Damian Johnson atag...@gmail.com wrote:
Hi all. I've checked in the resolver fixes (thank Fabian and Hans!)
and a test tarball is available at:
http://www.atagar.com/transfer/tmp/arm_bsdTest.tar.bz2
http://www.atagar.com/transfer/tmp/arm_bsdTest.tar.bz2.asc
Thanks.
For BSD I'm using the
Answering to Fabian's mail, which came a minute before I was about send a
more verbose answer.
On Sun, Dec 05, 2010 at 01:02:16PM +0100, Fabian Keil wrote:
Damian Johnson atag...@gmail.com wrote:
Hi all. I've checked in the resolver fixes (thank Fabian and Hans!)
and a test tarball is
On Sat, Dec 04, 2010 at 07:49:58PM -0800, Damian Johnson wrote:
...
For BSD I'm using the following commands:
sockstat -4 | egrep 'process\s*pid' | grep -v '*:*'
procstat -f 'pgrep process' | grep 'pid' | grep -v '0.0.0.0:0'
The purpose of these greps is to only get established
Hans Schnehl torvallena...@gmail.com wrote:
On Sun, Dec 05, 2010 at 01:02:16PM +0100, Fabian Keil wrote:
Damian Johnson atag...@gmail.com wrote:
Hi all. I've checked in the resolver fixes (thank Fabian and Hans!)
and a test tarball is available at:
Roger Dingledine wrote:
On Sat, Dec 04, 2010 at 07:00:17AM +, Orionjur Tor-admin wrote:
I have the above record in '/var/tor/log' on my exit-node.
What it can mean?!
Tor clients build circuits when they first start up, to estimate the
average amount of time it takes to build a circuit.
On Sun, Dec 05, 2010 at 03:16:01PM +, Orionjur Tor-admin wrote:
Are you rate limiting your exit node? Perhaps you should start. It seems
like your network is really overloaded.
I rated limiting my node the following:
BandwidthRate 200 KBytes
BandwidthBurst 400 KBytes
Try
Hello.
In reading: Configuring Hidden Services for Tor I came upon this in Step Three:
More advanced tips.
If your computer isn't online all the time, your hidden service won't be
either. This leaks information to an observant adversary.
Does it leak because it is online all the time or
7 matches
Mail list logo