On Fri, Oct 07, 2016 at 10:25:31PM +0200, torser...@datakanja.de wrote:
> for simple - political - reasons, i began contributing otherwise wasted
> bandwith to the tor network about half a year ago. And i am reading this
> list.
> If not, i am seriously reconsidering the futile attempt to engage i
I concur with all you say below.
Exceptionally well spoken. Evidently you have some solid experience in
your corporate managerial role.
Thanks for speaking up.
On Sun, Aug 21, 2016 at 11:50:37PM -0700, Arisbe wrote:
>Okay, so I've been concerned about the safety of at-risk Tor users since
On Sun, Aug 21, 2016 at 11:14:59PM -0400, krishna e bera wrote:
> On 21/08/16 10:02 PM, Zenaan Harkness wrote:
> > Fact: Jacob Applebaum's directory authority was a target of NSA's
> > XKEYSCORE:
> > https://contraspin.co.nz/the-weaponising-of-social-part-3-the-r
On Sun, Aug 21, 2016 at 07:53:26PM -0600, Marcel Krzystek wrote:
> What are the thoughts of relay operators on this?
> https://ghostbin.com/paste/kmnzz
>
> I can be persuaded otherwise, and perhaps i'm being naive, but i believe
> that operation of the network should remain independent from the p
On Tue, Jul 05, 2016 at 05:10:49PM +0200, Niklas K. wrote:
> It's up to directory authority operators to deal with
> suspicious/rogue/misconfigured relays by marking them as
> invalid/rejected/badexit.
>
> Relay operators are not supposed to decide what other relays they may be put
> in a circu
On 5/20/15, s7r wrote:
> On 5/20/2015 12:07 PM, Tor User wrote:
>> If I'm wrong about this, that's great - I'd love to see some
>> documentation to explain it better if you have any links handy.
>> But if I'm right, how can I configure our TBB clients to actually
>> MAKE them use our TOR proxy as
On 4/21/15, Dave Warren wrote:
> On 2015-04-20 10:31, Speak Freely wrote:
>> A foreign sovereign can command anything to anyone... without a
>> reasonable expectation that anyone will follow it.
>>
>> Even in Canada, I am not obliged to respond to American subpoenas unless
>> and until my governme
On 8/2/14, Roger Dingledine wrote:
> On Sat, Aug 02, 2014 at 03:38:51PM +1000, Zenaan Harkness wrote:
>> >> the RELAY_EARLY cell has common legitimate uses.
>> >> How can we distinguish an attack from those?
>> >
>> > Correctly-behaving Tor
On 8/2/14, Roger Dingledine wrote:
> On Fri, Aug 01, 2014 at 10:08:41PM -0400, krishna e bera wrote:
>> According to
>>
>> https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
>>
>> the RELAY_EARLY cell has common legitimate uses.
>> How can we distinguish
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
> Of Zenaan Harkness
> Sent: Thursday, July 10, 2014 6:47 PM
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Oubound Ports
>
> On 7/11/14, Greg Moss wrote:
>> Newbie t
On 7/11/14, Greg Moss wrote:
> Newbie to Tor but have a Debian server up and running as a relay. Do I
> need
> to filter outbound traffic from the tor server on my firewall. If yes what
> ports would I need to open. I am also have a good look a Tails any
> suggestions would be helpful.
Sounds l
On 7/6/14, michaelb...@riseup.net wrote:
> I'm (hopefully) going to be running a few high-speed Tor servers sometime
> in the near future. Which type of Tor server (exits vs. relays) is needed
> the most right now?
I thought there used to be a FAQ on this, suggesting exit relays.
I do believe ex
On 6/16/14, grarpamp wrote:
> On Thu, May 15, 2014 at 9:36 AM, Jeroen Massar wrote:
>> If an operator does not want you on their site, do not circumvent it.
>> You are thus stating: I want to circumvent a site's decision to block me.
>
> No, you are still not understanding a (not so delicate, ye
>> With the bandwidth level you (Matt) are suggesting
>
> I haven't suggested any bandwidth levels. You might be referring to
> Phil I suspect. :)
Sorry about mixing up the thread participants. Should have said "OP".
___
tor-relays mailing list
tor-relay
On 5/27/14, Matt Puckey wrote:
> On Tue, 27 May 2014 16:04:00 +1000
> Phil wrote:
>> Opinions please - is it worthwhile running an exit node on a home DSL
>> connection with limited bandwidth and exit policies?
>
> It all depends on whether or not you want to 'put up' with the potential
> 'hassle
>> > HOWEVER: killing tor in 30 seconds seems to me a little harsh on all
>> > those anonymous connections that were previously going through my exit
>> > relay. Can those clients (if they need) pick up their connections
>> > after about 3 minutes? It appeared that all connections were
>> > complet
On 3/19/14, Zenaan Harkness wrote:
> On 3/19/14, Moritz Bartl wrote:
>> You should add the torproject repository, and then just let it upgrade
>> whenever there is a new version. There's no need to reboot or wait,
>> having the upgrade process restart the service is fi
>From here:
Mar 27 16:50:35.000 [warn] Error binding network socket to
203.217.31.172: Cannot assign requested address
to here:
Mar 27 23:56:46.000 [warn] Error binding network socket to
203.217.31.172: Cannot assign requested address
I got 828 of those messages.
Why no socket number, or more in
On 3/19/14, Zenaan Harkness wrote:
> On 3/19/14, Moritz Bartl wrote:
>> You should add the torproject repository, and then just let it upgrade
>> whenever there is a new version. There's no need to reboot or wait,
>> having the upgrade process restart the service is fi
On 3/19/14, Moritz Bartl wrote:
> You should add the torproject repository, and then just let it upgrade
> whenever there is a new version. There's no need to reboot or wait,
> having the upgrade process restart the service is fine. Your relay will
> not lose its flags during short downtimes like
Currently running Debian's stable/wheezy version of tor which 0.2.3.25
on my first relay, gracemissionstor.
I discovered the torproject deb repository here (of course):
https://www.torproject.org/docs/debian
The following google search:
debian upgrade site:torproject.org
didn't give much.
But th
Notwithstanding the short DNS outage as shown in the logs, I added a
couple of extra Australian DNS servers to resolv.conf since previously
I only had the primary and secondary DNS servers as assigned by the
ISP.
Just wondering if there's anything else I should do to increase
robustness on this fr
Otherwise, others in the household might turn off everything to save
power, and have no idea that this effects their local Free Speech
Server (TM) (C) (R).
If stopping the server from connecting to the modem, or powering down
the server, stops all internet access, local fauna quickly notice said
l
On 3/14/14, Tora Tora Tora wrote:
> On 03/13/2014 09:37 PM, Zenaan Harkness wrote:
>> I think it is unusual.
>>
>> Are you just checking the tor log to see this?
>
> OK, so I am being DOSed then.
Sorry I can't say, it just doesn't sound right. I've only
> On 03/10/2014 01:14 PM, Tora Tora Tora wrote:
>> I just recently allowed the directory ports of my relay to be listed and
>> noticed that some IPs are a bit overzealous in connecting to the
>> directory port. As in 108 connections within a minute zealous.
>>
>> Is this unusual?
I think it is unu
On 3/6/14, Felix wrote:
> Strong relays are a powerful contribution. As long as they are robust
> to resist misuse by attackers.
>
> Last night I received around 250.000 circuits per 5 minutes
> over one hour on a 100Mbit relay. In case the relay would forward this
> it could harm someone who is n
On 3/5/14, herojide...@live.com wrote:
> PLS how does relay work and how can I set up my system to work with relay
You need to read the docs.
Go to torproject.org and start there.
If you don't yet use GNU/Linux you might try Fedora or Debian but
probably _don't_ change OS _and_ start running a
On 3/1/14, Steve Rich wrote:
> The question I have now however is, should I set my RelayBandwidth limit to
> 250k?
> Currently the advertised bandwidth is 1MB/s, which doesn't see right.
As with bittorrent, it appears somewhat important to set your
bandwidth, in particular burst bandwidth (the hi
On 2/28/14, Zenaan Harkness wrote:
> I am running a tor relay - gracemissionstor - and have begun providing
> the relay name to friends who would like to use TBB.
>
> What I have not been able to google yet properly, is what
> startup/connection procedure is "best" for t
I am running a tor relay - gracemissionstor - and have begun providing
the relay name to friends who would like to use TBB.
What I have not been able to google yet properly, is what
startup/connection procedure is "best" for those using TBB, _and_ are
on the local network - many people come and go
On 2/25/14, Roger Dingledine wrote:
> On Tue, Feb 25, 2014 at 02:27:22PM +1100, Zenaan Harkness wrote:
>> tor
>> should never stop running (or crash) with just a config file reload!
>
> Alas, I disagree. The alternative is that it *doesn't* stop running,
> yet you t
On 2/25/14, Roger Dingledine wrote:
> On Tue, Feb 25, 2014 at 10:15:11AM +1100, Zenaan Harkness wrote:
>> I'm on Debian and did a service tor reload (not restart) and tor
>> crashed! I didn't realise immediately, took may be a minute to realise
>> and restart. Anyw
On 2/24/14, Jeroen Massar wrote:
> On 2014-02-24 09:32 , Zenaan Harkness wrote:
>> I saw a hint of some interesting output by arm:
>> flags: Exit, HSDir, Running, V2Dir, ValidleDebuggerAttachment 0' to
>> your torrc and restarting tor. For more informa
I saw a hint of some interesting output by arm:
flags: Exit, HSDir, Running, V2Dir, ValidleDebuggerAttachment 0' to
your torrc and restarting tor. For more information see...
This bit "leDebuggerAttachment 0' to your torrc and restarting tor.
For more information see..." disappeared pretty quick.
Presumably something in your etc/tor/torrc file?
If you are running bleeding edge tor, it might pay to subscribe to
tor-dev, and if you are subscribed there, that might be the best place
to post bleeding edge issues (just an idea - I don't recognise your
problem sorry).
Good luck
Zenaan
_
On 2/22/14, r...@goodvikings.com wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> I dunno if there's nything built in to tor. Are you on Linux? You coud use
> cron. Every day at 9 run 'service tor stop', every day at 5 run 'service tor
> start'
Thanks. Sounds rather heavy weight - it
I know tor relay bandwidth usage per period can be configured, but is
it possible to schedule a tor relay to sleep during business hours,
and only operate after hours?
TIA
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.t
Somewhat regularly, I get "relay unresponsive" with a heartbeat delta
of about 12seconds.
Could this mean my upload pipe is still saturated and I need to
throttle back slightly?
recent arm log:
13:12:56 [ARM_NOTICE] Relay resumed [6 duplicates hidden]
13:12:31 [ARM_NOTICE] Relay unresponsive (las
Occasionally (such as just now) I have seen these two errors in arm:
│ 13:21:25 [WARN] crypto error while checking RSA signature: padding
check failed (in rsa routines:-
│ RSA_EAY_PUBLIC_DECRYPT)
│ 13:21:25 [WARN] crypto error while checking RSA signature: block
type is not 01 (in rsa routine
On 2/21/14, grarpamp wrote:
>> something I did to ntpd.conf (probably adding servers above the
>> default debian entries which are:
>> server 0.debian.pool.ntp.org iburst
>
> The order doesn't matter. Though if DNS is not up before
> ntpd on boot, specified poolnames won't resolve and I think it's
On 2/20/14, grarpamp wrote:
>>> - configure tor to syslog
>>
>> added
>
> 'Log syslog'
The example in etc/torrc is 'Log notice syslog' which I uncommented.
>>> - send an ntpdate -q pool to syslog every 5min,
>>> remove when solved.
>>
>> Do you mean disable ntpd daemon, and run this instead? So
On 2/20/14, grarpamp wrote:
> Since you say it repeats you oppurtunity to check the
> system clock first:
> - configure tor to syslog
added
> - send an ntpdate -q pool to syslog every 5min,
> remove when solved.
Do you mean disable ntpd daemon, and run this instead? Sounds easy
enough, I imagi
On 2/19/14, Zenaan Harkness wrote:
> On 2/19/14, Alexander Makarov wrote:
>> Could you show the log?
>
> Current and previous tor logs attached. What is also interesting is IP
> address seems to change rather frequently from the ISP (iiNet in this
> case - a home ADSL2 co
On 2/19/14, Alexander Makarov wrote:
> On 18.02.2014 23:39, Zenaan Harkness wrote:
>> On 2/18/14, Alexander Makarov wrote:
>>> On 18.02.2014 22:02, Zenaan Harkness wrote:
>>>> My tor logs (running on Debian) are showing this warning:
>>>> [WARN] Your sy
On 2/18/14, D.S. Ljungmark wrote:
> On Tue, Feb 18, 2014 at 12:02 PM, Zenaan Harkness wrote:
>> My tor logs (running on Debian) are showing this warning:
>> [WARN] Your system clock just jumped 100 seconds forward; assuming
>> established circuits no longer work.
>>
On 2/18/14, Alexander Makarov wrote:
> On 18.02.2014 22:02, Zenaan Harkness wrote:
>> My tor logs (running on Debian) are showing this warning:
>> [WARN] Your system clock just jumped 100 seconds forward; assuming
>> established circuits no longer work.
>>
>> I
My tor logs (running on Debian) are showing this warning:
[WARN] Your system clock just jumped 100 seconds forward; assuming
established circuits no longer work.
I tried running openntpd as well as ntp packages (debian), and both
display the same problem - once or twice a day I get this jump in ti
47 matches
Mail list logo