(2) Rotate to fresh identity keys for moria1, the directory authority
that I run. In early November 2022 there was a remote break-in to the
computer running moria1. Based on the evidence and the type of attack,
I believe it was a standard automated attack -- that is, I think they
weren't targeting
Hi Toralf
All F3 Netze relays together are using one unbound with 4 CPU Cores.
Each consumes about ~20%. It's a Xeon(R) CPU E3-1230 V2 @ 3.30GHz (w/o
Hyperthreading).
Tim
Am Samstag, den 22.08.2020, 09:12 +0200 schrieb Toralf Förster:
> I do wonder about a reasonable number.
>
&g
et any response. And it looks as they didn't
update since then.
I will check your list for the 185.220.100.0/22 prefixes and report in the
ticket, later.
Tim
Am 12. Februar 2020 16:05:04 MEZ schrieb Karsten Loesing
:
>Hi relay operators,
>
>as you might have heard, MaxMind has ch
; to all people and
orgs that provide us with exit resources. Besides the resources, these
providers handle all the troubles with police and other annoying things
and that is the really hard work of an exit relay.
We need all exits, whether high or small capacity. Don't we?
Tim
signature.asc
s too evil for our cpu capacity.
Sure it is nice to help scientist to scan the networks, bus .. realy ..
don't they have enough capacities at the universities?
Tim
signature.asc
Description: This is a digitally signed message part
__
Hi
Just short: i noticed the high rate of ssh abuse mails. So I started to test to
reject (via tor config) the ssh port. Traffic and load now looks a lot better.
So it seems to be a brute force attack which slows down the exit due to too
much too small packets.
Tim
PS: @teor: did you forgot
l#search/family:719FD0FA327F3CCBCDA0D4EA74C15EA110338942
Kind regards
Tim
signature.asc
Description: This is a digitally signed message part
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi
We don't need a funding platform. We need someone who
* maintains the social contacts
* gives interviews
* does the tax declaration
* ... and so on ...
Tim
Am Freitag, den 02.08.2019, 08:44 -0700 schrieb Mitar:
Hi!
Yes, running a non-profit for you is not free (accounting costs, at
) The one reduces it's capacity
I, personally, prefer a).. I don't think b) is the way to go because
the capacity is needed.
Tim
>
> Although the DNS dependencies are bad too.
>
>
> On 7/11/19 6:31 PM, nusenu wrote:
> >
> >
> > https://medium.com/@nusenu/w
erf.py b/relay_perf.py
index 52b5444..cb54371 100644
--- a/relay_perf.py
+++ b/relay_perf.py
@@ -14,7 +14,7 @@ from twisted.web.client import readBody
def write_json(filestem, data):
now = datetime.datetime.now().strftime("%Y%m%d_%H%M");
-print(data)
+#print(data)
jsonStr = json
ware. But money is a limiting
factor. :(
Kind regards
Tim
Am Freitag, den 28.06.2019, 20:16 + schrieb nusenu:
> Dear Exit relay operators,
>
> first of all thanks for running exit relays!
>
> One of the crucial service that you provide in addition to
> forwarding
> TCP
On Fri, Nov 16, 2018 at 10:13:32AM +1000, teor wrote:
On 16 Nov 2018, at 06:22, Keifer Bly wrote:
But is it normal for the fast flag to be off and on? Thank you.
Yes. Change is normal.
Embrace change. Do not worry.
this one made me laugh.
nice one! :)
__
On Sun, Nov 04, 2018 at 05:55:02PM +0100, niftybunny wrote:
you have removed it from your torrc under MyFamily ?
Yes I did in the currently active relay. I don't think I had deleted it
from MyFamily of the other relay before I shut it down though.
-Tim
On 4. Nov 2018, at 17:52
th now and
won't be coming back, I wonder when it stops appearing as an alleged
family member on the metrics page? (it is also no longer listed as
MyFamily).
-Tim
[1] 2C76951164C5184A3B8B7CC1914B34E4622B225F
[2]
https://metrics.torproject.org/rs.html#details/B183A69592D2E8C
orrc as well, but this didn't avoid getting this
message once.
Kind regards,
Tim
[0] tosk B183A69592D2E8C8C487C054D0849E3C9561DC11
[1] kali 2C76951164C5184A3B8B7CC1914B34E4622B225F
___
tor-relays mailing list
tor-relays@lists.torproject.org
http
o Results found!"
<https://metrics.torproject.org/rs.html#search/Chiron420%209C7BB4BCB58AC876D83B67277A0CF3BC73F4FDF6>
Is this typical or might there be something awry in my setup?
wait at least three hours.
https://blog.torproject.org/lifecycle-new-relay
-Tim
__
ook and "ip address" output,
> so I can try to reproduce? (also off-list)
> (if you have more than a single default route/interface also the
> routing
> table)
I added the outputs to the issue.
Thanks
Tim
> thanks,
> nusenu
>
>
signature.asc
Description: This is a
Hi Nusenu
Am Samstag, den 24.03.2018, 13:51 + schrieb nusenu:
> Hi Tim,
>
> > > I saw you recently added 8 new
> > > tor exit instances and wanted to thank you for
> > > contributing exit bandwidth to the tor network!
> >
> > At the moment th
tances on the main
IP. So I manipulated the template a bit, so that the 'Address'-config
is added to the torrc. I'm currently unsure if it's a bug or if I've a
misunderstanding. Still learning.. ;)
> thanks for joining the network and happy packet forwarding!
Please don
r run master builds after
> https://gitweb.torproject.org/tor.git/commit/?id=ab9976b7245f05a97e0285265c4cfcb225bd48e2
> https://deb.torproject.org/torproject.org/dists/tor-nightly-master-stretch
>
> stay safe,
> nusenu
>
--
Tim Semei
Op 07-12-16 om 23:50 schreef Alex Haydock:
AMD is no escape, as they have an equivalent in the form
of their "Platform Security Processor"
I believe[1] the Athlon 5370 that AMD released this year is without PSP.
Suits small form factors and has good performance for the mere 25 Watt
that it us
ably should also filter entries where two out of guard_prob,
> middle_prob and exit_prob are 0 since that means that (1) is never the
> case - iff onionoo is right about these probabilities.
>
>
>
> ___
> tor-relays mailing li
n87
>
> Kind regards
> Tor-node.net
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90
tors from the
new authority, but as far as I know, bridge descriptor updates aren't essential
for clients to continue to use a bridge. (I may be wrong about this.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
OTR 8F39BCAC 9C9DDF
they should only go down once per month.)
It's also worth noting that the Tor network only uses about 50% of the
advertised bandwidth.
But this is a good thing, because it helps reduce latency and congestion.
https://metrics.torproject.org/bandwidth.html
Tim
>
>
> On Thu, Jul 14
test-network-all".
https://gitweb.torproject.org/chutney.git/
If you do find that it's a programming error in tor, feel free to submit a
patch, or a unit test that would catch similar errors in the platform string.
https://trac.torproject.org/projects/tor
Tim
>
> T
kely a multiple
of 512 bytes (from cells) on the way out, but can be any size (from the remove
website) on the way in.
I don't think it's an issue.
Tim
>
> --
> Toralf
> PGP: C4EACDDE 0076E94E, OTR: 420E74C8 30246EE7
>
>
> On 8 Jul 2016, at 09:48, Tim Wilson-Brown - teor wrote:
>
>
>> On 8 Jul 2016, at 09:41, nusenu wrote:
>>
>> Hi Seongmin,
>>
>> out of curiosity I was wondering whether your so called tor "platform"
>> string ("??B`?\u000
ys mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message
rking on it, and it's called "next generation hidden services".
Until then, relays get banned for this behaviour.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6
> On 5 Jul 2016, at 19:23, Toralf Förster wrote:
>
> Signed PGP part
> On 07/05/2016 04:01 AM, Tim Wilson-Brown - teor wrote:
> > In 0.2.8.3-aplha, "clients, onion services, and bridge relays always use an
> > encrypted begindir connection for directory requ
connections are made over the ORPort.
This means that in 0.2.8 clients no longer use any DirPort, and relays only use
the IPv4 DirPort.
IPv6 clients and bridge clients use the IPv6 ORPort.
In 0.2.7 and before, clients and relays only use the IPv4 DirPort.
IPv6 bridge clients use the IPv6 ORP
estions for small changes before merging.
>
> Thanks,
> Iain.
>
> [1]: https://trac.torproject.org/projects/tor/ticket/5430
> [2]: https://trac.torproject.org/projects/tor/ticket/6787
> ___
> tor-dev mailing list
> tor-...@lists.t
t;
> [1]: https://trac.torproject.org/projects/tor/ticket/5430
> [2]: https://trac.torproject.org/projects/tor/ticket/6787
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/m
> On 29 Jun 2016, at 16:57, Petrusko wrote:
>
> Thx Tim for validating this torrc configuration, before deploying it.
> Ok, I'll remove those 2 lines. (but it can be helpful for Tor network on
> fast bridges ?)
No, there are only 10 authoritative directories in the
e something to add, to remove ?! Another eye is always cool to be sure
> !
>
> Many thx for your lights :)
>
> --
> Petrusko
> PubKey EBE23AE5
> C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.or
similar for "involuntary" FTP servers before. Bonnet?
Or a honeypot. Or a series of cloned servers. It's hard to tell.
But there do seem to be a large number of them, 55 in a recent consensus.
And no contact info, either.
We might want to remove these relays from the network before th
o replicate the same node and re-use the same
> keypair in multiple physical locations for the same anycast IP, but I'm
> not sure this is a good idea.
It would make the keys more vulnerable, and it also interferes with Tor's
canonical connection code.
(And likely o
fallback directory mirror.
Is the new address permanent for the next two years?
If so, we can add it to the list for consideration in 0.2.9.
Tim
>
> On 2015-12-17 15:07, Nick Mathewson wrote:
>> TL;DR: Stable non-exit relays
backup before the updates?
Also, since your relay was on the fallback directory list for 0.2.8.4-rc, and
its fingerprint has changed, we're going to remove it.
Once you've sorted out this issue, let me know, and I'll put it on the
whitelist for consideration in 0.2.9.
Tim
> Th
node) by the directory
authorities if it has enough stability and bandwidth over time. For more
information, please read:
https://blog.torproject.org/blog/lifecycle-of-a-new-relay
Your relay is already a directory mirror, because you have configured a DirPort.
Tim
Tim Wilson-Brown (teor)
t
ust change the tor
startup script and torrc.
Tim
>
> Sebastian
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brow
53 is only useful for clients that want to run their own DNS over TCP, or use
port 53 for something else.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
lays-boun...@lists.torproject.org] On Behalf
> Of Tim Wilson-Brown - teor
> Sent: 20 May 2016 16:49
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] What's this Abuse
>
>
>> On 20 May 2016, at 11:12, Dr Gerard Bulger wrote:
>>
>>
>> M
don't want our mailing list messages to go against this goal.
(Even if the Internet users involved are not using Tor or another IP
anonymisation method.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
si
Tor users, it's for Tor relay operators.
For any more emails on this question, please reply to
tor-t...@lists.torproject.org.
Have you tried whitelisting the other processes that tor runs, like tor.exe?
You might also need to ask Norton how to properly whitelist Tor Browser, rather
than askin
> On 2 May 2016, at 09:51, eliaz wrote:
>
>> On 5/1/2016 4:52:12 AM, Tim Wilson-Brown - teor (teor2...@gmail.com) wrote:
>>>> On 1 May 2016, at 16:52, eliaz wrote:
>>> =20
>>> =20
>>>> On 4/30/2016 7:33:26 PM, Moritz Bartl (mor...@tors
;catch all" than tor-relays.
