providers in less conventional locations
(e.g., Eastern Europe like Poland, Hungary, Ukraine)?
Thanks for any ideas,
Alex
https://tor.foundation
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
On Sat, 17 Aug 2024 19:35:46 -0600
Landon wrote:
> The Raspberry Pi is a perfect computer to run Tor because it has 8 GB
> RAM, is tiny, only uses a max of 25 watts of power and works great as
> a network server. Plus, I don't have to leave my big power hungry
> desktop computer on all the time t
n principle, it should work if you set HardwareAccel 1. However, based
on my profiling, the actual AES encryption doesn't use that much CPU
when using regular AES instructions. I couldn't find any independent QAT
benchmarks from an internet search, but
https://calomel.org/aesni_ssl_perfo
uled restarts are counted against a
relay for Guard status. I'm not sure what the MTBF criteria are now, but
restarting more than once a week will probably disqualify a relay from
being a Guard.
Cheers,
Alex.
___
tor-relays mailing list
tor-relays@
essively pursued this plan. I have some
more ideas based on intra-family correlation, but they also have similar
problems as well as more implementation problems. in the long term, our
best hope is the PoW scheme (note: not cryptocurrency) being somewhat
quietly worked on.
cheers,
Alex.
__
t I'm not sure how useful that would be. OpenBSD
and NetBSD don't seem to define either. Perhaps something like that
would be appropriate for a FreeBSD ports patch.
Cheers,
Alex.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
h at 1900 - 2030 UTC.
>
> You can register here:
> https://nc.torproject.net/apps/forms/cDLPxryHJcP5kMeW
Can you explain why it is necessary to register in order to attend?
Additionally, the URL to the Code of Conduct is neither clickable nor
selectable, making it rather difficult
Excerpts from Andreas Bollhalder's message of April 12, 2022 2:12 am:
>
> Hello Alex
>
> Thank you for your nice hint ot QAT_Engine.
>
> Yes, in theory it really seems to be possible. Looking at the Github repo of
> the QAT_Engine, it looks like there are still so
Excerpts from trinity Pointard's message of July 11, 2020 7:12 am:
> Hi,
>
> Since a few days, my relay A8503903F97FF27F5D1C3CA38817329F581925E6
> appear down according to metrics.torproject.org, and is not getting
> the Running flag from 6 out of 9 authorities according to
> consensus-health.torp
Quoting Iain Learmonth (2020-01-20 16:00:01)
> Last time I looked you could not switch TCP congestion control algorithm
> in Linux per-namespace (maybe you can now and you don't need to have
> multiple VMs).
It's been allowed for about two years now [0], but you don't need it
anyways. Trying out n
Quoting William Denton (2019-09-10 02:16:30)
> I'm reconfiguring things and decided to move a relay from an old laptop to a
> Raspberry Pi. I tried it on a Pi Zero W, which is very cheap but also pretty
> slow, and it just didn't work. Now I'm trying it on a Pi Four (which has
> four
> CPUs a
Quoting Roger Dingledine (2019-05-16 22:24:47)
> On Thu, May 16, 2019 at 06:56:10PM +, findmei wrote:
> > May 15 14:42:13.000 [warn] Unable to stat resolver configuration in
> > '/etc/resolv.conf': Permission denied
>
> This one is weird and unexpected. Your relay can't do any dns resolves
>
Sorry for late.
Whats up...?
here is my : alexflores866@yahoo.comtlak to here...
Sent from my iPhone
On Wednesday, August 29, 2018 5:17 AM, Totor be wrote:
Hi list,
Just a quick question about families: I'm in the process of setting up a 4th
relay as test bed VM in order to vali
Sorry for late.
Whats up...?
here is my : alexflores866@yahoo.comtlak to here...
Sent from my iPhone
On Wednesday, August 29, 2018 1:07 AM, Nathaniel Suchy
wrote:
Is there a way to switch my current relays to use offline keys and invalidate
the old keys without losing current sta
As far as I know, bridges are currently not under heavy load. This is
because not everyone connects via bridge. Moreover, even if everyone
did, and nobody used onion services, the total bridge bandwidth should
be exactly 1/4 the total bandwidth. Onion services require 5 (or is it
6? I think it's 5
Quoting Roger Dingledine (2018-05-16 15:05:29)
> The fix (if my theory is right) would be to reach whatever engineer made
> this leap, and teach them about Tor. But it will be extra challenging
> because they don't even know that there's something they need to learn.
like the fact that malware can
sounds like something that could be scripted.
Quoting nusenu (2018-05-10 22:16:00)
> Dear Exit Relay Operators,
>
> I'd like to invite you to check your exit's DNS resolver by
> having a look at the following list of exits using resolvers
> outside their AS (especially if it is Google, OpenDNS,
Quoting nusenu (2018-01-27 10:31:00)
>
>
> Iain Learmonth:
> > https://atlas.torproject.org/#aggregate/version
>
> How can people find that page on atlas.torproject.org without knowing the
> full URL?
