Re: [tor-relays] TOR Relay Activity Reset

2018-05-09 Thread Keifer Bly
Hi, thank you very much. One thing I am also wondering; http://torstatus.blutmagie.de/router_detail.php?FP=db1af6477bb276b6ea5e72132684096eee779d30 Only shows the read/write history in “bytes per second”. I am wondering, as I am currently away from the computer that I am running my tor relay on

Re: [tor-relays] Strange BGP activity with my node

2018-05-09 Thread grarpamp
On Wed, May 9, 2018 at 2:06 PM, Trevor Ellermann wrote: > I just a notification from my data center that someone is trying to hijack > the IP of my exit node. Seems like the sort of thing someone might do when > trying to attack Tor. I'm in a very remote area with limited access but any > suggesti

Re: [tor-relays] Strange BGP activity with my node

2018-05-09 Thread Rabbi Rob Thomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Dear Trevor, > I just a notification from my data center that someone is trying > to hijack the IP of my exit node. Seems like the sort of thing > someone might do when trying to attack Tor. I'm in a very remote > area with limited access but any su

[tor-relays] Strange BGP activity with my node

2018-05-09 Thread Trevor Ellermann
Hi, I just a notification from my data center that someone is trying to hijack the IP of my exit node. Seems like the sort of thing someone might do when trying to attack Tor. I'm in a very remote area with limited access but any suggestions on actions I should take?

Re: [tor-relays] TOR Relay Activity Reset

2018-05-09 Thread torix
Dear Keifer, I'm seeing a stable flag on torland right now: https://onionite.now.sh/node/DB1AF6477BB276B6EA5E72132684096EEE779D30 --torix Sent with [ProtonMail](https://protonmail.com) Secure Email. ‐‐‐ Original Message ‐‐‐ On May 8, 2018 2:34 PM, Keifer Bly wrote: > Hello, for some rea

Re: [tor-relays] what ip,port combinations do Tor clients need?

2018-05-09 Thread Martin Kepplinger
On 2018-05-08 16:59, Jonathan Marquardt wrote: On Tue, May 08, 2018 at 04:45:58PM +0200, Martin Kepplinger wrote: How does a usable ipset (hash:ip,port) look like, so that it is a whitelist for in/out tcp connections? *Everything* else from/to the outside world is assumed to be dropped. (DNS too