Ehlo,
Am 2012-01-11 13:34, schrieb Klaus Layer:
I just received an email about a tor relay survey. Do other tor relay
operators received the same email? Does anyone know something about this
survey? I am wondering why this mailing list was not contacted before.
same email received today at
Hi all,
I just received an email about a tor relay survey. Do other tor relay
operators received the same email? Does anyone know something about this
survey? I am wondering why this mailing list was not contacted before.
Best regards,
Klaus
- original message ---
Dear
Hi!
2012/1/11 Klaus Layer klaus.la...@gmx.de:
Hi all,
I just received an email about a tor relay survey. Do other tor relay
operators received the same email? Does anyone know something about this
survey? I am wondering why this mailing list was not contacted before.
They contacted me
received the same letter, I guess the reason for not contacting this list
is that the reach is bigger if directly contacting tor relay operators.
Anybody know what new attack he is speaking of ? I'm a bit doubtfull of
giving sys info, even though the info seems harmless with the recently new
Hi,
The reason you are receiving this message is that, to improve our
study, we require some extra information about the Relay(s) you are
running that, unfortunately, is not publicly available.
I'm curious how such extra information will improve their study,
if/why knowing such private
Hi Marco,
Please discuss the DoS in public forums, I'm not interested in helping
you hide details of your supposed attack. The norms for open source
development may conflict with your expectations of scientific papers,
but that's your problem not ours.
-andy
On Wed, Jan 11, 2012 at 11:47:37AM
The posted script uses the openssl speed command to evaluate the
node's encryption performance. This command iterates through every
algorithm OpenSSL supports, most of which Tor doesn't use. There is
also a bug in OpenSSL where the speed command alone does not utilize
encryption