Re: [tor-relays] reaching out to relay ops that run outdated versions
On 08/19/2014 12:37 AM, krishna e bera wrote: On 14-08-18 03:30 PM, Nusenu wrote: ja...@icetor.is: actually after poking at this for a bit tonight it looks like newer packages haven't been rolled out for deb.torproject.org repo's yet. I'll be waiting for them first. -Jason could you describe your problem a bit? if even you have problems with updates maybe others are having the same? and: please consider enabling automated updates via your package manager. i get the latest 0.2.5.x version with these apt sources lines: deb http://deb.torproject.org/torproject.org squeeze main deb http://deb.torproject.org/torproject.org tor-experimental-0.2.5.x-squeeze main i am curious why they arent https though. I guess that wouldn't provide too many benefits. It would be really clear that you will install/update Tor and the signatures should make sure you get the correct package. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] reaching out to relay ops that run outdated versions
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 ja...@icetor.is: actually after poking at this for a bit tonight it looks like newer packages haven't been rolled out for deb.torproject.org repo's yet. I'll be waiting for them first. -Jason could you describe your problem a bit? if even you have problems with updates maybe others are having the same? and: please consider enabling automated updates via your package manager. -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJT8lRyAAoJEDcK3SCCSvoeFXkP/3jPz0tybqAYfLxvUH17KZVx p7+ItZPjM/brU2EkOgIm9LRZxArk4GP4Tg9IwDEoYpUdFv8zK4UPV5fWExsbSQff gSV4xT9vbCQ9OdR/5a0o+LHP1bUlW9F5QbTgz4ZkZZ+Sll81+kXwNPRSHxoHKr5v r9esZU74YOwXXHVPZFQkFUEkYhbcuhQ5LYiMd4EZ6y9T4YFrgOdVvDzKAuu5/Xjt 2ghIR4E4ZX59dq44yNAZMzdB+sH8a6eeMSwxl9CPg/WpSVeIBnSaCJUfI2ec1zjh 6uPW4AGrcG4L83JSFubO64y/aPbmh6BDE9H7le+/gyf5ypow0ZYyWRl16grNNF+0 hnAIgRPYEUEqyYI4XbPLDs7zLnUrvoswoXMtJzJybsEswN3qSBCeEvDq/Isdx3/H mB6ycX4lI1/i82RXew48fssWveLuyAe5Sk2hiO60YhtWApbnGpyyfNqTD8YPE1SS bBeLKrUEnVZvWidI0yBAzh17bcJaA9sShwhrInywcGl7uiIgCZjRGUyjhukBh9Du 5xYOCZ8A+ozDlLBFCyFiNeuTNcjD/EqhApJ5+1T6uNepyeSwLjcfnQDPSL+uaDN+ H2hTyj/rJ7oG4gWvydxxLZfp/P/UW4eRmzvF+iDSu24Ui3L0i5pKHX+b61sR0HB3 6VBKdf7fvfQgbLkvxwtB =a4IC -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] reaching out to relay ops that run outdated versions
On 14-08-18 03:30 PM, Nusenu wrote: ja...@icetor.is: actually after poking at this for a bit tonight it looks like newer packages haven't been rolled out for deb.torproject.org repo's yet. I'll be waiting for them first. -Jason could you describe your problem a bit? if even you have problems with updates maybe others are having the same? and: please consider enabling automated updates via your package manager. i get the latest 0.2.5.x version with these apt sources lines: deb http://deb.torproject.org/torproject.org squeeze main deb http://deb.torproject.org/torproject.org tor-experimental-0.2.5.x-squeeze main i am curious why they arent https though. signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] reaching out to relay ops that run outdated versions
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 FYI: I just sent out the email bellow to ~160 relay operators - I hope this results in some actual improvements. It is a bit disappointing to see even torservers.net, DFRI, icetor, Frenn vun der Enn, Calyx, Cymru in the recipients list. The recipient list is based on the following output (limited to relays faster than 999KB/s): grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v 0.2.6.0|head -n 344 (csv is from torstatus.blutmagie.de) Hello, you are receiving this email because you are using an outdated tor version on your tor relay. (your email address was taken from your relay's contact info field) Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a security issue that makes de-anonymization attacks easier [2] - please update to Tor v0.2.4.23 or v0.2.5.6. To find out your current version run the following command on your relay: tor --version If you are using Linux: Package managers can be used to automatically update Tor without requiring manual admin intervention. It is recommended to use the official APT/YUM repos from torproject.org to get timely updates: APT: https://www.torproject.org/docs/debian.html.en YUM: https://www.torproject.org/docs/rpms.html.en thanks for running a relay and making the tor network safer! [1] https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html [2] https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJT8IfkAAoJEDcK3SCCSvoecIMP/0NX+C4+h55BXaQt2RSwA472 PyEIjSRUwrlnc0navJ1pSHOusCWnrCiMFXQaQqcdCliODzEytPoaLynItiwAtKzp UhDja4Sp/Lag9m9CiNJ/0C9k9OeHQbKcEffLAnTVUOZmcBFwo2CsROruGgveOic6 gE13Yi9LuoHdtMfDDRgLoQyL5hqa1kogpj9maMjXZwEwXhZvNpd7GEUd79WjtVm+ eFoYTW4mgPXcU0fZOtuZxAAkrd/blEzr67o4aKiMeaNDo6zmXIBe1URsPkRf50dO kQ0m4/GSicdVyOnsId+f6RcpAD/LD7QiqIyxv/XZ9uEDqtI2RvxBxNeU9kXU8KK+ y4fsXKZ4pvXgj5Nqv7niNJlftegr1rrdRB7wAtZ/2ETpEL3dqC+aBo0bL+ctk1zZ RlXZkPTOTmGEh5pDxXr8P1rxukgivOsPw3tWmeCjb2+HeiRi117LNeccvwW3SZYE pDLVSJIhxpkFKxtJ8N4vTyqoQzX/N+g1gkOZ/yuF4aCIpfLFTxjUUkMt8wyEI+v2 HMiAXyeHBFh541b9ScTrLao21sxPDsQHq1mNf3RHRKESgiejWLZz74wojUU/drIP coZVoJ7U3aFqb6xgIlJzv8u+IcPld6Xsy3U8MUtD+4q2v7t9y6u6QBrj454YCQrQ Ms0g2ocOvRCTKWUgtbdx =BK/o -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] reaching out to relay ops that run outdated versions
Let it never be said that public shaming doesn't work, I'll update our exits tonight! -Jason On 08/17/2014 10:45 AM, Nusenu wrote: FYI: I just sent out the email bellow to ~160 relay operators - I hope this results in some actual improvements. It is a bit disappointing to see even torservers.net, DFRI, icetor, Frenn vun der Enn, Calyx, Cymru in the recipients list. The recipient list is based on the following output (limited to relays faster than 999KB/s): grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v 0.2.6.0|head -n 344 (csv is from torstatus.blutmagie.de) Hello, you are receiving this email because you are using an outdated tor version on your tor relay. (your email address was taken from your relay's contact info field) Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a security issue that makes de-anonymization attacks easier [2] - please update to Tor v0.2.4.23 or v0.2.5.6. To find out your current version run the following command on your relay: tor --version If you are using Linux: Package managers can be used to automatically update Tor without requiring manual admin intervention. It is recommended to use the official APT/YUM repos from torproject.org to get timely updates: APT: https://www.torproject.org/docs/debian.html.en YUM: https://www.torproject.org/docs/rpms.html.en thanks for running a relay and making the tor network safer! [1] https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html [2] https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] reaching out to relay ops that run outdated versions
actually after poking at this for a bit tonight it looks like newer packages haven't been rolled out for deb.torproject.org repo's yet. I'll be waiting for them first. -Jason On 08/18/2014 02:55 AM, ja...@icetor.is wrote: Let it never be said that public shaming doesn't work, I'll update our exits tonight! -Jason On 08/17/2014 10:45 AM, Nusenu wrote: FYI: I just sent out the email bellow to ~160 relay operators - I hope this results in some actual improvements. It is a bit disappointing to see even torservers.net, DFRI, icetor, Frenn vun der Enn, Calyx, Cymru in the recipients list. The recipient list is based on the following output (limited to relays faster than 999KB/s): grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v 0.2.6.0|head -n 344 (csv is from torstatus.blutmagie.de) Hello, you are receiving this email because you are using an outdated tor version on your tor relay. (your email address was taken from your relay's contact info field) Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a security issue that makes de-anonymization attacks easier [2] - please update to Tor v0.2.4.23 or v0.2.5.6. To find out your current version run the following command on your relay: tor --version If you are using Linux: Package managers can be used to automatically update Tor without requiring manual admin intervention. It is recommended to use the official APT/YUM repos from torproject.org to get timely updates: APT: https://www.torproject.org/docs/debian.html.en YUM: https://www.torproject.org/docs/rpms.html.en thanks for running a relay and making the tor network safer! [1] https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html [2] https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] reaching out to relay ops that run outdated versions
0.2.4.23 has been on the repo for awhile now. --- GPG/PGP Fingerprint E129 722B A512 105C E8BE 4705 8046 EA48 2C82 1339 https://arlen.io/key On Aug 17, 2014 11:40 PM, ja...@icetor.is wrote: actually after poking at this for a bit tonight it looks like newer packages haven't been rolled out for deb.torproject.org repo's yet. I'll be waiting for them first. -Jason On 08/18/2014 02:55 AM, ja...@icetor.is wrote: Let it never be said that public shaming doesn't work, I'll update our exits tonight! -Jason On 08/17/2014 10:45 AM, Nusenu wrote: FYI: I just sent out the email bellow to ~160 relay operators - I hope this results in some actual improvements. It is a bit disappointing to see even torservers.net, DFRI, icetor, Frenn vun der Enn, Calyx, Cymru in the recipients list. The recipient list is based on the following output (limited to relays faster than 999KB/s): grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v 0.2.6.0|head -n 344 (csv is from torstatus.blutmagie.de) Hello, you are receiving this email because you are using an outdated tor version on your tor relay. (your email address was taken from your relay's contact info field) Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a security issue that makes de-anonymization attacks easier [2] - please update to Tor v0.2.4.23 or v0.2.5.6. To find out your current version run the following command on your relay: tor --version If you are using Linux: Package managers can be used to automatically update Tor without requiring manual admin intervention. It is recommended to use the official APT/YUM repos from torproject.org to get timely updates: APT: https://www.torproject.org/docs/debian.html.en YUM: https://www.torproject.org/docs/rpms.html.en thanks for running a relay and making the tor network safer! [1] https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html [2] https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] reaching out to relay ops that run outdated versions
yep you're correct, I should have taken note of the version numbers better. All exits have been updated now. -J On 08/18/2014 03:48 AM, JT Allison wrote: 0.2.4.23 has been on the repo for awhile now. --- GPG/PGP Fingerprint E129 722B A512 105C E8BE 4705 8046 EA48 2C82 1339 https://arlen.io/key On Aug 17, 2014 11:40 PM, ja...@icetor.is mailto:ja...@icetor.is wrote: actually after poking at this for a bit tonight it looks like newer packages haven't been rolled out for deb.torproject.org http://deb.torproject.org repo's yet. I'll be waiting for them first. -Jason On 08/18/2014 02:55 AM, ja...@icetor.is mailto:ja...@icetor.is wrote: Let it never be said that public shaming doesn't work, I'll update our exits tonight! -Jason On 08/17/2014 10:45 AM, Nusenu wrote: FYI: I just sent out the email bellow to ~160 relay operators - I hope this results in some actual improvements. It is a bit disappointing to see even torservers.net http://torservers.net, DFRI, icetor, Frenn vun der Enn, Calyx, Cymru in the recipients list. The recipient list is based on the following output (limited to relays faster than 999KB/s): grep -v 0.2.5.6 Tor_query_EXPORT.csv |grep -v 0.2.4.23|grep -v 0.2.6.0|head -n 344 (csv is from torstatus.blutmagie.de http://torstatus.blutmagie.de) Hello, you are receiving this email because you are using an outdated tor version on your tor relay. (your email address was taken from your relay's contact info field) Tor v0.2.4.23 has been released on 2014-07-28 [1] to address a security issue that makes de-anonymization attacks easier [2] - please update to Tor v0.2.4.23 or v0.2.5.6. To find out your current version run the following command on your relay: tor --version If you are using Linux: Package managers can be used to automatically update Tor without requiring manual admin intervention. It is recommended to use the official APT/YUM repos from torproject.org http://torproject.org to get timely updates: APT: https://www.torproject.org/docs/debian.html.en YUM: https://www.torproject.org/docs/rpms.html.en thanks for running a relay and making the tor network safer! [1] https://lists.torproject.org/pipermail/tor-announce/2014-July/93.html [2] https://lists.torproject.org/pipermail/tor-announce/2014-July/94.html ___ tor-relays mailing list tor-relays@lists.torproject.org mailto:tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org mailto:tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org mailto:tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays