won't want to replace their existing torrc, unless they
want to start configuring their relay from scratch again.
The changes in the default torrc are aimed at new operators.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A
html
<https://lists.torproject.org/pipermail/tor-relays/2015-November/008217.html>
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
address, or an IPv6 address to contact them.)
A non-tor process on the relay?
Can you post the ExitPolicy from your torrc?
I can only see the one on globe, and I'd like to make sure they match.
(But it's well structured: reject …; accept …; reject *:*; so I don't force any
issues.)
Tim
Tim Wilson-Brow
r-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message s
ble to research the nodes
> you are using.
Multihomed exits using a different OutboundBindAddress from their Address
(IPv4) or ORPort (IPv6).
The OR traffic comes in on one address, and the Exit traffic leaves on another.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor
.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@li
> On 9 Nov 2015, at 23:02, teor <teor2...@gmail.com> wrote:
>
> On 9 Nov 2015, at 20:45, Roger Dingledine <a...@mit.edu
> <mailto:a...@mit.edu>> wrote:
>
>> On Mon, Nov 09, 2015 at 08:04:55PM +1100, Tim Wilson-Brown - teor wrote:
>>> Subsequent
atically suspending. Any ideas?
AccountingMax/AccountingRule: use all the bandwidth as fast as your connection
will support, then hibernate the relay using
BandwidthRate/BandwidthBurst: use all the bandwidth at a maximum set rate
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968
on-aware secure
protocols are hard.
When I looked up the local servers of some big US companies, they were all
listed as being on the US west coast, rather than the Australian east coast.
That's a pretty big inaccuracy.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor
le signing key.
There is also work on key revocation, where a key can be cancelled in the event
of compromise.
See https://trac.torproject.org/projects/tor/ticket/13642
<https://trac.torproject.org/projects/tor/ticket/13642> for more details.
Tim
Tim Wilson-Brown (teor)
teor2345 at gm
> On 10 Nov 2015, at 22:57, mick <m...@rlogin.net> wrote:
>
> On Tue, 10 Nov 2015 11:30:53 +1100
> Tim Wilson-Brown - teor <teor2...@gmail.com> allegedly wrote:
>
>>
>>> On 10 Nov 2015, at 11:05, I <beatthebasta...@inbox.com> wrote:
>>
> On 11 Nov 2015, at 12:15, Kenneth Freeman <kencf0...@riseup.net> wrote:
>
>
>
> On 11/10/2015 04:19 PM, Tim Wilson-Brown - teor wrote:
>>
>>> On 11 Nov 2015, at 09:44, Kenneth Freeman <kencf0...@riseup.net> wrote:
>
>>> What jumped o
rnational bandwidth is very expensive in the antipodes.
There are very few providers with unlimited or terabyte data plans.
Australia just brought in a mandatory data retention law in April/October 2015.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR
> On 10 Nov 2015, at 11:28, Tim Sammut <t...@teamsammut.com> wrote:
>
> Hi Tim, everyone.
>
> On 11/06/2015 08:41 PM, Tim Wilson-Brown - teor wrote:
>> The directory authorities are generally more concerned when they
>> *don't* stop it afterwards, and
ress-Is: 180.200.153.214
Content-Encoding: identity
The second download with exactly the same URL did not contain
[C|X]ontent-Length, Connection, or ETag.
It's probably worth mentioning that similar queries to other directory
authorities do not show the same behaviour.
Tim
Tim Wilson-Brown (teor)
t
On 9 Nov 2015, at 20:45, Roger Dingledine <a...@mit.edu <mailto:a...@mit.edu>>
wrote:
> On Mon, Nov 09, 2015 at 08:04:55PM +1100, Tim Wilson-Brown - teor wrote:
>> Subsequent queries get the same IP address for several tens of seconds
>> afterwards.
>
> Woah.
sts.torproject.org <mailto:tor-relays@lists.torproject.org>
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
>
> ___
> tor-relays ma
t;https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (t
s.
(I don't think that ticket has moved much, it probably needs to be turned into
a proposal, and then have community consensus, before being implemented.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
riments on Tor's DHT often try to discover hidden service addresses. This
is considered an attack, and relays that perform this attack are currently
being blocked.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
s
IPv4 address to bootstrap.
Bridges and relays that have both an IPv4 and IPv6 address can support
IPv6-only clients.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Messa
> On 27 Oct 2015, at 12:55, teor <teor2...@gmail.com> wrote:
>
>
>> On 26 Oct 2015, at 09:27, NOC <noc@babylon.network> wrote:
>>
>> Usually the Contact Info is obfuscated is some way. Tor Weather
>> handles grabbing these just fine too so shoul
> On 23 Oct 2015, at 09:30, Green Dream wrote:
>
> I see this from time to time as well. Here's another example:
>
> Oct 17 23:02:44.000 [notice] Our IP Address has changed from 52.64.142.121
> to [CORRECT IP]; rebuilding descriptor (source: 86.59.21.38).
>
>
> On 21 Oct 2015, at 07:41, Josef Stautner wrote:
>
> I also ask my hoster for the mail addresses of the abuse reporter and
> write a little statement why he got attacked and what tor is and why I
> running a relay. Mostly the abuse reports from WebIron reports about
>
> On 22 Oct 2015, at 01:42, 12xBTM <12x...@gmail.com> wrote:
>
> Here's your problem:
>
>> On 21.10.15 8:20, Volker Mink wrote:
>> Upstream 5 MBps
Tor bandwidth usage is more or less symmetric upstream / downstream.
So you'll only ever get 5Mbps or less of tor traffic out of this connection.
> On 20 Oct 2015, at 08:21, spiros_spi...@freemail.gr wrote:
>
>
> Hi Josef,
> ...
>
> Also, I don't know if this make any difference at all, but I also put port in
> my torrc like this :
>
> ExitPolicy reject 195.113.0.0/16:* #comment here
An IP address/mask with no port specifier is
oing Tor version upgrades this way, but I’ve
found that it's best to do them manually but regularly, then check they worked.
Others might have better experiences with automated Tor upgrades.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9
e this doesn’t
happen.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
t
s mailing
>>>>> list tor-relays@lists.torproject.org
>>>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> <0xDD79757F.asc>___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://li
ridge or non-exit relay; or run
it out of a data centre; or explain Tor to them in advance.
If your greatest concern is saturating your link, try it with the device you
have, then upgrade if necessary.
If neither is a concern, go for it!
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot co
about making
Tor aware of kernel buffers.
(Currently, Tor doesn’t know what happens after it writes data to the socket.)
http://www.robgjansen.com/publications/kist-sec2014.pdf
<http://www.robgjansen.com/publications/kist-sec2014.pdf>
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot
; is up, but it
appears that the backend is not working:
HTTP ERROR 500
Problem accessing /uptime. Reason:
Server Error
Powered by Jetty://
In the meantime, please try https://globe.thecthulhu.com/
<https://globe.thecthulhu.com/>
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968
> On 1 Oct 2015, at 14:48, Dhalgren Tor <dhalgren@gmail.com> wrote:
>
> On Thu, Oct 1, 2015 at 12:40 PM, Tim Wilson-Brown - teor
> <teor2...@gmail.com> wrote:
>>
>> How did you set this limit? What did you write in your torrc file?
>>
>
> On 1 Oct 2015, at 15:03, Dhalgren Tor <dhalgren@gmail.com> wrote:
>
> On Thu, Oct 1, 2015 at 12:55 PM, Tim Wilson-Brown - teor
> <teor2...@gmail.com> wrote:
>>
>> On 1 Oct 2015, at 14:48, Dhalgren Tor <dhalgren@gmail.com> wrote:
>>
>
oject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
__
> On 1 Oct 2015, at 15:22, Dhalgren Tor <dhalgren@gmail.com> wrote:
>
> On Thu, Oct 1, 2015 at 1:10 PM, Tim Wilson-Brown - teor
> <teor2...@gmail.com> wrote:
>>
>> Can you help me understand what you think the bug is?
