On Fri, Oct 4, 2019, at 11:51 AM, Paul Templeton wrote:
> Just an FYI on a problem I found with two DNS of 1and1 ionos.
> The affected DNS are 212.227.123.16 and 212.227.123.17 which both are
> not responding to *.torproject.org domain or sub domains.
> I found this out as my system reverted back
On Wed, Feb 7, 2018, at 4:45 PM, Karsten Loesing wrote:
> Possible disadvantages are:
> - If somebody runs a relay and a bridge, both with the same contact
> information, a censoring adversary might guess that the bridge might run
> on a nearby IP address as the relay. However, they could as w
On Thu, Jan 25, 2018, at 10:09 PM, teor wrote:
>
>
> Only 4 of the 9 directory authorities can make a direct connection to
> your relay: (large page)
> https://consensus-health.torproject.org/consensus-health-2018-01-25-18-00.html#FE4033D750831C32A957174ADD11E40F558A14A9
>
> The required major
On Sun, Oct 15, 2017, at 12:49 PM, teor wrote:
>
> > On 15 Oct 2017, at 07:26, Geoff Down wrote:
> >
> >> On Sun, Oct 15, 2017, at 01:51 AM, teor wrote:
> >>
> >>> On 14 Oct 2017, at 20:33, Geoff Down wrote:
> >>>
> >>>
On Sun, Oct 15, 2017, at 01:51 AM, teor wrote:
>
> > On 14 Oct 2017, at 20:33, Geoff Down wrote:
> >
> > Hello all,
> > what sort of crazy bug would make Tor give different hashes for the same
> > password?
> >
Hello all,
what sort of crazy bug would make Tor give different hashes for the same
password?
$ tor --hash-password hello
16:735E6FA5355D4146606AFE25B61B411DF419878C99705164D038FC99BC
$ tor --hash-password hello
16:8201E7D35BB8CACB60BF8947B49A3480BA1A17E77EDA8BE45790746884
$ tor --version
Tor vers
Dear operator of relays Necto4 etc.
Please remove OpenDNS filtering of any sort from your exit relays.
Note that abuse-team@necto.onion (as per your port 80 page) is not a
routeable email address.
GD
--
http://www.fastmail.com - IMAP accessible web-mail
__
On Mon, May 15, 2017, at 10:20 AM, Roger Dingledine wrote:
> On Tue, Mar 28, 2017 at 02:22:17PM +0100, Geoff Down wrote:
> > 72 hours now on 2.9.9 with no clock jumps. Still occasional timeouts as
> > per above.
>
> Hi Geoff,
>
> Any news on your strange clock jump
On Mon, May 15, 2017, at 10:20 AM, Roger Dingledine wrote:
> On Tue, Mar 28, 2017 at 02:22:17PM +0100, Geoff Down wrote:
> > 72 hours now on 2.9.9 with no clock jumps. Still occasional timeouts as
> > per above.
>
> Hi Geoff,
>
> Any news on your strange clock jump
On Fri, Mar 24, 2017, at 01:35 PM, Geoff Down wrote:
> I'm still getting occasional read timeouts (via Polipo) from a
> site that
> is entirely reliable over clearnet, and occasional 'Failed to receive
> SOCKS5 connect request ack' from another site when using c
On Fri, Mar 24, 2017, at 07:35 AM, teor wrote:
> >
> > On 21 Mar 2017, at 01:42, Geoff Down wrote:
> > ...
> > The usual SIGINT shutdown hangs as well - have to send a second SIGINT.
> What is ShutdownWaitLength set to in your torrc or default torrc?
Not set.
>
On Tue, Mar 21, 2017, at 09:27 AM, teor wrote:
>
> Can you try setting an explicit IP address for your bridge, using:
> Address NNN.NNN.NNN.NNN
> in the torrc?
>
> We might not have fixed all instances of this issue in 20423.
>
Done, (SIGINT still hadn't shut down after 10 minutes btw) then
Ma
On Mon, Mar 20, 2017, at 01:44 PM, teor wrote:
> >> Mar 19 11:52:37.000 [notice] Tried for 32496 seconds to get a connection
> >> to [scrubbed]:80. Giving up.
>
> We fixed a bug like this in 0.2.9.6-rc.
>
> It was caused by DNS resolves that received no reply and didn't timeout.
> (DNS resoluti
On Mon, Mar 20, 2017, at 01:44 PM, teor wrote:
>
> > On 21 Mar 2017, at 00:09, Geoff Down wrote:
> >
> > More information:
> > Mar 20 10:48:23.000 [warn] Your system clock just jumped 38788 seconds
> > forward; assuming established circuits no longer work.
.
On Sun, Mar 19, 2017, at 02:20 PM, Geoff Down wrote:
> Further information.
> Curl error
> Failed to receive SOCKS5 connect request ack.
> and from earlier, Tor log
> Mar 19 11:52:37.000 [notice] Tried for 32496 seconds to get a connection
> to [scrubbed]:80. Giv
Further information.
Curl error
Failed to receive SOCKS5 connect request ack.
and from earlier, Tor log
Mar 19 11:52:37.000 [notice] Tried for 32496 seconds to get a connection
to [scrubbed]:80. Giving up.
--
http://www.fastmail.com - A no graphics, no pop-ups email service
_
Hello list,
my bridge/client has been behaving strangely the last few days. It took
36 hours to notice that my IP address had changed, and seems to be
going into some sort of sleep state - automated curl fetches start
failing, and keep failing until I manually curl to a well-known site,
at whi
On Thu, Jan 19, 2017, at 02:33 AM, teor wrote:
>
> > On 19 Jan 2017, at 13:30, Geoff Down wrote:
> > Then a HUP produced the same sequence (but a different PID), with no
> > sign of the lines you mention above regarding 'restart'.
> > The original obsfpro
On Thu, Jan 19, 2017, at 01:14 AM, teor wrote:
>
> > On 19 Jan 2017, at 12:00, Geoff Down wrote:
> > Jan 19 00:47:42.000 [notice] Tor 0.2.9.8 opening log file.
> > Jan 19 00:47:55.000 [warn] Server managed proxy encountered a method
> > error. (obfs3 Could not set
Hi,
I sent a SIGHUP to the tor process after altering the torrc and got this
effect:
Jan 19 00:47:42.000 [notice] Tor 0.2.9.8 opening log file.
Jan 19 00:47:55.000 [warn] Server managed proxy encountered a method
error. (obfs3 Could not set up listener (0.0.0.0:x) for 'obfs3'
(Address already i
Would the operator of the above mentioned exit please remove OpenDNS
'Malicious URL' filtering.
Thanks,
GD
(PS having a .onion contact address doesn't work, I think)
--
http://www.fastmail.com - Same, same, but different...
___
tor-relays mailing
See
https://trac.torproject.org/projects/tor/ticket/21045
but perhaps there is some flag required.
--
http://www.fastmail.com - Access all of your messages and folders
wherever you are
___
tor-relays mailing list
tor-relays@li
You are unlikely to make any friends at the host or tsrget site by
publishing the attack logs.
Just sayin'.
GD
On Fri, Oct 28, 2016, at 04:57 AM, Markus Koch wrote:
> Getting abuse mass mails on nearly all exist in the last hours:
>
--
http://www.fastmail.com - Email service worth paying for. T
On Mon, Oct 10, 2016, at 04:28 PM, Andreas Krey wrote:
> On Mon, 10 Oct 2016 15:15:46 +0000, Geoff Down wrote:
> ...
> > Needless to say, the disk is not full and 'tor' can write to that
> > directory just fine now.
>
> Question is whether it was full (or ou
Hi all,
these are the last entries in my log, but my bridge is still listed on
Atlas and client functionality is fine. Latest stable version on
OSX10.4.
Needless to say, the disk is not full and 'tor' can write to that
directory just fine now.
Oct 05 22:52:09.000 [warn] Couldn't open "/Users/to
On Fri, Jun 17, 2016, at 09:30 PM, Michael Armbruster wrote:
> Hi Paul,
>
> assuming the default HTTP port, it was an attack to the port 80.
> Furthermore, the cryptic looking signs (%XX, whereas X is 0-9 or A-F),
> are url escaped characters. Unescaping them leads to something like this:
>
>
On Tue, Apr 5, 2016, at 08:17 PM, SuperSluether wrote:
> Thanks, this will be very helpful!
>
> I suppose now I have to figure out the AS numbers for the different VPS
> providers. Any ideas on how to find those?
If you have their IP range,
http://asn.cymru.com/
- they also do a DNS-based API
You can be either a relay (with your IP address public) or a bridge
(with your IP address known only to the Bridge Admins and the users, as
long as it has changed since you ran a relay).
And the way to run as a Bridge is to add
BridgeRelay 1
to your torrc: the ports that need to be open are the Or
On Thu, Dec 10, 2015, at 04:52 AM, Yawning Angel wrote:
> On Thu, 10 Dec 2015 01:26:41 +
> Geoff Down wrote:
>
> [snip[
> > It's quite annoying that Tor doesn't remember its auto-picked port,
> > and I have to change the port-forwarding rule every time.
Hello all,
a couple of quick questions.
Tor exited with this error:
Dec 09 06:35:34.000 [err] descriptor at 0x62ee080 begins with unexpected
string "". Is another process running in our data directory? Exiting.
I've a vague feeling it's happened once before - anything to worry
about?
Also, on
On Sun, Oct 25, 2015, at 07:52 PM, Moritz Bartl wrote:
> On 10/25/2015 08:26 PM, Geoff Down wrote:
> >> If so, I'll write a small something that will allow adding new subdomains
> >> to it. So that you can always add and update subdomains on it.
> > As long as yo
On Sun, Oct 25, 2015, at 05:49 AM, Eran Sandler wrote:
> If so, I'll write a small something that will allow adding new subdomains
> to it. So that you can always add and update subdomains on it.
As long as you don't let other people do that themselves. That would be
open to abuse.
GD
--
http
On Tue, Sep 22, 2015, at 03:51 AM, Tim Wilson-Brown - teor wrote:
>
> > On 22 Sep 2015, at 12:00, Geoff Down wrote:
> >
> > Hi Tim
> >
> > On Tue, Sep 22, 2015, at 01:40 AM, Tim Wilson-Brown - teor wrote:
> >>
> >>> On 21 Sep 2015, at 1
A query using Globe stalls at the 'processing - please wait' stage, so I
assume the problem is actually with Onionoo.
GD
--
http://www.fastmail.com - Same, same, but different...
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists
Hi Tim
On Tue, Sep 22, 2015, at 01:40 AM, Tim Wilson-Brown - teor wrote:
>
> > On 21 Sep 2015, at 19:59, Geoff Down wrote:
> >
> > Hi all,
> > is anyone willing to talk me through getting Obfsproxy working on
> > OSX10.4? I've got as far as Step 3 on
&
ing to that effect in the docs.
I did get a 'Self-testing indicates your ORPort is reachable from the
outside' message eventually - there was just a 12 minute wait between
'Bootstrapped 100%' and 'Guessed our IP address as', the reachability
test followed immediately aft
Hello all,
I'm trying to set up a Bridge/Client Tor instance with the following
torrc:
ControlPort 9051
ExitPolicy reject *:*
HashedControlPassword
Nickname
ORListenAddress 0.0.0.0:9001
ORPort 80
BridgeRelay 1
ContactInfo
Should this work as a bridge? Client functionality is fine (port 80 is
hough it reports the 'package' as installed, I am at a loss.
Regards,
Geoff Down
--
http://www.fastmail.com - Access your email from home and the web
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Sat, Sep 12, 2015, at 11:37 PM, Tor Relay @ WeFu.Org wrote:
> It appears that First Tech Federal Credit Union is blocking all Tor
> nodes (including non-exit nodes) from connecting to their website,
> http://www.firsttechfed.com
>
> This seems ... misguided on their part. Blocking exit nodes
On Tue, Jul 14, 2015, at 03:05 PM, Karsten Loesing wrote:
>
> I implemented most of the changes that Julius and I suggested plus the
> feedback we received on this list. Please find the updated ExoneraTor
> service here:
>
> https://exonerator.torproject.org/
>
> Please give it a try, including
On Tue, Jul 7, 2015, at 10:12 PM, Zack Weinberg wrote:
> On Tue, Jul 7, 2015 at 4:50 PM, Geoff Down
>wrote:
> >
> > If someone only has an IP address for an incident but no exact time,
> > they barely have the basis for a complaint, let alone something more
> &
On Tue, Jul 7, 2015, at 07:47 PM, Zack Weinberg wrote:
> The thing is, putting myself in the shoes of someone trying to
> investigate an incident, I think the distinction among "this relay has
> _never_ allowed any sort of exiting", "this relay _does_ allow exiting
> right now", and "this relay
Karsten wrote:
>
> Anyway, I guess what I'm trying to say is that this is not an exact
> science and there's no clearly right way to say that a relay is an
> exit or not. We should pick a definition that's plausible to mere
> mortals, and that could be:
>
> a) whether the relay has the Exit f
On Sun, Jul 5, 2015, at 02:26 PM, Karsten Loesing wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 05/07/15 14:20, teor wrote:
> >
> >> On 5 Jul 2015, at 19:37 , Karsten Loesing
> >> wrote:
>
> Actually, how about we use the same definition as for the Exit flag?
>
> Even if a
On Sat, Mar 14, 2015, at 08:56 AM, Sasikantha babu wrote:
> Mar 14 02:36:06 NoNameForHost Tor[4403]: Our IP Address has changed from
> 49.205.4.174 to 188.165.200.138; rebuilding descriptor (source:
> 46.105.44.4).
Since the IP 46.105.44.4 is the same in both cases, and that IP reported
my addr
On Tue, Mar 10, 2015, at 06:30 AM, Sasikantha babu wrote:
> Hi all,
> Today on my relay I observed the below messages 2 hours back. Tor
> reported address change from IP_IN_INDIA
> to IP_IN_FRANCE from SRC_1. The next second SRC_2 reported address
> change from IP_IN_FRANCE to
>
On Sat, Dec 6, 2014, at 12:10 AM, TT wrote:
> Busting down doors is pretty much spot on about the reason i am
> unwilling to run the relay on my own IP address: i've read enough news
> about overzealous law enforcement in my country (non-Tor related, but
> still), and i'm certainly not going
On Fri, Nov 7, 2014, at 09:32 PM, Graeme Briggs-White wrote:
> As above
... so below.
GD
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
--
http://www.fastmail.f
On Sun, Nov 2, 2014, at 11:53 PM, flapflap wrote:
> I:
> > Unused slower middle nodes would be better turned into bridges wouldn't
> > they?
>
> I doubt that's still possible since their IP adresses are already
> published and probably blacklisted.
>
Hello Nick,
I hop you don't mind a few pointers on this based on my experience of
hacked sites:
When listing directories, use 'ls -alct' to show hidden files as well,
and the ctime rather than the mtime - mtime is trivial to falsify.
When using 'ps', compare the process names with those given by
On Tue, Apr 15, 2014, at 01:03 AM, Chris Whittleston wrote:
> Right - so this seems to confirm that they are indeed blocking Tor - and
> not just exits - I'm running a middle relay.
>
> I've contacted them via a web form asking why they block all Tor relay
> IPs.
> Tips on what I should tell the
On Tue, Mar 25, 2014, at 12:55 AM, Dennis Crawford wrote:
> Hello -
>
>
>
> I just recently installed a Tor Relay and now I'm seeing a TON of port
> 8118
> denied requests in my log.
...
> Am I doing something wrong?
No, someone out there is sniffing relays for open HTTP proxies - you'll
fin
On Tue, Feb 4, 2014, at 05:18 PM, K. Besig wrote:
> Why shouldn't I be concerned when, by simply accessing this page, all my
> actual ip/dns information is readily available to all?
Because that's how Tor works. Every relay has to be able to connect to
every other relay (apart from Bridges) so th
Your mailserver received it from an Orange France IP 217.109.27.97 .
Before that you can't really trust the headers.
GD
>
> On 02/03/2014 10:33 PM, phrag wrote:
> > FYI: Just got this to my Tor relay mail address, with a zip file
> > attached extracting to a '.scr' win exe. Curiously routed via a
On Wed, Oct 23, 2013, at 04:09 PM, Karsten Loesing wrote:
> The measurements will work best if you have the "scamper" tool from
> the Cooperative Association for Internet Data Analysis (CAIDA)
> installed (see the README for installation instructions).
Your README should probably explicitly say t
On Tue, Oct 15, 2013, at 10:00 PM, Roger Dingledine wrote:
> On Tue, Oct 15, 2013 at 04:17:31PM -0400, starli...@binnacle.cx wrote:
> > Hello,
>
> Hello starlight,
>
> You're not using mailing lists properly. The right way to do it is to
> send your mail and wait. Not to resend variations of yo
On Sat, Aug 31, 2013, at 05:32 PM, Pascal wrote:
> http://torstatus.blutmagie.de indicates that only 21.4% of Tor nodes are
> exit nodes. Are we wasting this precious resource by running non-exit
> traffic through these nodes?
>
> -Pascal
No. The non-exit traffic masks which relay the exit traf
On Sun, Aug 18, 2013, at 12:35 AM, Gordon Morehouse wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Good news, everyone!
>
> Lance Hathaway:
> > Speaking only for myself (in turn), this is something I would
> > desperately like to see. I've been planning on deploying several
> > Ra
On Sun, Apr 14, 2013, at 08:38 AM, Jochen wrote:
> Hello,
>
> I'm running a tor relay (non-exit) on DSL connection. My ISP reconnects
> me every 24 hours and gives me a new ip. How must tor be configured to
> publish it's new ip address after reconnect? Can tor daemon (linux) do
> this automatic
On Wed, Mar 6, 2013, at 05:09 AM, Sina Eetezadi wrote:
>
> So I did that. To my surprise Vidalia shows still my IP adress, as the
> URL to be shared. Does that mean also the other distribution mechanisms
> use my ip?
> Since it is constantly changing that would kinda contradict the use of
> DynD
On Wed, Jul 11, 2012, at 02:33 PM, Moritz Bartl wrote:
> Roughly 80% are automated reports, which we ignore,
How do you decide which are automated?
GD
--
http://www.fastmail.fm - Accessible with your email software
or over the web
___
On Sat, Apr 14, 2012, at 07:15 AM, Steve Snyder wrote:
> I often get abuse complaints from icecat,biz saying that a "RIP attempt"
> was seen from the IP address of my exit node. Apparently this involves
> too many connections in a given period of time.
>
> I've tried to contact them but get no
On Tue, Jan 24, 2012, at 12:55 PM, Andrew Lewman wrote:
> On Tue, 24 Jan 2012 17:47:21 +
> Geoff Down wrote:
> > So if I understand correctly, I should use
> > $ unset LDFLAGS
> > $ CFLAGS="-O -g -mmacosx-version-min=10.4 -arch ppc"
> > $ ./
On Tue, Jan 24, 2012, at 11:01 AM, Justin Aplin wrote:
> My bad, I wasn't thinking straight when I wrote that. I forgot the
> openssldir, at least on OSX, doesn't actually contain the libs. Try "sudo
> find / -iname libssl*.dylib" to find an appropriate lib in your setup.
> Since I replaced my s
On Mon, Jan 23, 2012, at 10:06 PM, Justin Aplin wrote:
> >> I'm kind of flying in the dark here (being unfamiliar with macports),
> >> but I think a proper --with-openssl-dir= statement will help. Run
> >> "openssl version -a", check the version number to make sure it's the new
> >> version and
On Mon, Jan 23, 2012, at 09:20 PM, Justin Aplin wrote:
> I'm kind of flying in the dark here (being unfamiliar with macports),
> but I think a proper --with-openssl-dir= statement will help. Run
> "openssl version -a", check the version number to make sure it's the new
> version and not the pa
On Mon, Jan 23, 2012, at 06:24 PM, Justin Aplin wrote:
> On 1/23/2012 2:56 PM, Geoff Down wrote:
> >
> > /usr/libexec/gcc/powerpc-apple-darwin8/4.0.1/ld: Undefined symbols:
> > _EVP_sha256
> > _RSA_generate_key_ex
> > _SHA256
> > _SHA256_Fi
On Mon, Jan 23, 2012, at 02:33 PM, Nick Mathewson wrote:
> On Mon, Jan 23, 2012 at 2:27 PM, Geoff Down
> wrote:
> > Can anyone help with this please?
> >
> > % sudo ./configure --with-libevent-dir=/opt/local/lib/ && make && make
> > install
>
Can anyone help with this please?
% sudo ./configure --with-libevent-dir=/opt/local/lib/ && make && make
install
-> checking for libevent directory... configure: WARNING: We found the
libraries for libevent, but we could not find the C header files. You
may need to install a devel package.
% por
Hi,
the read/write graphs in my relay's TorStatus.blutmagie.de page have
been broken for some time (flat-lined) but I assumed that was down to
my old software. However, I see that all the relays' pages are the
same. Is this data no longer available?
I had a quick look in the archives for an ans
On Friday, November 25, 2011 10:12 AM, "Steve Snyder"
wrote:
> I tried to set up a Tor relay in the UK today and was told that UK law
> prohibited anonymous Internet traffic.
Manifestly untrue. There are several exit relays in the UK and lots
more middlemen.
> My tentative UK ISP told me th
using OpenDNS site blocking?
>
> On 11/10/2011 05:03 AM, Geoff Down wrote:
> >
> > Will the owner of exit atlgonyovLi please turn off OpenDNS site
> > blocking.
> >
> >
> ___
> tor-relays mailing list
> tor-r
Will the owner of exit atlgonyovLi please turn off OpenDNS site
blocking.
--
http://www.fastmail.fm - Or how I learned to stop worrying and
love email again
___
tor-relays mailing list
tor-relays@lists.torproject.org
https:/
73 matches
Mail list logo