On Monday, January 17, 2022, 11:47:11 AM MST, David Fifield
wrote:
> Gary, I was wondering how you are dealing with the changing onion key issue,
>and I suppose it is
>[this](https://forum.torproject.net/t/tor-relays-how-to-reduce-tor-cpu-load-on-a-single-bridge/1483/13):
>
Update your version of tor this is an old issue that has been fixed in the
latest version.
Thanks,
John C.
> On Jan 16, 2022, at 4:17 AM, AMuse wrote:
>
>
> Hi all!
>
> I'm operating a TOR Exit on dedicated hardware. The load average is low
> (0.07) and the network lo
to implement an On-Shore
configuration for Tor Blacklisted Sites. My only concern is latency, with this
type of configuration, but it's better than the current forbidden situation.
I appreciate the heads-up related to Tor and IPv6-only being a non-starter. It
sounds like if I were to migrate
Hi all,
In the effort of deploying obfs4 bridges for the community we are sharing our
Ansible role that allowed us to deploy multiple nodes:
https://github.com/NewNewYorkBridges/ansible-tor-bridge
For now it is only available on Debian but we will make it available for other
distributions
> Fellow Tor Operators:
>
> After about 9 months of running Tor as a Middle Relay from my home network,
> I'm beginning to experience signs of my public semi-static IPv4 address being
> blacklisted with 403 Forbidden errors from Reuters and Venmo. I've confirmed
> by successfu
h one user was able to find a
page showing at least the syntax for MetricsPort. I also reached out to
network-rep...@torproject.org and have not received a reply. I found discussion
about the implementation of MetricsPort on the Tor Project github but it would
be nice if the Tor Project
Fellow Tor Operators:
After about 9 months of running Tor as a Middle Relay from my home network, I'm
beginning to experience signs of my public semi-static IPv4 address being
blacklisted with 403 Forbidden errors from Reuters and Venmo. I've confirmed by
successfully accessing both sites
David, Roger, et al.,
I just got back from holidays and really enjoyed this thread!
I run my Loadbalanced Tor Relay as a Guard/Middle Relay, very similar to
David's topology diagram, without the Snoflake-Server proxy. I'm using Nginx
(which forks a child process per core) instead of HAProxy
ctfully,
Gary
On Wednesday, December 29, 2021, 03:32:55 AM MST, abuse--- via tor-relays
wrote:
Hi Gary,
thanks!
> As an aside... Presently, are you using a single, public address with many
> ports or many, public addresses with a single port for your Tor deployments?
> Have you
Grüezi,
I run a large number of bridges, which hopefully only the tor project can see
them and confirm they are mine. I know they are used because I can see the
traffic utilization over time. Hopefully they were helpful, especially to
people in Russia over the past few weeks.
After being
Hi Tor relay community,
I have recently made a new tor relay, and all is going well however I use NYX
to mointor it and over the last day it has been giving the warning message seen
below in the nyx mointor, the relay had been running fine for it's first 4 days
of life but now shows
Not sure if this is the correct list on which to ask but a new node
created just over 7 days ago is now
being shown on Tor Metrics (atlas.torproject.org) as being down. However
local logs show heartbeat
activity and some directory activity. A port scan of the IP address shows:
-- cut here
Hello Tor Relay operators,
I am hosting a rather new Tor relay and my uptime is only about 13 hours, while
I would like to contribute to Tor by continuing as a relay (NOT an exit one
though because of frequent abuse of exit relays and my ISP won't allow it).
My question is that I am going
Russian black box. On Mon, Jan 3, 2022 at 04:39, <newslet...@unicorncloud.org> wrote: Hi,I've made the same experience with my node in RU.Greetings,Sebastian ElisaOn 02.01.2022 16:09, abuse--- via tor-relays wrote:> Very interesting!>> I have two VPS at different locations with justh
kn?channel=3
* no chunk, no close, no size. Assume close to signal end
The IP addresses of blocked Tor relays and bridges are not reachable
over Chelyabinsk profitserver as well.
