Would greatly appreciate relay monitoring.
On Thu, 10 Feb 2022 at 01:09, nusenu wrote:
> which implies it is public. How important are private (non-public) ways to
> subscribe
> to notifications for you? (non-public email address)
3
> TorWeather used to have an option where the operator was
On Sun, 17 May 2020 at 10:02, Roger Dingledine wrote:
>
> On Sun, May 17, 2020 at 10:01:24AM +0200, Paul Geurts wrote:
> > it seems to me that the tor consensus page has not been updated since:
> > Consensus was published 2020-05-14 19:00:00 UTC
>
> You're right!
>
I have an email draft about ideas for Colin I haven't finished and Tor
Weather was going to be top of the list. So add another voice to the
crowd.
-tom
On 17 May 2018 at 16:48, Matthew Glennon wrote:
> I don't know if it's helpful, but I use pulseway.com to monitor my
For the benefit of others, to test this from a mac:
1) I ssh-ed to my relay using ssh -D user@relay
2) I opened up Firefox, went to preferences, at the bottom hit Network
Proxy Settings
3) I set *only* the socks host to localhost port , Socks %, and
set Proxy DNS at the bottom
4) I
D MESSAGE-
> Hash: SHA256
>
> On 08/14/2017 11:22 PM, Tom Ritter wrote:
>> But I wanted to announce it here, both to give an update, and let the
>> community take a look at its output and see if anything looks fishy.
>
> Since few hours the BW is dropped or my exit relay fr
After suffering the loss of maatuska's bwauth several months ago, we
have re-provisioned it thanks to the gracious help from
https://coldhak.ca/
It has completed an initial scan of the network[0] and is reporting
its data here: http://198.51.75.50/bwauth/bwscan.V3BandwidthsFile
This week I
On 13 September 2016 at 20:34, jensm1 wrote:
> Addendum: Did a bit of research (or rather checked some random relays on
> Atlas).
>
> It seems like it's not only my relay that experienced a significant drop at
> the same time. I can't find anything obvious these relays have in
We're not punishing on purpose, that's for sure. DirAuths may not
vote on a relay to exclude it from the consensus, or may vote to give
it BadExit, but BWAuths have no such mechanism, and I guess you'll
just have to take the words of the individual operators to not do
something as evil as try and
I wonder if you could just run sslyze (or another TLS scanning tool)
on the OR ports of all the relays, and see what ciphersuites they
accept.
It won't be exactly symmetric - I'm not sure (one can investigate the
code though) if those same ciphersuites will be the ones offered in a
relay - relay
On 30 July 2015 at 12:14, Tom Ritter t...@ritter.vg wrote:
Thanks for the heads up!
A fifth bwauth is expected to start voting real soon now, and I'm
not sure why maatuska didn't vote on bwauth data last vote, but I've
pinged some folks so hopefully we can get this resolved quickly.
Aaaand
Thanks for the heads up!
A fifth bwauth is expected to start voting real soon now, and I'm
not sure why maatuska didn't vote on bwauth data last vote, but I've
pinged some folks so hopefully we can get this resolved quickly.
-tom
On 30 July 2015 at 12:04, starlight.201...@binnacle.cx wrote:
On 7 July 2015 at 09:04, Carlin Bingham c...@viennan.net wrote:
I just want to chime in with my own consensus weight problem.
FF1678164E0FFF1DACA45E3DCDE16E49FF1374BE has been running for over 70
days and still has a consensus of 20, I don't think it has ever changed
since it was started.
On 1 July 2015 at 07:56, Ceysun Sucu ceysuns...@gmail.com wrote:
I'm currently trying to simulate a tor network on shadow to test out some
properties of hidden service's, i was wondering how could i create a hidden
service directory or if someone could point towards an example
configuration.
I looked at
https://atlas.torproject.org/#details/D60B02A13F5D9CAFD6EC27A5332C5FEF5B769105
/ 4FreeSpeech for the latest vote:
moria: w Bandwidth=3012 Measured=1890
maatuska: w Bandwidth=3012 Measured=3820
gabelmoo: w Bandwidth=3012
longclaw: w Bandwidth=3012
consensus: w Bandwidth=20
Hrm. So this gets into the inner workings of the bwauth system which
is... complicated.[0] Honestly, I'm not actually sure how the
individual data from the different bwauths is combined into a single
value for the consensus.
I'm not sure what the answer is for your problem, but I'm beginning to
On Wednesday, 20 May 2015, Speak Freely when2plus2...@riseup.net wrote:
To be a bwauth you have to be a dirauth, if the bwauth draft spec I read
was correct. But how do you become a dirauth? The addresses are
hardcoded into Tor, so it's not like I could just spin up a dirauth in
an evening
Hi all,
Wanted to provide an update (even if it's not as good news as I hoped
to give) because I know this is a very frustrating issue for everyone.
At a high level, the bwauth scripts segment the network into four
segments ranked by relay speed, and measure each of these segments.
They are
If atlas shows an IPv6 ORPort, that means it's working correctly, right?
-tom
On 12 May 2015 at 17:09, Moritz Bartl mor...@torservers.net wrote:
Hi!
