Hi,
I've realized the meaning of your "anonymous" DNS:
I see you're also running two tor "exits". I write "exit" in inverted
commas because you're only allowing port 53 open:
172.98.193.43 corresponds to
https://atlas.torproject.org/#details/5E56738E7F97AA81DEEF59AF28494293DFBFCCDF
162.248.241.
> On 7 Aug 2017, at 21:50, Ralph Seichter wrote:
>
> On 07.08.2017 08:32, teor wrote:
>
>> This would be a single point of failure (and possibly compromise).
>> We try to avoid those by having people involved in the updates.
>
> Since Tor configuration is text file based, I generally use Cron
No attitude or hurt feelings. What's different from my servers compared to
others? Probably nothing at all..this is just a hobby of mine. One would
think if I wanted to collect information I would just run an exit node
myself since I have the resources.
For those that want an alternative no loggi
Hi "Dennis",
I'm all for nameservers aimed at anonymous usage, albeit run in a
democratic and transparent manner.
However, your mail is enough to arouse significant suspicion.
One would suggest that a legitimate project like this would post to
public Tor mailing lists or similar places. You coul
Tom,
That's a completely false statement. Some folks would rather choose an
alternate root caching server as opposed to their ISP's DNS. In fact, no
logging and anonymity is the sole intention of the servers mentioned. You're
crying wolf here. If you don't want to use it, don't. Simple as that. I
On Mon, Aug 7, 2017 at 4:23 PM, Alexander Nasonov wrote:
> Andreas Krey wrote:
>> NSA: There are people excluding US exits? Just let's set some
>> of ours to india. (Where that is probably not their modus
>
> Tor enthusiasts: Hmm, advertised country doesn't match GeoIP, let's take
> a closer look
Andreas Krey wrote:
> NSA: There are people excluding US exits? Just let's set some
> of ours to india. (Where that is probably not their modus
Tor enthusiasts: Hmm, advertised country doesn't match GeoIP, let's take
a closer look ...
> When twitter notices one of their users always comes via tor
The DNS issue is in the "long tail" - rare/unique websites are unlikely to be
cached, yet they likely represent the most interesting targets.
I do agree that running dnsmasq (or a similar caching resolver) is probably
sufficient to make DNS attacks too unreliable to invest in. I am not sure why
...and what is dnscrypt supposed to do for a relay? where are the DNS
queries themselves supposed to come out?
i'm yet to hear why a big caching nameserver is insufficient. i'm
doing 30mb/s on an exit node. here's my rndc stats:
[View: internal]
86635983 IPv6 queries sent
I was wondering about how beneficial DNS Crypt or DNS Privacy would be
for relays. Is anyone using any kind of encryption for their DNS queries
on their relay?
https://networkfilter.blogspot.com/2017/04/be-your-own-vpn-provider-with-openbsd-v2.html#dns
shows how to set up multiple dnscrypt proxies
sorry, didn't received Alexander Dietrich's mail.
I deleted the page.
Today 21:00 is better.
C.f https://wiki.sha2017.org/w/Session:Tor_Relay_Operators_Meetup
Schroedinger:
> Hi,
>
> sorry for the late response.
>
> I'll try to organize the Pi tent for tonight 23:40. If I can't, let's
> meet
There is a self-organized session now:
https://wiki.sha2017.org/w/Session:Tor_Relay_Operators_Meetup
Cheers,
Alexander
Sent from my toasterOn Aug 5, 2017 5:46 PM, Alexander Færøy
wrote:
>
> On 1 August 2017 at 21:24, Schroedinger wrote:
> > if anyone at SHA2017 is interested in meeting up, per
Hi,
sorry for the late response.
I'll try to organize the Pi tent for tonight 23:40. If I can't, let's
meet infront and move somewhere else.
https://wiki.sha2017.org/w/Session:Tor_Relay_Operators_Meeting
Schroedinger:
> Hi relay operators,
>
> if anyone at SHA2017 is interested in meeting up,
On 07.08.2017 08:32, teor wrote:
> This would be a single point of failure (and possibly compromise).
> We try to avoid those by having people involved in the updates.
Since Tor configuration is text file based, I generally use Cron jobs to
pull shared config data from a central repository. The c
On Mon, 07 Aug 2017 08:41:31 +, Alexander Nasonov wrote:
...
> It sounds like a country should be set by an operator in torrc rather
> than relying on GeoIP.
NSA: There are people excluding US exits? Just let's set some
of ours to india. (Where that is probably not their modus
...
> Does Excl
:-(
If you got this mail as well, please don't fall for it. You'd be
exposing Tor users' browsing data.
Tom
Doorgestuurd bericht
Onderwerp: Your TOR relay
Datum: Sun, 6 Aug 2017 21:19:32 -0400
Van:Dennis Hannon
Aan:Dennis Hannon
Hello,
I came across your
teor wrote:
> For example, I run an exit in Canada, where some addresses were allocated
> from an Canadian block, and others were allocated from a US block. So if
> I wanted to, I could ORPort on a Canadian address, and Exit on a US one.
It sounds like a country should be set by an operator in tor
17 matches
Mail list logo