Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-24 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

 Shouldn't some exit relays (funded or not) be deployed to use an
 exit IP that is different from it's advertised exit IP in order to
 prevent a simplistic form of blocking based on scraping the
 descriptor set? I think this can happen if the default route is out
 another interface or secondary address. Something of that nature.

Actually I think this is a great idea and allows Tor to be used when
it wasn't possible or painful before.

How does the Torproject and the major Tor network operators think
about it?

-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlCws6QACgkQyM26BSNOM7YoUwEAtsrq4+zcKVDMM1mrAz1Up/rC
YH6UhTVI3i2bWUQsRxYA/iMVMYJscqKlQgVVVdJcUkkg5T29yIQCD8CWoLHRlaAG
=89ZU
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Akamai running Tor exit relays

2012-11-24 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

I found out about it via Moritz's twitter feed [1] and I think it is
great. Am quite curious about it. Does anyone have some insights on
why Akamai decided to start 10 fast exit relays? (CC'ing the relays
contact address here)

Some compass stats [2]:
bandwith: 2.75% of the Tor network
exit probability: 6.97%


[1] https://twitter.com/torservers/status/29861139255296
[2]
https://compass.torproject.org/?family=C3D1F08204E2BF81C6A426F312AE3A2212C78929ases=country=exits=all_relaystop=-1

-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlCws7EACgkQyM26BSNOM7YTnQD+L6D2fH6T5QmR0MUh4wJAnan2
Aag6ImaavJeFZS+jihwA/2roYnLDlocvfgoHe4cDk7vJvGctTGgylLi/FdH2tf9r
=zf1i
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-24 Thread Moritz Bartl
On 24.11.2012 12:46, tagnaq wrote:
 Shouldn't some exit relays (funded or not) be deployed to use an
 exit IP that is different from it's advertised exit IP in order to
 prevent a simplistic form of blocking based on scraping the
 descriptor set?

I don't think it's a good idea. People are always thankful when I can
point them to the bulk exit list and torDNSel. I point out that Tor has
a lot of users and not all of them are bad, and urge for a temporary
block. Most admins seem to follow that advice.

https://check.torproject.org/cgi-bin/TorBulkExitList.py
https://www.torproject.org/projects/tordnsel.html.en

-- 
Moritz Bartl
https://www.torservers.net/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-24 Thread Aaron
On Sat, Nov 24, 2012 at 4:24 AM, Moritz Bartl mor...@torservers.net wrote:
 On 24.11.2012 12:46, tagnaq wrote:
 Shouldn't some exit relays (funded or not) be deployed to use an
 exit IP that is different from it's advertised exit IP in order to
 prevent a simplistic form of blocking based on scraping the
 descriptor set?

 I don't think it's a good idea. People are always thankful when I can
 point them to the bulk exit list and torDNSel. I point out that Tor has
 a lot of users and not all of them are bad, and urge for a temporary
 block. Most admins seem to follow that advice.

But in the light of an IP address is not identity  -- is it
reasonable to block every user of an IP because one person (or bot) is
up to no good? Why do people insist on stopping problem behavior at
the network layer?

--Aaron


 https://check.torproject.org/cgi-bin/TorBulkExitList.py
 https://www.torproject.org/projects/tordnsel.html.en

 --
 Moritz Bartl
 https://www.torservers.net/
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Setting up new Tor relay

2012-11-24 Thread Lance Hathaway

On 23/11/2012 9:46 PM, Lance Hathaway wrote:
Sorry to be a bother, but could anybody offer me some enlightenment on 
what I'm missing???


Never mind, I figured it out. Apparently I had an invalid character in 
my Nickname, which caused Tor to dump itself without writing any sort of 
info to the configured log file. Looks good now.


 -Lance
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] (no subject)

2012-11-24 Thread Znerol2



Sent from Samsung Mobile___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays