> On 7 Jul 2016, at 15:29, Andreas Krey wrote:
>
> On Wed, 06 Jul 2016 15:06:00 +, grarpamp wrote:
> ...
>> https://boingboing.net/2016/07/01/researchers-find-over-100-spyi.html
>
> Is there a way to make tor log connection attempts to any ports
> on an hidden service
On Wed, 06 Jul 2016 15:06:00 +, grarpamp wrote:
...
> https://boingboing.net/2016/07/01/researchers-find-over-100-spyi.html
Is there a way to make tor log connection attempts to any ports
on an hidden service address, independent of whether the port
actually has a HiddenServicePort?
> All
s7r:
> The path of a circuit is selected by the client (i.e. user). So,
> each and every relay / bridge, in order to be considered a valid one,
> should be able to extend a circuit when requested to any other
> relay, otherwise everything gets broken.
So does everything break if there are
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 07/06/2016 11:10 PM, nusenu wrote:
> I find https://compass.torproject.org more convenient for that
> task.
+1
The bubbles aren't useful IMO.
- --
Toralf
PGP: C4EACDDE 0076E94E, OTR: 420E74C8 30246EE7
-BEGIN PGP SIGNATURE-
Version:
> On 06/07/16 18:25, tor relay wrote:
>>> I've been running an exit node for over a year on OVH now, no problems
>>> so far. Highly recommended (especially since they give me 10TB of
>>> traffic for about 10$USD/month; considering I use about 7-8TB of that
>>> per month, it's well worth it).
>>
> On 06/07/16 18:25, tor relay wrote:
>>> I've been running an exit node for over a year on OVH now, no problems
>>> so far. Highly recommended (especially since they give me 10TB of
>>> traffic for about 10$USD/month; considering I use about 7-8TB of that
>>> per month, it's well worth it).
>>
Am 06.07.2016 um 22:09 schrieb Iain R. Learmonth:
> Hi,
>
> On 06/07/16 18:25, tor relay wrote:
>>> I've been running an exit node for over a year on OVH now, no problems
>>> so far. Highly recommended (especially since they give me 10TB of
>>> traffic for about 10$USD/month; considering I use
Hi,
On 06/07/16 18:25, tor relay wrote:
>> I've been running an exit node for over a year on OVH now, no problems
>> so far. Highly recommended (especially since they give me 10TB of
>> traffic for about 10$USD/month; considering I use about 7-8TB of that
>> per month, it's well worth it).
>
>
On 7/6/16, Green Dream wrote:
> It seems easier to say "don't worry about it, it's not really a problem"
> from that perspective.
That's a given.
> For the average Tor volunteer operator, all that comfort, protection and
> privilege is gone. _My_ ass is on the line. Or
Except the operators at BoingBoing have the privilege of corporate
liability (instead of personal liability), and very likely corporate
counsel (i.e., a nice legal team) as well.
It seems easier to say "don't worry about it, it's not really a problem"
from that perspective.
For the average Tor
On 7/6/16, Roger Dingledine wrote:
> In this
> case we actually found these relays misbehaving (accessing onion
https://boingboing.net/2016/07/01/researchers-find-over-100-spyi.html
http://motherboard.vice.com/read/over-100-snooping-tor-nodes-have-been-spying-on-dark-web-sites
https://boingboing.net/2016/07/01/researchers-find-over-100-spyi.html
"Many people fear that running an exit node will put them in police
crosshairs if it gets used in the commission of a crime. For the
record, Boing Boing runs a very high-capacity exit node, and though
we've received multiple
I've been running an exit node for over a year on OVH now, no problems
so far. Highly recommended (especially since they give me 10TB of
traffic for about 10$USD/month; considering I use about 7-8TB of that
per month, it's well worth it).
*Jean-Philippe Décarie-Mathieu*
j...@jpdm.org
On 7/6/2016 4:50 PM, Ivan Markin wrote:
> Andreas Krey:
>> That will cause issues for everyone that happens to select your
>> relay and the 'blocked' relays in a circuit - the connections will
>> just fail, and the user will wonder what happened, and why TBB
>> doesn't work.
>
> Sure, I made a
Andreas Krey:
> That will cause issues for everyone that happens to select your
> relay and the 'blocked' relays in a circuit - the connections will
> just fail, and the user will wonder what happened, and why TBB
> doesn't work.
Sure, I made a notice that you shouldn't do it if you care about
On Tue, Jul 05, 2016 at 10:00:22PM -0700, Green Dream wrote:
> So... what's going on in this particular case and what are the directory
> authorities going to do, if anything?
Yesterday we started the move towards blocking them. (The move takes a
little while, since it needs a sufficient fraction
On 7/6/16, Green Dream wrote:
>> It's up to directory authority operators to deal with
>> suspicious/rogue/misconfigured relays by marking them as
>> invalid/rejected/badexit.
>
> So... what's going on in this particular case and what are the directory
> authorities going
I am testing www.hostwinds.com and www.digitalocean.com right now,
both work fine atm.
Markus
2016-07-06 10:19 GMT+02:00 tor relay :
>> Well, I'm still sticking with CoolHousing/Virtual Server Lite because I
>> hardly ever get abuse
>> complaints. For ITL, I may leave
simon:
> If I understood the documentation correctly, as a node operator I can't
> blacklist hosts individually (unless I'm putting them into MyFamily,
> which I don't want to).
AFAIK, there is no option in tor itself to exclude relays from the routing.
But you're still able to restrict
> Well, I'm still sticking with CoolHousing/Virtual Server Lite because I
> hardly ever get abuse
> complaints. For ITL, I may leave after my term expires.
> But a few other companies I found were:
> https://hostmaze.com/
tested it, made really bad experience with them, network performance was
20 matches
Mail list logo