can't do this, then
donate a sum (say $5 a month) to the tor project who will use it to
provide additional bandwidth.
Every little helps.
Mick
-
blog: baldric.net
fingerprint: E8D2 8882 F7AE DEB7 B2AA 9407 B9EA 82CC 1092 7423
I assume you mean IP address rather than port here.
Despite offering, I wasn't given the opportunity to do that.
Interesting that you also seem to have been used in targetting the
brazilian government.
Mick
-
blog
On Tue, 22 May 2012 16:21:46 -0500
Jon torance...@gmail.com allegedly wrote:
The port was 57734 - of course that doesn't mean another port could
be used
That looks like a source port to me. In my case, the (allegedly)
attacked ports were 80, so clearly webservers.
Mick
days.
There are a number of approaches. I am running vnstat for this
purpose.
Plus one for vnstat from me.
And you /really/ want to throttle your node if you are going that much
over your allowance.
Mick
-
blog: baldric.net
) of exit policy in tor to allow domain based formulations
like:
reject *.gmail.com
reject *aol.com
etc.
Mick
-
blog: baldric.net
fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
Note that I have recently upgraded my
believe I'm the only node
being poked.
Cheers
Mick
-
blog: baldric.net
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
-
signature.asc
On Sat, 29 Dec 2012 22:07:59 +
mick m...@rlogin.net allegedly wrote:
I shut tor down while I investigated and when running nethogs I
noticed a shed load of attempted connections to my tor port (443) from
non-tor addresses. A snapshot is at
http://rlogin.net/tor/incoming.png
Anyone
On Sat, 29 Dec 2012 21:44:35 -0500
Matthew Finkel matthew.fin...@gmail.com allegedly wrote:
How long does it take from the time a node is shut down to the point
where no-one will attempt to connect through it?
Mick
Hi Mick,
Technically clients will attempt to use your node until
On Sun, 30 Dec 2012 12:33:45 +
mick m...@rlogin.net allegedly wrote:
Ho Hum. Time to look for another provider.
And in looking at alternatives I found this
http://stormvz.com/terms.html
on one site. The fourth prohibited usage item, lumps Tor in with
Phishing Sites and Proxy Scanners
this for free.
Mick
-
blog: baldric.net
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
-
signature.asc
Description: PGP signature
as a suitable maximum
rate which will allow my node to provide maximum utility to the tor
network without falling over?
Many thanks in advance.
Mick
-
blog: baldric.net
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
with the configuration to prevent tor outpacing the VPS.
Cheers
Mick
-
blog: baldric.net
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
the service to their needs.
So - prices /will/ go up and/or bandwidth allowance /will/ go down.
Best
Mick
-
blog: baldric.net
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
browsing
which is decidedly asymmetric - small outbound requests result in much
larger inbound responses. Won't an exit relay reflect that as it is the
last hop before the actual target site?
Mick
-
blog: baldric.net
gpg
story. I did make a test file if anyone has the connection and 1GB of
bw to try please let me know what you get
http://torexit2.mttjocy.co.uk/1GBtest.bin
Here you go: http://rlogin.net/tor/torexit2.txt
Deeply unscientific, but real world.
Mick
more
tests. Digital Ocean sell their droplets by the hour. So you could
easily fire up a test VM for less than the cost of a coffee and
doughnuts...
Mick
-
blog: baldric.net
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F
be
occasionally allowed in peak times, not a credit limit. If you're
sure your description is correct, I may need to reconfigure my node.
Errr. Me too.
My RelayBandwidthBurst limit is set on the assumtion that that is the
max I will ever see (and allow).
Confused.
Mick
On Tue, 9 Apr 2013 18:01:40 +0100
mick m...@rlogin.net allegedly wrote:
Though personally I'm with Romanov here.
Correction. Roman (forgive me Roman).
Mick
-
blog: baldric.net
gpg fingerprint: FC23 3338 F664 5E66 876B
/wiki/PluginCat
beware that the old munin exchange site has disappeared.
Mick
-
blog: baldric.net
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
with source port 9050. Without a lot more detail
about configuration, and the exact details of the reporting from
CERT-FI it is difficult to make any assumptions.
If I were Steve, I would contact CERT-FI directly for more information.
They are likely to be very helpful.
Mick
On 2013-07-10 15:57
it a bridge.)
Hmm. Pretty crummy AUP. And /very/ crummy treatment of a customer.
I wonder if we are going to see more of this sort of thing now. I
think the tor network needs greater geographic diversity.
Mick
-
Mick Morgan
On Sat, 3 Aug 2013 16:54:20 -0400
George Herndon ghern...@eyeontech.com allegedly wrote:
i'm happy with digitalocean
George Herndon
ghern...@eyeontech.com
And so am I - for a relay. DO are not very keen on exits. See
https://www.digitalocean.com/community/questions/tor
Mick
to make Tor resistant to evil usage.
Tor is neutral. You and I may agree that certain usage is unwelcome,
even abhorrent, but we cannot dictate how others may use an anonymising
service we agree to provide. If you have a problem with that, you
probably should not be running a tor node.
Best
Mick
On Tue, 27 Aug 2013 11:08:34 -0500
Jon Gardner j...@brazoslink.net allegedly wrote:
On Aug 22, 2013, at 11:56 AM, mick m...@rlogin.net wrote:
Tor is neutral. You and I may agree that certain usage is unwelcome,
even abhorrent, but we cannot dictate how others may use an
anonymising
.
No, you can't be sure. That request could quite well be totally
legitimate; you are not in a position to judge for the site owner.
Absolutely true. I could be using tor to test my own website's security
mechanisms. In fact, I /have/ used tor to test my own websites..
Best
Mick
of flesh
coloured packets to the total or some such nonsense. Second order
problem - define flesh coloured.)
Best
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
But I'd recommend against running it on your relay. If you have free
capacity elsewhere then I'm sure the guys at tails would be happy to
hear from you.
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0
to the massive jump in connected clients
in the past few days and I assume that everyone else is seeing
something similar.
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
MBytes
RelayBandwidthBurst 125 MBytes
Both relays are exactly the same, except for the IPv4 adress.
Neither relay shows any family members. That /may/ cause a problem
since they are obviously related.
Mick
-
Mick Morgan
ended in October 2012.
So. How does this square with BBG's alleged support for financing new
fast exit relays?
https://lists.torproject.org/pipermail/tor-relays/2013-September/002824.html
Best
Mick
-
Mick Morgan
gpg
On Sun, 20 Oct 2013 12:40:52 -0800
I beatthebasta...@inbox.com allegedly wrote:
Mick,
Is Serverstack.nl particularly pro-tor exit nodes?
By the front page it would seem so.
Robert
Heh! I hadn't seen that before. (Though take a look at serverstack.com
for a more, erm, normally corporate
dropping everything, though, as it makes
troubleshooting very difficult - just drop connections to ports which
get attacked.
I disagree. Dropping all traffic other than that which is explicitly
required is IMHO a better practice. (And how do you know in advance
which ports get attacked?)
Best
Mick
On Wed, 06 Nov 2013 14:00:15 +0100
Jeroen Massar jer...@massar.ch allegedly wrote:
On 2013-11-06 13:47 , mick wrote:
On Wed, 06 Nov 2013 14:00:09 +0200
Lars Noodén lars.noo...@gmail.com allegedly wrote:
On 11/06/2013 01:26 PM, mick wrote:
I disagree. Dropping all traffic other than
be corrected very quickly.
Why pay a CA if you don't trust the CA model?
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
On Sat, 9 Nov 2013 21:30:13 +0600
Roman Mamedov r...@romanrm.net allegedly wrote:
On Sat, 9 Nov 2013 12:50:18 +
mick m...@rlogin.net wrote:
I don't see any problem per se with a self-signed certificate on a
site which does not purport to protect anything sensitive (such as
financial
.
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
-
signature.asc
Description: PGP signature
small ability I may have by sharing on /my/ experience.
I am a firm believer in the maxim that the only dumb question is the
one you didn't ask.
Best
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B
VPS provider (DigitalOcean) that they were happy. They have said that
they see no problem, and even if they do later spot an issue they will
take no precipitate action because of my prior alert to them.
So. guard relay 0xbaddad now has the script running.
Mick
(with default settings) in just over 3.5 days. I've just kicked off a
second run.
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
addresses have to be visible to be reachable.
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
/2014/02/03/nhs_choices_website_serves_up_100s_of_pages_of_malware/
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
=192.254.168.26
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
-
signature.asc
Description: PGP
ssh from the standard port can be a good
idea. Whilst offering no more than security through obscurity against
a determined adversary it does at least provide some protection against
the mindless robots which constantly probe port 22.
Every little helps.
Mick
and restarted so I too now have a shiny a new
relay).
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
that.
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
-
signature.asc
Description: PGP signature
___
tor-relays mailing list
bet that Ross uses Tor, and
he almost certainly has experience in dealing with awkward parts of
HMG.
Best
Mick
-
NHS address
NHS Connecting for Health
Informatics Directorate
Department of Health
Princes Exchange
Princes Square
Leeds
West Yorkshire
LS1 4HY
permissions related so if you would
like to fix this then run arm with the same user as tor (ie, sudo -u
tor user arm).
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
on DO (plus two tails/whonix mirrors) and would be
concerned if their policy is hardening against Tor.
Best
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
as a form of
email obfuscation.
I have seen images (usually PNG) being used - but then I have also
seen that ruined by the use of the mailto: tag around the image.
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66
/torusers.html.en no longer exists)
I also notice that
https://tor-svn.freehaven.net/svn/tor/trunk/contrib/exitlist cannot be
reached at all and the same page over http seems not to exist.
If other operators are similarly using a page based on the old
template, they may wish to update.
Best
Mick
ust brought in a mandatory data retention law in
> April/October 2015.
>
Any idea where that concentration of 16 relays South of Ghana in the
Gulf of Guinea is? The traffic there seems disproportionate to the size
of the location.
Mick
(Beautiful an
On Thu, 15 Oct 2015 17:11:23 -0400
starlight.201...@binnacle.cx allegedly wrote:
> Choices are not simple.
>
Never have been. And they get tougher over time. Trust me.
-----
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E6
. If any of those volunteers choose to help fellow
list members, then good for them. However, if list posters whine and
castigate others then they should not be surprised if no-one helps in
future.
Mick
-
Mick Morgan
gpg
et "in china".
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.net
-
signature.asc
Description: PGP signature
w. They
know it, they are happy, so am I.
Mic
-----
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http:/
tries. I have a
> Tor relay in Moldavia, for example (MivoCloud).
>
But note that Mivocloud's ToS specifically says:
"2.11 The Services may be used only for lawful purposes. MivoCloud
strictly prohibits:
Tor Exit relays;
SPAM;
any kind of DoS;
Scam, Malware, B
authorities. Recommended versions are:
0.2.4.27,0
.2.4.28,0.2.5.12,0.2.5.13,0.2.7.6,0.2.7.7,0.2.8.9,0.2.8.10,0.2.8.11,0.2.8.12,0.2.9.9,0.3.0.2-alpha,0.3.0.3-alpha
Attempting an upgrade from 0.2.9.8 I get nothing.
Mick
-
Mick Morgan
gpg fingerprint: FC23 3
Sorry, I thought I had. I must have hit the wrong reply button. Now copied in.
Apologies for the top post...On 9 Feb 2017 21:58, Roger Dingledine wrote: >
> On Thu, Feb 09, 2017 at 09:57:03PM +, mick wrote: > > Done > > > > Now
running 0.2.9.9. > > Thanks!
e done. It is much appreciated.
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
that any other services you run
on the Tor node actually weaken the security of that node. Every service
you run on a server increases the attack surface. If your Tor node
happens to be running an insecure (or badly configured, or both) FTP
server, for example, then it could be compromis
ictory. Placing
the report on-line /anywhere/ constitutes publication. And since the
report is widely reachable it will by now have been cached by search
engines.
