On Thu, Aug 18, 2022 at 06:19:06PM +0200, li...@for-privacy.net wrote:
> On Mittwoch, 17. August 2022 19:31:48 CEST Logforme wrote:
> > I run the relay 8F6A78B1EA917F2BF221E87D14361C050A70CCC3
> >
> > I have tried to mitigate the current DoS by implemented connection
> > limits in my iptables usin
On Tue, Jun 21, 2022 at 07:05:35PM +0200, Andreas Kempe wrote:
> With this being the case, this solves itself for FreeBSD 13.1. The
> system I was patching Tor on was a 13.0 system, I was convinced I had
> upgraded my VMs and never actually checked the version. 13.0 does not
&
to get a proper
overview of where the actual changes ended up in the code.
I unfortunately don't have any other BSD flavours running where I
could bench performance. If users of other BSD flavours have time to
run the benchmark, it would be interesting to see the results for
sure.
Cordially,
Andreas Kempe
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tall.
I'm very interested in seeing some performance data from other people
to see whether I think it worth either pestering some Tor devs to have
a look at this or putting in some effort myself to write an
upstreamable patch.
Thank you for reading!
Cordially,
Andreas Kempe
#include
#inc
om the
letsencrypt project on Github[3]. It works the same way node_exporter
does, but exports unbound metrics and can be scraped by Prometheus. To
visualise the data, I use a pre-made dashboard for Grafana[4] that I
have tweaked a bit.
Cordially,
Andreas Kempe
>
> [1] https://gitlab.torproj
empty reply when trying to extract metrics
and I still do on Tor 4.6.7. I have some vague memory of the metrics
previously only being for hidden services.
All the metrics mentioned in the overload guide[1] seem to be missing.
Having a quick look at the Git repository, it seems that only
0.4.71-alp
On Thu, Jun 10, 2021 at 10:23:54PM +0200, kantor...@hamburg.freifunk.net wrote:
> Hey.
>
Hello,
> Am 6/9/21 um 9:51 PM schrieb Andreas Kempe:
>
> > > We have this page with some tips:
> > > https://community.torproject.org/relay/community-resources/tor-relay-u
generate nearly as much abuse. I have considered looking at
running normal nodes or possibly bridges if we hit a wall regarding
exit nodes.
> Regarding your specific questions, we can chat on #tor-relays /
> irc.oftc.net[1] (or #tor-relays:matrix.org, if yo
charge at your university?
Thank you in advance for any feedback!
Cordially,
Andreas Kempe
signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays