Re: [tor-relays] "stable" flag voting differences

2013-10-28 Thread Karsten Loesing
On 10/27/13 7:32 PM, starlight.201...@binnacle.cx wrote: > I observed an interesting behavior in the > authority votes regarding relay stability > and am curious if anyone can comment. > > Have a new relay, about ten days old. > Relay is marked > >Fast Guard Running Stable Valid > > One 10 m

Re: [tor-relays] "stable" flag voting differences

2013-10-28 Thread starlight . 2013q4
I was looking at the consensus health page, but had not dug into the voting files (sorta overlooked it). Will do that now, though it's downloading like molasses. If I figure it out will report back and will add anything meaningful to the ticket. >Hi, > >thanks for looking into these flag voting

Re: [tor-relays] Filtering TOR Non-exit Relay - Just Curious

2013-10-28 Thread Nelson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello! Konrad, initially and completely unrelated to Tor, I was working on adding some blocklists to my firewall when I came upon and old program, Peerblock. Peerblock from what I remember can log all allowed and blocked traffic, and gives one the abi

Re: [tor-relays] Filtering TOR Non-exit Relay - Just Curious

2013-10-28 Thread Nelson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 In addition, there's a host of possibilities (both good and bad) by being able to control a Tor relays traffic. I could be wrong, my previous findings may seem to indicate that anyone with the ability to strategically place a good number of middle and

Re: [tor-relays] Filtering TOR Non-exit Relay - Just Curious

2013-10-28 Thread Sebastian G.
27.10.2013 20:49, Nelson: > 1. Real Time Traffic Logging (ip's and ports logged) > 2. The ability to filter traffic. > > Apparently I am able to do both with PeerBlock, although I'm sure there > are more suitable and capable tools available out there that do this, > but I'm not aware of or have u

Re: [tor-relays] Filtering TOR Non-exit Relay - Just Curious

2013-10-28 Thread Nelson
> There's no classes of traffic for nodes that aren't exits. Exits can > guess based on the port what certain traffic is, port 25 for example > gets abused by spammers so it is not allowed by default. Exits are able > to identify the communication end-point and can exclude those that > complain abo

[tor-relays] Amazon abuse report

2013-10-28 Thread Sanjeev Gupta
Hi, I am running a number of Tor relays, in my own DC and at Amazon Singapore. I got an email from Amazon last week, for the Windows instance: == Hello, It's come to our attention that one of your EC2 instances may be configured as a Tor exit node. Please note that any open proxy activity is pr

Re: [tor-relays] Amazon abuse report

2013-10-28 Thread Moritz Bartl
On 28.10.2013 22:10, Sanjeev Gupta wrote: > Since Tor Cloud https://cloud.torproject.org/ suggests running on Amazon > EC2, I am confused. Tor Cloud images are configured to act as bridges. You can run non-exit relays on Amazon EC2, but the cost are comparatively expensive. As you've found out, Am