How this got off into TorBrowser puzzles me. Presumably the goal for
clients is to reach them where they are. Certainly providing a
diversity of clients is a "good goal" but beyon dreaching more users I
fail to see how it helps the network writ large. I suppose indvitual
users woudl be mroe secu
To the initial question for a honest operator who's open about their
ownership and enters proper family membership data I can't see how
more exit volume is a problem. TOR needs to be resilient against
malicious operators who don't disclose, nto sure what the current
value of "global" is but I sho
Hi AJ,
not sure if anyone's brought this up, but you may want to look at:
https://libraryfreedomproject.org/
"
Library Freedom Project is a partnership among librarians,
technologists, attorneys, and privacy advocates which aims to address
the problems of surveillance by making real the promise
Here's my version of the same:
Hello,
The source address 128.52.128.105 is a Tor exit node, and is not the
origin point for the traffic in question. See
http://tor-exit.csail.mit.edu (which is the host in your logs) for
details. Any action taken on this node would simply result in the
problem t
On Wed, Oct 04, 2017 at 02:32:10PM +0100, Robin wrote:
:I restrict SSH access with iptables allowing only access from two IP addresses
(work, and home).
:I also disable root login (as many already do), as well as use the AllowUsers
option in SSH.
Hard for me to tell if my Tor nodes get any more
On Mon, Dec 04, 2017 at 01:55:56PM -0500, Zack Weinberg wrote:
:For the record, those daily complaints about abusive SSH scanning were
:serious reports requiring a reply. And they were not all from the
:same source.
The only reply ever required is a form letter stating this is a Tor
exit, here's
On Mon, Dec 04, 2017 at 02:57:25PM -0500, Jonathan Proulx wrote:
:The only reply ever required is a form letter stating this is a Tor
:exit, here's a link to how to block tor exits if that's what you want.
I recognize this doesn't help with "meta-complaints" from h
A bit late to the party but
A53C46F5B157DD83366D45A8E99A244934A14C46
-Jon
--
signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Sat, Jun 18, 2016 at 04:05:23AM +0300, s7r wrote:
:Hello,
:
:Thanks for running an exit relay.
:That is just an automated email message. You do not want to reply to
:every single automated message you receive, firstly because these
:replies go into a black hole and they are not read by any human
Hi All,
A little while ago one of my relays switched from usually acting as a
guard node to never acting as a guard node:
https://metrics.torproject.org/rs.html#details/9715C81BA8C5B0C698882035F75C67D6D643DBE3
Doesn't matter to me if it's a guard or not jsut want to understand
what's changed and
On Fri, Mar 26, 2021 at 09:02:02PM +0500, Roman Mamedov wrote:
:On Fri, 26 Mar 2021 11:26:16 -0400
:Chris Dagdigian wrote:
:
:> telling new female undergrads and grad students to ensure that they never,
:> ever, were placed in a room alone with him.
:
:It is a bad idea to stay alone in a room wit
With a bit of help from list archieves I found
https://github.com/Enkidu-6/tor-ddos which does prevent the "drops"
I remain curious why it seemed to be dropping before hitting cpu or
memory limits. Though clearly there's no point in burning CPU on DDoS
processing, so I don't feel a great urgenc
New one today though, apparently spoofed web exploit probing. That's
probably going to trigger a bigger reaction if it becomes more wide
spread than a few ssh packets.
-Jon
--
Jonathan Proulx (he/him)
Sr. Technical Architect
The Infrastructure Group
MIT CSAIL
___
13 matches
Mail list logo