The problem with Pulse is that they use OVH, and that service is already
heavily saturated with Tor nodes.
On May 25, 2016 5:32 PM, "Jesse V" wrote:
>
> You can add Pulse Servers to the list. I think they are happy as long as
> you don't use an excessive amount of bandwidth per month. A rough
> e
You can add Pulse Servers to the list. I think they are happy as long as
you don't use an excessive amount of bandwidth per month. A rough
estimate of the maximum is 10 TB per month per tier, but less is better.
--
Jesse V
signature.asc
Description: OpenPGP digital signature
_
In case it helps, here is a paper describing vulenrability of
different classes of Tor user behavior to AS, Internet Exchange Point, and
Tor relay or relay family adversaries.
http://www.nrl.navy.mil/itd/chacs/biblio/users-get-routed-traffic-correlation-tor-realistic-adversaries
Note that doing AS
@Green
Thank you - couldn’t handle 'attack vector' as a synonym for ""method or
type of attack" :-)
Additional to that is it clever for a supporter of TOR to to run more
than one Relay (Exit) with a single ISP or even AS
https://en.wikipedia.org/wiki/Autonomous_system_(Internet) or does this
build
@Paul: sure. Nils pointed out that a lot of relays using the same hosting
provider could be an attack vector, because the provider would be a single
point where all the relays' secret keys could be collected. My point is
that if you look at the AS (Autonomous System) Number, it's normally the
same
@Green
Could please explain a bit more what you mean by "Avoiding using two
nodes from the same AS would seemingly go a long way toward mitigating
the attack vector you mentioned though."
Thanks
Paul
Am 25.05.2016 um 21:22 schrieb Green Dream:
> @Nils
>
> Tor path selection avoids using relays
@Nils
Tor path selection avoids using relays from the same /16 subnet, and I
thought it considered the Autonomous System (AS) as well. However now I'm
not finding concrete evidence that path selection looks at AS. I found some
older academic papers on the subject [1], but nothing in the current
sp
The hosting staff in every hosting company has physical access to the
servers (even dedicated) and if you have physical access to a server
think about it as compromised.
I dont really see the difference between shared hosting and my other
bare metal servers. As a CCNP I can compromise them both wi
So just out of curiosity: if a lot of relays run on hardware of a single
hosting company, that hosting company has access to many secret keys, which
might be an interesting attack vector for an adversary.
Given that these nodes have a different administrator, MyFamily won't be
set.
Does the relay
My experience is: This is the best hosting companyI ever had and I am
doing this for over 20 years. I will not run an exit node and I am
sure I will be fine.Btw, there are already alot of hight traffic non
exit nodes running on feral.
Markus
PS: I am not working for feral and I am not a family me
Nice to know Tor can run without any root account!
Thx all
Le 25/05/2016 à 11:41, n...@cock.li a écrit :
> Markus Koch:
>> possible or do I have to ask my hosting company for the install on a
>> shared server?
> I think it would not be recommended on a shared server for reasons
> ranging from le
Hi Markus,
on your hint I was just checking feralhosting.com. They are quoting:
"We do not allow Tor exit nodes to be run on our servers. They're open
invitations for trouble, and while Tor serves a useful purpose our
network is not the place for it.
Tor relays are fine provided they strictly onl
Markus Koch:
> possible or do I have to ask my hosting company for the install on a
> shared server?
I think it would not be recommended on a shared server for reasons
ranging from less-private privkeys to a company that sells shared
hosting probably wont be letting you run a relay in the first pl
> On 25 May 2016, at 05:46, Sebastian Niehaus wrote:
>
> Am 25.05.2016 um 10:28 schrieb Markus Koch:
>> Thank you. What about the config filez in /etc/tor/ ... /etc/ should be root
>> only?
>
> The user runnng tor must be able to read them. $DataDir has to be rw
There torrc file can be in a r
Am 25.05.2016 um 10:28 schrieb Markus Koch:
> Thank you. What about the config filez in /etc/tor/ ... /etc/ should be root
> only?
The user runnng tor must be able to read them. $DataDir has to be rw
Sebastian
signature.asc
Description: OpenPGP digital signature
__
Thank you. What about the config filez in /etc/tor/ ... /etc/ should be root
only?
Sent from my iPad
> On 25 May 2016, at 10:24, Sebastian Niehaus wrote:
>
>> Am 25.05.2016 um 10:16 schrieb Markus Koch:
>> Linux, would like to upgrade my accounts at feralhosting.com with tor
>> nodes. It must
Am 25.05.2016 um 10:16 schrieb Markus Koch:
> Linux, would like to upgrade my accounts at feralhosting.com with tor
> nodes. It must be possible because there are a lot of TOR nodes on
> feral. No clue what kind of linux they are using but you are right, I
> needed root for my other 6 TOR servers a
Linux, would like to upgrade my accounts at feralhosting.com with tor
nodes. It must be possible because there are a lot of TOR nodes on
feral. No clue what kind of linux they are using but you are right, I
needed root for my other 6 TOR servers and I am just wondering if
there is a way around it,
Like a portable version so ?
Windows, Linux, which operating system are you using ?
On Linux world, I'm usually using Debian and as I know you will need a
root access to the server.
It will create a debian-tor group, write into the system...
Or if your user is in the "sudo" group, it can be ok.
possible or do I have to ask my hosting company for the install on a
shared server?
Markus
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
20 matches
Mail list logo