BlueStar88:
Got this error on precise:
---
# ./Setup.lhs build
Building TorDNSEL-0.1.1...
Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1...
src/TorDNSEL/Statistics/Internals.hs:2:16:
Warning: -fglasgow-exts is deprecated: Use individual extensions instead
no location
Hi BluStar88,
Quoth BlueStar88:
Got this error on precise:
...
no location info:
Failing due to -Werror.
It may not help, but you could try deleting the two instances of
-Werror in the tordnsel.cabal.
___
tor-relays mailing list
On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote:
On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote:
Yes, there are cases of law enforcement seizing all computer gear from a
house with a exit node -- not just the exit node computer. Most
recently in
Bridges ideally have very stable IPs, as their addresses aren't stored in an
hourly consensus, but are instead handed out as needed. This isn't such an
issue with normal relays as they ill drop out of the consensus after an hour -
but it does depend how frequently / predictably the IP address
It'd be nice if dynamic DNS could solve this somehow, but it can't with
the current implementation. :/
I think this may only get worse now that we're essentially out of IPv4
space.
-Gordon
Samuel Walker:
Bridges ideally have very stable IPs, as their addresses aren't stored in an
hourly
That stinks.
Linode has the same policy WRT exit relays.
If they get too many abuse complaints, they ask you to stop running a
relay. The way US law is structured, I can't actually blame them for this.
However they don't care if you're running a middle node. Your
bandwidth/VPS, your call. A
On Tue, Jul 30, 2013 at 05:13:09PM +0200, Andreas Krey wrote:
On Tue, 30 Jul 2013 08:03:58 +, Gordon Morehouse wrote:
It'd be nice if dynamic DNS could solve this somehow, but it can't with
the current implementation. :/
Even if - it wouldn't help those users that have an open
On Tue, Jul 30, 2013 at 6:50 AM, Andy Isaacson a...@hexapodia.org wrote:
On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote:
On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote:
Yes, there are cases of law enforcement seizing all computer gear from a
house
On Tue, Jul 30, 2013 at 06:20:29PM -0400, grarpamp wrote:
Similarly, has anyone ever put a Tor/EFF exit relay notice and
contact info on their door? Let their neighbors and/or flatmates
know? Consulted with agencies likely to service warrants?
Not to stop such legal process, but to lessen
On 31.07.2013 04:48, Gordon Morehouse wrote:
True. And veering OT, but have you tried mosh yet? It's ideal for some
situations over Tor, or where the client changes connections often.
http://mosh.mit.edu/
Mosh is great, but it still relies exclusively on UDP, right? So no
over Tor...
--
Andreas Krey:
On Tue, 30 Jul 2013 08:03:58 +, Gordon Morehouse wrote:
It'd be nice if dynamic DNS could solve this somehow, but it can't with
the current implementation. :/
Even if - it wouldn't help those users that have an open connection
through the bridge (or relay) while it does
11 matches
Mail list logo