Note that a bridge is not guaranteed to be used. I've seen plenty of
bridges, both plain-vanilla and obfs4, with or without IPv6, regardless
of geography, that use only a few megabytes of bandwidth per month.
Everything seems good in terms of connectivity yet there is basically
just housekeepin
With the long-awaited v2.1.8 of LibEvent recently released, this brings
up the question: which is more suitable for use with contemporary
versions of Tor, the older v2.0.22-stable or the shiny-new v2.1.8-stable?
Thanks.
___
tor-relays mailing list
to
That bug has been "fixed" in RHEL6/CentOS6 since the update on 20 Apr
2017 but the crashes still occur. As far as I can tell, all the "fix"
did was move the assertion failure from resolver.c to validator.c.
On 04/26/2017 02:19 AM, teor wrote:
Hi all,
Are you using bind as a local caching r
Your kernel version ("2.6.32-042stab125.5") indicates that you are
running in an OpenVZ container. The maximum number of file descriptors
is set by the host configuration and cannot be increased from within the
container.
Run 'cat /proc/user_beancounters' to see the hard limits. Note in
particular
> maybe one of these days i can contribute to it with my own relay,
node, bridge, anything.
Lack of technical skills or access to computing resources isn't a
barrier to supporting Tor. You can support the network financially. E.g.
https://donate.torproject.org/pdr
https://emeraldonion.org/donate/
On 06/20/2014 12:47 AM, Tora Tora Tora wrote:
[snip]
If someone can suggest a resolution that works, I might be able to keep
them running, otherwise I see no point in running vulnerable relays
until I figure things out.
Suggestion #1: upgrade to current version of your OS and apply all
updat
You don't have to reboot the server. Just do a "lsof | grep DEL" (and maybe
"lsof | grep delete") and restart those services that are using upgraded
libraries.
That said, there have been a couple of kernel updates in recent weeks (the
latest being yesterday), so it is advisable to bite the bul
On June 9th my relay, which was established about 20 months ago, fell
out of the cached consensus.
There are no errors in the logs, just notices that the relay is not in
the cached consensus. Apart from upgrading to Tor v0.2.4.22 3 days
earlier I haven't made any changes to the server.
Anyo
On 07/04/2014 11:59 AM, Matthew Finkel wrote:
On Fri, Jul 04, 2014 at 10:06:51AM -0400, Steve Snyder wrote:
On June 9th my relay, which was established about 20 months ago,
fell out of the cached consensus.
There are no errors in the logs, just notices that the relay is not
in the cached
On 07/04/2014 11:08 AM, Kurt Besig wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/4/2014 7:06 AM, Steve Snyder wrote:
On June 9th my relay, which was established about 20 months ago,
fell out of the cached consensus.
There are no errors in the logs, just notices that the relay is
I'm getting 100% packet loss when pinging dizum and gabelmoo; no packet
loss to the other authorities.
On 07/04/2014 10:42 AM, Benedikt Gollatz wrote:
On 07/04/2014 04:06 PM, Steve Snyder wrote:
On June 9th my relay, which was established about 20 months ago, fell
out of the cached cons
On 07/04/2014 11:59 AM, Matthew Finkel wrote:
On Fri, Jul 04, 2014 at 10:06:51AM -0400, Steve Snyder wrote:
On June 9th my relay, which was established about 20 months ago,
fell out of the cached consensus.
There are no errors in the logs, just notices that the relay is not
in the cached
> ...renice to 10...
This is good for the Tor process itself, but disadvantages other processes. If
your server is doing name resolution (as an exit node) the resolver may be
impacted, which in turn will hamper handling of exit traffic.
If you're running as a middle node then Never Mind.
On T
So now Tor v0.2.5.x Release Candidates are available. Can someone give
an overview of what's new for those who don't follow the development
process?
What can/or should be changed in a working v0.2.4.x relay config to
accommodate the changes made in the new code?
Are there particular areas (
14 at 07:30:27AM -0400, Steve Snyder wrote:
So now Tor v0.2.5.x Release Candidates are available. Can someone
give an overview of what's new for those who don't follow the development
process?
There's a post about that on tor-talk. It's mostly bugfixes.
Does obfs4 support IPv6 addresses? If so, does it work like ORPort in
that it is just a matter of adding another line?
For example, to add an IPv6 address can I just replace
ServerTransportListenAddr obfs4 111.222.333.444:__RNDPORT__
with
ServerTransportListenAddr obfs4 111.222.333.
On 10/27/2014 06:38 PM, s7r wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/28/2014 12:24 AM, Steve Snyder wrote:
Does obfs4 support IPv6 addresses? If so, does it work like ORPort
in that it is just a matter of adding another line?
Yes.
For example, to add an IPv6 address
I too had a bad experience with Baltic Servers.
I purchased a VPS from them on 03 Jan 2012, located in Lithuania, which
I used for an exit node (using the Reduced Exit Policy of that time).
I paid for a year in advance, so I was reluctant to just walk away from
them.
08 Jan: Received abuse
On 11/21/2014 07:08 PM, SiNA Rabbani wrote:
Dear Relay Operators,
I noticed there are very few US based exit nodes in the network. And more and
more
people are jumping on the same set of AS numbers in Europe.
[snip]
If anyone is interested in running fast Tor Exit nodes at Rethem Hosting. Fee
On Thursday, November 27, 2014 8:39pm, "Libertas" said:
[snip]
> If anyone knows of a good way of finding high-bandwidth budget
> dedicated servers (a search term or a list of providers, for example),
> please share. I expected there to be more of a market for this kind of
> thing than I've found.
This is a good place to start:
https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
On Tuesday, February 10, 2015 5:57pm, "Stephen R Guglielmo"
said:
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://list
On Tuesday, February 17, 2015 11:02am, "Chris Patti" said:
[snip]
> I tried running an exit for a bit and it lasted a few weeks before
> some brainless wonder hijacked someone's Gmail with my exit, so I had
> to pull it down and go relay only.
Me too. I dearly wish there a way to block webmail w
On Monday, March 9, 2015 10:40am, "Markus Hitter" said:
> Am 09.03.2015 um 15:13 schrieb s7r:
[snip]
> One flaw which IMHO has to be solved sooner or later is the openess to abuse.
> Like
> port scans, like malware distribution, like spamming, you name it. Right now
> this
> task is left to the
On Monday, March 9, 2015 3:33pm, "grarpamp" said:
> On Mon, Mar 9, 2015 at 2:40 PM, Markus Hitter wrote:
>> Am 09.03.2015 um 16:08 schrieb Steve Snyder:
>>> Being able to separate webmail from the parent web presence (e.g.
>>> gmail from google.com, Yahoo
On Monday, April 27, 2015 9:30pm, "syndikal" said:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> hello relay operators!
>
> i've asked this question on IRC once or twice, but it seems the right
> people aren't online/active when i am. i think i might be able to get a
> better audience
On Sunday, May 3, 2015 10:08am, "Linus Nordberg" said:
> Hi,
>
> Looking at the graphs showing the number of relays in the network it
> seems like we've lost about 500 (-7%) relays since the beginning of this
> year.
>
>
> https://metrics.torproject.org/networksize.html?graph=networksize&sta
>2) Testing
>How do I (easily) confirm my bridge is correctly configured?
>Especially if I don't have an IPv6 connection for TBB?
FYI, you can get up to 5 IPv6 addresses for free from Hurricane Electric:
https://tunnelbroker.net/
That lets you tunnel IPv6 traffic when your ISP only offers IP
On Monday, June 1, 2015 1:28pm, "Roman Mamedov" said:
> On Mon, 1 Jun 2015 13:23:34 -0400 (EDT)
> "Steve Snyder" wrote:
>
>> >2) Testing
>> >How do I (easily) confirm my bridge is correctly configured?
>> >Especially if I don't ha
On Tuesday, June 23, 2015 9:07pm, saitos...@ymail.com said:
> Besides the obvious requirements of a good relay (e.g. speed, geo-diversity,
> constant uptime), what qualities make a relay valuable to the Tor network and
> its
> users?
A quality that can't be measured: resistence to intrusion.
On
Yes, I got the same thing recently. A burst of 56 of these log entries over a
3-minute period on July 21st. Seen with v0.2.6.10.
Somebody shaking doorknobs.
On Thursday, July 23, 2015 8:46am, "Toralf Förster"
said:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 07/23/2015 02:26
On 08/20/2015 08:42 PM, 12xBTM wrote:
And #2: Cost. Take me for example, I have no trouble handling abuse,
operation, and legal things that take up time, but it's hard to justify
$X/mo towards Tor as opposed to $X/mo towards my student loan.
You can rent a real (not virtual) 100Mbps server for
On Tuesday, August 25, 2015 2:23pm, "Moritz Bartl" said:
> On 08/25/2015 03:47 PM, Greg wrote:
[snip]
> Watch out, cheap VPS usually restrict the number of concurrent open sockets.
That's only true for OpenVZ containers, which also have a number of other
drawbacks, the worst of which is the ina
Looking at the Tor Metrics page, I can see the number of bridges and the
number of users connecting via bridges, but that's not enough
information to determine satisfaction of demand.
Are there now enough bridges to comfortably satisfy demand? Enough
bridges with a particular PT type? If not
You've set 2 port numbers, 9001 and 80, to listen on. Pick one or the other.
Also, set "SocksPort 0".
On Monday, September 21, 2015 1:20pm, "Geoff Down"
said:
> Hello all,
> I'm trying to set up a Bridge/Client Tor instance with the following
> torrc:
>
> ControlPort 9051
> ExitPolicy re
On Thursday, October 1, 2015 3:05pm, "Dhalgren Tor"
said:
[snip]
>
> You are overlooking TCP/IP protocol bytes which add between 5 and 13%
> to the data and are considered billable traffic by providers. At 18M
> it's solidly over 100TB, at 16.5M it will consume 97TB in 31 days.
Another consum
The OpenNIC servers may not be appropriate for use by a high-speed Tor
exit relay.
I run an OpenNIC DNS server, and my VPS vendor insisted that I
rate-limit the server to avoid it being used as a DDOS vector. I'm
guessing that this is not an uncommon position to take for public DNS
servers.
ry 25, 2016 11:09am, "Elrippo"
said:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Are you caching the DNS queries?
>
> Am 25. Februar 2016 13:47:04 MEZ, schrieb Steve Snyder
> :
>>The OpenNIC servers may not be appropriate for use by a high-spe
I'm unfamiliar with the memory use of nginx, but 512MB ought to be more
than enough RAM to run just the relay on a 64-bit VPS..
Are you *sure* you're not running anything else? Not crond? Not ntpd?
Not iptables? If not SSH, how do you administer the VPS?
What type of virtualization is the VP
I'm looking for a Tor installation that boots off of read-only media and
acts as a relay, sort of a TAILS but without the user-space applications.
Does such a thing exist?
Thanks.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lis
On 07/19/2011 04:00 AM, Jérémy Bobbio wrote:
On Mon, Jul 18, 2011 at 07:42:19PM -0400, Steve Snyder wrote:
I'm looking for a Tor installation that boots off of read-only media
and acts as a relay, sort of a TAILS but without the user-space
applications.
Does such a thing exist?
Tor-ra
Exit server with maxed-out 10Mbit connection (1.1MB/sec):
# lsof -ni | grep _tor | wc -l
546
Relay server rate-limited to 150KB/sec:
# lsof -ni | grep _tor | wc -l
132
Regarding the relay server: torstatus.blutmagie.de reports Observed bandwidth
of 51KB/sec while Vidalia reports 172KB/sec.
Ne
I have a machine that is dedicated to being a Tor exit node. How can I
maximize the performance (high throughput / low latency) of Tor traffic?
I have plenty of under-utilized CPU and RAM resources on this system.
According to TorStatus, my bandwidth is rarely maxed-out.
This is on a Linux sy
e daemons.
For some good guides on howto run a faster exit node, look at:
https://www.torservers.net/wiki/setup/server and poke around that site
to see more suggestions.
-Andrew
On Tue, Aug 2, 2011 at 8:37 PM, Steve Snyder mailto:swsny...@snydernet.net>> wrote:
I have a machine that is
Today my ISP informed me that an abuse complaint had been lodged against
me by spamcop.net.
