There may be no better than pure ram, so this ticket may be of interest:
https://trac.torproject.org/projects/tor/ticket/9478
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi Jon,
On 18.08.2013 20:34, Jon wrote:
I have noticed over the past several months that the amount my exit
relay was being used has drastically dropped as the new relays and new
exits have come online. Is this normal to see my usage drop noticeably?
I don't see that with our relays. (
The exit node got an internal IP address...but bounds normally on the
outside address.
192.168.0.5192.168.0188.77.66.33
Exit node --- Router Internet
But if i do a look up on different Tor service site the find the Exit
node and give it the
On 13-08-22 08:38 AM, var wrote:
The exit node got an internal IP address...but bounds normally on the
outside address.
192.168.0.5192.168.0188.77.66.33
Exit node --- Router Internet
But if i do a look up on different Tor service site the find
On Thu, Aug 22, 2013 at 6:55 AM, Moritz Bartl mor...@torservers.net wrote:
Hi Jon,
On 18.08.2013 20:34, Jon wrote:
I have noticed over the past several months that the amount my exit
relay was being used has drastically dropped as the new relays and new
exits have come online. Is this
You cannot make Tor resistant to evil usage. Evil usage is defined
by your personal morals on one level, and by governments via the laws
the enact and prosecute on the other level.
Tor's raison d'etre is to allow people to use the internet freely when
their personal morals and their government's
Am 2013-08-22 17:28, schrieb Lukas Erlacher:
You could put a censoring proxy in front of your exit node. But that
would defeat the purpose of Tor entirely...
... and will eventually lead to your relay being flagged as a bad exit node.
Tampering with exit traffic is strongly discouraged [1].
On Thu, 22 Aug 2013 08:45:33 -0500
a432511 a432...@mail49.org allegedly wrote:
I just spun up 2 relays (1 exit, 1 non-exit) in Amsterdam using
DigitalOcean as the VPS provider. It's been up for about 8 hours now.
Here was the message I sent to them regarding the servers:
I have three
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
var:
Hi guys,
we moved from a Win to Linux with our tor exit node. The win was
running fine no problems since we are running the the exit node
on a Debian wheezy we got in trouble. The exit node is installed
and configured with the how to
here's that email again in plain text (previously held for moderation
due to message size)
On Thu, Aug 22, 2013 at 3:13 AM, lee colleton l...@colleton.net wrote:
here's both netstat - tulpen and netstat -tulpen
lee@tor-bootstrap:~$ netstat - tulpen
Active Internet connections (w/o servers)
On 22.08.2013 15:45, a432511 wrote:
I just spun up 2 relays (1 exit, 1 non-exit) in Amsterdam using
DigitalOcean as the VPS provider. It's been up for about 8 hours now.
Thank you and good luck!
While in the
future there may be a precedent that grants safe-harbor status to TOR
exit nodes,
On 22.08.2013 17:13, Jon wrote:
maybe when one hits the entry guard status, the server
usage drops?
This is indeed the case. When a relay gets the Guard flag, its Exit
Probability drops, since it is expected to be used as Guard node.
Clients will choose it in the future, so you will see more
I currently have 4 non-exit's with DigitalOcean providing approximately 160mb/s
of bandwidth. They've been up for about a month now and I've not run into any
issues with DigitalOcean staff.
With that in mind - I also had an exit up for about a month and I never heard
anything from them either
13 matches
Mail list logo