Re: [tor-relays] (no subject)
Uhhh, wut? On 27/09/2013 14:23, ابوصالح wrote: Android مرسل من الهاتف المحمول Samsung ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] VPS
I'm looking for a VPS to run a tor exit node on, any ideas? Regards, Tom McLoughlin ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] VPS
I'm already a customer with them, I didn't know they allowed Tor. Thanks ;) On 03/08/2013 21:54, George Herndon wrote: i'm happy with digitalocean George Herndon ghern...@eyeontech.com Be conservative in what you send; be liberal in what you accept. - Postel's Law On Aug 3, 2013, at 2:46 PM, Tom McLoughlin t...@dropfuse.com wrote: I'm looking for a VPS to run a tor exit node on, any ideas? Regards, Tom McLoughlin ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] VPS
Thanks, I'll deploy a droplet for tor now ;) On 03/08/2013 22:15, mick wrote: On Sat, 3 Aug 2013 16:54:20 -0400 George Herndon ghern...@eyeontech.com allegedly wrote: i'm happy with digitalocean George Herndon ghern...@eyeontech.com And so am I - for a relay. DO are not very keen on exits. See https://www.digitalocean.com/community/questions/tor Mick - Mick Morgan gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312 http://baldric.net - ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Attacker IP database
I wouldn't think such a database would exist because of the way Tor works. Regards, Tom McLoughlin On 02/08/2013 20:18, Bryan Carey wrote: Is there any kind of compiled list of IPs that relay operators can refer to that are known bad IPs (sources of brute force SSH attempts, etc.)? Is there a reason to NOT block (drop) traffic from these IPs? Here are some that I have seen recently trying to brute force common user accounts and root password attempts: 198.50.197.98 220.161.148.178 223.4.217.47 199.187.125.250 175.99.95.252 62.64.83.38 125.209.110.234 37.235.53.172 Also, in general what are some good security practices to keep in mind while running a Tor relay? Thanks, Bryan ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays