Hello,
I recently discovered an SSL multiplexer called "sslh":
"""
sslh accepts connections on specified ports, and forwards them further
based on tests performed on the first data packet sent by the remote
client.
Probes for HTTP, SSL, SSH, OpenVPN, tinc, XMPP are implemented, and
any other
Pavel Polyakov a écrit :
> > I hope the rest of you out there, who depend every day on GNU project
> > code which would not exist without RMS's project, might consider
> > joining me.
>
> I also regret that the Tor Project expressed support for those that
> have purposefully twisted RMS'
Roman Mamedov a écrit :
> On Thu, 25 Feb 2021 16:54:50 +0100
> Casper wrote:
>
> > I found a "kind of solution" about that.
> >
> > Behind my fibre optique, I took 26000-26999 tcp ports with the NAT for
> > IPv4
> >
> > so I have 1
tter range
to use and to make tor traffic as discret as possible ?
Best regards,
Casper
--
GnuPG: AE157E0B29F0BEF2 at keys.openpgp.org
CA Cert: https://dl.casperlefantom.net/pub/ssl/root.der
signature.asc
Description: PGP signature
___
tor-relays mailing l
Onion Operator a écrit :
>Saluton,
>My relay started to log this message since 0.4.5.5:
>Auto-discovered IPv6 address [...]:443 has not been found reachable.
>However, IPv4 address is reachable. Publishing server descriptor without
>IPv6 address. [2 similar message(s)
li...@for-privacy.net a écrit :
> On 02.11.2020 23:26, Roger Dingledine wrote:
>
> > See one example that somebody else experienced here:
> > https://lists.torproject.org/pipermail/tor-relays/2020-May/018450.html
> >
>
> Yeah that was me. I changed the ports of the relays in question to 443 and
Great job!
nusenu a écrit :
> Hi,
>
> I'm happy to announce version 2 of the ContactInfo Information Sharing
> Specification.
>
> https://nusenu.github.io/ContactInfo-Information-Sharing-Specification/
>
> It comes with an easy to use ContactInfo generator, which is maintained by
> Eran
inally get the valid address... No, that's too slow, that's not
possible.
IMHO, email is required. It is not about "tracking tor node
operators", or "are you a trusted tor node operator with 2FA". It is
about what happens if your node is doing sh*t because of mistake in
config.
Bes