OpenPGP_signature
Description: OpenPGP digital signature
____________
> comuter and forget about? Regards Carl
In principle yes, because a tor bridge typically does not use much resources,
but:
1. you'll need to have one or two open network ports which allow anyone from
the internet to connect to your tor bridge.
2. you'll need to keep that system and the t
.
- I tried again today and everything worked fine. I even downloaded the tor
browser bundle for Windows over one of the servers just to see if it works. It
does and the signature also checks out (verified on a different server outside
Russia)
- running tor nodes at both locations continues to work
.
extendcircuit 0 authoritynickname
getinfo circuit-status
I observed that i can successfully create circuits to no more than three
authorities and it seems to change to which authorities i can create
circuits.
The unsuccessful circuits stay in EXTENDED but never reach BUILT until Tor
gives up eventually
t; to have bridge stats at metrics.org.
>
> --
> Toralf
>
> _______
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-rela
Hello Tor people, just me chipping in about recent event.
Today, I discovered that somewhere around Dec, 22, all three of my recently
launched bridges have been censored on at least one network (MegaFon Moscow
AS25159). Metrics show a drastic traffic drop in the range of Dec, 21-23 for
all three
Hi Gary,
thanks!
> As an aside... Presently, are you using a single, public address with many
> ports or many, public addresses with a single port for your Tor deployments?
> Have you ever considered putting all those Tor instances behind a single,
> public address:port
Hi Kristian,
Thanks for the screenshot. Nice Machine! Not everyone is as fortunate as you
when it comes to resources for their Tor deployments. While a cpu affinity
option isn't high on the priority list, as you point out, many operating
systems do a decent job of load management
BTW... I just fact-checked my post-script and the cpu affinity configuration I
was thinking of is for Nginx (not Tor). Tor should consider adding a cpu
affinity configuration option. What happens if you configure additional Tor
instances on the same machine (my Tor instances are on different
of that page before the latest upgrade so it appears the
change should have something to to with that somehow.
This is on Debian.
A tor op
‐‐‐ Original Message ‐‐‐
On Monday, December 27th, 2021 at 11:59 PM, nusenu
wrote:
> Hi,
>
> could you paste the Relay Search page l
David/Roger:
Search the tor-relay mail archive for my previous responses on loadbalancing
Tor Relays, which I've been successfully doing for the past 6 months with Nginx
(it's possible to do with HAProxy as well). I haven't had time to implement it
with a Tor Bridge, but I assume
by the garlic routers
themselves?
My thoughts are... What if the Tor Network distributed encrypted
fingerprint-to-host databases to browsers/bridges/relays during the bootstrap
process, with Directory Authorities, that operators did not have access? Such a
process could be further segmented, so
> On 26 Dec 2021, at 16:48, Bobby Stickel wrote:
>
> Yes
In that case, this thread may be helpful
https://lists.torproject.org/pipermail/tor-relays/2016-December/07.html
(Unwarranted discrimination of relays with dynamic IP)
TLDR;
There are advantages to resetting when a r
I notice that the "first seen" info on my obfs4 bridge status page on tor atlas
/ metrics all of a sudden is incorrect, by years. Not sure if it's something
that introduced itself with latest update or what.
The various graphs on traffic and users are still correct throu
day now.
Maybe the relays were offline too long for it to work for you? I moved
everything within 48 hours.
Best Regards,
Kristian
Dec 26, 2021, 15:48 by t...@online-hangout.com:
> Yes
>
> On 12/25/2021 10:47 AM, Murad Jabir via tor-relays wrote:
>
>>> Hello I've no
rested to play this game for an extended period of time. Even government
level of funding has to show some kind of effect or the campaign will get shut
down sooner or later.
Dec 27, 2021, 04:42 by d...@thedave.ca:
> On 2021-12-22 23:42, Gary C. New via tor-relays wrote:
>
>&g
> Hello I've noticed that when swapping machines the advertised bandwidth goes
> down to 0 and so does the consensus weight. Is it acting like I did a new
> relay?
Did the IP change ?
Regards,
Murad.
