Hi,
On 29/11/17 01:17, Roger Dingledine wrote:
> What fraction of consensus weights are they? I'm under the impression
> they're running on refrigerators or whatever so most of them have crappy
> connectivity.
You can now use Relay Search to find this:
https://atlas.torproject.org/#aggregate/all
Hi,
On 04/12/17 18:19, Ralph Seichter wrote:
> This is not about third party X complaining to the hoster about their
> network being scanned. The hoster itself is automatically monitoring all
> their machines for outgoing network scans, as these scans are prohibited
> by their terms of use.
I do
Hi,
On 09/01/18 01:16, teor wrote:
> The FallbackDir flags on Consensus Health [2] have been updated.
> The flags on Relay Search (Atlas) [3] might take a few days to update.
Relay Search has now been updated.
Thanks,
Iain.
signature.asc
Description: OpenPGP digital signature
Hi,
On 12/01/18 16:05, nusenu wrote:
> The motivation for this is that there are a lot of relays (>3000)
> running outdated tor releases.
>
> If more operators enable auto-updates the number of outdated tor relays
> hopefully decreases.
To see what this means in terms of consensus weight, perce
Hi,
On 13/01/18 12:09, teor wrote:
> This map shows relay consensus weight:
> https://atlas.torproject.org/#map
>
> But you can't map the number of relays.
Yes you can:
https://atlas.torproject.org/#map_relays
Thanks,
Iain.
signature.asc
Description: OpenPGP digital signature
__
Hi,
On 13/01/18 23:02, nusenu wrote:
>> Is there an existing "outdated version" flag we can search on?
>
> recommended_version:false/true
Indeed. So
https://atlas.torproject.org/#aggregate/version/recommended_version:false
will give you all the relays that are not recommended.
>> For example, s
Hi,
On 18/01/18 13:16, x9p wrote:
> not doing DROPS anymore, trying not to hurt clients. StrictNodes, via torrc
Note also that if you are a relay, this (and the other node
selection options below) only affects your own circuits that Tor
builds for you. Clients can still build circuits through you
Hi,
On 20/01/18 10:25, Ralph Wetzel wrote:
> As a consequece, I'll consider implementing a recording function into
> The Onion Box.
When you do this, please make it clear to users that making their
fine-grained bandwidth usage information public may harm the anonymity
properties of the Tor network
Hi All,
Relay Search has moved! It is no longer to be found at
atlas.torproject.org (although a redirect is in place). The new home is at:
https://metrics.torproject.org/rs.html
If you prefer an onion service:
http://rougmnvswfsmd4dq.onion/rs.html
Thanks,
Iain.
signature.asc
Description:
Hi,
On 16/02/18 16:46, nusenu wrote:
> and I don't know why but it loads a lot faster to the point where you get
> to enter something into the search field.
This may be because assets are no longer duplicated across the two
domains so if you already have the assets in your cache then you can
just
Hi,
On 16/02/18 17:09, nusenu wrote:
> I guess there is nothing that I can do to convince you of keeping that domain
> online? :)
What does it break if it goes away?
We don't want to keep it around forever, but we also don't want to turn
it off if there are some things that could be fixed keepi
Hi,
On 16/02/18 21:41, teor wrote:
>> On 17 Feb 2018, at 04:21, Iain Learmonth wrote:
>> What does it break if it goes away?
>
> Everyone who has ever linked to a relay on a mailing list message, forum
> question, or in their bookmarks.
>
> It also breaks muscle memo
Hi,
On 17/03/18 11:27, Anders Burmeister wrote:
> The one in Canada and the two in France shows the correct Country Flag.
> But Germany, Polen and UK shows the France Flag.
The ones showing a France flag that aren't in France, are they in OVH
perhaps?
I'm just worried that perhaps we've broken c
Hi,
On 19/03/18 20:51, Anders Burmeister wrote:
> Yes, They are all in OVH
Thanks for letting me know. I've raised this issue on the metrics-team
list so we can investigate further.
Thanks,
Iain.
signature.asc
Description: OpenPGP digital signature
Hi,
On 02/05/18 02:09, Keifer Bly wrote:
> My suspicion is that my posted uptime was retained because I did not
> restart the relay software while my router firmware was updating (it was
> offline for about 2 hours), but it thought I’d share this little thing I
> noticed.
You're correct. The upti
Hi,
On 02/05/18 09:50, teor wrote:
> Being in the consensus is called "Running", but what it actually means is
> that a majority of directory authorities found your relay reachable.
>
> So perhaps we could use:
> * uptime for the amount of time since the tor process started
> * reachable time for
Hi,
On 02/05/18 19:20, Keifer Bly wrote:
> One more question, if I were to restart my relay now, would that mean that my
> mid time between failures would NOT get closer to 6 days? That’s what is at
> now.
Assuming that you just restart it and it comes right back up again, and
it's for the purp
Hi,
On 31/05/18 18:26, nusenu wrote:
>> RelayBandwidthRate is already included in relay descriptors as bandwidth-avg:
>> https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n424
>>
>> Although strictly that field is:
>>
>> bandwidth-avg = min(BandwidthRate, RelayBandwidthRate,
>> MaxAdver
Hi,
On 12/06/18 12:40, Paul Templeton wrote:
> Who ever looks after the @metricsbot@botsin.space its stopped working...
I have restarted metrics-bot. It failed to update from Onionoo for 3
attempts in a row, in this case it crashes instead of sending
out-of-date information.
Thanks,
Iain.
sig
Hi,
On 01/07/18 16:43, nusenu wrote:
> If adoption should ever become significant (>500?) maybe
> Relay Search will pick it up.
It probably would. (:
Thanks,
Iain.
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-
Hi,
On 15/07/18 17:23, Conrad Rockenhaus wrote:
> I'm just curious on what thoughts on this are. I know how to technically
> perform the block, I guess I feel like we're one of the last bastions
> against censorship on the Internet and people do torrent legitimate
> stuff. I don't consider piratin
Hi,
On 22/07/18 10:11, nusenu wrote:
> - you run your own AS and all servers in that AS are under your control
> (parameter: as)
> https://metrics.torproject.org/onionoo.html#parameters_as
This effectively puts MaxMind in charge of MyFamily.
> - all your relays are under your own DNS domain and
Hi,
On 29/08/18 13:16, Totor be wrote:
> This 4th relay will be fully operational, but will only be started from
> time to time, when updates are available
> After the updates are installed, I plan to leave it running for half a
> day or so until it appears in Tor Metrics
> Question: should I incl
Hi,
On 17/09/18 14:28, Kyle Levy wrote:
> I am attempting to set up a TOR relay on my raspberry pi on my home
> network (nickname: relaydetour). I had it set up and running, but now it
> seems to be offline. I hadn't changed any settings, and it's still
> flagged as "running" and "valid". Is it fu
Hi,
On 01/11/18 22:52, Eran Sandler wrote:
> Check out the website here:
> https://torcontactinfogenerator.netlify.com/
Cool! Thanks for making this.
Would you be interested in making a JavaScript library that would allow
going from the string back to a dictionary of individual values? If such
a
Hi,
On 29/10/18 11:32, Isaac Grover, Aileron I.T. wrote:
> Do you monitor outbound traffic from your relays by port? I run an exit
> node relay from my house allowing only "safe ports" that are not likely
> to generate complaints and I would like to keep an eye on how much
> traffic is coming from
Hi Eran,
On 10/11/18 17:02, Eran Sandler wrote:
> I did this code with Python that parses and validates it. I can make
> something quickly in JS for that as well.
Awesome. (:
Where was the Python code? That might be useful for another project I am
working on.
Thanks,
Iain.
signature.asc
Desc
Hi Gerry,
On 03/05/2019 15:14, ger...@bulger.co.uk wrote:
> Those of us on the edge of this community do not have a clue what you are
> talking about and why there is so much animosity. [...]
At best, this is off-topic conversation. These personal attacks are not
welcome on our lists.
> Do I ga
Hi,
On 01/05/2019 21:22, to...@protonmail.com wrote:
> I'm hoping that Verizon will settle down and start renewing my ip
> address instead of giving me another every few hours, but of course I
> don't know if their pool of addresses is running low and they are
> scrambling or what.
You're right t
Hi All,
On 02/05/2019 21:15, Paul Syverson wrote:
> On Thu, May 02, 2019 at 04:01:52PM -0400, grarpamp wrote:
>> Node location, payment, OS, ISP, uptimes, anon / nym / PGP / GovID,
>> workplace, politic, blogs, whatever else you can imagine,
>> including incorporating what's already in the consens
Hi,
Just on the Tor updates side of your mail:
On 04/05/2019 21:06, Keifer Bly wrote:
> So I am aware a new version of tor is now available, but am wondering,
> is there a way for relay / bridge operators to be notified when a new
> version of tor is available? Right now, it seems like the only w
Hi,
On 04/05/2019 22:17, amytain wrote:
> Is it possible to have a pool of ip addresses as the outbound ip
> addresses instead of just one?
Not as I understand it from reading the torrc manual page, although you
might be able to implement something like this through NAT rules on your
firewall.
Y
Hi,
On 04/05/2019 23:32, amytain wrote:
> So I could possibly use a firewall/ip-asa rule to go through the ips and just
> specify one in the torrc then
Exactly. I'm not sure about ASA specifically, but I know Cisco IOS
supports "pools" for NATs.
One issue that might happen here though is if thi
Hi,
On 05/05/2019 05:19, Keifer Bly wrote:
> Thanks. Does this also give updates on Tor Expert Bundle? That's what I
> am using.
This is mostly a guess, but it looks like the Tor Expert Bundle is built
from the Tor Browser build system, so probably gets updates when there
are Tor Browser releases
Hi,
On 22/06/2019 00:20, s7r wrote:
> Trying to spin some new obfs4bridges. I am using:
>
> deb.torproject.org/torproject.org obfs4proxy main
>
> in /etc/apt/sources.list -- I hope this is correct.
>
> I get this:
>
> E: Release file for
> https://deb.torproject.org/torproject.org/dists/obfs4
Hi,
On 11/01/2020 05:07, Matt Corallo wrote:
> Sadly, the large scale deployments of BBR are mostly not high-latency links
> (as CDNs generally have a nearby datacenter for you to communicate with), and
> the high retransmission rates may result in more “lag” for browsing when
> absolute bandwi
Hi,
In order to simplify the operation of the Tor DNS exit list service,
which is used to identify if a connection is from a Tor exit relay, I am
planning to remove the features that filter by exit policy.
We recommend that if you are running an exit relay then you should
dedicate an IP address t
Hi,
On 05/03/2020 14:20, Nathaniel Suchy wrote:
> It’s not a threat model issue.
Who gets to see Tor users DNS requests is exactly a threat model issue.
> It’s more of a let’s make Tor less
> dependent on a few public resolvers. Running our own resolvers just
> makes more sense at such a scale.
Hi,
What we do get is consistency between the data displayed in Tor Metrics
and the data provided by Onionoo as now both are using the same upstream
database.
The database might not have the best coverage however, and that's
expected as IP Fire do not have the same resources as MaxMind have
avail
39 matches
Mail list logo