I run a bridge from a "semi-static" home internet account, where the
address is dynamically assigned but only changes when either the ISP or
my hardware router goes down and forces a reconnect, which only happens
maybe once every several months. I've read in a few places that Tor
bridges with d
I would like to see that become the standard for checking newboys's relays.
It makes a lot of sense to collect the whole set of data and save tentative
questions and possibly wrong answers on this list (by well meaning people
nonetheless).
No one knows what security weaknesses exist by accident o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The same virtualization technique at different providers gives me
different advertised bandwidth for relays in atlas:
one provider 8-9MB/s
other 3-4 MB/s
The relays are all exit, having the same RAM and CPU configuration, as
well as 100mbit port
Right you are. I did just run it against OR port and it tells it
rejected early CCS. So it must be web server related problem.
Thanks!
On 06/23/2014 08:28 AM, andr...@reichster.de wrote:
...
> but you could check against different ports with the tripwire python
> script [1] to check if its a we
And i completely ignored that this is just testing for heartbleed and
not the latest openssl cve.
so just ignore my previous mail :)
but you could check against different ports with the tripwire python
script [1] to check if its a web-server issue or not.
i just ran it against my ORPort and i
Hi. I removed the recently-deprecated obfs2 transport from my (0.2.4.22)
bridge's torrc, but after restarting, it seems to still be advertising
support for it.
It correctly doesn't appear as a "Registered server transport obfs2"
line in the tor log file, and it's not listed in the
TOR_PT_SERV
Not exactly a direct openSSL-Test, but you could check your specific
OR-Port (or any other port you want to check) and see if it's a
web-server related problem or not.
i find this site quite useful:
https://filippo.io/Heartbleed/
if you are checking you OR-Port tick the: "Advanced (might cause
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 6/23/2014 3:00 AM, Sander Bongers wrote:
> Hi,
>
> A few weeks ago I setup a tor exit relay, using this documentation:
> https://www.torproject.org/docs/tor-relay-debian.html.en
>
> I have somewhat experience, so I kinda knew what I was doing, and
On 23/06/14 02:31, ja...@icetor.is wrote:
> Here's the code for anyone interested:
> https://github.com/woeisme/torchart
> pretty basic json query to php and pchart
Added a link to the Onionoo clients on https://onionoo.torproject.org/,
so that others can re-use, improve, contribute, etc.
All the