n87
>
> Kind regards
> Tor-node.net
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90
tors from the
new authority, but as far as I know, bridge descriptor updates aren't essential
for clients to continue to use a bridge. (I may be wrong about this.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
OTR 8F39BCAC 9C9DDF
;
> ___________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F
hanks,
> Seongmin
>
> [1] http://ina.kaist.ac.kr/~dongsuh/paper/kim-hotnets2015.pdf
> [2] http://ina.kaist.ac.kr/~dongsuh/paper/opensgx.pdf
>
> 2016-07-08 9:07 GMT+09:00 Tim Wilson-Brown - teor :
>
> > On 8 Jul 2016, at 09:48, Tim Wilson-Brown - teor wrote:
> >
> >
>
___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
> On 8 Jul 2016, at 09:48, Tim Wilson-Brown - teor wrote:
>
>
>> On 8 Jul 2016, at 09:41, nusenu wrote:
>>
>> Hi Seongmin,
>>
>> out of curiosity I was wondering whether your so called tor "platform"
>> string ("??B`?\u000
ys mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message
rking on it, and it's called "next generation hidden services".
Until then, relays get banned for this behaviour.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6
> On 5 Jul 2016, at 19:23, Toralf Förster wrote:
>
> Signed PGP part
> On 07/05/2016 04:01 AM, Tim Wilson-Brown - teor wrote:
> > In 0.2.8.3-aplha, "clients, onion services, and bridge relays always use an
> > encrypted begindir connection for directory requ
connections are made over the ORPort.
This means that in 0.2.8 clients no longer use any DirPort, and relays only use
the IPv4 DirPort.
IPv6 clients and bridge clients use the IPv6 ORPort.
In 0.2.7 and before, clients and relays only use the IPv4 DirPort.
IPv6 bridge clients use the IPv6 ORP
estions for small changes before merging.
>
> Thanks,
> Iain.
>
> [1]: https://trac.torproject.org/projects/tor/ticket/5430
> [2]: https://trac.torproject.org/projects/tor/ticket/6787
> _______
> tor-dev mailing list
> tor-...@lists.t
t;
> [1]: https://trac.torproject.org/projects/tor/ticket/5430
> [2]: https://trac.torproject.org/projects/tor/ticket/6787
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/m
EBE2 3AE5
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
e something to add, to remove ?! Another eye is always cool to be sure
> !
>
> Many thx for your lights :)
>
> --
> Petrusko
> PubKey EBE23AE5
> C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.or
similar for "involuntary" FTP servers before. Bonnet?
Or a honeypot. Or a series of cloned servers. It's hard to tell.
But there do seem to be a large number of them, 55 in a recent consensus.
And no contact info, either.
We might want to remove these relays from the network before th
ther code that assumes 1 key = 1 IPv4.)
Tim
>
> Simon
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094
can help tor clients use the Tor
>> network. Please opt-in!
>>
>>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricoche
lue but
> heartbeat notices. I have also reviewed system logs and can find nothing
> out of the ordinary.
>
> Any thoughts on this? Any help would be appreciated. I will also open a
> bug report if needed.
>
> Thanks!
>
> //Brian
> <0x5E17D55A.asc>_______
node) by the directory
authorities if it has enough stability and bandwidth over time. For more
information, please read:
https://blog.torproject.org/blog/lifecycle-of-a-new-relay
Your relay is already a directory mirror, because you have configured a DirPort.
Tim
Tim Wilson-Brown (teor)
t
ust change the tor
startup script and torrc.
Tim
>
> Sebastian
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brow
53 is only useful for clients that want to run their own DNS over TCP, or use
port 53 for something else.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
lays-boun...@lists.torproject.org] On Behalf
> Of Tim Wilson-Brown - teor
> Sent: 20 May 2016 16:49
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] What's this Abuse
>
>
>> On 20 May 2016, at 11:12, Dr Gerard Bulger wrote:
>>
>>
>> M
don't want our mailing list messages to go against this goal.
(Even if the Internet users involved are not using Tor or another IP
anonymisation method.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
si
Tor users, it's for Tor relay operators.
For any more emails on this question, please reply to
tor-t...@lists.torproject.org.
Have you tried whitelisting the other processes that tor runs, like tor.exe?
You might also need to ask Norton how to properly whitelist Tor Browser, rather
than askin
> On 2 May 2016, at 09:51, eliaz wrote:
>
>> On 5/1/2016 4:52:12 AM, Tim Wilson-Brown - teor (teor2...@gmail.com) wrote:
>>>> On 1 May 2016, at 16:52, eliaz wrote:
>>> =20
>>> =20
>>>> On 4/30/2016 7:33:26 PM, Moritz Bartl (mor...@tors
;catch all" than tor-relays.
> [snip]
>
> I neglected to mention that tor crashes upon restart when I'm running my
> bridge. Restarting in client mode works fine. So should I send the
> details to tor-talk or tor-relays?
Please log a bug at https://trac.torproject.org
he proxy service access to all your Exit's
traffic.
>
> Gerry
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (
1:36, Dr Gerard Bulger a écrit :
>> What if you want to shutdown forever.
>>
>> I am in the process of moving mine to another server. How do I stop tor
>> atlas listing the old one?
>>
>>
>> -Original Message-----
>> From: tor-relays [mailto:tor
ts will stop using it when they find it's down, or within 5 hours.
Tim
>
>
> -Original Message-
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
> Of Tim Wilson-Brown - teor
> Sent: 28 April 2016 10:30
> To: tor-relays@lists.torprojec
t 30 seconds) for clients to choose a new guard.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relay
> On 28 Apr 2016, at 19:18, Toralf Förster wrote:
>
> Signed PGP part
> On 04/28/2016 11:14 AM, Tim Wilson-Brown - teor wrote:
> > Ports in, or ports out?
> Ports in I meant, sry.
>
> > Closing inbound ports is a security precaution
> The question is - if the
er Tor relays can choose any
port for their ORPort and DirPort.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailin
sses. Using swap for Tor may slow things
down more.
> If in case I cant use the whole 100Mbit/s - what would be the minimum
> requirement in memory I would need as the CPU is just working on a 20
> percent level?
We typically recommend 512MB, but your experience may vary depending on your
v4 address may be blocked in some jurisdictions, but not others.
So it still could be useful for some users.
And the bridge's IPv6 address is far less likely to be blocked, so it will be
useful by itself.
Please also note that you can have a maximum of 2 relays per IPv4 address (or a
relay
r destination.
Does tor start as a client?
If so, it's likely that you failed to copy the torrc file.
Does tor fail to start?
If so, it helps to let us know the warning messages it prints out.
Perhaps the files were corrupted on the way, or something else happened.
Tim
Tim Wilson-Bro
disk DoS risk here, particularly for relays with smaller disks.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays maili
settings on
your bridge.
It's normal for tor to change exits occasionally.
Do you know which exit your tor client was actually using during that time?
If so, report it to bad-rel...@lists.torproject.org
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu
elay
will be considered as a fallback when we next rebuild the list.
Thanks
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-
0.2.8-rc, your relay was excluded as a fallback because the key had
changed.
Will you be keeping the new key for the next 2 years?
If so, I'll update the fallback list with the new key, and your relay will be
considered as a fallback when we next rebuild the list.
Tim
Tim Wilson-Brown (te
lications/tor-design.pdf
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@lists.torproject.org
ht
figure
the user and permissions correctly?
Tor also has more specific requirements for security reasons, this protects the
keys from other users on the system.
It's hard to give more advice without more specific details.
If this advice doesn't help, please copy and paste the configurat
emails sent to you bounce?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@lists.torpr
t was
going on.
That said, the list of relays in "Relays with broken DirPorts" consistently
failed over repeated attempts.
(The relays in "Relays with very slow DirPorts" might have been slow on my end,
and might just have been slow once.)
Tim
Tim Wilson-Brown (teor)
te
Dear Relay Operators,
Please see below for an updated list of slow relay DirPorts.
> On 31 Mar 2016, at 11:13, Tim Wilson-Brown - teor wrote:
>
> While I was checking fallback directory mirrors for #17158, I encountered
> some relays that took more than a minute to serve a con
> On 31 Mar 2016, at 11:42, Tim Wilson-Brown - teor wrote:
>
>
>> On 31 Mar 2016, at 11:23, Michael McConville > <mailto:mm...@mykolab.com>> wrote:
>>
>> You'll probably get through to more people if you include nicknames with
>> IP addres
would do that for me, I'm a little
snowed under at the moment.
