On Sun, Aug 11, 2013 at 1:41 PM, TonyXue wrote:
>
> [...]
> It seems that I've run out of space. But my VPS comes with 35GB disk
space and it shouldn't be used up so fast. So how to deal with it?
> If I do run out of space,any advice for deleting the old files of Tor?
Are there any files created b
Huh, curious why it fails to write stuff to disk.
Does doing
echo "something" > tempfile
succeed?
/var/log/tor is hogging diskspace indeed :) perhaps then do
cd /var/log/tor
sudo rm *.gz
then do
du -sh *
to see if there are any remainder large files left there.
On Sun, Aug 11, 2013 at 2:32 PM
On Sun, Aug 11, 2013 at 7:06 PM, Roman Mamedov wrote:
> On Sun, 11 Aug 2013 14:43:59 +0300
> Kostas Jakeliunas wrote:
>
> > Huh, curious why it fails to write stuff to disk.
> >
> > Does doing
> > echo "something" > tempfile
> > succe
On Tue, Aug 13, 2013 at 2:39 PM, Moritz Bartl wrote:
> On 13.08.2013 08:02, Kali Tor wrote:
> > I am actually in double minds about using obsproxy. Is there a demand
> for it?
>
> Yes! Please do set up obfsproxy.
Since obfsproxy bridges are usually really low traffic, I think the
combination of
On Tue, Aug 13, 2013 at 3:58 PM, Roman Mamedov wrote:
> On Tue, 13 Aug 2013 12:02:35 +
> wrote:
>
> > I'm wondering, is there any other method for running a tor
> > bridge/relay on
> > the raspberry pi, other than downloading the source and compiling it
> > yourself?
>
> Raspbian has it in t
Thanks for sharing your experience!
> After the week I decided to shut the bridge down because I heard from
people being contacted by the police even though only running a non-exit
relay.
Do you remember where you did hear this? Was it in writing, are you by
chance maybe able to link to it? It wo
A few days ago, George posted an invitation for obfsproxy operators to
upgrade their Tor software to the latest version on the master branch in
the Tor git repo. [1]
I'm running a low traffic obfsbridge on a raspberry pi, the whole thing is
rather experimental in its nature already, so decided to
On Wed, Aug 21, 2013 at 10:35 AM, Peter Palfrader wrote:
> Maybe you should build .deb package from these sources?
> https://www.torproject.org/docs/debian#source
Ah! debuild && dpkg -i. Yes, that's the cleaner way to do it for sure,
thanks. There's no reason why this shouldn't work with the la
On Wed, Aug 21, 2013 at 1:58 AM, z0rc wrote:
> On 20/08/13 12:01, Kostas Jakeliunas wrote:
>
> Do you remember where you did hear this? Was it in writing, are you by
> chance maybe able to link to it? It would be interesting to know more.
>
>
> Hi,
>
> It was actual
On Tue, Aug 27, 2013 at 1:11 PM, That Guy wrote:
>
> 1) have 4 extra unused devices, 2 android & 2 older laptops running
> Xubuntu & Lubuntu that can run full time & my 2 primary
> machines(android tab and Debian laptop). With only so much bandwidth,
> what helps best in that situation?
> a. few
The usual deal is to just wait a bit more, until your bridge gets voted
into the last consensus. The "running: true/false" field in Onionoo simply
indicates whether your bridge/relay descriptor is listed in the last
consensus (which is published every hour, and includes a list of relays and
bridges
On Thu, Nov 14, 2013 at 4:01 PM, Nick wrote:
> Hi,
>
> I've been running a very low bandwidth relay for a little while with
> my home ADSL connection, but given the up speed is so poor, and
> (more importantly) my ADSL provider has stopped switching my IP
> about every 24 hours, I'd like to switc
Just to illustrate further, it's really easy to see if an IPv4 address was
*ever* part of the network, e.g. look up current moria1's address:
http://ts.mkj.lt:/details?search=128.31.0.34
So if a bridge was a relay once (under the same ip addr), implementing an
additional check in GFW or wherev
On Nov 16, 2013 1:01 PM, "Martin Kepplinger" wrote:
>
> Hi,
>
> Sorry for being lazy, I'm not sure if I can figure it enirely out
> myself: Is there _any_ implication on the status of a bridge in the Tor
> network when I run random web services like an open website, xmpp
> server, whatever, on the
On Wed, Jan 15, 2014 at 3:30 PM, Patrick ZAJDA wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi all,
>
> I have set up an Amazon EC2 instance to run a Tor Relay, I chose
> Obfsproxy Bridges.
