Am Sat, 7 Sep 2024 15:14:56 -0300
schrieb gus :
> > > https://pad.riseup.net/p/tor-relayop-sept7th-meetup-keep Room
>
> Gus
Hi Gus
During reading through the pad I think I unfortunately deleted the link
under "4. New Relay Governance docs" when I clicked the link on a
tablet. Can you please bri
1 18 55 854193 90 18 51 664 3908 580
2024 01 11 19 55 752697 84 16 13 643 4069 749
2024 01 11 20 55 65342 47 8 17236 2092 2663 663
2024 01 11 21 55 42592 5 4 7842 334 2502 562
2024 01 11 22 55 118705 17 15 11781 781 4688 1169
2024 01 11 23 55 129431 23 23 12623 1145 4946 1128
2024 01 12 00 55
happens again in the future - other than reinstalling the entire
> server, that is.
Those are my questions too :) . Case by case and issue by
issue.
Stay save out there!
--
Cheers, Felix
pgpynMp81Z0qm.pgp
Description: Digitale Signatur von OpenPGP
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
e metrics data be pulled out of the multiple tor services to
fetch *all* metrics data? Or will only one of them be looked at, without
full data representation?
I ask primary about an obfs4 setup. Which might apply for snowflake and
friends too.
--
Cheers, Felix
pgp3tdqG4uTGv.pgp
Descrip
Authority?
--
Cheers, Felix
pgpJNICSpRZmK.pgp
Description: Digitale Signatur von OpenPGP
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> Daniel Nikoloski
Hi Daniel
Not sure if that already has been answered. I don't use Kubernetes cluster but
I find this one interesting:
> > Address 38.242.233.101
> > ORPort 9001 NoAdvertise IPv4Only
> > ORPort 32150 NoListen IPv4Only
I believe the Tor server service will publish port 32150 bu
Hi
> Jun 03 04:04:33.000 [warn] Possible compression bomb; abandoning
> stream. Jun 03 04:04:33.000 [warn] Unable to decompress HTTP body
> (tried Zstandard compressed, on Directory connection (client reading)
> with 199.58.81.140:80).
We see the compression bomb warning from time to time
The ad
Hi
> Thanks for the reply. What would be a reasonable per-ip rate limit
> (connections per second) for a Tor middle relay?
On _Freebsd_ the following pf settings apply for running tor in a Jail:
table persist
MAXSRCCONN = "50"
MAXSRCCONNRATE = "5/5"
nat on $IFEXT inet from $IPTOR1 to a
Am Wed, 8 Feb 2023 00:08:39 +0100
schrieb nusenu :
Hi
> multi-instance tor relay
Can you please describe what that is? Is it a server with multiple
relays, each with it's own fingerprint? Or is it a relay with one
fingerprint and with multiple tor daemons that are synced by some magic?
pgp4ea
rsion of Tor (0.4.7.8) is newer
than any recommended version, according to the directory authorities.
--
Cheers Felix
pgpKDS2ek1doi.pgp
Description: Digitale Signatur von OpenPGP
___
tor-relays mailing list
tor-relays@lists.torproje
sing the full list of tor nodes and indiscriminately
> blocking everything
Yup, agree
Do you have IPv6 available for your office traffic? While you use IP4
for the relay. If you route email and browser along IPv6 you could
resolve the issue.
All the best!
--
Cheers Felix
pgptH6l_GO0WQ.pgp
De
Hi all
I found a message in the logs:
Apr 16 15:07:46.000 [warn] Received a bad CERTS cell: Link certificate
does not match TLS certificate
--
Cheers Felix
pgpz8Afm4HlbY.pgp
Description: Digitale Signatur von OpenPGP
___
tor-relays mailing list
tor
the max
conn per ip rate was above my applied max threshold. The notice level
DoS mitigation entry remained untouched while sitting behind the pf.
Beautiful!
--
Cheers Felix
pgp1I4_GKArH1.pgp
Description: Digitale Signatur von OpenPGP
___
tor-relays
, forum, and matrix. Eventually the bridges will go
away too.
Merci vilmal and herzlichen glückwunsch!
Jonas
So sad to read what you posted. Tor seems to be a not unimportant part
of your digital life. Maybe things calm down over time.
--
Cheers, Felix
ode
from there. You can include a custom port as shown and many attackers
do. Most exploit attempts use http(s). Nothing we can block without
packet inspection.
Best regards,
Felix
___
tor-relays mailing list
tor-relays@lists.torpr
Hi
Since all of my exit nodes are within the same /16 - would I have to run
bridges on newly acquired IPv4 space?--
A bridge has no `family´. An entity running bridge and exit generates an
end-to-end situation and might not be what we want.
