Anders,
Thank you for running exit relays!
@aquintex
> On Jun 3, 2022, at 01:43, Anders Burmeister via tor-relays
> wrote:
>
>
> Hi Heroes
>
> I’m sorry to inform you, that my two relays will discontinue and no longer
> participating from 28 july 2022.
&g
apt update ; apt install tor apt-transport-tor -y
sed -i
's/https:\/\/deb.debian.org/tor+http:\/\/2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/g'
/etc/apt/sources.list
sed -i
's/https:\/\/security.debian.org/tor+http
yes, found:
[warn] {PROTOCOL} Received a bad CERTS cell: Link certificate does not
match TLS certificate
[warn] {PROTOCOL} Received a bad CERTS cell on OR connection
(handshaking (Tor, v3 handshake)) with 77.171.80.188:443
ID=w0FFB+Yb8+RM2KumjnKL4T/hI64CWhRBcVpBQRC0soo
RSA_ID
Hi,
to saturate most of this bandwidth, you perhaps like to run multiple tor
instances. Because mostly single core tor is cpu bottleneck.
2x tor per single IPv4 allowed for now.
in current c tor we only got minimal TLS options:
# HardwareAccel HardwareAccel 0|1
# If non-zero, try to use
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Paul,
Can you share more information with me, because I am interested.
I am maintaining two relays myself.
Sent from ProtonMail mobile
\ Original Message
On Jun 7, 2022, 5:15 PM, Jonas Friedli via tor-relays <
apply. If you have setup your AROI [1] on your
relays already you can simply copy the ContactInfo to your bridges and
publish the list of hashed bridge fingerprints under this URL:
https://-your-hostname-/.well-known/tor-relay/hashed-bridge-rsa-fingerprint.
txt
Oh nice, thanks.
I just saw
Keifer Bly:
Hi all,
So upon trying all of the mentioned commands, my tor installation still
encounters an error when trying to update. Attached is a photo of my
sources.list.debian.templ and sources.list. When trying to update the
returned error
N: Ignoring file 'DEADJOE' in directory
n as hsdir for popular onion
services.
https://metrics.torproject.org/rs.html#details/A4E74410D83705EEFF24BC265DE2B2FF39BDA56E
Thanks, Marco
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/li
I was tired of using the debian testing for running my node and decided
to redo my node with arch because of the fast package updates and
rolling release model.
If that is related to tor updates, you may like the official tor
repositories for quicker tor update supply:
https
like build an debian
tor node.
By the way, the one who will keep admin it, should add Fingerprint to
his/her Nodes "MyFamily".
Best Regards
Jonfri
p...@coffswifi.net:
Hi all,
I own coffswifi4 in Spain. I don't have the time to maintain or upgrade.
I'm willing to keep
Am 12.04.2022 um 16:23 schrieb Bauruine:
The tor-spec [1] shows that Tor only uses RSA with 1024 Bit Keys and the
ciphersuits only contain AES CBC and no AES GCM ones. I'm not an expert
but it looks like it's not that useful for Tor.
Yes and no? The limitation only apply tor protocol crypto
find onion version of pad here:
http://kfahv6wfkbezjyg4r6mlhpmieydbebr5vkok5r34ya464gqz6c44bnyd.onion/p/tor-relay-meetup-may-2022-keep
:)
OpenPGP_0x4A148E3AB438EC68.asc
Description: OpenPGP public key
OpenPGP_signature
Description: OpenPGP digital signature
Hi Tor-Operators,
I have installed a bridge according to the official how-to. The config is as
follows:
Log notice file /var/log/tor/notices.log
DataDirectory /var/lib/tor
Address bridge.xxx.de
BridgeRelay 1
ORPort 1044
ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
On 5/4/22 4:31 PM, Mike Perry wrote:
> Tor 0.4.7.7-stable contains a very important performance improvement,
> called Congestion Control.
> We have packages in available for Debian, Ubuntu, Fedora, CentOS, and
> BSD:
> - Debian: https://support.torproject.org/apt/tor-deb-rep
Hi heroes
Ended and deleted my two relays Aerodynamik02 and Aerodynamik03. When can I
expect they will disappear from tor
metrics?https://metrics.torproject.org/rs.html#details/EFEACD781604EB80FBC025EDEDEA2D523AEAAA2F
Best regards
Anders___
tor
where the idle-cpu hits 0 and I get the
"relay too slow" indication.
Any suggestions?
/Ole Rydahl
https://metrics.torproject.org/rs.html#details/CE1FD7659F2DFE92B883083C0C6C9
74616D17F3D
_______
tor-relays mailing list
tor-relays@lists.torproject
idges
> (optionally, with a button that says, iat-mode non-zero only, but we need to
> harden more before implementing something like that), some government
> agencies might be thrown off by this, along with the fact that they also only
> have limited IP ranges.
>
> Thoughts?
&
I am in an airport, i will try to participate.
On Oct 22, 2022, at 11:30, gus wrote:
Hello,
We're meeting today, October 22, at 19UTC (in 30 minutes).
See you soon!
Gus
On Mon, Oct 10, 2022 at 05:46:09PM -0300, gus wrote:
Dear relay operators,
The next Tor relay operator meetup will happen
#details/C9DF64AF926E2E584E345D13BCE4A97C231A36BE
Am 10.09.2022 um 14:37 schrieb volker.m...@gmx.de:
Hi folks.
On Tuesday morning police knocked on my door, performing a full house
search.
Some Nazis used TOR to send nazi-emails to several schools in Germany.
Unfortunately their mails left one of my
Dear relay operators,
The next Tor relay operator meetup will happen on Saturday,
October 22 at 19.00 UTC.
## Where
BigBlueButton: https://tor.meet.coop/gus-og0-x74-dzn
## Agenda (WIP)
* Announcements
* Tor and Snowflake in Iran
* EOL rejection
* State of DoS attack
* New network
: Binary data
publickey - nikoloskid@pm.me - 0xFE344B77.asc.sig
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ing firewall
> solution.
>
> You can find the repo here: https://github.com/steinex/tor-ddos
>
> Feel free to give it a shot and feedback would be much appreciated!
>
> Greetings,
> steinex
___
tor-relays mailing list
tor-rela
against the attacks, even if they are not that
aggresive.
On top of that, I feel its more easy to implement into ones existing firewall
solution.
You can find the repo here: https://github.com/steinex/tor-ddos
Feel free to give it a shot and feedback would be much appreciated!
Greetings
ideas.
I'd like to learn more about these security issues in practice. I can
imagine physical security is a big part of it. Do you maybe have some
specific pointers for me to look for?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https
Dear Tor community,
maybe the notes from the Tor relay operator meetup on March 4 should
have mentioned that a participant called AirTor was kicked from that
BBB conference.
This happened because they were using “Tor” in their name and
continued to make dubious offers like the one below which
duct & Standards
Comcast
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi – Dropping into this thread from Comcast to say that we DO NOT BLOCK Tor.
Feel free to refer back to my 2014 blog statement on this at
https://corporate.comcast.com/comcast-voices/setting-the-record-straight-on-tor.
Jason Livingood
Technology Policy, Product & Standards
Com
BTW, feel free to refer back to my 2014 blog statement on this at
https://corporate.comcast.com/comcast-voices/setting-the-record-straight-on-tor.
Jason
From: tor-relays on behalf of
"Livingood, Jason via tor-relays"
Reply-To: "tor-relays@lists.torproject.org"
Date: Wedn
>As to the blog post you mention… Your statements are very generic: now you
>talk about "not blocking tor", but tor is not just one webpage, one server, a
>monolithic entity. I would appreciate details: If your customer has "advanced
>security" activated, can he
Dear Tor Relay Operators,
We hope this email finds you well. We are writing to provide a friendly
reminder that our Tor Update Survey, conducted as part of the University of
Edinburgh Research Project, will be closing on 23rd July. If you haven't
already participated, this is your last chance
issues. In addition, I have
other non-exit relays hosted by the same provider with no issues and more
across other providers.
I proceeded to reinstall the OS and reconfigure Tor. I was then quickly
notified by my hosting provider again of more abuse reports all showing port 22
as target port.
I
Hello,It is honestly still puzzling to me considering that the relay wasn’t compromised or misconfigured.If you or anyone wants to check out the reportshttps://www.abuseipdb.com/check/23.132.184.31 On Wed, Jul 26, 2023 at 2:16 PM, mpan - tor-1qnuaylp at mpan.pl <tor-1qnuaylp_at_mpan_pl_zcbq
Dear Tor Relay Operators,
We hope this email finds you well. This is our final outreach regarding the Tor
Update Survey, and we want to extend a sincere thank you to those who have
already participated. Your valuable contributions have been invaluable to our
research project at the University
Hi all,
Is anyone running Tor relay in k8s cluster? I am trying for a few days but It
does not come alive. My servers are not behind a firewall, should be and are
accessible, I run two bare-metal servers in Contabo. 1 master 1 node.
Docker image and helm chart that use; https://gitlab.com
via tor-relays schrieb am Montag, 15.
Mai 2023 um 11:19 vorm.:
> Hey,
>
> the paper is from August 2018 (if I looked at the correct one), not so
> recent :)
>
> And e. g. Philipp Winter questions the usefulness of iat_mode:
>
> > substantial performance penal
Regarding web-servers hosting Tor relays, it is much more likely for them to
sit behind a CDN such as Cloudflare for DoS protection and delivery
optimization.
Other services of course, however..
--- Original Message ---
xmrk2 via tor-relays schrieb am Sonntag, 11.
Juni 2023 um 1:46
Hello dear relay and bridge hosts,
recently a paper was published, describing a traffic confirmation attack called
DeepCorr, which works against Tor users and as such, also hidden services.
The attack allegedly had success rates of up to 96% percent.
It is being worked on and listed here
Many thanks for your feedbacks - see
https://bugzilla.ipfire.org/show_bug.cgi?id=13565
Regards - Carlo
On Feb 1, 2024 at 8:44 PM, Martin Gebhardt via tor-relays
wrote:>> I have a relay on 152.53.17.183 /
2a0a:4cc0:1:1333::beef which is listed as
>> "German" in
Does Tor Weather work with bridges? I have 2 bridges that have been operating
for years and it says the fingerprints do not match any relays.
I have been using Uptime Robot, but it would be cool to use Tor Weather.
On Sunday, February 4th, 2024 at 21:33, mail--- via tor-relays
wrote:
>
Hi,
with Tor version 0.4.7.x being EOL, the docker image for the webtunnel bridge
deserves an update, as it still uses 0.4.7.13 !
Regards, C.
-- Sent with https://mailfence.com Secure and private email___
tor-relays mailing list
tor-relays
:29:36 matrix tor[575]: Dec 14 16:29:36.000 [warn]
> tor_bug_occurred_(): Bug: src/core/or/conflux.c:565: conflux_pick_first_leg:
> Non-fatal assertion !(smartlist_len(cfx->legs) <= 0) failed. (on Tor 0.4.8.9
> )Dec 14 16:29:36 matrix tor[575]: Dec 14 16:29:36.000 [warn] Bug: T
Hello Likogan (you did not specify a name, so I just took your domain name).
First, lets look at issue number one:
If your Tor Exit is using ~50% of the entire CPU (VM or dedicated server?)
while only routing 6 Mbps, then you are likely not using hardware AES
acceleration (aesni).
For example
developer can comment on the deeper workings of OpenSSL and Tor, and
terminology might get weird between the Tor and OpenSSL (both very big
code-bases).
Also, regarding the e-mail, I post regularly on here and tor-dev, so no
worries :)
Let's just end this pointless discussion here, I will do
performs.
If you would like, you can link me your Tor Metrics link privately.
Thank you for supporting the Tor network!
All the best,
George
On Friday, December 22nd, 2023 at 4:30 PM, Dan wrote:
> Hi George,
>
> Thanks for all the input.
>
> > Or, just ask the provider for
Hello Dan,> I'll probably remove all limits for January and just see how much traffic gets transferred.I would highly advise against this since you are using VPS with a capped bandwidth plan. Tor will use all of the bandwidth you give it. Therefore if you remove all limits that may l
Hello,
this just happened again 5 days after the update to 0.4.8.10:
> Dec 21 13:54:54 matrix tor[558]: Dec 21 13:54:54.000 [warn]
> tor_bug_occurred_(): Bug: src/core/or/conflux.c:567: conflux_pick_first_leg:
> Non-fatal assertion !(smartlist_len(cfx->legs) <= 0) failed. (
We would appreciate if the tor project could coordinate better with
deb.torproject.org debian package updates to reduce the time between a
release and the availability of packages on deb.torproject.org.
___
tor-relays mailing list
tor-relays
/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
- Is it possible to immediately remove my relay from relay search on Tor
Metrics?
No.
- If not, when will my relay be removed from the relay list?
Generally 7 days after your relay last uploaded it's descriptor.
Happy holidays,
George
On Sunday, December 24th, 2023 at 11:10 AM
s or 8 MBit/s.
> 2 - Will it negatively affect my relay's reputation if sometimes it's very
>slow?
The Tor authorities might reduce your middle probability, but you will not be
punished in any way, and as soon as automatic bandwidth measurements confirm
that you have more capaci
Also,
it should not nearly be as frequent, it happens maybe every 30-45 minutes on my
two relays (one guard, one exit).
Try running Tor natively (you can just move it to a native Linux installation,
by preserving the "`keys/ed25519_master_id_secret_key`" and
`"keys/secret_id_ke
d), reliably every ~30 seconds.
This is just Tor doing zlib-compression on some documents, you can somewhat
combat it by assigning more cores to your machine.
Tor is mostly singlethreaded, but OnionSkin decryption, zlib compression and
some other operations utilize all cores detected.
Reg
Hello,
for about 3 months I have been hosting two Tor relays:
https://metrics.torproject.org/rs.html#details/AF42E6C77196A37F041A1A1E953E51B4656BDC1B
https://metrics.torproject.org/rs.html#details/7F7D1A5BE88FA7C9358955705AE7AFA61EEDA2B0
After doing system maintenance (mainly upgrading
Hi,
I think this started with release 0.4.8.10, but both of my Tor relays no longer
reload their config when doing for example:
- systemctl reload tor@exit
Here is the relevant part of the unit file:
> [Unit]Description=Anonymizing overlay network for TCP
> After=syslog.
I run the following relay:
https://metrics.torproject.org/rs.html#details/6C336E553CC7E0416EBC8577A7289349B757F6C3.
I just noticed that my relay’s ‘first seen’ date got reset. Tor now thinks
that my relay is less than 2 weeks old
On 1/15/24 3:19 PM, Chris Enkidu-6 wrote:
I've noticed a new kind of possible attack on some of my relays, as
early as Dec.23 which causes huge spikes of outbound traffic that
eventually maxes out RAM and crashes Tor. The newest one today lasted
for 5 hours switching between two of the three
On 1/13/24 18:29, George Hartley via tor-relays wrote:
Is anyone else experiencing this?
Yes,
https://gitlab.torproject.org/tpo/core/tor/-/issues/40749
--
Toralf
___
tor-relays mailing list
tor-relays@lists.torproject.org
https
Hello,
unfortunately this happens more often. you are not alone :-)
> Am 18.01.2024 um 20:50 schrieb NodNet :
>
> I think tor and Tor Project use IPFire's DB for GeoIP lookups, and
> 198.13.48.219 shows the following:
Yes, libloc/location is used. I had the same problem wit
7 d a y s.
On Monday, January 8th, 2024 at 9:54 AM, 0tpcqovw--- via tor-relays
wrote:
> I think it's after 30 days it gets automatically removed.
> Malcolm
>
>
> On Mon, Dec 25, 2023, 15:25 nemeto via tor-relays
> wrote:
>
> > DuckDuckGo did not detect
)
Everything else seems fixed.
Regards,
George
On Thursday, January 11th, 2024 at 2:18 AM, George Hartley via tor-relays
wrote:
> Hello,
>
> for about 3 months I have been hosting two Tor relays:
>
> https://metrics.torproject.org/rs.html#details/AF42E6C77196A37F041A1A1E9
/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ckports repository: http://raspbian.raspberrypi.org/raspbian
>
> Tor Debian packages doesn't have 32-bit ARM architecture (armhf):
> https://support.torproject.org/apt/tor-deb-repo/
>
> Until now, TPO recommended using Debian -backports. But that still has
> 0.4.7.13: https://packag
On 12/8/23 04:19, Mulloch94 via tor-relays wrote:
-A INPUT -j DROP
HHm, what's about local traffic, e.g.: -A INPUT --in-interface lo -j ACCEPT
or ICMP, e.g.: -A INPUT -p icmp -j ACCEPT
To persist your firewall rules take a look at this doc [1]
[1] https://github.com/toralf/torutils#quick
If I want to serve an HTML page for my exit node do I need Apache2/nginx or can
I just modify my torrc? ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
nd private email_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> I have a relay on 152.53.17.183 / 2a0a:4cc0:1:1333::beef which is listed as
>> "German" in metrics.torproject.org, but actually it is in Austria
>
> Was just a topic here recently:
> https://lists.torproject.org/pipermail/tor-relays/2024-January/021472.html
>
A blog post I discovered brought up that when they perform a speed test through
Tor browser, Cloudflare is quite frequently displayed as the local host. I had
the same result. Is there a reason for this, like perhaps the exit relay is
proxied through Cloudflare? You can easily replicate
: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 4/19/24 22:53, tor--- via tor-relays wrote:
have a significant
tor_bug_reached_count rate (around 8 per second).
Here the rate is about 2-4 per hour (git-HEAD)
--
Toralf
___
tor-relays mailing list
tor-relays@lists.torproject.org
https
, not a VPS.
-- Original Message --
From "Landon"
To tor-relays@lists.torproject.org
Date 22/4/2024 4:02:21 πμ
Subject [tor-relays] I need a new VPS provider
Hello,
I am currently using gcore.com as my VPS hosting provider. I have been
running a Tor bridge with them for several ye
Hi Landon,
I can strongly recommend BuyVM.net as a good alternative. They allow all kinds
of Tor nodes and have good performance + exceptional support. I've been using
them for years with no issues.
Seth
Sent from Proton Mail Android
Original Message
On 22/04/2024 02:02
conds" or "2
hours 23 minutes and 30 seconds."
However, the bridge is online.
I am wondering if this is the correct behavior for the Webtunnel
protocol.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject
Hello Aleff,
It should be okay as-is, but I would temporarily upgrade the hardware to
determine if it is the root cause.
Frank
Apr 2, 2024, 10:34 AM by tor-relays@lists.torproject.org:
> My computer has:
> - 1 vCore CPU
> - 1 GB RAM
> - Maximum bandwidth: 1 GB/s
>
>
will
ConfluxEnabled 0
disable it for tor acting as a client only or for relays as well?
Yes, it affects relays as well, not just clients.
Due to the high frequency of bug events related to conflux,
especially:
https://gitlab.torproject.org/tpo/core/tor/-/issues/40908
the tor_bug_reached
This tor is a relay and ConfluxEnabled is set to 0. We would ask you
to please write to us on tor-re...@lists.torproject.org
there is a typo in the code that generates that log line:
tor-relay@ should be tor-relays@
___
tor-relays mailing list
tor
t; -hiro
>
> On 4/22/24 22:13, Hiro wrote:
>> Hey,
>>
>> On 4/20/24 17:40, Dionysios K. via tor-relays wrote:
>>> Hello everyone,
>>>
>>> I recently switched from using obfs4 to Webtunnel from my bridge.
>>>
>>> Since the configurat
Hello,
the repo failed to get new updates after
Version: 0.4.9.0-alpha-dev-20240415T020400Z-1~d12.bookworm+1
but we would be eager to test changes that got into main
in the last few days.
https://deb.torproject.org/torproject.org/dists/tor-nightly-main-bookworm/main/binary-amd64/Packages
, Frank Lý via tor-relays
tor-relays@lists.torproject.org ha scritto: Hello Aleff,
It should be okay as-is, but I would temporarily upgrade the hardware to
determine if it is the root cause.
Frank
Apr 2, 2024, 10:34 AM by tor-relays@lists.torproject.org:
My computer has:
- 1 vCore CPU
- 1 GB
On 5/2/24 18:48, gus wrote:
- When: May 11, 19.00 UTC
hhm, the ESC in Malmö is at the same time :-/
--
Toralf
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hey there,
Debian offers unattended upgrades for specific packages:
https://wiki.debian.org/UnattendedUpgrades
If you follow this sites instructions carefully, then you don't have to worry
about updating Tor manually anymore (but you would want to if there is a
significant security issue
reachable from the outside. The notice log I temporarily enabled to look
for the issue apparently does not show any warning signs.
Here is an anonymized output of the log:
[notice] Tor 0.4.8.10 opening new log file.
[notice] We compiled with OpenSSL XXX and we are running with OpenSSL
XXX
guration has been changed in the recent
weeks, and weirdly enough the server can still exit in ipv6, but does
not answer to pings from outside. I have temporarily disabled IPv6Exit
and the respective listening ports while we investigate.
Cheers
Giulio
______
entry node statistics, but no GeoIP database found. Please specify a
GeoIP database using the GeoIPFile option.
However the option is set in torrc and i verified the files are at those
locations and readable by all:
GeoIPFile /usr/local/share/tor/geoip
GeoIPv6File /usr/local/share/tor/geoip6
On 2/15/24 17:16, li...@for-privacy.net wrote:
I let nightly's upgrade automatically, but not stable.
Therefore I have the following config in
/etc/apt/50unattended-upgrades
Unattended-Upgrade::Origins-Pattern {
...
