isis:
> eliaz transcribed 0.9K bytes:
>> Can a bridge carry client traffic even though the bridge hasn't been
>> assigned to a pool?
[snip]
>> As I recall, for previous restarts I've seen pool assignments within
>> a few hours. [...] But this last restart has been running two weeks
>> and the bridg
Huge amount of relays does not a Sybil attack make.
> There's no evidence to believe the attackers have used a 0-day against
> Tor. They have attempted a Sybil attack by trying to throw a huge amount
> of relays in, nothing more.
>
> On December 26, 2014 9:03:30 PM EST, Austin Bentley wrote:
>>Sor
There's no evidence to believe the attackers have used a 0-day against Tor.
They have attempted a Sybil attack by trying to throw a huge amount of relays
in, nothing more.
On December 26, 2014 9:03:30 PM EST, Austin Bentley wrote:
>Sorry about that, here's the news article:
>http://yro.slashdo
Sorry about that, here's the news article:
http://yro.slashdot.org/story/14/12/26/2155252/lizard-squad-targets-tor
On Fri, Dec 26, 2014 at 8:02 PM, Austin Bentley wrote:
> Anyone have any more information on any of this stuff? They claim it's a
> 0day but I have yet to see proof.
>
>
>
>
>
_
News article:
On Fri, Dec 26, 2014 at 8:02 PM, Austin Bentley wrote:
> Anyone have any more information on any of this stuff? They claim it's a
> 0day but I have yet to see proof.
>
>
>
>
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
ht
Anyone have any more information on any of this stuff? They claim it's a
0day but I have yet to see proof.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On December 26, 2014 11:31:18 PM Josef 'veloc1ty' Stautner
wrote:
Hi,
Seems like you have to use a graphical environment.
Is there any client for headless installations?
Yes, there are 3 packages for Unixish systems. The client itself, the
viewer and the controller. Just use the client pac
Seems like you have to use a graphical environment.
Is there any client for headless installations?
~Josef
Am 26.12.2014 um 23:09 schrieb Larry Brandt:
> This is a worthwhile project aimed at diseases such as cancer,
> Alzheimers, Parkinson's. Takes little internet bandwidth and only 600
> MB me
This is a worthwhile project aimed at diseases such as cancer,
Alzheimers, Parkinson's. Takes little internet bandwidth and only 600
MB memory (amd64) but is a cpu hog. Each distributed project takes 1-3
days to calculate. Works via browser ports.
LB
On 12/26/2014 9:55 AM, Sebastian Urbach
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey,
My guard node was DDoS'd for about 15 minutes on December 17. My inner
paranoid thought this was related to the ongoing crackdown on hidden
services (from the authorities, or whoever else) but now I'm not so sure.
Regards,
- --
Jean-Philippe D
Dear list members,
I would like to invite any operator, who has some idle Cores (CPU or GPU)
left,to join the folding@home distributed computing project:
http://folding.stanford.edu/
There is now a brandnew team called Tor Project (Unofficial) with the id
227615. Hope to see some of you ther
On Friday 26 December 2014 15:48:20 Christian Burkert wrote:
> Furthermore, I wondered if the attackers were attracted to my system
> because of the Tor service, or were just randomly picking targets.
> But from your previous descriptions, I rather deduce that it is more
> like the latter, rather r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Firstly, thanks for your advise.
Since I'm personally fed up with this provider, I'll move my Tor node
anyway. This last DDoS handling was just the last straw.
But before I discourage others from choosing this hosting provider, I
wanted to check th
eliaz transcribed 0.9K bytes:
> Can a bridge carry client traffic even though the bridge hasn't been
> assigned to a pool?
>
> This is evidently the case for my bridge. It's been running for quite a
> while and registering respectable bandwidth and client use. Uptime has
> been near 100%. The only
Hi,
My advice is to try to ask them is they are OK to let you a second chance to
let your relay running. Tell them that if such a big attack happen again so you
shut it down and you don't disturb them anymore with it.
Also, a "Good Point" to get if it's not already done, set your reverse DNS to
Sebastian Urbach schreef op 26/12/14 om 14:05:
On December 26, 2014 12:41:51 PM Christian Burkert
wrote:
Hi,
I'm running a non-exit Tor node for a few months now on a virtual server
hosted in a professional datacenter.
Thank you !
Yesterday, December 25th, the support wrote me, that my se
On December 26, 2014 12:41:51 PM Christian Burkert wrote:
Hi,
I'm running a non-exit Tor node for a few months now on a virtual server
hosted in a professional datacenter.
Thank you !
Yesterday, December 25th, the support wrote me, that my server is
under a DDoS attack with 2GBit/s lasting
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi *,
I'm running a non-exit Tor node for a few months now on a virtual server
hosted in a professional datacenter.
That's the node:
https://globe.torproject.org/#/relay/4C246EA9C950B872FD77F761CEAAB41D93D9764D
Yesterday, December 25th, the suppor
18 matches
Mail list logo