and the list is still populated.
It's not really critical but it does seem to have changed with recent commits.
This is on FreeBSD.
Thanks.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
after waiting 5 minutes. It may be the same underlying issue that you just
fixed, but thought I'd mention it. (I'd test it again, but that particular
config option requires a hard restart of the Tor service, so I'm going to leave
it alone for now
> These nodes are popping up everywhere - is this some sort of malware being
> deployed on systems around the globe?
Interesting. It does look like malware to me.
- all running Tor 0.3.1.7 on Linux
- diverse AS / IP allocation, mostly looks like ISP end-subscriber
- same exit policy (
In a relay's logs:
Oct 20 10:31:47 X Tor[]: We're low on memory. Killing circuits with
over-long queues. (This behavior is controlled by MaxMemInQueues.)
Oct 20 10:32:11 X Tor[]: Removed 1565259696 bytes by killing 1
circuits; 40008 circuits remain alive. Also killed 0 non
The relay is running Tor version 0.3.1.7 on Linux. There's 2 GB of available
RAM.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tip about the different sqlite3 versions, although my
system seems to actually still use Python 2.7.14 by default._______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> Is it shown in the ps output as '/usr/local/bin/tor'? If so then I'll
> adjust Stem to look for that too.
Yep. 'ps ax' output looks like:
PID TT STATTIME COMMAND
83797 - R 1152:14.26 /usr/local/bin/tor -f /usr/local/etc/tor/torrc
--PidFile /var/run/tor/tor.pid --RunAsDa
Hi Damian,
I can confirm the connections now display correctly. Thanks!
> Is 'tor' listed when you run "ps -ao ucomm="?
It is *not* listed. In case it helps, Tor 0.3.1.8 was installed via
ports/security/tor (https://www.freshports.org/security/tor), and I haven't
done anyth
; Unfortunately I'm not sure of a good self-discovery mechanism. Would
> alternative messaging help?
It didn't take me long to figure out, but additional messaging might be
helpful. Right now nyx just displays "Unable to connect to tor. Are you sure
it's running?" Perhaps you could
at seems entirely normal.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi,
how about adding IPv6 to your relays, from a quick look at where they
are hosted all providers support it.
Thank you
On 4/28/2018 8:31 PM, Nathaniel Suchy (Lunorian) wrote:
Hi,
The Tor relay
https://metrics.torproject.org/rs.html#details/B0BF533DA3BC09DEEB4AF2BEC16FA21063216FE4
of mine
I see "Onionoo seems to serve outdated data :( Last update was: Tue Oct 24
2017" at the top of Atlas, and querying the Onionoo API directly results in the
same outdated data.
Anyone working on fixing it?_______
tor-relays mailing list
I think you just have a typo here:
> ORPort 80.127.177.180:993 NoListen
177 instead of 117 for the third octet.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
For relay operators using iptables connlimit to mitigate DoS attacks (or
increased load from new clients), is it better for the Tor network to use
"DROP" rules, or should we use something like "REJECT --reject-with tcp-reset"?
______
Attempting to limit a relay to only certain times of day, days of the week,
etc., is very likely to produce a relay that doesn't really get used. I'm not
sure I see the point in running a relay under those types of restrictions.
___
tor-relays mailing
instead. The second reduces the amount of memory used.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
e. What's that about? Will disabling the DirCache affect the
Guard flag (today)?
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I see this occasionally. It's not specific to 0.3.3.x. I reported it back in
October 2017:
https://lists.torproject.org/pipermail/tor-relays/2017-October/013328.html
Roger replied here:
https://lists.torproject.org/pipermail/tor-relays/2017-October/013334.html
MaxMemInQueues is set to 1.5 GB
curity reasons. It's also not
recommended to run Tor as root. For best security on FreeBSD, it may be best to
use ports over 1024 for Tor.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listin
ormant, and then keep the
best ones. That's what I would do. :)
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>If you have the CPU, RAM, and disk space, you should leave these settings on.
>
>It will affect some client versions' choice of guards:
>https://trac.torproject.org/projects/tor/ticket/24312#comment:4
I have guards that are bottle-necked by CPU, and I'm still exploring vari
the package with DoS
mitigations.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> Relay search appears to be down right now.
It seems the website (https://www.torproject.org) and package repos (ex:
deb.torproject.org) are currently down as well.
Anyone working on it?
___
tor-relays mailing list
tor-relays@lists.torproject.
>Other relays seeing this too?
For sure. Here is some recent reading material:
https://lists.torproject.org/pipermail/tor-relays/2017-December/013669.html
https://lists.torproject.org/pipermail/tor-relays/2017-December/013771.html
https://lists.torproject.org/pipermail/tor-relays/2017-Decem
> As a last resort, try setting:
>
> DisableOOSCheck 1
Did you mean "DisableOOSCheck 0"?
"DisableOOSCheck 1" seems to be the default already (for Debian/Ubuntu and as
mentioned here
https://www.torproject.org/docs/tor-m
r that outright rejects Base-64 emails from that sender
(ie: requiring all abuse@ emails to be submitted plain text or HTML).
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
onsensus, but I've seen suggestions to lower it to 4).
Am I misunderstanding?
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
) scanned in 3.56 seconds
If you're behind a router doing NAT, you'll need to forward the DirPort and
ORPort ports.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 21/05/19, gus wrote:
> Dear Relay Operators,
>
> Do you want your relay to be a Tor fallback directory mirror?
> Will it have the same address and port for the next 2 years?
> Just reply to this email with your relay's fingerprint.
C6B656BA6BC16E31115A1B2D5
ah. Things
that make you go hmm.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
renced lists?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi
I've been running an obfs4 bridge for about a month.
My hashed fingerprint is:
E120A0492F789F5367EAD84C64F92EE279018F98
I recently lost the stable flag. Not sure why.
Any thoughts?
thanks
matt
___
tor-relays mailing list
tor-relays
Hello,
I have a hard time trying to correctly update my configuration following
this change, with Tor 0.4.5.2 on Ubuntu focal.
The machine has both an IPv4 and IPv6 connectivity, but my relay must
only use IPv4 to listen for connections.
The relevant parts of my configuration before moving
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi All,
So everything had been working for over a year. Am currently on tor 4.2.7,
stretch. When I went to update, I got:
The following signatures were invalid: EXPKEYSIG 74A941BA219EC810 <
http://deb.torproject.org/> deb.torproject.org archive signing key
My deb.torproject.org--k
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi All,
Which version of tor runs on Ubuntu Server 20.04.2 LTS 64bit, if any?
Thanks
matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
test everything is reachable.
However, the status page keeps saying I'm dysfunctional with a ECONNREFUSED:
https://bridges.torproject.org/status?id=E120A0492F789F5367EAD84C64F92EE279018F98
So everything seems to be working on my end.
-matt
___
tor-relays
a Tor
circuit
x 09:30:52 [NOTICE] Bootstrapped 90% (ap_handshake_done): Handshake
finished with a relay to build circuits
x 09:30:52 [NOTICE] Bootstrapped 89% (ap_handshake): Finishing handshake
with a relay to build circuits
x 09:30:52 [NOTICE] Bootstrapped 85% (ap_conn_done): Connected to a relay
wrote:
>
>Finally, anyone running relays: try to get connected to the community so we
>can build some trust among each other. That seems to be an essential part in
>our long-term strategy to fight bad relays trying to enter our network.
>
_______
gt; Thank you! :-)
>
>_______
>tor-relays mailing list
>tor-relays@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
they "glow in the dark."
I think the individual is calling the tor-node.org site a CIA style operation.
Or at least that something feels fishy about it.
On March 3, 2022 3:40:42 PM UTC, Martin Gebhardt wrote:
>Hi Marco,
>
>On 3/2/22 22:21, li...@for-privacy.net wrote:
>> On
Can you provide the Tor node fingerprints?
Any logs that show they are configured correctly, but the error is on the
DirAuths?
What steps did you take during deployment?
On February 1, 2022 3:19:20 PM UTC, Miryam Webb via tor-relays
wrote:
>Hello all,
>
>I am a new relay operator
I installed standalone Snowflake on Ubuntu per these instructions:
https://community.torproject.org/relay/setup/snowflake/standalone/. Now how can
I tell if it's running? Can I see the number of connections it's serviced? Will
it continue after a reboot?
Thanks,
Chuck Bevitt
Tor Project
Hi,
<https://reiya.io/> exists. Something like this?
