On Mon, Sep 2, 2013 at 1:28 PM, Gordon Morehouse wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> So in the documentation:
>
> UserspaceIOCPBuffers 0|1
> If IOCP is enabled (see DisableIOCP above), setting this option to 1
> will tell Tor to disable kernel-space TCP buffers, in order
Here is what Top on our Tor relay is doing today:
PID USER PR NI VIRT RES SHR S %CPU %MEMTIMECOMMAND
1163 _tor 20 0 628m 286m 34m R 106.3 15.3 4693:47 tor
Logs filled with:
Sep 03 04:12:20.000 [warn] Your computer is too slow to handle this
many circuit creation re
On 9/3/13 5:59 AM, eliaz wrote:
> On 9/2/2013 11:59 AM, Steve Snyder wrote:
>> On 09/02/2013 10:02 AM, Kostas Jakeliunas wrote:
>>> [1]: http://globe.rndm.de/
>>
>> Having this tool on an unencrypted HTTP site doesn't seem safe to me.
>> Anybody can sniff the bridge IP addresses that users submit f
On 9/2/13 6:20 PM, eliaz wrote:
> On 9/2/2013 10:02 AM, Kostas Jakeliunas wrote:
>> Perhaps you're using it yourself, but one of the ways to probe Onionoo in a
>> user-friendly way is the new Globe tool [1]. It includes bridges as well as
>> relays.
>>
>> [1]: http://globe.rndm.de/
>
> Thanks for
On 9/2/13 5:59 PM, Steve Snyder wrote:
>
>
> On 09/02/2013 10:02 AM, Kostas Jakeliunas wrote:
> [snip]
>> Perhaps you're using it yourself, but one of the ways to probe Onionoo
>> in a user-friendly way is the new Globe tool [1]. It includes bridges as
>> well as relays.
>>
>> [1]: http://globe.r
On 9/2/13 5:52 PM, eliaz wrote:
> On 9/2/2013 9:58 AM, Karsten Loesing wrote:
>> On 9/2/13 3:52 PM, eliaz wrote:
>>> Been having a devil fo a time keeping my bridge up this week. One
>>> question: With the bridge up & running, & the map showing it connecting
>>> to circuits, why is onionoo reportin