Thanks for confirmation!
That's what I was suspecting.
Tim Niemeyer:
> Moin
>
> I just played a bit with the sources of this test system.
>
> At first I didn't get it work, but then I changed the hard coded guard
> to one of my own and voila ..
>
>
> I picked an exit with an error rate of 100%
I can't really understand why our relays should fail so often because
the logs of our DNS daemon don't show anything and I haven't seen the
warning about nameservers that failed for a long time...
Maybe the script that checks about DNS failures on Exits is not
reporting correctly?
Greetings
I'm very sad to read this but I totally understand you. Running such an
organization is not easy and even a bit ungrateful. Never the less we
from FVDE want to thank you and everybody behind torservers.net and
Zwiebelfreunde e.V. It has been a hell of a ride and maybe you are right
and the retreat
It would have helped if you contacted us again a week later when you didn't get
a response from us because your mail has clearly not reached us and was lost
(no trace of it in the logfiles) instead of directly going to the bad-relays
list. That's simply putting us in a bad light for a problem th
+1
Good to know that I'm not the only one finding this behavior of him wicked.
Emilian Ursu:
> Hi,
>
> I was planning to bring up this issue but the other way around,
> ContactInfo, Nickname and Myfamily are non-enforceable so why
> should tor rely on spoofable information for its operation?
>
Hi
Our two exit nodes "chulak" and "aurora" will be terminated by the end
of this month. Both are listed in the Fallback Directory Mirror list and
need to be removed.
Fingerprints:
379FB450010D17078B3766C2273303C358C3A442
B0279A521375F3CB2AE210BDBFC645FDD2E1973A
The shutdown is due to an intern
t 10:37:00PM +, Tyler Durden wrote:
>> The situation is very unlikely to change unless there is a major
>player
>> on "our side" which offers a free, censorship-free, resilient and
>stable
>> DNS Service.
>
>You are welcome to use our free, censorship-fr
All our nodes are using a local DNS caching server and only use google
as a fallback.
The situation is very unlikely to change unless there is a major player
on "our side" which offers a free, censorship-free, resilient and stable
DNS Service.
Greetings
nusenu:
> Dear Exit Relay Operators,
>
> I
teor:
>
>> On 5 Feb 2018, at 10:37, Tyler Durden wrote:
>>
>> Hi
>>
>> Just ~3 weeks before the 34C3, two of our newer Exits were thrown out of
>> the consensus weight and since than never came back in.
>> I'm talking about:
>> ger
Hi
Just ~3 weeks before the 34C3, two of our newer Exits were thrown out of
the consensus weight and since than never came back in.
I'm talking about:
geri (geri.enn.lu) 93FAB6F91C2EF33D0ACEEF7448177FCA2CEB99A0
freki (freki.enn.lu) C8AB1B2AF0CBAAE3611A814B4C7D38DCE0CBFEB4
We tried to purge the To
Simply have a look at https://torservers.net/partners.html
Greetings
Christian Pietsch:
> Please add:
>
> Digital human rights activist/advocacy NGO Digitalcourage e.V., Germany /
> https://digitalcourage.de /
> https://atlas.torproject.org/#search/family:9EAD5B2D3DBD96DBC80DCE423B0C345E920A7
Hi
We do also experience high memory consumptions by Tor from time to time
which result in a total halt of the system.
I'm now testing several values in MaxMemInQueues...
Greetings
tor-relay.d...@o.banes.ch:
> Dear all,
>
> we are operating two exit nodes with each two tor processes out of
>
Hi
We are present at this years hack.lu together with a booth with the
Chaos Computer Club Luxembourg. Should you guys happen to be around just
come by and talk to us. ( We do have Mate, Mate Schnapps and Flora Power
:P )
Tor Relay Operators Meet-Up
Where: FVDE & C3L booth at the main hall
Date:
They are a pain in the ass. We did block them on our mail server and reported
to our ISPs that they often send false-positives. Like UDP DDoS from our exit
nodes. Stuff like that. This calmed our ISPs.
We also tried to speak to them but they don't answer or when they did it was in
a rude way. Ab
Dhalgren Tor:
>> . . .I have to understand how my ISP reacts to this kind of things.
>
>> For the moment I will keep a low profile and I will block the
>> mentioned IP range for a month.
>
> Webiron's system sends notifications to both the abusix.org contact
> for the IP and to ab...@base-domain.
On 2015-07-31 05:30, Christopher Yeager wrote:
> Hello,
>
> I run a 100mb exit hosted at server.lu since sometime in late 2013. There
> have been a couple dozen abuse reports but normally they forward them to me
> to deal with and nothing much happens. However a week or so ago, while I
> was travel
On 2015-04-24 18:15, Moritz Bartl wrote:
> Hi,
>
> On 04/24/2015 10:19 AM, grarpamp wrote:
>> While you're busy doing all this writing and signing you need
>> to post the results up on the wiki, the tor relay banner page,
>> EFF legal info/opinion page update, etc.
> Looks like the problem with Ali
On 2015-04-23 13:57, Moritz Bartl wrote:
> On 04/23/2015 10:20 AM, Jan GUTH wrote:
>> So, I'll get in touch with our lawyer & with EFF. Is there anyone else
>> within EU, whom could certify them what Tor is and what it is capable of
>> and what not? Moritz?
> ...
>
> I'm happy to write something as
ut to EFF and Moritz.
>
> I am surprised and saddened to hear this.
>
> Have you told your ISP about Tor? Did you tell them in advance of
> setting up the relay what it is, and what it is not?
>
>
> Kind regards,
>
> Matt
> Speak Freely
>
> Tyler Durden:
>
Now Alistaro (our ISP) wants the IPs as well or they will probably shut
down the server tomorrow.
Well that escalated quickly.
--
Sam Grüneisen - President
Frënn vun der Ënn A.S.B.L.
enn.lu
___
tor-relays mailing list
tor-relays@lists.torproject.org
On 2015-04-20 22:29, Zack Weinberg wrote:
> On Mon, Apr 20, 2015 at 10:32 AM, Tyler Durden wrote:
>> I just wanted to let you know that Washington sent us a subpoena
>> regarding one of our exit nodes in Romania
> Just FYI, "Washington" doesn't appear to have
Hi
I just wanted to let you know that Washington sent us a subpoena
regarding one of our exit nodes in Romania. They want to know the real
IP behind the Tor Network. I mailed them what Tor is and why I can't
help them in identifying this person. Nevertheless I will give you the
link to the full sub
Have you informed EDIS in advance? As far as I know if you plan to run
exit nodes on a EDIS server you have to tell them so you get into a
private VLAN.
Greetings
On 2015-01-09 13:00, Torizen wrote:
> Hello,
>
> I've been running a non-exit relay on a EDIS VPS located in Spain for 5
> months.
>
My ISP detected it.
They didn't specify which kind of traffic. I guess that it was a SYN-DDoS
On 2014-08-04 19:04, Anders Andersson wrote:
> On Mon, Aug 4, 2014 at 2:53 PM, Tyler Durden wrote:
>> I just wanted to know from others how often your nodes are being DDoSed?
>> Be
I don't think so because RX traffic skyrocketed, not TX traffic.
Greetings
On 2014-08-04 16:17, t...@t-3.net wrote:
> We never had our exit nodes become the targets of DDOS attacks
> HOWEVER, we occasionally see abuse complaints due to someone abusing
> Tor to DDOS attack other targets. Perhaps
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi
I just wanted to know from others how often your nodes are being DDoSed?
Because this month one of our nodes has been targeted twice.
Because DDoS sucks and most providers aren't very happen when this
happens often.
Greetings
virii - enn.
Hi
We are not using puppet but a selfmade script.
On 2014-06-15 17:22, Nusenu wrote:
>> Did you take a look at the existing projects?
>>
>> https://github.com/search?q=tor+puppet
>>
>> Maybe you should merge your project with one of the existing ones?
> Is anyone at torservers & partners or anyon
On 2014-02-10 19:26, George Kadianakis wrote:
> Grozdan writes:
>
>> On Mon, Feb 10, 2014 at 6:54 PM, George Kadianakis
>> wrote:
>>> Grozdan writes:
>>>
On Mon, Feb 10, 2014 at 5:04 PM, George Kadianakis
wrote:
> Greetings,
>
> a few days ago we integrated ScrambleSuit
Well you are just a bridge.. Don't expect tons of traffic.
P.s: For a bridge this is already "a lot" of traffic.
Greetings
Am 01.08.2013 23:11, schrieb Shawn A. Miller:
> I've been running a Tor bridge on the Amazon EC2 cloud computing
> platform (per instructions at https://cloud.torproject.o
Looks like your DNS server is to slow to handle all the requests.
TO change your DNS server, open /etc/resolv.conf
If you are running an exit node yourself, try to install unbound as an
DNS caching server and put 127.0.0.1 at the first place in resolv.conf
http://wiki.enn.lu/cgi-bin/wiki.cgi?Scri
30 matches
Mail list logo