Hi
Not sure if my reply worked yesterday so thanks for this - adding 'port' worked
and Ive now got two fully working exits ;-) thanks for the help
Cheers Mark
> On 29 Nov 2016, at 10:32, Peter Palfrader wrote:
>
>> On Tue, 29 Nov 2016, Sec INT wrote:
>>> On Tue, Nov
> On 30 Nov. 2016, at 02:18, Zack Weinberg wrote:
>
> On Sun, Nov 27, 2016 at 6:01 PM, teor wrote:
>>
>> If IPv6 penetration among Tor relay ISPs/ASs is as high as you say, why
>> do only:
>>
>> 7.6% (541/7145) of relays have an IPv6 OR address
>> 17.3%
re
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Bridges can be gotten over email, also, at brid...@bridges.torproject.org
with "get bridges" in the body.
On 29 November 2016 at 19:36, fnordomat wrote:
> you can get them from https://bridges.torproject.org
>
> dark side:
> > i need some relays bridges to use
> >
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
You can contact them on the given snei-noc-ab...@am.sony.com and they will give
you a list of attacked IPs.
Paul
Am 29.11.2016 um 14:48 schrieb SuperSluether:
> I keep getting Account Takeover Attempt abuses on my Tor exit, and I'm not
> sure how to handle them:
>
> It is most likely the
On Sun, Nov 27, 2016 at 6:01 PM, teor wrote:
>
> If IPv6 penetration among Tor relay ISPs/ASs is as high as you say, why
> do only:
>
> 7.6% (541/7145) of relays have an IPv6 OR address
> 17.3% (7972687/45960632) of relay bandwidth has an IPv6 OR address
>
> With IPv6 relay
I keep getting Account Takeover Attempt abuses on my Tor exit, and I'm
not sure how to handle them:
It is most likely the attack traffic is directed at one of the following
endpoints:
account.sonyentertainmentnetwork.com
auth.np.ac.playstation.net
auth.api.sonyentertainmentnetwork.com
Got it - sorry was distracted by Nagios install ;-)
all working - I've added a comment to the site I was using
cheers
Mark
On Tue, Nov 29, 2016 at 10:32 AM, Peter Palfrader
wrote:
> On Tue, 29 Nov 2016, Sec INT wrote:
> > On Tue, Nov 29, 2016 at 10:14 AM, Peter
> On 28 Nov. 2016, at 10:01, teor wrote:
>
>>> All this new fancy ISPs that have FTTH and
>>> give you 500 MBit/s symmetric internet access have Carrier grade
>>> NAT because they were late to the Party and don't get IPv4 from
>>> the LIRs.
>>> You can't run there a
> On 29 Nov. 2016, at 18:44, Roman Mamedov wrote:
>
> On Mon, 28 Nov 2016 10:01:03 +1100
> teor wrote:
>
>> (I've rearranged your threads for clarity, please bottom-post in future.)
>>
On Nov 27, 2016 11:59 AM, "root"
On Tue, 29 Nov 2016, Sec INT wrote:
> On Tue, Nov 29, 2016 at 10:14 AM, Peter Palfrader
> wrote:
> > On Tue, 29 Nov 2016, Sec INT wrote:
> > > Nov 29 09:52:55.000 [warn] Failed to parse/validate config: Unknown
> > > option 'DirFrontPage'. Failing.
> > What is
Hi
Its on a number of setup guides for an exit relay whereby if someone looks
up your ip and port 80 they will see this webpage - its designed to reduce
DMCA notices and accusations against someone running an exit - I've
attached the actual page
https://blog.torproject.org/running-exit-node
On Tue, 29 Nov 2016, Sec INT wrote:
> Hi
>
> Thanks ;-) As for the 'DirFrontPAge' the error is below
>
> Nov 29 09:52:55.000 [warn] Failed to parse/validate config: Unknown option
> 'DirFrontPage'. Failing.
What is DirFrontPage supposed to be? The manpage only mentions a
DirPortFrontPage.
Hi
Thanks ;-) As for the 'DirFrontPAge' the error is below
Nov 29 09:52:55.000 [warn] Failed to parse/validate config: Unknown option
'DirFrontPage'. Failing.
Nov 29 09:52:55.000 [err] Reading config failed--see warnings above. For
usage, try -h.
Nov 29 09:52:55.000 [warn] Restart failed
15 matches
Mail list logo