There is a legal reason the Tor project doesn't fund nodes.
Regards,
On October 12, 2023 11:41:58 AM UTC, torrrel...@riseup.net wrote:
>I provided some high speed Tor nodes (non-exits and guards) but I quit
>in this year to mak
I've made 2024515
>connections
> with IPv4 and 582464 with IPv6.
>Apr 21 15:45:08.000 [notice] Circuit handshake stats since last time: 467/467
>TA
>P, 9937327/9984534 NTor.
>
>Is this anything I need to be concerned about, or is it just one of things
>that occasion
past.
Is there any other things I can do to disrupt the damage done to the tor
network during this downtime? Especially to any clients using it as a
bridge.
Thanks,
OpenPGP_0x45E5F8C1504CDA42.asc
Description: OpenPGP public key
OpenPGP_signature
Description: OpenP
Hi
Where do I find the updated version of obfs4proxy for arm64?
-m
On Wed, Jan 11, 2023 at 7:00 AM
wrote:
> Send tor-relays mailing list submissions to
> tor-relays@lists.torproject.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists
and 0 not upgraded.
Where do I get version 14?
-m
On Fri, Jan 13, 2023 at 7:00 AM
wrote:
> Send tor-relays mailing list submissions to
> tor-relays@lists.torproject.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.torproject.org/
the backport of obfs4proxy seems to be unsigned
I needed to use:
deb [trusted=yes] http://deb.debian.org/debian bullseye-backports main
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
Be aware that attacks against you will be possible, since any traffic coming
from that IP is only used by you. Unlike normal Tor users where they blend and
hide amongst each other. You will be the only exit user.
A personal VPN might provide similar anonymity and be easier to manage and run
Hi,
I'm attempting to follow the instructions for setting up a obfs4 bridge on
Windows. In my instance, it is Windows 10.
The instructions say to copy out the obfs4proxy.exe from:
C:\Users\\Desktop\Tor
Browser\Browser\TorBrowser\Tor\PluggableTransports
However, there is no obfs4 file
?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
that asking to remove the complete non-exit list to be
valuable to the security of the global internet.
While it is correct that sysadmins should maybe not block traffic just
because it's a relay. There is many use cases where they should, most
corporation end users do not need access to the Tor
DAN's (non-exit) Tor relays list on a blocklist by default,
or without warning about potential impact to other legitimate services
(universities, libraries, shared hosting providers, hobbyist email, etc)
Ransomware links are usually opened from emails and Tor is not running on
company
/#/relay/741488D89B860E59D6391ACA27A157E87EB533FF
Thanks,
G
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi Gus!
Saturday, August 19th at 7pm
Isn't that a bit late?
Last day at 7PM some will have left already, no?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Yeah, some operators said the same thing to me.
Friday at 4pm local time (16 - 17:30) would be better for you?
yes, anything before Saturday is better, thanks!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org
eys
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
thanks a lot!
best regards,
t...@appliedprivacy.net
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hello,
the new metricsport counter shows
that some specific tor relays (2 out of 50) have a significant
tor_bug_reached_count rate (around 8 per second).
Do you see similar?
You have to run on git main or nightly builds to see that metric.
best regards,
t...@appliedprivacy.net
to 128MB, with bursts to 256MB.
Bandwidth is 500GB up and down per month. Tor can have half of this
(note the up *and* down).
The caveat is that, because it is a dirt cheap VPS, I don't get a
warning about any violation of the TOS. If I go outside the
guidelines, they cancel my account. So I need
Red Rover redrover2...@gmail.com wrote on 17.05.2012:
Hi there, :-)
I am running a Tor relay on a VPS.
How do I configure it to NOT accept torrent traffic?
I have just received an abuse report from my hosting company.
All the best,
Redrover
Hi,
using a small python script I
target, same attack.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
with
each about around 10K concurrent connections.
With 1.4.4.1 the arm cpu was normally below 5 %. The tor server runs debian
squeeze with python 2.6.6.
Is this a known issue? Any options other that downgrading back to 1.4.4.1?
Regards,
Klaus
a debug log to '~/.arm/log' (you
might want to scrub anything in it that you think is private).
Thanks for your fast response. I sent you the log via pm.
Regards,
Klaus
___
tor-relays mailing list
tor-relays@lists.torproject.org
https
and worthwhile experiment. But for bridges, since the current
Tor transport and current bridge distribution strategies are not great,
I think it's better to use funding for better designs and better code.
I should note that I actually encouraged VoA to want unpublished bridges:
if we set up fast bridges
Hi all,
there is a massive spamming of google groups ongoing. I received several
complains as below. From the domain list it seems that all major Tor exit
nodes are affected.
Running an Exit without custom WHOIS, all abuse message are received by my
ISP and forwarded. So I have to temporarily
is configured to run at maximum bandwidth, torland2 runs trottled to
ensure not to exceed the 100TB contractual traffic limit. The nodes on this
server get traffic as expected and are at the top of the Blutmagie Tor Status
http://torstatus.blutmagie.de/index.php?SR=BandwidthSO=Desc.
The second server
Hi,
I would like to know from which countries my nodes are mostly used. I tried to
use arm for this but on high capacity relays arm eats the same cpu resources
as the tor process it monitors, if the connection panel is activated.
Switching to the connection panel lets arm often freeze
. Is there
another way to get country statistics from a node? Maybe something build
in
Tor?
You can query the locale for an address from tor via...
https://gitweb.torproject.org/torspec.git/blob/HEAD:/control-spec.txt#l671
To simulate what arm does you could write a script that makes
netstat/lsof
On Friday, 30. November 2012, 09:14:34 Andrew Lewman wrote:
2. Find legal representation. A list of possible legal advisers can be
found here,
https://blog.torproject.org/blog/start-tor-legal-support-directory. If
none of these people are in your country, or close to you, ask either
the EFF
Hi,
I am monitoring the network interface of my tor server with nload. From time
to time nload shows strange traffic patterns: http://i.imgur.com/0Wr9h.png
The graph is updated every second so one hash mark corresponds to one second.
The most recent traffic value is on the right side
On Wednesday 02 January 2013 14:56:59 Moritz Bartl wrote:
There is a fundamental legal difference between operating Internet
Access Providers and Internet Service Providers. As a Tor exit, you
should and want to be judged as a service provider. The key difference
is that Access Providers give
this with my lawyer.
Several years later Internet crime experts coming from the police
in Bergisch Gladbach (pretty close to Rösrath) made first contact by
executing a Durchsuchungsbeschluss (search warrant) that didn't mention
Tor in any way ...
Fabian
I hope these days German police
/2007/Fahrplan/events/2355.en.html
this might help with tor-nodes, too.
I informed my hosting provider about the Tor exit nodes. With each incoming
abuse message they forward to me, I inform the employee that handles the
message again about the purpose of the server. So for them it should
On Tuesday 08 January 2013 20:51:52 Moritz Bartl wrote:
Thanks for the hint. In general, I don't see why VPS providers would not
allow internal Tor relaying, and I would not even bother to ask first.
Interesting values to know about VPS providers are bandwidth allowance
(unlimited is quite
Hi all,
Is there any recommendation for running Tor _exit_ node in NL/DE? The list at
https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs see,s pretty old
and outdated and contradictory at places.
Thanks
Kali___
tor-relays mailing list
tor
Hi all,
I am planning on running a bridge-relay but have a hard 1TB/month outgoing
traffic limitation.
Can someone help me with a torrc config that works for this setup?
Regards,
Kali
___
tor-relays mailing list
tor-relays
The Tor devs go to great lengths to try to keep evil governments from
using Tor against itself. Why not devote some effort toward keeping evil
traffic off of Tor?
I agree. Why not block the most obvious abuse? All professional Apache
webservers install a module named 'mod_secure
You could modify the tor init script to limit the memory usable by
/usr/sbin/tor as described here:
http://jlebar.com/2011/6/15/Limiting_the_amount_of_RAM_a_program_can_use.html
But I don’t know if this works on RaspPi platform and what happens when
the tor process hits the memory limit
some TAP requests to not totally
starve
0.2.3 clients when NTor becomes popular. A new consensus
parameter
NumNTorsPerTAP lets us tune the balance later if we need to.
Implements ticket 9574.
So the more relays that upgrade to 0.2.4.17-rc, the more stable and
fast
Tor
On Thursday 05 September 2013 22:27:53 tor-admin wrote:
Updated torland family. Hope that the new version helps. One of the last
messages before update to 0.2.4.17-rc:
Sep 05 21:06:29.000 [warn] Your computer is too slow to handle this many
circuit creation requests! Please consider using
Thanks. Sorry for the noise. Should have checked trac first.
On Saturday 21 September 2013 06:21:50 Roger Dingledine wrote:
On Sat, Sep 21, 2013 at 12:19:42PM +0200, tor-admin wrote:
Hi Mike,
I am seeing many of these messages in the logs of torland1/torland2:
Sep 21 12:09:34.000
I’m running a Tor exit relay on ports 9030 for advertising directory
connections and 9001 for advertising incoming Tor connections. In the spirit of
proxy-proofing my relay, I’d like to expose the directory and Tor connections
on 80 and 443. I’ve spent hours trying to get my iptables config
Hello all,
I've set up a tor exit relay (0.2.4.17-rc, debian testing) on a VPS, and
it's running well (about 20Gbs/day).
But a lot of traffic (about 50%!) is using port 9050 for incoming
connections. It's something more than random scans.
Because I am worried, I've run tcpdump on this port
work...
The relay-- Atlas: newTorThird :
https://atlas.torproject.org/#details/ACED456D102F634F8DB3CBE8BC9A96F2569EC33C
2013/11/5 Paritesh Boyeyoko parity@gmail.com
@jj tor
The fact that your relay is refusing connections says that the port isn't
open, which is a good thing.
I
Hi, list readers,
Someone has experience with russian tor relays?
Do you know of any legal problem for an exit relay ?
Thank you
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
Ummm, I'm afraid I have no idea how set up a relay in China.
After checking the public list of tor relays, I haven't found any relay
there. So, is it even possible to run an exit relay in China??
2013/11/15 Roman Mamedov r...@romanrm.net
On Fri, 15 Nov 2013 10:40:16 +0100
jj tor jjproye
On Saturday 14 December 2013 13:28:52 Christian wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hej!
Torservers.net has been awarded $250,000 over two years by the Digital
Defenders Partnership to strengthen and improve the Tor network, the
anonymity system crucial to journalists
why only 68 out of 283 completed the traceroute. Can someone
explain please?
regards
torland
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
a high capacity tor relay host as well as from a
VPS. I did not see a big difference in time. On both it finished within around
4 days.
I would assume that someone who reads the documents/FAQ about the script,
checks it and starts it, will not kill it before it finishes. So I am
wondering
anyone else experienced this and how did you
solve it?
For me same happens. I always press arrow up and then ESC. After that it works
again.
Regards,
torland
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin
On Friday 07 February 2014 22:05:41 Sebastian Urbach wrote:
Dear list members,
The Trying Trusted Tor Traceroutes project is coming closer to the next
data review (03/2014).
Basically every relay (except Bridges) can help to evaluate the Tor Routes.
Please consider that one complete run
February 2014 11:53:09 Sebastian Urbach wrote:
Dear list members,
The multiple runs question is now added to the FAQ at the Trying Trusted
Tor Traceroutes project site.
Right now we are at 95 ip's with at least 1 completed run. Hopefully we can
add another 5 to that number and reach the 100
contributor, what happened I should certainly appreciate it.
Thanks,
P
--
Dirt kicked to the curb goes into the gutter.
Professionals kicked to the curb go into retail.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi
:
Question how long you'll stay in the Top 50. Maybe you are lucky but
probably the ISP will end your contract for abusing fair use
policies/TOS. Best case they'll throttle you down. Let us know in 30 days :)
Am 22.03.14 21:51, schrieb Trigger Happy:
Hi list,
I'm running tor-relay (middle) on VPS from
wrote:
Hi,
Everytime i speak with colleagues i wonder that the most performance
related options for TOR relays are unknown.
I just started to write down what i know and i would be happy if someone
else could benefit from that.
http://key-server.org
Could you please translate your instructions into XP that I might check
and, if necessary, fix my relay? (OnionTorte)
Thanks,
P
Jann Horn wrote:
Well, the subject line pretty much says it all: Lots of Tor relays send out
globally sequential IP IDs, which, as far as I know, allows a remote
101 - 200 of 1017 matches
Mail list logo