Re: [tor-relays] LLC vis-à-vis Nonprofit

2016-10-26 Thread Nicholas Merrill
On 10/26/16 8:22 PM, Kenneth Freeman wrote: > An Idaho nonprofit has expressed guarded interest in Tor. Ideally I'd > like them to run an exit node without fuss or bother, but the Tor > Project's Tips on Running an Exit Node only covers limited liability > corporations (LLCs) regarding the

[tor-relays] LLC vis-à-vis Nonprofit

2016-10-26 Thread Kenneth Freeman
An Idaho nonprofit has expressed guarded interest in Tor. Ideally I'd like them to run an exit node without fuss or bother, but the Tor Project's Tips on Running an Exit Node only covers limited liability corporations (LLCs) regarding the legal/corporate set-up. Is there anything to add, or is

Re: [tor-relays] Rampup speed of Exit relay

2016-10-26 Thread teor
> On 27 Oct. 2016, at 00:32, D. S. Ljungmark wrote: > > On tis, 2016-10-25 at 22:52 +1100, teor wrote: >>> >>> On 25 Oct. 2016, at 22:26, D.S. Ljungmark >>> wrote: >>> >>> So, Now I've taken some steps to adjust the state of the relay, and >>> try to

Re: [tor-relays] cryptsetup some folders

2016-10-26 Thread diffusae
Your "draft" looks very good. I'm sure, that it will help. Thanks a lot On 26.10.2016 02:01, Mirimir wrote: > On 10/25/2016 05:40 PM, teor wrote: >> >>> On 26 Oct. 2016, at 10:31, Mirimir wrote: >>> Any particular reason to let the mailing list know you have useful

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Louie Cardone-Noott
On Wed, 26 Oct 2016, at 02:04 PM, Zack Weinberg wrote: > If you're using Debian jessie, you can get an 0.2.8.9 package from > either backports or the torproject.org repository. I went with > backports because that let me also pick up a much newer openssl. > > zw Zack, Interesting, I too

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Alan
Thanks for the advice, I added torproject.org repo and it upgraded to 0.2.8.9 Alan > On Wed, Oct 26, 2016 at 5:54 AM, Peter Palfrader > wrote: >> On Wed, 26 Oct 2016, Alan wrote: >>> 0.2.5.12 is the latest version from the repo. Im assuming I should pull >>> down the

Re: [tor-relays] Rampup speed of Exit relay

2016-10-26 Thread D. S. Ljungmark
On ons, 2016-10-26 at 15:32 +0200, D. S. Ljungmark wrote: > On tis, 2016-10-25 at 22:52 +1100, teor wrote: > > > > > > > > > > > On 25 Oct. 2016, at 22:26, D.S. Ljungmark > > > wrote: > > > > > > So, Now I've taken some steps to adjust the state of the relay, > > > and > >

Re: [tor-relays] Rampup speed of Exit relay

2016-10-26 Thread D. S. Ljungmark
On tis, 2016-10-25 at 22:52 +1100, teor wrote: > > > > On 25 Oct. 2016, at 22:26, D.S. Ljungmark > > wrote: > > > > So, Now I've taken some steps to adjust the state of the relay, and > > try to balance this. > > > > To reiterate a point previously,  before I start adding

Re: [tor-relays] Rampup speed of Exit relay

2016-10-26 Thread D. S. Ljungmark
On tis, 2016-10-25 at 13:34 +0200, Volker Mink wrote: > Apart from your topic - what kind of internet connection do you use? > :D Gigabit dedicated fiber. //D.S. signature.asc Description: This is a digitally signed message part ___ tor-relays mailing

Re: [tor-relays] Really bad ISP

2016-10-26 Thread Julien ROBIN
Hi, You can check if there is no physical problem on your line, just in case ! Connect to your modem integrated web ui and check ATM statistics of your DSL line. Of course the first step is to watch the "DSL" signal light when you are disconnected. If it's a loss of DSL signal then it's a

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Peter Palfrader
On Wed, 26 Oct 2016, Alan wrote: > 0.2.5.12 is the latest version from the repo. Im assuming I should pull > down the source and compile it. Depends on the repo. If you provided a little more information we'd be able to sy more. -- | .''`. ** Debian **

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Alan
0.2.5.12 is the latest version from the repo. Im assuming I should pull down the source and compile it. >> Thanks for the update, my main relay was vulnerable but i've patched it now to 0.2.8.9. >> >> My Raspberry Pi is running 0.2.5.12 -- is that ok? > > If your version is from before

Re: [tor-relays] Really bad ISP

2016-10-26 Thread David Serrano
On 2016-10-26 08:44:00 (+), Lluís wrote: > > I'm very sad Jazztel is the one that turns out to be > **really** unstable for me. You mentioned "VDSL" in the OP, however I'm talking about fiber. Maybe by switching technologies you could get an improved service. -- David Serrano PGP:

Re: [tor-relays] Really bad ISP

2016-10-26 Thread Lluís
David Serrano: > On 2016-10-26 08:11:00 (+), Lluís wrote: >> >> I am just desperate with my ISP, he is just leaving the >> VDSL2 connection down several times a day, taking the relay with it. >> >> Does anyone know a much more stable, tor-friendly, ISP for an >> Spanish user ? > > I used to

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread nusenu
> Thanks for the update, my main relay was vulnerable but i've patched it > now to 0.2.8.9. > > My Raspberry Pi is running 0.2.5.12 -- is that ok? If your version is from before 2016-10-17, your relay is vulnerable. To be sure you should be running 0.2.8.9. signature.asc Description:

Re: [tor-relays] Really bad ISP

2016-10-26 Thread David Serrano
On 2016-10-26 08:11:00 (+), Lluís wrote: > > I am just desperate with my ISP, he is just leaving the > VDSL2 connection down several times a day, taking the relay with it. > > Does anyone know a much more stable, tor-friendly, ISP for an > Spanish user ? I used to have two relays on

Re: [tor-relays] manual vs. automated updates

2016-10-26 Thread Markus Koch
niftyeuropeanbunny -> bridges, a lot of them Markus Sent from my iPad On 26 Oct 2016, at 10:22, nusenu wrote: >> 32 relays updated (Debian + Tor compiled to latest version) >> >> I am getting too old for this without a server management system > > not all

Re: [tor-relays] manual vs. automated updates

2016-10-26 Thread nusenu
> 32 relays updated (Debian + Tor compiled to latest version) > > I am getting too old for this without a server management system not all relays with your contactinfo seem to be updated properly doing it manually is slow and error prone. Maybe consider using the 'unattended-upgrades'

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread nusenu
nusenu: > CentOS/RHEL/Fedora > === > > yum install --enablerepo=epel-testing tor correction: CentOS/RHEL yum upgrade --enablerepo=epel-testing tor fedora: dnf upgrade --enablerepo=updates-testing tor signature.asc Description: OpenPGP digital signature

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread John Ricketts
Markus, I'm too damn old to type that accurately, My hands shake from old mechanical keyboards and my eyes are irradiated from old Wyse 50 terminals... > On Oct 26, 2016, at 02:31, Markus Koch wrote: > > I did it like a real man, just me hands and putty without any

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Petrusko
Haha ok! Nice hard work so ;) Good luck for next update ! (hope it will be ok for a long time!) Le 26/10/2016 à 09:30, Markus Koch a écrit : > I did it like a real man, just me hands and putty without any bash scripts > and these modern devil tools! > > markus > > > Sent from my iPad > >> On

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Markus Koch
I did it like a real man, just me hands and putty without any bash scripts and these modern devil tools! markus Sent from my iPad > On 26 Oct 2016, at 09:18, John Ricketts wrote: > > I feel you Markus, I did 24. I wrote a bash script to update/upgrade/reboot. > >> On

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread John Ricketts
I feel you Markus, I did 24. I wrote a bash script to update/upgrade/reboot. > On Oct 26, 2016, at 02:17, Markus Koch wrote: > > 32 relays updated (Debian + Tor compiled to latest version) > > I am getting too old for this without a server management system >

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Petrusko
Handmade scripts to update everybody ? (a little curious ;) Markus Koch : > I am getting too old for this without a server management system -- Petrusko EBE23AE5 signature.asc Description: OpenPGP digital signature ___ tor-relays mailing

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Markus Koch
32 relays updated (Debian + Tor compiled to latest version) I am getting too old for this without a server management system Markus 2016-10-25 23:48 GMT+02:00 nusenu : > just a reminder since most of the tor network (including some of the > biggest operators)

Re: [tor-relays] 33C3 Voucher

2016-10-26 Thread fatal
33C3 Tickets: Status and Open Sale The ticket contingents of the first phase of our presale are by now exhausted. Only some vouchers (such as the ones sent to angels) can be redeemed from now on. The second phase – the open presale without vouchers – will start in a staggered manner on three

Re: [tor-relays] most (>57% cwfr) of the tor network still vulnerable to CVE-2016-8860 - update your relay!

2016-10-26 Thread Alan
Thanks for the update, my main relay was vulnerable but i've patched it now to 0.2.8.9. My Raspberry Pi is running 0.2.5.12 -- is that ok? > just a reminder since most of the tor network (including some of the biggest operators) still runs vulnerable relays > >