to obscure the fact that
## it's an email address and/or generate a new address for this purpose.
#ContactInfo Random Person
## You might also include your PGP or GPG fingerprint if you have one:
#ContactInfo 0x Random Person
ContactInfo 0x4D9C031B Marina Brown <catskillmar...@
ce and perhaps be 2 hosts instead of one.
It looks like this was a single point of failure. It would be easy
enough to have a volunteer bgp announce a specific ip address. If they
decided to drop out then it would not cause this type of consternation
in the future. Having more than one bridge auth has obv
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 01/29/2014 11:07 PM, David Stainton wrote:
Sounds like a viable plan. What specifically do you need help
with?
On Thu, Jan 23, 2014 at 8:34 PM, Andreas Fritzel
andreasfritzel1...@yahoo.com wrote:
Hey all,
In two different countries I run
ssh key. They can try all
they want but fail2ban will block them for a day with my settings.
Some resume attacking after ban time is up.
- --- Marina Brown
-andy ___ tor-relays
mailing list tor-relays@lists.torproject.org
https://lists.torproject.org
with 'complaints'.
It seems they may already have changed their AUP.
'contain any kind of proxy server or other traffic relaying programs'.
- --- Marina Brown
They are in New Hampshire, perhaps you could let the
FreeStateProject know (cc: SV) that they are perhaps not a company
and suit was lost
long ago.
- --- Marina Brown
Mick
-
Mick Morgan gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F
E60B 5BAD D312 http://baldric.net
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/05/2013 01:59 PM, TonyXue wrote:
This can happen if a DNS server is listening on several ip addresses
but answers from it's base address.
I have dealt with this recently changing from DJBDNS to Unbound.
- Marina Brown
Hi Everyone