Cheers, Felix
:57 PM, Felix wrote:
Please somebody can _confirm_ this thing?
Much more worse:
The relay here under a hardened Gentoo Linux with LibreSSL 3.2.1 has only 50%
of the amount of the conenctions as with 3.2.0 at all - and the TCP traffic
dropped down by nearly 100%.
I recompiled Tor to ensure
Dear All
The last days on this list were stunning, to say the least. I'm going to
unsubscribe today and i will decide tomorrow if i shut down all my relays.
We experience all kinds of attacks against privacy and our relays.
Let's stay together.
--
Che
und timing
will be handled accordingly.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
e of "text/plain".
:: No bridge fingerprints ::
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
orks is:
http://relayip:dirport/tor/status-vote/current/consensus.z
Am I missing something and is everything good? A glitch?
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
raffic during bursts from personal traffic pipes on Linux
> or BSD systems?
On BSD you could investigate in pf-altq and define customized queues.
But that will impact the bandwidth measurements and the consensus for
your relay.
--
Cheers, Felix
___
t
?
I don't use OutboundBindAddress but given the name
"outbound-bind-address" the outbound traffic has to bind to a public IP.
And 192.168/16 is not public.
For what it's worth.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@
16-01-01&country=th
https://metrics.torproject.org/userstats-bridge-country.html?start=2016-01-01&country=th
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
le, exit, entry)
Relays received shorter probes than bridges which were probed over about
5 hours. As well bridges that are announced (public) but didn't had any
'unique clients' so far.
--
Cheers, Felix
___
tor-relays mailing list
tor-rel
cause an issue with some Tor auths.
Libressl 3.2.2 is/was devel and sits as well in non-devel, so we can not
switch back this time :( .
[0] https://gitlab.torproject.org/tpo/core/tor/-/issues/40128
[1] https://svnweb.freebsd.org/ports/head/security/libressl/
--
Cheers, Felix
S: We had the same trouble with Libressl 292 when 28x worked well and
30x too.
PPS: Is that a good reason to stay away from automated updates? Ok,
Libressl 321 is -devel
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproj
eDesc) 0.4.4.5 =?=
May-be the operators updated and are now in the same floating position?
May-be this is super normal and came to my attention by surprise?
Anyways, I let everthing run for a day or so. Time can heal.
--
Cheers, Felix
___
tor-relays mail
0.0%50 98.4 98.4 98.0 100.3 0.5
Relays at other hosting locations choose for different routes and
longclaw sees them perfectly equal. It*s a case by case.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
h
[4]
https://trac.torproject.org/projects/tor/attachment/ticket/21564/fallbacks_2017-05-16-0815-09cd78886.log
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
--
Cheers, Felix
__
ard. I hear you.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
e same way and finally relax DOS settings.
When ever the relay(s) become unstable go one step back.
This is a recommendation but there might better ways to go.
Good luck!
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
.
It is helpful if you post the fingerprint and torrc file here.
Thanks for working hard to get the relay run.
Good luck!
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Exit
my fingerprint
You need to have the DirPort active. If the DirPort is on a
browser readable port (ie 80) you can browse, wget or curl
the relay_address:port and see if the daemon runs.
Have fun with your relays and stay healthy!
--
Cheers, Felix
__
vihay/hayes10__google_delay_based_tcp_conges_contr.pdf
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
L 1.0.2s
9F5068310818ED7C70B0BC4087AB55CB12CB4377 Tor 0.4.1.6, LibreSSL 3.0.0
8FA37B93397015B2BC5A525C908485260BE9F422 Tor 0.4.1.5, OpenSSL 1.0.2t
suffering:
ED7F2BE5D2AC7FCF821A909E2486FFFB95D65272 Tor 0.4.1.3-alpha, LibreSSL 2.9.2
I hope that helps. Please tell me how I can support.
--
Cheer
Am 2019-09-21 um 4:11 PM schrieb Toralf Förster:
On 9/16/19 9:19 PM, Felix wrote:
The sbws bandwidth authorities now can measure the bandwidth of the relay.
Can somebody confirm my observation or has prove (please no speculations).
I upgraded LibreSSL from 2.9.2 to 3.0.0 here at a stable
wonder about the number of relays affected, meaning lost their Guard flags
around 15th of August and didn't get it back till today?
