Re: [tor-relays] Tor 0.2.5.10 is released!

2014-10-25 Thread goll
On Sat, 25 Oct 2014 13:21:01 -0400 Nick Mathewson wrote: > Synopsis: There is a new stable out. Some packages are up-to-date, > more packages should be up-to-date over the next week. Usually I > don't announce a stable till there are packages, but people have been > asking me about this one, an

Re: [tor-relays] Tor 0.2.5.10 is released!

2014-10-26 Thread goll
> Which package exactly? I'm guessing you're using the deb? Which OS? > What CPU architecture? No, using the rpm, CentOS 6, x86_64. > > The next question would be whether you somehow disabled your > curve25519 support -- but I don't know how to easily check that with > the deb. > Found this li

[tor-relays] GHOST: glibc gethostbyname buffer overflow

2015-01-28 Thread goll
Hello operators, If you have not done so already, update your glibc: "as a result, most stable and long-term-support distributions were left exposed (and still are): Debian 7 (wheezy), Red Hat Enterprise Linux 6 & 7, CentOS 6 & 7, Ubuntu 12.04, for example." http://www.openwall.com/lists/oss-sec

Re: [tor-relays] Opt-In Trial: Fallback Directory Mirrors

2015-12-17 Thread goll
Hello, I'd also be happy to opt-in: 14419131033443AE6E21DA82B0D307F7CAE42BDB BR On Fri, 18 Dec 2015 09:17:37 +1100 Tim Wilson-Brown - teor wrote: > > On 18 Dec 2015, at 04:49, Pascal Terjan wrote: > > > > > > > > On 17 December 2015 at 14:07, Nick Mathewson >

Re: [tor-relays] Port knocking for SSH on a Tor node

2016-05-03 Thread goll
On Tue, 3 May 2016 15:58:22 +0200 Cristian Consonni wrote: > Hi, > > I am putting together a blog post with tips and tools for > administrating a node and then I have discovered the technique of > "port knocking". > Have you looked into Single Packet Authorization? http://www.cipherdyne.org/f