Tim
>
> Thanks for this,
> Mike
>
> Tim Wilson-Brown - teor wrote:
>> Dear Relay Operators,
>>
>> Also while working on #17158, I found some relays whose DirPort responses
>> made my py
mp /
Wireshark check, but I don't have time at the moment.
Would anyone like to follow this up?
This is an incomplete list of broken relay IPs and DirPorts, starting with
those with the highest consensus weight:
217.23.14.190:1194
151.80.164.147:80
148.251.255.92:80
78.142.19.59:80
Thanks
T
highest consensus weight:
217.198.117.122:80
212.47.250.44:80
158.69.112.86:80
50.7.178.34:80
191.101.251.172:80
51.254.249.177:80
188.165.232.40:80
104.236.38.231:8080
89.163.225.184:9030
185.31.230.69:9030
81.7.14.227:9030
62.210.238.33:9030
164.132.56.137:9030
212.107.149.145:9030
94.23.165
> On 22 Mar 2016, at 08:14, Toralf Förster wrote:
>
> Signed PGP part
> Tim Wilson-Brown - teor:
> > * if the AccountingRule is not "in".
> Ah,
> AccountingRule in
> was meant. I did not set that config option in the past due to the impact of
> On 22 Mar 2016, at 04:22, Toralf Förster wrote:
>
> Signed PGP part
> Tim Wilson-Brown - teor:
> > In 0.2.8, every relay is potentially a hidden service directory and
> > a directory mirror.
> But with this configuration :
>
> # 20 TB/month: echo "20
led.
Relays use the DirPort directly, but they typically use the authorities for
directory documents. (Some obscure relay configurations will use the fallback
directory mirrors.)
Tim
>
>
>
> Am Sonntag, 20. März 2016 02:54 schrieb Tim Wilson-Brown - teor
> :
>
cy is not winning proposition.
I meant "a website using CloudFlare that has the "Block" option selected for
Tor".
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature
<https://support.cloudflare.com/hc/en-us/articles/203306930-Does-CloudFlare-block-Tor->
(URL likely unavailable from some Tor Exits.)
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
De
s a DirPort or not).
This used be controlled by the HidServDirV2 option, but that's now obsolete.
See ticket 16543 and commit 2f8cf524b.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
D
t;> not really add anything new to that site.
>>
>> It'a always a good idea to ask.
>
> I don't think it is worth the effort for non-exits. Since that should not
> botter the hoster at all.
Some hosters are bothered by (or do not support) high numbers of connection
resolution is performed by the Exit.
So technically, there are no DNS packets until the Exit queries its DNS servers
for the server name provided by the client.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D1
recover from the Valencia meeting,
> I expect this one will be easy to resolve.
I am still in an airport, and I believe others are still on post-dev-meeting
leave.
Give us a week or so to look into it.
We should be able to get a fix in the next alpha.
Tim
Tim Wilson-Brown (teor)
teor23
> On 9 Mar 2016, at 05:26, Michael McConville wrote:
>
> Zwiebel wrote:
>> Tim Wilson-Brown - teor wrote:
>>>> Zwiebel wrote:
>>>> is there a way to shut down Tor relays for a short time without
>>>> losing consensus weight or band
d reasons to run a fast relay.
If you're very close to your bandwidth cutoff, why not decrease it slightly,
and run all the time?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.as
ut Tor won't let me.
Networks need extra capacity - it increases average speeds, and absorbs sudden
usage spikes.
Consider starting a second tor instance on other ports to use the extra
capacity on your server.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah
circuit are on
different /16s.
(But it's still good to set MyFamily so it's clear which relays are controlled
by the same person.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
De
-how is huge. And
> their ability to draw information from any sort of internet traffic is
> unparalleled.
Please check your torrc and your entry in globe to make sure you're a non-exit
relay.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot
nd connections to stay under about 3/4 of the memory
you have.
Try 1GB.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
_
osen, and try new guards if all
previously chosen guards are down.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with Open
cated 2TB
> of bandwidth per month from my VPS
What processor is on your VPS?
How fast is it?
Does it have AES-NI?
Is your OpenSSL compiled optimised for your processor and for the encryption
that Tor uses?
How much RAM does your VPS have?
Have you read the torservers.net Tor tuning advic
0A9E71ADFC2FB1C80E64EF851A4B905450105'
>
> Tor Version 0.2.7.6 (Installed today)
> Debian 7.0
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message si
ers find that new address?
(For some users, the bridge authority might tell them when provided with the
bridge's fingerprint, but only if their other bridges work.)
> (Of course they could
> still simply block the whole /16 or whatever your ISP has)
Typically only the IP and port are b
e middle of a circuit, and for rendezvous points for short-lived hidden
service circuits. So it's not disruptive or useless. (It might slow down a few
clients who try your relay for the few hours each day it takes to find its new
IP address.)
Tim
Tim Wilson-Brown (teor)
teor2
t for 0.2.6.)
Give it time, and enough authorities should believe your relay is stable.
Perhaps you could consider upgrading it from 0.2.4?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 8
> On 18 Feb 2016, at 22:16, Mirimir wrote:
>
> On 02/18/2016 03:47 AM, Tim Wilson-Brown - teor wrote:
>>
>>> On 18 Feb 2016, at 14:40, Ricardo Malagon Jerez wrote:
>>>
>>> I don't know how and why, but since January is impossible to have an exit
.
Relays need to be able to post their descriptors to the authorities. So they
have to be able to reach at least one authority - they can't use only fallback
directory mirrors.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D
> On 15 Feb 2016, at 00:10, Volker Mink wrote:
>
> I think I found something.
>
>>> could not bind to 0.0.0.0:9001: address already in use
>
> Where can i set the binding?
Is your old Tor process still running?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail
torrc-file enabled.
> Port 9001 is forwarded at my router and the Pi is also in the DMZ.
Can you please send us the Tor log messages?
They usually say why Tor won't start.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F
> -V
>
> On Friday, 5 February 2016, Karsten Loesing <mailto:kars...@torproject.org>> wrote:
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> [Removing metrics-team@ to avoid cross posting.]
>>
>> On 28/01/16 21:22, Tim Wilson-Brow
Tim
> On Jan 31, 2016 3:27 PM, "Tim Wilson-Brown - teor" <mailto:teor2...@gmail.com>> wrote:
>
>> On 1 Feb 2016, at 08:19, SuperSluether > <mailto:supersluet...@gmail.com>> wrote:
>>
>> I'm not sure how many DNS servers are configur
DNS
requests.
A drawback is that your VPS company then sees your DNS requests and your
traffic, but they could do this anyway.)
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: M
vers?
Typically, by editing /etc/resolv.conf.
But some platforms automatically generate it using the files in
/etc/resolvconf/resolv.conf.d/
It should be fairly straightforward, if not, search the Internet for a HOWTO
for your platform.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
P
> On 29 Jan 2016, at 07:20, Roman Mamedov wrote:
>
> On Fri, 29 Jan 2016 06:33:51 +1100
> Tim Wilson-Brown - teor wrote:
>
>> Tor already considers relays in the same IPv4 /16 to be in the same family.
>
> Maybe a step further in this would be to autoextend manual
another matter.
Perhaps it could imitate Tor, and have a separate field called "network family"?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenP
67A1BA4EF1D13A617AEFB416CB9E44331B223A
>
> <https://atlas.torproject.org/#details/FE67A1BA4EF1D13A617AEFB416CB9E44331B223A>
Thanks for the fingerprint, Atlas confirms your relay is an Exit.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OT
that happened over the weekend?
> I have never seen it before.
This error is logged when Tor sends a DNS query to an address, but gets a reply
back from a different address.
This could be an attack, or a misconfigured DNS server, or simply a multihomed
DNS server.
Tim
Tim Wilson-Brown (teo
;s warnings.
Search the mailing lists, source code or Internet?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
__
> On 13 Jan 2016, at 11:21, Tim Wilson-Brown - teor wrote:
>> On 13 Jan 2016, at 10:33, Tim Wilson-Brown - teor > <mailto:teor2...@gmail.com>> wrote:
>>> At 19:20 1/12/2016 +0100, Aeris wrote:
>>>> ...
>>>> After grepping some logs, seems 13/
> On 18 Jan 2016, at 11:07, Roman Mamedov wrote:
>
> On Mon, 18 Jan 2016 10:16:40 +1100
> Tim Wilson-Brown - teor wrote:
>
>> I think if a client is just using it for bootstrap, any extra latency
>> shouldn't be an issue.
>> But IPv6 clients may also
er, with my others nodes
> (kitten[1-4])).
Hi Aeris,
kitten3 doesn't have a DirPort configured. Relays need a DirPort to be a
fallback directory mirror.
Let me know if you are able to configure a DirPort for it.
Also let me know if you want to opt-in or opt-out other relays in that fami
> On 19 Dec 2015, at 05:53, Felix wrote:
> ...
> I'm happy to bring in the relay Doedel22
> '8FA37B93397015B2BC5A525C908485260BE9F422'.
Hi Felix,
There are some other relays in that family, did you want to opt-in or opt-out
for them?
Tim
Tim Wilson-Brown (teor)
> On 18 Dec 2015, at 09:23, Tim Wilson-Brown - teor wrote:
>> On 18 Dec 2015, at 06:31, ]V[ > <mailto:mart...@beekhuis.org>> wrote:
>> Able!
>>
>
> ...
> Thanks, can you let me/us know the names your relay(s)?
> (I need to know the names to add th
tunnels?
Tim
[0]: We're working on it in
https://trac.torproject.org/projects/tor/ticket/17840
<https://trac.torproject.org/projects/tor/ticket/17840>
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D
hat family, should they be opt-in or
opt-out?
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F
signature.asc
Description: Message signed with OpenPGP using GPGMail
_
47A05BFBCF91,$5BFDECCE9B4A23AE14EC767C5A2C1E10558B00B9
Hi,
Thanks for the opt-in, but these relays have no DirPort configured.
Relays need a DirPort to act as fallback directory mirrors.
If you are able to configure a DirPort on these relays, please let me know, and
I'll add them to the list.
Tim
Tim Wilson-Brown (teor)
teor
I'm working on IPv6 client bootstrap in Trac Ticket #17840, hopefully it will
make it into 0.2.8.)
https://trac.torproject.org/projects/tor/ticket/17840
<https://trac.torproject.org/projects/tor/ticket/17840>
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor a
(or
fallback directory mirrors) when bootstrapping. This makes bootstrap more
reliable when only a few directory authorities are reachable. (It also doesn't
help relays, because they need to be able to reach the authorities.)
https://trac.torproject.org/projects/tor/ticket/4483
<http
> On 13 Jan 2016, at 10:33, Tim Wilson-Brown - teor wrote:
>
>
>> At 19:20 1/12/2016 +0100, Aeris wrote:
>>>> Are you *absoultely* certain that the config
>>>> was not fiddled with at the time of this event?
>>>
>>> After greppin
~62 seconds after the ORPort
self-test?
(Or, strictly, after the first descriptor was submitted?)
That would explain the behaviour we're seeing here.
(And it shouldn't be grounds for exclusion as a fallback directory, let me see
what I can do.)
Logged in trac as #18050.
https:
;> for this trial.
>
> I realise it's been a while since the last post in this thread, but
> I'd like to opt-in.
That's OK, we're still taking opt-ins.
Tim
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D
[2]: <https://github.com/teor2345/tor.git>https://github.com/teor2345/tor.git
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Tim Wilson-Brown (teor)
ackDirectoryMirrors
<https://trac.torproject.org/projects/tor/wiki/doc/FallbackDirectoryMirrors>
[2]: https://github.com/teor2345/tor.git <https://github.com/teor2345/tor.git>
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP 968F094B
teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7
> On 12 Jan 2016, at 12:11, Tim Wilson-Brown - teor wrote:
>
>
>> On 12 Jan 2016, at 10:14, starlight.201...@binnacle.cx
>> <mailto:starlight.201...@binnacle.cx> wrote:
>>
>> Found a serious bug in the
>>
>> updateFallbackDirs.p
tory of each relay rather than the
> 120 days requested.
>
> This results in 145 relays left
> off the list as too-old history is
> averaged into the percentages.
Thanks, logged as #18035
https://trac.torproject.org/projects/tor/ticket/18035
<https://trac.torproject.org/project
dress, ORPort and DirPort lines (or the entire torrc, if you're
able)
* The debug-level log output for the first and second calls to
resolve_my_address()
* there will be a lot of output here, and it can reveal sensitive info -
don't leave debug logging on all the time!
Tim
Tim Wil
1 - 100 of 184 matches
Mail list logo