Hey there,
Debian offers unattended upgrades for specific packages:
https://wiki.debian.org/UnattendedUpgrades
If you follow this sites instructions carefully, then you don't have to worry
about updating Tor manually anymore (but you would want to if there is a
significant security issue that
Hi,
I think this started with release 0.4.8.10, but both of my Tor relays no longer
reload their config when doing for example:
- systemctl reload tor@exit
Here is the relevant part of the unit file:
> [Unit]Description=Anonymizing overlay network for TCP
> After=syslog.target
)
Everything else seems fixed.
Regards,
George
On Thursday, January 11th, 2024 at 2:18 AM, George Hartley via tor-relays
wrote:
> Hello,
>
> for about 3 months I have been hosting two Tor relays:
>
> https://metrics.torproject.org/rs.html#details/AF42E6C77196A37F041A1A1E9
Hello,
for about 3 months I have been hosting two Tor relays:
https://metrics.torproject.org/rs.html#details/AF42E6C77196A37F041A1A1E953E51B4656BDC1B
https://metrics.torproject.org/rs.html#details/7F7D1A5BE88FA7C9358955705AE7AFA61EEDA2B0
After doing system maintenance (mainly upgrading
Also,
it should not nearly be as frequent, it happens maybe every 30-45 minutes on my
two relays (one guard, one exit).
Try running Tor natively (you can just move it to a native Linux installation,
by preserving the "`keys/ed25519_master_id_secret_key`" and
`"keys/secret_id_key`" in your Tor
Dear Jeff Blum,
> Yes, I am seeing something similar on 0.4.8.9 (and potentially earlier
> versions as well, not 100% sure when it started). I upgraded to 0.4.8.10
> today hoping it would go away, but I'm seeing it again. Watching in nyx
> (screenshot of bandwidth graph attached), reliably
7 d a y s.
On Monday, January 8th, 2024 at 9:54 AM, 0tpcqovw--- via tor-relays
wrote:
> I think it's after 30 days it gets automatically removed.
> Malcolm
>
>
> On Mon, Dec 25, 2023, 15:25 nemeto via tor-relays
> wrote:
>
> > DuckDuckGo did not detect any trackers.
> >
> > Hi,
> >
- Is it possible to immediately remove my relay from relay search on Tor
Metrics?
No.
- If not, when will my relay be removed from the relay list?
Generally 7 days after your relay last uploaded it's descriptor.
Happy holidays,
George
On Sunday, December 24th, 2023 at 11:10 AM,
.
>
> I'll probably remove all limits for January and just see how much traffic
> gets transferred.
>
> ---
> Thanks,
> Dan
>
> On Thursday, December 21st, 2023 at 8:04 AM, George Hartley via tor-relays
> tor-relays@lists.torproject.org wrote:
>
>
>
>
any
security, performance or privacy implications, then please maybe just make it a
harmless information message.
Regards,
George
On Monday, December 18th, 2023 at 11:12 AM, trinity pointard
trinity.point...@gmail.com wrote:
> Hi,
>
> this looks related to TROVE-2023-007 /
> ht
Hi Dan,
>1 - Is it better for the network if the relay is active 24/7, even if
>sometimes it's much slower?
Generally according to the relay requirements a relay is considered useful if
it can at least route 2MB/s or 16 MBit/s steadily.
However, I think you should get away with 1MB/s or 8
Please read the code, not only Tor's code, but also OpenSSL's code.
Yes, AES is not displayed as engine itself, however, it still does not seem to
use aes-ni instructions unless told to initialize engines via the code I
deducted.
If this proves anything, I ran an Exit Relay in 2013 before my
Hello Likogan (you did not specify a name, so I just took your domain name).
First, lets look at issue number one:
If your Tor Exit is using ~50% of the entire CPU (VM or dedicated server?)
while only routing 6 Mbps, then you are likely not using hardware AES
acceleration (aesni).
For
Hi,
while going through journalctl I noticed the following entries from my exit
relay and wanted to report this non-fatal assertion.
I also host a Guard relay on the same VM and IP, and it did not yet assert that
message.
The full assert() with the stack-trace is as follows:
> Dec 14
This is to be expected, you get 100kB/s with iat-mode=2, and around
256-1024kB/s with iat-mode=1, however since most sites I load are just HTML/CSS
with little pictures, it is no big issue.
I would consider taking the speed penalty for more protection (as a research
paper also pointed out).
Regarding web-servers hosting Tor relays, it is much more likely for them to
sit behind a CDN such as Cloudflare for DoS protection and delivery
optimization.
Other services of course, however..
--- Original Message ---
xmrk2 via tor-relays schrieb am Sonntag, 11.
Juni 2023 um 1:46
ty for a dubious and poorly understood
>
> privacy gain
>
> https://lists.torproject.org/pipermail/tor-relays/2021-February/019370.html
>
>
> I personally leave my bridges as they are, without iat_mode.
>
>
> Best,
>
> Fran
>
>
>
>
Hello dear relay and bridge hosts,
recently a paper was published, describing a traffic confirmation attack called
DeepCorr, which works against Tor users and as such, also hidden services.
The attack allegedly had success rates of up to 96% percent.
It is being worked on and listed here as a
18 matches
Mail list logo