Hi all,
Since 3 weeks, I'm running a TOR exit node [1] on a server I rent from
Hetzner (A German hosting company), after reading about using Hetzner to
run a TOR node, I decided to go for the restricted mode to avoid any
stupid copywrong issue (That is, I allowed only a limited set of ports,
Actually, there is a great description on How to unsubscribe from a
mailman mailinglist available. Maybe link this in the footer section.
http://article.gmane.org/gmane.network.opennms.general/7202
Regards, Sven.
--
PGP Key: https://0x80.io/pub/files/key.asc
PGP Key Fingerprint: 2DF2 79CD 48DD
Jeroen Massar:
Now, I have to report to Hetzner, I will tell them that I'm running a
TOR exit node in restricted mode, but how can I defend myself, I am
not sure that my restricted node and given the nature of the TOR
network arguments will convinced them the Hetzner dudes.
You cannot
On Wed, May 14, 2014 at 10:08:47PM +1200, Ch'Gans wrote:
Hi all,
Since 3 weeks, I'm running a TOR exit node [1] on a server I rent
from Hetzner (A German hosting company), after reading about using
Hetzner to run a TOR node, I decided to go for the restricted mode
Hetzner doesn't like
On 14/05/14 23:16, u wrote:
Hello!
referring to
https://trac.torproject.org/projects/tor/wiki/doc/badRelays, i sent this
also to tor-assistances@tpo. Never got an answer though :(
One of the reason I've heard on other mailing lists, is that people
sometimes get flagged as spam, and indeed
On 15/05/14 01:02, Ed Carter wrote:
The abuse reply templates located at
https://trac.torproject.org/projects/tor/wiki/doc/TorAbuseTemplates
contain some good ideas about how to reply to various complaints.
Hi Ed,
Thanks for the link, I still haven't decided yet how to handle this, but
for
On 05/14/2014 01:29 PM, Lunar wrote:
about an exit. You are responsible what happens from that IP.
Sorry but the last statement is wrong in many jurisdictions:
https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines#Legal
For Germany, see TMG §8 and §15.
True, but the location of
Hi,
On 05/14/2014 01:09 PM, Ch'Gans wrote:
Yes, I did. And it's neither all-white nor all-black, so I decided i
would give it a go, in restricted mode w/ finger crossed.
Update: OK, maybe... After reading again and again, it's more a
deep-dark-grey than a white,
Regardless, you should
I'm running an ordinary bridge on what I think is a respectable duty
cycle, but over the past three or so months it's not carried any traffic
at all.
With the advent of obfsproxy bridges, does the algorithm(?) that serves
out bridge addresses no longer recognize ordinary bridges? Are ordinary
Thomas Themel:
Excerpts from u's message of Wed May 14 13:16:21 +0200 2014:
I'm not quite sure where to report this (that is how this e-mail ends up
on tor-relays :) ), nor how to avoid this exit node. Is there a way to
do that?
ExcludeNodes in torrc allows you to avoid this node, enjoy
Lunar:
Thomas Themel:
Excerpts from u's message of Wed May 14 13:16:21 +0200 2014:
I'm not quite sure where to report this (that is how this e-mail ends up
on tor-relays :) ), nor how to avoid this exit node. Is there a way to
do that?
ExcludeNodes in torrc allows you to avoid this node,
On Tue, May 13, 2014 at 8:27 PM, Tom Ritter t...@ritter.vg wrote:
This seems very similar to the idea of having private exit nodes:
https://www.torproject.org/docs/faq#HideExits
Tor daemon must of course know its exit OR ip's+ports via some
mechanism (currently, distributed consensus), or Tor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
So, every now and then, somebody asks what the best use of a node
would be--bridge, relay, or exit. And yes, this is one of those requests.
This would be a VPS from VPS Nodes. I checked the list of good and bad
ISPs, and they don't seem to be
to list, not me.
-- Forwarded message --
From: Mirimir miri...@riseup.net
Date: Wed, May 14, 2014 at 11:58 PM
Subject: Re: [tor-talk] Fwd: [tor-relays] Ops request: Deploy OpenVPN
terminators
On 05/14/2014 09:07 PM, grarpamp wrote:
On Tue, May 13, 2014 at 5:48 PM, Jeroen Massar
14 matches
Mail list logo