[1] me :
https://metrics.torproject.org/rs.html#details/63BF46A63F9C21FD315CD061B3EAA3EB05283A0A
[2] Felix:
https:
A8
[3]
https://metrics.torproject.org/rs.html#search/family:1AE039EE0B11DB79E4B4B29CBA9F752864A0259E
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
e and everything is like it should be. So please let me improve my
post like:
And forget the fingerprint file :)
Thanks and a nice weekend for everybody
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
ectory and make sure the
filesystem permissions
are set properly and you should be fine.
And don't forget the fingerprint file :)
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/m
B29CBA9F752864A0259E
A2E6BB5C391CD46B38C55B4329C35304540771F1
B86137AE9681701901C6720E55C16805B46BD8E3
3) Not normal:
https://metrics.torproject.org/hidserv-rend-relayed-cells.html?start=2017-01-01
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.
Am 31.01.2019 um 14:19 schrieb Felix:
Hi everybody
Circuit storms observed of up to 100k and 250k per relay for over hours.
Consumed BW rises by about 10%. Number of stateful server connections is
higher. Using Tor 356 to 401.
Anybody else observes that?
Switching to some paranoid server
, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
end up in a well used server :)
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
e 0
RelayBandwidthBurst 0
HardwareAccel 1
AccelName dynamic
Log info file /var/log/tor/info
--
Cheers from 35c3 , Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
4766
Ah, great! This makes sense. It's a transient to the list update.
> https://trac.torproject.org/projects/tor/ticket/24803
The upcoming one seems to be:
https://trac.torproject.org/projects/tor/ticket/28795
--
Cheers, Felix
___
tor-r
d ips? The new ips aren't in any
fallback_dirs.inc's and [2] shows no fallback flag.
Would thereby [1] look better than it is?
[1] https://consensus-health.torproject.org/consensus-health.html
[2]
https://metrics.torproject.org/rs.html#details/F9246DEF2B653807236DA134F2AEAB103D58ABFE
--
t-45028085ea188baf) running
on FreeBSD with Libevent 2.1.8-stable, OpenSSL LibreSSL 2.7.4, Zlib
1.2.11, Liblzma 5.2.3, and Libzstd 1.3.5.
...
Oct 28 14:35:53.000 [notice] Bootstrapped 0%: Starting
Oct 28 14:35:55.000 [warn] parse error: Annotations mixed with keywords
Oct 28 14:35:55.000 [warn] Unparseable mi
drwx-- 2 _tor _tor - date/time keys
# ls -alo /var/db/tor/keys/
-rw--- 1 _tor _tor - date/time secret_onion_key
... more files ...
chown can heal it:
# chown -R _tor:_tor /var/db/tor
# chown -R _tor:_tor /var/db/tor/keys
I hope I got your points.
Please check bef
e file /var/log/tor/notices.log
RunAsDaemon 1
ORPORT 9001
DirPort 9030
ExitPolicy reject *.*
Nickname Lebowski1
RelayBandwidthRate 200 KB
RelayBandwidthBurst 400KB
-> ORPort 9001
PS: *Lebowski1* how cool!
--
Cheers, Felix
___
tor-relays mailing
Hi Tyler
Am 12.10.2018 um 14:41 schrieb Tyler Durden:
> Our two exit nodes "chulak" and "aurora" will be terminated by the end
> of this month.
They were active for how long - forever? Chapeau!
--
Cheers, Felix
___
tor-rela
10,0.3.4.1-alpha,0.3.4.2-alpha,0.3.4.3-alpha,0.3.4.4-rc,0.3.4.5-rc,0.3.4.6-rc,0.3.4.7-rc,0.3.4.8,0.3.5.1-alpha
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
the entry
"Self-testing indicates your DirPort is reachable from the outside.
Excellent." Same for Orport. If you dont't need socks you can change it
to .
I hope I got you right. Good luck!
[] https://www.torproject.org/docs/tor-manual.html.en
--
Cheers, Felix
__
ir and Valid flags.
>
...
>
> Livak
Thanks for engaging and doing.
Did you consider to reduce your exit policy a bit like:
https://www.torproject.org/docs/faq.html.en#DefaultExitPorts
or what you can find in the history of this list?
--
Cheers, Felix
___
, but I have no clue what this might be.
Thank you for tracing this.
[1] https://nusenu.github.io/OrNetStats/
[2]
https://metrics.torproject.org/rs.html#details/B771AA877687F88E6F1CA5354756DF6C8A7B6B24
[3] http://185.220.101.32:10032/tor/extra/authority
--
Cheers, Felix
__
It makes sense to rate limit (syn/sec) and connection limit Dirport
usage. I do this since years. The smaller a relay is the more it suffers
from excessive clients.