>
> Relay is assigned a co
ger
> >
> > ___
> > tor-relays mailing list
> > tor-relays@lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> _______
> tor-relays mailing list
t that we update the code? I’m not sure how much this
actually helps, as, once deployed to all relays, the consensus weights for all
relays that set a *Bandwidth* options would come out slightly lower, and other
relays without *Bandwidth* options set would take up the load.)
I’ve updated https://tra
s at what's going wrong for you. :)
> >
> > Thanks!
> > --Roger
> >
> > ___
> > tor-relays mailing list
> > tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relay
nection to
>> tor.noreply.org.
>
> Could this be something related to
> https://trac.torproject.org/projects/tor/ticket/17149
> <https://trac.torproject.org/projects/tor/ticket/17149>
Yes, that bug will most likely discard/delete your entire exit policy, and
cau
at the cause is here, and whether the relay’s
Guard flag is in some kind of bandwidth-driven loop. Have you looked at the
bwauth votes for your relay?
* Your uptime is ok (for the last month).
* There could be other factors.
Give it a week or so to stabilise, or, alternately, limit the bandwidth to stop
i
be to allow exits
> from their network, thereby increasing the capacity of non-government nodes.
> The irony.
Unless they think there’s a significant chance *you’re* a US government agent.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD080
ions>
, or if it could have been added long ago.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
_
of a recent package update, as I
experienced exactly the same issue on Ubuntu 14.04.3 LTS (trusty), and tor was
using /etc/tor/torrc a few weeks ago.
(Also, Billy, please don’t top-post, it makes the thread of conversation hard
to read.
Instead, post after the paragraph you’re replying to, and e
> On 22 Sep 2015, at 12:00, Geoff Down <geoffd...@fastmail.net> wrote:
>
> Hi Tim
>
> On Tue, Sep 22, 2015, at 01:40 AM, Tim Wilson-Brown - teor wrote:
>>
>>> On 21 Sep 2015, at 19:59, Geoff Down <geoffd...@fastmail.net> wrote:
>>>
>>&
before any lines that allow that port - right at the start of the exit policy
is best.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPG
to ask your ISP what IPs or ports are generating the complaints.
Tim (teor)
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930
forwarded message:
From: teor teor2...@gmail.com
Subject: Tor Blocklist Confusion
Date: 10 August 2015 13:42:26 AEST
To: m...@dan.me.uk
Hi Dan,
It appears that a number of website operators are using the .tor.dan.me.uk
blocklist to block website access from the entire Tor network
presently in the GIT repository.
I might contribute a new Torstatus,
but if not me someone surely will.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor
-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
/movie_studio_finds_pirated_jurassic_world_on_localhost/
http://www.theregister.co.uk/2015/07/23/movie_studio_finds_pirated_jurassic_world_on_localhost/
Robert
Hi Robert,
This might be more suited to tor-talk@
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345
/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
Linux), the least
we can do is document how to set it up correctly / securely, and any tradeoffs
involved in using Windows vs Linux.
Tim
-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of teor
Sent: Wednesday, July 22, 2015 11:08 AM
On 7/21/2015 11:09 AM, teor wrote:
On 21 Jul 2015, at 03:12 , Tor Operator t...@coldnorthadmin.com
mailto:t...@coldnorthadmin.com wrote:
Hi gents,
I rencetly had one of my relay fall into hibernation. It seems that simply
restarting the service doesn't change the hibernation status
an exit).
Also, some blacklist operators/users even blacklist non-exit relay IPs (Apple's
forums are the most obvious ones to me, but I'm sure there are more).
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot
way to do it.
Why not edit or remove the accounting limits in the torrc?
We might need a little more context: why are the accounting limits set lower
than you want?
What exactly are you trying to achieve?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com
it contains?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
(web ports, other ports), but I'd prefer
to provide the list of ports in a detail page, and let the analyst do their own
triage. But if we only have one page, perhaps the split is worthwhile.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345
On 7 Jul 2015, at 17:01 , josh@tucker.wales wrote:
On 7 Jul 2015, at 07:48, Karsten Loesing kars...@torproject.org wrote:
On 07/07/15 03:45, teor wrote:
On 7 Jul 2015, at 09:46 , josh@tucker.wales wrote:
From the perspective of someone investigating abuse, I think
it's important
Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
that. But guaranteed +/- 10 hour fuzzy
matching in any results from any timezone is a pretty good start. (And there's
even greater leeway if your timezone is close to UTC, or the time you're
searching for is close to midday UTC.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https
side, and the US Minor Outlying Islands on the other.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed
src/tools/tor-fw-helper, which supports NAT-PMP and UPnP.
It can be configured via the torrc option:
PortForwarding 1
Or, you can configure your NAT box to forward ports yourself.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
pgp ABFED1AC
https://gist.github.com/teor2345
On 5 Jul 2015, at 11:37 , teor teor2...@gmail.com wrote:
Date: Sat, 4 Jul 2015 19:34:45 -0400
From: Ben Serebin b...@reefsolutions.com
Subject: Re: [tor-relays] unflagged BAD EXIT nodes
?I'll hijack the response I'm a sysadmin, an unloved Windows one. My
unwanted $0.02
of the Tor network is Linux,
including BSDs/OS X and others avoids a monoculture, but Windows is considered
less secure)
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
of an option in
the configuration file, and not replace it at all: you might want to
say on the command line that you want no SOCKSPorts at all. To do that,
prefix the option name with a forward slash.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345
software?
Drop it? (I only ask because a hardware fault can trigger certain kinds of
interrupts.)
Does ATT block certain types of connections?
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265
and 0.9.8 will cease on 31st December 2015. No security updates for these
releases will be provided after that date. Users of these releases are advised
to upgrade.
See the second-last section in https://www.openssl.org/news/secadv_20150611.txt
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https
Date: Sat, 06 Jun 2015 14:37:01 -0400
From: starlight.201...@binnacle.cx
At 04:12 6/7/2015 +1000, teor wrote:
Please let me know how you go - the 0.2.6.x
series should also be relatively ASAN
and UBSAN clean, as Tor has been tested
with them since late 2014.
I've run 0.2.4.x and 0.2.5
know how you go - the 0.2.6.x series should also be relatively
ASAN and UBSAN clean, as Tor has been tested with them since late 2014.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265
on Vidalia, tor 0.2.2, and OS X 10.6 or 10.7.
If you're running Tor on OS X, please try these instructions, fix any mistakes,
and add missing steps. In particular, we've moved away from Vidalia to nyx
(arm), so the nyx sections could do with some more detail.
teor
teor2345 at gmail dot com
pgp
* As a precaution, if you ever reconfigure a relay Tor node as a bridge Tor
node, please delete the keys so it appears as a new bridge in BridgeDB.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930
-side changes
without them.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
- but this is perhaps a job for something more like Ooniprobe?
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
(utilizing up to four cores, not just
two).
This was suggested in
https://trac.torproject.org/projects/tor/ticket/13414
But the concern was that any increase to 2 relays per IP would make it much
easier for sybil attacks. Perhaps we could try an increase to 3 or 4 per IP?
teor
teor2345 at gmail dot
https://trac.torproject.org/projects/tor/ticket/7572
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays
can
fallback on pkcs#1 v1.5 signatures.
OS X still ships with OpenSSL 0.9.8 by default.
But Darwin is such a small fraction of the network, and it's less likely that a
Darwin server would push enough data to get a t-shirt unless it had an OpenSSL
version with aes-ni.
teor
teor2345 at gmail
, tor multithreading only offloads some
of the work.)
There is currently a limit of two instances per IP address, but if you have 2
IP addresses, you could potentially run 4 instances, one instance per processor.
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345
On 26 Mar 2015, at 12:38 , teor teor2...@gmail.com wrote:
Date: Wed, 25 Mar 2015 17:21:50 +0800
From: Vincent Yu v...@v-yu.com
On Wed, Mar 25, 2015 at 4:26 PM, skyhighatrist skyhighatr...@tfwno.gf
wrote:
I am wondering if anyone has had their relay randomly crash in the
past
week
, address, /etc/hosts file, etc.
