Re: [tor-relays] [release] ExoneraTor 4.0.0

2018-09-14 Thread ZEROF
Can you explain me how this type of public information is good for any kind of tor operators security, and tor network at all? For me this is so against word "privacy", and respect to community. You're saving this information for good of? Making this public put government money to your pockets? Wau

Re: [tor-relays] Keep smiling only - i dont expect any answer

2015-04-01 Thread ZEROF
This is what i call: Happy April 1, 2015 On 1 April 2015 at 18:58, Teófilo Couto wrote: > Same old, same old story, again and again... > "They" operate badly developed, badly implemented "sites", full of well > known vulns, but the issue, the "bad guy on set," is a tor relay... > > > Typical...

Re: [tor-relays] SYN flooding on port 80. - how often does this ppear at exits usually ?

2015-10-12 Thread ZEROF
Hi, Or your server can't eat all traffic or you are under attack time to time. Check this: http://blog.dubbelboer.com/2012/04/09/syn-cookies.html On 12 October 2015 at 16:00, Toralf Förster wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Recently I realized these log messages >

Re: [tor-relays] How to prevent netscan usage?

2015-11-25 Thread ZEROF
Hi, First rule is to use some firewall, 2nd is to disable that port for few days. You will not lose exit flag becuase of this, just will give you time to learn more about how to secure your node. Few friends using FirewallBuilder to learn how to build their firewall system, maybe you can start wit

Re: [tor-relays] Nagios/Icinga plugin check_tor_bandwidth for gathering bandwidth data

2015-11-26 Thread ZEROF
Hi, Nice work, but in this time i use vnstat to get global traffic info from my servers. Doing great job, but i will check your solution as well. Sharing is carring. Have a nice day. On 26 November 2015 at 09:02, Tim Wilson-Brown - teor wrote: > > On 26 Nov 2015, at 18:07, Josef 'veloc1ty' Stau

Re: [tor-relays] Unbelieveable

2015-12-05 Thread ZEROF
Just build new torrc, that fixed my issue. cd /etc/tor/ cp torrc torrc.bak touch torrc Use this for torrc (nano torrc), replace some info to match your relay http://0bin.net/paste/tdUuzTHwZI-BRWQy#JPmufzd+g0W0cx0WyB4g0iU12jU0WFpZRWtKVg6iDbS When you are done: sevice tor restart Then, sudo -u

Re: [tor-relays] VPS/Tor Almost There

2015-12-06 Thread ZEROF
David, low ports numbers are not good idea, he can have same issues. For my firewall i need to use something more then 9000 to make my exit/relay to work with my ISP. On 6 December 2015 at 17:46, David Schulz wrote: > Try other ports or ask the hoster, if he blocks ports?! Or try 80 and 443, > i

Re: [tor-relays] The Onion Box: A web based status monitor for Tor relays

2015-12-30 Thread ZEROF
Hi Ralph, I will first post url again because yours give me 404 error page: https://github.com/ralphwetzel/theonionbox

Re: [tor-relays] Keypair Error

2016-02-01 Thread ZEROF
Hi Alan, If you just copied private key file, then you didn't do things right. But before other dudes from community say something, pls read all :). You need to backup folder keys and copy to new server or fresh installation. But this is not only your "issue", was mine as well, site information

Re: [tor-relays] Nyx Project Ideas

2016-02-25 Thread ZEROF
Hi, I use arm, but i wanted to test nyx and i have found install option "pip install nyx", but install don't work, version 1.4.5. You can see logs: https://paste.lugons.org/show/Ua6RdWzaMg8cI5cWsf0b/ ;) On 25 February 2016 at 03:10, Damian Johnson wrote: > Hi wonderful relay operators. It's GS

Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-22 Thread ZEROF
If you are looking for good solution, I'm testing right now http://roundabove.com, running one exit node with exit rules provided from https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy. Tor's uptime is 11 days 12:00 hours, with 194 circuits open. I've sent 182.16 GB and received

Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-22 Thread ZEROF
8:46:18 -0800, ZEROF > wrote: > > I use servernames without logging from this this list > http://wiki.opennicproject.org/Tier2 (France). > > Great resource of logless DNS servers, I'm a big fan of OpenNIC. > > Have you bothered to encrypt DNS traffic by setting up dns

Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread ZEROF
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I'm not using opendns. OpenNic and OpenDNS are not same thing. On 23 November 2014 at 23:59, Seth wrote: On Sat, 22 Nov 2014 19:13:17 -0800, ZEROF wrote: I saw some info just yesterday, but it's not in actual server configuratio

Re: [tor-relays] Relays not listed

2015-01-11 Thread ZEROF
Hi Felix, Same here, atlas and globe went down for me at that period. On 11 January 2015 at 11:40, Felix wrote: > Hi > > most of my relays are no longer listed on Torstatus* and Consensus**. > But they perform like they should. > > out $E388F7BD196F5195AEF114552585152EA6942329 > out $26

Re: [tor-relays] [tor-assistants] Running obfs4proxy on Debian Stable

2015-02-05 Thread ZEROF
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 If you want to try to install jessi without updating your system it's possible. Add repositry to /etc/apt/sources.list, run apt-get update. Then use this and only this command to upgrade only that package from new repository (check if you need to rep

Re: [tor-relays] TOR: Inbound, Outbound, Exit connections

2015-02-05 Thread ZEROF
Inbounds: "Servers configured to receive inbound connections only through Tor are called hidden services. Rather than revealing a server's IP address (and thus its network location), a hidden service is accessed through its onion address . " Outbound: Trraf

Re: [tor-relays] Thoughts on new relay

2015-02-09 Thread ZEROF
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Any server from "new" countries are good. If you are relay in this time, that is good as well. Doing what you are doing now with your relay is more then you think. If people from your country see that somebody start to do what you do, more will come

Re: [tor-relays] 7 relays gone because of spammers

2015-02-25 Thread ZEROF
Hi man, I will try to explain you how things got in wrong direction for you. OVH don't lie, but they don't have best support that you can find around. Anyway. Last 15-25 days a lot of attacks was made on French ISP's and attacker used Tor IP list to do one part of his sick idea. One of my nodes "i

Re: [tor-relays] EDIS now bans Tor

2015-03-05 Thread ZEROF
Yep we know, i never trusted them, now i know why. On 5 March 2015 at 20:24, Torizen wrote: > Hello, > > Just a heads up so no one wastes their money. > > A month ago I wrote to this mailing list because EDIS claimed running a > Tor was forbidden by law in Spain. Now they've decided to ban Tor >