[tor-talk] [tails] Crypto enforcement proposal
Hello, I took a look on the persistant partition of tails : # cryptsetup luksDump /dev/sdb2 [...] Cipher name: aes Cipher mode: cbc-essiv:sha256 Hash spec: sha1 [...] MK bits: 256 [...] Even if it look secure, I think you could better do this : [...] Cipher name: serpent Cipher mode: xts-essiv:sha256 Hash spec: sha512 [...] MK bits: 512 [...] What do you think about that ? HardKor ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Tor-unfriendly List
Paul wrote: Is there a list of 'things' (services, web sites, etc.) that do not work well with Tor? For example, connect to MSN using Tor and you'll find yourself being banned. http://www.rightmove.co.uk/ refuses to work with Tor. Such a list would be useful to check before trying to use such services, I think. Perhaps a little OT for this thread but, FWIW, I continue to be able to access (via webmail) an @msn.com email address via Tor. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Reliable server hosting company for Tor exits?
Hi, Tor relays (regardless of exit policy) are listed in the Tor consensus, which is public -- it has to be so clients can get the list. Yes. Of course. Stupid me. As for the problem the blacklisters were trying to solve, at best they were thinking I want to block Tor, I'll scrape this page I found and block all the IPs in it. At worst, they were taking the path all blacklists eventually take, of I will punish everything associated with this thing I hate, in hopes that it will die or at least its neighbors will pressure it. That doesn't make sense to me. But then again, it's probably not supposed to be. :) -- Rejo Zenger . r...@zenger.nl . 0x21DBEFD4 . https://rejo.zenger.nl GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger signature.asc Description: Message signed with OpenPGP using GPGMail ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] [tails] Crypto enforcement proposal
Hi, HardKor wrote (23 Aug 2012 09:05:00 GMT) : I took a look on the persistant partition of tails : [...] Thank you for caring about this. What do you think about that ? Not all Tails developers read tor-talk, so please direct such discussion threads to the communication channels documented there: https://tails.boum.org/contribute/how/input/ Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] [Advanced configuration troubleshooting] Exit node slowed way down
Hi, Like Andreas Krey, I would also guess its the ISP bandwidth. Have you tried contacting them about it? On 23.08.2012 02:16, Name Withheld wrote: Hi guys, I've been running a kind-of 1gbps (voxility style 1gbps) exit server on Debian for a couple months, and while it started out very fast, it's gotten much slower over time. The server itself hasn't slowed down -- if I do speed tests, it still pulls 25MB/s (bytes not bits) with no problem (on top of the tor load), but it never seems to push more than 10-12MB/s through the tor network, even if I run 6 tor processes with each separated onto a private cpu core. Even if I stop the other tor processes and revert to a single-tor-instance server, it doesn't reach the old 20 MB/s anymore. -- Moritz Bartl https://www.torservers.net/ ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] [tails] Crypto enforcement proposal
Thank you, I'll forward the mail to the mails ML. HardKor On Thu, Aug 23, 2012 at 12:40 PM, intrigeri intrig...@boum.org wrote: Hi, HardKor wrote (23 Aug 2012 09:05:00 GMT) : I took a look on the persistant partition of tails : [...] Thank you for caring about this. What do you think about that ? Not all Tails developers read tor-talk, so please direct such discussion threads to the communication channels documented there: https://tails.boum.org/contribute/how/input/ Cheers, -- intrigeri | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] [Advanced configuration troubleshooting] Exit node slowed way down
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 [breaking the thread as it didn't seem to be related to Robin's] For a visual, you can see how it just sort of gave up on life around the beginning of August here (although some of that is accounted by extra tor instances cannibalizing stats): https://atlas.torproject.org/#details/88984E7F8DDB702644660E10A5C7019FA80B8AFF Did you had a look at the advertised bandwidth fraction graphs? (it dropped from 0.7% to under 0.2% around the 1th of August) These relays (00Teh0Signul00, 00T3h0Signul00, 00Teh0S1gnul00) currently do not have the stable flag. -BEGIN PGP SIGNATURE- iF4EAREKAAYFAlA2KRUACgkQyM26BSNOM7b17QD/WLsvuqgbzgKlm7mgaledM/+Y e/lbUztJPUx8ueepP9wA/RnzgvCvqdmtdgwVlfCkgfRGp8/7G+nYEnwVdnK9Cf7z =X8aM -END PGP SIGNATURE- ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Reliable server hosting company for Tor exits?
Hi Eugen, Hetzner allows use of multiple IP addresses with one server. Ah, yes, that's true - thanks a lot for pointing that out to me, as I completely forgot about this! Well, I guess I could get myself a second IP in that case and continue running it as a relay... But in that case, I think I'd still want to designate a separate server as the actual Tor exit, just in case something really terrible happens and the machine gets taken down temporarily. But yes, thanks a lot for bringing that to my mind! Robin ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Reliable server hosting company for Tor exits?
Hi Roger, thanks a lot for explaining this once again and also for the link! Admittedly, I kind of like the sense of sarcasm about blacklists that you put into this message :-) Robin Am 22.08.2012 um 22:36 schrieb Roger Dingledine a...@mit.edu: On Wed, Aug 22, 2012 at 08:37:16PM +0200, Rejo Zenger wrote: On 22 aug. 2012, at 16:07, Robin Kipp wrote: I've already been running a Tor relay on that for quite a while, but sadly had to find out that the server's IP subsequently got added to several EMail blacklists - despite the server only being a relay and not an actual exit node! This is interesting. Did they provide any explanation for this? Your root server, did they have access to the server as well? How did they know you were running a relay, other than looking on your server for a Tor process, or looking into your traffic? What problem did they try to solve by adding your server on a blacklist? Tor relays (regardless of exit policy) are listed in the Tor consensus, which is public -- it has to be so clients can get the list. As for the problem the blacklisters were trying to solve, at best they were thinking I want to block Tor, I'll scrape this page I found and block all the IPs in it. At worst, they were taking the path all blacklists eventually take, of I will punish everything associated with this thing I hate, in hopes that it will die or at least its neighbors will pressure it. See the link at the bottom of https://www.torproject.org/docs/faq-abuse#TypicalAbuses for a fun read. --Roger ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Reliable server hosting company for Tor exits?
On 23.08.2012 19:14, Robin Kipp wrote: I would also like to work with an ISP that is concerned with user pass on my personal information to third parties whenever a slight sign of trouble arises. I don't believe in privacy hosters. Once police is involved, every ISP will give out your data. Any decent ISP should not give out your info in other minor cases (or foreign investigations), and I don't think ISPs like Hetzner will. I don't really see what exactly you are trying to protect against, but kicked in doors because of police is something you can only protect by providing the ISP with fake data and paying anonymously (for example over the counter in a bank). Now, I'm not sure where you're based and what languages you speak, but in case you speak German as well, feel free to contact me in either English or German, whatever works best for you! :-) I am German. If you have any questions, feel invited to contact me off-list. -- Moritz Bartl https://www.torservers.net/ ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Iran's Green Movement - URGENT ALERT - Please RT
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mir Hossein Mousavi, former presidential candidate during the 2009 elections and leader of the Green Movement under illegal house arrest for approximately 18 months, was transferred to a cardiac hospital in down town Tehran under extreme security measures accompanied by his wife Zahra Rahnavard. 526 days after his illegal house arrest, Mir Hossein Mousavi who was reportedly suffering from extreme chest pain was reportedly transferred this morning, Thursday August 23rd, 2012, under extreme security measures to the Coronary Care Unit (CCU) at a cardiac hospital in central Tehran. It has been reported that security agents arrived at the hospital the night before Mousavi?s transfer, installing security cameras throughout the hospital. According to the same reports the security apparatus assigned to Mir Hossein Mousavi and his wife Zahra Rahnavard at the hospital includes tens of IRGC agents, security agents and plain clothes officers. The hospital personnel working in the unit where Mousavi has been admitted, have not been allowed to leave the building and Mousavi is said to be banned from all visitation. It has been reported that as a result of a blocked coronary artery, Mousavi under went a three hour angiogram. Upon completion of the operation, Mousavi was transferred back to the CCU unit where he is likely to remain for a longer period of time. In the event that Mousavi?s hospitalization is prolonged, there is speculation that he will be kept in isolation in a separate unit in the hospital. Source: Kaleme: http://kaleme.org/1391/06/02/klm-110814/ - -- The world will not be destroyed by those who do evil, but by those who watch them without doing anything. ~ Albert Einstein -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJQNob/AAoJEJPBwXYLR9VtKsMP/0n4JI31kN59wUuYt1dtdFhq qVs+Dw3B5M6TxUM83y/88W5kvqEMfUZj6PpEba4YJrCcJ3eXBepzNk8EaYe7DgEo 2fvWEmIvigiMDDD60GfF9khLDAKxaBxVk9AvQs0hJZ6etIMx6dGZ0Opfd2iOGtxd 5fRnVML4Y9b6MlZ29qETyYoZYvYm6cgJGxYbI3nKUGizpG4UVvD4ya8pv/N8bWwt kiMYCsM/gzAfIiV0MqJNmCkBIedfC0s66/P7JYDh6MCBGirAwlv7F/3oo8J94P/A YhLEz+zv1Fm4iSwyJjfo/odAh4KbMFd1/PEzhHrVN5pPmxUs9+aeCBJp4vYaNblz lPkYkJfFvnyHJdud2fAK8j8x5vtsEDiRcq9kkQM+mpJcJbCkC1r0vgGSYezbmp+M 1duFvxgHsIaGfjoQZ9n8Y5As/VgPWkOZBZetF0ozMtSdIYAbHrNXdjhKOLi2c9tS vKMXgJf8B2qnUb9ffFvjDs0juse5v28dMXwZKZIECokadLQTnX9LXHK0Ez4z+nyO 0h6x7dFVDJCzrixNMytXiHbDh461k0nLm6Laep/zGU1rCqHloPTiC19bGYK6Yjph ULCgRnS1pYIBMI0oYYKfnhbmJVQY1XOvm3nYs9EA4LBQneKWFl7Pf8Gjx2YDfXOf h2N/qb0JQMpH3cbXA2AQ =L3xe -END PGP SIGNATURE- ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Iran's Green Movement - URGENT ALERT - Please RT
You are right. I am hoping it reaches my Tor friends all at once. --SiNA On Aug 23, 2012 12:45 PM, HardKor hardkor.i...@gmail.com wrote: Isen't this mailing list reserved to topics related with the Tor Project ? HardKor On Thu, Aug 23, 2012 at 9:39 PM, SiNA Rabbani s...@redteam.io wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Mir Hossein Mousavi, former presidential candidate during the 2009 elections and leader of the Green Movement under illegal house arrest for approximately 18 months, was transferred to a cardiac hospital in down town Tehran under extreme security measures accompanied by his wife Zahra Rahnavard. 526 days after his illegal house arrest, Mir Hossein Mousavi who was reportedly suffering from extreme chest pain was reportedly transferred this morning, Thursday August 23rd, 2012, under extreme security measures to the Coronary Care Unit (CCU) at a cardiac hospital in central Tehran. It has been reported that security agents arrived at the hospital the night before Mousavi?s transfer, installing security cameras throughout the hospital. According to the same reports the security apparatus assigned to Mir Hossein Mousavi and his wife Zahra Rahnavard at the hospital includes tens of IRGC agents, security agents and plain clothes officers. The hospital personnel working in the unit where Mousavi has been admitted, have not been allowed to leave the building and Mousavi is said to be banned from all visitation. It has been reported that as a result of a blocked coronary artery, Mousavi under went a three hour angiogram. Upon completion of the operation, Mousavi was transferred back to the CCU unit where he is likely to remain for a longer period of time. In the event that Mousavi?s hospitalization is prolonged, there is speculation that he will be kept in isolation in a separate unit in the hospital. Source: Kaleme: http://kaleme.org/1391/06/02/klm-110814/ - -- The world will not be destroyed by those who do evil, but by those who watch them without doing anything. ~ Albert Einstein -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBAgAGBQJQNob/AAoJEJPBwXYLR9VtKsMP/0n4JI31kN59wUuYt1dtdFhq qVs+Dw3B5M6TxUM83y/88W5kvqEMfUZj6PpEba4YJrCcJ3eXBepzNk8EaYe7DgEo 2fvWEmIvigiMDDD60GfF9khLDAKxaBxVk9AvQs0hJZ6etIMx6dGZ0Opfd2iOGtxd 5fRnVML4Y9b6MlZ29qETyYoZYvYm6cgJGxYbI3nKUGizpG4UVvD4ya8pv/N8bWwt kiMYCsM/gzAfIiV0MqJNmCkBIedfC0s66/P7JYDh6MCBGirAwlv7F/3oo8J94P/A YhLEz+zv1Fm4iSwyJjfo/odAh4KbMFd1/PEzhHrVN5pPmxUs9+aeCBJp4vYaNblz lPkYkJfFvnyHJdud2fAK8j8x5vtsEDiRcq9kkQM+mpJcJbCkC1r0vgGSYezbmp+M 1duFvxgHsIaGfjoQZ9n8Y5As/VgPWkOZBZetF0ozMtSdIYAbHrNXdjhKOLi2c9tS vKMXgJf8B2qnUb9ffFvjDs0juse5v28dMXwZKZIECokadLQTnX9LXHK0Ez4z+nyO 0h6x7dFVDJCzrixNMytXiHbDh461k0nLm6Laep/zGU1rCqHloPTiC19bGYK6Yjph ULCgRnS1pYIBMI0oYYKfnhbmJVQY1XOvm3nYs9EA4LBQneKWFl7Pf8Gjx2YDfXOf h2N/qb0JQMpH3cbXA2AQ =L3xe -END PGP SIGNATURE- ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] zeus virus
From: scar s...@drigon.com -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 hi all, i operate the cave router from my home DSL connection, and from time to time it will get suspended because CenturyLink will notice mailicious traffic from viruses routed thru the Tor network. most of the time i can block these because my they will tell me destination IP addresses. but lately my service has been getting suspended because of this zeus virus and the reports my ISP sends don't have any destination ip addresses. below is a sample report of what they send me, you can see with with 'conficker' one there is a dst address that i can block, but with zeus there is practically no data. (the IP Address column is what my IP address was at the time) i have asked CenturyLink for more info, specifically destination ip addresses, but this is all they give me. so does anyone know of a way to block this zeus thru Tor? thanks Date/Time Seen (GMT) IP AddressInfection Data (*) - --- -- 2012-08-20 00:56:3267.1.15.107 infection = 'zeus', addl_data = '/config.bin' 2012-07-30 15:06:1397.115.197.107infection = 'zeus', addl_data = '/zs/config.bin' 2012-07-26 23:17:4897.115.196.146infection = 'conficker', subtype = 'downadup', src_port = '49510', dst_port = '80', http_host = '149.20.56.33', url = 'GET /search?q=0 HTTP/1.1', http_agent = 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.2; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)', dst_ip = '149.20.56.33', sourceSummary = 'Sinkhole HTTP Drone Report' 2012-07-04 18:46:3597.115.192.31 infection = 'zeus', addl_data = '/update32.php' Zeus Bot (aka; ZBot) is not a virus. It is a data stealing trojan with other aspects and it, and variants, have a large distribution on the 'net. Usually config.bin is an encrypted file that has instructions for the Bot component. Conficker (aka; Downup) is an I-worm and Bot. Whatever the case, malicious bot activity is being detected and thus you should stop using Tor and you should make sure you computer(s) are clean. I suggest reading this... http://forums.malwarebytes.org/index.php?showtopic=9573 Creat an account and post your problem here... http://forums.malwarebytes.org/index.php?s=547b20f67444c3ee30a883a34bf60fb0showforum=7 References: http://searchsecurity.techtarget.com/definition/Zeus-Trojan-Zbot http://en.wikipedia.org/wiki/Zeus_%28Trojan_horse%29 http://en.wikipedia.org/wiki/Conficker -- Dave Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk http://www.pctipp.ch/downloads/dl/35905.asp ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] [Advanced configuration troubleshooting] Exit node slowed way down
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 3) I'm not sure where to view the advertised bandwidth graph https://atlas.torproject.org/#details/88984E7F8DDB702644660E10A5C7019FA80B8AFF Scroll down till you see graphs with red, green, yellow and blue lines. -BEGIN PGP SIGNATURE- iF4EAREKAAYFAlA2m7gACgkQyM26BSNOM7YC9gEAl4SpEeUzxqAJe4DkAKd2TiPr uAHbUjKgPwv4mX4oCXoA/0jKA7On42pNNdcy5u/4iUtl3tY/b/hOn5cNJGjWxfT/ =ZUhg -END PGP SIGNATURE- ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] zeus virus
David H. Lipman @ 08/23/2012 01:40 PM: Whatever the case, malicious bot activity is being detected and thus you should stop using Tor and you should make sure you computer(s) are clean. well, no, i'm not gonna do that. ;) the server is running linux and not infected. when i started running this tor exit router i received copyright complaints from the MPAA and my service was shut down, and i fixed my torrc to block the p2p ports. then it started getting shut down for viruses, and i've continued to update my torrc. now it only happens 2-3 times a month and CenturyLink always promptly reactivates my service. this is just a case of 'a few bad apples' and i have the (cheap) bandwidth to spare, so no plans to stop using Tor just yet. frankly, i don't get how this zeus trojan can operate without destination addresses. in fact it seems to me it would be utterly useless as a trojan if there weren't destination addresses. then again i've been out of the loop as technology has progressed. if that is really the case, i'm wondering if there is a way to add a firewall rule that will block traffic that is looking for config.bin and update32.php, and whether that would really block this malicious traffic ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Tor already running
Hi, This is a simple issue, but important. The script should check to see if Tor/Vidalia is already running and just open the browser. As it is, if I close the browser, come back some time later, and click the Tor icon, it results in an error because Tor is still running in the background. I can't open urls from other applications with the browser for the same reason. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Reliable server hosting company for Tor exits?
Hi Robin, last time I checked, Hetzner did not allow to run Tor exits. Make sure if that still is the case before you run into trouble with them. Julian Hi Eugen, Hetzner allows use of multiple IP addresses with one server. Ah, yes, that's true - thanks a lot for pointing that out to me, as I completely forgot about this! Well, I guess I could get myself a second IP in that case and continue running it as a relay... But in that case, I think I'd still want to designate a separate server as the actual Tor exit, just in case something really terrible happens and the machine gets taken down temporarily. But yes, thanks a lot for bringing that to my mind! Robin ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Tor-unfriendly List
Even better would be a logo that say's: This site doesn't respect it's users. but yes, a pre-screen would be nice, when a user not just a list, an immideate warning when you type type the url, or a browser bar that turns red. even block the site before you even download 1 bit so that it doesn't even register the exit node's IP address On Thu, Aug 23, 2012 at 10:41 AM, Jim jimmy...@copper.net wrote: Paul wrote: Is there a list of 'things' (services, web sites, etc.) that do not work well with Tor? For example, connect to MSN using Tor and you'll find yourself being banned. http://www.rightmove.co.uk/ refuses to work with Tor. Such a list would be useful to check before trying to use such services, I think. Perhaps a little OT for this thread but, FWIW, I continue to be able to access (via webmail) an @msn.com email address via Tor. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Iran's Green Movement - URGENT ALERT - Please RT
Stanford's Liberation Technology list would probably be a better home for this: https://mailman.stanford.edu/mailman/listinfo/liberationtech A lot of Tor people also read it, as well as others who would value this info. -- Greg Norcie (g...@norcie.com) GPG key: 0x1B873635 On 8/23/12 3:48 PM, SiNA Rabbani wrote: You are right. I am hoping it reaches my Tor friends all at once. --SiNA On Aug 23, 2012 12:45 PM, HardKor hardkor.i...@gmail.com wrote: Isen't this mailing list reserved to topics related with the Tor Project ? HardKor On Thu, Aug 23, 2012 at 9:39 PM, SiNA Rabbani s...@redteam.io wrote: Mir Hossein Mousavi, former presidential candidate during the 2009 elections and leader of the Green Movement under illegal house arrest for approximately 18 months, was transferred to a cardiac hospital in down town Tehran under extreme security measures accompanied by his wife Zahra Rahnavard. 526 days after his illegal house arrest, Mir Hossein Mousavi who was reportedly suffering from extreme chest pain was reportedly transferred this morning, Thursday August 23rd, 2012, under extreme security measures to the Coronary Care Unit (CCU) at a cardiac hospital in central Tehran. It has been reported that security agents arrived at the hospital the night before Mousavi?s transfer, installing security cameras throughout the hospital. According to the same reports the security apparatus assigned to Mir Hossein Mousavi and his wife Zahra Rahnavard at the hospital includes tens of IRGC agents, security agents and plain clothes officers. The hospital personnel working in the unit where Mousavi has been admitted, have not been allowed to leave the building and Mousavi is said to be banned from all visitation. It has been reported that as a result of a blocked coronary artery, Mousavi under went a three hour angiogram. Upon completion of the operation, Mousavi was transferred back to the CCU unit where he is likely to remain for a longer period of time. In the event that Mousavi?s hospitalization is prolonged, there is speculation that he will be kept in isolation in a separate unit in the hospital. Source: Kaleme: http://kaleme.org/1391/06/02/klm-110814/ ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] [Advanced configuration troubleshooting] Exit node slowed way down
On 8/23/12 10:18 PM, Name Withheld wrote: 3) I'm not sure where to view the advertised bandwidth graph, but what is this stat generated from? I just double-checked the torrc for the main instance and it's 80MB+. Advertised bandwidth is the minimum of bandwidth rate, burst, and observed bandwidth. You write the first two values into your torrc, but the third value is measured by your relay. https://gitweb.torproject.org/torspec.git/blob/777ddbf:/dir-spec.txt#l383 You can find the advertised bandwidth value on the Atlas page of your relay: https://atlas.torproject.org/#details/88984E7F8DDB702644660E10A5C7019FA80B8AFF Best, Karsten ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk