Hi,
> On 17 Oct 2018, at 18:05, Keifer Bly wrote:
>
> So when running my OBFS4 bridge I noticed something, tor recently popped up
> with a message saying “I’ve sent 30mb and received
> 104mb.” Why is there such a big difference in the amount of data my bridge
> has received and sent?
Please
> On 17 Oct 2018, at 02:38, Toralf Förster wrote:
>
>> On 10/15/18 11:49 PM, teor wrote:
>> The post contains conflicting advice.
>
> Said that, is the following a good choice for a bridge? :
>
> # torrc
>
> RunAsDaemon 1
>
> SocksPort 0
> C
> On 6 Oct 2018, at 09:05, tor_mana...@autistici.org wrote:
>
> I have a tor relay running on a raspberry with raspbian 9 and tor version
> 3.4.8, everything is working fine for more then a year.
> I noticed that the average download/upload is just 1.5 MB and the peak 3.3 MB
>
> The Bandwidth
> On 16 Oct 2018, at 03:58, Toralf Förster wrote:
>
> I do wonder if the advice [1] is ok or wrong.
>
> [1] https://tor.stackexchange.com/questions/6370/how-to-run-an-obfs4-bridge
The post contains conflicting advice.
> But diversity of obfs4 ports is actually really important, so I'd argue
Hi,
For those reading along, this conversation started on tor-onions:
https://lists.torproject.org/pipermail/tor-onions/2018-September/date.html
> On 10 Oct 2018, at 08:24, nusenu wrote:
>
> Gabbi Fisher:
>>
>>
>> I wanted to learn more about how Tor circuit IDs work. Correct me if I'm
>>
ibuted with Tor Browser are also
64-bit.
Is your compiled version of tor 32-bit, or 64-bit?
T
--
teor
--
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torp
> On 21 Sep 2018, at 04:26, T0r-n0d3 wrote:
>
> I recently migrated my tor node to new hardware:
> t0rnod3 5582BBEC12380E34D7DFB8C237939A0B317B205E
>
> Copying the /var/lib/tor/keys/ folder on the process.
> Now my node do not handles circuits, nor it's shown in atlas and I see the
>
ou want, you can watch the logs for warnings that your tor version is
not recommended.
T
>> On Wed, Sep 19, 2018 at 11:13 PM teor wrote:
>>
>>> On 20 Sep 2018, at 07:02, Keifer Bly wrote:
>>>
>>>
>>>
>>> A few days ago, I upgraded my vers
with a message
> saying “WARNING: this version of tor is out of date or no longer recommended.”
>
> So, I am just wondering, why is it that the tor software warns when the
> current version is “no longer recommended” but does not warn when an update
> is available?
> From: teo
On 20 Sep 2018, at 07:02, Keifer Bly wrote:
>
> Hello,
>
> A few days ago, I upgraded my version of tor from 0.3.3.9 to tor 0.3.4.8. I
> noticed, however, that tor does not tell me when a new version is available.
> But in the past when I was a few versions behind, it popped up with a
Hi,
> On 18 Sep 2018, at 00:28, Kyle Levy wrote:
>
> Thank you for clarifying.
>
> I had it online and was monitoring it with ARM, and it looks like it just
> went offline in the middle of the night. I hadn't changed anything. Could it
> be my ISP? Thanks again for your help
You asked this
> On 17 Sep 2018, at 23:44, livak wrote:
>
> Thanks nusenu,
>
> The relay is configured with the exit reduced policy.
> The ORPort is 443 and the DirPort is 80.
>
> Since exit policy uses "*" as the IP address, IPv6 should be
> allowed.
Your relay's IPv6 Exit policy is:
reject 1-65535
Which
/projects/tor/ticket/27288
T
--
teor
Please reply @torproject.org
New subkeys 1 July 2018
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
--
signature.asc
Description: Message signed with OpenPGP
> On 10 Sep 2018, at 12:44, Keifer Bly wrote:
>
> So upon checking my relay status at torstatus.blutimage.de, I saw
There's a typo in that address, try: https://torstatus.blutmagie.de/
>
> Number of Routers In Cache:
> Number of Descriptors In Cache:
>
> I wanted to double check, what is
> On 9 Sep 2018, at 07:29, Moritz Bartl wrote:
>
>> On 08.09.2018 22:19, Paul wrote:
>> i am glad that somebody else got notice and i agree, suspecting
>> something nasty (or highly unusual) is going on. There was a discussion
>> about that in Berlin in July already
>>
> On 9 Sep 2018, at 09:52, Conrad Rockenhaus wrote:
>
> Greypony received its first Court Order yesterday. Unfortunately, we have no
> records to provide since it was a Tor Exit, and we don’t even have records of
> who owned that relay at that IP address because we don’t keep records of the
> On 5 Sep 2018, at 02:36, Damian Johnson wrote:
>
> Nyx's 'should this be scrubbed' check is pretty simple [1].
> Inbound addresses are scrubbed if...
>
> 1. You're configured to accept user traffic (ie. you set BridgeRelay
> in your torrc or have receive the Guard flag). [2]
There are so
> On 4 Sep 2018, at 21:57, Gary wrote:
>
>> On Tue, 4 Sep 2018, 11:20 Paul Templeton, wrote:
>> But seriously -
>> https://www.homeaffairs.gov.au/about/consultations/assistance-and-access-bill-2018
>> And -
>>
> On 30 Aug 2018, at 16:03, Totor be wrote:
>
> That's what I've done, but what is the rationale if I may ask ?
> Personally, I prefer not to see a relay than seeing one down, but this is
> extremely subjective!
MyFamily exists to protect users from end-to-end correlation.
(And relay
Hi Conrad (and staff and operators),
> On 28 Aug 2018, at 22:16, Conrad Rockenhaus wrote:
>
>>
>> On Aug 27, 2018, at 8:02 PM, Jordan wrote:
>>
>>> ...
>>> The research in this paper
>>> (https://www.freehaven.net/anonbib/cache/DBLP:conf/ccs/EdmanS09.pdf) is
>>> becoming more relevent and
Hi,
This post is off-topic, and further discussion of this issue is off-topic.
Please don't feed the trolls.
A reminder:
This list is for "support and questions about running Tor relays".
Please:
* keep on topic, we are here to help each other run Tor relays
* make sure each post contains
> On 29 Aug 2018, at 05:38, nusenu wrote:
>
> Signed PGP part
>
>
> Nathaniel Suchy:
>> Is there a way to switch my current relays to use offline keys and
>> invalidate the old keys without losing current stats?
>
> you can switch between the modes (OfflineMasterKey 0|1) but to get the best
g:
https://lists.torproject.org/pipermail/tor-relays/
* avoid promoting or criticising the same providers more than once
a month
* deal with commercial / payment issues off-list
But you should feel free to ask questions about operating relays at
any time.
T
--
teor
Please reply @torproject.org
New
> On 28 Aug 2018, at 10:47, Nathaniel Suchy wrote:
>
> Tor will already avoid making circuits where two IP Addresses in the same /24
> are involved.
If you grow beyond a /24, it's worth knowing that Tor's current path
selection avoids the same /16 for IPv4, and will soon avoid the same
/32 for
Hi David, Arlo,
Here's a thread on snowflake from tor-relays:
> On 24 Aug 2018, at 09:00, Mirimir wrote:
>
>> On 08/22/2018 08:03 PM, teor wrote:
>>
>>>> On 23 Aug 2018, at 11:22, Mirimir wrote:
>>>>
>>>>> On 08/22/2018 05:41 PM, t
> On 23 Aug 2018, at 11:22, Mirimir wrote:
>
>> On 08/22/2018 05:41 PM, teor wrote:
>>
>>> On 23 Aug 2018, at 10:16, Mirimir wrote:
>>>
>>> On 08/22/2018 04:17 PM, teor wrote:
>>>>
>>>> I don’t know about the current de
Hi,
> On 23 Aug 2018, at 10:16, Mirimir wrote:
>
> On 08/22/2018 04:17 PM, teor wrote:
>> Hi,
>>
>> I don’t know about the current deployment plan for Snowflake, but I
>> can point you to the relevant parts of the git repository:
>>
>>>
obfuscation Snowflake uses, but you could read the
code or documentation, and let us know. (Or wait for someone else to
respond.)
T
--
teor
Please reply @torproject.org
New subkeys 1 July 2018
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
-
> On 22 Aug 2018, at 02:16, Nathaniel Suchy wrote:
>
> Couldn't I firewall the non-obfs port so only looback addresses may access it?
For a private or hard-coded bridge, you can firewall your ORPort and set:
AssumeReachable 1
Public BridgeDB bridges need an ORPort to pass bridge authority
> On 21 Aug 2018, at 07:39, DaKnOb wrote:
>
> Cloudflare had a post yesterday[1] on their blog[2] that said they have about
> 10,000,000 domain names using their service. So that’s a rough number of the
> maximum number of websites that will be made available over Tor. Now in
> reality I
ates from Apple.
As an exception, we also support Tor clients on macOS
versions that are supported by Tor Browser (but not Apple).
https://trac.torproject.org/projects/tor/wiki/org/teams/NetworkTeam/SupportedPlatforms#OSSupportlevels
You should search Homebrew’s website for their support pol
> On 8 Aug 2018, at 19:45, Tony Peck wrote:
>
> I have tried the manual install mentioned in this communication. I get the
> error: gopath not set. The go help gopath does not help me. What should the
> gopath be and where should I put it? I also use a local Charter company,
> Spectrum.
> teor:
>> cd diff-cache; cat * | grep -a ^document-type | sort | uniq -c
> On 6 Aug 2018, at 21:01, Lluís <2015@gmail.com> wrote:
>
> Is it safe to publish the ouput of the command here ?
Yes.
Your relay publishes these cached documents, so the content
needs
68 + 2*N consensuses.
T
--
teor
Please reply @torproject.org
New subkeys 1 July 2018
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
--
signature.asc
Description: Message signed with OpenPGP
> On 3 Aug 2018, at 06:26, Tony Peck wrote:
>
> This is my public keyfile. I know this doesn't relate to this message but I
> couldn't find an actual email address to send it to.
> I want to run a bridge relay but am having trouble setting it up.
Try:
> On 1 Aug 2018, at 19:57, Keifer Bly wrote:
>
> Hi All,
>
> So given that I am running my relay off of a home internet router (a Netgear
> Orbi Router) I am considering switching to running an obfuscated bridge. I am
> not sure I will do this, but have noticed that when my relay (torland at
>> On Jul 30, 2018, at 3:49 PM, grarpamp wrote:
>>
>> ntpd runs fine without listener or with it blocked
>>
>> https://www.ntpsec.org/
>> http://openntpd.org/
>> https://wikipedia.org/wiki/Ntpd
>>
>> https://github.com/ioerror/tlsdate/
> On 1 Aug 2018, at 08:25, Michael Brodhead wrote:
>
>
> On 1 Aug 2018, at 04:09, Michael Brodhead wrote:
>
> Those of you running relays on low-RAM hosts, what do you do about DirCache?
>
> When I first brought up my relay I noticed this message in the logs:
>
> [warn] Being a directory cache (default) with less than DIRCACHE_MIN_MEM_MB
> MB of
> On 24 Jul 2018, at 20:06, Keifer Bly wrote:
>
> So I am trying to backup my relay software (torrc file, relay fingerprint,
> etc) using my file backup application. However, there is a problem.
>
>
> The macos operating system only allows accessing the /usr/local/, where tor
> is saved via
> On 24 Jul 2018, at 12:20, arisbe wrote:
>
> The other issue is why these two bridges don't show up on Tor Metrics.
>
> Hamlet and Othello
>
Tor metrics just published an explanation of how they get their statistics:
https://metrics.torproject.org/reproducible-metrics.html
Perhaps your
> On 19 Jul 2018, at 11:34, Conrad Rockenhaus wrote:
>
> To the point - would it be fair to network stability to offer a week
> long free trial to run a tor instance, well, that is if that's what
> the user hopefully runs? Would such a model even have an affect on
> increasing the number of BSD
> On 19 Jul 2018, at 10:18, nusenu wrote:
>
>>> ...
>>> Roger Dingledine:
If you run a bridge relay, please upgrade -- so your bridge address can
resume being given out to censored users, and so your stats can resume
being included in the metrics pages.
We just put out
> On 19 Jul 2018, at 06:40, nusenu wrote:
>
> Signed PGP part
> you probably want to reach out to package maintainer
> that didn't update yet (like the ubuntu snap) - if you didn't do so yet
Emailing package maintainers is part of our existing process:
> On 16 Jul 2018, at 19:51, Gary wrote:
>
> I keep having issues with my home router - it keeps failing due to the number
> of connections and I would be grateful for some advice.
>
> ...
>
> When I get to (approx) 900 incoming / 600 outgoing tor connections the router
> goes TITSUP.
If
> On 10 Jul 2018, at 13:50, Keifer Bly wrote:
>
> Tried that twice now and it has not worked. It’s strange, the error terminal
> returns when trying to launch the script to upgrade tor is this
>
>
> iMac:~ oldimac$ launchctl load -w /Library/LaunchDaemons/starttorupgrade.plist
>
Hi,
> On 10 Jul 2018, at 09:21, Keifer Bly wrote:
>
> So for a while I have been struggling to find a way to automatically update
> the tor relay software on macOS High Sierra. What I am currently doing is
> running a batch file that runs the command “brew upgrade tor” continuously.
>
> On 9 Jul 2018, at 08:55, Paul Templeton wrote:
>
> how often does the site https://arthuredelstein.net/exits/ update.
> 'coffswifi4' was reporting 60% timeouts but I have setup a stand alone DNS
> for it and would like to know if its resolved the problem.
>
> I think this is why it kept on
y blocking a lot of usual broadband activity?
>
>
> Yes, if you have no control at all over things such as what ports you are
> allowed to use because the ISP is limiting these things, using your VPS’s
> might be a better option.
>
> From: I
> Sent: Friday, July 6, 201
> On 6 Jul 2018, at 19:03, I wrote:
>
> Teor,
>
>> Please run:
>> tor --verify-config -f torrc
>> before posting a torrc.
>
> That's useful to know.
>
> Now that I've used 'auto' for both DirPort and ORPort I still get 'unable to
> prove th
> On 6 Jul 2018, at 18:29, Keifer Bly wrote:
>
> QRPort auto should work. Send a note back if it doesn’t.
No, it will not, because you typed "Q" instead of "O".
Please run:
tor --verify-config -f torrc
before posting a torrc.
T
___
tor-relays
> On 5 Jul 2018, at 04:17, arisbe wrote:
>
> Hello to you all,
>
> Question: Is there a point to adding IPv6 addresses to the ORPorts of my
> bridges?
BridgeDB has an IPv6 option:
https://bridges.torproject.org/options
But there seems to be a bug right now:
> On 2 Jul 2018, at 02:27, Kay Slake wrote:
>
> I'd like to opt out of to relays. It's too technical for me. Thank you
You can unsubscribe here:
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
T
___
tor-relays mailing list
> On 1 Jul 2018, at 21:10, Keifer Bly wrote:
>
> How do I reload the relay without restarting it?
To reload all the tor instances on your machine:
killall -HUP tor
To reload just one tor instance:
kill -HUP `cat tor.pid`
If you have "PidFile tor.pid" in your torrc.
T
> On 30 Jun 2018, at 09:27, I wrote:
>
> The installation guide https://www.torproject.org/docs/debian.html.en points
> to a dead end if you choose the experimental version because it hasn't been
> changed to 0.3.4.x.
Here's the existing ticket:
> On 29 Jun 2018, at 07:39, Matthias Fetzer wrote:
>
> Currently rofltor03 has a traffic cap. I can change it to a long
> running and bandwidth (instead of traffic) capped relay tho, if that
> is wanted.
How often does the relay reach its traffic cap?
Becoming a fallback adds about 10
talking to a machine on the other
side of the world.
T
--
teor
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
___
tor-relays mailing lis
ts replaced with "Downtime".)
After a relay has been down for a while (a week?), it disappears from
Relay Search.
If you want new features for relay operators, they belong in relay
search.
T
--
teor
PGP C855 6C
> On 28 Jun 2018, at 11:45, Keifer Bly wrote:
>
> It is also a pain at times keeping the OS, especially on macOS, the newer
> versions of which my not support older machines, up to date while trying to
> keep the relay stable, as relay status is changed so quickly (removing relays
> from
> On 27 Jun 2018, at 00:34, Matt Traudt wrote:
>
>> On 6/26/18 10:29, Nagaev Boris wrote:
>>> On Tue, Jun 26, 2018 at 5:27 PM, Matt Traudt wrote:
On 6/26/18 10:16, dave levi wrote:
I'm testing few things in Tor and I noticed that if im changing(from the
source code) the number
On 26 Jun 2018, at 02:40, nusenu wrote:
>> It would also be nice if the relay, itself, performed self-checks of
>> this connectivity and printed a warning log if some failure-threshold is
>> reached (and possibly disabling the IPv6 ORPort). But, in reality, this
>> is a hack
>
> I wouldn't
rces, you should disable your DirPort.
Clients will still use your relay as a directory mirror via the ORPort.
Your relay will keep being a useful fallback until the next fallback
rebuild later in 2018. (The fallback script needs DirPorts to check if
relays are working.)
T
--
teor
PGP C85
> On 24 Jun 2018, at 11:18, Paul Templeton wrote:
>
> I have two systems one a VPS the other bare metal and both will drop out of
> the consensuses about once a day(2 to 3 hours) but are running the whole time.
Hmm, that's weird.
Does your provider have a reliable connection?
> I have 4 bare
Hi,
(This thread has a lot of top-posting, so I cut the context.)
> On 23 Jun 2018, at 06:54, Matthew Glennon wrote:
>
> No - and I don't think a standard port should be chosen. Tor comes with
> defaults and that's probably good enough. Keep them if you want, or customize
> them to fit your
> On 9 Jun 2018, at 22:12, Cristian Consonni wrote:
>
> Hi,
>
> due to the new DigitalOcean billing terms for bandwidth (see this other
> thread [1]), I have limited my relay bandwidth to be sure I will stay
> withing the limits:
> ```
> RelayBandwidthRate 360 KB # Throttle traffic to 100KB/s
> On 12 Jun 2018, at 04:29, Gunnar Wolf wrote:
>
> So, it seems my ISP does not want us to run relays ☹ Can you think of
> any way my connection (oversized for my regular uses) can be put to
> use for Tor? I guess it would not work as a bridge either, would it?
Your relay will work as a bridge
> On 1 Jun 2018, at 05:48, Iain Learmonth wrote:
>
> On 31/05/18 18:26, nusenu wrote:
>>> RelayBandwidthRate is already included in relay descriptors as
>>> bandwidth-avg:
>>> https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n424
>>>
>>> Although strictly that field is:
>>>
>>>
On 31 May 2018, at 04:29, nusenu wrote:
>> nusenu:
>>> Due to this last sentence I'm not sure if you want to convey
>>> availability (only xx% of resources are available to tor) or usage
>>> (tor uses only xx% of the resources it has available)?
>>
>> The latter - Tor uses only xx% of the
> On 31 May 2018, at 04:02, dave` dave wrote:
>
> Thank you for your help!
> i have maybe a better idea for my project, i saw that if i change the number
> of nodes(change it to one node only) i may get block from the tor in this
> link
>
> On 29 May 2018, at 03:51, Hamid Safe wrote:
>
> I currently do have a working private tor relay with obfs4. The single client
> user is my laptop which is working fine now,but I would like to add more
> clients to that relay. I thought having the private signaure and config in
> client's
> On 28 May 2018, at 23:46, dave` dave wrote:
>
> i saw about this " RefuseUnknownExits 0 " but its not working, have any other
> idea that it may work?
Please copy and paste the client and exit logs from when you try to connect.
Then we can help you more.
T
> On 24 May 2018, at 11:48, Keifer Bly wrote:
>
> What does it mean? Does it mean my relay will be unreachable? Thank you.
This bug happens because Tor doesn't check for relay information correctly.
It's harmless on relays, and you should ignore it.
T
Hi,
> On 24 May 2018, at 11:27, Keifer Bly wrote:
>
> May 24 11:24:14.000 [warn] Bug: Non-fatal assertion info || client failed in
> onion_extend_cpath at src/or/circuitbuild.c:2772. Stack trace: (on Tor
> 0.3.3.6 7dd0813e783ae16e)
Thanks for reporting this bug!
It's a
> On 24 May 2018, at 05:00, dave` dave wrote:
>
> i saw that is a way to change the numbers of nodes in this site
> http://thesprawl.org/research/tor-control-protocol/#creating-really-fast-one-hop-circuits
> any one knows how it works, there is not enough information how
On 22 May 2018, at 04:29, Logforme wrote:
>> Just looked over a sample of FallBackDir relays in Relay Search and
>> it appears this excess-load abuse is directed at them in particular.
>> Some fall-back directories show more than a month of excess request
>> traffic, presumably
Hi,
> On 21 May 2018, at 18:20, Keifer Bly wrote:
>
> I have been running my home computer as a public tor relay for some time now
> with no issues, and unfortunately do not have a data center or anywhere else
> to run my relay from. I have noticed that there are far
> On 21 May 2018, at 22:43, dave` dave wrote:
>
> Tor use 3 noes to enter the Tor-Network. why adding more nodes would not help
> my anonymity, as more nodes i have it need to be harder to track me.
No, 3 nodes is enough:
Hi,
I didn't get your original email, it appears my spam filter is eating all your
emails.
(And a few other emails.)
At 12:25 5/18/2018 -0400, starlight.2017q4 at binnacle.cx wrote:
>Lately seeing escalating abuse traffic on the relay dirport, now up to 20k
>rotating source IP addresses per
Hi,
> On 19 May 2018, at 13:24, John Ricketts wrote:
>
> I’ve been trying to bring a relay up for testing IPv6. Relay name is
> QuintexAirVPN1. Metrics website says that the OR Port is unreachable on
> [2620:7:6000:::c759:df51]:80 – which isn’t where I set the ORPort
> On 6 May 2018, at 04:07, Toralf Förster <toralf.foers...@gmx.de> wrote:
>
>> On 05/05/2018 06:56 PM, nusenu wrote:
>> to quote teor (2017-12-21 on tor-relays):
>> "By the way, there are no IPv6 DirPorts"
>
> Hhm, this works:
>wget http:/
> On 5 May 2018, at 03:59, Dmitrii Tcvetkov wrote:
>
> Hello,
>
> Because of latest Digital Ocean billing changes I request to remove
> relay 774555642FDC1E1D4FDF2E0C31B7CA9501C5C9C7 from fallback directory
> mirrors list. I will keep it online and updated, but in the
> On 5 May 2018, at 06:47, Nathaniel Suchy (Lunorian) wrote:
>
> This is more of a message to the directory authorities. After a
> discussion with Digitalocean - they will not relent on the bandwidth
> policy. The server tor-exit-us-1.lunorian.is (Tor Metrics link below)
> has
> On 2 May 2018, at 19:20, Iain Learmonth <i...@torproject.org> wrote:
>
>> On 02/05/18 09:50, teor wrote:
>> Being in the consensus is called "Running", but what it actually means is
>> that a majority of directory authorities found your relay r
> On 2 May 2018, at 18:32, Iain Learmonth wrote:
>
>> On 02/05/18 02:09, Keifer Bly wrote:
>> My suspicion is that my posted uptime was retained because I did not
>> restart the relay software while my router firmware was updating (it was
>> offline for about 2 hours), but
> On 2 May 2018, at 03:58, Keifer Bly wrote:
>
> do shell script "$ which brew
> /usr/local/bin/brew update"
> do shell script "$ which brew
> /usr/local/bin/brew upgrade tor"
> end
>
>
> When the script is run, the output is this:
$ which brew
> sh: $: command not
> On 28 Apr 2018, at 08:05, nusenu wrote:
>
> we want to inform you that in future*, tor directory authorities
> will enforce a new security measurement that disallows relays to
> drop Ed25519 support in case they ever supported it at some point.
>
> In practice that
> sudo -u debian-tor nyx
> That's it!
> Thanks a lot!
That's not great for security, now nyx can read your tor private keys.
