I have a TOR relay behind a Tomato router on an ADSL line. I activated
the vpn client to route all traffic through privateinternetaccess.com.
Because a TOR relay does not work behind NAT without port forwarding,
I'm looking for a way how to route tor traffic directly to my internet
provider. I
Hi Jochen,
I believe that your bandwidth is limited by your ISP through which you
connect to the internet with your ADSL-line. Therefore, running Tor over a
VPN-connection will not increase the bandwidth of your relay, only
obfuscate your IP address. Correct me if I am wrong.
Regards,
Viktor
Hi Jochen,
Ah, I understand. I believe services like AirVPN allow clients to forward
traffic to them on certain ports. For example, if you configure the
VPN-provider to forward all the incoming traffic on port 9001 to your
router as the client, you are able to run a relay from behind your router
Hi Tschador, here some more:
Only TCP is required! Fritz!Box DSL router works well with Tor but if
Tor has many circuits open, you have to reboot the box every week or so.
Can you print your 'torrc' and the output of '/sbin/iptables -L -nv'?
Please find the listings http
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dan Staples:
In my experience, setting the bandwidth advertising options does
nothing to stop the storms of circuit creation requests.
This is absolutely correct, and I've been working on this problem with
the Pi for months now.
It *will*
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Thanks Gordon, I've been following your posts about the
circuit-creation storms with interest. I recently upgraded my Pi to
Tor v0.2.4, and haven't witnessed a storm yet (they are relatively
rare for me). But I am certainly interested in trying out
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dan Staples:
Thanks Gordon, I've been following your posts about the
circuit-creation storms with interest. I recently upgraded my Pi
to Tor v0.2.4, and haven't witnessed a storm yet (they are
relatively rare for me). But I am certainly
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 10/20/2013 12:42 PM, Gordon Morehouse wrote:
If a tor relay has a circuit built through a peer, and the peer
starts dropping 100% of packets, how long will it take before the
relay with the circuit gives up on the circuit and tears it down?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jesse Victors:
On 10/18/2013 11:46 PM, David Carlson wrote:
On October 8 something caused my non-exit relay speed to drop
from around 50 KB to less than 10 KB according to Atlas
graphs. I have checked with my ISP and run speed tests that
Gordon has pre-built packages[1], but I just downloaded the source and
built it myself: https://www.torproject.org/download/download.html.en
(unstable/alpha version).
-Dan
[1]
https://github.com/gordon-morehouse/cipollini/tree/master/raspbian_packages
On 10/20/2013 01:49 PM, Jochen Fahrner
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am 20.10.2013 17:25, schrieb Dan Staples:
I recently upgraded my Pi to
Tor v0.2.4,
How did you do that? Is there some deb package for the Pi available?
- --
Mit besten Grüßen
Jochen Fahrner
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dan Staples:
On 10/20/2013 12:42 PM, Gordon Morehouse wrote:
If a tor relay has a circuit built through a peer, and the peer
starts dropping 100% of packets, how long will it take before
the relay with the circuit gives up on the circuit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Eduard:
I rented a VPS with 256mb ram and unmetered bandwidth. Ubuntu
12.04. Can someone please tell me how to configure it as a non-exit
relay for Tor? Acess via PuTTy.
256MB RAM and unmetered bandwidth is going to get you into trouble
very
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Chris Whittleston:
Do you think it might help to restart tor every 24 hours or so
using cron Dan - or would that adversely affect the network too
much/not actually help?
Generally restarting a Tor relay is something you want to do as little
as
On 2013-10-20 10:55, Gordon Morehouse wrote:
I suspect another user's assessment that Tor middle-node bandwidth is
now abundant, and thus nodes below a certain consensus fraction are
left out in the cold, may be correct. Just my hunch though.
The current routing algorithm is not utilizing
Hi Tschador
Looks ok. UID 104 is Tor, right? ('sudo ps anux|grep /usr/sbin/tor')
Computer if off. But I will prove one of the next runs if the UID position is
likewise.
My Fritz Box is open on 9001 tcp AND udp
One rule (TCP/UDP) or two seperate rules for each protocol?
Two seperate rules.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Moritz Bartl:
On 2013-10-20 10:55, Gordon Morehouse wrote:
I suspect another user's assessment that Tor middle-node
bandwidth is now abundant, and thus nodes below a certain
consensus fraction are left out in the cold, may be correct.
Just my
On 13-10-20 12:42 PM, Gordon Morehouse wrote:
First, during a SYN flood type overload, some peers which have
*existing* circuits built through the relay and are sending SYNs as
normal traffic, will stochastically get caught in the filter and
banned for a short time. If these hosts already
Gordon,
It seems useful to run obfsproxy bridges on $1 a month VPSs then.
Can weather.torproject.org be used to monitor whether they're running or not?
Robert
Is there any utility in the very cheap VPSs with 128mb of ram?
I did some testing quite a while ago and found that 256MB was the
Mick,
Is Serverstack.nl particularly pro-tor exit nodes?
By the front page it would seem so.
Robert
I run tor perfectly happily on a VPS with 512MB of RAM. That node
is on a Gig backbone, advertises 2.1 MB/s (2100 KB) and shovels data at
anywhere between 24 and 32 Mbit/s all day every
On 2013-10-20 11:19, Gordon Morehouse wrote:
That's nearly everybody on broadband in the US. There are a lot of
us that would rather run relays. 3, 5, 7Mbps is still reasonably
respectable IMO
A relevant ticket is
https://trac.torproject.org/projects/tor/ticket/1854
Thanks for the link!
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Moritz Bartl:
On 2013-10-20 11:19, Gordon Morehouse wrote:
That's nearly everybody on broadband in the US. There are a
lot of us that would rather run relays. 3, 5, 7Mbps is still
reasonably respectable IMO
A relevant ticket is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I:
Gordon,
It seems useful to run obfsproxy bridges on $1 a month VPSs then.
Can weather.torproject.org be used to monitor whether they're
running or not?
That's a very good question - I hadn't tried monitoring my bridges
with it because I
Gordon,
To see if it was possible just now I set up an obfsproxy bridge as best I could
but it failed to download properly. The instructions say set up Tor then the
obfsproxy software which seemed to use up the ram.
(I've reinstalled the OS from Ubuntu 11.. to Quantal)
Have I misunderstood
24 matches
Mail list logo