If you're still having trouble try hopping on IRC.
###
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR C3C57B23 349825DE 929A1DEF C3531C25 A32287ED
signature.asc
Description: Message
external IP.
Does your tor instance download the directory, and correctly guess the external
IP?
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
teor at blah dot im
OTR C3C57B23 349825DE 929A1DEF C3531C25
connections?
-- Does the server refuse connections?
-- Is the server accepting the connection but failing to respond?
-- (You'll need to look in the client and hidden service logs to find out.)
That should be more than enough :-)
teor
teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com
the case (clarification or patches gladly accepted).
teor
Date: Sun, 11 Jan 2015 14:18:01 +0100
From: webmaster webmas...@defcon-cc.dyndns.org
Hi Julien,
thats exactly the setup I'm actually using. I use my relay as a client.
From my point of view it seems that the relay is used as a entry
, it's less likely to be specifically targeted by law enforcement.
In my opinion, if you use HTTP over the internet, you are essentially
consenting to caching, inspection, or worse. And most people know that by now.
And if you use HTTP over Tor, you should be much more aware of this.
teor
teor2345
Some thoughts on the security of crowdsourced computing:
Installing additional software increases the attack surface of your relay, even
more so when the new software access the network. (Not to mention any
additional libraries.) There is also the issue of the security of automatic
updates to
?
Or are you hoping we will increase the consensus parameter to 3?
I could revive that suggestion, by the way - it stalled as trac #13414 due to
concerns with making sybils easier.
https://trac.torproject.org/projects/tor/ticket/13414
Maybe we could try for 3 per IP?
teor
pgp 0xABFED1AC
hkp
.)
Why not use 32GB x 31 days = 992GB, or 31GB x 31 days = 961GB ?
teor
pgp 0xABFED1AC
hkp://pgp.mit.edu/
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
http://0bin.net/paste/Mu92kPyphK0bqmbA#Zvt3gzMrSCAwDN6GKsUk7Q8G-eG+Y+BLpe7wtmU66Mx
signature.asc
Description: Message signed
for the in depth post, Teor. I had read the lifecycle article but
was concerned when people were posting that their relay was soaking all
their bandwidth after a day or two. This makes sense now, given the
oversupply and location. It was also worrying when the advertised bandwidth
was fluctuating so much
On 12 Oct 2014, at 19:30 , Tor externet co uk t...@externet.co.uk wrote:
On 2014-10-12 02:04, teor wrote:
On 12 Oct 2014, at 09:32 , tor-relays-requ...@lists.torproject.org wrote:
Date: Sat, 11 Oct 2014 23:25:47 +0100
From: Tor externet co uk t...@externet.co.uk
To: tor-relays
perform best when given a rate slightly under the
capacity of the link.
teor
pgp 0xABFED1AC
hkp://pgp.mit.edu/
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
http://0bin.net/paste/Mu92kPyphK0bqmbA#Zvt3gzMrSCAwDN6GKsUk7Q8G-eG+Y+BLpe7wtmU66Mx
On 12 Oct 2014, at 01:22 , tor-relays-requ
on 9001, and see if it experiences
the same issues after a few weeks.
You could also try paste-binning your torrc, and we'll look for specifics.
[-1]: https://blog.torproject.org/blog/lifecycle-of-a-new-relay
[0]: https://atlas.torproject.org/
teor
pgp 0xABFED1AC
hkp://pgp.mit.edu/
https
to make sure at least 1 stays up
at all times (2 for reliability), which would favour throttling.
teor
pgp 0xABFED1AC
hkp://pgp.mit.edu/
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
http://0bin.net/paste/Mu92kPyphK0bqmbA#Zvt3gzMrSCAwDN6GKsUk7Q8G-eG+Y+BLpe7wtmU66Mx
signature.asc
901 - 995 of 995 matches
Mail list logo