When open tor-browser, it says
Tor failed to establish a Tor network connection.
Connecting to a relay directory failed (missing pluggable transport).
The log is below, could anyone help?
-
01/06/2015 15:03:35.786 [NOTICE] DisableNetwork is set. Tor will not make
or accept non-control networ
>Thank you very much for all the precious advice.
>I am running tor on linux.
I second the suggestion of applying 'iptables'
to collecting traffic statistics. Lot of ways
to go about it but here's something similar
to the approach I'm using. By having separate
entries for established and new con
On Mon, Jan 5, 2015 at 11:15 AM, eliaz wrote:
> processes involved. Since they're private, I assume they're broadcasts &
Private are RFC1918. Broadcasts are 255.255.255.255 or the
subnet based versions of same.
___
tor-relays mailing list
tor-relays@lis
Mon 05 Jan 2015, 18:04, eliaz:
> mattia:
> > Hi, I would like to know how one can monitor traffic that goes
> > through a bridge. I have set one up and would like to know whether
> > it is being used or not, and how much. Thanks!
>
> The advice so far given is for tor on linux, and won't do you a
On Mon, Jan 5, 2015 at 10:36 AM, eliaz wrote:
> Do you mean my streams in particular or all streams?
Unless you're passing identifiable info over http, the exit
wouldn't have data to target anyone. All streams are possible.
> I run in a dedicated low-power box on my LAN, to save electricity. Is
> The advice so far given is for tor on linux, and won't do you any good
> if you're running a windows OS. If you are, let us know. Also let us
> know if you're running a tor bridge bundle or tor browser + standalone
> vidalia. - eliaz
excellent point
one platform-independent tool is https://atla
mattia:
> Hi, I would like to know how one can monitor traffic that goes
> through a bridge. I have set one up and would like to know whether it
> is being used or not, and how much. Thanks!
The advice so far given is for tor on linux, and won't do you any good
if you're running a windows OS. If y
On 01/05/2015 06:16 PM, tor-ad...@torland.me wrote:
> On Monday 05 January 2015 17:40:09 mattia wrote:
>> Hi, I would like to know how one can monitor traffic that goes
>> through a bridge. I have set one up and would like to know whether it
>> is being used or not, and how much. Thanks!
>
> You m
Hi!
> Hi, I would like to know how one can monitor traffic that goes
> through a bridge. I have set one up and would like to know whether it
> is being used or not, and how much. Thanks!
I use iptables to count packets/bytes - though I'm sure nicer ways exist
for the task :)
Renke
signature.a
On Monday 05 January 2015 17:40:09 mattia wrote:
> Hi, I would like to know how one can monitor traffic that goes
> through a bridge. I have set one up and would like to know whether it
> is being used or not, and how much. Thanks!
You might try arm: https://www.atagar.com/arm/
A nice ncurses bas
Hi, I would like to know how one can monitor traffic that goes
through a bridge. I have set one up and would like to know whether it
is being used or not, and how much. Thanks!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torp
I personally run exits with various providers, the connectivity varies with
each but there are three I think are worth mentioning.
https://www.flokinet.is/servers
It's worth noting that their Romanian servers actually have unmetered bandwidth.
https://en.alexhost.md/dedicated-server-in-moldova
grarpamp:
> On Mon, Jan 5, 2015 at 3:33 AM, Kura wrote:
>> I would say that maybe it's a possibility that traffic gets
>> flagged as such too?
>> ...
>> antivirus [...] one that does
>> traffic inspection
>
> Oh, well that could be too. Tor traffic is crypted/obfuscated
> and thus could generate a
Kura:
> Some thing to take in to account as well is that some AVs are known
> to flag Tor as a virus, I would say that maybe it's a possibility that
> traffic gets flagged as such too? I've never used an antivirus, let
> alone one that does traffic inspection so obviously this is conjecture
> on my
grarpamp:
> On Mon, Jan 5, 2015 at 2:30 AM, eliaz wrote:
>> The antivirus program on a machine running a bridge occasionally
>> reports like so:
>>
>> Object: https://
>> Infection: URL:Mal [sic]
>> Process: ... \tor.exe
>>
>> When I track down the addresses I find they are
If you search for renting an already racked server I recommend to you
ViralVPS.com
Just don't be irritated by the name :-) They also have physical
dedicated server for a nice price.
Link: https://clients.viralvps.com/cart.php?gid=10
In general: For 100 British Pounds excluding VAT you get
CPU: In
I have a question. Do you mean with "to go shopping for a server" buying
hardware yourself and rent rackspace or searching for an offer of a
dedicated server?
Am 05.01.2015 um 15:14 schrieb Mike Perry:
> Libertas:
>> Hi tor users, my coworkers and I are considering getting together to
>> run a gig
Original Message
From: tor-relays-requ...@lists.torproject.org
Apparently from: tor-relays-boun...@lists.torproject.org
To: tor-relays@lists.torproject.org
Subject: tor-relays Digest, Vol 48, Issue 15
Date: Mon, 05 Jan 2015 11:05:49 +
> Message: 3
> Date: Mon, 05 Jan 2015 11
Libertas:
> Hi tor users, my coworkers and I are considering getting together to
> run a gigabit exit relay and are curious if you all have advice as to
> the best place to go shopping for a server with 1gbps dedicated
> bandwidth in a location that is helpful to the network. Someone on irc
> point
At 13:52 1/5/2015 +0100, you wrote:
>That's what 'we' found out now :-)
I figured it out.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
That's what 'we' found out now :-)
Am 05.01.2015 um 13:50 schrieb starlight.201...@binnacle.cx:
> Apparently not.
>
> At 13:25 1/5/2015 +0100, Josef 'veloc1ty' Stautner wrote:
>> I meant treated like relays in relation to traffic ...