> [snip]
>
> I neglected to mention that tor crashes upon restart when I'm running my
> bridge. Restarting in client mode works fine. So should I send the
> details to tor-talk or tor-relays?
Please log a bug at https://trac.torproject.org
he proxy service access to all your Exit's
traffic.
>
> Gerry
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (
orities.
Relays which aren't running are excluded from the consensus.
Clients don't choose them any more.
Atlas shows a historical view of relays that have been down.
Look in the "Current Status" column to see if the relay is running.
Tim
>
>
>
> Le 28/04/2016 1
ts will stop using it when they find it's down, or within 5 hours.
Tim
>
>
> -Original Message-
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
> Of Tim Wilson-Brown - teor
> Sent: 28 April 2016 10:30
> To: tor-relays@lists.torprojec
t 30 seconds) for clients to choose a new guard.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relay
> On 28 Apr 2016, at 19:18, Toralf Förster wrote:
>
> Signed PGP part
> On 04/28/2016 11:14 AM, Tim Wilson-Brown - teor wrote:
> > Ports in, or ports out?
> Ports in I meant, sry.
>
> > Closing inbound ports is a security precaution
> The question is - if the
er Tor relays can choose any
port for their ORPort and DirPort.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailin
sses. Using swap for Tor may slow things
down more.
> If in case I cant use the whole 100Mbit/s - what would be the minimum
> requirement in memory I would need as the CPU is just working on a 20
> percent level?
We typically recommend 512MB, but your experience may vary depending on your
v4 address may be blocked in some jurisdictions, but not others.
So it still could be useful for some users.
And the bridge's IPv6 address is far less likely to be blocked, so it will be
useful by itself.
Please also note that you can have a maximum of 2 relays per IPv4 address (or a
relay
r destination.
Does tor start as a client?
If so, it's likely that you failed to copy the torrc file.
Does tor fail to start?
If so, it helps to let us know the warning messages it prints out.
Perhaps the files were corrupted on the way, or something else happened.
Tim
Tim Wilson-Bro
disk DoS risk here, particularly for relays with smaller disks.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays maili
settings on
your bridge.
It's normal for tor to change exits occasionally.
Do you know which exit your tor client was actually using during that time?
If so, report it to bad-rel...@lists.torproject.org
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu
elay
will be considered as a fallback when we next rebuild the list.
Thanks
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-
0.2.8-rc, your relay was excluded as a fallback because the key had
changed.
Will you be keeping the new key for the next 2 years?
If so, I'll update the fallback list with the new key, and your relay will be
considered as a fallback when we next rebuild the list.
Tim
Tim Wilson-Brown (te
bout entry, middle and exit relays as well as layers of encryption, but I
> need more realistic explaination how all of these operate in a practice.
> Thank you!
What have you read so far?
Have you read: "Tor: The Second-Generation Onion Router"?
http://www.onion-router.net/Pub
figure
the user and permissions correctly?
Tor also has more specific requirements for security reasons, this protects the
keys from other users on the system.
It's hard to give more advice without more specific details.
If this advice doesn't help, please copy and paste the configurat
emails sent to you bounce?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@lists.torpr
> On 2 Apr 2016, at 10:44, tor-cont...@posteo.de wrote:
>
> Hello,
>
> I'm the operator of one of the mentioned relays (81.7.14.227). Thanks,
> Tim, for pointing this issue out to me. I'll try to help with this as
> much as I can.
>
> So far, I have not be
Dear Relay Operators,
Please see below for an updated list of slow relay DirPorts.
> On 31 Mar 2016, at 11:13, Tim Wilson-Brown - teor wrote:
>
> While I was checking fallback directory mirrors for #17158, I encountered
> some relays that took more than a minute to serve a con
> On 31 Mar 2016, at 11:42, Tim Wilson-Brown - teor wrote:
>
>
>> On 31 Mar 2016, at 11:23, Michael McConville > <mailto:mm...@mykolab.com>> wrote:
>>
>> You'll probably get through to more people if you include nicknames with
>> IP addres
would do that for me, I'm a little
snowed under at the moment.
Tim
>
> Thanks for this,
> Mike
>
> Tim Wilson-Brown - teor wrote:
>> Dear Relay Operators,
>>
>> Also while working on #17158, I found some relays whose DirPort responses
>> made my py
mp /
Wireshark check, but I don't have time at the moment.
Would anyone like to follow this up?
This is an incomplete list of broken relay IPs and DirPorts, starting with
those with the highest consensus weight:
217.23.14.190:1194
151.80.164.147:80
148.251.255.92:80
78.142.19.59:80
Thanks
T
highest consensus weight:
217.198.117.122:80
212.47.250.44:80
158.69.112.86:80
50.7.178.34:80
191.101.251.172:80
51.254.249.177:80
188.165.232.40:80
104.236.38.231:8080
89.163.225.184:9030
185.31.230.69:9030
81.7.14.227:9030
62.210.238.33:9030
164.132.56.137:9030
212.107.149.145:9030
94.23.165
> On 22 Mar 2016, at 08:14, Toralf Förster wrote:
>
> Signed PGP part
> Tim Wilson-Brown - teor:
> > * if the AccountingRule is not "in".
> Ah,
> AccountingRule in
> was meant. I did not set that config option in the past due to the impact of
> On 22 Mar 2016, at 04:22, Toralf Förster wrote:
>
> Signed PGP part
> Tim Wilson-Brown - teor:
> > In 0.2.8, every relay is potentially a hidden service directory and
> > a directory mirror.
> But with this configuration :
>
> # 20 TB/month: echo "20
led.
Relays use the DirPort directly, but they typically use the authorities for
directory documents. (Some obscure relay configurations will use the fallback
directory mirrors.)
Tim
>
>
>
> Am Sonntag, 20. März 2016 02:54 schrieb Tim Wilson-Brown - teor
> :
>
cy is not winning proposition.
I meant "a website using CloudFlare that has the "Block" option selected for
Tor".
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature
s show CloudFlare's "JavaScript
Challenge" [1] ?
http://www.zdziarski.com <http://www.zdziarski.com/> (yes, only HTTP, ugh) uses
their JavaScript challenge.
And their "Totally Block Tor" [1] option? (only available to enterprise
(paying?) customers)
I don't know of a C
s a DirPort or not).
This used be controlled by the HidServDirV2 option, but that's now obsolete.
See ticket 16543 and commit 2f8cf524b.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
D
t;> not really add anything new to that site.
>>
>> It'a always a good idea to ask.
>
> I don't think it is worth the effort for non-exits. Since that should not
> botter the hoster at all.
Some hosters are bothered by (or do not support) high numbers of connection
resolution is performed by the Exit.
So technically, there are no DNS packets until the Exit queries its DNS servers
for the server name provided by the client.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D1
recover from the Valencia meeting,
> I expect this one will be easy to resolve.
I am still in an airport, and I believe others are still on post-dev-meeting
leave.
Give us a week or so to look into it.
We should be able to get a fix in the next alpha.
Tim
Tim Wilson-Brown (teor)
teor23
> On 9 Mar 2016, at 05:26, Michael McConville wrote:
>
> Zwiebel wrote:
>> Tim Wilson-Brown - teor wrote:
>>>> Zwiebel wrote:
>>>> is there a way to shut down Tor relays for a short time without
>>>> losing consensus weight or band
d reasons to run a fast relay.
If you're very close to your bandwidth cutoff, why not decrease it slightly,
and run all the time?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.as
ut Tor won't let me.
Networks need extra capacity - it increases average speeds, and absorbs sudden
usage spikes.
