Thank you for running obfs4 bridges with iat_mode != 0, only very few
obfs4 bridges support the additional traffic obfuscation in both
directions.
Kudos to you my friend.
- William
2021-02-23 1:18 GMT, torjoy :
> Hi All,
>
> I work with time and frequency references and run some tor bridges. Wha
Thinking of IPv6:
How far has the team got in implementing IPv6 only OR port facility ?
Currently you can only run tor relay of any sort if there is open IPv4 OR port
to the internet. This is getting a bit quaint.
I am sure I am not alone in having much wasted bandwidth that could be
On 2/22/21 7:29 PM, William Kane wrote:
A hard limit of 9 might be a little too low - then again, a legit,
unmodified tor binary would hold it's TCP connection established for
as long as needed -
Hhm, I'm really under the impression that even 5 or 4 should be enough.
If a client connects more of
On 2/22/21 7:44 PM, Stephen Mollett wrote:
Have you tried adding "xt_recent.ip_list_tot=" to your kernel
command line? That formula works for most module parameters when their
module is built-in, I think.
Stephen
Yep, that works.
Thx.
--
Toralf
___
Hi All,
I work with time and frequency references and run some tor bridges. What is the
objective of "iat_mode" setting? Is an good timming reference important for
this setting? For now, i'm adminstrating 3 briges, one with iat_mode=0,
iat_mode=1 and iat_mode=2.
Could you explain or forward me
>Are there any objections against this approach?
A hard limit of 9 might be a little too low - then again, a legit,
unmodified tor binary would hold it's TCP connection established for
as long as needed - so maybe this will block some of the attacks, but
it's very basic - I'd try to go with a smar
Hi,
On 22/02/2021 14:27, Toralf Förster wrote:
Unfortunately I cannot change the "ip_list_tot" of "xt_recent" b/c I do
use a non-modular kernel. Does anybody knows a circumvention?
Have you tried adding "xt_recent.ip_list_tot=" to your kernel
command line? That formula works for most module p
Entiendo.
The distribution method is HTTPS. I see messages on this list about hundreds of
connected clients. That has never happened on this bridge. I wondered if I was
doing something wrong. Thank you.
~~~
No me preguntas nada, no te diré una mentira.
Enrollado
Onion Operator a écrit :
>Saluton,
>My relay started to log this message since 0.4.5.5:
>Auto-discovered IPv6 address [...]:443 has not been found reachable.
>However, IPv4 address is reachable. Publishing server descriptor without
>IPv6 address. [2 similar message(s) suppressed
Saluton,
My relay started to log this message since 0.4.5.5:
Auto-discovered IPv6 address [...]:443 has not been found reachable. However,
IPv4 address is reachable. Publishing server descriptor without IPv6 address.
[2 similar message(s) suppressed in last 2400 seconds]
I think it started wit
Hi Luiz
Am 23.02.2021 um 02:18 schrieb torjoy:
I work with time and frequency references and run some tor bridges. What is the objective
of "iat_mode" setting? Is an good timming reference important for this setting?
For now, i'm adminstrating 3 briges, one with iat_mode=0, iat_mode=1 and iat_
11 matches
Mail list logo