> On 19 Aug 2016, at 06:50, majacobs wrote:
>
> Is my understanding correct that is NOT possible to run an accesspoint that
> connects to tor running a relay instead of an exit-node?
> I am able to torify programs running on the system , but need the acces point
> to be
Well, the flag seems to be staying now, I guess it doesn't hurt anything
though.
On Wed, Aug 17, 2016 at 9:46 PM, Ivan Markin wrote:
> George Kadianakis:
> > I think this is OK.
> >
> > The patch that required Stable flag for Guard flag only got merged
> recently:
>
> Just for
> On 18 Aug 2016, at 18:24, majacobs wrote:
>
> Block ports that spread worm(like) virii would also mean closing ports 80 and
> 443. I am afraid that is no option
Sadly, there's not much we can do then.
Tor relays don't inspect traffic in general - there are legal and
Is my understanding correct that is NOT possible to run an accesspoint that
connects to tor running a relay instead of an exit-node?
I am able to torify programs running on the system , but need the acces point
to be torified for some clients that need to go through tor. I am aware that
this
Yawning Angel wrote:
> Michael McConville wrote:
> > I forgot to mention all the crypto required, too. These boards don't
> > have crypto accelerators, so that's a big cost.
>
> What?
I forgot to mention all the crypto required, too. These boards don't
have crypto
On Thu, 18 Aug 2016 11:50:33 -0600
Michael McConville wrote:
> I forgot to mention all the crypto required, too. These boards don't
> have crypto accelerators, so that's a big cost.
What? ARMv8-A has hardware accelerated SHA(1/2), AES, and a carry-less
multiply. As far as I
Michael McConville wrote:
> Roman Mamedov wrote:
> > On Thu, 18 Aug 2016 10:40:00 -0600
> > Michael McConville wrote:
> >
> > > Zack Weinberg wrote:
> > > > Has anyone had any experience running *exit* nodes on Raspberry
> > > > Pi-grade hardware, or slightly beefier? We are
Roman Mamedov wrote:
> On Thu, 18 Aug 2016 10:40:00 -0600
> Michael McConville wrote:
>
> > Zack Weinberg wrote:
> > > Has anyone had any experience running *exit* nodes on Raspberry
> > > Pi-grade hardware, or slightly beefier? We are thinking of
> > > replacing the old,
I think you mean "if" it goes live. That ticket has been open for 4 years,
and originally had a milestone for 0.2.4.
On Aug 18, 2016 12:36 PM, "Pi3" wrote:
> Im running 5 Mbits mid node on Pi3. Cpu load is 25-30% on 1 core with full
> steady traffic - no aes-ni here.
>
Im running 5 Mbits mid node on Pi3. Cpu load is 25-30% on 1 core with full
steady traffic - no aes-ni here.
Things should improve greatly when this ticket will go live in 0.2.9.x
https://trac.torproject.org/projects/tor/ticket/7572___
tor-relays
On Thu, 18 Aug 2016 10:40:00 -0600
Michael McConville wrote:
> Zack Weinberg wrote:
> > Has anyone had any experience running *exit* nodes on Raspberry
> > Pi-grade hardware, or slightly beefier? We are thinking of replacing
> > the old, bulky, power-hungry machine currently
Has anyone had any experience running *exit* nodes on Raspberry Pi-grade
hardware, or slightly beefier? We are thinking of replacing the old,
bulky, power-hungry machine currently running exit
78C7C299DB4C4BD119A22B87B57D5AF5F3741A79 with something on that level.
It only has to hit 10Mbps.
Zack Weinberg wrote:
> Has anyone had any experience running *exit* nodes on Raspberry
> Pi-grade hardware, or slightly beefier? We are thinking of replacing
> the old, bulky, power-hungry machine currently running exit
> 78C7C299DB4C4BD119A22B87B57D5AF5F3741A79 with something on that level.
> It
Hi,
a directory authority IP-address on the DFRI network was recently
reported for hosting malware and abuse reports was sent out to several
mail addresses. Not only to ab...@dfri.tld as one would hope.
The reason seems to have been malware using Tor connecting to the
IP while analyzed in a
On 18.08.2016 09:05, Karsten Loesing wrote:
> It's back now!
The encoding of https://exonerator.torproject.org/ is not correct,
however, at least not for the German localized variant. I have tried
different web browsers to make sure it is not a problem on my end, and
all umlauts are garbled (and
Hi,
If you are hosting it with XS4ALL, contact them. They have a policy on
Tor exits, and should be able to do something.
Cheers,
Thom
On 18/08/16 10:24, majacobs wrote:
> Block ports that spread worm(like) virii would also mean closing ports
> 80 and 443. I am afraid that is no option
>
>
Block ports that spread worm(like) virii would also mean closing ports 80 and
443. I am afraid that is no option
the white rider
(Het leuke van ... is
the white rider
(Het leuke van ... is
> On 18 aug. 2016, at 01:30, teor wrote:
>
>
>> On 18 Aug 2016, at 08:23,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 17/08/16 17:19, Peter Palfrader wrote:
> On Wed, 17 Aug 2016, Alexander Dietrich wrote:
>
>> I just tried to use ExoneraTor, but it seems to be down:
>> https://exonerator.torproject.org/
>
> There is some database maintenance going on. It
> On 18 Aug 2016, at 15:46, Andrew Deason wrote:
>
> On Wed, 17 Aug 2016 12:23:15 +1000
> teor wrote:
>
>> Has anyone checked if the logs on other resolvers (like unbound) have
>> the same issue?
>
> On my exit running
19 matches
Mail list logo