Consider starting a second tor instance on other ports to use the extra
capacity on your server.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah
circuit are on
different /16s.
(But it's still good to set MyFamily so it's clear which relays are controlled
by the same person.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
De
-how is huge. And
> their ability to draw information from any sort of internet traffic is
> unparalleled.
Please check your torrc and your entry in globe to make sure you're a non-exit
relay.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot
nd connections to stay under about 3/4 of the memory
you have.
Try 1GB.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
_
osen, and try new guards if all
previously chosen guards are down.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with Open
cated 2TB
> of bandwidth per month from my VPS
What processor is on your VPS?
How fast is it?
Does it have AES-NI?
Is your OpenSSL compiled optimised for your processor and for the encryption
that Tor uses?
How much RAM does your VPS have?
Have you read the torservers.net Tor tuning advic
ad (or create) the permanent master identity key.
> Feb 26 10:04:02.000 [notice] Your Tor server's identity key
"It's the first time I started a version of tor that supports ed25519 keys, and
I don't have an ed25519 key yet."
>
> fingerprint is 'stealth A29
ers find that new address?
(For some users, the bridge authority might tell them when provided with the
bridge's fingerprint, but only if their other bridges work.)
> (Of course they could
> still simply block the whole /16 or whatever your ISP has)
Typically only the IP and port are b
e middle of a circuit, and for rendezvous points for short-lived hidden
service circuits. So it's not disruptive or useless. (It might slow down a few
clients who try your relay for the few hours each day it takes to find its new
IP address.)
Tim
Tim Wilson-Brown (teor)
teor2
t for 0.2.6.)
Give it time, and enough authorities should believe your relay is stable.
Perhaps you could consider upgrading it from 0.2.4?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 8
> On 18 Feb 2016, at 22:16, Mirimir wrote:
>
> On 02/18/2016 03:47 AM, Tim Wilson-Brown - teor wrote:
>>
>>> On 18 Feb 2016, at 14:40, Ricardo Malagon Jerez wrote:
>>>
>>> I don't know how and why, but since January is impossible to have an exit
.
Relays need to be able to post their descriptors to the authorities. So they
have to be able to reach at least one authority - they can't use only fallback
directory mirrors.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D
> On 15 Feb 2016, at 00:10, Volker Mink wrote:
>
> I think I found something.
>
>>> could not bind to 0.0.0.0:9001: address already in use
>
> Where can i set the binding?
Is your old Tor process still running?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail
torrc-file enabled.
> Port 9001 is forwarded at my router and the Pi is also in the DMZ.
Can you please send us the Tor log messages?
They usually say why Tor won't start.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F
> -V
>
> On Friday, 5 February 2016, Karsten Loesing <mailto:kars...@torproject.org>> wrote:
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> [Removing metrics-team@ to avoid cross posting.]
>>
>> On 28/01/16 21:22, Tim Wilson-Brow
gt; resolv.conf?
>
You likely need to send a HUP to tor to get it to re-read your DNS
configuration.
Maybe Google DNS is not reliable from your location, so you could put another
name server first?
Or perhaps investigate resolving your VPS DNS manually, then using their IP
addresses as well?
DNS
requests.
A drawback is that your VPS company then sees your DNS requests and your
traffic, but they could do this anyway.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: M
vers?
Typically, by editing /etc/resolv.conf.
But some platforms automatically generate it using the files in
/etc/resolvconf/resolv.conf.d/
It should be fairly straightforward, if not, search the Internet for a HOWTO
for your platform.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
P
> On 29 Jan 2016, at 07:20, Roman Mamedov wrote:
>
> On Fri, 29 Jan 2016 06:33:51 +1100
> Tim Wilson-Brown - teor wrote:
>
>> Tor already considers relays in the same IPv4 /16 to be in the same family.
>
> Maybe a step further in this would be to autoextend manual
1 - 100 of 252 matches
Mail list logo