(It probably won't, but still…)
If you add your controller to the debian-tor group, and set the
appropriate options to make your cookie file group-readable,
then nyx
> On 27 Apr 2018, at 11:49, Toralf Förster wrote:
>
> For family:D11D11877769B9E617537B4B46BFB92B443DE33D - running at the same IP
> - I do wonder about the differences of the values 44300 versus 36800 (one is
> 1 1/2 year, the other is 1/2 year old).
No, the ORPort
e rather than a relay.
> Or get a better router.
> Or run your relay remotely on a cheap VPS instead.
> Sent from my iPhone
>
>> On Apr 26, 2018, at 8:27 PM, teor <teor2...@gmail.com> wrote:
>>
>>
>>
>>> On 27 Apr 2018, at 09:42, Keifer Bly &l
> On 27 Apr 2018, at 09:42, Keifer Bly wrote:
>
> There are no warnings with the tor software regarding the maximum network
> connections. Perhaps it is my router (A Netgear Orbi Wifi Router, all
> wireless);. I’ve noticed that my router does sometimes drop my
> On 27 Apr 2018, at 09:09, Keifer Bly wrote:
>
> That’s what’s strange. I have double checked the tor logs and the only
> warning that appears is the “tor cannot help you if you use it wrong”
> warning; that’s the only one that appears.
>
Then the problem is probably
> On 27 Apr 2018, at 08:23, Keifer Bly wrote:
>
> My apologies. The fingerprint is DB1AF6477BB276B6EA5E72132684096EEE779D30
>
> Here are the contents of my torc file (the isp beeng run from is Charter
> Communications, the only isp that is available where I live.
You
> On 27 Apr 2018, at 07:47, Keifer Bly wrote:
>
> Thank you. I just had to restart my relay again because it disappeared from
> the relay list for some reason, the software did not say that it was having
> any trouble
Please check the logs for warnings and notices.
> On 26 Apr 2018, at 23:15, smichel0 wrote:
>
> I want to monitor my new tor relay (set up on a raspbian pi 3 by migrating my
> former relay incl. keys) with nyx. When try to start nyx by "nyx" in the
> command line "Tor controller password" is prompted.
>
> I can't
> On 26 Apr 2018, at 01:33, dave` dave wrote:
>
> Thank you all for your answers.
> so if i can't control on the access to my Exit-Relay i can control on the
> access to my SSH which used to run this Exir-Relay.
You asked in another thread how to build a circuit like:
> On 25 Apr 2018, at 22:28, dave` dave wrote:
>
> hi. Thank you for your answer.
> i need to add this line " EnforceDistinctSubnets 0" to the "torrc" file in
> the SSH?
> and if the answer is "yes" its still not working.
You need to change the torrc file in your Tor
> On 25 Apr 2018, at 18:09, dave` dave wrote:
>
> Im working on project in Tor and im running Exit-Relay and Tor-Bridge
> together(on the same ip). for that im using VMware Ubuntu 16.04 with SSH. im
> using "arm" option tor run the Tor through terminal
> this is my
> On 23 Apr 2018, at 09:15, Michael Harris wrote:
>
> Relay configure and started, stops abruptly. Any advice would be appreciated
Paste your torrc somewhere and send us the link.
> /var/log/tor/log
>
> Last three lines:
>
> Tor has successfully opened a circuit.
> On 22 Apr 2018, at 12:40, Keifer Bly wrote:
>
> Thank you. I am just a little confused as I seem to get the stable flag
> randomly, sometimes after 2 days, sometimes after 4 days, sometimes longer;
> what I'm saying is it seems completely random.
Perhaps your network
> On 22 Apr 2018, at 12:08, Keifer Bly <keifer@gmail.com> wrote:
>
> On https://consensus-health.torproject.org/, I found this information. I am
> curious, where it says stable-uptime=, the following number is in minutes
> correct?
It is in seconds:
> On 12
Hi,
You talked about using homebrew to automatically update tor.
How do you launch tor?
Des homebrew restart tor when it is updated?
Because tor doesn't update to the new version until you restart it.
> On 22 Apr 2018, at 11:06, Keifer Bly wrote:
>
> Thank you. And I’m
201 - 300 of 995 matches
Mail list logo