> ___
> tor-relays m
Apparently not.
At 13:25 1/5/2015 +0100, Josef 'veloc1ty' Stautner wrote:
>I meant treated like relays in relation to traffic ...
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relay
Hello list,
I'm new to this but got my node up and running on a MK802 arm device.
However, tor-arm keep complaining about missing history.
The exact message is:
"Read the last day of bandwidth history from the state file (9 minutes is
missing)"
Does anyone know why this is but more important, h
I meant treated like relays in relation to traffic ...
Am 05.01.2015 um 13:22 schrieb starlight.201...@binnacle.cx:
> Unquestionably Bridges are different.
>
> Suggest you read about it--lots of info
> to be found.
>
>
>
> At 13:08 1/5/2015 +0100, Josef 'veloc1ty' Stautner wrote:
>> I know. That's
Unquestionably Bridges are different.
Suggest you read about it--lots of info
to be found.
At 13:08 1/5/2015 +0100, Josef 'veloc1ty' Stautner wrote:
>I know. That's why I said that I don't have that much knowledge
>about
>bridges but think that they are treated like relays.
>
>Am 05.01.2015 um
I know. That's why I said that I don't have that much knowledge about
bridges but think that they are treated like relays.
Am 05.01.2015 um 12:18 schrieb starlight.201...@binnacle.cx:
> BTW you are running normal Tor public relay
> rather than a Bridge.
>
>
> At 12:05 1/5/2015 +0100, Josef 'veloc1
BTW you are running normal Tor public relay
rather than a Bridge.
At 12:05 1/5/2015 +0100, Josef 'veloc1ty' Stautner wrote:
>I'm running 29E3D95332812F81F67FF31B3B1B842683D1C309
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.
Bridge behavior is decidedly different than
normal relay behavior--I've been running one
for a year.
Normal relays get poked fairly often by
the four "BWAuth" bandwidth authorities
and bandwidth starts at 20KB and rises
steadily from the get-go.
I suppose the bandwidth calculation is
passive in b
I don't have that much knowledge on bridges, but I think it's the same
as with relays: The speed increases after some time.
I'm running 29E3D95332812F81F67FF31B3B1B842683D1C309 and as you can see
from the graphs the speed increased slowly after the start. On saturday
I increased the advertised ban
Whoa wow. . .
It just popped to 700KB, presumably because
I used it for to browse and then download
the TBB bundle as a test.
So I guess that means the bandwidth measurement
for a bridge is strictly passive? Presumably
that also means that it is not used as
a criteria for dissemination?
___
At 11:49 1/5/2015 +0100, Josef 'veloc1ty' Stautner wrote:
>What's the fingerprint of your bridge or what's the uptime?
>When I setup my relay the shown bandwidth was first low and
>increased since then to full declared speed.
Bridge is A411C021A7B95F340485A9CCE34187025193DEF6
Uptime is two+ days
What's the fingerprint of your bridge or what's the uptime?
When I setup my relay the shown bandwidth was first low and increased
since then to full declared speed.
~Josef
Am 05.01.2015 um 11:39 schrieb starlight.201...@binnacle.cx:
> Oops. The "rate limit" I quoted
> is actually the limit on th
Oops. The "rate limit" I quoted
is actually the limit on the DOCSIS
modem here, not on the VPS. Probably
not 'iptables' traffic shaping
after all.
Using 'speedtest_cli.py' the max rate
has been showing 100 Mbits/sec, but
I discount that because the speedtest
node appears to reside in the same
da
Mine just jumped to 18,000, again I'd like to stress that I have not
changed anything in my torrc:
https://atlas.torproject.org/#details/3D7E274A87D9A89AF064C13D1EE4CA1F184F2600
On 04.01.2015 11:13 PM, bigbud...@safe-mail.net wrote:
Message: 3
Date: Sat, 03 Jan 2015 02:30:55 +0100
From: Sebas
Hello,
Just setup a new bridge running 0.2.6.1-alpha
and it's working fine.
The bridge is running in a Linux container
VPS and appears to have an iptables
traffic-shaped bandwidth limit of 400KB.
Can browse and download files through
it with decent performance using obfs4.
However self-measureme
On Mon, Jan 5, 2015 at 4:11 AM, Kura wrote:
> On a semi-related note, I run a fair number of exit and middle/guard relays
> that I can guarantee do not try to do anything naughty to content, feel free
> to test your Tor against them to see if you still get the same virus
> warnings, OP.
I prefer
On 05/01/2015 08:59:41, grarpamp wrote:
On Mon, Jan 5, 2015 at 3:33 AM, Kura wrote:
> I would say that maybe it's a possibility that traffic gets
> flagged as such too?
> ...
> antivirus [...] one that does
> traffic inspection
Oh, well that could be too. Tor traffic is crypted/obfuscated
and thu
On Mon, Jan 5, 2015 at 3:33 AM, Kura wrote:
> I would say that maybe it's a possibility that traffic gets
> flagged as such too?
> ...
> antivirus [...] one that does
> traffic inspection
Oh, well that could be too. Tor traffic is crypted/obfuscated
and thus could generate a random hit that AV po
Some thing to take in to account as well is that some AVs are known to flag Tor
as a virus, I would say that maybe it's a possibility that traffic gets flagged
as such too? I've never used an antivirus, let alone one that does traffic
inspection so obviously this is conjecture on my part.
As an
On Mon, Jan 5, 2015 at 2:30 AM, eliaz wrote:
> The antivirus program on a machine running a bridge occasionally
> reports like so:
>
> Object: https://
> Infection: URL:Mal [sic]
> Process: ... \tor.exe
>
> When I track down the addresses I find they are tor nodes (sometime
40 matches
Mail list logo