Hi list,
I just found out that my obfsproxy relays didn't obfsproxy any more. I
was apparently running a pretty old version, installed from source.
How do you people keep your obfsproxies (and pyptlib) up to date? Are
there packages? Is there a list or some other channel where new versions
are an
On 03/11/2015 10:57 PM, yl wrote:
>>> I mean the only reason, why there is more Tor-Exit-IPs
in the abuse log than any other single unique IP is that there is tens
of thousand of users using each Tor-Exit.
>> If this claim could be substantiated by some numbers it'd certainly help.
> I fu
On Thu, 12 Mar 2015, Linus Nordberg wrote:
> I just found out that my obfsproxy relays didn't obfsproxy any more. I
> was apparently running a pretty old version, installed from source.
>
> How do you people keep your obfsproxies (and pyptlib) up to date? Are
> there packages? Is there a list or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi David,
> Excellent! Do you plan to do this for the debian package as well?
yes the debian init script was actually done before the one for the
RPM packages.
See my initial email:
> now lets hope for the debian packages before 0.2.6.x is releas
Peter Palfrader wrote
Thu, 12 Mar 2015 10:19:51 +0100:
| There is an obfs4proxy package for Debian and Debian-based systems
| deb http://deb.torproject.org/torproject.org obfs4proxy main
Oh! obfs4proxy does obfs2 and obfs3 too:
https://lists.torproject.org/pipermail/tor-relays/2014-Septemb
Moritz Bartl wrote
Thu, 12 Mar 2015 09:58:00 +0100:
| >>> I mean the only reason, why there is more Tor-Exit-IPs
| in the abuse log than any other single unique IP is that there is tens
| of thousand of users using each Tor-Exit.
| >> If this claim could be substantiated by some numbers
Hi.
I've configured my bridge to support obfs3 and obfs4 transports using
the debian obfs4proxy package from
http://deb.torproject.org/torproject.org. Connecting to the bridge using
TBB 4.5a4 works for obfs3 but not obfs4.
TBB produces this error:
[warn] Proxy Client: unable to connect to x.
On Thu, 12 Mar 2015 10:44:28 -0600
Tim Sammut wrote:
> The bridge line I am supplying to TBB looks like:
>
> bridge obfs4 x.x.x.x:41980
obfs4 requires clients to prove that they know the server's obfs4
public key. This means that the bridge line needs a bit of extra
information added.
On t
Hi,
I'm not able to fetch the pgp key for the debian repo, as described
here: https://www.torproject.org/docs/debian.html.en
$ gpg --keyserver keys.gnupg.net --recv 886DDD89
gpg: requesting key 886DDD89 from hkp server keys.gnupg.net
?: keys.gnupg.net: Host not found
gpgkeys: HTTP fetch error 7:
$ host keys.gnupg.net
keys.gnupg.net is an alias for pool.sks-keyservers.net.
pool.sks-keyservers.net has address ... [truncated]
Works fine here, can you resolve the alias pool.sks-keyservers.net?
On 12 March 2015 at 16:49, Sven Reissmann wrote:
> Hi,
>
> I'm not able to fetch the pgp key for
On Thu, 12 Mar 2015 17:49:15 +0100
Sven Reissmann wrote:
> I'm not able to fetch the pgp key for the debian repo, as described
> here: https://www.torproject.org/docs/debian.html.en
>
> $ gpg --keyserver keys.gnupg.net --recv 886DDD89
> gpg: requesting key 886DDD89 from hkp server keys.gnupg.net
Well ... that's interesting:
strange ~ # host keys.gnupg.net
keys.gnupg.net is an alias for pool.sks-keyservers.net.
pool.sks-keyservers.net has address 148.251.123.9
pool.sks-keyservers.net has address 81.187.55.68
pool.sks-keyservers.net has address 82.6.213.168
pool.sks-keyservers.net has addre
Hello.
Would enabling the hardware random number generator on a relay node be
usefull in terms of increased performance?
If so, is it enough to activate /dev/hwrnd or is some configuration and/or
recompilation required?
Regards
___
tor-relays mailing li
On Mon, Mar 09, 2015 at 06:16:25AM +, oneoft...@riseup.net wrote:
> Hi,
>
> Can someone point me to an overview of the different legal situations for
> running tor relays in European countries? I'm especially interested how the
> situation differs per country.
>
I'm from the luxembourgish tor
On 2015-03-12 18:55, Sven Reissmann wrote:
strange ~ # ping keys.gnupg.net
PING pool.sks-keyservers.net (144.76.120.109) 56(84) bytes of data.
64 bytes from encrypt.to (144.76.120.109): icmp_req=1 ttl=56 time=6.71
ms
64 bytes from encrypt.to (144.76.120.109): icmp_req=2 ttl=56 time=6.84
ms
s
I connected to pool.sks-keyservers.net directly to fetch the key.
It's still strange, as I tried multiple times and even from two
different systems to be sure it's not because of my DNS cache.
Anyways, thank you all :)
Regards, Sven.
--
PGP Key: https://0x80.io/pub/files/key.asc
PGP Key Fingerpr
16 matches
Mail list logo