>
> [...]
>
> The second point is: I looked at the configuration, and noticed bridge
> is s
On Wed, Jan 15, 2014 at 5:30 PM, Runa A. Sandvik wrote:
> On Wed, Jan 15, 2014 at 3:08 PM, Kostas Jakeliunas
> wrote:
> > On Wed, Jan 15, 2014 at 3:30 PM, Patrick ZAJDA wrote:
> >>
> >> -BEGIN PGP SIGNED MESSAGE-
> >> Hash: SHA1
> >>
&g
On Sat, Feb 15, 2014 at 6:44 AM, Delton Barnes wrote:
> Upon upgrading obfsproxy to 0.2.6 and Tor to 0.2.5.1-alpha-dev
> (git-f63b394d90583b77+96972c4) for scramblesuit, I got this in the Tor log:
>
> Feb 15 04:40:03.000 [notice] We are a bridge with a pluggable transport
> proxy but the Extended
On Tue, Mar 25, 2014 at 3:45 AM, Geoff Down wrote:
>
>
> On Tue, Mar 25, 2014, at 12:55 AM, Dennis Crawford wrote:
> > Hello -
> >
> >
> >
> > I just recently installed a Tor Relay and now I'm seeing a TON of port
> > 8118
> > denied requests in my log.
> ...
> > Am I doing something wrong?
>
> N
Making a separate thread so as not to pollute the challenger[1] one.
Roger: you wanted to know (times are UTC if anyone cares),
[22:08:35] [...] we now have a list of 1000 fingerprints, and we could
> pretend those are in the challenge and use our graphing/etc plans on them
> [22:08:45] they happ
On Tue, Apr 8, 2014 at 12:59 PM, Karsten Loesing wrote:
> On 05/04/14 17:46, Lukas Erlacher wrote:
> > Hello Nikita, Karsten,
> >
> > On 04/05/2014 05:03 PM, Nikita Borisov wrote:
> >> On Sat, Apr 5, 2014 at 3:58 PM, Karsten Loesing
> >> wrote:
> >>> Installing packages using Python-specific pack
On Wed, Apr 9, 2014 at 4:06 AM, Lukas Erlacher wrote:
> Hi Kostas,
>
> right now, we're coding challenger against what exists in debian wheezy,
> which means version 0.1.2 of the requests lib using the python-requests
> package you mentioned, where response.json is correct, and not
> response.jso
On Wed, Apr 9, 2014 at 4:18 AM, Kostas Jakeliunas wrote:
> On Wed, Apr 9, 2014 at 4:06 AM, Lukas Erlacher wrote:
>
>> Hi Kostas,
>>
>> right now, we're coding challenger against what exists in debian wheezy,
>> which means version 0.1.2 of the requests lib u
On Wed, Apr 9, 2014 at 3:49 AM, Kostas Jakeliunas wrote:
> Making a separate thread so as not to pollute the challenger[1] one.
>
> Roger: you wanted to know (times are UTC if anyone cares),
>
>
[22:08:35] [...] we now have a list of 1000 fingerprints, and we could
>> pre
of now, it says 'access denied', here's a copy:
http://ravinesmp.com/volatile/ssltest.py
Be careful running random scripts from the internet, of course. This whole
thread is not meant to convey things in any kind of official capacity
(quite the opposite.)
> thanks!
>
On Wed, Apr 9, 2014 at 3:49 AM, Kostas Jakeliunas wrote:
> Making a separate thread so as not to pollute the challenger[1] one.
>
> Roger: you wanted to know (times are UTC if anyone cares),
>
> [22:08:35] [...] we now have a list of 1000 fingerprints, and we could
>> pre
25 matches
Mail list logo