Re: [tor-relays] Reddit is starting to block my relays ...

2019-04-28 Thread justaguy
Reddit uses fastly, perhaps fastly is blocking your exits? On 28/04/2019 20:37, abuse net wrote: https://i.imgur.com/nF3FR0V.png WTF? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/

Re: [tor-relays] SMTP spam compliant

2019-05-03 Thread justaguy
https://lists.torproject.org/pipermail/tor-relays/2019-April/017127.html On 03/05/2019 14:28, abuse net wrote: (Japanese) web mailer On 3. May 2019, at 14:27, dns1...@riseup.net wrote: Hello, I run an exit relay with a restricted exit policy. I never have allowed any SMTP port, but today I

Re: [tor-relays] Unreachable ORPort - Potential ISP block?

2015-04-06 Thread Justaguy
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 My guess is, that the router has a public web interface, listening on port 443, to the whole world. Or, your provider blocks port 443, because it doesn't want you to host your own webserver. On 04/06/2015 01:15 AM, teor wrote: >> Date: Sun, 05 Apr

Re: [tor-relays] Exit relay seized by police

2015-11-06 Thread justaguy
Because you lost control of your exit relay, you should ask DirAuths to reject/refuse/ban your exit. On 11/06/2015 05:05 PM, Kevin Beranek wrote: > Is there a procedure I should follow if a relay has been seized by the > police? Do DirAuths typically do something in cases where a relay is > seize

Re: [tor-relays] Dynamic IP

2014-08-16 Thread justaguy
Yes, other relays don't like your relay changing ip's all the time. You should try to get a static ip somehow, ask your isp :) On 08/16/2014 10:00 PM, IceFish ThreeTwo wrote: I have a dynamic IP from my ISP. Is that going to cause issues with my relay? -- Sent from my iPhone _

Re: [tor-relays] Dynamic IP

2014-08-16 Thread justaguy
ths, how big of a deal is that? On Saturday, August 16, 2014, justaguy <mailto:justa...@riseup.net>> wrote: Yes, other relays don't like your relay changing ip's all the time. You should try to get a static ip somehow, ask your isp :) On 08/16/2014 10:00 PM, IceFish T

Re: [tor-relays] Ongoing scan from FDCServers block

2014-08-27 Thread justaguy
Hmm, FDC servers is known for doing bad things on tor https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack iirc this was on FDC servers too On 2014-08-27 10:43, linen...@safe-mail.net wrote: For the past week or so I've been seeing unsolicited echo replie

Re: [tor-relays] Authdir is rejecting routers in this range

2014-08-29 Thread justaguy
Yes, it's very likely that that FDCservers is getting rejected, because they have been doing a lot of bad things too tor the last months (the relay early attack was hosted in an ip range at them, and yesterday i heard something else on this mailing list about FDCservers doing weird pings to a s

[tor-relays] Oniontip

2014-09-27 Thread justaguy
So, https://oniontip.com is a great help for tor-relay runners We do need more donations imho Whoever made it, thank you - Justaguy ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor

[tor-relays] Obfuscated bridges and tor-arm

2014-10-16 Thread justaguy
Does the tor-arm tool display the used BW of the obfuscated bridge or only the normal non obfuscated bridge? -Justaguy___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] According to globe and atlas, bridges have guard flags, while they actually don't have them at all...

2014-12-06 Thread Justaguy
What is the cause for this behavior? https://globe.thecthulhu.com/#/bridge/286FD249840142D1C7536C2D12FDBE5EA63AD912 https://atlas.thecthulhu.com/#details/286FD249840142D1C7536C2D12FDBE5EA63AD912 -- Contact: Irc, justaguy @ Freenode or OFTC OTR fingerprint: FF6D1AC2 13F38B15 EDB21522 D3530A6F

Re: [tor-relays] Atlas slow/not working?

2014-12-06 Thread Justaguy
https://trac.torproject.org/projects/tor/ticket/13905 This can be solved by using mirrors like https://atlas.thecthulhu.com/ -- Contact: Irc, justaguy @ Freenode or OFTC OTR fingerprint: FF6D1AC2 13F38B15 EDB21522 D3530A6F 6EE01996 On 12/06/2014 05:12 PM, Abhiram Chintangal wrote: Hello, I

Re: [tor-relays] Relay is down

2014-12-30 Thread Justaguy
Hello, This is very vague. We do not know which range you are in and which relay this is about. This is probably inside google cloud, which was blocked by the dirauths some days ago because some guy signed up 3347 exit relays with google cloud machines. On 12/30/2014 10:22 PM, Giovanny Andres Gon

[tor-relays] Someone broke the tor-relay speed record?

2014-12-31 Thread Justaguy
https://globe.thecthulhu.com/#/relay/F528DED21EACD2E4E9301EC0AABD370EDCAD2C47 Someone just got 149.08 MB/s on a non-exit relay. This is amazing! Would you mind saying what kind of hardware you use for this? Ipredator used https://ipredator.se/guide/torserver to get to 101MB/s. So your setup shoul

Re: [tor-relays] Someone broke the tor-relay speed record?

2014-12-31 Thread Justaguy
Oh wait? This is only advertised bandwith and not the actual bandwith. maybe the actual bandwith will reach the advertised bandwith some day. This relay is only running for 3 days so.. On 12/31/2014 10:11 AM, Justaguy wrote: > https://globe.thecthulhu.com/#/re

Re: [tor-relays] Someone broke the tor-relay speed record?

2014-12-31 Thread Justaguy
A flag on the AS number where the ip of that Ipredator exit is in, does not mean that it is in this country. You can set that flag to anything you want. It's probably a joke about "libre" . On 12/31/2014 10:15 AM, I wrote: >> Someone just got 149.08 MB/s on a non-exit relay. > I would dearly love t

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Justaguy
Please send this in an unencrypted form. On 01/24/2015 06:16 PM, Michael Edwards wrote: > -BEGIN PGP MESSAGE- > Version: GnuPG v2 > > hQEMA22Nc/OMyTy8AQgAt76bA92YgnGcymH4H+jGorceD36/o6UsQKDGctj22eip > BduAfsf+0P+QSz+oeGgzjord/LemSNzL8HfhxRaLvk+HzymNGwrJ23sbC9ftQnbn > G/u5F1VCQeYf+JF6I19esTf

Re: [tor-relays] Avoiding using my own Exit

2015-02-06 Thread Justaguy
Yes. But, it is easy to exclude your own relays. https://www.torproject.org/docs/tor-manual.html.en#ExcludeNodes On 02/06/2015 08:54 PM, Chris Tilt wrote: > Hello, > > When running a relay that is configured as an Exit, do you run the risk of > your own TOR browsing sessions (initiated from the sam

Re: [tor-relays] Same relay (identity key) on two IPs

2015-02-26 Thread justaguy
You didn't include your fingerprint or IP's, so there isn't any way for someone to check. On 02/26/2015 02:31 PM, catchthemall wrote: > Hi all, > > tl;dr: > > Due to a config error my relay [1] was running on two different IPs at > the same time for about half a day. Now the traffic has dropped. >

Re: [tor-relays] Same relay (identity key) on two IPs

2015-02-26 Thread justaguy
You didn't include your fingerprint or IP's, so there isn't any way for someone to check. On 02/26/2015 02:31 PM, catchthemall wrote: > Hi all, > > tl;dr: > > Due to a config error my relay [1] was running on two different IPs at > the same time for about half a day. Now the traffic has dropped. >

Re: [tor-relays] Same relay (identity key) on two IPs

2015-02-26 Thread justaguy
You didn't include your fingerprint or IP's, so there isn't any way for someone to check. On 02/26/2015 02:31 PM, catchthemall wrote: > Hi all, > > tl;dr: > > Due to a config error my relay [1] was running on two different IPs at > the same time for about half a day. Now the traffic has dropped. >

Re: [tor-relays] 7 relays gone because of spammers

2015-02-26 Thread justaguy
So, you made a POST request to an online "passwordchecker" and they now probably have your password. On 02/26/2015 04:24 PM, Speak Freely wrote: > Hi ZEROF, > > I had fail2ban, harden (which includes tiger, tripwire, logcheck, plus > MANY others), all the fancy log checkers, rkhunter and clamav,