_______
tor-relays mailing list
t
Neel,
I get the security vs usability considerations between centralized vs
decentralized (or in the case of Tor semi-decentralized) networks. However, at
a minimum, doesn't it make sense to exclude publishing address information from
Tor metrics, etc, as to stop giving censorship organizations
Well, I have to say thanks to the update to tor 0.4.6.9 the DNS overload
issue is gone. My consensus Weight went down sightly due to the constant
overload flag. Lets see if time will help heal that.
Good work so far.
Thanks,
John C.
On 2021-12-21 07:39 AM, nusenu wrote:
bobby stickel
I know it might be a fundamental change to the Tor network, but would it be
possible to obfuscate the Tor bridge/relay addresses with their respective
fingerprints; similar, to the I2P network? I've often thought that this aspect
of the I2P network is one that is implemented well. Perhaps
Neither seems to have produced any change.
>
> Is this normal or could I have missed something on the configuration?
>
> Thank you.
> _______
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_____
Hello,
in my opinion, I am not sure if this is a good business idea.
If I wanted to support the tor network "as a service", I'd donate to some of
the very large relay operators that accept donations and are non-profits. That
way, probably 80+% of what I donate goes directly into r
My middle relay 605EE4375EE4C38215C8949F5808863749FD4F4A crashed and I had to
set it up from scratch. It's up again for over 14 hours now, and all logs and
other checks I did look fine - the only thing which is strange is on the
Tor-Metrics page showing "Advertised Bandwidth" as zero
Roger,
For completeness, I should amend point #3 to include configuring the
Loadbalancer's Timeout to a Large Value:
3. Loadbalance using IP Transparency Mode (This was discovered while tirelessly
combing through mountains of Tor debug logs), use Sticky Sessions based on
Source IP Addresses
pts though. You could
have entered your IP on malicious site to test IPv6.
Cheers,
Murad.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I agree its kinda pointless if you know the issue already...
Thanks,
John C.
On 2021-12-16 08:41 AM, nusenu wrote:
To stop confusing operators it would make sense to remove the
"This relay is overloaded since"
banner from Relay Search for all tor versions prior to
0.4.6.9 a
to crowdsource/mass solve somehow.
The other thought is an attack via email. Can we do something with it, what do
you think?
--
Best regards,
Space Oddity.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
for iOS___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi Roger,
I've found the secret to effectively loadbalancing Tor Relay Nodes is as
follows:
1. Use the same version of Tor on all Upstream Servers
2. Start/Stop all Upstream Tor Nodes at the same time to keep in sync
3. Loadbalance using IP Transparency Mode (This was discovered while tirelessly
Are you able to start Tor manually without systemd? Anytime I encounter Tor
start issues, I attempt to manually start Tor without the --quiet option to
verify whether it's a torrc issue or something else. You might consider
increasing the Tor logging level, too. Your existing Tor log shows
you in the future.
>
>
>
>
>
> Best regards in addition to a nice day,
>
>
> Ellie
>
>
>
>
>
> P.S. I hope I am not needlessly spamming the mailing list, I just wanted to
> introduce myself even as a small beginning operator.
>
>___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> What part do you intent to load-balance and to what outcome?
My current implementation is loadbalancing Tor Relay traffic, which provides
high availability and economies of scale using existing, cost-effective, bare
metal nodes. The same approach could be extrapolated to cost-effect
Hi Gary,
thanks for the warm welcome.
I am currently not performing any load-balancing between my different Tor
relays or my physical/virtual servers. Having thought about it a bit, I can
only see this make sense if you intend to offer .onion services. I don't. Maybe
I missed something?
I
Welcome to tor-relays, Kristian. It's nice to meet a fellow Tor Farmer. It
sounds like you are fairly seasoned with quite an extensive deployment of Tor
Relays.
Are you performing any loadbalancing with Tor Nodes or are they Individually,
Distributed Tor Relays?
I have a Single Tor Relay
On Sunday, December 12, 2021, 1:32:09 AM PST, Natus wrote:
>> As for finding out if anyone is using it or not, I use:
>> netstat -n |grep ESTA|wc -l
>This one does not limit to tor bridge
Pipe the bridge's destination port (i.e., ) through grep as well:
netstat -anp | grep :
Hello Tor universe,
One of the bridges I recently set up shows the Bridge distribution mechanism as
https:
Question: Is this an issue or does it impact the functionality of the bridge?
Or maybe I made a boo boo during setup. Most of my bridges report Moat as the
mechanism. Just trying to learn
My suggestion would be to install Nyx if I am understanding your question.
Sent from ProtonMail for iOS
On Sat, Dec 11, 2021 at 12:47 PM, Natus wrote:
> hi
>
> just setup a tor bridge. how can I validate it is up and running ?
>
> logs look fine:
>
>> [notice] You can
Hello Tor relay operators,
I joined this mail list recently and wanted to take the opportunity to shortly
introduce myself.
My name is Kristian, I am based in Europe, and I operate all nodes behind the
domain lokodlare.com. “Lökodlare” is Swedish for “onion farmers”, which is
pretty much what
from there. You can include a custom port as shown and many attackers
do. Most exploit attempts use http(s). Nothing we can block without
packet inspection.
Best regards,
Felix
_______
tor-relays mailing list
tor-relays@lists.torproject.org
the "latest" branch of pkg, try it out! the package is
called "snowflake-tor"
# pkg update -f
# pkg install -U snowflake-tor
wanna checkout the source of its port?
-
https://cgit.freebsd.org/ports/commit/?id=057c0c3c0645c0b237bb2a96dda440e0426ca983
did you know abo
First of all, thank you very much for your response!
> This is normal, HSDir flag is always gone after reboot or restart. Other flags
> remain after reboot or restart.
I know, it wouldn't even bother me if I lost the Guard flag.
The Tor network can decide whatever it want's to use my
Hello Everybody,
my relay is now almost two weeks old and has the following flags:
Fast, Guard, Running, Stable, V2Dir, Valid.
I lost the HSDir flag because I had to restart the Tor process, my downtime was
just a few seconds, maybe that's why I kept the Guard flag.
I was expecting a drop
cs' can be used to
disable the reporting of an overloaded state. E.g. place the following in your
torrc:
OverloadStatistics 0
May be worth considering until the reporting feature becomes a bit more mature
and the issues around DNS resolution become a bit clearer.
____
26, gabelmoo, dannenberg, maatuska and bastet.
I also agree with you that there appear to be wider problems with the consensus
health overall, but to me the issues have increased noticably in the past few
months.
‐‐‐ Original Message ‐‐‐
On Tuesday, November 16th, 2021 at 01:53, dg26
not aware of any issues. Would any of the
directory authority operators be able to shed light on why some of the DAs are
not assigning it the flag?
Thanks!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
>Since this is virtualization, make sure that features such as AES
>acceleration are active.
Yes, I have tested that. Is active.
>The number of cores is not really relevant since Tor is not
>multi-threaded. The EPYC 7702 can boos
Elias via tor-relays wrote:
> This is actually not a "real" root server, it's a KVM server (of
> course). The CPU is an AMD EPYC 7702 with 2 dedicated cores per
> server@3,35GHz.
Since this is virtualization, make sure that features such as AES
acceleration are active.
Hello All,
My VPS host recently moved one of my Tor exits to cloud ops (I believe AWS).
Since that time the instance will not function as an exit. Torcc and keys are
as before. I was operating on Ubuntu 21.04 but reloaded to 20.04. Still the
same. I messed with the netplan config to no avail
Yes, thank you for the Tor docs link. But the question remains; Is there a
site map or index for Tor web pages. I think, in recent months, this would
encompass multiple sites (Torproject, git and more). But I rant
potlatch
Sent with ProtonMail Secure Email.
‐‐‐ Original Message
Gus,
I have to agree with z-relay on these points.
I won't even provide an obfuscated contact email in my torrc to avoid spam. I
could setup a dedicated email for Tor operation, but I'd likely find my relays
down prior to checking it.
Case in point... When registering a domain name, I've gotten
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sorry, it was not my intention to interfere.
$man tor I forgot to mention, that works too of course. Or in this case $man
torrc.