Best
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B
On 11 January 2017 12:28:44 GMT+00:00, Ralph Seichter
<tor-relays...@horus-it.de> wrote:
>On 11.01.2017 06:30, Roman Mamedov wrote:
>
>Roman, you nailed it. The "September that never ended" is now well into
>its 24th year,
Ralph
You are showing your age...
+1 t
him for that agreement. I
am also exceptionally grateful for the continued ability to provide my
Tor node to the community at its current usage level without
incurring the sort of financial penalty I could have expected.
My thanks to all at DO and to Rafael in particular for this.
Mick
--
wall (a la teor
recommendations) and I'm getting fewer complaints in my log now.
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://baldric.n
ne). I don't recall
seeing that level of connections in the past.
If anyone wants more info, let me know.
Best
Mick
-
Mick Morgan
arly 20th century headline in the Times newspaper:
"Fog in channel. Europe isolated."
(Apologies)
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
https://baldr
i-bin/mailman/listinfo/tor-relays
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
http://ba
Apr '18 8.38 TiB |8.37 TiB | 16.76 TiB | 67.94 Mbit/s
+-+-+---
estimated 10.26 TiB | 10.24 TiB | 20.50 TiB |
Mick
-----
Mick Morgan
gpg fingerprint: FC23 3338 F
eir smallest model--will cost
> an extra 10 USD. Who has that kind of money?
>
Not me. I think I'm immensely lucky to get the service I do.
Mick
-----
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD
d we /have/ to trust someone, somewhere, somehow,
sometime. What everyone has to decide for themselves is /how much/ trust
to give, to whom, when, where and why. And that depends entirely on your
threat model and your appetite for risk.
Mick
ateful that it exists and that there
are people prepared to defend it.
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
https://baldric.net/about-
-++
> 14 rows
>
> 14*3=42
>
> This should become a new OrNetRadar detector.
>
And given ColoCrossings advertised prices, even using single servers
that amounts to nearly $840 pcm or over $
d AUP (2) and decide for themselves whether they will be affected.
My other guard relay at sink.rlogin.net on Hetzner's network will
continue in operation.
Mick
(1) https://www.digitalocean.com/legal/terms-of-service-agreement/
(2) https://www.digitalocean.com/legal/a
I shut it down before the automated charge kicks in.
Mick
-----
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D3
Remote Management. But they don't
> allow exit. https://servdiscount.com/
>
> ¹15% discount is forever.
>
I haven't run an exit in over 8 years - I got too much aggravation, but
I will look at setting up another relay. I'll
are /very/ expensive in terms of
bandwidth if you go over their 1TB limit.
Mick
-----
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
https://baldric.net/abo
with OVH and currently DO) are
overrepresented and it would be better to find alternatives.
Best
Mick
-
Mick Morgan
gpg
traffic.
I bouught two VPS from them about a month ago and they have confirmed
that they are OK with Tor nodes, but probably NOT exits. (In their words
to me "As long as we will not receive any abuse complaints, then there
should be no problems.")
Abuse comp
On Mon, 21 Dec 2020 00:15:49 +0100
li...@for-privacy.net allegedly wrote:
> On 18.12.2020 17:33, mick wrote:
>
> > So - you can get a twin core VPS with 2 Gig of RAM and 3500 gig of
> > traffic allowance for less than $20.00 for a /year/. Spend a little
> > more
&
4:30:00.000 [warn] Possible compression bomb; abandoning stream.
Nov 02 04:30:01.000 [warn] Possible compression bomb; abandoning stream.
Time is GMT.
Cheers
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0
and I am grateful for that, but I
have never been at all clear what your role is and how it is connected
to the core project.
Regards
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312
https:/
ons
>
> Sebastian Urbach
>
Please don't do that Sebastian, The world needs Tor relays.
I too have found the discussions of the past few days problematic. But
please, please do not shut down your relays. That would hurt users
contact address to your relay(s). It will help the
project, and will hardly hurt you at all.
Best
Mick
--
Sent from a mobile device. Please excuse my brevity.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-
ed address then this proposal could be problematic
for some.
Mick
-
Mick Morgan
gpg fingerprint: FC23 3338 F664 5E66
84 matches
Mail list logo