>> What are the exact regulations in your country?We are starting a project in
>> Australia regarding running exit nodes. Have reached out to law enforcement
>> and Electronic Frontiers Australia, awaiting further information. In
>> addition we have someone who has had a takedown request from
On Mon, 10 Feb 2014 16:04:56 +
George Kadianakis wrote:
> Greetings,
>
> a few days ago we integrated ScrambleSuit to obfsproxy. ScrambleSuit
> is a pluggable transport by Philipp Winter; you can find more about it
> at: http://www.cs.kau.se/philwint/scramblesuit/
>
> If you are running a b
On Wed, 12 Feb 2014 18:29:26 +
Matt wrote:
> I installed obfsproxy through pip. Running Tor 0.2.5.1, I'm seeing
> this message:
>
> [warn] Managed proxy at '/usr/local/bin/obfsproxy' failed the
> configuration protocol and will be destroyed.
>
> That doe
On Thu, 13 Feb 2014 18:10:38 +
George Kadianakis wrote:
>
> Hm, the "Could not set up listener" error message usually appears when
> something is already listening on the port that obfsproxy wants to
> bind to (Twisted throws the error.CannotListenError exception).
>
I managed to avoid the
used by the relay?
>
First thing to do would be configure Tor to log to a file and to read
that file. You can check it to see if Tor logs any issues, and every 6
hours Tor will log bandwidth usage information.
Matt
___
tor-relays mailing
#x27;re being dumb for blocking your
IP when it is impossible for abusive traffic to come from your relay.
Some webmasters who don't understand Tor do that, but there's not really
anything we can do. Best I can suggest is you try talking to them, which
isn't a very satisfying suggestio
> a recommended version.
>
> - Andreas
>
When I build a release version of Tor from git, I do so from the tags
(like "tor-0.3.1.9"). They have the proper version names.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://
their torrcs.
Thank you for running a relay. If you haven't read this blog post yet,
you may want to.
https://blog.torproject.org/lifecycle-new-relay
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 2/16/18 12:23, nusenu wrote:
> I was wondering if these unfriendly tor clients are using tor's default
> path selection or something else.
>
> If they do tor exit relays would have much smaller values in their DoS stats,
> right?
>
> Would any tor exit operator (listed bellow) running 0.3.3.2
d right now. What little that can be
done, is being done.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Things will be back to normal "soon."
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ped
> down - so there'S no strong correlation IMO.
>
>
Does there have to be a correlation between the number of Tor users and
the relays updating to versions including DoS migitaion?
Couldn't the extra abusive users have just gone away, now that they
ameserver warns/notices are at all related to the DoS (that now
seems to be over). I've seen those on my fast relays for ... ever (the
last year).
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
consensus-health.torproject.org/consensus-health-2018-03-23-15-00.html#B33BFA9AA0005730C1C0E8F7E6F53CF3C5716BD6
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 3/23/18 12:55, victor...@riseup.net wrote:
> El 23/03/18 a las 12:34, Matt Traudt escribió:
>>
>> Does your relay do both IPv4 and IPv6? Did your IPv4/6 address change?
>>
>
> Thanks. I haven't realised there is a problem with its IPv6 address,
> even if
per serious bugs pop up that often.
For example, if TROVE-2018-002 as described here[0] is really only
capable of crashing a relay, then I wouldn't say your traffic is less
secure because you're using a relay on 0.3.2.9 instead of 0.3.2.10.
No Tor does not take relays' versions into ac
/lists.torproject.org/pipermail/tor-relays/2018-April/014982.html
It's hard/impossible to give you an exact time. Please just be patient
and don't sweat little things like what flags you have from day-to-day.
And thanks for running a relay!
Matt
_
olute fastest relays get anywhere near
that[0]. Plus, you're a bridge, and bridges don't see as much use as relays.
Thank you for contributing to Tor.
Matt
[0]: https://metrics.torproject.org/rs.html#toprelays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
; instead of literally "control who can even attempt to log in".
I think they are still worth mentioning.)
Hope that helps.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
y also vary wildly in how
much they are used. Just look at this[0] relay's 1 year graph.
If after a few months you still are using a small part of your available
NIC speed, you should consider running a second relay on the same
machine. You can run two relays per IPv4 address.
tand out.
If you have properly configured MyFamily on your relays, your Tor client
may try to prevent you from using multiple relays in the same family on
a circuit.
Hope that helps.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
ht
way to do that?
>
No there is no way to do that.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
al.html.en
> can i set in my "torrc" file what ip i dont want/want to connect me?
>
This sounds like a duplicate of your question from a few weeks ago. I
answered this here[1].
[1]:
https://lists.torproject.org/pipermail/tor-relays/2018-April/015068.html
Matt
formation provided, most likely port 9001 is not
forwarded correctly at your router.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
.org/projects/tor/wiki/doc/ReducedExitPolicy
>
I did too. Perhaps even from the same source...? Not sure if that can be
shared so I just won't.
My exit isn't in the US, but I am.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.
tigation stuff, relays wouldn't allow themselves
to be used as the only hop in a circuit. Apparently this affects onion
service circuits too.
If you want a single-hop proxy, then you don't want Tor.
Matt
___
tor-relays mailing list
tor-rel
On 6/26/18 10:29, Nagaev Boris wrote:
> On Tue, Jun 26, 2018 at 5:27 PM, Matt Traudt wrote:
>> On 6/26/18 10:16, dave levi wrote:
>>> I'm testing few things in Tor and I noticed that if im changing(from the
>>> source code) the number of hop's(nodes) to be
se options were removed in May 2017. Setting them has no effect.
https://trac.torproject.org/projects/tor/ticket/22060
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ic, you already stopped supporting FFS.
Personally I'd rather support 99.9% of Tor users (made up percentage)
forever than support 100% of Tor users for a limited time.
I don't run the default exit policy on all my relays and I don't see
anything wrong with my decision.
Hope that h
r distro actually do it?])
Don't fret about uptime or flags. Updates -- both for Tor and your OS --
are more important.
Thanks for running a relay.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
o feel free not to."
>
> Thanks for running a relay!
> --Roger
Also, you won't set DirPortFrontPage since you aren't an exit. (This is
the only way I could come up with why asking about DirPort in the
context of exit vs non-exit made sense)
Hope that helps
Matt
__
urs.
Check Tor's log for errors.
https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#Verifythatyourrelayworks
If you configured an IPv6 ORPort in addition to the (required) IPv4 one,
it must be working or else your relay will be considered down.
Matt
_
The dirauths don't serve onion service descriptors.
https://gitweb.torproject.org/torspec.git/tree/rend-spec-v2.txt
(and -v3)
Matt
On 08/20/2018 07:38 PM, Nathaniel Suchy wrote:
> Except perhaps the directory authorities?
>
> On Mon, Aug 20, 2018 at 7:19 PM, Alec Muffett <
On October 4, 2018 4:54:54 PM EDT, Nathaniel Suchy wrote:
>We wouldn’t have to make these threads if community members like Isaac
>didn’t make threads about a lack of response from one team member.
>
>We could:
>A) Inform everyone
>B) Inform a few customers and hope we don’t miss any
>C) Ignore th
don't set any options that it doesn't tell you to set. And don't set
options you don't understand. `man tor` can help you understand what
you're setting
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
running a non-exit relay. The logs you
shared don't have the lines that I'd expect for any type of relay. Is
your torrc located at /etc/tor/torrc? Did you start Tor via systemd like
'sudo systemctl restart tor' or from the command line manually?
Hope that helps.
Matt
___
On 11/11/18 5:40 PM, DeMarcus Sullivan wrote:
> I am running the latest version on Tor 8.0.3 on my Windows desktop. I
> would like to run a non-exit relay 24/7 and I'm having trouble finding
> the step-by-step process to do so. Before I could just copy amd paste
> the torrc configuration text in
ut modifying Tor's source code.
> 2-What is the difference between circuit and channel in relays?
> I'm looking forward to hearing from you!
> thanks!
Channels are a thin wrapper around connections (which themselves are a
nice wrapper around TCP sockets) in Tor's source cod
Because 0.3.4.9 is out.
Sometimes the old version will stop being recommend before the new
version is available in various repositories, but that doesn't seem to
be the case here. I see 0349 for bionic on deb.tpo
apt update, apt upgrade, systemctl restart tor
Matt
On 12/20/18 6:21 AM, Lan
picks at random (technically, I
think it lets the kernel pick and the kernel picks at random, but the
outcome is the same).
So you need to check Tor's logs on the bridge to see what it picked.
Asking Tor over its ControlPort is another option,
On 12/20/18 09:25, Toralf Förster wrote:
> On 12/20/18 3:13 PM, Matt Traudt wrote:
>> "ORPort auto" means let Tor pick. It picks at random (technically, I
>> think it lets the kernel pick and the kernel picks at random, but the
>> outcome is the same).
of the pipe.
In Tor, you can send traffic into a circuit that isn't just destined to
go out the other end. You can send traffic into a circuit that is
destined for one of the relays in the middle. Thus not all the traffic
makes it to the end of the circuit.
Matt
On 1/18/19 3:45 AM, mar
On 5/21/19 10:38, t...@blicky.net wrote:
> Hi,
>
> On 2019-05-21, gus wrote:
>> [2]
>> https://gitweb.torproject.org/tor.git/tree/src/or/fallback_dirs.inc
>> [3]
>> https://gitweb.torproject.org/tor.git/tree/scripts/maint/fallback.whitelist
>
> Both of these 404 for me. Where can I find the refe
ow bursts up to 200KB/s (1600Kbps)
DirPort 9030 #
ExitPolicy reject *:* # no exits allowed
ExitPolicy reject6 *:*
Any suggestions appreciated.
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
___
tor-
?
If I can't access the file system is there any way to get what I need from
"somewhere" to retain my fingerprint?
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
http://ecansol.com
On Sun, May 26, 2019 at 2:58 AM wrote:
&g
puu.sh/DA4Sh/6e27417c74.png
I tried to run chutney tests to see what hardware supports but haven't
quite figured out what the command line I should be using is.
Any help with that would be appreciated.
Thanks,
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and
ut
that's still way more than 9 :-D
Guess we'll see what happens.
I didn't see if anyone answered if I need a separate IP or if I can
create another tor instance on different ports but on the same IP, to
increase the load I'm handling.
Thanks,
Matt Westfall
President &
ding- in a whole ASN though,
you'll probably just have to wait for it to filter through.
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
-- Original Message --
From: "teor"
To: tor-relays@lists.torproject.org
Sent: 6/2/2
h, but mentally we should be adding "per second"
for torrc options like RelayBandwidthRate.
100 Megabits per second is a reasonable RBR setting for a reasonable
relay. 100 Megabits per month is a useless relay.
Hope that helps.
Matt
___
tor-rel
the relay bandwidth & burst rates.
It will prevent it from using more than 100 Mbps so you won't go over.
Thanks,
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
-- Original Message --
From: "Keifer Bl
Just set your exit relay DNS to 8.8.8.8 and 1.1.1.1 I mean dns traffic
isn't bulk traffic, let google and CloudFlare do the "work"
Thanks,
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
-- Original Message --
From:
and don't) use windows, so keep that
in mind.
https://tor.stackexchange.com/a/16443
Hope this helps, but it probably won't.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
were basically is what it is and I mean we're
still helping the network by running a node,
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
-- Original Message --
From: "Alec Larsen"
To: tor-relays@lists.torproject.org
Sen
he -stable- flag so it's leaned on more.
That doesn't really affect the underlying issue of tor nodes with TONS
of bandwidth not being utilized a little more.
But I'm happy to donate whatever the tor protocol decides it wants to
use :(
Matt Westfall
President & CIO
ECAN Solutio
confirm/verify available bandwidth versus just using whatever 'ol
configuration value is set.
But it's definitely kind of slowed nodes down in general :(
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
-- Original Message -
> You probably want to be scatterplotting a bunch
> of different things and durations on metrics.tpo.
>
> And isolating out path nodes and things from
> whichever it is you're trying to measure.
> Introducing known inputs. Etc.
Thanks for the input. I'm sure our anal
IPv6 at the OS Side is not difficult whatsoever.
My node is running IPv6, I have 2Gbps Comcast Fiber.
It's literally no different than configuring IPv4 other than its
hexidecimal and a lot more digits :-D
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and
141.963
ms
13 2a03:e2c0:bc7::2 (2a03:e2c0:bc7::2) 140.933 ms 141.737 ms 141.245
ms
So perhaps your ISP is wonking with tor traffic as suggested.
Thanks,
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
-- Original Message --
ateam:/etc/network# cat interfaces
iface eno1 inet6 static
address 2001:559:800c:1900::5a02
netmask 126
gateway 2001:559:800c:1900::5a01
dns-nameserver 2620:0:ccc::2 2620:0:ccd::2
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
-- Origina
That's why I personally just disable all firewalls and just configure acls in
vulnerable services themselves.
Don't let mysql listen on anything but local host, server secured lol.
--
Matt Westfall
President & CIO
ECAN Solutions, Inc.
804.592.1672
On August 22, 2019 11:46:44
ng a relay. To a some extent, a relay
existing is the majority of the contribution and the specific amount of
traffic it carries day-to-day is less important.
[0]:
https://metrics.torproject.org/rs.html#details/3DA54600E615E5AF841C03FB81D7321735562B5B
[1]: https://consensus-health.torproject.org/
y from $PLACE,
create a bunch of infrastructure that builds Tor for all supported
platforms reliably and efficiently, use a bunch of signatures everywhere
so nothing bad can happen, done. So easy a caveman could do it, nothing
bad could ever happen, absolutely no downsides, it's $CURRENT_YEAR so
why don't we have this, etc. etc.
--
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Is your node behind a routee/firewall? You most likely need to forward ports in
your router.
--
Matt Westfall
President & CIO
ECAN Solutions, Inc.
804.592.1672
On September 10, 2019 9:46:50 PM EDT, Anonforpeace
wrote:
>Hello:
>
>Hope someone can help me. I'm trying to
have to have a stock car. I can't take my tricycle there. ;-)
--
Matt Westfall
President & CIO
ECAN Solutions, Inc.
804.592.1672
On September 10, 2019 3:43:58 AM EDT, teor wrote:
>
>Hi,
>
>> On 10 Sep 2019, at 14:35, Anon-research
>wrote:
>>
>> Dear
ng
these things.
Matt
On 8/29/19 11:26 PM, AMuse wrote:
> Hi all! I'm curious what y'all think of this situation.
>
> I have SSH open as an exit port on a TOR exit that my friends and I are
> maintaining - and of course it's the #1 offender by far in automated
> abuse no
country while still producing useful statistics.
This tries to protect users in countries with few Tor/bridge users.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I also do -not- get an answer @ that DNS but other domains resolve
https://puu.sh/Ep4Ws/150c13aef7.png
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
-- Original Message --
From: "Geoff Down"
To: tor-relays@lists.torpr
On Sat, Oct 19, 2019 at 04:57:00PM +, nottryingtobel...@protonmail.com
wrote:
> Forgive me if this is a dumb or newbie question, but can DDNS be used with
> either relays or bridges?
No. Bridges and relays are recorded in the directory by IP address, not
hostname.
SSH tunnel if you're going to do this ...
--
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ucky here.
- It's not ideal to be going full tilt all the time. You want to have
some headroom for bursts without causing congestion. Obviously you
aren't even close to that yet.
Thanks for running Tor relays. Sorry I don't have satisfying answers.
Please stick with it and avoid worr
On 11/4/19 4:31 AM, Kolja Sagorski wrote:
> Hello, can anyone help me to backup the fingerprint on debian10?
>
https://2019.www.torproject.org/docs/faq.html.en#UpgradeOrMove
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torpr
bly shouldn't expect constant
usage because there aren't many bridge users.
If Tor hasn't documented the above prominently on its bridge setup
guide, they should. "Why isn't my bridge getting used?" is a FAQ. As
outlined above, there's a lot of possible reasons,
Consensus weight is no lo ger based on advertised bandwidth to prevent abuse.
It is based on measured and observed actual throughput.
--
Matt Westfall
President & CIO
ECAN Solutions, Inc.
804.592.1672
On December 16, 2019 1:30:48 PM EST, Neel Chauhan wrote:
>Hi,
>
>Af
Also you didn't migrate your fingerprint. So it's a new server and will take
weeks if not months for the consensus weight to creep up.
--
Matt Westfall
President & CIO
ECAN Solutions, Inc.
804.592.1672
On December 16, 2019 1:30:48 PM EST, Neel Chauhan wrote:
>Hi,
&
.
> N: Updating from such a repository can't be done securely, and is
> therefore disabled by default.
> N: See apt-secure(8) manpage for repository creation and user
> configuration details.
> $ date
> Mon Jan 6 04:32:36 EST 2020
>
> I have fixed this before but
/bridges, but it seems BBA/BBAv2
would be a worthwhile experiment to see if it improves the browsing experience
for non-western tor users.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo
Cool! What did your testing rig look like?
I suppose the real question is what does the latency/loss profile of the
average Tor (bridge) user look like?
On 1/10/20 8:18 AM, Roman Mamedov wrote:
> On Thu, 9 Jan 2020 00:58:36 -0500
> Matt Corallo wrote:
>
>> BBA should handle ran
s, but it sounds
like there’s no good existing work in this domain?
Matt
> On Jan 10, 2020, at 17:36, Roman Mamedov wrote:
>
> On Fri, 10 Jan 2020 16:24:56 +
> Matt Corallo wrote:
>
>> Cool! What did your testing rig look like?
>
> A few years ago I've go
l the connections use one (or more) circuits reserved for this
bucket's traffic. If I have https://amazon.com open in tabs 4, 5, and 6,
all its state goes into a different single bucket and all the
connections use a different circuit(s) for their traffic.
So just by browsin
ain (e.g. yet
another hobby Tor-powered web crawler or SEO), or by harming its
reputation by "ethically" hacking or vulnerability scanning the web.
You can email me off-list with actual information about what you're
working on if you think it's a good use of Tor a
Is there evidence that the existing router is a bottleneck?
Matt
On 4/29/20 11:13, Secure Node wrote:
> Hi,
>
> I'm hosting 150+ Mb/s relay for a while now:
> https://metrics.torproject.org/rs.html#details/333C874B532B3EA7E1A40980B7656FCAE34E08A9
>
>
> I'm
>exit relays?
https://community.torproject.org/relay/community-resources/good-bad-isps/
> Do they charge based on how much traffic tor will
> generate, or is it a solid $6 per month for their Linux VPS?
That is something best answered by OVH
e subsystem and I'm
sure many of my implicit assumptions are wrong.
Matt
On 5/19/20 11:59, William Kane wrote:
> Okay, so your suspicion was just confirmed:
>
> consdiffmgr_rescan_flavor_(): The most recent ns consensus is
> valid-after 2020-05-19T15:00:00. We have diffs to this c
te that it can and should, initiate
bandwidth tests and report them back to the actual authorities?
Matt Westfall
President & CIO
ECAN Solutions, Inc.
Everything Computers and Networks
804.592.1672
http://ecansol.com
On Sat, Jun 20, 2020 at 5:59 AM Roger Dingledine
wrote:
> On Fri, Jun 19,
any hosting providers by limiting
percentage of relays in a given ASN may be somewhat limiting. If nothing else,
it also captures another useful trait that you don’t want to just bounce your
traffic across five hosts in different OVH datacenters from a traffic
correlation perspective.
Matt
>&g
The Guard flag conditions are
https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n2640
Given you're Fast and Stable, and have a good advertised bandwidth and
weight, then I suspect you simply no longer have a Weighted Fractional
Uptime that is at least the median for "familiar" relays.
T
otice syslog`. I
think (but don't know for sure) adding a `Log` line in your torrc would
override this, since this appears in the defaults torrc.
Matt
On 7/29/20 1:09 PM, Keifer Bly wrote:
> Hello,
>
>
>
> So I am trying to view the tor log file (for how much traffic was sent,
and many
sites forget to enroll themselves in the preload list.
For reference, the first two "probably kinda try to be secure for their users" sites I tried were not on the list:
wellsfargo.com and bankofamerica.com.
Matt
On 8/13/20 5:19 AM, Michael Gerstacker wrote:
https://m
dling replies to their emails they expect others to handle, or does
anyone already have such a list?
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tor exit node operators with similar policies and
collaborating on such blocklists would save all of us with similar policies time.
Matt
On 9/28/20 2:18 PM, Tortilla wrote:
On Mon, September 28, 2020 5:04 pm, Matt Corallo wrote:
Hi all,
I run a few relatively-small exit nodes, and still get a decent
want others to use Tor. So Tor users affected won't be
able to use your bridge anyway.
- Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I'll start dropping your emails" policies, I'm happy to figure out a way to
grow this, but for now I'll note that probably want to just blackhole anything from autogenera...@blocklist.de :).
Matt
On 10/11/20 4:28 AM, Tortilla wrote:
- snip -
Of course, it's important t
#x27;ve said the above, I expect to be corrected. Lol.
Matt
On 1/21/21 7:02 AM, raltul...@posteo.org wrote:
> Hello list,
>
> I'm trying to find out why the server
> (https://metrics.torproject.org/rs.html#details/11DF0017A43AF1F08825CD5D973297F81AB00FF3)
> has lost its stabl
maybe less crazy if it's a bug
on Windows systems only. Running little-t tor manually--as a client or
even as a relay--is much less common on Windows. The thing to try here
is to specify GeoIPFile and GeoIPv6File in the torrc with the paths to
the GeoIP files tor ships with (don't try gettin
, that's a way to get the files.
Matt
[0]: https://www.torproject.org/download/tor/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ontrolPort/ControlSocket, you can
change most options even while the relay is running. These changes are
NOT SAVED to the torrc.
That's what nyx does.
Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 4/23/21 05:01, kathihil...@gmail.com wrote:
> Ubuntu 20.4 on my Digital Ocean droplet needs to be upgraded.
>
> Can the upgrade be done without shutting down the relay. I
> currently have six flags and don't want to loose them. How
> is the upgrade done on a relay that is in operation?
Yo
On 4/26/21 1:40 PM, Keifer Bly wrote:
> So for a little bit over a week now, I have been running a bridge on
> Google Cloud and it has charged less then $5. So, while too expensive
> for running relays, it seems to be an ok service for running bridges on.
Is $0.085/GB (egress) accurate[0]? Mean
it's possible to launch several Tor
> processes, so all cpu x4 cores can be used at same time.
>
Up to two per IP. Note you need to specify separate data directories for
each Tor process.
Be kind and specify them all as family members if you run multiple Tor
relays :)
Matt
signat
is paper[1] shows an attack for harvesting onion
services. It would have been much easier without the 2-per-IP limit.
Matt
[1]: http://ieee-security.org/TC/SP2013/papers/4977a080.pdf
signature.asc
Description: OpenPGP digital signature
___
tor-relays mai
1 - 100 of 165 matches
Mail list logo