 relays faster than 999KB/s):
 
 grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v 
 0.2.6.0|head -n 344 (csv is from torstatus.blutmagie.de)
 
 Hello,
 
 you are receiving this email because you are using an outdated
 tor version on your tor relay. (your email address was taken
 from your relay's contact info field)
 
 Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a
  security issue that makes de-anonymization attacks easier [2]
 - please update to Tor v0.2.4.23 or v0.2.5.6.
 
 To find out your current version run the following command on
 your relay: tor --version
 
 If you are using Linux: Package managers can be used to 
 automatically update Tor without requiring manual admin 
 intervention.
 
 
 It is recommended to use the official APT/YUM repos from 
 torproject.org to get timely updates: APT: 
 https://www.torproject.org/docs/debian.html.en YUM: 
 https://www.torproject.org/docs/rpms.html.en
 
 
 thanks for running a relay and making the tor network safer!
 
 
 [1] 
 https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html



 
[2]
 https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html



 
___
 tor-relays mailing list tor-relays@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
 ___ tor-relays mailing
 list tor-relays@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] reaching out to relay ops that run outdated versions

2014-08-17 Thread JT Allison
0.2.4.23 has been on the repo for awhile now.

---
GPG/PGP Fingerprint
E129 722B A512 105C E8BE
4705 8046 EA48 2C82 1339
https://arlen.io/key
On Aug 17, 2014 11:40 PM, ja...@icetor.is wrote:

 actually after poking at this for a bit tonight it looks like newer
 packages haven't been rolled out for deb.torproject.org repo's yet.
 I'll be waiting for them first.
 -Jason

 On 08/18/2014 02:55 AM, ja...@icetor.is wrote:
  Let it never be said that public shaming doesn't work, I'll update
  our exits tonight! -Jason
 
  On 08/17/2014 10:45 AM, Nusenu wrote:
  FYI: I just sent out the email bellow to ~160 relay operators - I
  hope this results in some actual improvements.
 
  It is a bit disappointing to see even torservers.net, DFRI,
  icetor, Frenn vun der Enn, Calyx, Cymru in the recipients list.
 
  The recipient list is based on the following output (limited to
  relays faster than 999KB/s):
 
  grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v
  0.2.6.0|head -n 344 (csv is from torstatus.blutmagie.de)
 
  Hello,
 
  you are receiving this email because you are using an outdated
  tor version on your tor relay. (your email address was taken
  from your relay's contact info field)
 
  Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a
   security issue that makes de-anonymization attacks easier [2]
  - please update to Tor v0.2.4.23 or v0.2.5.6.
 
  To find out your current version run the following command on
  your relay: tor --version
 
  If you are using Linux: Package managers can be used to
  automatically update Tor without requiring manual admin
  intervention.
 
 
  It is recommended to use the official APT/YUM repos from
  torproject.org to get timely updates: APT:
  https://www.torproject.org/docs/debian.html.en YUM:
  https://www.torproject.org/docs/rpms.html.en
 
 
  thanks for running a relay and making the tor network safer!
 
 
  [1]
 
 https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html
 
 
 
 
 [2]
 
 https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html
 
 
 
 
 ___
  tor-relays mailing list tor-relays@lists.torproject.org
  https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
  ___ tor-relays mailing
  list tor-relays@lists.torproject.org
  https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] reaching out to relay ops that run outdated versions

2014-08-17 Thread jason
yep you're correct, I should have taken note of the version numbers
better. All exits have been updated now.
-J

On 08/18/2014 03:48 AM, JT Allison wrote:
 0.2.4.23 has been on the repo for awhile now.
 
 ---
 GPG/PGP Fingerprint
 E129 722B A512 105C E8BE
 4705 8046 EA48 2C82 1339
 https://arlen.io/key
 
 On Aug 17, 2014 11:40 PM, ja...@icetor.is mailto:ja...@icetor.is wrote:
 
 actually after poking at this for a bit tonight it looks like newer
 packages haven't been rolled out for deb.torproject.org
 http://deb.torproject.org repo's yet.
 I'll be waiting for them first.
 -Jason
 
 On 08/18/2014 02:55 AM, ja...@icetor.is mailto:ja...@icetor.is wrote:
  Let it never be said that public shaming doesn't work, I'll update
  our exits tonight! -Jason
 
  On 08/17/2014 10:45 AM, Nusenu wrote:
  FYI: I just sent out the email bellow to ~160 relay operators - I
  hope this results in some actual improvements.
 
  It is a bit disappointing to see even torservers.net
 http://torservers.net, DFRI,
  icetor, Frenn vun der Enn, Calyx, Cymru in the recipients list.
 
  The recipient list is based on the following output (limited to
  relays faster than 999KB/s):
 
  grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v
  0.2.6.0|head -n 344 (csv is from torstatus.blutmagie.de
 http://torstatus.blutmagie.de)
 
  Hello,
 
  you are receiving this email because you are using an outdated
  tor version on your tor relay. (your email address was taken
  from your relay's contact info field)
 
  Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a
   security issue that makes de-anonymization attacks easier [2]
  - please update to Tor v0.2.4.23 or v0.2.5.6.
 
  To find out your current version run the following command on
  your relay: tor --version
 
  If you are using Linux: Package managers can be used to
  automatically update Tor without requiring manual admin
  intervention.
 
 
  It is recommended to use the official APT/YUM repos from
  torproject.org http://torproject.org to get timely updates: APT:
  https://www.torproject.org/docs/debian.html.en YUM:
  https://www.torproject.org/docs/rpms.html.en
 
 
  thanks for running a relay and making the tor network safer!
 
 
  [1]
 
 https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html
 
 
 
 
 [2]
 
 https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html
 
 
 
 
 ___
  tor-relays mailing list tor-relays@lists.torproject.org
 mailto:tor-relays@lists.torproject.org
  https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
  ___ tor-relays mailing
  list tor-relays@lists.torproject.org
 mailto:tor-relays@lists.torproject.org
  https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org mailto:tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
 
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays