Il 11/11/2008 15:23, Geoff Down ha scritto:
Crashed again after only 2 hours:
I had to shut down my node temporarily due to high load.
Jan
Crashed again after only 2 hours:
This was about 20 minutes beforehand,
%CPU %MEM VSZRSS TT STAT STARTED TIME
0.0 1.639784 10400 ?? S 4:03AM 1:32.40
Nov 11 04:03:06.129 [Notice] Tor v0.2.0.31 (r16744). This is
experimental software. Do not rely on it for strong
On Fri, Nov 07, 2008 at 01:38:28PM +0100, Eugen Leitl wrote:
I've seen continuous table state increase since about 3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else seeing this? Any alternative explanation to DoS? (ISP
throttling?).
Judging by the timing, I'd think it might be
Geoff Down wrote:
My PC crashed overnight a couple of times now with a relay running - is
this the same thing?
my tor process' workspace increased from about 400 MB to 1200 MB over
the last hours. Fortuntely anonymizer.blutmagie.de is equipped with 4 GB
memory.
Olaf
I'm seeing the same
Eugen Leitl wrote:
I've seen continuous table state increase since about 3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else seeing this?
yes, the same here
Olaf
Could the No current certificate known for authority ides; launching request.
message that my client's been displaying every minute or so for the last 4
hours be related to that, or is my problem just a coincident?
___
Sent by ePrompter,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
CyberRax wrote:
Could the No current certificate known for authority ides; launching
request. message that my client's been displaying every minute or so
for the last 4 hours be related to that, or is my problem just a
coincident?
This might be
On Fri, Nov 07, 2008 at 02:49:47PM +0100, Eugen Leitl wrote:
On Fri, Nov 07, 2008 at 02:10:32PM +0100, Olaf Selke wrote:
Eugen Leitl wrote:
I've seen continuous table state increase since about 3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else seeing this?
yes, the
On Fri, Nov 07, 2008 at 02:10:32PM +0100, Olaf Selke wrote:
Eugen Leitl wrote:
I've seen continuous table state increase since about 3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else seeing this?
yes, the same here
Anyone knows which kind of attack that is? Any suggestions
I've seen continuous table state increase since about 3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else seeing this? Any alternative explanation to DoS? (ISP
throttling?).
Thanks.
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
On Fri, Nov 07, 2008 at 01:38:28PM +0100, Eugen Leitl wrote:
I've seen continuous table state increase since about 3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else seeing this? Any alternative explanation to DoS? (ISP
throttling?).
Thanks.
Yes,
now roughly 4.5 hours ago
Same at IdentityHog. Number of TCP connections steadily increased to
~10k and then the server crashed. I have unfortunately had to shut it
down for now.
Eugen Leitl wrote:
I've seen continuous table state increase since about 3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else
My PC crashed overnight a couple of times now with a relay running - is
this the same thing?
OSX 10.3.9 Vidalia 0.1.9 Tor 0.2.0.31 r16744
GD
On 7 Nov 2008, at 18:25, Martin Hodge wrote:
Same at IdentityHog. Number of TCP connections steadily increased to
~10k and then the server crashed. I
Geoff Down wrote:
My PC crashed overnight a couple of times now with a relay running - is
this the same thing?
my tor process' workspace increased from about 400 MB to 1200 MB over
the last hours. Fortuntely anonymizer.blutmagie.de is equipped with 4 GB
memory.
Olaf
On Fri, Nov 7, 2008 at 12:52 PM, Olaf Selke [EMAIL PROTECTED] wrote:
Geoff Down wrote:
My PC crashed overnight a couple of times now with a relay running - is this
the same thing?
my tor process' workspace increased from about 400 MB to 1200 MB over the
last hours. Fortuntely
On Fri, 07 Nov 2008 16:44:09 +0100
Karsten Loesing [EMAIL PROTECTED] wrote:
The problem of clients downloading certificates that often will be
solved with the next alpha. But the main solution is to upgrade the
authority certificate which should happen some time today.
I think that it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Freemor wrote:
I think that it might be an idea to send out an official announcement
here on or-announce and perhaps on the website to tell people to stop
their inactive tor clients (i.e. sudo /etc/init.d/tor stop ) to take the
pressure off the
On Fri, Nov 07, 2008 at 07:52:06PM +0100, Olaf Selke wrote:
Geoff Down wrote:
My PC crashed overnight a couple of times now with a relay running - is
this the same thing?
my tor process' workspace increased from about 400 MB to 1200 MB over
the last hours. Fortuntely
Is there anything, in simple terms, that I can do to stop this?
Bear in mind please that I'm an expert neither in Tor nor OSX, but I
would like to contribute to the network. My torrc is the bare minimum
generated by the Vidalia interface, apart from my specifying my Address
to avoid a bug with
Olaf Selke schrieb:
my tor process' workspace increased from about 400 MB to 1200 MB over
the last hours. Fortuntely anonymizer.blutmagie.de is equipped with 4 GB
memory.
Similar here: from around 2k to 5.6k connections, cpu load tripled from 25% to
75%, memory consumption increased from 240MB
On Fri, Nov 07, 2008 at 08:02:37PM +, Geoff Down wrote:
Is there anything, in simple terms, that I can do to stop this?
Bear in mind please that I'm an expert neither in Tor nor OSX, but I
I'm running Tor on Leopard (G4 Mac mini, 1 GByte) behind a pfSense
1.2.1 firewall on a WRAP (state
Hans Schnehl schrieb:
you may set the timeout values in pf.conf to rather low values.
Actually I start wondering if larger values are of any use anyway.
maybe like:
-
set timeout interval 2
set timeout frag 5
set timeout tcp.first 5
set timeout tcp.opening 5
On Fri, Nov 07, 2008 at 10:23:02PM +0100, Dominik Schaefer wrote:
Hans Schnehl schrieb:
you may set the timeout values in pf.conf to rather low values.
Actually I start wondering if larger values are of any use anyway.
maybe like:
-
set timeout interval 2
23 matches
Mail list logo