Re: [tor-relays] Feedback

2016-02-25 Thread Tim Wilson-Brown - teor
Hi, > On 26 Feb 2016, at 05:15, torser...@datakanja.de wrote: > > * Next, i noticed a frequent (daily) behavior of the Tor server >dropping traffic to around zero. Inspecting this, let me to >understand, my provider was disconnecting me and reassigning a new >IP on a daily basis,

Re: [tor-relays] Feedback

2016-02-25 Thread Arisbe
Many ISPs change IP addresses on a regular basis. This seems to be the center of your problem as the other issues can be worked out with a little effort. To our advantage, IPSs are regularly requested by users to assign a permanent IP address for game operators. Try calling your ISP and

Re: [tor-relays] Feedback

2016-02-25 Thread Jamis Hartley
You can contact your ISP and ask for a static IP. It's possible they may charge you for one, but it's also possible they may not. My ISP for example allows me one static IP for free. I use that for my Tor relay, and it works great. On Thu, Feb 25, 2016 at 9:15 PM, wrote:

Re: [tor-relays] Feedback

2016-02-25 Thread Tristan
That's just strange that your ISP would keep changing your IP address that often. It seems to me that the daily change was the only major problem you were facing. On Feb 25, 2016 10:39 PM, wrote: > Hello, > > i have been running a new relay for a short time period now and

[tor-relays] Feedback

2016-02-25 Thread torserver
Hello, i have been running a new relay for a short time period now and would like to bring to your attention the issues faced, that finally led me to refrain from keeping this up any longer: * Documentation was ok (on torproject.org) and the installation (using deb on ubuntu) was easy. *

Re: [tor-relays] Tor Process Being Killed on VPS

2016-02-25 Thread Roman Mamedov
On Thu, 25 Feb 2016 18:19:44 -0500 Stephen R Guglielmo wrote: > Hello, > > I have a VPS with 512 MB RAM. I run nothing on it except nginx and a Tor > relay. The relay is an entry guard and moves about 20 MB/s. It seems that the > kernel is killing the Tor process with

[tor-relays] Tor Process Being Killed on VPS

2016-02-25 Thread Stephen R Guglielmo
Hello, I have a VPS with 512 MB RAM. I run nothing on it except nginx and a Tor relay. The relay is an entry guard and moves about 20 MB/s. It seems that the kernel is killing the Tor process with "out of memory" errors. Are there any tips for mitigating this? I don't have the money right now

Re: [tor-relays] Stable Flag Question

2016-02-25 Thread Tomasz Nitecki
Hey, On 25/02/16 20:41, stea...@nym.mixmin.net wrote: > I'll monitor things and see if anything changes, but I'm more > concerned that my cronjob is not working. I also did a "service tor > reload" to see, if anything changed and I still show 0.2.4.27 as my > Tor version via the arm program.

Re: [tor-relays] Stable Flag Question

2016-02-25 Thread SuperSluether
Are you using the official Tor repository? The Tor version in the Ubuntu repositories is still on version 2.6.10. I suppose your script still has a problem though, since you're still running 2.4.27. On 02/25/2016 01:41 PM, stea...@nym.mixmin.net wrote: -BEGIN PGP SIGNED MESSAGE- Hash:

Re: [tor-relays] Stable Flag Question

2016-02-25 Thread stealth
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thu, 25 Feb 2016 18:41:28 +0100, you wrote: > > > > On 25 Feb 2016, at 18:30, stea...@nym.mixmin.net wrote: > > > > Signed PGP part > > I just recently had my Stable Flag removed from my middle relay. It > > appears that my stats have gotten better

Re: [tor-relays] Stable Flag Question

2016-02-25 Thread Tim Wilson-Brown - teor
> On 25 Feb 2016, at 18:30, stea...@nym.mixmin.net wrote: > > Signed PGP part > I just recently had my Stable Flag removed from my middle relay. It > appears that my stats have gotten better over the past few days, so > it's not clear to me why the stable flag was removed. Can someone > explain

[tor-relays] Stable Flag Question

2016-02-25 Thread stealth
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I just recently had my Stable Flag removed from my middle relay. It appears that my stats have gotten better over the past few days, so it's not clear to me why the stable flag was removed. Can someone explain how this flag is enabled or not enabled?

Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers

2016-02-25 Thread elrippo
I meant your Opennic DNS Server :D On Donnerstag, 25. Februar 2016, 10:22:35 Tristan wrote: > According to the Tor manual, IPV4 DNS queries are cached by default, but > the UseIVP4Cache option says this: > > NOTE: This option, along UseIPv6Cache and UseDNSCache, can harm your > anonymity, and

Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers

2016-02-25 Thread Steve Snyder
I assume you mean the name resolutions. Yes, the resolutions are cached. The history of queries is tracked implicitly by the resolver. I've set mine to no more than 10 queries per second, so the 11th query from the same IP address to the same TLD would be rejected. On Thursday, February 25,

Re: [tor-relays] Nyx Project Ideas

2016-02-25 Thread Damian Johnson
Hi ZEROF, Nyx isn't ready yet for users. It works, but is still very much in development. It might be released around June, though that's just a guess. I reserved the name 'nyx' in PyPI but pip won't work until the release is ready. Cheers! -Damian On Thu, Feb 25, 2016 at 8:26 AM, ZEROF

Re: [tor-relays] Nyx Project Ideas

2016-02-25 Thread ZEROF
Hi, I use arm, but i wanted to test nyx and i have found install option "pip install nyx", but install don't work, version 1.4.5. You can see logs: https://paste.lugons.org/show/Ua6RdWzaMg8cI5cWsf0b/ ;) On 25 February 2016 at 03:10, Damian Johnson wrote: > Hi wonderful

Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers

2016-02-25 Thread Tristan
According to the Tor manual, IPV4 DNS queries are cached by default, but the UseIVP4Cache option says this: NOTE: This option, along UseIPv6Cache and UseDNSCache, can harm your anonymity, and probably won’t help performance as much as you might expect. Use with care! Not sure if it's on by

Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers

2016-02-25 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Are you caching the DNS queries? Am 25. Februar 2016 13:47:04 MEZ, schrieb Steve Snyder : >The OpenNIC servers may not be appropriate for use by a high-speed Tor >exit relay. > >I run an OpenNIC DNS server, and my VPS vendor

Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers

2016-02-25 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 You are welcome :D Am 25. Februar 2016 04:49:48 MEZ, schrieb Tristan : >They are default for Pulse Servers. > >Anyway, thanks elrippo for that link to the Open NIC Project! I've >added >their DNS servers to my exit relay,

Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers

2016-02-25 Thread Steve Snyder
The OpenNIC servers may not be appropriate for use by a high-speed Tor exit relay. I run an OpenNIC DNS server, and my VPS vendor insisted that I rate-limit the server to avoid it being used as a DDOS vector. I'm guessing that this is not an uncommon position to take for public DNS servers.

Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers

2016-02-25 Thread Teófilo Couto
Hi there to all! Some time ago, in some meetings with our "collective" folks, we started to implement OpenNIC based local DNS resolvers to be used by every TOR / CJDNS host we manage! http://goo.gl/2Yki6M Not a good "policy" to use DNS services from "PRISM cousins"... Props to all the TOR