Dear relay operators,
The next Tor relay operator meetup will happen on Saturday,
October 22 at 19.00 UTC.
## Where
BigBlueButton: https://tor.meet.coop/gus-og0-x74-dzn
## Agenda (WIP)
* Announcements
* Tor and Snowflake in Iran
* EOL rejection
* State of DoS attack
* New network
Get a signed proof from torproject that this was relay by time of abuse:
http://hctxrvjzfpvmzh2jllqhgvvkoepxb4kfzdjm6h7egcwlumggtktiftid.onion/exonerator.html?ip=87.118.96.154=2022-09-09
This Relay is in Question?
Hey SG,
thats great news, regarding reduction of nodes running Outdated versions.
From time to time torproject needs removing not only a few
EOL relays just because, they running a left alone Outdated version.
Merci
Jonfri
Sarthik Gupta:
Hello everyone,
As we all know, nodes are the building
I was tired of using the debian testing for running my node and decided
to redo my node with arch because of the fast package updates and
rolling release model.
If that is related to tor updates, you may like the official tor
repositories for quicker tor update supply:
find onion version of pad here:
http://kfahv6wfkbezjyg4r6mlhpmieydbebr5vkok5r34ya464gqz6c44bnyd.onion/p/tor-relay-meetup-may-2022-keep
:)
OpenPGP_0x4A148E3AB438EC68.asc
Description: OpenPGP public key
OpenPGP_signature
Description: OpenPGP digital signature
Hi,
to saturate most of this bandwidth, you perhaps like to run multiple tor
instances. Because mostly single core tor is cpu bottleneck.
2x tor per single IPv4 allowed for now.
in current c tor we only got minimal TLS options:
# HardwareAccel HardwareAccel 0|1
# If non-zero, try to use
Am 12.04.2022 um 16:23 schrieb Bauruine:
The tor-spec [1] shows that Tor only uses RSA with 1024 Bit Keys and the
ciphersuits only contain AES CBC and no AES GCM ones. I'm not an expert
but it looks like it's not that useful for Tor.
Yes and no? The limitation only apply tor protocol crypto
yes, found:
[warn] {PROTOCOL} Received a bad CERTS cell: Link certificate does not
match TLS certificate
[warn] {PROTOCOL} Received a bad CERTS cell on OR connection
(handshaking (Tor, v3 handshake)) with 77.171.80.188:443
ID=w0FFB+Yb8+RM2KumjnKL4T/hI64CWhRBcVpBQRC0soo
apt update ; apt install tor apt-transport-tor -y
sed -i
's/https:\/\/deb.debian.org/tor+http:\/\/2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/g'
/etc/apt/sources.list
sed -i
Hey Paul,
I searched the relay name on metrics and found it seems to be running
for almost about 4 years until today.
http://hctxrvjzfpvmzh2jllqhgvvkoepxb4kfzdjm6h7egcwlumggtktiftid.onion/rs.html#details/9C5AFD49AAE4E0272BAD780C6DD71CE1A36012A6
That's looks like a useful one since it allows
Hi,
the graph shows a marked difference between written bytes per second and
read bytes per second om 2022-05-19 and 2022-05-20. In any other day the
bytes are roughly the same. What might my node have "written" on those
two days?
could be directory answers. Or being chosen as hsdir for
the bridge may just should not run on the IP the second level domain A /
resolves to.
li...@for-privacy.net:
On Sunday, May 29, 2022 6:25:02 PM CEST nusenu wrote:
AROI support for bridges
You can also protect your bridge ContactInfo against spoofing now.
The same fields as for relays
Keifer Bly:
Hi all,
So upon trying all of the mentioned commands, my tor installation still
encounters an error when trying to update. Attached is a photo of my
sources.list.debian.templ and sources.list. When trying to update the
returned error
N: Ignoring file 'DEADJOE' in directory
if the bridge is an tor instance, it may reside inside:
/var/lib/tor-instances/bridge01/keys/
or similiar depending on what you named it :)
tor-relays:
Hello,
I have a bridge [1] that doesn't have any keys in /var/lib/tor/keys!
How is that possible and how do I fix the problem?
potlatch
Hi Gary,
wait, your Relays are BadMiddle Nodes! It breaks at least all onion
features.
Thanks for trying to saturate the connection by balancing the
single-core tor bottleneck.
But think of any client try to establish RendezvousPoints or
IntroductionPoints or fetch HsDir with one of your
15 matches
Mail list logo