You could modify the tor init script to limit the memory usable by
/usr/sbin/tor as described here:
http://jlebar.com/2011/6/15/Limiting_the_amount_of_RAM_a_program_can_use.html
But I don’t know if this works on RaspPi platform and what happens when
the tor process hits the memory limit.
Regar
I feel like you are SO missing the point.
Making Tor block morally horrible things does not involve telling exit
notes to block traffic to known porn sites.
The porn sites with the boobies that someone might hit on port 80 on
the public internet represent the Catholic Church of porn,
metapho
That tool is claiming this about our relay: "This IP is infected with,
or is NATting for a machine infected with s_ddos_dirtjumper". Says the
problem connection was an attempt to connect to port 80 on a
"s_ddos_dirtjumper Command and Control server with contents unique to
s_ddos_dirtjumper". B
On 09/01/2013 10:57 PM, I wrote:
Hej,
On trying to get a non-exit relay going on a cheap VPS Vidalia says
Sep 02 03:48:32.146 [Warning] Received NETINFO cell with skewed time
from server at 128.31.0.34:9101. It seems that our clock is ahead by 9
hours, 0 minutes, or that theirs is behind. Tor r
On Sun, 1 Sep 2013 19:54:27 -0800
I wrote:
> Thanks, Roger,
>
> I believe the server is in France and ultimately owned by a German company
> but it has some sort of connection to the USA and I am ten hours ahead.
> I have tried the timezone as Germany and Belgium to see, and set the clock on
Thanks, Roger,
I believe the server is in France and ultimately owned by a German company but
it has some sort of connection to the USA and I am ten hours ahead.
I have tried the timezone as Germany and Belgium to see, and set the clock on
the server for the nine hours difference.
Also I have
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I'm clear :-)
Yoriz schrieb:
>I have been running a Tor exit node for only 2 days on a fresh IP
>address. However, that IP address is now blocked by spamhaus because it
>apparently tried to contact the Command and Control server of the
>"pony" ma
Hej,On trying to get a non-exit relay going on a cheap VPS Vidalia saysSep 02 03:48:32.146 [Warning] Received NETINFO cell with skewed time
from server at 128.31.0.34:9101. It seems that our clock is ahead by 9
hours, 0 minutes, or that theirs is behind. Tor requires an accurate
clock to wo
On Sun, Sep 01, 2013 at 06:57:38PM -0800, I wrote:
> Hej,On trying to get a non-exit relay going on a cheap VPS Vidalia
> saysSep 02 03:48:32.146 [Warning] Received NETINFO cell with skewed time
> from server at 128.31.0.34:9101. It seems that our clock is ahead by 9
> hours, 0 minutes, or that
I'm not sure if this applies but -
[1]http://thenextweb.com/asia/2013/08/01/vietnam-adopts-regulations-to-
ban-internet-users-from-sharing-news-reports-online/
Sustain
On Sun, Sep 1, 2013, at 05:43 PM, Jon Gardner wrote:
>
> On Aug 28, 2013, at 5:09 PM, Roger Dingledine wrote:
>
> > On Tue, A
On Aug 28, 2013, at 5:09 PM, Roger Dingledine wrote:
> On Tue, Aug 27, 2013 at 11:12:01PM +0200, Tor Exit wrote:
>> Why is it so bad if a Tor exit operator tries to match the use of
>> their node with their own moral beliefs?
>
> I really would like to support this if I could.
I appreciate you
I have been running a Tor exit node for only 2 days on a fresh IP address.
However, that IP address is now blocked by spamhaus because it apparently tried
to contact the Command and Control server of the "pony" malware:
http://cbl.abuseat.org/lookup.cgi?ip=5.79.81.200
Other node operators, coul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
For my relay, it was the first time.
Is your relay in AT? Mine is (serverelrippo)
I'll leave rkhunter as it is in the Moment. I am curious how many times I get
this warning...
Paul Staroch schrieb:
>Am 2013-09-01 10:48, schrieb elrippo:
>> "Wa
Am 2013-09-01 10:48, schrieb elrippo:
> "Warning: Network TCP port 60922 is being used by /usr/sbin/tor. Possible
> rootkit: zaRwT.KiT
> Use the 'lsof -i' or 'netstat -an' command to check this."
>
> I guess this is a false positive in conjucntion to the massive raid of
> traffic
> incr
Hy Folks :D
Today i got this warning from rkhunter.
"Warning: Network TCP port 60922 is being used by /usr/sbin/tor. Possible
rootkit: zaRwT.KiT
Use the 'lsof -i' or 'netstat -an' command to check this."
I guess this is a false positive in conjucntion to the massive raid of traffic
in
15 matches
Mail list logo