‐‐‐ Original Message ‐‐‐
On Tuesday, April 2, 2019 4:50 AM, Roger Dingledine wrote:
> On Tue, Apr 02, 2019 at 04:36:37AM +, Christopher Sheats wrote:
>
> it's the perfect time for some
> of the other relay running nonprofits to step up and add some capacity
> too. :)
Would if I
Original Message
On 26 Feb 2018, 19:52, nusenu wrote:
> I was wondering if you have any plans to get IPv6 connectivity?
As it happens AS28715 (BrassHornComms) is looking for any datacenters / ISPs
that support IPv6 BGP peering from small (~1u / VPS) customers.
I've got a /32
Original Message
On 5 Dec 2017, 19:03, Alison Macrina wrote:
I'm wondering if folks on this list can help me by confirming the organizations
that they know of running relays.
Checking in on behalf of AS28715 / BrassHornCommunications.uk /
Original Message
On 4 Oct 2017, 07:02, Fr33d0m4all wrote: Hi, My Tor middle relay public IP
address is victim of SSH brute force connections’ attempts
Welcome to the Internet!
Any Internet connected machine will be port scanned, vuln probed, brute forced,
blindly hit with
On Sat, Jun 10, 2017 at 10:39 AM, Moritz Bartl
wrote:
>
> We had to temporarily disable some of our exits due to ongoing
> negotiations with the provider.
>
>
Will your provider allow BGP announcements of other IP space?
Depending on how many exits we're talking about I
Whilst your complainant seems to have a bee in their bonnet I'm not sure
you're doing anyone anyone any favours by CC'ing pseudo-private
correspondence into a mailing list.
As a fellow ISP owner running Tor Exits (AS28715) I also enjoy the "right"
to treat abuse requests according to rules that
On 9 Oct 2016 11:36, "pa011" wrote:
>
> - what forces drive ISP's to behave like they do with abuses?
> - maybe Exit volunteers and here especially the big ones could
ask some questions to their ISP to get more light on this
I set up my own ISP (AS28715) so I could run Tor
On Sun, Sep 4, 2016 at 8:08 PM, Jens Kubieziel
wrote:
> X-Post from tor-relays-universities@
>
> I ran some relays at Geman universities in the past. I guess my
> experiences won't help here. Maybe someone on tor-relays has experience
> with running a relay at an UK
As it happens I started work on something too, will put what I've done on
GitHub in a few days (it's still very rough and not very scalable).
FWIW I registered OnionWatch.email for use with this.
On 24 Jun 2016 21:21, wrote:
> I actually provisioned a server for it,
On 12 Jun 2016 5:49 p.m., "Jonathan Baker-Bates"
wrote:
> But along the way I asked some others about the legal implications of
doing what the ISP had asked. The rough consensus was that in the UK at
least, I would only be able to evesdrop on traffic once consent had been
On Tue, Sep 8, 2015 at 9:04 PM, Jonathan Baker-Bates <
jonat...@bakerbates.com> wrote:
> So does anyone know of any reliable source of information on running Tor
> exits in the UK?
>
No but I run several UK based Tor exits and have had little issue other
than the usual abuse reports, that said
On Tue, May 12, 2015 at 11:09 PM, Moritz Bartl mor...@torservers.net
wrote:
especially if you run an exit!
1 exit, 2 bridges and 4 general relays are now explicitly IPv6 enabled
Once https://trac.torproject.org/projects/tor/ticket/5788 is done I'll be
able to bring several more online
On Fri, Nov 7, 2014 at 8:26 PM, grarpamp grarp...@gmail.com wrote:
Is it not time to establish a node operator web of trust?
Look at all the nodes out there with or without 'contact' info,
do you really know who runs them? Have you talked with
them? What are their motivations? Are they your
13 matches
Mail list logo