Re: [tor-relays] bridge pool assignments

2014-12-26 Thread eliaz
isis: > eliaz transcribed 0.9K bytes: >> Can a bridge carry client traffic even though the bridge hasn't been >> assigned to a pool? [snip] >> As I recall, for previous restarts I've seen pool assignments within >> a few hours. [...] But this last restart has been running two weeks >> and the bridg

Re: [tor-relays] News reporting exit node attacks

2014-12-26 Thread lizards
Huge amount of relays does not a Sybil attack make. > There's no evidence to believe the attackers have used a 0-day against > Tor. They have attempted a Sybil attack by trying to throw a huge amount > of relays in, nothing more. > > On December 26, 2014 9:03:30 PM EST, Austin Bentley wrote: >>Sor

Re: [tor-relays] News reporting exit node attacks

2014-12-26 Thread Colin Mahns
There's no evidence to believe the attackers have used a 0-day against Tor. They have attempted a Sybil attack by trying to throw a huge amount of relays in, nothing more. On December 26, 2014 9:03:30 PM EST, Austin Bentley wrote: >Sorry about that, here's the news article: >http://yro.slashdo

Re: [tor-relays] News reporting exit node attacks

2014-12-26 Thread Austin Bentley
Sorry about that, here's the news article: http://yro.slashdot.org/story/14/12/26/2155252/lizard-squad-targets-tor On Fri, Dec 26, 2014 at 8:02 PM, Austin Bentley wrote: > Anyone have any more information on any of this stuff? They claim it's a > 0day but I have yet to see proof. > > > > > _

Re: [tor-relays] News reporting exit node attacks

2014-12-26 Thread Austin Bentley
News article: On Fri, Dec 26, 2014 at 8:02 PM, Austin Bentley wrote: > Anyone have any more information on any of this stuff? They claim it's a > 0day but I have yet to see proof. > > > > > ___ tor-relays mailing list tor-relays@lists.torproject.org ht

[tor-relays] News reporting exit node attacks

2014-12-26 Thread Austin Bentley
Anyone have any more information on any of this stuff? They claim it's a 0day but I have yet to see proof. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] OT: folding@home

2014-12-26 Thread Sebastian Urbach
On December 26, 2014 11:31:18 PM Josef 'veloc1ty' Stautner wrote: Hi, Seems like you have to use a graphical environment. Is there any client for headless installations? Yes, there are 3 packages for Unixish systems. The client itself, the viewer and the controller. Just use the client pac

Re: [tor-relays] OT: folding@home

2014-12-26 Thread Josef 'veloc1ty' Stautner
Seems like you have to use a graphical environment. Is there any client for headless installations? ~Josef Am 26.12.2014 um 23:09 schrieb Larry Brandt: > This is a worthwhile project aimed at diseases such as cancer, > Alzheimers, Parkinson's. Takes little internet bandwidth and only 600 > MB me

Re: [tor-relays] OT: folding@home

2014-12-26 Thread Larry Brandt
This is a worthwhile project aimed at diseases such as cancer, Alzheimers, Parkinson's. Takes little internet bandwidth and only 600 MB memory (amd64) but is a cpu hog. Each distributed project takes 1-3 days to calculate. Works via browser ports. LB On 12/26/2014 9:55 AM, Sebastian Urbach

Re: [tor-relays] Possible DDoS

2014-12-26 Thread Jean-Philippe Décarie-Mathieu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey, My guard node was DDoS'd for about 15 minutes on December 17. My inner paranoid thought this was related to the ongoing crackdown on hidden services (from the authorities, or whoever else) but now I'm not so sure. Regards, - -- Jean-Philippe D

[tor-relays] OT: folding@home

2014-12-26 Thread Sebastian Urbach
Dear list members, I would like to invite any operator, who has some idle Cores (CPU or GPU) left,to join the folding@home distributed computing project: http://folding.stanford.edu/ There is now a brandnew team called Tor Project (Unofficial) with the id 227615. Hope to see some of you ther

Re: [tor-relays] Possible DDoS

2014-12-26 Thread tor-admin
On Friday 26 December 2014 15:48:20 Christian Burkert wrote: > Furthermore, I wondered if the attackers were attracted to my system > because of the Tor service, or were just randomly picking targets. > But from your previous descriptions, I rather deduce that it is more > like the latter, rather r

Re: [tor-relays] Possible DDoS

2014-12-26 Thread Christian Burkert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Firstly, thanks for your advise. Since I'm personally fed up with this provider, I'll move my Tor node anyway. This last DDoS handling was just the last straw. But before I discourage others from choosing this hosting provider, I wanted to check th

Re: [tor-relays] bridge pool assignments

2014-12-26 Thread isis
eliaz transcribed 0.9K bytes: > Can a bridge carry client traffic even though the bridge hasn't been > assigned to a pool? > > This is evidently the case for my bridge. It's been running for quite a > while and registering respectable bandwidth and client use. Uptime has > been near 100%. The only

Re: [tor-relays] Possible DDoS

2014-12-26 Thread Julien ROBIN
Hi, My advice is to try to ask them is they are OK to let you a second chance to let your relay running. Tell them that if such a big attack happen again so you shut it down and you don't disturb them anymore with it. Also, a "Good Point" to get if it's not already done, set your reverse DNS to

Re: [tor-relays] Possible DDoS

2014-12-26 Thread Tom van der Woerdt
Sebastian Urbach schreef op 26/12/14 om 14:05: On December 26, 2014 12:41:51 PM Christian Burkert wrote: Hi, I'm running a non-exit Tor node for a few months now on a virtual server hosted in a professional datacenter. Thank you ! Yesterday, December 25th, the support wrote me, that my se

Re: [tor-relays] Possible DDoS

2014-12-26 Thread Sebastian Urbach
On December 26, 2014 12:41:51 PM Christian Burkert wrote: Hi, I'm running a non-exit Tor node for a few months now on a virtual server hosted in a professional datacenter. Thank you ! Yesterday, December 25th, the support wrote me, that my server is under a DDoS attack with 2GBit/s lasting

[tor-relays] Possible DDoS

2014-12-26 Thread Christian Burkert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi *, I'm running a non-exit Tor node for a few months now on a virtual server hosted in a professional datacenter. That's the node: https://globe.torproject.org/#/relay/4C246EA9C950B872FD77F761CEAAB41D93D9764D Yesterday, December 25th, the suppor