Can we get the DOS mitigation to perform it? As long as I observe this
issue it behaves like the Orport m
.torproject.org/pipermail/tor-relays/2017-September/013041.html
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
it in like python :)
You can run a tor client and:
# grep "a.b.c.d" /var/db/tor/cached-consensus
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Thanks for looking into this
Am 14-Feb-18 um 00:25 schrieb teor:
>
>> On 14 Feb 2018, at 07:27, Felix wrote:
>>
> You can adjust these options without recompiling using the
> DoS* torrc options from the man page:
> https://gitweb.torproject.org/tor.git/tree/doc/tor.1.
50
FW: 100 connects per /32 ip, rate limited to 15 per sec.
Some hack to grab dos ips, their counts and defenses shows the well
known ones like a hand full new ones. But no surprises.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays
er instance are advised to disable it.
Thank you so much. I went crazy about sudden deaths
of relays too.
> CellStatistics can be turned off without restarting,
> via the control-channel command
> setconf CellStatistics=0
Without control-command one has to restart the se
locking duration 1 day per ip.
Going to reduce fw after 24 hours step-by-step.
Thanks for the nice peace of software!
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
.3.2.8-rc)
and there without the 'too slow to handle' warning:
17059168 circuits and 37961895 NTor in 3 hours (Freebsd, Jan 14th, Tor
0.3.2.8-rc)
Interesting here is the memory went up to 15GB where MaxMemInQueues was
set to 2GB.
--
Cheers, Felix
___
e to 120-210% during the flood.
I can not prove but because of outbound packet abuse letters from an
ISP I start thinking if this is an other measure to damage guard/hsdir
flags. Beside the enormous consumption of cpu resources.
I hope this helps.
[TAP 1] https://i.imgur.com/jDj3M5W.jpg
[NTO
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi everybody
Is there an assembly or room for a concourse of Tor people?
Some coordinates like room number and utc would be apprechiated.
Hope to see you folks there :)
- --
Cheers, Felix
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
irst ACK and RTT)
If on Freebsd, is "mbuf clusters in use" (netstat -m) moderate ?
Do you get "kern.ipc.nmbclusters limit reached" in messages ?
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://
> If you are running a relay version >= 0.3.2.x (currently 281 relays in the
> network), please update as soon as you can with the latest tarball or latest
> git tag.
Update as well if HSDir is still present? The network might loose the
rare ones.
--
C
failed: Dec 21 16:35:33.000
> [warn] 17 connections died in state connect()ing with SSL state (No
> SSL object) Dec 21 16:35:33.000 [notice] Tor has successfully opened a
> circuit. Looks like client functionality is working. Dec 21
> 16:35:33.000 [notice] Bootstrapped 100%: Don
l is much lower than for a regular Tor
client.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
n the
remove/killing comes along.
> Another possibility is that Tor is failing to cleanup inactive circuits but
> with more information, we can eliminate options more easily.
What can I do ? The relay is still on with 3.4 GB. But circuits are
ong queues. (This behavior is controlled by MaxMemInQueues.)
Dec 14 00:30:22.000 [notice] Removed 528 bytes by killing 509 circuits;
0 circuits remain alive. Also killed 0 non-linked directory connections.
--
Thanks and cheers, Felix
___
tor-relays mai
ing NAT; as far as I know,
> LeaseWeb does not use NAT, and Online.net only uses one-to-one NAT.
Good point. A general blocking rule should be smart enough to enable NAT
clients anyway ?
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@
ion.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
her too many statefull connects.
The ips might not be evil.
Heavy action can be you purge them or tcpdrop(8) before they hurt. Or
connection limit by ip per firewall.
--
Good luck and cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproje
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Am 27-Sep-17 um 08:19 schrieb teor:
>
>> On 27 Sep 2017, at 04:46, Felix
>> wrote:
>>
>> Sep 26 18:59:28.000 [notice] Removed 106528 bytes by killing
>> 14408 circuits; 0 circuits remain alive
>
> If you h
9:37.000 [notice] Removed 4624 bytes by killing 115
circuits; 0 circuits remain alive. Also killed 1 non-linked directory
connections.
[] https://
lists.torproject.org/pipermail/tor-relays/2017-July/012624.html
- --
Cheers, Felix
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAA
ate 20/10,overload )
# release the blockDIR after some hours
pfctl -t blockDIR -T expire 7200 # hourly cron job
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[warn] Your computer is too slow to handle this many circuit creation
requests! Please consider using the MaxAdvertisedBandwidth config option
or choosing a more restricted exit policy.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproje
Zlib 1.2.8, Liblzma
5.2.2, and Libzstd 1.2.0.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
oth libraries available, it will use either one
> when appropriate.
>
> Of course, we can only use these compression formats when both sides
> support them.
Thanks. Clear to me. So 'Liblzma N/A' should not be an issue.
--
Cheers Felix
_
ep 2008) I find it
un-maintained, old and Tor does not configure for it:
checking for LZMA... no
configure: WARNING: Unable to find liblzma.
checking for ZSTD... yes
Is there a better lzma port ?
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@li
b (OR-type):
Tor 0.3.1.2-alpha (git-61625b8f26384a4a) running on
FreeBSD with Libevent 2.1.8-stable, OpenSSL LibreSSL 2.5.3, Zlib 1.2.8,
Liblzma N/A, and Libzstd 1.2.0
--
(And why says the notice message "OpenSSL LibreSSL" ?)
Cheers, Felix
__
Uhh. Wasn't there a transition to use self reported bw below some
threshold number ?
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
chapter 4.3.)
That's old school - how we saved bandwidth in ancient times :)
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
rsions please check ports/UPDATING,
libevent is 2.1.8 now.
--
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
://
atlas.torproject.org/#details/6B7191639E179965FD694612C9B2C8FB4267B27D
--
Best regards, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Please check out
https://
metrics.torproject.org/userstats-relay-country.html?start=2015-10-22&end=2017-01-29&country=ae&events=off
vs
https://
metrics.torproject.org/userstats-relay-country.html?start=2015-10-22&end=2017-01-29&country=all&events=off
--
I this cool or not?
Hi diffusae
> The only warning I have found close to it:
>
> "Jan 13 11:08:46.000 [warn] Your system clock just jumped 216 seconds
> forward; assuming established circuits no longer work"
>
> That could be due to the IPv4 autodetection? Maybe I should explicitly
> set the Address option in torrc?
https:// consensus-health.torproject.org/
(observed 2017-01-03 16:00:00 and 2017-01-03 17:00:00)
shows
* dannenberg: Missing entirely from consensus
* faravahar: Missing Signature! Valid-after time of auth's displayed
consensus: 2017-01-03 15:00:00
* moria1: Sees only 2620 relays running
Is htt
scrub in all
nat pass on $ext_if from $NET_JAIL to any -> $IP_PUB
rdr pass on $ext_if proto tcp from any to $IP_PUB port $PORT_TOR_JAIL ->
$IP_JAIL_TOR port $PORT_TOR_JAIL
That looks good.
There is no "pass out quick" or "pass out on" statement?
Sure, there is.
pass out on $ext_if proto { t
> Relays do not publish descriptors until their ORPort and DirPort are
reachable.
> What do I have to do - how to best set-up a decent strong firewall
on a freeBSD Exit?
If you run packet filter pf do you want to post the outputs to
'tor-relays' or better to 'lists.nycbug.org/pipermail/tor-bs
Am 01.11.2016 um 13:19 schrieb Vinícius Zavam:
2016-10-31 20:22 GMT-03:00, Felix :
Am 31.10.2016 um 23:40 schrieb Vinícius Zavam:
2016-10-19 2:30 GMT-03:00, teor :
On 19 Oct. 2016, at 16:25, Felix wrote:
Hi everybody
May be someone can help with this warning:
The security update
Am 31.10.2016 um 23:40 schrieb Vinícius Zavam:
2016-10-19 2:30 GMT-03:00, teor :
On 19 Oct. 2016, at 16:25, Felix wrote:
Hi everybody
May be someone can help with this warning:
The security update (Tor v0.2.8.9 running on FreeBSD with Libevent
2.0.22-stable, OpenSSL LibreSSL 2.4.3 and
mber on tor-talk, so that poster can provide
more details?
Might be.
--
Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
the warning disappeared.
What can I do?
The warning is reproted in tor-talk:
https:// lists.torproject.org/pipermail/tor-talk/2016-October/042425.html
--
Best regards, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https
'Exit' iff it allows exits to at
least two of the ports 80, 443, and 6667 and allows exits to at
least one /8 address space.
-- https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n2133
felix
___
tor-relays mailing li
r?
https://compass.torproject.org/ supports searching by AS and grouping
relays by AS.
felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi
I stumbled over [1]. As I operate Doedel26 I checked DownloadExtraInfo
was default. After change in torrc to 1 and reload 'cached-extrainfo'
showed up in /var/db/tor/.
Can someone please advice how to deal with it ?
Best regards, Felix
[1] https://trac.torproject.org/projects/
Hi
I'm happy to bring in the relay Doedel22
'8FA37B93397015B2BC5A525C908485260BE9F422'.
Best regards, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
1 - 100 of 115 matches
Mail list logo