// Update TorProject's nightly dev packages: (Suite & Codename:
tor-nig
No dice, this solution did not solve the problem for me either.
My VPS holds up well to a maximum traffic of this magnitude and the hardware
resources are not used more than 50% but nevertheless it keeps shutting down
and restarting the tor service up to a maximum Uptime of 3 hours (but often
Hello Aleff,
That is up to you. I strongly suspect that the hardware is the bottleneck, but
detailed specifications are required in order to determine a conclusion. Tor is
currently bounded by single-thread CPU performance, with a minimum
recommendation of 1 GB of RAM for non-exit relays
Just wanted to bring this to everyone’s attention if you hadn’t seen it already.
Developer discovered a backdoor in xz-utils
https://www.openwall.com/lists/oss-security/2024/03/29/4
--
Sent from Canary (https://canarymail.io)
___
tor-relays mailing
My computer has:- 1 vCore CPU- 1 GB RAM- Maximum bandwidth: 1 GB/s
So if I understand correctly, the problem should not be at the hardware level,
right?
Il mar, apr 2, 2024 alle 12:14, Frank Lý via tor-relays
tor-relays@lists.torproject.org ha scritto: Hello Aleff,
That is up to you. I
Hello,
conflux appears to be the primary source of bugs and crashes
for us in the past few months and there have been numerous
issues related to it on gitlab.
from the tor manual page:
ConfluxEnabled 0|1|auto
If this option is set to 1, general purpose traffic will use
Conflux
, and the connection speed
is high. However, I have set a RelayBandwidthRate limit of 250 Mbits.
Interestingly, despite this configuration, the Tor Metrics site detects a speed
of approximately 10/13 MBytes, equivalent to about 90/110 Mbits. This led me to
speculate that the machine might experience
Hello Aleff,
Yes.
No.
No. I used Debian, so updates were less frequent, maybe once every 3-5 weeks or
so.
Frank
Mar 26, 2024, 3:03 AM by tor-relays@lists.torproject.org:
> Dear Tor-Relays Mailing List Members,
>
> I hope this email finds you well. I'm reaching out to share some obs
Dear Tor-Relays Mailing List Members,
I hope this email finds you well. I'm reaching out to share some observations
and pose some questions regarding the management of relay node updates,
particularly concerning their impact on stability and security of the service
provided.
Recently, I've
On 3/26/24 09:54, Alessandro Greco via tor-relays wrote:
Recently, I've noticed an interesting pattern with my relay node (ID:
47B72187844C00AA5D524415E52E3BE81E63056B [1]). I've followed
TorProject's recommendations [2] and configured automatic updates, which
has led to frequent restarts
, as Tor circuits are
generally quite resilient and as long as you aren't a guard node I believe
connections won't die because your relay is restarting.
I would also note that Tor recommends [2] an uptime or 24/7 is nice, but not
required and that restarts to the daemon or node are fine. Because
On 2/26/24 20:07, meskio wrote:
Rdsys, the new bridgeDB, will not automatically assign bridges to Lox for now,
but will instead accept bridges with the 'BridgeDistribution lox' configured in
torrc.
BTW by accident I configured "any" but restarted tor with "lox" 2
minutes l
On 2/26/24 20:07, meskio wrote:
At the moment we're
looking for 10 new bridges for Lox.
9 left
--
Toralf
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 2/27/24 21:14, boldsuck wrote:
Gentoo & FreeBSD-Port Dev's and users are years
ahead ;-)
Whilst I'd agree on that my Tor bridges and Snowflakes do run under a
recent Debian. However Tor et al are compiled from sources. [1] [2]
[1]
https://github.com/toralf/tor-relays/blob/main/playb
>> On 27 Feb 2024, at 15:39, boldsuck wrote:
>> On Dienstag, 27. Februar 2024 14:52:00 CET Corl3ss via tor-relays wrote:
>>> On 26/02/2024 21:03, Toralf Förster via tor-relays wrote:
>>>> On 2/26/24 20:07, meskio wrote:
>>>>> At the momen
`torrc` file, your bridge will
stay dormant after reaching the specified `AccountingMax` value you have
configured. Any inactive Tor relays will be delisted from Tor Metrics after one
week.
Frank
May 14, 2024, 11:42 PM by keifer@gmail.com:
> Hi,
>
> So for my bridge at
801 - 900 of 1022 matches
Mail list logo