On 01/13/2014 11:40 PM, I wrote:
> The question is from an ab initio in Linux, servers and Tor guts and
> Tor's security integrity.
> I am asking from the point of view of running more than one Tor thingy
> on one server at one ip address.
> It has been said it is bad to run a Tails torrent and a
Quoth Wollomatic , on 2014-01-14 00:29:39 +0100:
> Since I thought Tor only uses TCP may this be a security problem with my
> server?
Since UDP is a connectionless datagram protocol, there is no
distinguished "listening" state. It seems more likely that those are
sockets for outgoing DNS requests
Dear all,
i run a tor relay (version 0.2.4.20) on debian wheezy. Today I noticed
Tor uses some UDP ports:
# netstat -tulpen
tcp0 0 0.0.0.0:90300.0.0.0:*
LISTEN 0 4669231126643/tor
tcp0 0 0.0.0.0:90010.0.0.0:*
LISTEN 0
Moritz,
Inarticulate I may be... but my intention is to expand Tor's contribution to
people power.
The question is from an ab initio in Linux, servers and Tor guts and Tor's
security integrity.
I am asking from the point of view of running more than one Tor thingy on one
server at one ip addre
On 01/13/2014 08:19 PM, I wrote:
> How would I know that it is alright to run more than one instance of Tor?
VPS providers usually don't restrict how many processes you run. Some
don't like if you use too many resources, as overselling is part of
their business model. But how would I know? When in
On 01/13/2014 08:48 PM, Thomas Themel wrote:
> Still, any theories on how that would reduce
> my per-bandwidth CPU consumption?
No clue. Magic is happening inside Tor. :)
--
Moritz Bartl
https://www.torservers.net/
___
tor-relays mailing list
tor-relay
Hi Moritz,
Excerpts from Moritz Bartl's message of Mon Jan 13 19:30:05 +0100 2014:
> First of all, if you don't limit your relay bandwidth and hit CPU
> limits, this will have a negative impact for Tor users. So you should
> always make sure that CPU (single core!) usage stays well below 100%. An
>
Moritz,
How would I know that it is alright to run more than one instance of Tor?
Is it possible to prevent cpu use from causing VPS businesses threatening
suspension?
Robert
> First of all, if you don't limit your relay bandwidth and hit CPU
> limits, this will have a negative impact for Tor
Alan,
They did nothing about twelve exits without the restricted port list for two
months possibly because they were Windows ones through an agent.
It was unluckily during the botnet problem and they used to go off daily I
think because of the cpu load.
OVH must be have able to discern that th
On 01/13/2014 04:37 PM, Thomas Themel wrote:
> I've been running two nodes on the same machine for some time because I was
> unable to get enough throughput to blow through my bandwidth budget
> otherwise.
> However, something seems to have changed recently, since right now I'm
> blasting
> thro
Hi,
I've been running two nodes on the same machine for some time because I was
unable to get enough throughput to blow through my bandwidth budget otherwise.
However, something seems to have changed recently, since right now I'm blasting
through about double my usual bandwidth (~25 MB/s) with
I ran an non-exit relay on an OVH dedi for months and no one batted an
eyelid.
good luck
On 13 Jan 2014 14:26, "Alan Turing" wrote:
> Dear all,
> I am currently running a fairly large tor relay (no exit, due to OVH's
> restrictive policies) and would like to know if other people have made
> expe
Dear all,
I am currently running a fairly large tor relay (no exit, due to OVH's
restrictive policies) and would like to know if other people have made
experiences with running non-exit relays using OVH's services.
Did any contracts get canceled or did you receive any kind of (legal)
threats by OVH
13 matches
Mail list logo