Tor relays to build
circuits." we are not checking the "Reject Policy"
we will check the issue with the web site administrators
Thanks
Reblaze Support .
I think I won't receive any further info from Vodafone, BTW
ave held broken packages.
Thank you in advance for any answer,
Fr33d0m4All
--
_
PGP Key: 0DA8 7293 D561 3AEE A3C0 7F63 101F 316A F30E ECB4
IRC Nick: fr33d0m4all (OFTC &a
Il 2017-02-03 08:28 Sean Greenslade ha scritto:
On January 31, 2017 12:17:00 AM PST, fr33d0m4all
wrote:
Hi,
this is not really a Tor issue, but I'd like to know if there is
someone
else like me that is having problems upgrading his Tor installation to
the latest version on its Rasp
1000s of bytes per second processed.
type 16 bytes 64 bytes256 bytes 1024 bytes 8192 bytes
aes-256-cbc 29654.42k34815.66k36337.15k36787.54k36833.96k
Best regards,
Fr33d0m4All
___
tor-relays mailing list
to
Fail2Ban) but I just
wanted to know if there is some campaign of attacks carried against Tor
relays.. are you experiencing the same? The attacks are carried on with a
botnet given the large amount of different IP addresses that I see in the logs.
Best regards,
Fr33d0m4All
,
Fr33d0m4All
> Il giorno 04 ott 2017, alle ore 08:35, Gareth Llewellyn
> ha scritto:
>
> Original Message
> On 4 Oct 2017, 07:02, Fr33d0m4all < fr33d0m4...@riseup.net> wrote: Hi, My Tor
> middle relay public IP address is victim of SSH brute force
001 WINDOW=321 RES=0x00 ACK PSH FIN URGP=0
Drop log in the INPUT direction => This could be a correct drop due to a
new connection with RST flag, I think:
iptables-IN-INVALID-DENIED: IN=eth0 OUT= SRC=91.x.x.x DST=10.x.x.x
LEN=40 TOS=0x00 PREC=0x00 TTL=54 ID=0 DF PROTO=TCP SPT=15754 DPT=9090
WINDOW
d way
for keeping it cold, since after 1 hour of 1 core at 100% I've reached
about 70°C with heatsinks on the CPU.
I just wanted to share my experience with you, hope you find it
interesting :)
Have a nice week
Fr33d0m4All
- --
_
t/plain; charset="utf-8"
>
> On Sun, 10 Apr 2016 17:52:20 + fr33d0m4all
> wrote:
>> I've just moved my Tor relay installation from my alix1.c
>> embedded system (500Mhz CPU with 256Mb ram) which was able to
>> offer only 4Mbps (100% CPU utilization) t
our own node, but
I don't remember the considerations about this argument...
Best regards,
Fr33d0m4All
--
_
PGP Key: 0DA8 7293 D561 3AEE A3C0 7F63 101F 316A F30E ECB4
IRC Nick
6 21:38:15 +
fr33d0m4all wrote:
And about using it as a SOCKS proxy to enter the Tor network? Do the
same considerations apply or is it even worse to use a relay as a
SOCKS proxy?
This is horrible and should *NEVER* be done, assuming any network not
physically controlled by you is between you and
t/plain; charset="windows-1252"
>
> Hi Fr33d0m4All,
>
> In my opinion, you could use your own tor relay as an entry node,
> although you should think about it this way, too: Browsing through the
> tor network usually establishes a route through 3 nodes from your si
etwork and it works fine. Does it take so long for an OBFS4 bridge
relay to become known and used by someone?
Best regards,
Freedom For All
--
_
PGP Key: 0DA8 7293 D561 3AEE A3C0 7F63 101F 316A F30E ECB4
IRC Nick: fr33d0m
13 matches
Mail list logo