I looked at the report and my IP is indeed in it. It seems like a valid
complaint. My question, though, is how did this happen?
I'm using the Reduced Exit Policy as shown here:
https://trac.torproj
On 08/10/2011 05:54 AM, Javier Bassi wrote:
On Aug 9, 2011, at 11:46 PM, Steve Snyder wrote:
Today my ISP informed me that an abuse complaint had been lodged against me by
spamcop.net.
(...)
Anyone have any thoughts as to how my Tor config can be used to transmit spam?
Did you have the
The config page at torservers.net advises increasing the TX Queue Length from
the default 1,000 to 20,000. For a differing opinion see the assertion that
this increases latencies and hampers network congestion recovery
("bufferbloat"):
http://www.cyberciti.biz/faq/gentoo-centos-rhel-debian-fed
Got another threatening e-mail from my ISP today, prompted by another SpamCop
complaint regarding spam run through HotMail. HotMail records the address of
the originating server and that, again, is my exit node.
So I have to curtail exit access to HotMail. Yeah, it sucks, but I know of no
way
users, you're rejected
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Mon, 22 Aug 2011 12:47:42 -0700
Mike Perry allegedly wrote:
> Thus spake Steve Snyder (swsny...@snydernet.net):
>
I run 2 middle nodes, one at 150KB/300KB and the other at 100KB/200KB. Both
running what ever is the latest stable version of Tor (0.2.2.33 at this
writing).
The 150KB/300KB node (Linux i686) occasionally spikes to the specified
150KB/sec, but 40% - 50% utilization is more typical.
The 100KB/
>> I run 2 middle nodes, one at 150KB/300KB and the other at 100KB/200KB.
[snip]
>
>No idea what shaping algorithm Tor uses, nor any clue on recommended
>burst ratios under said algorithm. Anyone???.
FWIW, the example config file ("torrc.sample") includes these lines:
## Define these to limit ho
On 09/27/2011 11:43 PM, Rick Huebner wrote:
On 9/27/2011 1:37 PM, "Steve Snyder" wrote:
Either there is simply not enough traffic to saturate all available
middle nodes or Tor's node selection algorithm is, um, sub-optimal.
I just started my relay a month ago, so I'v
I have a relay with a fixed monthly bandwidth limit, so I expect the relay to
hibernate toward the end of the month. (I'm trying to spread the bandwidth out
over the month, but actual relay utilization cannot be estimated accurately.)
I'm wondering how to time this hibernation period. What I'd
I'm not sure I understand how the relay accounting limit is calculated.
The manual says that you might specify an AccountingMax limit of 1 GB, a
ceiling that would be applied to each of the input and output traffic. The
manual also says that it is known the output traffic can be larger than the
On 10/20/2011 09:30 PM, Rick Huebner wrote:
[snip]
So... how do relay operators use Tor themselves, if they can't run TBB?
Or is there a way to configure them to live safely together? Or have I
misinterpreted the new TBB focus, and the relay bundles will continue to
support use as a client in th
How do you know that s/he's using OpenDNS site blocking?
On 11/10/2011 05:03 AM, Geoff Down wrote:
Will the owner of exit atlgonyovLi please turn off OpenDNS site
blocking.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.t
I tried to set up a Tor relay in the UK today and was told that UK law
prohibited anonymous Internet traffic. My tentative UK ISP told me that they
must be able to provide identification of users if presented with a court
order. Hmmm...
The topic of country-specific conditions raises 2 questi
which countries are relays needed, disallowed?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 25/11/11 15:12, Steve Snyder wrote:
> I tried to set up a Tor relay in the UK today and was told that UK
I see the same thing, and have a working theory: the network connection is
saturated, which delays name resolution, causing the log entries.
I run 2 relays on residential ISPs, limiting Tor to about 1/3 of my upload
bandwidth. No problems (nameserver log entries) seen on these relays.
I also r
On Saturday, December 10, 2011 5:58am, "Klaus Layer" said:
>> Could you clarify the configuration? Is Tor doing DNS over the GigE or
>> to localhost?
>>
>> -andy
> Yes I have configure a local caching DNS server. cat /etc/resolve.conf shows
> nameserver 127.0.0.1. So I assume TOR resolves via t
On 12/29/2011 05:32 PM, Sebastian Urbach wrote:
Am Thu, 29 Dec 2011 12:20:16 -0500
schrieb Nick Walke:
Hi,
I'm showing that tor is currently using 12 - 14 Mbps on my relay,
however, the status page for my relay (
http://torstatus.blutmagie.de/router_detail.php?FP=192bdf2831c1b007a08dc3c1d7e36b
On 12/29/2011 08:04 PM, Steve Snyder wrote:
On 12/29/2011 05:32 PM, Sebastian Urbach wrote:
Am Thu, 29 Dec 2011 12:20:16 -0500
schrieb Nick Walke:
Hi,
I'm showing that tor is currently using 12 - 14 Mbps on my relay,
however, the status page for my relay (
http://torstatus.blutmag
I received a botnet/drone complaint from shadowserver.org today (delayed
due to holidays) regarding my exit node:
timestamp ip port type infection cc cc_port
12/29/2011 19:52 173.208.132.210 48586 32097 US MISSOURI KANSAS CITY tcp
mebroot ukixxuug.com|MAOS/0EC20201 14DF137A55320641 84.163.151.1
No, there no reason to set MyFamily when you only admin a single node.
That said, I just followed the link you referenced, and it leaves my
scratching head a little. The description of NodeFamily is:
"The Tor servers, defined by their identity fingerprints or nicknames,
constitute a "family"
Can someone tell how being a bridge compares to being a regular exit
node in terms of traffic?
I can see how there would less traffic as a bridge since the node isn't
advertised. On the other hand, there are many fewer bridges than
regulat nodes so maybe the traffic on a given bridge is great
relays don't specify
>> their MyFamily by themselfs.
>>
>> aurel
>>
>> On 6 January 2012 04:27, Steve Snyder wrote:
>>> No, there no reason to set MyFamily when you only admin a single node.
>>>
>>> That said, I just followed the link you r
On 01/13/2012 05:27 AM, Sebastian Hahn wrote:
Ah, I see. ides not having a current consensus is different from ides
being down. Ides still is running the stable Tor version and needs to be
upgraded to 0.2.3.x to be allowed to vote along with the other dirauths,
so it doesn't immediately know abou
New operator of a Tor bridge here. How can I tell that it is being used?
With a regular relay I can look up the stats on TorStatus, or I can see
that there are n current connections. But a bridge won't be published,
and the lower volume of traffic means that there may not be many active
conn
You can try a different status page.
I actually do not trust the numbers at https://torstatus.all.de/ but any
numbers will verify that your relay is actually moving packets.
On 01/19/2012 08:49 PM, Geoff Down wrote:
Hi,
the read/write graphs in my relay's TorStatus.blutmagie.de page have
Do bridges have a need for name resolution, or it it just a matter of
passing a packet from one IP address to another (i.e. from user to Tor
node)?
Thanks.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bi
I'm not familiar with the Sheevaplug, but I have some experience with low-end
hardware.
I run a middle node on a Pentium-M 1.8GHz ("Dothan", circa 2004) with 1GB of
DDR1 RAM on a CentOS 5.x/i686 box. I have Tor v0.2.2.x configured for
Bandwidth=150KB, BurstBandwidth=300KB. That 150KB is one-t
This application claims to identify bad Tor nodes for the purpose of
excluding them from use:
http://xqz3u5drneuzhaeo.onion/users/badtornodes/
Anyone have any thoughts on this? The sum of bad-exit-flags (8), exit
nodes that alter payload (4), and long-term-misconfigured (27) suggests
excludi
On Thursday, February 2, 2012 9:41am, "Goulven Guillard"
said:
> Thanks for all the replies. I'll give it a try as a middle node for a
> start (as soon as my ISP fixes my intempestive deconnection issue…).
>
> Is an exit node is more CPU(/RAM ?) consuming than a middle one ?
Yes. At minimum
On 03/11/2012 07:11 PM, grarpamp wrote:
I'll add that AS path info is available from route views looking
glasses. Think of it like traceroute, but for BGP. It's quite handy.
A node map showing current GEO, AS, and provider would be a cool
idea. Lots of cities have datacenters and moms/pops of so
I am attempting to load-balance DNS resolution requests.
Suppose, in Linux, you have a /etc/resolv.conf with this contents:
nameserver aaa.bbb.ccc.ddd
nameserver eee.fff.000.111
nameserver 222.333.444.555
How does a Tor exit node use these 3 nameservers?
Are they used in a round-robin fashio
I've got 2 bridges, with 1 IP address in each of 2 servers in the same
geographical area. The IP addresses are not consecutive.
Both servers have the same hardware and software configurations. Both were
established in mid-January and (excepting a few brief periods of down time)
have been runn
I often get abuse complaints from icecat,biz saying that a "RIP attempt" was
seen from the IP address of my exit node. Apparently this involves too many
connections in a given period of time.
I've tried to contact them but get no answer from the e-mail address included
in the abuse reports. T
(Not sure where you got
> the info that it is too many connections?)
>
> If you block port 8000, that could stop people accessing the streaming
> software without too many adverse affects on other services. Alternatively
> you can just block icecast.biz (I noticed there isn't a
Maybe you're bottlenecked on DNS resolution?
On 05/24/2012 01:13 PM, micah anderson wrote:
i've got an exit node that is doing a fair bit of bandwidth, but I think it is
CPU bound at this point because I am
getting these:
Your computer is too slow to handle this many circuit creation request
kus reichelt wrote:
* Steve Snyder wrote:
Maybe you're bottlenecked on DNS resolution?
Interesting, that's news to me. When I was operating an exit node I
remember such log entries popped up on a regular basis. I also
thought the CPU was the bottleneck, but still tried tweaking t
Attention Tor developers:
Now that v0.2.3 is at Release Candidate status, can we get get some
guidance for those relay operators that have not kept up with development?
What changes can/should be made to a working v0.2.2 torrc for best 0.2.3
operation?
What are the major changes (SMP? IPv6?
Roger Dingledine arma at mit.edu
Mon Jul 23 18:58:54 UTC 2012
[snip]
>At the same time, much of our performance improvement comes from better
>load balancing -- that is, concentrating traffic on the relays that can
>handle it better. The result though is a direct tradeoff with relay
>diversity: on
On Thursday, July 26, 2012 1:57pm, "mick" said:
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> On Mon, 23 Jul 2012 11:03:24 -1000
> Name Withheld allegedly wrote:
>
On 07/30/2012 11:53 AM, Moritz Bartl wrote:
On 30.07.2012 13:27, Moritz Bartl wrote:
We have been kicked from FDC in the past
With only port 80, 443, 554, and 1755 open, this might be different and
worth a try. Same goes for the similar offer for shared 10 Gbps by Limehost.
It wouldn't be
On Wednesday, August 15, 2012 4:44pm, "Mike Perry"
said:
[snip]
> Here's the read and write statistics from the ExtraInfo descriptors from
> a handful of the fastest default-policy and reduced-policy relays:
>
> Default exit lumumba read 819.7M
>other: 66.5% 80: 22.7% 443: 5.1% 51413: 1.4% 6
I'm wondering about the benefit of running abridge on an IPv6 address.
Since the big announcement last December that v0.2.3.9 supports IPv6 addresses
for bridges, I've read a few comments to the affect that BridgDB doesn't
understand IPv6 addresses.
So... what is the state of publishing IPv6 br
On Tuesday, September 11, 2012 1:12pm, "Jacob Appelbaum"
said:
[snip]
> It seems that there are two issues - one is that a guard is failing to
> build circuits, the other is that you can't seem to exclude them. I have
> to admit, I'm more interested in the former... Is there a pattern to the
> fa
I'm getting my feet wet with IPv6 bridges, so far without success. I
set up a test bridge (0.2.3.22-rc) on one network and plugged the
address:port into Vidalia (TBB x86_64-2.2.39-1) on another.
The bridge config looks like this in part (local IPv4 address hidden):
Address aa.bb.cc.dd
Outboun
ill seeing stalling
in Vidalia's Message Log.
On 09/17/2012 06:53 AM, Linus Nordberg wrote:
Steve Snyder wrote
Sat, 15 Sep 2012 13:40:39 -0400:
| The bridge config looks like this in part (local IPv4 address hidden):
|
| Address aa.bb.cc.dd
| OutboundBindAddress aa.bb.cc.dd
| ORPort [2a00:1d70
address in Vidalia.
On 09/17/2012 11:00 AM, Linus Nordberg wrote:
Steve Snyder wrote
Mon, 17 Sep 2012 07:25:30 -0400:
| Address aa.bb.cc.dd
| OutboundBindAddress aa.bb.cc.dd
| ORPort [2a00:1d70:ed15:37:235:53:64:0]:443
| OrPort [aa.bb.cc.dd]:80 NoAdvertise
That will probably be treated as
This seems to work. The view from Vidalia's Message Log:
[Notice] Learned fingerprint 24432B99CA2533BC95ABF66C7AFE835F96DD2B2D
for bridge 2a00:1d70:ed15:37:235:53:64:0:443
[Notice] no known bridge descriptors running yet; stalling
[Notice] Bridge 'Unnamed' has both an IPv4 and an IPv6 address.
the system has
booted to a command line prompt.
Inserting a 5-second delay in the Tor script run at boot time "fixes"
the problem, making boot-time start-up of the IPv6 bridge reliable.
FYI.
On 09/18/2012 08:18 AM, Steve Snyder wrote:
This seems to work. The view from Vidalia
I have a bridge that gets no traffic. I don't mean "hardly any" traffic; I
mean none.
The contents of bridge-stats are always empty except for the date, which
advances once per day. In the state file the last date, apart from daily
accounting entries, is a EntryGuardAddedBy entry from 09 Sep
On 10/26/2012 01:21 AM, Andreas Krey wrote:
On Thu, 25 Oct 2012 16:33:03 +, Steve Snyder wrote:
...
How can I diagnose the failure of my bridge to garner any traffic?
I assume you didn't set 'PublishServerDescriptor 0' in the tor.rc.
This is the content of my t
In the Tor v0.2.2.x series it was said that it was pointless to set
NumCPUs to a value greater than 2. Due to poor scaling, I guess.
Is that still the case with v0.2.3.24+ ? Would NumCPUs value of 4 or 8
(on systems with that many CPU cores) actually provide any benefit over
a value of 2?
I recent days I have gotten 3 complaints from people who report hack attempts
from my exit node, at 82.221.99.229. One problem: this IP address is not in
use by me and never has been.
The RDNS for this address is "tor-exit.burratino.net" and there is the standard
Tor explanatory page on http:/
On Thursday, December 13, 2012 1:46pm, "Roger Dingledine" said:
> On Thu, Dec 13, 2012 at 08:28:30AM -0700, Brock Tice wrote:
>> Hello all,
>> I follow the guide for avoiding abuse notices, and generally I only
>> get 1/year of the DMCA variety. However, I recently received this
>> complaint, w
On Friday, January 4, 2013 3:38pm, "mick" said:
[snip]
> Thanks for the pointer - but yes, I'd prefer to stay away from the US.
> I think the US is probably already well served with tor nodes.
Yes, about 25% of all Tor nodes worldwide are in the US; Germany is in 2nd
place with 17%.
https://met
On Friday, January 4, 2013 3:54pm, "Roger Dingledine" said:
> On Fri, Jan 04, 2013 at 03:51:21PM -0500, Steve Snyder wrote:
>> On Friday, January 4, 2013 3:38pm, "mick" said:
>> [snip]
>> > Thanks for the pointer - but yes, I'd prefer to stay
My experience with ServerAstra is that they will null-route your IP
address on reports of abuse. No notification to me, their customer.
This put me in the position on several occasions of noticing that my VPS
had been down for x days. It was only when opening a Support Ticket to
complain abo
The TorStatus pages at rueckgr.at and all.de have stopped reflecting the
actual state of the Tor relays.
The page at rueckgr.at displays uptime as the length of time between 04
Jan and now, regardless of the actual history of the relays. The page
at all.de is even worse, calculating uptime as
1 - 100 of 135 matches
Mail list logo