1. https://atlas.torproject.org/
2. "Advanced Search"
3. "by Version" (at the bottom)
___
Quoting Tommy Collison (2018-01-09 19:55:47)
> Hi there,
>
> I'm Tor's writer/editor. We just got a question on Twitter that I'm
> stumped on, and I had a quick look through the documentation and didn't
> find anything. Can anyone shed some light?
>
> - Can you set up a relay to provide more band
Quoting Felix (2017-12-11 17:07:30), as excerpted
> Hi Alex
>
> Great points.
>
> > conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c |
> > sort -n
>
> On FreeBSD one can do:
>
yeah, the optimal rule would ban "bad IPs&qu
tl;dr: run this:
conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c | sort
-n
ignore numbers less than 10. the remaining output should consist of the
following:
1. your IP
2. LeaseWeb and Online.net IPs (use rDNS and whois)
3. mobile networks
block IPs in set 2 from acces
want to do something like this.
Many thanks,
Alex
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 07/12/16 23:15, diffusae wrote
> I am totally agree with you.
>
> One alternative would be to use coreboot on your machine. If you are
> good, than you will put your kernel into the flash chip and make it
> write protected.
As far as I know, Coreboot is merely an open source BIOS replacement and
On 07/12/16 21:45, diffusae wrote:
> Hmm, interesting subject ...
>
> On 07.12.2016 21:35, Gumby wrote:
>> Subject seems to have changed a bit, so not hijacking it.
>> When thinking of any exploitation of firmware - should there be concerns
>> of Intel's Management Engine in the CPU of any relays
On 21/11/16 14:43, Olaf Selke wrote:
> Am 19.11.2016 um 16:49 schrieb Alex Haydock:
>>
>> There are some graphs showing (the lack of) network diversity here,
>> which are interesting to look at:
>>
>> http://torstatus.blutmagie.de/network_detail.php
>
> y
or those who
already have experience working with other kernels like
FreeBSD/OpenBSD/Solaris etc.
Cheers,
Alex
On 17/11/16 07:30, dawuud wrote:
> Hi.
>
> I added the scan output to the repo, this includes the output csv file
> and a list of vulnerable relays:
>
> https://git
I believe also being highly known and trusted by the Tor project leads, likely
the current dirauths, and the community as a whole.
On Jul 21, 2016, at 6:03 AM, Sanjeev Gupta wrote:
> Hi.
>
> What are the requirements, apart from long-term stability, for this?
>
> On 21 Jul 2016 12:18 pm, "Se
Behalf Of
Tristan
Sent: Wednesday, July 13, 2016 5:29 AM
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] ARM Launch Permissions
Have you tried adding this to your torrc?
DisableDebuggerAttachment 0
On Jul 13, 2016 4:39 AM, "Alex Chang-Lam" mailto:ael9...@gmail.co
able to use any of your system's resolvers to get
tor's connections. This is fine, but means that the connections page will be
empty. This is usually permissions related so if you would like to fix this
then run arm with the same user as tor (ie, "sudo -u arm").
Alex
-BEG
Hi all,
I'm looking to start an exit node using
this:https://learn.adafruit.com/onion-pi/overviewI have 100 Mbps symmetric
uncapped internet.
What do I need to do to prepare and run an exit node? What can you tell me so I
can run this well?___
tor-rela
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On October 11, 2014 3:25:47 PM PDT, Tor externet co uk
wrote:
> I wondered whether it was more helpful to the Tor network as a whole to
> have have a very fast node which hibernated every 12-15 hours, or if I
> throttled Tor traffic, so that the n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On October 11, 2014 3:25:47 PM PDT, Tor externet co uk
wrote:
> I wondered whether it was more helpful to the Tor network as a whole to
> have have a very fast node which hibernated every 12-15 hours, or if I
> throttled Tor traffic, so that the n
On Wed, Jun 18, 2014 at 10:11 PM, Evelyne Fong
wrote:
> I've set up the relay recently, so I'm not expecting a lot of traffic.
> However, I'm confused as to if my relay is suddenly failing for no reason or
> is Atlus saying my relay is no longer running because there's no traffic on
> it.
Do you
On Sunday, June 15, 2014, Moritz Bartl wrote:
>
> Personally, I think it would be great to not only have puppet modules
> spread out somewhere across the Internet, but a full-fledged
> guide/wizard that makes it easy for people to locally configure relays
> without knowing anything about Tor confi
Hello All,
I was wondering what, if any, software you use for monitoring your relays.
It would be nice if I could get an email when the Tor daemon crashes, and
maybe another every night telling me about bandwidth used, average speed,
etc.
Thanks,
Alex
--
For sensitive information, use my
35 matches
Mail list logo