> While still running several Exits I would be more than happy to meet others
> there
>
> Thanks
Me too :-)
So a voucher would be highly welcome
Greetings
Paul
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org
Am 10.01.2017 um 21:01 schrieb nusenu:
>
>
> pa011:
>> Could you explain please why names like torworld.org, torservers.net,
>> online de, etc. are not aggregated in one position on
>> https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_
Hi nusenu,
thank you for your daily work about "MyFamily".
Could you explain please why names like torworld.org, torservers.net, online
de, etc. are not aggregated in one position on
https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_operators.txt
Would you judge torworld.or
Am 26.12.2016 um 14:53 schrieb nusenu:
>
>
> Thanks for fixing it!
>
> +---++
> | nickname | eMyFamilyCount |
> +---++
> | NeelTorRelay1 | 4. |
> | NeelTorExitUSWest | 4. |
> | NeelTorExitCZ
I am running (FreeBSD 11.0-RELEASE-p2) Tor 0.2.8.11
getting following warnings while Self-testing indicates that DirPort is
reachable from the outside?
Can these warnings be ignored, while Tor is running properly afterwards ?
Merry Christmas!
Paul
Dec 24 13:20:57.000 [notice] Bootstrapped 8
Am 20.12.2016 um 14:40 schrieb Volker Mink:
> Is it OK with their TOS to run a TOR Relay7Exit?
> If so, i really consider getting a VPS there!
Volker - apart from not putting all eggs in the same basket (France as country
and Online.net as ISP), but if you really wanna go there scaleway opened
Hi nusenu,
thanks for your great work - lets assume for a second I would be with several
relays on both of you lists:
https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_operators.txt
https://raw.githubusercontent.com/ornetstats/stats/master/o/potentially_dangerous_relaygroups
Have Juniors interested in our work, likely to follow our steps or build new
ones...need tickets for Hamburg 33C3
"Up-and-coming" would be great, but would consider "Standard" as well...
Hopefully :-)
Thanks and regards
Paul
___
tor-relays mailing
> Hi Moritz,
>
> I do understand that it's hard to run an organization with too few
> people, it's my daily life working for staff at my university (I am the
> only administrator for 16 tablets, 34 laptops, 3 servers and 7
> thinclients, and we are not allowed to use centralized tools, I have to
>
>> Isn’t it somehow dangerous in the area we operate, to rely on a piece
>> of software created more or less by a single person?
>
> Thanks for this question. Can you give a few examples for "dangerous" in
> the context of your question so I might be able to address your concerns
> more specif
Am 10.12.2016 um 21:12 schrieb Ivan Markin:
> pa011:
>> What about relays not on the list at all?
>
> You mean that are not subscribed for tor-relays@?
No, forget that one - was my mistakable in the spreadsheet
>
> btw, it would be awesome to give away t-shirts or
> I would however be very interested to hear back from tor-relay operators
> if any of them have found Challenge ACK counter values higher than
> a million... which would indicate some kind of funny business.
>
Thanky you for your work.
I know of 3 relays with ACK above 1 million:
TCPChall
Very good Nusenu - I like your insistent dialogue and asking in this case :-)
You are quite often referring to Ansible which is new to me. Is there a
permanent free version around to let your
https://github.com/nusenu/ansible-relayor run on it?
Isn’t it somehow dangerous in the area we operate,
Am 06.12.2016 um 18:16 schrieb Rana:
> -Original Message-
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
> Of pa011
> Sent: Tuesday, December 06, 2016 1:24 AM
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Unwarranted
> I would like to hear about ONE Raspi Tor operator who was allowed by DirAuths
> (or bwauths or whatever) to come even near 1 mbit/s bandwidth utilization
>
let me tell:
https://atlas.torproject.org/#details/AA44C4BE3C90DCAAC09E5CD26150710AAA80D58B
https://atlas.torproject.org/#details/CA9A
.9.5.a, if you
> don't done this already (e. g. portsnap fetch update && portmaster
> security/tor-devel).
>
> Regards,
>
>
> On 05.12.2016 18:32, pa011 wrote:
>> Working :-)
>>
>> It looks like it was missing the Address in torrc.
>
Working :-)
It looks like it was missing the Address in torrc.
I added up some RAM before- that didn’t help.
Ok, now I have time to follow up all your other recommendations in the coming
days.
Thank you all very much for your help!
Best Regards
Paul
p.s. as it is finally that easy to get BS
Rana, I don’t think ""submit a patch" needs any clarification.
Maybe you are a little bit to aggressive in your wording :-) ?
I do have a dynamic IP as well on one relay and do know that frustration.
Relax
Paul
Am 04.12.2016 um 19:23 schrieb Rana:
> Please clarify what you mean by "submit a p
Am 03.12.2016 um 17:13 schrieb nusenu:
>
>> By default, FreeBSD's tor and tor-devel port want to store logs inside
>> /var/log/tor/ regardless of what you put in the /usr/local/etc/tor/torrc
>> file last I looked.
>
> Are you sure? What security/tor package version was this?
> This never happen
n 02.12.2016 00:57, pa011 wrote:
>> solved, as far as I can see now - maybe more tomorrow..
>>
>> Thank you very much gentlemen for your help :-) !!!
>>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.t
solved, as far as I can see now - maybe more tomorrow..
Thank you very much gentlemen for your help :-) !!!
Am 02.12.2016 um 00:51 schrieb diffusae:
> ln -s /usr/local/bin/python2.7 /usr/local/bin/python
___
tor-relays mailing list
tor-relays@lists.to
Am 02.12.2016 um 00:32 schrieb George:
> On 12/01/16 18:25, pa011 wrote:
>>
>>
>> Am 02.12.2016 um 00:19 schrieb diffusae:
>>> Hi!
>>>
>>> On 02.12.2016 00:04, George wrote:
>>>> Installing security/arm is simple enough.
>>&g
Am 02.12.2016 um 00:21 schrieb Michael Armbruster:
> On 2016-12-01 at 23:54, pa011 wrote:
>> There were some talks about network diversity recently, so I made up my mind
>> and started a freeBSD server.
>>
>> On advice from here
>>
Am 02.12.2016 um 00:19 schrieb diffusae:
> Hi!
>
> On 02.12.2016 00:04, George wrote:
>> Installing security/arm is simple enough.
>>
>> pkg install arm
>
> Yes, that normally should solve your problem.
>
> I've recognized that the dependencies are on Tor v0.2.8.9.
> You can't install it with
>
> On Thu, Dec 1, 2016 at 4:01 PM, pa011 mailto:pa...@web.de>>
> wrote:
>
> I saw that and tried "touch /var/log/tor" - didn’t help ..
>
>
> Am 01.12.2016 um 23:57 schrieb Marcel Krzystek:
> > It appears you have a space in "touc
I saw that and tried "touch /var/log/tor" - didn’t help ..
Am 01.12.2016 um 23:57 schrieb Marcel Krzystek:
> It appears you have a space in "touch /var/log tor" that should not be there.
> Try "touch /var/log/tor" instead.
>
> On Thu, Dec 1,
There were some talks about network diversity recently, so I made up my mind
and started a freeBSD server.
On advice from here
https://gist.github.com/teor2345/c6e2890c44097fd6aaceeedec08c6431 I placed a
line in the torrc file "Log notice file /var/log/tor/log"
Following these instructions fr
You can contact them on the given snei-noc-ab...@am.sony.com and they will give
you a list of attacked IPs.
Paul
Am 29.11.2016 um 14:48 schrieb SuperSluether:
> I keep getting Account Takeover Attempt abuses on my Tor exit, and I'm not
> sure how to handle them:
>
> It is most likely the attac
Looking to meet other Exits in Hamburg - just need a ticket :-)
Paul
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Thank you Nusenu for your list.
Maybe you can add a Nickname column next time for all those, who have more than
one hamster in the race.
Rgds Paul
Am 15.11.2016 um 22:17 schrieb nusenu:
>
> https://blog.torproject.org/blog/tor-0289-released-important-fixes
>
>
> If you are unsure whether yo
First poor round of selling is over - anybody holding more tickets than he
needs already?
Would still take one :-)
Paul
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi,
got the abuse below on three different exits. Anybody having any idea what to
do and how to possibly to stop this in the future?
Thanks Paul
CERT-EU has received information regarding an infected IP belonging to your
network, which may have security problems. The information regarding the
Anybody holding a Voucher for 33C3 in Hamburg at the End of December?
More than happy to get hold of it :-)
Paul
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Got problems overnight. On all servers traffic died down and looks like below -
what went wrong please?
Here is what I did:
apt-get install dnsmasq
/etc/resolv.conf
nameserver 127.0.0.1
/etc/dnsmasq.conf
server=216.87.84.211 #open.nic us
server=84.200.69.80 #dns.watch
These errors do only get up when starting "apt-get update"
not when "dig ftp.de.debian.org" - this gets solved well.
Am 17.10.2016 um 19:00 schrieb pa011:
> Thank you Toralf for you instructions and kick again.
>
>
> Following those
>
>> [2
Thank you Toralf for you instructions and kick again.
Following those
> [2] https://zwiebeltoralf.de/torserver.html
instruction do work but leave me with several unresolved queries:
»deb.torproject.org«
»archive.ubuntu.com«
»security.debian.org«
»ftp.de.debian.org«
and a few more. What serve
I do see kind of stagnation compared to other Exits in the same time frame.
So I wondered what the connectivity is ?
Its hard to find information about bandwidth and monthly traffic volume in
regard to prices and location regarding Azure?
Am 12.10.2016 um 18:15 schrieb nusenu:
>> Update on my
My personal efforts over the last months as well as the recent discussion about
Intrusion prevention showed, there are more and more ISP's not giving support
any more for running Tor exits, either in not allowing new ones or even
shutting down existing ones.
Sure there are still chances to find
> 2016-10-09 11:44 GMT+02:00 pa011 :
>> OK further bad news, Exit shut down by DO yesterday.
>> Here the latest statement from them:
>>
>> "Additionally, we are not allowing further TOR exit nodes on our
>> infrastructure - they generate a large amount of abuse
OK further bad news, Exit shut down by DO yesterday.
Here the latest statement from them:
"Additionally, we are not allowing further TOR exit nodes on our infrastructure
- they generate a large amount of abuse, are used for various illegal
activities, and attract a large number of DDoS attacks.
ccount, make new account.
> They will kick you after 2-3 months. Delete account, make new account.
> They will kick you after 2-3 months. Delete account, make new account.
> Welcome to DigitalOcean!
>
> Markus
>
>
> 2016-10-07 23:23 GMT+02:00 pa011 :
>> Seems like e
Seems like even DO is not very much in favour of running Exits any more ?
Anybody made the same experience - how to handle this please ?
Thanks and Regards
Paul
"Hello -Although we do not specifically disallow TOR exit nodes, as the account
holder you are responsible for all the traffic going
Am 07.10.2016 um 20:20 schrieb Green Dream:
> One of my guard relays has a few entries on Oct 06 also:
>
> Oct 06 09:04:00.000 [warn] Duplicate rendezvous cookie in
> ESTABLISH_RENDEZVOUS.
> Oct 06 09:04:00.000 [warn] Duplicate rendezvous cookie in
> ESTABLISH_RENDEZVOUS.
> Oct 06 10:17:30.
Am 04.10.2016 um 18:46 schrieb Moritz Bartl:
> Still, this will not help in this (and related) cases: I have not yet
> seen proven cases where the reputation of the netblock was endangered,
> but if an ISP is afraid of that, there's no good way to cooperate. An
> IDS is their obvious suggestion,
do other people here handle this?
Obviously the attacked target needs an other explanation as the ISP.
>
>
> On 04/10/16 12:01 PM, pa011 wrote:
>> Me too Markus -could fill a folder with that tax issue :-((
>> Costing a lot of time to answer and restrict the IPs
>>
&
nly got 2 complaints in
>> the last 2 months, and that was for SSH and SQL stuff.
>>
>>
>> On Oct 4, 2016 11:01 AM, "pa011" wrote:
>>>
>>> Me too Markus -could fill a folder with that tax issue :-((
>>> Costing a lot of time to answer and re
.103 # TAX SPAM
> ExitPolicy reject 147.67.136.21 # TAX SPAM
> ExitPolicy reject 147.67.119.103 # TAX SPAM
> ExitPolicy reject 147.67.119.3 # TAX SPAM
> ExitPolicy reject 147.67.136.3 # TAX SPAM
> ExitPolicy reject 147.67.119.21 # TAX SPAM
>
> Thats going on for months now and by
Am 04.10.2016 um 16:48 schrieb krishna e bera:
> On 04/10/16 08:48 AM, pa011 wrote:
>> One of my main ISP is going mad with the number of abuses he gets from my
>> Exits (currently most on port 80).
>> He asks me to install "Intrusion Prevention System Software" o
One of my main ISP is going mad with the number of abuses he gets from my Exits
(currently most on port 80).
He asks me to install "Intrusion Prevention System Software" or shutting down
the servers.
He personally recommends Snort or Suricata.
As far as I understand implementing such a software
Am 27.09.2016 um 19:37 schrieb nusenu:
> pa...@web.de wrote:
>> there is that list of "potentially_dangerous_relaygroups" you published.
>> Could yo please emphasize a bit more on what brings a relay on that list,
>> apart from incorrect given MyFamily which doesnt seem to be always the case.
>>
Hi nusenu,
there is that list of "potentially_dangerous_relaygroups" you published.
Could yo please emphasize a bit more on what brings a relay on that list, apart
from incorrect given MyFamily which doesnt seem to be always the case.
I mean I see quite a few well respected names on that list ?
nstead of Google DNS. Google DNS sees almost 50% of all
> Tor traffic, and could potentially link people across exits.
>
>
> On Sep 27, 2016 8:48 AM, "pa011" mailto:pa...@web.de>> wrote:
>
> On one of my recently started Exits I do see a rather huge and inc
On one of my recently started Exits I do see a rather huge and increasing
difference between in and out traffic that I don see on any other Exit so far.
The rise doesn’t seem to be linear..
Any explanation for that - or can it just be on the back of a not fixed
repetitive warning?
Sep 27 06:42:
Thank you both.
@Tim: You would kind of argue, that the advantage of carrying the old keys to
the new machine is not that important (to keep old level of traffic from start)
and that it might be even better to start from scratch?
Paul
Am 12.09.2016 um 03:53 schrieb teor:
> In Debian, using t
I have to move a multiple instances Exit from one VPS to another.
Apart from creating the same instances on the new machine with
**tor-instance-create** I would then just copy the whole directory
/var/lib/tor/keys to the new VPS - or should I copy all /var/lib/tor/ to not
miss anything from the
Am 01.09.2016 um 05:39 schrieb teor:
>
>> On 1 Sep 2016, at 13:36, I wrote:
>>
>> Did someone mention t-shirts?
>>
>>
>> When is the last time anyone got a t-shirt?
>
> I'm pretty sure Jon has been sending them out on a regular basis.
> (We're trying to automate the process a bit more.)
>
> I
Looks like this is solved and belonged to not open ports
Sorry for the hassle
Paul
Am 16.08.2016 um 18:34 schrieb pa011:
> Just established a new Exit with two instances on (Linux 3.16.0-4-amd64) ,Tor
> 0.2.8.6
>
> On the second instance I get these warnings:
>
> [WARN]
Just established a new Exit with two instances on (Linux 3.16.0-4-amd64) ,Tor
0.2.8.6
On the second instance I get these warnings:
[WARN] Remote server sent bogus reason code 65021 [21 duplicates hidden]
[WARN] Remote server sent bogus reason code 65023 [95 duplicates hidden]
[NOTICE] Have tr
Hi Peter,
sorry was off a week and couldn’t answer:
/run/systemd/generator/tor.service.wants/tor@tor2.service
/run/systemd/generator/tor.service.wants/tor@default.service
Anyway with "steady hand" the system seems to have repaired itself in between.
I updated my other multi-instance exits toda
The only instance in /etc/tor/instances/ is tor2
There is no tor and nothing else in that directory
And I do have a torrc file in /etc/tor/
Best Regards
Paul
Am 06.08.2016 um 22:30 schrieb Peter Palfrader:
> On Sat, 06 Aug 2016, pa011 wrote:
>
>> Actually not - you are rig
est regards,
> Alexander
> ---
> PGP Key: https://dietrich.cx/pgp | 0x52FA4EE1722D54EB
>
> On 2016-08-06 14:56, pa011 wrote:
>> Thank you Michael for your hint - corrected that, but still having
>> that problem with main instance not running:
>>
>> Aug 6 14
a colon, not a slash. The slash is there to block a
> specific address *range*. You can read more about subnets and the
> calculation for a bitmask here: https://en.wikipedia.org/wiki/Subnetwork
>
> Best,
> Michael
>
> On 2016-08-06 at 13:30, pa011 wrote:
>> I am inexpe
I am inexperienced an have probably the same problem after upgrading to 0.2.8.6.
Even after reboot my second instance Tor-tor2 is running while the default
service is exiting - syslog looks like this:
Aug 6 12:11:33 tor[542]: Aug 06 12:11:33.744 [notice] Tor v0.2.8.6
(git-b88847615faea7c8) ru
the relay from the Internet.
>>
>> There's no need to use Tor to tunnel the (D)DOS. In this case, Tor doesn't
>> tunnel UDP, so it's unlikely to be the culprit.
>>
>> Tim
>>
>>>
>>>
>>> 2016-08-01 15:04 GMT+02:00 pa01
; available in the Tor consensus.
>> Then they can attack the relay from the Internet.
>>
>> There's no need to use Tor to tunnel the (D)DOS. In this case, Tor doesn't
>> tunnel UDP, so it's unlikely to be the culprit.
>>
>> Tim
>>
>>>
;
> 2016-08-01 14:44 GMT+02:00 pa011 :
>> The ISP didn’t mention - I would have to ask.
>>
>> What I saw was that the traffic was up about linear from usually 30Mbits
>> to above 100 Mbits over about 6 hours, bringing the CPU to 100% and
>> dropping.
>>
>&g
t; Markus
>
>
>
> 2016-08-01 14:28 GMT+02:00 pa011 :
>> Hello,
>>
>> one of my middle relays got auto limited by the ISP because of
>> "outgooing UDP flooding ".
>>
>> The VPS is pure debian8, fail2ban, pub key and nothing else installed -
>>
Hello,
one of my middle relays got auto limited by the ISP because of
"outgooing UDP flooding ".
The VPS is pure debian8, fail2ban, pub key and nothing else installed -
so I highly doubt the give reason for the traffic limitation.
Also I cant find anything in the log files.
Anybody having experi
Am 06.07.2016 um 22:09 schrieb Iain R. Learmonth:
> Hi,
>
> On 06/07/16 18:25, tor relay wrote:
>>> I've been running an exit node for over a year on OVH now, no problems
>>> so far. Highly recommended (especially since they give me 10TB of
>>> traffic for about 10$USD/month; considering I use a
>
Ok - very sorry - I foolished myself -this last issue is solved :-) !!
Thank you nusenu for your help !!
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/
Am 03.07.2016 um 17:06 schrieb nusenu:
>> Still open:
>>
>> "arm -i 9052" - is asking for a Controller password while I have a
>> HashedControlPassword in place ?
>
> if you configure tor to require a password for controlport access (that
> what HashedControlPassword is for), you will be asked
Am 03.07.2016 um 14:28 schrieb Peter Palfrader:
> On Sun, 03 Jul 2016, pa011 wrote:
>
>>
>>
>> Am 03.07.2016 um 13:31 schrieb Peter Palfrader:
>>> On Sun, 03 Jul 2016, pa011 wrote:
>>>
>>>>
>>>> Am 03.07.2016 um 13:03 schrieb P
Am 03.07.2016 um 13:31 schrieb Peter Palfrader:
> On Sun, 03 Jul 2016, pa011 wrote:
>
>>
>> Am 03.07.2016 um 13:03 schrieb Peter Palfrader:
>>> Let me read this for you.
>>>
>>> On Sun, 03 Jul 2016, pa011 wrote:
>>>
>>>> Jul 3 12
Am 03.07.2016 um 13:03 schrieb Peter Palfrader:
> Let me read this for you.
>
> On Sun, 03 Jul 2016, pa011 wrote:
>
>> Jul 3 12:09:27 tor[4532]: Jul 03 12:09:27.590 [notice] Opening OR listener
>> on 0.0.0.0:443
>> Jul 3 12:09:27 tor[4532]: Jul 03 12:09:2
Am 02.07.2016 um 20:14 schrieb Peter Palfrader:
> On Sat, 02 Jul 2016, pa011 wrote:
>
>> Ok - "Log notice file /var/log/tor/notices2.log" removed from
>> torrc, but that doesn’t influence the error message from systemctl
>> in no way.
>>
>> Sti
Ok - "Log notice file /var/log/tor/notices2.log" removed from torrc, but
that doesn’t influence the error message from systemctl in no way.
Still not working !
Does the machine on which I like to add this second instance have more
than one core??
I don’t want to use ansible at the moment - that
ID: 710 (code=exited, status=1/FAILURE)
Am 02.07.2016 um 16:02 schrieb pa011:
> Ok - I do have it and I installed a second instance called "tor2".
>
> I can control the first instance of Tor as usual with arm but how can I
> now control the running of "tor2" wit
Ok - I do have it and I installed a second instance called "tor2".
I can control the first instance of Tor as usual with arm but how can I
now control the running of "tor2" with arm?
When calling arm with "sudo -u _tor-tor2 arm" I get asked for a
Controller password even while having a HashedCont
Hi,
thank you for that link.
Unfortunately I have to out myself as I am a newbe and don’t know how to
get it working.
I can see - the tool
https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create
.
Do I have to download it? If so where to?
Sorry cant be more precise with my
Hi Patrick,
I do have the same issue with Debian, but didn’t find any documentation
that worked really. Could you please let me know in detail what you did,
if it is going well with you?
Thank you -best regards
Paul
Am 28.06.2016 um 10:37 schrieb Patrick ZAJDA:
> Hi Peter,
>
> I strangely didn
d about 50 percent -disk space more than enough.
Am 26.06.2016 um 19:39 schrieb Yuriy M. Kaminskiy:
> On 26.06.2016 16:22, pa011 wrote:
>> On start-up my Exit (Linux 3.16.0-4-amd64) Tor 0.2.7.6 creates this log
>> message:
>>
>> [warn] OpenSSL version from headers does n
On start-up my Exit (Linux 3.16.0-4-amd64) Tor 0.2.7.6 creates this log
message:
[warn] OpenSSL version from headers does not match the version we're
running with. If you get weird crashes, that might be why. (Compiled
with 100010bf: Op$bf: OpenSSL 1.0.1k 8 Jan 2015; running with 1000114f:
OpenSS
f so which ones?
- are ISP's treated different in different parts of the world?
Answers here might help me and others in bringing forward the discussion
with them.
Paul
Am 21.06.2016 um 15:38 schrieb BlinkTor:
> On Jun 20, 2016, at 4:19 AM, pa011 wrote:
>>
>> Hi all,
>
gt; whatever you want, this is just my advice and purely informational. I
> run quite a bunch of exits.
>
> On 6/17/2016 11:12 PM, pa011 wrote:
>> Thank you Michael, solving that obviously easy question :-)
>>
>> So what was this "attac" then about, on which way, how c
Jun 19 20:24:38.000 [warn] eventdns: All nameservers have failed
Jun 19 20:24:38.000 [notice] eventdns: Nameserver 8.8.4.4:53 is back up
I do get this in my logs on an exit (Tor 0.2.7.6) several times every hour.
The /etc/resolv.conf contains
# Generated by SolusVM
nameserver 8.8.8.8
nameserver
Thank you Michael, solving that obviously easy question :-)
So what was this "attac" then about, on which way, how can I see that ?
Nice weekend to all
Paul
Am 17.06.2016 um 21:53 schrieb Michael Armbruster:
> On 2016-06-17 at 21:51, pa011 wrote:
>> Thank you both !
>
gh ?
Am 17.06.2016 um 21:42 schrieb Moritz Bartl:
> On 06/17/2016 09:35 PM, pa011 wrote:
>> As I am new to this business could somebody please give me a hint how to
>> best handle such an abuse complain - possibly stop it?
>
> You can explain Tor, offer to block that destination f
As I am new to this business could somebody please give me a hint how to
best handle such an abuse complain - possibly stop it?
Thanks, Regards and a nice weekend.
we have detected abuse from the IP address xxx.xxx.xxx,xxx, which
according to a
whois lookup is on your network. We would appreciat
I would offer 2 helping hands and possibly more as well to get this and
my own shirt out - please contact me
Paul
Am 08.06.2016 um 18:05 schrieb l3thal.inject...@gmail.com:
> If tor weather isn't running, and tshirt emails aren't being sent out,
> is someone doing this manually then? How can I he
I like to try this chnage as well - where do I find this file/parameter
exactly?
Thanks
Am 11.06.2016 um 20:11 schrieb SuperSluether:
> Fixed it! And I feel like I'm going crazy. If I'm reading the logs
> correctly, Tor is signaling readiness to systemd /1 hundredth of a
> second (0.01)/ past th
as I guess ? and Raspbian 8 jessie ?
>
> Raspbian repo are ok, not as updated as the Tor repo, but it's working ;)
>
>
>
> Le 11/06/2016 à 13:32, pa011 a écrit :
>> Same problem here today after several updates...
>> rpi-update doesn’t solve the issue unfortu
Same problem here today after several updates...
rpi-update doesn’t solve the issue unfortunately
log-file looks like this:
Jun 11 13:20:50.000 [notice] Clean shutdown finished. Exiting.
Jun 11 13:20:53.000 [notice] Tor 0.2.7.6 (git-605ae665009853bd) opening
log file.
Jun 11 13:20:52.462 [warn] Op
I would like to understand the working of two exit relays, one is about
7 days old -the other worked as a middle relay before and is an exit now
for about two weeks. The second one has a higher potential connection up
to 250 Mbit/s while the first is supposed to be limited on 100 Mbit/s.
They both
@Green
Thank you - couldn’t handle 'attack vector' as a synonym for ""method or
type of attack" :-)
Additional to that is it clever for a supporter of TOR to to run more
than one Relay (Exit) with a single ISP or even AS
https://en.wikipedia.org/wiki/Autonomous_system_(Internet) or does this
build
@Green
Could please explain a bit more what you mean by "Avoiding using two
nodes from the same AS would seemingly go a long way toward mitigating
the attack vector you mentioned though."
Thanks
Paul
Am 25.05.2016 um 21:22 schrieb Green Dream:
> @Nils
>
> Tor path selection avoids using relays
Hi Markus,
on your hint I was just checking feralhosting.com. They are quoting:
"We do not allow Tor exit nodes to be run on our servers. They're open
invitations for trouble, and while Tor serves a useful purpose our
network is not the place for it.
Tor relays are fine provided they strictly onl
This page
https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
cant be found at the moment - anybody holding a copy of it please?
There is something similar 6 years old:
https://www.facebook.com/notes/tor-project/tips-for-running-an-exit-node-with-minimal-harassment/407918266
I contacted ITL (https://itldc.com/) as well two weeks ago. To me they
refused opening an exit: "We decide to do not allow new public tor exit
nodes in our network. Existing public tor exit nodes we be kept."
Paul
Am 21.05.2016 um 14:37 schrieb Neel Chauhan:
>>Do you know of a VPS for an exit?
19.05.2016 um 13:56 schrieb Moritz Bartl:
> On 05/18/2016 10:13 PM, pa011 wrote:
>> Is there anybody out there who can give me some advice, or even help me
>> doing (answering) these?
>
> I think it is pretty much straightforward. You can explain what Tor is,
> why you a
I am running some pretty good developing relays which I would like to
change into exit-nodes over time. As I have no experience how to handle
possible abuses I would need some help please?
Is there anybody out there who can give me some advice, or even help me
doing (answering) these?
How many of
1 - 100 of 106 matches
Mail list logo