On Sat, 2014-04-19 at 07:42 -0700, kbesig wrote:
> 1. As non-admin: /usr/bin/vidalia
>
> (process:540): GConf-WARNING **: Client failed to connect to the D-BUS
> daemon:
> An AppArmor policy prevents this sender from sending this message to
> this recipient, 0 matched rules; type="method_call",
On Fri, 2014-02-07 at 06:26 -0500, Tom Ritter wrote:
> On 6 February 2014 14:51, Thomas Themel wrote:
> > Hi,
> > Luther Blissett (lbliss...@paranoici.org) wrote on 2014-02-06:
> >> 1. When you access the clearnet you need dns name resolving which need
> >> to
On Wed, 2014-02-05 at 12:56 +0800, Hang wrote:
> Some sites such as RiseUp and DuckDuckGo could be accessed via onion
> addresses. I would like to know which address (onion address vs clearnet
> address) should I use when using TBB. I believe both ways are more or
> less the same in terms of identi
On Sun, 2014-01-19 at 15:38 +, Mateusz Błaszczyk wrote:
> Hey
>
> I am wondering if this is a coincidence but since I started the tor relay, I
> see a lot of TCP/8118 connections attempts on my relay's external IP.
>
> I run the offending source IPs (aggregated to /24s) through cymru's ip-to
On Sat, 2014-01-18 at 18:24 +, ja...@icetor.is wrote:
> Jack I'd be happy to help you,
> we could chat over xmpp using otr if you're able. my username is
> kupoj...@gmail.com. I'll help you set up your machine as a relay.
> -J
>
> On 01/18/2014 06:05 PM, Jack Wilborn wrote:
> > I have an extra
On Tue, 2014-01-07 at 13:40 -0800, I wrote:
> Luther,
>
> Following that page's help has allowed me to get mulitple VPSs working for
> Tor but I am asking what to do when apt-get update or yum update doesn't get
> the newer version of Tor.
> How an update can be forced is the question.
>
> (The
For reference:
https://www.torproject.org/docs/debian.html.en#ubuntu
This page describes the proper method of sync'n your "sources.list" file
with Tor project's repos.
--
010
001
111
signature.asc
Description: This is a digitally signed message part
__
On Thu, 2013-12-19 at 17:35 +0530, abhiram wrote:
>
> Great! DDNS service looks like a nice way to make this permanent. The
> other thing I managed was by enabling upnp in my router, the address
> discovery takes place automatically.
>
> thanks for the suggestions!
Though there are choices, I wo
On Tue, 2013-12-17 at 11:25 +0530, abhiram wrote:
> Hello,
>
> I am running a tor relay on a home connection. My connection is
> assigned a new ip as the lease expires every few days. So far I am
> fixing this my editing my torrc file with the new address value. Are
> there better ways of handing
On Mon, 2013-11-11 at 19:55 -0500, Jeroen Massar wrote:
> PS: Try doing a packet sniff on a link with thousands of connections and
> where your user cannot tell you what source IP they have; next to the
> fact that they might just be using the wrong destination host... ;)
>
> Greets,
> Jeroen
>
On Wed, 2013-11-06 at 14:00 +0100, Jeroen Massar wrote:
> On 2013-11-06 13:47 , mick wrote:
> > On Wed, 06 Nov 2013 14:00:09 +0200
> > Lars Noodén allegedly wrote:
> >
> >> On 11/06/2013 01:26 PM, mick wrote:
> >>> I disagree. Dropping all traffic other than that which is
> >>> explicitly require
On Tue, 2013-11-05 at 09:36 +0100, jj tor wrote:
> Sorry for the confusión, the exact line in my torrc is "Socksport 0", so,
> SOCKS port is closed. Moreover, I haven't got any exit rule towards port
> 9050
>
> Even if I block this traffic using iptables, I am very curious about why
> the server
On Fri, 2013-10-04 at 04:31 -0400, grarpamp wrote:
> Anyone also offering up vpngate, i2p, mail mixes, other
> p2p/networks, etc to the public on their relay platform?
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torpr
On Wed, 2013-09-25 at 19:10 +0300, Joe wrote:
> Hi,
>
> I'm planning to run a Tor relay on a spare computer at home. Security is
> a concern, and not only regarding the machine running the relay but also
> my other computers. Are there any (theoretical or otherwise) known
> attacks a person can
On Mon, 2013-09-23 at 13:36 +0300, J.C. wrote:
> So far I haven't seen any other error messages than something about a
> failed DNS server, which always corrects itself half a second or so
> afterwards, stating nameservers are back up. It's running on a 100/10
> connection, pushing as much upstr
Ow, forgot to say, don't bother with that hex. From what I could get
with the help of others, this is just a byte reversed/corrupted log
entry. Since the hard drive used to store logs is some years old, I
guess this is related to badblocks.
On Wed, 2013-09-11 at 12:35 -0700, Aaron Hopkins wrote:
On Wed, 2013-09-11 at 12:35 -0700, Aaron Hopkins wrote:
> I sent the following warning to the listed e-mail address of 14 of the 19
> Tor nodes I found that accepted connections on port 8118, some of which
> bounced.
>
> If any of you run or know how to get in touch with the operators of the
> no
17 matches
Mail list logo