Re: [tor-relays] Relay Or/Dirport Unreachable

2020-03-21 Thread Andy Isaacson
On Fri, Mar 20, 2020 at 02:55:24PM -0700, Damian Johnson wrote: activities from the command line. First, "sudo apt install nyx". Second, as the user that will be running nyx, run "sudo adduser $USER debian-tor" to add your user to the debian-tor group so it can reach Tor's controlsocket. Then log

Re: [tor-relays] atlas.cogentco.com Is blocking

2017-10-18 Thread Andy Isaacson
On Thu, Oct 19, 2017 at 01:19:21AM +, Paul Templeton wrote: Whoever runs that node will need to talk to their ISP support team to get it unblocked. Thanks Andy - the reason I asked because its not with the Service Provider it's there upstream carrier - I have lodged a ticket with the carri

Re: [tor-relays] atlas.cogentco.com Is blocking

2017-10-18 Thread Andy Isaacson
On Wed, Oct 18, 2017 at 11:48:33PM +, Paul Templeton wrote: Has anyone come across a scenario where a carrier blocks IP traffic? atlas.cogentco.com is the point which drops any packet to 95.130.9.210 From where I sit it looks like .210 is null-routed. All of my ISPs drop the packets as s

Re: [tor-relays] spurios warning about using the nickname instead of the key

2017-10-10 Thread Andy Isaacson
On Tue, Oct 10, 2017 at 01:57:39PM +0100, Dylan Issa wrote: -BEGIN PGP MESSAGE- hQIMA5oaOC9qY3MtARAAv1ojcczJvyrAdevP0H6naW32dz0KieYrguTZJSmXHe2U wbk5hirrF5+IKek1zAT9wV2Rb7kjTuSwBrTEsTmfKIKatT6dFP9YnRrkX8syl8bV 1Bu1neznP6dTN6quInk754pKvcXZgL9f18Yqx7RMLiJE8OcLU52sdz3tI6UVz3Uh and pgpdump

Re: [tor-relays] About relay size

2017-09-29 Thread Andy Isaacson
On Fri, Sep 29, 2017 at 09:37:00AM +0200, IPonU wrote: I'm already running a small exit node (100Mbps bandwidth) and I'm ready to spend more money on it, so have a question for you guys : Thanks for running a relay! Is it better if I run other small ones (100Mbps too) or only 1 big exit relay

Re: [tor-relays] Force OpenSSL AES-NI usage on a VPS without the AES CPU flag passthrough

2017-09-06 Thread Andy Isaacson
On Wed, Aug 23, 2017 at 11:14:54AM +1000, teor wrote: On 22 Aug 2017, at 16:22, Roman Mamedov wrote: Hello, Today I found that it is possible to force OpenSSL enable the use of CPU AES acceleration even if it doesn't detect the "aes" CPU flag. This would be a great addition to tor/doc/TUNI

Re: [tor-relays] Tor relay operators at SHA2017 ?

2017-08-01 Thread Andy Isaacson
On Tue, Aug 01, 2017 at 07:24:00PM +, Schroedinger wrote: Hi relay operators, if anyone at SHA2017 is interested in meeting up, perhaps we could set up a self-organized session for Tor relay operators. I'll be at SHA, would love to meet up! -andy __

Re: [tor-relays] Exit relay funding

2016-03-08 Thread Andy Isaacson
On Tue, Mar 08, 2016 at 10:13:30AM -0800, Michael McConville wrote: > re...@mobtm.com wrote: > > > Sadly, I have to shut it down at least temporarily if no one can help me > > > pay for it. Is anyone interested? You can search the mailing lists to > > > see that I've been contributing for a few yea

Re: [tor-relays] Website no longer available from Tor

2014-11-21 Thread Andy Isaacson
On Fri, Nov 21, 2014 at 12:50:39PM -0500, grarpamp wrote: > > In your opinion why is not it more accessible? > > You asked four times. We can't see your systems > or your exits so we don't know. Indeed! You can increase the Tor client debugging level on the machine you're trying to TBB from, fin

Re: [tor-relays] List of Relays' Available SSH Auth Methods

2014-11-18 Thread Andy Isaacson
On Tue, Nov 18, 2014 at 10:09:37AM -0500, Libertas wrote: > Hi, everyone. Linked below is a list of relays that were live last night > along with the SSH authentication methods they support: [snip] > Generally, it is far more secure to allow only public key auth. This is great advice, and thanks f

Re: [tor-relays] Anonbox Project

2014-10-15 Thread Andy Isaacson
On Wed, Oct 15, 2014 at 01:33:43PM -0800, I wrote: > and if they were really into TOR why aren't they discussing it on this list? because they're like two guys who threw up a under-$10k kickstarter and had it completely explode under their feet, I suspect. Succeeding far beyond your dreams at cro

Re: [tor-relays] providers with AES-NI?

2014-07-25 Thread Andy Isaacson
On Fri, Jul 25, 2014 at 08:31:22AM -0700, Michael Ball wrote: > does anyone here know of any decent (and somewhat cheap) dedicated server > providers that offer AES-NI crypto acceleration? Nearly any host will be willing to quote you a price on a dedicated server with AES-NI, just write to them as

Re: [tor-relays] Ops request: Deploy OpenVPN terminators

2014-05-13 Thread Andy Isaacson
On Tue, May 13, 2014 at 05:09:50PM -0400, grarpamp wrote: > Ops request: Deploy OpenVPN terminators Anecdotally, the GFW blocks OpenVPN endpoints as well. -andy ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi

Re: [tor-relays] SSH scans from Tor exit

2014-04-29 Thread Andy Isaacson
On Mon, Apr 28, 2014 at 11:23:19PM -0400, Michael Wolf wrote: > Will they request that port 80 be blocked > because of the SQL injection and Wordpress vulnerability scans? Yes, in fact we do get requests for exactly that (mostly from misguided CERT type organizations). "We support anonymity, bu

Re: [tor-relays] Is Kaspersky right to be concerned?

2014-03-09 Thread Andy Isaacson
On Sun, Mar 09, 2014 at 12:21:11PM -0400, Tora Tora Tora wrote: > I am pretty sure the answer is "NO", but is there a way to "enhance" > Tor in such a way that a relay that does not host hidden services > can also choose not to carry traffic for hidden services? > those who want to use hidden servi

Re: [tor-relays] Single IP multiple OR Ports

2014-03-04 Thread Andy Isaacson
On Tue, Mar 04, 2014 at 01:00:15PM +0100, toxi roxi wrote: > i know that link and thats what i have done to setup intel aesni > acceleration - but it seems that this tweak is not available anymore on > ubuntu 13.10 thats what i've meant. As Moritz says, the *config* is removed, because aes-ni is n

Re: [tor-relays] Building on a Udoo Dual

2013-11-16 Thread Andy Isaacson
On Sat, Nov 16, 2013 at 12:09:50PM -0500, Richard Budd wrote: > Does anyone know if the Tor Project has sources for top that can be > compiled on a Udoo Dual? > It's running Ubuntu 11.10 (oneiric) on a ARMv7 processor. > I've tried following the instructions on > https://www.torproject.org/docs/deb

Re: [tor-relays] Relay-Bandwith

2013-11-09 Thread Andy Isaacson
On Sat, Nov 09, 2013 at 07:59:45PM +0100, Oliver Schönefeld wrote: > my ISP is offering 50 Mbps downstream 10 Mbps up, so i thought i'd > share 20 Mbps max and 15 Mbps avg (respectively 2560 KBps max and 1920 > KBps avg) in a inner tor-relay. > so i put the latter vaues in the bandwith-limits tab o

Re: [tor-relays] Amazon abuse report

2013-10-31 Thread Andy Isaacson
On Thu, Oct 31, 2013 at 09:52:41PM -0400, Roger Dingledine wrote: > On Thu, Oct 31, 2013 at 06:12:47PM -0700, Andy Isaacson wrote: > > That's correct, it takes a deliberate action on the part of the > > administrator to become a relay; and another deliberate action to beco

Re: [tor-relays] Amazon abuse report

2013-10-31 Thread Andy Isaacson
On Fri, Nov 01, 2013 at 12:53:48AM +, Paritesh Boyeyoko wrote: > On a related note, just out of interest why was the decision taken that the > default exit policy for an out-of-the-box relay allows any exits at all? Out of the box, relays don't allow exit at all. A relay admin has to explici

Re: [tor-relays] relays "in the cloud"

2013-10-03 Thread Andy Isaacson
On Wed, Oct 02, 2013 at 08:34:05AM -0400, Jonathan D. Proulx wrote: > On Tue, Oct 01, 2013 at 04:35:15PM -0700, Andy Isaacson wrote: > :In summary, it seems likely that IaaS is pwned wholesale. Colo hardware > :is somewhat more expensive to attack and possibly succeeds in raising > :

Re: [tor-relays] relays "in the cloud"

2013-10-01 Thread Andy Isaacson
On Tue, Oct 01, 2013 at 04:42:53PM -0400, Jonathan D. Proulx wrote: > As I understand it there are three risk layers in each Tor node: > > 1) The node operator (who has r00t) > 2) The data center (who has net) > 3) The legal jurisdiction > > I've recently started running a couple of relays on pu

Re: [tor-relays] hardware accelerated crypto

2013-10-01 Thread Andy Isaacson
On Tue, Oct 01, 2013 at 06:45:52PM +, jason wrote: > I'm not sure why I missed this first post but I'm very interested in > working on this project with whomever is interested. I bought a > pogoplug v2 specifically to test it's usefulness as a tor exit or relay. First step is, run "openssl sp

Re: [tor-relays] Relay security, re: local network

2013-10-01 Thread Andy Isaacson
On Thu, Sep 26, 2013 at 02:08:13PM +0300, Joe wrote: > I'll have to reconsider, then. I assume middle relays see less > traffic than exits? I don't think that's true, currently it seems we need more middle nodes than exit nodes based on my reading of the network statistics. > I also keep reading

Re: [tor-relays] Reimbursement of Exit Operators

2013-10-01 Thread Andy Isaacson
On Wed, Sep 18, 2013 at 09:07:14PM +0300, J.C. wrote: > Another amateur relay operator here, i run the node "namelesshero" > and I sure hope however this cost reimbursing plan eventually pans > out, it won't discourage small folk like us from running relays. I, > too, believe the exact opposite is

Re: [tor-relays] hardware accelerated crypto

2013-10-01 Thread Andy Isaacson
On Fri, Sep 13, 2013 at 12:25:47AM +0200, Sarah Vigote wrote: > I would like to run a 100Mb/s tor exit node, but I have issues wrt > power consumption. > > reading > http://ortizaudio.blogspot.fr/2011/10/using-dreamplugs-crypto-chip.html > it seems dreamplugs has *fast* aes-128-ecb. > > Does anyo

Re: [tor-relays] 0.2.4.17-rc on Pi, a couple weeks on

2013-09-18 Thread Andy Isaacson
On Wed, Sep 18, 2013 at 05:43:13PM -0700, Gordon Morehouse wrote: > Thanks, Roger. I'm still not sure what finally caused the OOM-killer > crash this morning after almost a couple weeks (?) of uptime. I was > also seeing additional clock jump messages but didn't have time to > diagnose it. The P

Re: [tor-relays] Getting max bandwidth out of a relay

2013-09-12 Thread Andy Isaacson
On Wed, Sep 11, 2013 at 05:13:04PM +0200, Jeroen Massar wrote: > Are boxes that are doing these speeds running at a CPU or a network cap? > Or maybe better asked, they do run at 100% usage of their cores or do > they just use two/three cores to the max? There are three main sinks of CPU usage in a

Re: [tor-relays] [ARM] Connecting to another host's control port with ARM: Connection refused.

2013-09-06 Thread Andy Isaacson
On Thu, Sep 05, 2013 at 10:35:22PM -0700, Robert Charlton wrote: > Martin, setting ControlListenAddress to 10.0.0.3:9051 did the trick. > I've also enabled cookie authentication. Obviously ARM running on > something that's not a Tor server to connect to a server's control port > has its limits, but

Re: [tor-relays] The Tor flood

2013-09-06 Thread Andy Isaacson
On Fri, Sep 06, 2013 at 12:42:28PM -0700, David Carlson wrote: > I think that it may be somewhat ego-centric to accept the argument that > this apparent flood is actually directed at the Tor network. It may be > that the real goal is to find efficient weapons to attack the Internet as a > whole, o

Re: [tor-relays] Upgrade your relay to 0.2.4.17-rc?

2013-09-05 Thread Andy Isaacson
On Thu, Sep 05, 2013 at 12:08:05PM -0700, Andy Isaacson wrote: > After 20 minutes of uptime with 17-rc I'm not seeing the CPU pegged like > it was within minutes of restart with 0.2.3.25, even though we are > pushing 220 Mbps already. Here's stats from the last hourly: ==>

Re: [tor-relays] Upgrade your relay to 0.2.4.17-rc?

2013-09-05 Thread Andy Isaacson
On Thu, Sep 05, 2013 at 06:54:57AM -0400, Roger Dingledine wrote: > So the more relays that upgrade to 0.2.4.17-rc, the more stable and fast > Tor will be for 0.2.4 users, despite the huge circuit overload that the > network is seeing. > > Please consider upgrading. If you do, though, please also

Re: [tor-relays] Node specialization

2013-08-31 Thread Andy Isaacson
On Sat, Aug 31, 2013 at 11:32:55AM -0500, Pascal wrote: > http://torstatus.blutmagie.de indicates that only 21.4% of Tor nodes > are exit nodes. Are we wasting this precious resource by running > non-exit traffic through these nodes? More important than "what percent of nodes are exits" is: what

Re: [tor-relays] legal issues past and present

2013-08-30 Thread Andy Isaacson
On Fri, Aug 30, 2013 at 11:38:26AM -0400, That Guy wrote: > > I run an exit node off of a residential Verizon connection and I > > haven't seen a single threat, legal or otherwise so far, I dunno > > why you're having so much trouble. > > Thank you for the reply but I have not either. My commen

Re: [tor-relays] huge increase in relay traffic

2013-08-30 Thread Andy Isaacson
On Fri, Aug 30, 2013 at 04:27:12PM +0100, mick wrote: > I'm currently seeing more than a doubling of connections (from a mean of > c. 2000 established connections to just over 5000) on my relay at > 0xbaddad. The log is full of the (expected) messages: > "Your computer is too slow to handle this ma

Re: [tor-relays] new relays

2013-08-27 Thread Andy Isaacson
On Tue, Aug 27, 2013 at 11:08:34AM -0500, Jon Gardner wrote: > Then why have exit policies? Exit nodes regularly block "unwelcome" > traffic like bittorrent, and there's only a slight functional > difference between that and using a filter in front of the node to > block things like porn The exit

Re: [tor-relays] Being flooded.........

2013-08-27 Thread Andy Isaacson
On Tue, Aug 27, 2013 at 12:52:14PM -0400, Allan Moon wrote: > by virusessince starting relay. What signs do you have that this is happening? Are you running AV on your relay node, or something? What messages are you getting? Good luck cleaning up your system. You mightw wan

Re: [tor-relays] "NumCPUs 2" or 2 copies of Tor?

2013-08-07 Thread Andy Isaacson
On Wed, Aug 07, 2013 at 10:28:59PM +0200, Moritz Bartl wrote: > On 07.08.2013 22:11, Steve Snyder wrote: > > Given plenty of RAM, a muti-core CPU and a single IP address, which is > > more efficient: > > > > a single instance of Tor configured with "NumCPUs 2" or 2 instances of > > Tor configured

Re: [tor-relays] Attacker IP database

2013-08-02 Thread Andy Isaacson
On Fri, Aug 02, 2013 at 03:25:10PM -0600, Bryan Carey wrote: > Thanks everyone for your input! I already had root access disabled via sshd > config. I will look into fail2ban as it sounds like it remedies the problem > I'm having. I'm confused, what's the actual problem you're having? Is the prob

Re: [tor-relays] Running exit-node in Germany

2013-08-01 Thread Andy Isaacson
On Thu, Aug 01, 2013 at 10:25:15PM +0800, Sanjeev Gupta wrote: > I received, about 3 months ago, an email from a Police Officer. It was > addressed to my address in the whois, and seemed to be written assuming I > was an ISP. It cited a date and time range, an IP address, and asked which > custom

Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-30 Thread Andy Isaacson
On Tue, Jul 30, 2013 at 06:20:29PM -0400, grarpamp wrote: > Similarly, has anyone ever put a Tor/EFF exit relay notice and > contact info on their door? Let their neighbors and/or flatmates > know? Consulted with agencies likely to service warrants? > Not to stop such legal process, but to lessen t

Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-30 Thread Andy Isaacson
On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote: > On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson wrote: > > Yes, there are cases of law enforcement seizing all computer gear from a > > house with a exit node -- not just the exit node computer. Most > > rec

Re: [tor-relays] Computer requirements for a modest (15-20Mbs) relay?

2013-07-29 Thread Andy Isaacson
On Mon, Jul 29, 2013 at 04:37:29PM +0100, Nick wrote: > I'm probably going to move to a new ISP soon, and may well be able > to get a fibre 20Mbps up connection, which is a nice thought. The > question I have is whether my little ~1GHz home server box (a weird > little x86 thing, I can dig out more

Re: [tor-relays] Yet another underpowered relay?

2013-07-22 Thread Andy Isaacson
On Mon, Jul 22, 2013 at 07:08:44PM +0200, Logforme wrote: > The computer is somewhat dated but not ancient: Intel(R) Core(TM) i7 > CPU 930 @ 2.80GHz, 4 cores with HT, 6GB mem. I feel it should be > able to handle a 80 mbit bandwidth but have no hard data to support > this. That CPU is powerful eno

Re: [tor-relays] hardware

2013-07-15 Thread Andy Isaacson
On Fri, Jul 12, 2013 at 06:45:58PM -0400, grarpamp wrote: > > AMD doesn't seem to make any server CPUs that are useful for this > > application, unfortunately. > > Really, how so? Many AMD CPU's have AES-NI. Even the > A10-6800K (4 x 4.1GHz) would be decent. That's not a server CPU. It doesn't s

Re: [tor-relays] hardware

2013-07-11 Thread Andy Isaacson
On Thu, Jul 11, 2013 at 08:46:20PM +0200, Andreas Fink wrote: > can someone give me hints on what hardware would be best suited to run > big fat tor exit nodes connected with multiple 1gbps or 10gps links? > We are considering putting some fat boxes near major internet > exchanges of the world. Mo

Re: [tor-relays] Multiple Bridges on same AWS Account

2013-05-21 Thread Andy Isaacson
On Tue, May 21, 2013 at 07:04:12PM +0100, torre...@mail.md wrote: > I currently have 1 bridge relay running on my AWS account. > > Is it possible to add another 2 bridge relays to run as separate > instances from the same AWS account? > > I'm wondering if there might be issues with IP address all

Re: [tor-relays] running relay severely degrades network performance eventually

2013-01-21 Thread Andy Isaacson
On Mon, Jan 21, 2013 at 04:31:01PM -0700, Nicolas Bock wrote: > every time I run a relay on a Comcast cable connection, after a while (a > few hours to days) other network operations such as DNS lookups slow down > to such an extent that the network becomes unusable. Unfortunately I don't > know ho

Re: [tor-relays] Exit Port Usage Statistics for "Allow all" nodes

2012-08-15 Thread Andy Isaacson
On Wed, Aug 15, 2012 at 10:21:18PM +0200, Moritz Bartl wrote: > At torservers.net, we run some large exit relays with an "allow all > except port 25" policy. > > These are statistics from ARM showing exit port statistics of a fast > exit running for seven hours at 30-40 MB/s: > > 443 HTTPS 17

Re: [tor-relays] Call for discussion: turning funding into more exit relays

2012-07-26 Thread Andy Isaacson
On Tue, Jul 24, 2012 at 02:36:32AM +, k...@damnfbi.tk wrote: > Hey all, > Has anyone contemplated pitching this towards hackerspaces running > their own fast nodes? I wouldn't recommend running an exit node on a network link that will make you sad if it goes away for a few days. Most hackersp

Re: [tor-relays] Call for discussion: turning funding into more exit relays

2012-07-26 Thread Andy Isaacson
On Wed, Jul 25, 2012 at 11:48:16PM -0700, Sriakhil Gogineni wrote: > Ball park quotes we got were 99$ / 100 Mbps or $599 / 1000 Mbps for transit > for a single 1U... we'll see if we can get something better... That's a good quote for 1Gbps. > Would this be helpful / viable option for a Tor exit n

Re: [tor-relays] case law on for exit nodes

2012-05-24 Thread Andy Isaacson
On Thu, May 24, 2012 at 10:10:48PM +0200, Rejo Zenger wrote: > > There are at least two cases where the exit operator has been > > slapped with a 'national security' gag order and cannot talk about > > the case. > > These two are both German cases? - if you are allowed to elaborate on > that. I h

[tor-relays] sustained bandwidth drop through noisetor

2012-05-02 Thread Andy Isaacson
noisetor-01 was pushing 300-400 Mbps of traffic from 2012-02-15 through 2012-04-13. Since mid-April we've seen traffic decrease significantly; over the last week, our daily peak has been 260 Mbps (versus 450 Mbps in March) and our daily trough has been 100 Mbps (versus 300 Mbps in March). The tra

Re: [tor-relays] 30% drop in exit throughput since Feb 8

2012-02-18 Thread Andy Isaacson
On Wed, Feb 15, 2012 at 09:32:24AM +0100, krugar wrote: > On 02/14/2012 08:40 PM, Andy Isaacson wrote: > > Noisetor is showing a significant, sustained drop in bandwidth usage > > starting approximately February 7-8. We've checked our setup and logs > > and there doesn&

[tor-relays] 30% drop in exit throughput since Feb 8

2012-02-14 Thread Andy Isaacson
Noisetor is showing a significant, sustained drop in bandwidth usage starting approximately February 7-8. We've checked our setup and logs and there doesn't appear to be any sign of a causative factor here. Throughout January and the first week of February we were averaging 400-500 Mbps. There w

Re: [tor-relays] tor died with "invalid opcode", should I be worried?

2012-01-12 Thread Andy Isaacson
On Fri, Jan 13, 2012 at 01:07:36AM +0100, Marinos Yannikos wrote: > Using Tor 0.2.2.35 (git-4f42b0a93422f70e), OpenSSL 0.9.8o: > > Jan 12 21:17:25 XXX kernel: [ 4257.857564] tor[1909] trap invalid > opcode ip:7fa7dd61f8f7 sp:7fa7daf80400 error:0 in > libcrypto.so.0.9.8[7fa7dd574000+175000] >

Re: [tor-relays] Anyone else getting these? - Fwd: Tor Survey

2012-01-11 Thread Andy Isaacson
On Thu, Jan 12, 2012 at 02:07:13AM +, Tor Relays at brwyatt.net wrote: > I just got this sent to me, not sure if it is legit or not. I'm going to > assume the worst for now, thought I'd send it out here for discussion and > as a heads up for anyone who hasn't yet gotten one of these. I'm hesita

Re: [tor-relays] Abuse complaints about brute forceing via ssh

2011-12-31 Thread Andy Isaacson
On Sat, Dec 31, 2011 at 07:59:31AM +0100, Klaus Layer wrote: > within two days I received abuse complaints from my ISP that someone > used my exit node to brute force ssh accounts of two different ISP. > Unfortunately I am forced to block port 22 to avoid shutdown. Anyone > else who suffered from s

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-10 Thread Andy Isaacson
On Sat, Dec 03, 2011 at 06:57:22PM -0800, Mike Perry wrote: > We'll probably be running this next experiment for about a week (or > perhaps longer if it doesn't explode and seems to improve performance > on https://metrics.torproject.org/performance.html) starting tonight > or tomorrow. > > Please

Re: [tor-relays] Logs full of "eventdns: All nameservers have failed"

2011-12-10 Thread Andy Isaacson
On Mon, Dec 05, 2011 at 10:35:03PM +0100, Klaus Layer wrote: > Andy Isaacson wrote on 03.12.2011: > > Since DNS is the most frequent UDP traffic you'll see on a Tor node, > > perhaps this is simply a symptom of high packet loss on your NIC. > > It's a gigabit l

Re: [tor-relays] Logs full of "eventdns: All nameservers have failed"

2011-12-03 Thread Andy Isaacson
On Sat, Dec 03, 2011 at 07:38:05AM +0100, Klaus Layer wrote: > my logs are full of these messages: > 05:54:07 [NOTICE] eventdns: Nameserver 127.0.0.1 is back up > 05:54:07 [WARN] eventdns: All nameservers have failed [snip] > I am wondering if the high bandwidth nodes from torservers and > noisebri