On Thu, May 22, 2014 at 01:17:17PM +0600, Roman Mamedov wrote:
> On Wed, 21 May 2014 22:51:49 -0700
> Adam Brenner wrote:
>
> > I have setup a Tor exit node and IPv4 appears to work (will get a real
> > test in the next 48 hours). I would like to confirm my IPv6 setup as I
> > have found the do
On Thu, May 22, 2014 at 10:01:19AM -0700, Adam Brenner wrote:
> For IPv4 I am running a Reduced Exit Policy[1]. Those entries are in
> my torrc file, however, Atlas is showing none of those policies[2]!
Really?
https://atlas.torproject.org/#details/6269EC22B7970ACDE4AF09F6ADE67CEB0C7F7964
looks l
On 05/22/2014 10:01 AM, Adam Brenner wrote:
On 05/22/2014 01:00 AM, t...@afo-tm.org wrote:
Are you sure that you want allow port 25 on ipv4 and 6? Can't test it
from
here but it looks like you allow all ports on v4 and v6
For IPv4 I am running a Reduced Exit Policy[1]. Those entries are in my
FYI
On 05/17/2014 11:40 AM, Roman Mamedov wrote:
> You options are:
>
> 1) Explaining the above (along with some explanation about Tor
> network in general) to your provider;
Just for the record: I received the same abuse report on 22. 5. 2014
(I have the same ISP and hosting provider). So I wro
On 2014-05-24 06:36:41 (-0700), Contra Band wrote:
> Date: Sat, 24 May 2014 06:36:41 -0700 (PDT)
>
> That is a great piece of advice David.
No it isn't. Please see Roman's followup to my post.
--
David Serrano
GnuPG id: 280A01F9
signature.asc
Description: Digital signature
That is a great piece of advice David. I have enabled the tcp outgoing 9001 and
seeing a lot of new connections established to relays with 9001 ORPort. Thanks
a lot.
Keep it up guys...
On Saturday, May 24, 2014 8:51 AM, David Serrano wrote:
On 2014-05-24 01:25:36 (-0700), Contra Band wrot
>If you do lines like the above, your Tor relay will be unable to reach
>other Tor relays that chose port 80 or port 110 for their ORPort or
>their DirPort. (People choose those ports because some users are behind
>firewalls that only allow connections to those ports.)
indeed. By personal choice,
On Sat, 24 May 2014 10:51:52 +0200
David Serrano wrote:
> With those ports allowed you'll be able to reach 80% of the network.
So you're okay with the thought that their relay will be 20% broken, and 20%
of all circuits people try to establish through it, will fail?
As Roger said, *all* outgoin
On 2014-05-24 01:25:36 (-0700), Contra Band wrote:
>
> Your experience is really helpful. After some thoughts now I'm allowing only
>
> incoming tcp ports 443 and ssh
>
> outgoing tcp port 443
Please enable at least outgoing port 9001 as well. Most relays listen on that
port, with 443 in seco
Thanks guys,
Your experience is really helpful. After some thoughts now I'm allowing only
incoming tcp ports 443 and ssh
outgoing tcp port 443
I haven't enabled the Dirport. Heard all tor relays are dir mirrors by default.
Later I will read the nsa, Linux hardening guide. It looks good. Tha
Thanks guys,
Your experience is really helpful. After some thoughts now I'm allowing only
incoming tcp ports 443 and ssh
outgoing tcp port 443
I haven't enabled the Dirport. Heard all tor relays are dir mirrors by default.
Later I will read the nsa, Linux hardening guide. It looks good. Tha
Thanks guys,
Your experience is really helpful. After some thoughts now I'm allowing only
incoming tcp ports 443 and ssh
outgoing tcp port 443
I haven't enabled the Dirport. Heard all tor relays are dir mirrors by default.
Later I will read the nsa, Linux hardening guide. It looks good. Tha
12 matches
Mail list logo