Can anyone comment on how sensitive the
information in the relay 'state' is?
In particular, if entry guards are
recorded in the file should one be
concerned about protecting the file
via
a) encrypting the file system where it resides
b) making a point of not backing up the file
I suppose it come
Hi grarpamp. Actually we do have a rudimentary Sybil checker and it
*did* pick up on those relays back in January...
https://lists.torproject.org/pipermail/tor-consensus-health/2014-January/003954.html
We had some internal discussions about them but the thread lost
momentum before they were flagg
At this point the isp is clearly the victim! This guy doesn't have his own
ips and ipv4 is rare, so risking a complete ip range to get on blacklists
will be unacceptable for any company. I can fully understand them, because
dealing with spamhaus mafia is a nightmare. Lets hope they wont getting tor
As a project then to production development, someone should go back
through the entire history of descriptors and look for groups coming online...
dates, IP's, contacts, tor/OS versions, nicknames, ISP's, geoip, numbers
coming online over sliding timeframes, correlation to 'news events', etc.
There
On Wed, 30 Jul 2014, trash eighty wrote:
> I am running a pretty active relay, using Ubuntu Trusty on armhf. I see
> 0.2.4.23 for Intel architecture in the repositories, but not on
> Trusty/armhf. Didn't know if this was an oversight, or if it's still coming
> down the pipe.
Still building...
ht
I am running a pretty active relay, using Ubuntu Trusty on armhf. I see
0.2.4.23 for Intel architecture in the repositories, but not on
Trusty/armhf. Didn't know if this was an oversight, or if it's still coming
down the pipe.
Thanks,
Trash80
___
tor-rel
Let's not confuse two things, here. The customer wanting to host a Tor
exit relay is a different service request than wanting to run a
wide-open SMTP relay. No reputable ISP would agree to host an open
SMTP relay and I'm sure this one did not knowingly do so.
It would be unfortunate for ISPs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/30/2014 10:34 AM, u...@riseup.net wrote:
> Hi all,
>
> I've been running two exit relays, [1] and [2], at the German
> company Webtropia [3] for the past two weeks. Things went quite
> nice and smoothly, the speed of the server was decent and the
IMO, even relaying SMTP-like for the email which typically requires
auth first isn't a great idea if there is any concern about an
upstream getting abuse complaints about a relay (such as a leased
box).
A frequent way that spammers get their garbage out these days is to
compromise a user ac
t...@t-3.net:
> You somewhat made a mistake here - you've got to have an exit policy that
> (minimally) rejects ports 25 and 465, or else your relay becomes a giant
> abuse tool for spammers, scammers, and phishers instead of what you intended
> it to be (which was a standard-functioning Tor relay)
On 14-07-30 05:11 AM, t...@t-3.net wrote:
>
> You somewhat made a mistake here - you've got to have an exit policy
> that (minimally) rejects ports 25 and 465, or else your relay becomes a
> giant abuse tool for spammers, scammers, and phishers instead of what
> you intended it to be (which was a
Yes is there now. Very strange. I restarted it today because of a Tor update
and a few hours later it was fine.
M.
On 30/07/2014 9:48 pm, Neuman1812 wrote:
>
> Its there...
>
> https://atlas.torproject.org/#details/527ACFA6E729CF1CF3203444BA7E5E6CA6CE7F89
>
>
> On 07/29/2014 07:58 PM, Michael P
Its there...
https://atlas.torproject.org/#details/527ACFA6E729CF1CF3203444BA7E5E6CA6CE7F89
On 07/29/2014 07:58 PM, Michael Patton wrote:
Hello all,
I have started a new exit relay recently (NetFreedomTest3
- 527ACFA6E729CF1CF3203444BA7E5E6CA6CE7F89) and it has been up over 5
days now. I
You somewhat made a mistake here - you've got to have an exit policy
that (minimally) rejects ports 25 and 465, or else your relay becomes
a giant abuse tool for spammers, scammers, and phishers instead of
what you intended it to be (which was a standard-functioning Tor
relay).
You might tr
Hi all,
I've been running two exit relays, [1] and [2], at the German company
Webtropia [3] for the past two weeks. Things went quite nice and smoothly,
the speed of the server was decent and the network great, pushing quite
some terabyte.
Before renting the server, I told them what I wanted to d
15 matches
Mail list logo