Even though Cogent has ethical issues, this is unlikely what happened.
Most likely, either an outage occurred or a voluntary filtering had been
put in place on your Virtual Machine by the ISP at which it is hosted.
___
tor-relays mailing list
tor-relays
I've been running a tor relay for several days now
(C65EF5E06B8338CF976D376048BE2C8FBD499C9C). During my regular checks I noticed
something odd within the tor log files.
[WARN] Tried to establish rendezvous on non-OR circuit with purpose Acting as
rendevous (pending)
It occurs several
customer
because they do not exist. They are all one Conrad Rockenhaus. Just so you
know. Do you know any of the people that are bragging about using Greypony?
Are they true professionals that use Tor? I do not think so. Find one
person that you can legitimately trust that has used Greypony or that
f-topic.
>
> Please don't feed the trolls.
>
> A reminder:
>
> This list is for "support and questions about running Tor relays".
>
> Please:
> * keep on topic, we are here to help each other run Tor relays
> * make sure each post contains new, useful inform
Just banish them from Tor already! They are ruining our network, they lie
about their network speeds, and they lie about their capabilities.
On Tue, Aug 28, 2018 at 11:37 PM teor wrote:
> Hi Conrad (and staff and operators),
>
> > On 28 Aug 2018, at 22:16, Conrad Rockenh
s with the collective
> good, in my opinion.
>
> https://metrics.torproject.org/rs.html#details/FF79CA5A50970E21E9AB320CE62C2178E963970C
> That says over 17 MB/sec which would tend to support the other claims of
> speed.
>
> Rob
> _____________
c. ?
Cheers
Michael
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
The hoster handled this case quiet professionally, I guess it's a
standardized process for most hosting operators. As far as I know the
police just seizes the disks and the hoster just adds new ones.
On 12.09.18 17:08, Roman Mamedov wrote:
> On Wed, 12 Sep 2018 16:34:48 +0200
> tor-r
>
> John
>
>> On Sep 12, 2018, at 09:42, "tor-rel...@geek1.de" wrote:
>>
>> Hello,
>>
>> I've found no information - after short googling - if I should take some
>> action after an exit node got seized. Like marking the fingerprint as
>
Hy,
thanks for the link and email, I've informed the tor project about it.
I'll bring it back online as a new node from scratch.
Cheers
On 12.09.18 17:12, nusenu wrote:
> Hi,
>
> I'm sorry to hear your exit node got seized, thanks for sharing that
> informatio
shutdown servers within 24 hours without trying to call a customer, or at least
several e-mail reminders over a day or two.
Markus
This is my new abuse e-mail template for German speaking hosting providers:
Sehr geehrte Damen und Herren,
Auf dem Server wird eine Tor-Exit Node betrieben.
Nac
to have a phone call with the Contabo Abuse department to figure
out a solution because Germany now provides the legal grounds to operate a tor
relay with (little to) no liability.
If I find a solution with Contabo I'll keep you updated.
~~~Markus
Sent with ProtonMail Secure
https://trac.torproject.org/projects/tor/ticket/25461
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
y
You have a Security Clearance but you don't specify what type but I wonder why
someone with a SECURITY CLEARANCE would want to work with Tor
Teor called you out months ago as a US Government Spy and I'm glad that the Tor
Community Council is calling you out with. People can
> This is another reminder to please keep posts on-topic and civil.
>
> This is not the place for personal attacks.
>
The sooner that the Tor community is rid of this filth known as "Conrad
Rockenhaus" the sooner people will stop talking about him. Why are you
defendin
2206C72ECC0D55593BC7B698F982533F1E141DD2
Il 21 maggio 2019 15:32:57 CEST, gus ha scritto:
>Dear Relay Operators,
>
>Do you want your relay to be a Tor fallback directory mirror?
>Will it have the same address and port for the next 2 years?
>Just reply to this email wi
M's IP?
Could you give me some tips please?
cheers
Gigi
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
roperly, I trust you, so I keep a non-exit relay.
Anyway thanks for your advices
Il 22/05/19 11:05, nusenu ha scritto:
tor-re...@riseup.net:
I'm running a non exit relay on a debian machine (in the next few
months I will switch to *BSD) on a Lime2.
I assume you are referring to a re
Hi,
> On Jun 19, 2019, at 11:34 AM, teor wrote:
>
> Hi,
>
> On 19 Jun 2019, at 06:36, ILikeTor wrote:
>>
>> I have set up a relay about 3 days ago now. I am hosting my relay at a
>> German hosting provider called "contabo", but the relay search o
Hi Teor
I already sent my fingerprint, I have dir port configured, let me know
if I have to do something else, heres the fingerprint
0338F9F55111FE8E3570E7DE117EF3AF999CC1D7
thanks
On 23-06-2019 12:34, teor wrote:
> Hi jajtor,
>
>> On 16 Jun 2019, at 03:07, TOR wrote:
>>
&
You don't connect to your bridge, you connect to the tor network if you
use the socks5. So yes, the check passes, because it's being sent over
the tor network, not using your bridge but using tor's socks5 proxy.
Also in your config you have set the socks port to 9031, but in thi
Hi,
I'm running an exit relay on a Debian Buster. I installed libseccomp and
I've built tor 0.4.2.5 using debuild, like the wiki says.
Today I noticed that tor crashes on HUP signal, only when the Sandbox
option is on. I never had this problem.
This is what my log says:
a
just a little update:
I've reproduced this bug on my laptop with Debian Buster.
I've noticed that this problem occurs only with tor 0.4.2.5. Tor
0.4.1.6, from Debian buster backports repository, works properly.
Il 05/01/20 07:43, tor-re...@riseup.net ha scritto:
Hi,
I'm
Hi,
I am the operator of a Tor relay and I have been running it for the past couple of years.
Over the past few weeks, the consensus weight of my relay has dropped significantly and I can't figure out why.
I am running the latest Tor version on an updated Linux distro. I also recently upg
Hi Roger,
what do we have to do to Opt-In as a Fallback Directory?
Am 20.06.2020 um 13:00 schrieb niftybunny:
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tors,
>>
>> as you might have heard, MaxMind has changed access and use of their
>> GeoLite2 databases:
>>
>> https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases/
>>
>> This affects Onionoo and tor, and I'm
8E52CC35132AC6DF3781F539148781274D150919
Am 08.07.2020 um 19:36 schrieb gus:
> Dear Relay Operators,
>
> Do you want your relay to be a Tor fallback directory mirror?
> Will it have the same address and port for the next 2 years?
>
> Just reply to this email with your relay's fingerprint.
89:
https://metrics.torproject.org/rs.html#details/0E8FD4368083BD7817A42F3ECEDE86DFE3C35958
They all support IPv6 as well.
All the best!
Faithfully
-k0nsl
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Keifer Bly wrote:
> I am wondering, are relays being ddosed a normal thing? Thank you.
Yes it's common. We have many users operating Tor relays on our network
and we see this on a daily basis.
___
tor-relays mailing list
to
Hi to all.
I have recently created 4 TOR relays on two different ISPs (frantech.ca and
yourserver.de). They work smoothly with IPv4.
Now I wanted to add IPv6 as well, as both ISPs provide a / 64 address.
In my torrc file I have inserted these two lines:
ORPort ...: 8001
ORPort
Dear Sirs,
Is it time to update?
Is boum.tail.org down?
Can't find the Tails 4.19 beta to test!
--
Regards
Tor Operator
https://nikulaus.net/tor-operator.html
OpenPGP_0x39DE558EC020C246.asc
Description: application/pgp-keys
OpenPGP_signature
Description: OpenPGP digital sign
Hello, exit node operator here. I share the values of the TOR foundation,
that’s why I’m operating an exit node but I can’t unsee all the bad it is used
for. I know it would sound like censorship but wouldn’t it be possible for an
exit relay to block certain (mainly cp) .onion websites so that
are working to improve the technology of SMTP ports blocking,
but I'm afraid I can't share with you any additional information about it.
I gave up after that.
This happens when you use A/I to detect abuse and degrade humans to
communicate A/I decisions.
A/I will abuse us all.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> On Tue, Jun 08, 2021 at 01:56:33PM +0200, Tor Relays wrote:
> > Support agent 1:
> > It was blocked because automatic monitoring system find your activity
> > suspicious.
> > Now, trust level of your traffic for IP has been increased however the
> > traffic is
h acts as a protocol multiplexer, or a switchboard. Its name
> comes from its original function to serve SSH and HTTPS on the same port.
> """
>
> Since many of my network services claims to listen on 433 (to bypass
> mobile network limitations), I'm thinking to con
Greetings! Thanks for running your relays!
On Sunday, October 10, 2021 at 4:49:16 AM UTC-4 sysmanager7 via tor-relays
wrote:
> Greetings All, I have three relays that are in need of an upgrade and
> reboot.
> What is the best way to restart these relays without loosing flags or ti
On Sunday, October 10, 2021 at 4:48:47 AM UTC-4 Keifer Bly wrote:
> I am wondering, is there a way configure tor (via the torrc file) to
> restart automatically once a month? Thank you.
>
Before you implement a time-based service restart, you may wish to check
that your OS and har
Hi,
hi made a new Proxmox server for my home network. I still run a bare metal
Tor bridge, but now i would run more bridge in my home network.
I have a public dynamic IP: what is the max number of bridge i can run
(obviously on different ORPort) under the same IP address
Thanks in advance
gus :
>
> > From the Tor Relay Guide:
> >
> > "Note: You can only run two Tor relays per public IPv4 address. If you
> > want to run more than two relays you will need more IPv4 addresses."
> > https://community.torproject.org/relay/relays-requirements/
enter our
> network.
>
> Georg
>
When you don't have any evidence that these relays were doing something bad
then what did they do to get rejected?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
.
extendcircuit 0 authoritynickname
getinfo circuit-status
I observed that i can successfully create circuits to no more than three
authorities and it seems to change to which authorities i can create
circuits.
The unsuccessful circuits stay in EXTENDED but never reach BUILT until Tor
gives up eventually
Not sure if this is the correct list on which to ask but a new node
created just over 7 days ago is now
being shown on Tor Metrics (atlas.torproject.org) as being down. However
local logs show heartbeat
activity and some directory activity. A port scan of the IP address shows:
-- cut here
If we could get EFF to announce a boycott of any corporation known to
act maliciously against Tor or other privacy-friendly technology (such
as VPNs), that would go a long way.
I will also write to EFF. I have donated money to them, so maybe they
will listen. If they won't support a bo
public IPv6.
Or do you actually need help to have it setup on Hardened BSD?
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Elias via tor-relays wrote:
> This is actually not a "real" root server, it's a KVM server (of
> course). The CPU is an AMD EPYC 7702 with 2 dedicated cores per
> server@3,35GHz.
Since this is virtualization, make sure that features such as AES
acceleration are active.
Google is now sending abuse reports complaining of DDoS attacks against
their services. While they believe the IPs are participating in a
botnet, it is clear that they are Tor exit relays.
I don't know why they are sending us the report after the attacks have
ended. Besides, since Google ser
Tor project recommends 16Mbits/s in each direction minimum
<https://community.torproject.org/relay/relays-requirements/> so you
should be fine.
However note the concurrent connections requirement, which can
"overwhelm consumer-level routers." That might be something to watc
Your sources.list file entry looks incorrect. I would definitely not
recommend using trust=yes for a repo like tor, as it bypasses apt's
security checks.
According to the instructions you linked
<https://support.torproject.org/apt/tor-deb-repo/>, your source for the
tor package
bution mechanism, it has
'email', is that really much used? Generally speaking I want my time and money
to get the most use possible of course. How much use does the 'telegram'
mechanism get?
Maybe someone can give some comments before I (possibly) change it manu
I notice that the "first seen" info on my obfs4 bridge status page on tor atlas
/ metrics all of a sudden is incorrect, by years. Not sure if it's something
that introduced itself with latest update or what.
The various graphs on traffic and users are still correct
of that page before the latest upgrade so it appears the
change should have something to to with that somehow.
This is on Debian.
A tor op
‐‐‐ Original Message ‐‐‐
On Monday, December 27th, 2021 at 11:59 PM, nusenu
wrote:
> Hi,
>
> could you paste the Relay Search page l
Hi,
I am thinking of starting another bridge. In regards to the current situation,
is there a real benefit in deploying one within Russia or does that really not
matter?
A tor op___
tor-relays mailing list
tor-relays@lists.torproject.org
https
just some relays?
TIA,
A tor op___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hello,
I'm part of the abuse team of the mentioned Tor Exit.
Also I follow this mailing list.
I read you post several times but I'm not sure what you where doing.
It looks to me like you running a tor node and have also a dyndns update
process running.
Is this correct ? Please provide
Hi
I am a TOR bridge operator running a bridge with 8 Mbps advertised BW and
having obfs4 installed. Been up a year or so on this install.
I'll put a few misc thoughts out here, only been lurking on list earlier.
I have been thinking a little about how useful this system is (MY bridge tha
Hi
When a tor admin updates a tor node, what is the reasoning for punishing the
status by removing flags like the guard flag?
The node may have been up for months on end without issues and goes down for a
few minutes during install and restart and comes up with a newer version, hence
it is
No, still not back. BW reading back to normal though.
Original Message
Subject: Re: [tor-relays] Updates removes status flags
Local Time: January 27, 2017 5:27 AM
UTC Time: January 27, 2017 5:27 AM
From: petru...@riseup.net
To: tor-relays@lists.torproject.org
Hey,
May be the
Mine is still missing the guard flag after 17 days since reboot.
Original Message
Subject: Re: [tor-relays] Normal to lose stable/guard flags on relay reboot?
Local Time: February 6, 2017 12:04 AM
UTC Time: February 6, 2017 12:04 AM
From: dl1...@gmx.de
To: tor-relays
It's a bridge.
Original Message
Subject: Re: [tor-relays] Normal to lose stable/guard flags on relay reboot?
Local Time: February 9, 2017 11:29 PM
UTC Time: February 9, 2017 11:29 PM
From: teor2...@gmail.com
To: tor-relays@lists.torproject.org
> On 10 Feb 2017, at
Nope that need not be it.
I had my bridge relay running for many moths with a few Mbps BW and it steadily
had the guard flag set.
When doing the latest TOR upgrade I upped the BW-limit 100% but since that tor
service restart it has now been running some 40 days without getting the guard
flag
It was two days ago. Today I can not reach it as well.
best regards
Dirk
On 01.05.2017 08:08, scar wrote:
> I was unable to reach the site, is it still in operation?
>
> _______
> tor-relays mailing list
> tor-relays@lists.torproj
Dear all,
we are operating two exit nodes with each two tor processes out of
Switzerland.
The nodes worked quite stable until about 2-3 weeks ago.
Since then we experience frequent disruptions (Up to several times a
day). This is caused by a significant rise in memory consumption
by the tor
Hello Roger,
I updated the ticket. You will find the output of the valgrind there as
well:
https://trac.torproject.org/projects/tor/attachment/ticket/22255/valgrind.txt
best regards
Dirk
On 23.05.2017 06:00, Roger Dingledine wrote:
> On Tue, May 23, 2017 at 03:01:10AM +, John Ricke
gement, and it would be
> great to filter out the noise better than we currently do.
>
> Did anyone set up an infrastructure like that before? How would you do it?
>
> Also, if you just want to help with our abuse management, let me know!
> We c
Hi
I'm running an obfs4 bridge and upgraded to latest version.
Use Debian Jessie (8.9).
One thing that puzzles me is the log
/var/log/tor/log
I used to always see some useful info there, like number of connecting clients
during the last 6 hours etc.
I have an entry:
[notice] Clean shu
http://lmgtfy.com/?q=CVE-2017-0380
> Original Message
> Subject: Re: [tor-relays] More recent rpm somewhere?
> Local Time: September 17, 2017 12:53 PM
> UTC Time: September 17, 2017 12:53 PM
> From: bnag...@gmail.com
> To: tor-relays@lists.torproject.org
>
&
Hello AMuse,
we faced the same about 1-2 month ago. Actuall people use fail2ban which
creates abuse mails to you provider.
Thats not new. But recently the abuse mails have risen to numbers which
lead us to believe there are acutally more people abusing ssh via tor
than people really using it.
In
purposes of documenting
the approximate ratio of "complaints / traffic processed", these nodes have
handled ~515TB and are using the recommended reduced exit policy.
https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy_______
tor-rela
ng the recommended
>> reduced exit policy.
>> https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
comfortable
> sharing. I am not able to provide legal advice, but if this looks like a
> situation where legal advice will be required, I have some contacts who may
> be able to provide assistance. Thank you for running exit relays. > On Jun 8,
> 2018, at 5:43 AM, Matt Traudt wrote:
Hello,
My tor exit has been building up reputation for months but still fails to
saturate a 100 Mbps line while barely using any CPU. Therefore, I recently
decided to start a second tor process on the same server which is now
slowly building up reputation. I gave the second process a different
I need some help.
My dedicated server is running debian and is new, set up by my
serverhoster.
I want to run a TOR-Relay:
- It should always update to latest stable automatically.
- It should be save.
I will edit the torrc by myself. What i need is simple copy+paste
codeline for:
- isntall
to deal with rsa key?
will tor be utoupdated at new release with "apt-get -y upgrade" or how
to manage automated actuality?
On Saturday, April 18, 2015 3:46 PM, Julien ROBIN
wrote:
Hi !
You can try a mix between this (ultra simple), from
https://www.torproject.org/docs/debian
Hi!
> let's begin: is it possible to run 5 bridges on one low-end VPS?
[...]
> and would 5 processes be too much for a 2-core VPS with
> 256mb memory?
I did run a single Relay on a small vps (2 GB VRam 2 Ghz VCore). Tor
itself did run smooth but the VPS was unable to mana
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
hi there.
0.2.5.12 on debian jessie: "service tor reload" causes message:
"Job for tor.service failed. See 'systemctl status tor.service' and
'journalctl -xn' for details."
it says something like "failed to
simple stuff that
works like:
shell, ps, tail, less, and vi
./tor
kill -hup
It's a prerequisite before trying to read and figure out whatever
abstractions
were put upon you by your OS or package.
Search, manpade, and run the stuff you quoted.
______
hi,
about that following lines in the mail from Moritz Bartl.
[tor-relays] Please enable IPv6 on your relay!
In short, you add:
ORPort [IPv6::address]:port
IPv6Exit 1
ExitPolicy reject6 *:*
shouldnt there be a "a" in the first line? how important ist the letter
a? i guess some oper
------
Betreff:
Re: [tor-relays] a line "enable IPv6 on your relay"
Von:
yl
Datum:
Sonntag, 24. Mai 2015 19:54
An:
tor-relays@lists.torproject.org
Am 24.05.2015 um 19:25 schrieb tor-server-crea...@use.startmail.com:
shouldnt there be a "a" in the first l
hi, its very easy:
https://trac.torproject.org/projects/tor/wiki/doc/IPv6RelayHowto
just put your IPv6 adress somewhrere within square brackets into torrc.
ORPort [2001:DB8::1]:9050
- afaik it shouldnt matter where you put it into torrc -
also put
IPv6Exit 1
ExitPolicy reject6 *:*
somewhere in
indeed, thanks for you promptly interverntion.
it feels good to see the mb/s rising!
also tor websurfing already responds faster subjectively to me
GIGGITY ((:
Am Montag, 25. Mai 2015 16:32 schrieb Marcus :
Hey,
thank’s a lot my relay is now also able to support Tor. After over 2
weeks
hi,
is that IPv6 adress valid for example "becks" [2a01:4f8:162:7345::2]?
how do i know if IPv6 is correct and reachable?
thanks
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays-requ...@lists.torproject.org schreef op 05/06/15 om 14:00:
> Updating tor to get fix for #15083? (Elliott Jin)
>
> - Is Tor 0.2.5.10 (git-43a5f3d91e726291) actually the newest stable
> version, or did I mess something up when trying to update tor?
> - Would it be
I want to investigate why obfs4 is nearly never used.
hi,
may you want to have a look into tails bug #9268 adressing some obfs
issue
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
hey
seems like avira is joining us running 24 exits through as24875. seems
to be about double the size of mozillas relays.
Yay!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https
german exit for https://youtu.be/ is breaking functionality due to
disunity between google and gema. since years now. anyhow german exits
shouldnt block youtube ip's, now should they?
_______
tor-relays mailing list
tor-relays@lists.torproject.org
exact, thats what im talking about
Am Dienstag, 23. Juni 2015 23:28 schrieb cacahuatl
:
On Tue, Jun 23, 2015 at 08:00:53PM +0200,
tor-server-crea...@use.startmail.com wrote:
german exit for https://youtu.be/ is breaking functionality due to
disunity
between google and gema. since years
x27;m not sure how useful a relay in an exotic location, if
it's
expensive to run and pushes very little traffic. Maybe others can
comment.
I think it is reasonably priced; $20USD/month for unmetered 100Mb/s.
I am willing to contribute money to Tor because I believe in what it
suppor
from
crusty old botnet bots running ancient versions
of the Tor daemon.
But all that bot traffic creates a lot
of statistical "background noise," and
so may be providing a service in making
it more difficult for advanced adversaries
to perform traffic correlation a
Just thoughts: To throttle how about assign twisted consensus weight to
outdated versions? Highest consensus weight to slowest relays and vice
versa? Wouldnt they overload/throttle themselfes nicely?
Am Sonntag, 23. August 2015 10:24 schrieb
tor-server-crea...@use.startmail.com:
Would be
154.35.132.70
reject *.*
isnt it a bad idea? will i be flagged as bad exit by reducing exit like
so^? wouldnt it take some load from the network while excude all
complains cause this are tor-friendly ips?
thanks meanwhile
Am Freitag, 21. August 2015 02:23 schrieb
schrieb Tim Wilson-Brown - teor
:
On 3 Sep 2015, at 14:55, tor-server-crea...@use.startmail.com wrote:
hi,
what do you think about high restricted exits?
i thought about solely accept some single ips.
In order to be assigned the Exit flag, a relay needs to exit to at
least a IPv4 /8
u should reduce your exit policy and give it a try:
https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
Am Sonntag, 6. September 2015 06:06 schrieb Patrick O'Doherty
:
hey all,
I'm look
https://www.torproject.org/docs/faq.html.en#UpgradeOrMove
I want to upgrade/move my relay. How do I keep the same key?
When upgrading your Tor relay, or running it on a different computer,
the important part is to keep the same identity key (stored in
"keys/secret_id_key" in your Dat
It appears that First Tech Federal Credit Union is blocking all Tor
nodes (including non-exit nodes) from connecting to their website,
http://www.firsttechfed.com
This seems ... misguided on their part. Blocking exit nodes is one
thing, but preventing random people who happen to run a Tor middle
. September 2015 06:36 schrieb Tor Stuff
:
I have been running this node (nickname 'Geheimschreiber') with
fingerprint C69D24F9353E16D85E82B4A9E4571DFAF6DCF531 for many months
so expected Atlas/Globe to pickup my changed capabilities fairly
quickly.
Am I being too impatient or have
alternately, limit the
bandwidth
to stop it fluctuating so much.
Tim (teor)
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
_______
tor-relays mailing list
tor-relay
, non-exit + exit relays and more than
one
/16 network).
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______
tor-relays mailing list
401 - 500 of 1216 matches
Mail list logo