Re: [tor-relays] A new kind of attack?
On 1/15/24 3:19 PM, Chris Enkidu-6 wrote: I've noticed a new kind of possible attack on some of my relays, as early as Dec.23 which causes huge spikes of outbound traffic that eventually maxes out RAM and crashes Tor. The newest one today lasted for 5 hours switching between two of the three relays on the same IP. I have included charts and excerpts from the log in my post in Tor forum at below link: https://forum.torproject.org/t/new-kind-of-attack/11122 I've noticed this as well, on 0.4.8.10 across FreeBSD and Alpine platforms, against relays too new to receive any meaningful traffic from regular clients. MaxMemInQueues does not prevent the relay's eventual saturation of available memory on the system. The relays operated as exit nodes. We're low on memory (cell queues total alloc: 6336 buffer total alloc: 1556480, tor compress total alloc: 1073827425 (zlib: 0, zstd: 0, lzma: 1073827249), rendezvous cache total alloc: 0). Killing circuits│withover-long queues. (This behavior is controlled by MaxMemInQueues.) -- Jordan Savoca https://jordan.im/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Dutch Relays
On 12/18/23 6:59 AM, ab...@relayon.org 2023 wrote: These are complete and utter shit. avoid like the plague! nifty Oh? I'm curious to hear more about your reasons/experience, if you're open to sharing. They're pretty well-regarded in networking spaces. -- Jordan Savoca https://jordan.im/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Dutch Relays
On 12/10/23 2:41 PM, Christopher Sheats wrote: Emerald Onion is looking for co-location and IP transit opportunities in the Netherlands for deploying new exit relays. We have our own ASN, v4 and v6 IP space. Hi yawnbox, You may want to check out ColoClue[1], they're a volunteer-based not-for-profit association operated by folks in the commercial ISP space who needed a way to host their own systems. Today they support ~200 engineering hobbyists with low-cost infrastructure. They have cross-connects to AMS-IX and NL-IX[2] and diverse transit connectivity[3] in their racks. Job Snijders has given a couple talks at NLNOG and NANOG about operations-related things, like effective DDoS mitigation[4] with fastnetmon and automated peering solutions[5]. I'm not a member personally, but if I lived in the area I'd definitely include them in my list of potential options. ^^ [1]: https://coloclue.net/en/ [2]: https://github.com/coloclue/peering/blob/master/peers.yaml [3]: https://bgp.tools/as/8283#connectivity [4]: https://www.youtube.com/watch?v=0ahdxp_btHY [5]: https://www.youtube.com/watch?v=C7pkab8n7ys -- Jordan Savoca https://jordan.im/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] WebTunnel: What ASNs/networks work best?
Can I get a copy of the webtunnel-bridge Docker image and documentation? Thanks On Mon, Aug 14, 2023 at 6:43 AM tor-home at encryptfirst.com < tor-h...@encryptfirst.com> wrote: > When running a WebTunnel bridge, what types of IPs are better for > serving requests? My background is with self-hosted home-lab type of > setups. There are a number of different ways for homelabs to accept > inbound https connections. A few examples: > > - Forward a port on a home router. > - Rent a cloud VM/VPS and tunnel a port from the VPS's IP. > - Have a CDN tunnel/forward requests. > - VPN hybrid solutions like Tailscale Funnel. > > Are any of these better than others for hosting a WebTunnel bridge? > Should cloud provider IPs be preferred over residential IPs, for > example, considering that is where most web servers are hosted? Are > large CDNs preferred over individual cloud VMs? Is it better to use a > different IP for WebTunnel than the IP that runs the OR port (i.e. > host OR port on home IP and WebTunnel from a cloud-based IP)? > > I'm mainly asking to determine which way helps the broadest number of > Tor users. And which is less likely to be blocked in the future. What > are the best practices? > > PS: Thanks for the webtunnel-bridge Docker image and the documentation > on how to run it. It was very helpful and made setup easy. > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] OrNetStats: Operator Level Graphs added
On 1/9/21 2:42 PM, nusenu wrote: > Toralf Förster: >> cool idea, >> >> canthose graphs being linked from eg >> https://yui.cat/relay/63BF46A63F9C21FD315CD061B3EAA3EB05283A0A.html ? > > Yes, that should be easy. > The best way to get that done is to either submit a patch or feature > request here: > https://github.com/tempname1024/allium/issues > > kind regards, > nusenu > Sweet graphs, thanks Nusenu! I opened an issue[1] to address support for the ContactInfo-Information-Sharing-Specification which includes outbound links to graphs of verified operators/domains at OrNetStats, and rendering of provided attributes on per-relay pages. [1] https://github.com/tempname1024/allium/issues/9 -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Become a Fallback Directory Mirror (deadline: July 23)
On 9/17/20 11:51 AM, Toralf Förster wrote: On 9/16/20 1:05 AM, Michael Gerstacker wrote: the only relay i don't want to be a fallback anymore is a fallback now Maybe OT but I'm just curious about the reason to want a relay being not a fallback. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays If the operator intends on changing addresses or disabling the relay it probably shouldn't be added to the fallback set. -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Onionoo and ASN Number/AS Name
On 6/1/19 10:14 PM, Conrad Rockenhaus wrote: Onionoo returns “unknown” for my ASN for some reason (should return 63080) and returns “unknown” for AS Name (Should be GreyPony Consultants - as named in ARIN). I’m trying to find out where things might be potentially breaking here before I start connecting to the route servers at DE-CIX next week. Has anyone seen this type of issue before? As far as I'm aware onionoo uses maxmind's database [1] for AS-related information and it looks like your ASN hasn't made it into the database yet. [1] https://dev.maxmind.com/geoip/geoip2/geolite2/ -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Scanning relays looking for onions
Looks like someone is making HTTP requests to known relays with a host header of an onion address. I have a webserver that returns 200 OK to all requests for honeypot-related fun and well... I can only imagine what they think my relay hosts as a result. Stay safe out there friends. 2019-05-23T02:43:58Z5.8.10.[snip] 200 jg4rli4xoagvvmw47fr2bnnf[snip].onion / -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Tor website overhaul
On Wed, Mar 27, 2019 at 05:13:00PM +, nusenu wrote: > Matthew Finkel: > > Please be respectful. The tone of this message is disrespectful > > Thank you Matthew for spelling that out, I found this email > and in particular "who deserves punishment?" rather harsh. > > > > -- > https://twitter.com/nusenu_ > https://mastodon.social/@nusenu > Seconded... It's one thing to provide constructive feedback in the *correct* venue, but far from what happened here. Have some empathy, Ralph. > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 4 of Conrad Rockenhaus trial servers are in the top ten exit relays for Canada
Tor will already avoid making circuits where two IP Addresses in the same /24 are involved. The research in this paper (https://www.freehaven.net/anonbib/cache/DBLP:conf/ccs/EdmanS09.pdf) is becoming more relevent and is worth discussing as more ISPs come out with the goal of hosting lots and lots of exit relays. A valid point, thanks for linking the paper. I have the utmost belief your intentions are good, but the concentration of exits under a non-advertised central control warrants conversation, at least. If the end goal is turning $ into relays, not all paths are paved with equal mind to security and it might be worth considering donation-backed alternatives. Have a good one, -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 4 of Conrad Rockenhaus trial servers are in the top ten exit relays for Canada
No, because Digital Ocean doesn't market itself as a relay hoster-- the percentage of relay-hosting clients wouldn't even near 0.1%. What difference does that make? You quoted it, you can read it again if you'd like. There is little administrative overhead for Conrad to distribute a MyFamily directive for use with relays hosted on his systems. I care not for petty back-and-forth's when lives are at stake, sorry. -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 4 of Conrad Rockenhaus trial servers are in the top ten exit relays for Canada
That is an interesting question. Conrad's hosting operation is an extreme case, certainly. But consider two independently operated VPS relays in the same Digital Ocean data center, with arbitrarily similar IP addresses. And consider that both are vulnerable to compromise by Digital Ocean staff. Should they be part of the same family? No, because Digital Ocean doesn't market itself as a relay hoster-- the percentage of relay-hosting clients wouldn't even near 0.1%. On the other hand, if all (or the majority) of your operation contends on your customers hosting relays, I recommend they exist under the same family. -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] 4 of Conrad Rockenhaus trial servers are in the top ten exit relays for Canada
I'd be much more supportive of the typical "donate x to have a relay hosted for you" [1][2] rather than "host a relay with us" without maintaining them under the same family. If relays are running on his machines and he has access to relay keys, the person who installs Tor via pkg and starts it is hardly considered an operator. If 100% if your clients are hosting relays, you are the operator. Just my two cents. [1] https://emeraldonion.org/donate/ [2] https://www.torservers.net/donate.html On 8/27/2018 10:11 AM, zimmer linux wrote: Hi, Just to let you know that following on with the one month trial with tor exit relays that Conrad kindly offered, at least four of his exit relays are now in the top 10 listing for Canada, out of 68 Canadian exit relays. https://metrics.torproject.org/rs.html#search/country:ca%20flag:exit Well done to Conrad - I say. The more, the merrier. If you want any help with setting up your own FreeBSD tor exit relay, feel free to contact me off list. Zim ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Running relays in universities? Exit nodes, perhaps? Please share your experience!
I've had a similar experience at my university in the states. While they acknowledge overall public benefit, I was denied, citing the overhead of abuse complaints and "potential for subverting university firewalls" (their words...) as justification for rejection. They did, however, note if I were to bring my own addresses, they might be able to convince the board of regents network administrators to announce my prefix and allow me to handle complaints on my own. They perceived my potential leveraging of university transit as exclusive and distinct (and more secure?) than polluting their precious (and largely unused) /16, and had no interest in granting a lowly undergrad access to their beloved sanctuary. Best of luck! On 04/17/2018 10:36 AM, Gunnar Wolf wrote: TL;DR - Have you got official permission to operate Tor exit nodes within an university campus/network? Relay nodes, even? Please share me how this permission was achieved! (or even if it was denied, please tell me!) Hi, I know this list is mostly technical in nature, so sorry for presenting a very different kind of topic here; I will send a very similar message to the tor-teachers list, but I believe the population of this list to be interesting.. I am trying to get my university's (Universidad Nacional Autónoma de México) OK to run an exit node from our campus' network. I currently operate one relay, am willing to set up some extra relays, and have at least one colleague in a different research institute with a relay of his own, but I believe we should aim for exit nodes. Now, I don't want to set it up in a rogue fashion, as I'm sure that the university's NOC or CERT would not take long to get complaints and require me to shut it down. I have already made an official request for the permission to run an exit node and (as expected) it was turned down. Quoting (translation mine) the reasons for rejection, 1. This assignation is not factible because the Tor network is not compatible with the Acceptable Usage Policies of RedUNAM, being this infrastructure oriented to the service of institutional goals. 2. While the Tor network can have reseearch purposes, due to its nature and the hiding of IPv4 addresses and anonymous connectivity, it is susceptible to be used by third parties from outside the University with purposes conflicting with those specified in item 1, without any possibility of control or regulation from the University's part or from your project. 3. Even more so: The Tor network, due to its definition and structure, can potentially incorporate third people with malicious or even delictive intentions, which would affect not only the computers or networks in your Institute or all of the University, but also networks outside the institution's control So, I want to gather experiences from operators in different universities or research institutions. Which way did you have to argue? How hard was to get this OK? Did you ask a permission for a specific project, or as part of your networking infrastructure in general? Did you ask this before setting up the exit node, or as a "fait accompli" gathering not-too-ill results for a given time period? Any help and pointers are welcome! ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] new Tor exit
Hi Arisbe, Thanks for running relays! If you're running multiple relays (as you've suggested) it's important to run then under the same family, see https://www.torproject.org/docs/faq.html.en#MultipleRelays. In regards to new relay usage, see https://blog.torproject.org/lifecycle-new-relay On 03/14/2018 11:03 PM, Arisbe wrote: Hello all, I rolled out a new Tor exit [0] this morning West Coast U.S. time. It's special to me because I've negotiated the trust of a host company in Albania. I was the first Tor relay in that country and now I'm the first exit relay there. This trust took me a year to establish. I run a number of relays-both exit and non-exit. I run a dozen bridges for people that need the ISP connectivity. I host classes in Southwest Washington State to teach ordinary people how to be safe while they're on the internet. I teach high-school pupils how to set up and operate Tor relays. Here is my problem: The aforementioned relay has been on for nearly 24-hours and not a single user has frequented my doorsteps. I have had seven of the nine authorities parked in this node for most of the time but no inbound connections (except for those referenced and two hackers) and no outbound or exit connections. There is nothing technically wrong with the installation so what gives. I this an issue of administrative paperwork? While I am very supportive of Tor, I am not with unlimited patience. I have a job, wife and kids and money pit house to maintain. Thanks for giving me a bit of advice to make this guy blossom. If I don't understand, I apologize to all. Arisbe [0] 516D1B9E22484202322828D8CAC30325030017E2 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] FreeBSD 11.1 ZFS Tor Image
Another issue is that OVH is over relied upon for public nodes. It's the leading ASN with almost 15%. They're one of the few providers out there that allow exits. That's why 15% of our exits are on OVH. For what it's worth, my entire OVH account was terminated as a result of hosting an exit on their VPS line, citing "hosting a proxy" as grounds for termination. They're slow to act on abuse (if you reply with *any* response it satisfies their automated system until a human looks at it), but they do not explicitly support Tor when it comes to VPS's. -- Jordan https://yui.cat/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Feedback wanted: letter to my university's library
On Mon, Oct 02, 2017 at 07:08:35AM +0200, Moritz Bartl wrote: > On 01.10.2017 22:52, teor wrote: > > AWS is an expensive way to run a relay, because they charge per GB. > > Capped providers can cost less, and you can use AccountingMax to > > limit your usage. > > > > Here's a list of providers that allow tor: > > https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs > > For non-exit relays, you actually don't have to limit yourself to ISPs > that "allow Tor". Be careful with "unmetered/unlimited" offers. I would > be honest up front in terms of data usage, and find out what kind of > "fair use policy" the ISP has. Often, the customer support can give you > an exact number, even if it's not stated anywhere on their website. Thanks (to both you and Tim); this is really good advice. I'll look into it... assuming I can find the time, of course :/ > I hope Alison can help you with the uni library. That's a really good > idea. Internet and policies can be hugely different between different > universities, so at least for non-exit relays, it should be pretty > straightforward: Here also, I would suggest to first (without making a > lot of noise about it) to find out what the rules around Internet usage > are, and just set one up. The problem is that logistically I can't without help, unfortunately. I don't have a spare machine to run it on and more importantly, I don't have access to a good wired connection. The only Ethernet jack I know of is in my dorm room and I can't imagine it's very good compared to a datacenter connection. So there's two things I'd need from IT. Cheers, AJ signature.asc Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Feedback wanted: letter to my university's library
Hey, all! I'm AJ; I've been lurking on this list for many years but have never had cause to post. I've run a Tor relay (`strugees`) on AWS for a number of years now, but haven't been able to dedicate all that much bandwidth to it due to cost concerns. However I've just started college at the University of Rochester, which obviously presents a great opportunity to set up a relay on a really great network. I'm planning to reach out to the library with the following email and would love some feedback: > Heya! > > I'm a new first-year student and I'm active in the technology > activism community. One of the things I'm very interested in is the > Tor Project (https://torproject.org), whose mission is to make it > possible to freely and anonymously use the internet, without fear of > surveillance or censorship. Tor is used by a wide variety of people > - activists, journalists, corporations, law enforcement, and > individuals - to gain free access to information and speak their > mind. Tor is able to provide this free expression by utilizing a > worldwide network of relays run by volunteers. A relay can make a > big difference on the Tor network if it's run on a connection which > is fast and has lots of bandwidth - like the University's > connection. > > I think it would be really cool if UR would donate part of its > internet resources to the Tor network. I considered directly > contacting IT, but I thought it actually made sense to talk to the > library first since the core values are actually really similar - > libraries and the Tor project both know the value and power of > unrestricted access to information and are dedicated to making > information available to anyone who wants it. > > If this is something that sounds interesting, I would love to chat > about this in person. I would also be willing to invest the time > needed to administrate the relay - I have several years of > experience doing this already, but haven't had access to the > resources the University has. > > Thanks very much! > > AJ Jordan Does anyone who's done something like this before have any tips or suggestions? Am I going about this in the best way? Cheers! AJ signature.asc Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Question on running bridge nodes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On October 11, 2014 3:25:47 PM PDT, Tor externet co uk wrote: > I wondered whether it was more helpful to the Tor network as a whole to > have have a very fast node which hibernated every 12-15 hours, or if I > throttled Tor traffic, so that the node was more stable. It is better for the network to have a fast but unstable node. -BEGIN PGP SIGNATURE- iQJGBAEBCAAwKRxBbGV4IEpvcmRhbiA8YWxleGFuZGVyMzIyMzA5OEBnbWFpbC5j b20+BQJUOdF/AAoJECZ5QDRjPbvANiIQAMn//Hpzq5P3EQui6aVc1u/XG5JhZM8E dOr11uO2t4y1+LMZdNqL7YDCYXoKs+X67OBurYkiQb96mAo21ZfneoXqqDseQcVG 22PYCGgZhiN0LE38SoXl1lxn+XZdt1iIj74ul8jR1tgy4n6Ok/gwFGHzZP0E7gWK 2qVbyFVXFO0IjnvOwLkeymMkXXFLItrKNBs+WMh5GngQN2+yQD44yz3dOWmcrfHR DFMBtHDM0T4hEgh9t3+8qKc/NMoCcgMgIC+f+7cT54fMO238g0P2k4dBCUSyyxXG TOtR5eytsuSwDt/tVUnA40A0lI8JXUQn0Lnm+zgSTyriyA5BH4zlivn6RbGpGtU3 tvUsHqzAVMgN7afzcdGP2WI61W1Ujy2k5Eausg6RXSGXoG/Sz7UTjsbWLQhDFPI/ Olx0v9bW6GvlsPL2PIhiP5wNRjnddRw896wV3+84XZlf0n7UgbKYrfib+HfKtcP6 BCp8IyP+bElveeuntPx10s6pFZqr3JlUb/TsFm+AZEP1qbz0CjVYtpSqy+HSiiI7 srP1I4go1r505BRdIUcbsjsybZ9BmVO7lrJlP28kLsuwKdO1RaSncxMyodPX0E0h ZlPrOUD/uQf/v2+YSaHe4mbIDva4kJKVNxiihzetk0wyzVPTY/Fn95dtpiHNUQWo XYhe8jE2vVtq =1KRo -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Question on running bridge nodes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On October 11, 2014 3:25:47 PM PDT, Tor externet co uk wrote: > I wondered whether it was more helpful to the Tor network as a whole to > have have a very fast node which hibernated every 12-15 hours, or if I > throttled Tor traffic, so that the node was more stable. It is better for the network to have a fast but unstable node. -BEGIN PGP SIGNATURE- iQJGBAEBCAAwKRxBbGV4IEpvcmRhbiA8YWxleGFuZGVyMzIyMzA5OEBnbWFpbC5j b20+BQJUOdF6AAoJECZ5QDRjPbvApqMP/29EY6+hy0BBoq2mbG3RkliXOvcqOUFz invrIn5WpCKVgbXlJBiokTlzBly14hjWvb7BOGPfzW9jWIFtxG/5j/GLlBuXNNLf 36KVvQQzs5L3O2ePE9VxbM2++3HO7Ex7RtZQ9/v7DMI0+p//BF/yQRc5UnDrIjgp Vd3AdbJ5B/G+DcxoThT5lR5xKSSutDu7tZthBpmwaEdVjDdjdembVrCp3gdaLaVO ZZnG2V/Hhbm/RKyZQojwKk1zFqYzH2hiicOHqdb2HjUtkO6XSfJ3FPecd3MGEgKh THIlxOWQ0gCUTxaKzVOccedtPG5iGtCHX+NXi6CahbnHLTNV+9o1nZq7meMw/gKY H+1JlKbA44GP+/KYEG3NcRPM8drTqn/V18q1Oc5YjcdeIvkOsQJFWq4lHoAbDUz6 139uQJkWXSEz9kaNI3ly77YouR8cK2dqzLvyHSdhykyCDMn1UMzW1PxmN9nYzgr2 DGh/iaw+Y4C/V2uifOH1YOK7VNh2jSPG7DY9UHXg53Mymm22hRThWVcIG5GpT9Y+ w8sB4bnv82OCALlsdcc8QxJDhfgJmK3DmgfEItdSVCinaiAvGUK3FOHFouphKUc/ Y1wnqsfPBpkAo0hxObquiSSvXjOIoiYHN8gM2X/s6jLiysnrtYdRbJOJ+hq5ZqTK 6RmQWRCfbhOY =ClZV -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Help keeping Tor relay up
On Wed, Jun 18, 2014 at 10:11 PM, Evelyne Fong wrote: > I've set up the relay recently, so I'm not expecting a lot of traffic. > However, I'm confused as to if my relay is suddenly failing for no reason or > is Atlus saying my relay is no longer running because there's no traffic on > it. Do you have hibernation set up? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Debian relay Puppet module
On Sunday, June 15, 2014, Moritz Bartl wrote: > > Personally, I think it would be great to not only have puppet modules > spread out somewhere across the Internet, but a full-fledged > guide/wizard that makes it easy for people to locally configure relays > without knowing anything about Tor configuration options. +1; this would be great for Tor Cloud users. > > In my dream > world, it would not only support Debian: Right now, most of the Tor > network runs on Debian, which is not ideal. We need more *BSD and > Solaris! And FreeDOS! :) Why is this not ideal? I'm not following. Also, do you mean Debian or Debian-like? If the latter, Tor Cloud (Ubuntu) probably accounts for a fair bit of that inbalance. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays