On 9/2/2013 11:59 AM, Steve Snyder wrote:
> On 09/02/2013 10:02 AM, Kostas Jakeliunas wrote:
>> [1]: http://globe.rndm.de/
>
> Having this tool on an unencrypted HTTP site doesn't seem safe to me.
> Anybody can sniff the bridge IP addresses that users submit for reporting.
It may be different if
> I have been running a tor node for 133 days and Im starting to receive some
> weird messages in the log file. One of them look like this:
> Received http status code 504 ("Gateway Time-out") from server
> '154.35.32.5:80' while fetching
> "/tor/server/d/9169637E422C216BECD05C6CFE3AE.
> https:
Hej,
Reporting that message is on my two exit relays running for just one day.
Robert
> Hi tor-relay list,
>
> I have been running a tor node for 133 days and Im starting to receive
> some weird messages in the log file. One of them look like this:
> Received http status code 504 ("Gateway Tim
Hi tor-relay list,
I have been running a tor node for 133 days and Im starting to receive
some weird messages in the log file. One of them look like this:
Received http status code 504 ("Gateway Time-out") from server
'154.35.32.5:80' while fetching
"/tor/server/d/9169637E422C216BECD05C6CFE3AE
hi,
xoroxDE2 176.9.122.78 *is listed *
http://cbl.abuseat.org/lookup.cgi?ip=176.9.122.78&.pubmit=Lookup
xoroxFR 5.135.167.214 *is listed *
http://cbl.abuseat.org/lookup.cgi?ip=5.135.167.214&.pubmit=Lookup
xoroxLU 94.242.252.225 *is listed *
http://cbl.abuseat.org/lookup.cgi?ip=94.242.252.225&.p
On Mon, 02 Sep 2013 21:39:35 +, Yoriz wrote:
> That Guy wrote:
> > to remove this soap opera from a technical mailing list.
>
>
> "Soap opera"? Apparently you are missing the point.
The soap opera was the part where someone tried to filter tor traffic
on moral grounds which is obviously not
That Guy wrote:
> to remove this soap opera from a technical mailing list.
"Soap opera"? Apparently you are missing the point.
Obviously malware writers will use Tor for various purposes, but connecting to
a C&C via Tor would not make sense since they have the largest anonymising
botnet themse
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 02.09.2013 19:17, Susan Harbison wrote:
> Thank you.
>
>
> ___ tor-relays mailing
> list tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
Hello Susa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
So in the documentation:
UserspaceIOCPBuffers 0|1
If IOCP is enabled (see DisableIOCP above), setting this option to 1
will tell Tor to disable kernel-space TCP buffers, in order to avoid
needless copy operations and try not to run out of non-paged
Hi,
Am 2013-09-02 19:17, schrieb Susan Harbison:
> Thank you.
Please follow the link in the signature of this mail. On the bottom of this
page you find instructions about how to unsubscribe yourself from the list.
Paul
___
tor-relays mailing list
t
Thank you.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Mon, Sep 02, 2013 at 08:33:48AM -0400, That Guy wrote:
> a suggestion: maybe a new tor-node-moralfag-mailinglist should be set-up
> as to remove this soap opera from a technical mailing list.
Eugh, please don't use homophobic language like fag.
___
to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
tor-admin:
> You could modify the tor init script to limit the memory usable by
> /usr/sbin/tor as described here:
>
> http://jlebar.com/2011/6/15/Limiting_the_amount_of_RAM_a_program_can_use.html
>
> But I don’t know if this works on RaspPi platf
On 9/2/2013 10:02 AM, Kostas Jakeliunas wrote:
> The usual deal is to just wait a bit more, until your bridge gets voted
> into the last consensus. The "running: true/false" field in Onionoo simply
> indicates whether your bridge/relay descriptor is listed in the last
> consensus (which is publishe
On 09/02/2013 10:02 AM, Kostas Jakeliunas wrote:
[snip]
Perhaps you're using it yourself, but one of the ways to probe Onionoo
in a user-friendly way is the new Globe tool [1]. It includes bridges as
well as relays.
[1]: http://globe.rndm.de/
Having this tool on an unencrypted HTTP site does
On 9/2/2013 9:58 AM, Karsten Loesing wrote:
> On 9/2/13 3:52 PM, eliaz wrote:
>> Been having a devil fo a time keeping my bridge up this week. One
>> question: With the bridge up & running, & the map showing it connecting
>> to circuits, why is onionoo reporting "running":false, ? Should I worry
>
The usual deal is to just wait a bit more, until your bridge gets voted
into the last consensus. The "running: true/false" field in Onionoo simply
indicates whether your bridge/relay descriptor is listed in the last
consensus (which is published every hour, and includes a list of relays and
bridges
On 9/2/13 3:52 PM, eliaz wrote:
> Been having a devil fo a time keeping my bridge up this week. One
> question: With the bridge up & running, & the map showing it connecting
> to circuits, why is onionoo reporting "running":false, ? Should I worry
> about this discrepancy? Thanks, eliaz
Can you p
Been having a devil fo a time keeping my bridge up this week. One
question: With the bridge up & running, & the map showing it connecting
to circuits, why is onionoo reporting "running":false, ? Should I worry
about this discrepancy? Thanks, eliaz
___
to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
>
> Other node operators, could you please try your IP address? Perhaps
> this could explain the recent increase in connections?
>
within 2 days of setting up a node at a new IP it was added to the
extortionists over at SORBS :-/
a suggestion: mayb
Ich checked both of my Exit nodes:
IP Address 91.219.238.107 is listed in the CBL. It appears to be infected with a
spam sending trojan, proxy or some other form of botnet. <- uptime ~16 days
IP Address 84.201.38.234 is not listed in the CBL. <-- New node, uptime < 24hrs
> This was detected by
21 matches
Mail list logo