Re: [tor-relays] Tor and CIA leak
> Anyone have a download/torrent link for all the stuff or is this website > only atm? Torrent: https://file.wikileaks.org/torrent/WikiLeaks-Year-Zero-2017-v1.7z.torrent password was announced on Twitter: https://twitter.com/wikileaks/status/839100031256920064 Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Exit relay funding
Hi Roman, > Sorry but reading these kinds of things is kind of demoralizing. -- I kind of understand your sentiment but > Oh I know mine are not Exit relays, so those are not special enough, nothing > to see here, move along. this is (at least for me) not true - Michael's mail was the first I remember with a plea for support and currently it's easier for me to donate money* instead of running my own relay. Unfair? Maybe. But not the fault of the thread starter and I'm sorry if it felt as if I do not appreciate other relay operators. Renke *) on top of my more silent donations to other organisations around data privacy signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Help finding relay bottleneck
James, > I've also raised the maximum number of open file descriptors for the > debian-tor user. In /etc/security/limits.conf I added > debian-tor softnofile 65000 > debian-tor hardnofile 65000 > I'm not sure if this worked because (even after reboot) > sudo -u debian-tor bash > ulimit -Hn > returns 4096. I'm currently not in front of a Debian box but I believe you will need to change the pam.d configuration, the limits module is imho not loaded in the su(do) configuration. Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] how to monitor traffick through a bridge
> The advice so far given is for tor on linux, and won't do you any good > if you're running a windows OS. If you are, let us know. Also let us > know if you're running a tor bridge bundle or tor browser + standalone > vidalia. - eliaz excellent point one platform-independent tool is https://atlas.torproject.org/ :) signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] how to monitor traffick through a bridge
Hi! > Hi, I would like to know how one can monitor traffic that goes > through a bridge. I have set one up and would like to know whether it > is being used or not, and how much. Thanks! I use iptables to count packets/bytes - though I'm sure nicer ways exist for the task :) Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Where to report relay warnings
Hi, > Now, I have checked the FAQs but didn't found any information where to > report this, so I hope you can help me out. > > Thank you already and kind regards it seems https://trac.torproject.org/projects/tor/ticket/12808 is the place to go - the relay you mentioned was added by arma a few minutes ago Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Trying Trusted Tor Traceroutes
Hi Sebestian, > Just a quick update regarding the project. There are multiple GB's > of data to analyse and it is still being worked on. We are also working > on the public script(s) as well. is your project still on-going? I'm asking because your score board was not updated since May (except one test(?) upload in the phase foo-foo) and though the repository updates are interesting (dynamic download of relay ips) they were never approved for usage according to your installation notes. Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Problems with domestic ISP blocking publicly listed relays
> It is a standalone server, therefore no browser runs on the machine. Tor can be configured to act as proxy, not restricted to local connections. I'm not sure about the defaults but typically the SOCKS proxy is listening on [torserver]:9050. But as you're not aware of this option my idea in the previous mail was most likely incorrect :) Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Problems with domestic ISP blocking publicly listed relays
Hi Paul > The first one has been Tor itself where I have noticed (using Arm to monitor) > that it has been downloading far more data than uploading. > A ratio of say 5:1 — it hasn’t always been this way! [..] > Access to lovefim.com this weekend has now resulted in no longer able to > stream and watch films. > I can log onto system but if I try and stream I get the error message > “INVALID LOCATION. Sorry, but the requested content is not available in your > current location.” > Opened a service desk ticket but the response was “you are trying to stream > from outside the UK” > WTF? Did you configure your browser to use your local Tor daemon as SOCKS proxy? Would explain both the upload/download ratio (normal web browsing is async) and a foreign (Tor exit) IP Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Scoreboard enhancements / Trying Trusted Tor Traceroutes
Sebastian, > Do you care to elaborate ? If you need assistance we can talk via > private mail as well ... I use the script intentionally with scamper restricted to 200 pps - not sure why (and what) I should elaborate ;) The needed time (even for the default of scamper with 1000 pps) is imho a rather good explanation to torland's question why only 68 of nearly 300 participating IPs finished the whole measurement at least once. Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Scoreboard enhancements / Trying Trusted Tor Traceroutes
> > I am wondering why only 68 out of 283 completed the traceroute. Can someone > explain please? > probably because the estimated time is between 4 and 96 days: https://web.engr.illinois.edu/~das17/tor-traceroute_v1.html#q-howlong my (low-bandwith) relay is trace-routing since 4 days and completed a mere 15 % of all checks :) Renke signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays