-BEGIN PGP SIGNED MESSAGE-
Hash: SHA384
On 08/27/2014 04:03 PM, tor-relays-requ...@lists.torproject.org wrote:
> Not to drift too far off course, but I think you have your masking
> back wards or confused at least.
>
> a /8 is 16M addresses 18.0.0.0/8 for example, so not a small block,
>
text/plain; charset=UTF-8
>
> On Tue, Aug 26, 2014 at 3:47 PM, Jesse Victors
> wrote:
>
>> I run some relays and an exit in a university setting. The nodes are in the
>> same /8 block and are physically close to one another as well. Is there any
>> advantage i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA384
Hey everyone,
I run some relays and an exit in a university setting. The nodes are in the
same /8 block and are physically close to one another as well. Is there any
advantage in turning one of the relays into another exit? This is something
th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA384
Hey guys,
Today on Reddit I saw a post on /r/Tor that listed the number of relays by
version, which was pretty cool. While OP apparently loaded the information into
SQLite and selected the count, there's another way to do it:
sudo cat /var/lib/t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA384
I don't know about that. The number of site that ban all Tor nodes (exits and
non-exits alike) is relatively low compared to the number of websites that
don't. The banning happens when trigger-happy sysadmins think that 1) IP
address == user, and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hey guys,
I've been running some exit nodes for some time now, and they're doing well.
They've burned through many terabytes of bandwidth, and thanks to Tor's
recommended reduced exit policy, complaints have been minimal. Clearly the vast
major
Hello everyone,
I run
https://globe.torproject.org/#/relay/1946F5E4748B069D3B989B5AF50C7DDD3AC61859
and from the graphs it's clear that the traffic has roughly leveled off, rather
than continue to climb. I generated a new key after Heartbleed, so it's been up
for nearly three months. The bandw
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Ok, will do, thanks.
On 06/06/2014 07:10 AM, Tom van der Woerdt wrote:
> Yes, please restart Tor after updating
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.14 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQF
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Thanks. I saw the OpenSSL update, but thanks for explaining what it was about.
Is it necessary to restart Tor to apply the update?
Jesse V.
On 06/06/2014 04:00 AM, tor-relays-requ...@lists.torproject.org wrote:
> Message: 1
> Date: Thu, 05 Jun
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hey everyone,
I just checked in on https://metrics.torproject.org/network.html and
noticed that there's been sudden drops in the number of relays which
seems to have caused all other graphs to tank as well. It's too late for
this drop to be caused
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Yes, it's better to have faster relays. However, if you are setting up a
relay or exit on a gigabit connection it may take some time before you
see significant utilization of the pipe. By running two Tor instances at
once you can increase the contr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I prefer "ps aux | grep tor" and then you can seem them running side by
side. You can also seem them on htop, which I prefer over top. My init.d
script sets a different log file to each instance, allowing you to
monitor the logs of each independent
In case anyone is interested in running two Tor instances (regular,
bridge, relay, exit) on one machine, I've successfully made an init.d
script to do just that. From searches on Google it looks like others
have asked about this in the past, so I'm sharing this for them. Tor
only allows two Tor in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Saw this article:
http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html
"The U.S. National Security Agency knew for at least two years about a
flaw in the way that many websites send sensitive inform
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I've updated OpenSSL, deleted the keys on my exit per the
recommendations, and restarted the whole box. I got a new fingerprint.
I'll watch to see how long the flags take to come back, but I predict it
will be like a new relay. I wonder how this cha
I recently held an Ask Me Anything on Reddit about Tor. For those that
don't know, Reddit is famous for its AMAs, wherein someone unique or
otherwise interesting will introduce themselves and then the community
gets a chance to ask questions and learn. Traditionally it's been used
as an excellent w
Hey everyone. I manage an exit at a university, and I recently moved it
to a gigabit connection. I did some tests and the machine does appear to
be capable of fully using the available bandwidth. Besides getting two
Tor instances to run side-by-side on the same IP, is there anything else
I can do t
> FYI: Just got this to my Tor relay mail address, with a zip file
> attached extracting to a '.scr' win exe. Curiously routed via a .gov.uk
> mail relay...
>
> GB03022014.scr: PE32 executable (GUI) Intel 80386, for MS Windows
>
> MD5: dba1e52929f6ca9d1a1bf87e4ff469cf GB2546241.zip
> MD5: fb11414
> Have you set AccountingMax in your torrc, by chance?
>
> Also, you sure are restarting the relay a lot. You should learn how to
> use 'service reload' rather than 'service restart'. :)
No, I don't have AccountingMax enabled, which is one of the reasons why
I was puzzled by the hibernation flag. T
Thanks again guys for the help. "usuexit" is now online, and should be
functioning properly, but there seem to be a few mystifying issues:
1) TorStatus marks it as "hibernating" which it clearly isn't; it's
online and accepting connections. I'm not sure what made TorStatus think
it was offline.
2)
Thanks guys for the tips. I followed the docs and suggestions here and
on the blog/website, carefully worded an email to them, and sent it off
earlier today. They just got back with me and they were on board with
the idea! They even gave me some tips on setting it up, and were
considering setting
Hello everyone,
I'm thinking about setting up an exit here at my university here in the
US. My ISP has no problem with Tor relays on the fast connections, but I
haven't inquired about exits. I'd be running the exit on a surplus
computer that I have control over in a lab in one of the main buildin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> That's where you come in. To figure out where traffic travels from
> your relay, we'd like you to run a bunch of "traceroutes" - network
> measurements that show the paths traffic takes. This is a one-time
> experiment for now, but, depending on
On 10/19/2013 06:00 AM, tor-relays-requ...@lists.torproject.org wrote:
> Message: 3
> Date: Sat, 19 Oct 2013 00:55:42 -0400
> From: Torop
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] My Relay speed has dropped nearly to zero -
> Why?
> Message-ID: <526210ce.80...@optonl
vm1.site>
> Content-Type: text/plain; charset="utf-8"
>
> On Tue, 2013-10-08 at 23:40 -0400, krishna e bera wrote:
>> On 13-10-08 03:23 PM, Jesse Victors wrote:
>>> ...
>>> obviously has implications into other Tor users, the vast majority of
>>
I recently ran across several articles related to the NSA's attempts at
cracking Tor and de-anonymizing its users. They are after terrorists and
other individuals who seek to do harm of course, but their work
obviously has implications into other Tor users, the vast majority of
whom use Tor for le
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> Date: Mon, 23 Sep 2013 12:54:34 +0300
> From: "J.C."
> To: tor-relays@lists.torproject.org
> Subject: [tor-relays] Future versions and Vidalia?
> Message-ID: <52400fda.2060...@riseup.net>
> Content-Type: text/plain; charset=ISO-8859-1; format=flo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> As I am trying to avoid using too many IPs (IPv4 is constrainted, IPv6
> is not, but the latter won't get much traffic), I'll try if I can get my
> tcp-balancer idea setup in the run of next week (low on spare cycles at
> the moment) and then for
> (Most folks would just call that 100mbit, that is if your MB is
> MegaByte, hence why 11.5 MiB/s would be more accurate).
Yes, it is megabytes/sec, according to Speedtest.net. Most sysadmins
would say 91.74 mbit down, 60.23 mbit up, (which is as you say basically
100 mbit) but since the Tor measu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hello everyone, newcomer here.
I'm behind very fast connection (11.5 MB/sec down, 7.5 MB/sec up) and I
thought that the Tor network could benefit from my connection,
especially since it's apparently been under high load recently. Per the
latest blo
30 matches
Mail list logo