I already run a relay myself, after several "failed" attempts on cheap VPS now
on a root server with
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi potlatch,
is this what you are looking for?
https://gitweb.torproject.org/tor.git/tree/src/config/torrc.sample.in
https://2019.www.torproject.org/docs/tor-manual.html.en
Both links can be found at the bottom of this site:
https
rk.
>
> Georg
>
When you don't have any evidence that these relays were doing something bad
then what did they do to get rejected?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
d and it's a guaranteed 1GHz link. I
don't think I will ever be able to relay 125MB/s, but I will try my best. If I
can only reach ~50MB/s before the CPU starts to grumble I will set up a second
Tor process and a second relay.
I tuned my relay a bit today, using some of the tips from this co
Hello,
Does the new Tor web configuration have an overall site map or index page? I
can't find the old page with the manual for torrc. I've had trouble finding
other information over the past few weeks as well.
Thanks,
potlatch
Sent with ProtonMail Secure Email.
publickey - potlatch
else we'll kick you out" throws a sizable wretch into
the credibility and technical soundness of the whole project. If the
"adversaries" are capable of de-anonymize tor users by simply running a middle
relay that by design knows neither the real sources nor the real destinations
I'd stay away from, however, seeing the time, effort and care people from
the tor project and people like nusenu seem to invest, I don't think your
statement is appropriate.
Even if there are other attack vectors, it seems to have been shown that
malicious relays are in fact used for nefarious pur
are watching the discussion there. However, as they are the ones who are
most affected by the proposal it's smart to find a better place for
discussing its ideas. Hence this thread on tor-relays@.
---response starts here---
As a bridge operator, I stopped the plan on running relays due to the identity
Where is this criteria documented?
It seems the tor project, or its designated volunteers, are increasing
controlling and managing the network. In the Swiss Federation and EU this turns
the tor project into an "online service provider" or "online platform" and
subje
public IPv6.
Or do you actually need help to have it setup on Hardened BSD?
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Does the provider offer IPv6? If not, then there is no further progress
possible.If they do, this is pretty accurate to get started,
https://www.vultr.com/docs/configuring-ipv6-on-freebsdJonas--
Original Message --On Wed, November 10, 2021 at 12:40 AM, xplato via
tor-relaystor
Bobby,
I run a Tor relay on dual core 256MB devices with a 250Gb fiber connection and
they are adequate to operate as a fast middle relay.
Monitor your relay on https://metrics.torproject.org/ to verify.
Respectfully,
Gary—
This Message Originated by the Sun.
iBigBlue 63W Solar Array (~12
The following are some of the more important config options that I use for such
a small middle relay:
# Tor: A non-exit relay should be able to handle 7000 concurrent connections
ulimit -n 65535
DirCache 0
the time, but all that happened was that my 20TB SSD was
maxed out within two hours and I had to reboot to get rid of the old logfiles.
My bad, please don't think I write a debug log, that's completely pointless.
Why would I. I rented a pretty expensive root server because I think Tor is
really
instructions would be much
appreciated.
Kindly,
Dan
Sent with [ProtonMail](https://protonmail.com) Secure Email.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
wrote:
>
>Finally, anyone running relays: try to get connected to the community so we
>can build some trust among each other. That seems to be an essential part in
>our long-term strategy to fight bad relays trying to enter our network.
>
_______
I just read this research paper, maybe it's worth thinking about some kind of
implementation of this approach some time in the future.
It's an interesting read anyway.
uwspace.uwaterloo.ca/bitstream/handle/10012/16108/Engler_Steven.pdf
Regards
___
tor
ards...
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
It's surprising that you're running into CPU issues. It's typically RAM that is
exhausted first.
I have 5 x Dual Core 256MB Tor Relay Nodes loadbalanced as a Single Middle
Relay that never have CPU issues. It's always a matter of running out of RAM
for me. The loadbalanced Tor Relay
Hi everyone,
about two weeks ago, I signed up for a VPS with a cloud provider and set up a
Tor relay. I installed Debian 11 Bullseye, secured it, and then set up Tor
0.4.6.8 and started the relay.
The VPS had the following specs: 1vCore, 2GB RAM, 40TB traffic per month on a
1Gbit/s link. I
Hello all,
I would have to agree on this it appears that the DNS failure timeout is
too low. I have more then enough bandwidth to host tor exit nodes, and
my own unbound full recursive relay and yet i still get the timeout
message 1-1.5%. Sometimes even weird amounts such as 40-50%.
I have
gus :
>
> > From the Tor Relay Guide:
> >
> > "Note: You can only run two Tor relays per public IPv4 address. If you
> > want to run more than two relays you will need more IPv4 addresses."
> > https://community.torproject.org/relay/relays-requirements/
Hi,
hi made a new Proxmox server for my home network. I still run a bare metal
Tor bridge, but now i would run more bridge in my home network.
I have a public dynamic IP: what is the max number of bridge i can run
(obviously on different ORPort) under the same IP address
Thanks in advance
If you upgraded tor as a package on your Linux OS recently, it may have overwritten your torrc with defaults? It’s a long shot!Sent from ProtonMail for iOS On Sat, Nov 6, 2021 at 12:52, sysmanager7 via tor-relays <tor-relays@lists.torproject.org> wrote: I was notified by Uptime
Hi everybody,
I am new to tor (as server operator) and try to support the network by
operating an exit node.
Machine is running Ubuntu 20.04 - Tor 0.4.6.8.
nyx is giving me a notive every 10 minutes or so: [NOTICE] General overload ->
DNS timeouts (6) fraction 1.4742% is above thresh
Wondering if my tor.list has a typo since I can't upgrade Tor 0.4.5.9. I get
error:
Err:1 https://deb.torproject.org/torproject.org stretch/main amd64 tor-geoipdb
all 0.4.5.10-1~d9.stretch+1
server certificate verification failed. CAfile:
/etc/ssl/certs/ca-certificates.crt CRLfile: none
I
I was notified by Uptime Robot that relay 1 of 3 had been shut down.
Unfortunately I found this out 12 hours after the fact.
guard flag is lost.
journalctl -u tor@default
Nov 01 01:03:18 ubuntu-s-1vcpu-2gb-nyc1-01 Tor[328387]: I learned some more
directory information, but not enough to build
ourse was contacted, and as it looks right now, we are not getting
an onion service.
https://gitlab.torproject.org/tpo/tpa/team/-/issues/40183#note_2740700
I looked around a little, but I can't find where there is anything on
exactly why it isn't self hosted.
--
HackerNCoder
________
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
David Goulet or Georg Koppen:
Can either of you confirm my question regarding whether the DirectoryAuthority
& FallbackDir directives only evaluated at startup of a Tor instance?
I need to verify the best way to configure cloned, loadbalanced Tor Relay
Instances to inter
All:
Are the DirectoryAuthority & FallbackDir directives only evaluated at startup
of a Tor instance? I recently ran into an issue where my Tor Relay Farm went
down, due to the manually configured DirectoryAuthority going down and the
FallbackDir didn't seem to back it up.
I
if I should raise this in the bug tracker or if you need
anything else.
Thanks,
Arlen
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 10/16/21 5:56 PM, Bass Down Low via tor-relays wrote:
Hi all,
I am somewhat new to the project and trying to run a couple exits to
help out. I noticed my relay amazinglizard
F80494CE5B2441B67431FFA9CCA571D26BC4F6D8 has bee up for 4 days and not
turned into an exit yet. I noticed
I work for a bank and was informed that when I connect to my employer network,
it shows I am coming from a Tor IP and sets off an alert that then leads to me
being on a call with an investigative team for my employers. I was running a
Tor relay, but had to shut it down because of these alerts
becoming an exit? If not, I would
appreciate any help you can give.
thank you very much___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
.
iBigBlue 63W Solar Array (~12 Hour Charge)
+ 2 x Charmast 26800mAh Power Banks
= iPhone XS Max 512GB (~2 Weeks Charged)
On Thursday, October 14, 2021, 5:10:53 AM PDT, Bleedangel Tor Admin
wrote:
You are running 0.4.5.8, maybe updating to a newer version of tor will help?
Sent from
401 - 500 of 988 matches
Mail list logo