On Thu, Oct 1, 2015 at 12:59 PM, s7r <s...@sky-ip.org> wrote:
> Ouch, that's wrong.
I have it correct. You are mistaken.
See https://www.torproject.org/docs/tor-manual.html.en
and read it closely.
_______
tor-relays mailing list
t
On Thu, Oct 1, 2015 at 1:33 PM, Tim Wilson-Brown - teor
<teor2...@gmail.com> wrote:
>
> On 1 Oct 2015, at 15:22, Dhalgren Tor <dhalgren@gmail.com> wrote:
>
> If the relay stays overloaded I'll try a packet-dropping IPTABLES rule
> to "dirty-up" t
>Maybe use this:
>
>MaxAdvertisedBandwidth
This setting causes the relay to limit the self-meausre value
published in the descriptor. Has no effect on the measurement system.
Would be helpful if it did.
_______
tor-relays mailing list
t
This relay appears to have the same problem:
sofia
https://atlas.torproject.org/#details/7BB160A8F54BD74F3DA5F2CE701E8772B841859D
On Thu, Oct 1, 2015 at 12:33 PM, Dhalgren Tor <dhalgren@gmail.com> wrote:
> Have a new exit running in an excellent network on a very fast server
>
On Thu, Oct 1, 2015 at 5:12 PM, Moritz Bartl <mor...@torservers.net> wrote:
> On 10/01/2015 06:28 PM, Dhalgren Tor wrote:
>> This relay appears to have the same problem:
>> sofia
>> https://atlas.torproject.org/#details/7BB160A8F54BD74F3DA5F2CE701E8772B841859D
>
&g
excellent
capacity networks, but that must limit bandwidth consumption in order
to avoid billing-plan overuse charges.
Loss of DNS resolver traffic is not a concern here.
In this specific case it appears that the Tor bandwidth allocation
system "over rates" subject relays to the point where
I am paying for this.
Does seem the system generating the measurements has
problem and if someone can look at this issue that would
seem "productive."
Still interested in hearing "a better idea."
___
tor-relays mailing list
tor-relays@lis
not hit the WAN and is not billable.
Perhaps passing mention of 'ifconfig' statistics in the
manual is worthwhile. 'ip -s link show eth0X' truncates
byte counters (on some distros anyway) and is useless.
_______
tor-relays mailing list
tor-relays@lists.torpr
must be performed manually. The relay
resides in the high-quality German LeaseWeb network and the risk of
DNS mischief appears low.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
ately, limit the
bandwidth
to stop it fluctuating so much.
Tim (teor)
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
___
tor-relays mailing list
tor-relays@lists.to
Hi Christian
I think you lost that cup of coffee! I did a bit more research since my
posting and found the info I needed by doing 'man tor' on my Ubuntu 14.04.3
system.
The tor man page says that tor looks for /etc/tor/torrc by default, or
$HOME/.torrc if that file is not found. I only have
. September 2015 06:36 schrieb Tor Stuff
<tor.geheimschrei...@gmail.com>:
I have been running this node (nickname 'Geheimschreiber') with
fingerprint C69D24F9353E16D85E82B4A9E4571DFAF6DCF531 for many months
so expected Atlas/Globe to pickup my changed capabilities fairly
quickly.
Am I bei
OK, noted. Thanks.
The node has been running unchanged for months with the same fingerprint
and name but on a slower connection. I guess I wanted to see my investment
in a faster broadband connection immediately recognised!!
Will be patient.
Cheers
Q
On Sun, Sep 20, 2015 at 8:11 AM, <
I am running tor on a new Ubuntu 14.04.3 LTS system. I have restarted tor a
couple of times with
service tor restart
I noticed when I start arm that it is telling me that
The torrc differs from what tor's using. You can issue sighup to reload
...
It seems that tor is running with default
It appears that First Tech Federal Credit Union is blocking all Tor
nodes (including non-exit nodes) from connecting to their website,
http://www.firsttechfed.com
This seems ... misguided on their part. Blocking exit nodes is one
thing, but preventing random people who happen to run a Tor middle
https://www.torproject.org/docs/faq.html.en#UpgradeOrMove
I want to upgrade/move my relay. How do I keep the same key?
When upgrading your Tor relay, or running it on a different computer,
the important part is to keep the same identity key (stored in
"keys/secret_id_key" in your Dat
schrieb Tim Wilson-Brown - teor
<teor2...@gmail.com>:
On 3 Sep 2015, at 14:55, tor-server-crea...@use.startmail.com wrote:
hi,
what do you think about high restricted exits?
i thought about solely accept some single ips.
In order to be assigned the Exit flag, a relay needs t
Just thoughts: To throttle how about assign twisted consensus weight to
outdated versions? Highest consensus weight to slowest relays and vice
versa? Wouldnt they overload/throttle themselfes nicely?
Am Sonntag, 23. August 2015 10:24 schrieb
tor-server-crea...@use.startmail.com:
Would
bots running ancient versions
of the Tor daemon.
But all that bot traffic creates a lot
of statistical background noise, and
so may be providing a service in making
it more difficult for advanced adversaries
to perform traffic correlation analysis.
Thoughts anyone
/#/relay/741488D89B860E59D6391ACA27A157E87EB533FF
Thanks,
G
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
more expensive
than e.g.
in Europe. I'm not sure how useful a relay in an exotic location, if
it's
expensive to run and pushes very little traffic. Maybe others can
comment.
I think it is reasonably priced; $20USD/month for unmetered 100Mb/s.
I am willing to contribute money to Tor because I
. possibly
SBC/ATT), and list of exceptions could be created for the few
cases where it causes trouble.
CYMRU has a dynamic service for looking up AS from IP.
What if an entire IP block (or entire AS) moves ASs?
What if the external dependency on CYMRU allows the entire Tor
Network
Here goes.
The relay was configured to turn off when 1TB of traffic was reached. It
did so way faster than I anticipated. Moreover, my VPS host actually
doesn't count inbound traffic as part of my monthly limit. Since a TOR
relay traffic is mostly symmetric, it does mean that BWAccounting
Hi gents,
I rencetly had one of my relay fall into hibernation. It seems that
simply restarting the service doesn't change the hibernation status
since Tor is still thinking that the BW limits have been overrun. Is the
proper method to reset the status of the node is simply to delete
to access the services behind it.
That's the way I look at the issue, in any case.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi All,
I think we are deviating from the issue here.
I have installed Tor.. Everything is good on my Pi 2
All i want to know is how do i open ports for Tor on my NetGear DGN1000 router
Thanks,
Bunty
exact, thats what im talking about
Am Dienstag, 23. Juni 2015 23:28 schrieb cacahuatl
cacahu...@autistici.org:
On Tue, Jun 23, 2015 at 08:00:53PM +0200,
tor-server-crea...@use.startmail.com wrote:
german exit for https://youtu.be/ is breaking functionality due to
disunity
between google
german exit for https://youtu.be/ is breaking functionality due to
disunity between google and gema. since years now. anyhow german exits
shouldnt block youtube ip's, now should they?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https
Hello All,
I just bought a Raspberry Pi.. Wanted to setup as a Tor non exit relay.
I have read so many instructions online on how to set it up but i am facing
issues with opening ports.
I am using a NetGear Router and require your inputs with the same.
Also is static IP mandatory for setting
I am using a NetGear DGN1000
From: iamthech...@gmail.com
Date: Tue, 23 Jun 2015 19:26:45 +
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Raspberry Pi - Relay Setup
What model of NetGear do you have?
A static IP is not required. You may need to setup a Dynamic DNS if tor has
hey
seems like avira is joining us running 24 exits through as24875. seems
to be about double the size of mozillas relays.
Yay!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
=5D5J
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays
I want to investigate why obfs4 is nearly never used.
hi,
may you want to have a look into tails bug #9268 adressing some obfs
issue
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman
Great points raised there with your post. Thanks for the reply.
I definitely don't understand everything about Tor but I'm gradually
getting there. The public Tor entry guard relay ran great for over a
year but we ended up taking it down for a while once I realized
something was wrong
tor-relays-requ...@lists.torproject.org schreef op 05/06/15 om 14:00:
Updating tor to get fix for #15083? (Elliott Jin)
- Is Tor 0.2.5.10 (git-43a5f3d91e726291) actually the newest stable
version, or did I mess something up when trying to update tor?
- Would it be a good idea
the exit relays we run
due to someone using Tor to try to exploit remote web server scripts
and databases and the like. I don't think there's anything that can be
done about it? I would say that it's just part of what you get coming
out out of Tor exit nodes.
If anyone else has any better advice feel
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I have to agree with that, multicore support is really important and
should be on the top of the priority list.
Thomas White:
Have there been any updated ETAs concerning the development/support
of multi-core for the core tor workloads
hi, its very easy:
https://trac.torproject.org/projects/tor/wiki/doc/IPv6RelayHowto
just put your IPv6 adress somewhrere within square brackets into torrc.
ORPort [2001:DB8::1]:9050
- afaik it shouldnt matter where you put it into torrc -
also put
IPv6Exit 1
ExitPolicy reject6 *:*
somewhere
relays,
then CBL recorded DanTor, then SpamHaus Zen recorded CBL, which
allowed
OVH to claim 100% of your IPs are blacklisted on multiple lists
when
in reality it was from a guy in the UK who publishes all Tor relays
-
guard, middle, exit - that caused this whole problem for me. Not
one
in this thread.
I'd be curious to know what this checker says about the IP address
that ultimately got this ISPs attention:
http://mxtoolbox.com/blacklists.aspx
I run 2 fast exits with only ports 25 and 465 rejected. I find that
the IPs are in some expected lists that target Tor, plus barracuda
sorry, i confused something. relay should show in the consensus as an
a line. does not mean a a is required in torrc. i got confued
cause of the headline 1.1 Ordinary relays stupid me, pardon
-- Original-Nachricht
--
Betreff:
Re: [tor-relays
hi,
about that following lines in the mail from Moritz Bartl.
[tor-relays] Please enable IPv6 on your relay!
In short, you add:
ORPort [IPv6::address]:port
IPv6Exit 1
ExitPolicy reject6 *:*
shouldnt there be a a in the first line? how important ist the letter
a? i guess some operators just
Hello,
We have been operating a moderately successful public tor relay for a
while now. Having read about how TOR works back a couple of years ago, I
was more or less sold on the idea that if traffic originating on your
local network uses your own TOR relay as the first hop (entry node
hi there.
0.2.5.12 on debian jessie: service tor reload causes message:
Job for tor.service failed. See 'systemctl status tor.service' and
'journalctl -xn' for details.
it says something like failed to start LSB? any advice for me please?
cheers
ty, ill do my best getting machines up again :/
On Thursday, May 14, 2015 7:24 AM, grarpamp grarp...@gmail.com wrote:
On Wed, May 13, 2015 at 6:51 PM,
tor-server-crea...@use.startmail.com wrote:
any advice for me please?
Learn additional unix system administration, read the manuals, attend
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi!
let's begin: is it possible to run 5 bridges on one low-end VPS?
[...]
and would 5 processes be too much for a 2-core VPS with
256mb memory?
I did run a single Relay on a small vps (2 GB VRam 2 Ghz VCore). Tor
itself did run smooth but the VPS was unable to manage all the tcp
connections
people.
Gief.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
?
will tor be utoupdated at new release with apt-get -y upgrade or how
to manage automated actuality?
On Saturday, April 18, 2015 3:46 PM, Julien ROBIN
julien.robi...@free.fr wrote:
Hi !
You can try a mix between this (ultra simple), from
https://www.torproject.org/docs/debian.html.en
I need some help.
My dedicated server is running debian and is new, set up by my
serverhoster.
I want to run a TOR-Relay:
- It should always update to latest stable automatically.
- It should be save.
I will edit the torrc by myself. What i need is simple copy+paste
codeline for:
- isntall
Thx for your Answer,
i think ive managed to configure the tor service properly,
my concerncs were about how easy it is to get one out of 3-400 Tor users
through your specific exit, and somehow i think this should not be
possible so easy.
so here the Atlas link, where you can see with 10Mbit/s
hi,
just want to note, i am proud to have an german exit node with 11Mbs ..
but also concerned about this raising exit node probability, actually it
reads for me like 1 of 400 tor-users is going through this exit (by
recalculating a exit probability of 0.25 %) - this concerns me because
monitoring tool.
Regards,
torland
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
seconds.
Is this normal and Ive just never noticed? Ive had ad high as 2000+ connections and never saw it.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Friday 26 December 2014 15:48:20 Christian Burkert wrote:
Furthermore, I wondered if the attackers were attracted to my system
because of the Tor service, or were just randomly picking targets.
But from your previous descriptions, I rather deduce that it is more
like the latter, rather
0.0.0.0/0
Does your system use tcp wrappers? If so you may need to add a line like
this to /etc/hosts.allow :
tor: ALL
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https
which may also pose a
concern for some people.
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
.
On December 1st, the tor process' memory consumption went up and up
until the Linux kernel decided to kill it. Monit has subsequently
restarted it, and it settles at roughly 1.7 GB since then.
The logs of the corresponding days have already been rotated out, so I
cannot post the exact messages I'm
extra
software, the firewalls can do this.
You also reminded me of a big factor I forgot to mention in the doc:
firewalls.
Hehe no problem.
Thx for putting up with the effort to create such a doc.
--
regards
alex
___
tor-relays mailing list
tor
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi,
On Tue, Nov 25, 2014 at 08:58:04PM +0100, tor-ad...@torland.me wrote:
Don't store identity keys on the hard disk. Keep them offliner. Use a ramdisk
for /var/lib/tor/keys/ and copy keys to it via scp before starting your tor
instance. Remove it from the ramdisk after startup. So the keys
-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
if the
connection is stable. The way you have described the issue, it points to a
router malfunction at first glance but if you can flash some more light on it,
you might get an exact solution.
Thanks,
TorZilla11
Date: Thu, 16 Oct 2014 13:22:42 -0400
From: humbletoru...@safe-mail.net
To: tor
On 10/12/2014 6:56 PM, subk...@riseup.net wrote:
[cross-posted on tor-talk and tor-relays]
i've found that the Tor GoodBadISPs list [1] is somewhat outdated on
current hosts that allow Tor (exit) relays to be hosted. i'm trying to
find a cheap host that allows exits to be operated from
Also i guess its high time that TOR network starts thinking about folks like us
with low bandwidth.
I am in as well for devoting my time for any help required
Date: Mon, 13 Oct 2014 19:21:49 +0200
From: toralf.foers...@gmx.de
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays
Thanks, that's what I thought, but wasn't sure.
I'll play around for the next few days to see how fast I can get it
without triggering hibernation.
L
On 2014-10-12 02:04, teor wrote:
On 12 Oct 2014, at 09:32 , tor-relays-requ...@lists.torproject.org
wrote:
Date: Sat, 11 Oct 2014 23:25:47
Hi,
I've set up a bridge node in the previous few weeks, but have had to put
a bandwidth limit on, as I only have 10TB of traffic per month before my
ISP will start throttling me to 100k/sec.
I wondered whether it was more helpful to the Tor network as a whole to
have have a very fast node
On 10/9/14, 8:21 AM, Eric Hocking wrote:
Hi everyone,
Is there a limit to how many exit nodes we can run?
___ tor-relays mailing
list tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Let me see
Hi Folks,
I am trying to figure out how the packet flows over a Tor network.. There is a
mix of information.. Some claim that the ISP is not aware of the payload as the
complete data is encrypted whereas some say that your ISP is not used at all
when using Tor network. AFAIK my packets go
Also a quick question jumped in.. Say i have a Raspberry PI which is converted
to a TOR router and i connect my machine to this router. Will this make the
entire traffic go via TOR including something as simple as a ping request. Say
i ping a machine on the web, will it stay anonymous or i
Thanks Chris,
I will check the links.. :)
Looks like TOR is still going through a development phase which is a good thing
Thanks,
Torzilla11
Date: Thu, 9 Oct 2014 22:58:06 +0200
From: christ...@ph3x.at
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Need Routing Info
Hi All,
I just setup a bridge and it looks like i have a bug as per the message log..
Failed to open GEOIP file C:\Users\*ABCD*\AppData\Roaming\tor\geoip.
We've been configured to see which countries can access us as a bridge,
and we need GEOIP information to tell which countries clients
the database but still
the bridge users will have to manually download the directory every time which
shows low availability of bridges.
But definitely we need some more info on this issue.
Also i guess we might wanna develop a tool where user can test whats the best
option available for their tor
to get unique circID
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I have a related question. I have recently built my first Tor relay (ORPort
443, DirPort 80, NOT Exit) with both the bandwidth and burst limits set to
100KB/s.
It has been running for less than 3 days. During that time I have been
monitoring it with 'arm' and on GLOBE and notice a number
A correction to my posting below. With reference to what GLOBE says about
my relay, I meant to say mean written bytes (mean bandwidth?) is 1.84
kB/s while mean read bytes is 1.62 kB/s.
Q
-- Forwarded message --
From: Tor Stuff tor.geheimschrei...@gmail.com
Date: Mon, Sep 8, 2014
of it, it didn't have much impact on the bandwidth
https://metrics.torproject.org/bandwidth.html#bwhist-flags
https://metrics.torproject.org/bandwidth.html#bandwidth-flags
--
bastik
___
tor-relays mailing list
tor-relays@lists.torproject.org
Thanks. At least it is good to see the graph stabilizing a bit after the sudden
drop.
-kali-
On Monday, August 25, 2014 12:31 PM, George Kadianakis desnac...@riseup.net
wrote:
Kali Tor kalito...@yahoo.com writes:
I wonder why there is a sudden decrease in number of Guard nodes
thing at all.
