Re: [tor-relays] Revised Opt-In Trial: Fallback Directory Mirrors

2016-01-14 Thread Paul Staroch
Hi, Am 2016-01-12 um 05:35 schrieb Tim Wilson-Brown - teor: Here's the latest list of fallback directory candidates: https://trac.torproject.org/projects/tor/attachment/ticket/15775/fallback_dirs.inc.20160112 Since my relay "rueckgrat" (0756B7CD4DFC8182BE23143FAC0642F515182CEB) is on the ne

Re: [tor-relays] onionoo backend seems to be down.

2015-04-21 Thread Paul Staroch
Hi, Am 2014-08-24 um 02:29 schrieb ja...@icetor.is: Anyone else notice onionoo and the tools that rely on it (globe.torproject.org atlas.torproject.org) seem to be down? -Jason It seems that onionoo.torproject.org is down once more, it's returning HTTP 500 to every request since several hour

Re: [tor-relays] hardening a tor relay

2014-05-22 Thread Paul Staroch
Am 2014-05-22 02:23, schrieb Contra Band: > # Allow incoming 9050 > iptables -A INPUT -p tcp --dport 9050 -m state --state NEW,ESTABLISHED -j > ACCEPT > iptables -A OUTPUT -p tcp --sport 9050 -m state --state ESTABLISHED -j ACCEPT > > # Allow outgoing 9050 > iptables -A OUTPUT -p tcp --dport 9050

Re: [tor-relays] Grouping cloud relays running within same provider

2014-04-18 Thread Paul Staroch
Am 2014-04-18 21:31, schrieb mr.cur...@urssmail.org: > Is there any way currently to do this, or are there already some > safeguards in place? In its default configuration, Tor ensures that each relay in a circuit belongs to another /16 subnet (cf. Tor Path Specification [1], section "2.2. Path

Re: [tor-relays] (no subject)

2013-12-25 Thread Paul Staroch
Hi, Am 2013-12-25 20:55, schrieb Sebastian Urbach: > Since i switched to 0.2.4.19 a few days ago i noticed some strange behaviour. > Sometimes the data seems to he corrupted i see on torstatus.info. The atlas > data seems to be right though. Afaik only the contact and family data seems > to be

Re: [tor-relays] Unsub me please?

2013-09-02 Thread Paul Staroch
Hi, Am 2013-09-02 19:17, schrieb Susan Harbison: > Thank you. Please follow the link in the signature of this mail. On the bottom of this page you find instructions about how to unsubscribe yourself from the list. Paul ___ tor-relays mailing list t

Re: [tor-relays] Someone is trying to overrun the Network

2013-09-01 Thread Paul Staroch
Am 2013-09-01 10:48, schrieb elrippo: > "Warning: Network TCP port 60922 is being used by /usr/sbin/tor. Possible > rootkit: zaRwT.KiT > Use the 'lsof -i' or 'netstat -an' command to check this." > > I guess this is a false positive in conjucntion to the massive raid of > traffic > incr

Re: [tor-relays] Option to restart TOR automatically after it did crash?

2013-08-31 Thread Paul Staroch
Am 2013-08-31 12:06, schrieb AFO Server Operator: > I search for a option to restart my TOR relays after the TOR process did > crash on them? Im running TOR alpha on Debian Just add something like */5 * * * * root /etc/init.d/tor start to /etc/crontab. This will launch the init script for tor ev

Re: [tor-relays] new relays

2013-08-22 Thread Paul Staroch
Am 2013-08-22 17:28, schrieb Lukas Erlacher: > You could put a censoring proxy in front of your exit node. But that > would defeat the purpose of Tor entirely... ... and will eventually lead to your relay being flagged as a bad exit node. Tampering with exit traffic is strongly discouraged [1].

Re: [tor-relays] Running exit-node in Germany

2013-08-01 Thread Paul Staroch
Am 2013-08-01 15:22, schrieb Eugen Leitl: >> experience with running a Tor-Relay in Germany( Bavaria)? > A Tor relay is a non-exit, and completely unproblematic > but for potential traffic issues. Unfortunately, this is not completely true. I'm running a non-exit Tor relay on a dedicated server a

Re: [tor-relays] What's wrong with TorStatus?

2013-01-11 Thread Paul Staroch
Hi, Am 2013-01-11 02:29, schrieb Steve Snyder: > What's going on with TorStatus? Apparently, the script doing the update stuff fails every now and then when fetching the current status of the Tor network. Currently, I'm investigating why that happens. Paul _

Re: [tor-relays] Bad Exit

2012-03-30 Thread Paul Staroch
Am 2012-03-31 00:36, schrieb Matthias Bethke: > Seeing that quite a lot of people use unencrypted mail protocols over > TOR, I wrote script about a year ago to try and warn them about it: I assume that script is the reason for your relay being listed here due to "sniffing traffic": https://trac.to

Re: [tor-relays] Out of the mailing list

2012-01-10 Thread Paul Staroch
Am 2012-01-10 13:40, schrieb Bruno Kitzis: > I don't want to receive the TOR-mail anymore. Just unsubscribe yourself. If you have a look into the headers of a mail coming from the list, you'll find this: List-Unsubscribe: ,

Re: [tor-relays] Abuse complaints about brute forceing via ssh

2012-01-02 Thread Paul Staroch
Am 2012-01-02 12:23, schrieb cmeclax-sazri: > On Sunday 01 January 2012 23:36:13 grarpamp wrote: >> This 'attack' has been going on for YEARS. Nobody's really getting >> shells (well some are), just dictionaried. The problem is that >> OpenSSH logs this by default and people freak out when they >>

Re: [tor-relays] planned downtime

2012-01-02 Thread Paul Staroch
Am 2012-01-02 12:25, schrieb cmeclax-sazri: > Sometime this week (I haven't decided when yet) I'll be down for a few hours > to upgrade memory. > > Why and for whom is that relevant? Keep in mind that the Tor network handles churn quite well. Paul __