Hey.
Am 19.08.2014 17:51, schrieb JusticeRage:
The good news is, there is something you can do about it. This is
exactly what Sender Policy Framework [1] was created for. Long story
short, this is some information you can put in your DNS to indicate
which machines are allowed to send e-mails for
Hey.
Am 05.04.2016 20:24, schrieb SuperSluether:
I want to host an exit relay, but at the same time I don't want to use
a service that already hosts multiple Tor relays. Is there a website
that lists relays by AS Names so I can find a service that isn't
already populated with Tor?
https://comp
Hey.
Am 22.05.2016 16:00, schrieb Markus Koch:
Yes, but how many ports do I have to open to be "useful"? In an
extreme case: Would it help just to forward port 80 and 433?
It would still be useful and receive the "Exit" flag:
"Exit" -- A router is called an 'Exit' iff it allows exits to at
Hey.
Am 10.09.2013 10:14, schrieb Eugen Leitl:
Speaking about recursive DNS for BIND, does anyone have
a working set of options which limit recursive DNS queries
to just the local subnet, and another couple IPs, maybe?
options {
allow-recursion { 192.168.0.0/24; };
};
http://www.bind9.net/
Hey Guido.
Am 08.04.2014 20:07, schrieb Guido Witmond:
According to the debian security announcement it has been fixed at
*u5*.
Where did you get *u6*? A QUANTUM INSERT? Or a typo?
Debian released another update that - unlike the previous version - also
prompts you to restart affected servic
Hey,
Am 11.12.2021 13:51, schrieb Jens Kubieziel:
attacks. One possibility is, in my opinion, rejecting connection over
ports 389 and 636. What do you think? Should we as exit node operators
block connections over those LDAP ports for some amount of time?
don't think this is going to help.
Th