Re: [tor-relays] snowflake incoming UDP ports

2022-02-21 Thread meskio
Quoting Toralf Förster (2022-02-21 22:06:36)
> On 2/19/22 12:48, meskio wrote:
> > -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My contact info: 
> > https://meskio.net/crypto.txt 
> 
> OT, but: You're still at freenode ?

No, I left a while ago, but looks like I forgot to update that document. Now is 
up to date.

-- 
meskio | https://meskio.net/
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 My contact info: https://meskio.net/crypto.txt
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Nos vamos a Croatan.

signature.asc
Description: signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] snowflake incoming UDP ports

2022-02-21 Thread Toralf Förster

On 2/19/22 12:48, meskio wrote:

If you have restricted NAT I would recommend you to open the UDP port range of
32768-60999.


Thx, I opened those UDP ports for incoming UDP traffic.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My contact info: 
https://meskio.net/crypto.txt 


OT, but: You're still at freenode ?


--
Toralf


OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Reduced exit and not IPv4 exit traffic at all

2022-02-21 Thread yl




On 2/19/22 00:06, nusenu wrote:
You can run a relay that does allow exiting to IPv6 and not IPv4 but it 
will

not get the exit flag.


Which means what? Will it be use for exit at all?

Would be sad to loose this 300MBit/s fully used Exit.

yl
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Reduced exit and not IPv4 exit traffic at all

2022-02-21 Thread yl




On 2/18/22 16:13, li...@for-privacy.net wrote:

Before changing exit policies, read 'man torrc' carefully. SERVER OPTIONS
ExitPolicy* and IPv6Exit.


ah, there is is buried. I didn't know that there is man torrc, I always 
looked that up online in the 2019 documentation, or before that in the 
standard doc. online.


I will try what happens if I apply a config with IPv6 exit only, I guess 
it could work now.
At least I need to close 80/443, as that seems to be the source for 
spam, I assume it is some webform or forum spam that got the server 
listed in the spam block list.


yl
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Reduced exit and not IPv4 exit traffic at all

2022-02-21 Thread yl

Hello

On 2/17/22 21:20, Martin Gebhardt wrote:

ExitPolicy accept [::]:20-21 # FTP, SSH, telnet
ExitPolicy accept [::]:23 # FTP, SSH, telnet
ExitPolicy accept [::]:43 # WHOIS
[..]
ExitPolicy reject *:*


Oh yes, I will try that. Now that you write it here I could also keep 
some other IPv4 ports open that way. I need to check this out. Also need 
to test it by choosing "my" exit I guess.




I would recommend that you block outgoing email ports instead of trying 
to block out all IPv4 traffic. I've never had any problems with ISPs and 
I ban outgoing email and SSH.

I'm not happy with it, but it's better than being discredited by ISPs.


E-Mail is banned, I think the reason for my problems was forum spam, so 
some spam done via 80/443.


yl
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays