Yes, other relays don't like your relay changing ip's all the time.
You should try to get a static ip somehow, ask your isp :)
On 08/16/2014 10:00 PM, IceFish ThreeTwo wrote:
I have a dynamic IP from my ISP. Is that going to cause issues with my
relay?
--
Sent from my iPhone
_
ths, how big of a deal is that?
On Saturday, August 16, 2014, justaguy <mailto:justa...@riseup.net>> wrote:
Yes, other relays don't like your relay changing ip's all the time.
You should try to get a static ip somehow, ask your isp :)
On 08/16/2014 10:00 PM, IceFish T
Hmm, FDC servers is known for doing bad things on tor
https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
iirc this was on FDC servers too
On 2014-08-27 10:43, linen...@safe-mail.net wrote:
For the past week or so I've been seeing unsolicited echo replie
Yes, it's very likely that that FDCservers is getting rejected, because
they have been doing a lot of bad things too tor the last months (the
relay early attack was hosted in an ip range at them, and yesterday i
heard something else on this mailing list about FDCservers doing weird
pings to a s
So, https://oniontip.com is a great help for tor-relay runners
We do need more donations imho
Whoever made it, thank you
- Justaguy
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
Does the tor-arm tool display the used BW of the obfuscated bridge or only the
normal non obfuscated bridge?
-Justaguy___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
What is the cause for this behavior?
https://globe.thecthulhu.com/#/bridge/286FD249840142D1C7536C2D12FDBE5EA63AD912
https://atlas.thecthulhu.com/#details/286FD249840142D1C7536C2D12FDBE5EA63AD912
--
Contact:
Irc, justaguy @ Freenode or OFTC
OTR fingerprint: FF6D1AC2 13F38B15 EDB21522 D3530A6F
https://trac.torproject.org/projects/tor/ticket/13905
This can be solved by using mirrors like https://atlas.thecthulhu.com/
--
Contact:
Irc, justaguy @ Freenode or OFTC
OTR fingerprint: FF6D1AC2 13F38B15 EDB21522 D3530A6F 6EE01996
On 12/06/2014 05:12 PM, Abhiram Chintangal wrote:
Hello,
I
Hello,
This is very vague.
We do not know which range you are in and which relay this is about.
This is probably inside google cloud, which was blocked by the dirauths
some days ago because some guy signed up 3347 exit relays with google
cloud machines.
On 12/30/2014 10:22 PM, Giovanny Andres Gon
https://globe.thecthulhu.com/#/relay/F528DED21EACD2E4E9301EC0AABD370EDCAD2C47
Someone just got 149.08 MB/s on a non-exit relay.
This is amazing!
Would you mind saying what kind of hardware you use for this?
Ipredator used https://ipredator.se/guide/torserver to get to 101MB/s.
So your setup shoul
Oh wait?
This is only advertised bandwith and not the actual bandwith.
maybe the actual bandwith will reach the advertised bandwith some day.
This relay is only running for 3 days so..
On 12/31/2014 10:11 AM, Justaguy wrote:
> https://globe.thecthulhu.com/#/re
A flag on the AS number where the ip of that Ipredator exit is in, does
not mean that it is in this country.
You can set that flag to anything you want.
It's probably a joke about "libre" .
On 12/31/2014 10:15 AM, I wrote:
>> Someone just got 149.08 MB/s on a non-exit relay.
> I would dearly love t
Please send this in an unencrypted form.
On 01/24/2015 06:16 PM, Michael Edwards wrote:
> -BEGIN PGP MESSAGE-
> Version: GnuPG v2
>
> hQEMA22Nc/OMyTy8AQgAt76bA92YgnGcymH4H+jGorceD36/o6UsQKDGctj22eip
> BduAfsf+0P+QSz+oeGgzjord/LemSNzL8HfhxRaLvk+HzymNGwrJ23sbC9ftQnbn
> G/u5F1VCQeYf+JF6I19esTf
Yes.
But, it is easy to exclude your own relays.
https://www.torproject.org/docs/tor-manual.html.en#ExcludeNodes
On 02/06/2015 08:54 PM, Chris Tilt wrote:
> Hello,
>
> When running a relay that is configured as an Exit, do you run the risk of
> your own TOR browsing sessions (initiated from the sam
You didn't include your fingerprint or IP's, so there isn't any way for
someone to check.
On 02/26/2015 02:31 PM, catchthemall wrote:
> Hi all,
>
> tl;dr:
>
> Due to a config error my relay [1] was running on two different IPs at
> the same time for about half a day. Now the traffic has dropped.
>
You didn't include your fingerprint or IP's, so there isn't any way for
someone to check.
On 02/26/2015 02:31 PM, catchthemall wrote:
> Hi all,
>
> tl;dr:
>
> Due to a config error my relay [1] was running on two different IPs at
> the same time for about half a day. Now the traffic has dropped.
>
You didn't include your fingerprint or IP's, so there isn't any way for
someone to check.
On 02/26/2015 02:31 PM, catchthemall wrote:
> Hi all,
>
> tl;dr:
>
> Due to a config error my relay [1] was running on two different IPs at
> the same time for about half a day. Now the traffic has dropped.
>
So, you made a POST request to an online "passwordchecker" and they now
probably have your password.
On 02/26/2015 04:24 PM, Speak Freely wrote:
> Hi ZEROF,
>
> I had fail2ban, harden (which includes tiger, tripwire, logcheck, plus
> MANY others), all the fancy log checkers, rkhunter and clamav,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
My guess is, that the router has a public web interface, listening on
port 443, to the whole world.
Or, your provider blocks port 443, because it doesn't want you to host
your own webserver.
On 04/06/2015 01:15 AM, teor wrote:
>> Date: Sun, 05 Apr
Because you lost control of your exit relay, you should ask DirAuths to
reject/refuse/ban your exit.
On 11/06/2015 05:05 PM, Kevin Beranek wrote:
> Is there a procedure I should follow if a relay has been seized by the
> police? Do DirAuths typically do something in cases where a relay is
> seize
Reddit uses fastly, perhaps fastly is blocking your exits?
On 28/04/2019 20:37, abuse net wrote:
https://i.imgur.com/nF3FR0V.png
WTF?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/
https://lists.torproject.org/pipermail/tor-relays/2019-April/017127.html
On 03/05/2019 14:28, abuse net wrote:
(Japanese) web mailer
On 3. May 2019, at 14:27, dns1...@riseup.net wrote:
Hello,
I run an exit relay with a restricted exit policy. I never have allowed any
SMTP port, but today I
22 matches
Mail list logo