On Tue, Sep 8, 2015 at 9:04 PM, Jonathan Baker-Bates <
jonat...@bakerbates.com> wrote:
> So does anyone know of any reliable source of information on running Tor
> exits in the UK?
>
No but I run several UK based Tor exits and have had little issue other
than the usual abuse reports, that said th
On 09/08/2015 12:14 PM, Patrick O'Doherty wrote:
> I received the following response from them:
>
>> We do not discriminate on the use of any protocol among our customers.
>> Nevertheless, if we get complains or any type of pressure from public or
>> private
>> entities for illegal activity oc
On 9 September 2015 at 01:28, I wrote:
> " we will have to suspend service. You will be immediately contacted about
> any issue that arises."
>
> Doesn't their statement say they will only suspend the exit to talk to you
> about what to do?
I think that matches "not too friendly", it would be m
" we will have to suspend service. You will be immediately contacted about any
issue that arises."
Doesn't their statement say they will only suspend the exit to talk to you
about what to do?
Robert
___
tor-relays mailing list
tor-relays@lists.to
The server is theirs so they can say what happens on it. You only use it with their agreement.You don't have to agree to anything if you don't want to but the alternative is to stop using their server.As it would be against TOR's reason for living to monitor traffic the choice is obvious.When
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Sorry to respond to this late, but some advice I received from my
legal team not long ago might help on this. I apologise in advance
that I won't be able to disclose the whole letter of it but some of
the stuff contained within it is legally privileged
The ISP is Jump Networks, with whom I have a co-location in their Telehouse
suite. I'd recommend them highly otherwise, but somewhat unexpectedly,
they're using the bad traffic report as an opportunity to engage me in a
rather philosophical debate about Tor. It's interesting to hear their
opinions
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Which ISP is it? I'm a fellow UK person, but I don't use a UK VPS/ISP
for this. Tell them that you are an advocate for anonyminity, and that
you refuse to monitor traffic. No ISP can force you to do that (they
have black boxes to do this shit anyway)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello,
I am not from UK so I am also not familiar with the legislation there,
but running an exit should be perfectly fine.
Your ISP cannot "press" you to do anything! Only a govt. authority or
law enforcement authority or judge can legally press y
I run an exit node with an ISP who initially indicated they would not have
a problem with Tor as long as I was transparent about what I was doing, and
ran a sufficiently reduced exit policy.
They have now sent me evidence of malicious traffic coming from the exit. I
don't think they've had any 3rd
I have just been informed by Vultr that they now do not tolerate exit relays.
The wiki[0] suggested they were a good host for exits, and vultr's staff
confirmed to me at the start of the year that exits are fine. They appear to
have changed their mind.
[0] https://trac.torproject.org/projects/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Ok, good to hear you got it sorted!
I suggest installing arm, as it can help with a lot.
You could also access it locally, or set a password/cookie and use
that instead.
Best wishes on your Tor relay,
Billy.
On 08/09/2015 18:32, DARKNET.IT wrote:
>
I received the following response from them:
> We do not discriminate on the use of any protocol among our customers.
> Nevertheless, if we get complains or any type of pressure from public or
> private
> entities for illegal activity occurring in your server, we will have to
> suspend
> servi
Dear Billy, thanks for reply. The problem seems to be solved. My relay
is only root and I haven't installed arm. I have only debian wheezy
(server) and tor. Internet band is very good 100 Mb/s. I have made a
test and the net in my misuration was 160 Mb/s. The server is a dual
core with few ram 512
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I've sent and received almost 10GB and I've only been up for 2 days. I
was first a exit relay, then non-exit (so many blue outbounds!) now
I'm a exit relay again. Here's my ARM message:
Tor's uptime is 1 day 18:00 hours, with 31 circuits open. I've
Are you using an old version of Tor? You should be on 0.2.x
Even if you're not using a RasPi, this may help:
http://tor.stackexchange.com/questions/6134/tor-dying-on-raspberry-pi-circuit-creation-storm-out-of-memory
It seems that Tor kills itself due to memory issues...
Or, you're getting attacked
I need help to solve this message: possible syn flooding on port 80.
sending cookies. check snmp counters
Port 80 is the ORPort of the relay.
Thanks for reply
0xA09044BC.asc
Description: application/pgp-keys
___
tor-relays mailing list
tor-relays@lists.
On Tue, 8 Sep 2015 02:03:07 -0400
Roger Dingledine wrote:
> On Mon, Sep 07, 2015 at 10:30:38AM -0400,
> starlight.201...@binnacle.cx wrote:
> > This is curious: Appears a large number of Tor
> > client-bots have set
> >
> > UseEntryGuards 0
> >
> > From current relays that have never had t
18 matches
Mail list logo