We still have a depressingly low number of relays that support IPv6
(currently only ~120 of ~1900 relays). If your host supports IPv6,
please
On 31 January 2015 at 05:44, JusticeRage justicer...@manalyzer.org wrote:
Hi everyone,
I'm not sure this is the place to share this, but I though some of you might
want to know: an information leak has been discovered on Firefox / Chrome,
and it can be used to reveal a user's real IP address.
On 5 November 2014 03:04, grarpamp grarp...@gmail.com wrote:
On Tue, Nov 4, 2014 at 12:25 PM, Libertas liber...@mykolab.com wrote:
I think it would be a good idea to add OpenBSD to doc/TUNING because [...]
promoting OpenBSD relays benefits the Tor network's security.
Absolutely. Not just due
On 5 November 2014 11:55, Libertas liber...@mykolab.com wrote:
I hope I don't sound too pompous saying this, but I really don't think
relays should run on Windows. Windows is the primary target of
weaponized and general exploits,
Windows desktops, yes. Where users are browsing websites on IE,
I'm far from being knowledgeable about this project, but since no one
else has, I'll point out some controversy around it:
https://www.reddit.com/r/privacy/comments/2j9caq/anonabox_tor_router_box_is_false_representation
-tom
___
tor-relays mailing list
After I added the correct line to my config I waited a bit and it did
not show up in
https://globe.torproject.org/#/relay/C0EDB08D7540D1DD3CA69809ED17D979F51B66E3
Then I remembered I needed to restart my firewall, waiting a bit, and
then it did show up. So I think it's working, and that globe
This seems very similar to the idea of having private exit nodes:
https://www.torproject.org/docs/faq#HideExits
It's also easy to enumerate Exit IPs not by scanning up/down, by just
building a circuit through every exit node to a server you control,
and looking at the originating IP.
-tom
On 7 May 2014 10:09, Pika ohc pikaonthe...@outlook.com wrote:
Thanks for your kindly reply. According to [1], i am still wondering if
it is possbile to make the minimum route path length as 1 (which default is
set to 3) and set Exitnodes to my server as default exit nodes in the
clients'
What is it you're looking for? I can talk to some Tor stuff (most maybe),
but not others and I've never 'coached' anyone formally nor done group user
training. I'm going to be passing through Sydney next week, but not for
long.
-tom
On Jan 25, 2014 12:41 PM, I beatthebasta...@inbox.com wrote:
On 29 October 2013 22:53, Sanjeev Gupta gha...@gmail.com wrote:
Yes, to some extent. I edited the config, as I was willing to pay for the
extra bandwidth, and enabled an Exit Relay.
I was under the impression that this was permitted.
Amazon does not like Exit Nodes running in EC2. I'm not
On Sep 18, 2013 7:11 AM, t...@t-3.net wrote:
I wonder if I am the only one who finds this creepy, in light of all of
the news that has come out lately about the banking systems having been
hacked, etc. This kind of thing would draw a direct line of sorts to the
bank account of the person/company
On 18 September 2013 08:10, t...@t-3.net wrote:
The OP I saw said:
The Wau Holland Foundation can currently only
reimburse via wire transfer.
This seems to be end-of-story in terms of who, in the end, is ultimately
getting liability/risk, and points to practically no chance at anonymity
On 13 August 2013 11:51, Steve Snyder swsny...@snydernet.net wrote:
Well, any VM host can mount and read an unencrypted disk image.
I guess the difference is ease of snooping. While access to disk contents
and process info can be gotten by any hypervisor, some platforms make it
easier than
Sending this out, as I suspect I am not the only person running a node
on SiteValley, as they have pretty good bandwidth for pretty cheap.
I had inquired in the beginning if they allowed Tor, and they said
yes, but if we get too many abuse complaints we'll shut it down. So
maybe 4 or 5 abuse
On 18 July 2013 14:10, Roman Mamedov r...@romanrm.ru wrote:
Maybe they just realized they can't actually offer unmetered bandwidth as they
advertise, and Tor is about the only application that can readily eat all
bandwidth you'll give it, no matter what.
Tom, out of curiosity how much did you
On 7/9/2013 9:03 PM, h...@riseup.net wrote:
A brief whois on the IP 216.243.58.198 reveals that the abuse address is
listed as CondoInternet.
Does anybody have experience getting an IP allocation so that the abuse
address is listed differently?
I have little experience, but perhaps this
On 23 August 2012 20:40, Roger Dingledine a...@mit.edu wrote:
On Fri, Aug 17, 2012 at 09:15:46AM -0400, Tom Ritter wrote:
It would be good to add the exit IP to services that allow Tor Exits
to register to proactively stop abuse emails.
http://www.blocklist.de is one I had to add mine
It's my understanding that if you put the following Exit Policy in your torrc:
ExitPolicyRejectPrivate 0
ExitPolicy accept 97.107.139.108
ExitPolicy reject *:*
Where 97.107.139.108 is your IP address (that one's mine), you will
Exit Enclave to your site, not allow any other exit traffic, you
On 30 March 2012 10:50, Konstantinos Asimakis insh...@gmail.com wrote:
Wouldn't it be safer to accept connections only on port 80? Else he would be
exposing the whole machine.
Hm. I don't know. If you have a local firewall that blocks access to
say, samba, from external addresses, but allows
36 matches
Mail list logo