As you may have guessed, my knowledge about this is minimal; it is
just an intriguing concept for me to help someone reach Tor/the
Internet in general from countries where censorship and and
misinformation rule.
Thanks again!
___
tor
We never had our exit nodes become the targets of DDOS attacks
HOWEVER, we occasionally see abuse complaints due to someone abusing
Tor to DDOS attack other targets. Perhaps that's what you're seeing?
___
tor-relays mailing list
tor-relays
-
Hash: SHA256
Hi
I just wanted to know from others how often your nodes are being DDoSed?
Because this month one of our nodes has been targeted twice.
Because DDoS sucks and most providers aren't very happen when this
happens often.
___
tor
SPT=10200 DPT=9001 WINDOW=46 RES=0x00 ACK
PSH FIN URGP=0
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
You somewhat made a mistake here - you've got to have an exit policy
that (minimally) rejects ports 25 and 465, or else your relay becomes
a giant abuse tool for spammers, scammers, and phishers instead of
what you intended it to be (which was a standard-functioning Tor
relay).
You might
, scammers, and phishers instead of
what
you intended it to be (which was a standard-functioning Tor
relay).
You might try telling your ISP that you made a mistake in your
configuration which allowed spam email to go out, and you're
willing
to
correct that error and move forward.
ExitPolicy
Let's not confuse two things, here. The customer wanting to host a Tor
exit relay is a different service request than wanting to run a
wide-open SMTP relay. No reputable ISP would agree to host an open
SMTP relay and I'm sure this one did not knowingly do so.
It would be unfortunate
tor
unfriendly because of this, i run there exits for 2 years on some vps's
without a problem and i hope they don't start killing them now
Am 30.07.2014 14:39 schrieb Lunar lu...@torproject.org:
t...@t-3.net:
You somewhat made a mistake here - you've got to have an exit policy that
(minimally
Some time ago I proposed that Tor flags some ports as being unacceptable as
ORPort[1], but this did not gather much of a momentum.
A port is a number. None of them is special. I really don't see any
reason to discriminate any.
Oh but they are special in a lot of cases:
http
In my experience yes, you should be able to move those files to the
current working directory and it will just work.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Assuming the Tor service is running on a dedicated host, you could use
an SNMP-aware switch and query it with Cacti for graphs on the
switchports, or maybe run an snmpd on the node and use Cacti to build
graphs against the node's ethernet card stats.
http://www.cacti.net . It can also
?
The private keys for the node are sensitive, and even the
.tor/state file for the guard nodes could be if the attacker
does not already have that info, same for any non default
node selection stuff in torrc. Tor presumably validates
the disk consensus files against its static keys on startup
so
Hi,
If you are asking how to secure your box better, indeed the public IP
address list of relays is often scanned and brute forced. That is why
I recommend:
- - if you run only Tor on that box is best, if not make sure your apps
are properly secured (mysql not listening on public IP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
root@tor:/ # cat /proc/cpuinfo | grep aes cat: /proc/cpuinfo: No
such file or directory
According to a stackoverflow page [2], you can look for hints
indicating the existence of AES-NI support in sysctl hw and
/var/run/dmesg.boot
PID USERNAME
Hi all,
Curious as to how much bandwidth a stable, well established relay node will
chew through in a month on an average?
Anyone has any figures?
-kali-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi
. Expect it to use roughly 80% of your
maximum speed on average, so if you have a 50Mbit/s up/down connection
you will be uploading 13TB and downloading 13TB.
For high speed relays this might differ a bit if your bottleneck becomes
the CPU.
Tom
Kali Tor schreef op 01/07/14 23:16
So, no way to offer DS while setting AccountingMax?
-kali-
On Thursday, June 26, 2014 10:02 PM, Kali Tor kalito...@yahoo.com wrote:
I had
not read anything about this either, until I tried to enable
it
and got this in my log:
10:15:43 [NOTICE] Not
advertising DirPort
Hi,
On Thursday, June 26, 2014 4:57 PM, kingqueen kingqu...@btnf.tw wrote:
On 26 June 2014 17:08:51 BST, Roman Mamedov r...@romanrm.net wrote:
And that Tor node list is, in fact, a web page.
Yes, I understand how it happens. I was just asking how much of an
inconvenience
spam
The spam to my own Tor relay operator email address (same one as in
this list) isn't meaningful in volume. I haven't seen any amounts that
a delete key couldn't easily handle.
In my experience, you should be careful with spam filtering, as you
could end up dumping abuse complaints that you
801 - 900 of 988 matches
Mail list logo