Re: [tor-relays] Handshake flood now on NTor

2014-09-08 Thread Tor Stuff
I have a related question. I have recently built my first Tor relay (ORPort 443, DirPort 80, NOT Exit) with both the bandwidth and burst limits set to 100KB/s. It has been running for less than 3 days. During that time I have been monitoring it with 'arm' and on GLOBE and notice a number of

[tor-relays] Fwd: Handshake flood now on NTor

2014-09-08 Thread Tor Stuff
A correction to my posting below. With reference to what GLOBE says about my relay, I meant to say mean written bytes (mean bandwidth?) is 1.84 kB/s while mean read bytes is 1.62 kB/s. Q -- Forwarded message -- From: Tor Stuff tor.geheimschrei...@gmail.com Date: Mon, Sep 8, 2014

[tor-relays] TTTT

2014-09-08 Thread Sebastian Urbach
Dear list members, Just a quick update regarding : Currently we are working on a technical paper based on the so far collected data. ETA is roughly 4 weeks from now on. The paper is going to hit this list asap. -- Mit freundlichen GrĂ¼ssen / Sincerely yours Sebastian Urbach

[tor-relays] enable-ec_nistp_64_gcc_128

2014-09-08 Thread Harold Naparst
If you want a version of openssl compiled with the enable-ec_nistp_64_gcc_128 option and you are using Gentoo Linux, you can grab it from my overlay: layman -f layman -a hnaparst emerge openssl The new flag nist is turned on by default. I have 1.0.1i and 1.0.2_beta2 in the overlay. Hope it

Re: [tor-relays] enable-ec_nistp_64_gcc_128

2014-09-08 Thread Jeremy Olexa
Thanks for your contribution, can you also add some note to the underlying bug report https://bugs.gentoo.org/469976 so others may see it easier? -Jeremy On Mon, Sep 8, 2014 at 2:52 PM, Harold Naparst har...@alum.mit.edu wrote: If you want a version of openssl compiled with the