Re: [tor-relays] snowflake incoming UDP ports
Quoting Toralf Förster (2022-02-21 22:06:36) > On 2/19/22 12:48, meskio wrote: > > -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My contact info: > > https://meskio.net/crypto.txt > > OT, but: You're still at freenode ? No, I left a while ago, but looks like I forgot to update that document. Now is up to date. -- meskio | https://meskio.net/ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My contact info: https://meskio.net/crypto.txt -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Nos vamos a Croatan. signature.asc Description: signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] snowflake incoming UDP ports
On 2/19/22 12:48, meskio wrote: If you have restricted NAT I would recommend you to open the UDP port range of 32768-60999. Thx, I opened those UDP ports for incoming UDP traffic. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- My contact info: https://meskio.net/crypto.txt OT, but: You're still at freenode ? -- Toralf OpenPGP_signature Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Reduced exit and not IPv4 exit traffic at all
On 2/19/22 00:06, nusenu wrote: You can run a relay that does allow exiting to IPv6 and not IPv4 but it will not get the exit flag. Which means what? Will it be use for exit at all? Would be sad to loose this 300MBit/s fully used Exit. yl ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Reduced exit and not IPv4 exit traffic at all
On 2/18/22 16:13, li...@for-privacy.net wrote: Before changing exit policies, read 'man torrc' carefully. SERVER OPTIONS ExitPolicy* and IPv6Exit. ah, there is is buried. I didn't know that there is man torrc, I always looked that up online in the 2019 documentation, or before that in the standard doc. online. I will try what happens if I apply a config with IPv6 exit only, I guess it could work now. At least I need to close 80/443, as that seems to be the source for spam, I assume it is some webform or forum spam that got the server listed in the spam block list. yl ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Reduced exit and not IPv4 exit traffic at all
Hello On 2/17/22 21:20, Martin Gebhardt wrote: ExitPolicy accept [::]:20-21 # FTP, SSH, telnet ExitPolicy accept [::]:23 # FTP, SSH, telnet ExitPolicy accept [::]:43 # WHOIS [..] ExitPolicy reject *:* Oh yes, I will try that. Now that you write it here I could also keep some other IPv4 ports open that way. I need to check this out. Also need to test it by choosing "my" exit I guess. I would recommend that you block outgoing email ports instead of trying to block out all IPv4 traffic. I've never had any problems with ISPs and I ban outgoing email and SSH. I'm not happy with it, but it's better than being discredited by ISPs. E-Mail is banned, I think the reason for my problems was forum spam, so some spam done via 80/443. yl ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays