Re: [tor-relays] suspicious exit?

2014-06-07 Thread Michael Wolf
On 6/6/2014 7:39 PM, JB wrote: > I just setup my relay node today, and am keeping a hawkish(ish) eye on > traffic And noticed a flurry of activity from SSH port (22) at > 5.104.224.5 - which is listed as an exit. That exit node uses port 22 as its ORPort (where other relays send Tor traffic).

Re: [tor-relays] can the old compromised keys be invalidated, "named" be recovered

2014-04-29 Thread Michael Wolf
On 4/29/2014 6:06 PM, starlight.201...@binnacle.cx wrote: > I just read that the relay can't get its > old name back for six months now that > the keys have been changed due to > Heartbleed. The "Named" flag is being done away with. Use your old nickname, or whichever nickname you want... it won'

Re: [tor-relays] SSH scans from Tor exit

2014-04-28 Thread Michael Wolf
On 4/28/2014 10:04 PM, Zack Weinberg wrote: > For what it's worth, after complaints from campus IT we also wound up > blocking SSH in the CMU Tor exit's policy. It's a shame we can't help > people do sysadmin stuff and whatnot anonymously, but the port scans > do seem to happen quite often. > > z

Re: [tor-relays] Running tor-arm under restricted user [WAS: Relay down, "rejected", help]

2014-04-20 Thread Michael Wolf
On 4/19/2014 4:50 PM, Michael Wolf wrote: > It's worth noting that, under Debian (Jessie, others?), arm will be > unable to read tor's logs if you run it as your user. The default group > for /var/log/tor is 'adm'. You'll have to: > > $ sudo chgrp -R deb

Re: [tor-relays] Relay down, "rejected", help

2014-04-19 Thread Michael Wolf
On 4/19/2014 4:16 PM, Roger Dingledine wrote: > On Sat, Apr 19, 2014 at 09:19:26AM -0700, kbesig wrote: >> Install of tor-arm went well enough, no error msg's. >> >> ~$ sudo -u debian-tor arm > > You're using arm dangerously. See item #14 on > https://www.torproject.org/docs/tor-relay-debian > for