On Freitag, 2. Dezember 2022 16:30:48 CET Chris wrote:
> As I'm sure you've already gathered, your system is maxing out trying to
> deal with all the connection requests. When inet_csk_get_port is called
> and the port is found to be occupied then inet_csk_bind_conflict is
> called to resolve the
On Dienstag, 3. Januar 2023 00:46:30 CET fastliftednloud via tor-relays wrote:
> I'm game to do my part and operate a relay, something simple for a
> technologically simple guy, like a guard or middle relay.
You can help directly with a Firefox plugin: Snowflake proxy. Has the same
function as a
On Freitag, 13. Januar 2023 15:40:50 CET tor wrote:
> Hello
>
> I'm running ubuntu, jammy, arm64.
>
> When I run:
>
> machine@user_1:~$ sudo apt-get install obfs4proxy
> Reading package lists... Done
> Building dependency tree... Done
> Reading state informat
On Freitag, 13. Januar 2023 16:09:33 CET li...@for-privacy.net wrote:
> > Where do I get version 14?
>
> From backports:
> https://lists.torproject.org/pipermail/tor-relays/2023-January/020976.html
A little help for backports that I've already posted:
https://lists.torproject.org/pipermail/tor-r
On Freitag, 13. Januar 2023 18:05:19 CET Martin wrote:
> Just out of curiosity, when will this version be implemented in the TOR
> repositories?
As far as I can tell, not in the near future. (this version and also future
versions)
Obfs4proxy has too many dependencies and is packed better (as back
On Freitag, 13. Januar 2023 18:18:21 CET tor wrote:
> the backport of obfs4proxy seems to be unsigned
Backports has been an official Debian service since ~2010 and the packages are
signed with the debian-archive-keyring.
> I needed to use:
> deb [trusted=yes] http://deb.debian.org/debian bullsey
On Mittwoch, 8. Februar 2023 00:07:22 CET nusenu wrote:
> I don't think relays should silently drop
> other relays packets without first trying:
> - to confirm that accepting that IP would render the relay (mostly) unusable
> (by first running in a mode that accepts relay IPs) - to understand the
On Donnerstag, 16. Februar 2023 06:15:02 CET Keifer Bly wrote:
> So my bridge at
> https://metrics.torproject.org/rs.html#details/4D6E3CA2110FC36D3106C86940A1D
> 4C8C91923AB says it has “none “,
Well, then you have configured BridgeDistribution (Default: any) to none.
> though the torrc file has
On Samstag, 18. Februar 2023 18:26:55 CET shruub via tor-relays wrote:
> > RelayBandwidthBurst
>
> One question, what actually is the burst? Haven't found anything online
> nor in man.
>
man torrc:
RelayBandwidthBurst N bytes|KBytes|MBytes|GBytes|TBytes|KBits|MBits|GBits|
TBits
If not 0, limit
On Samstag, 18. Februar 2023 18:56:00 CET Keifer Bly wrote:
> Ok. Here is the torrc file:
>
> GNU nano 3.2 /etc/tor/torrc
>
>
> Nickname gbridge
> ORPort 443
> SocksPort 0
> BridgeRelay 1
> PublishServerDescriptor bridge
> ServerTransportPlugin obfs4 exec /usr
On Donnerstag, 23. Februar 2023 13:43:29 CET gus wrote:
> AccountingStart day 12:00
> AccountingMax 50 GB
>
>
> Example: Let's say you want to allow 50 GB of traffic every day in each
> direction and the accounting should reset at noon each day:
Hi Gus, I think Keifer meant the 5GB limit or
On Freitag, 24. Februar 2023 14:19:13 CET Jeff Teitel wrote:
> On Fri, Feb 24, 2023 at 12:10 AM Marco wrote:
> > Yes, Frantech should actually be avoided. But in Miami there are few Tor
> > relays. A SLICE 512 for $2.00/m or $20.00/y is sufficient for a bridge.
> > https://buyvm.net/kvm-dedicated-
On Freitag, 24. Februar 2023 04:11:27 CET Keifer Bly wrote:
> Yes, the limit is 50GB per month, but for some reason the distribution
> mechanism is not updating and the bridge keeps going offline despite the
> new torrc.
What comes to my mind without logs (& your 'killall -HUP' of a systemd servic
On Dienstag, 28. Februar 2023 19:02:38 CET Keifer Bly wrote:
> Yep, and after that the same still happens, it is still going offline
In the syslog is why tor aborts.
To help you, you should post your logs to a pastbin page. From the start of
the tor daemon until it goes offline.
--
╰_╯ Ciao Mar
On Samstag, 4. März 2023 02:09:19 CET Keifer Bly wrote:
> Wheres the pastebin page? Thanks.
$websearch pastebin
https://paste.debian.net/
https://paste.systemli.org/
https://pastebin.mozilla.org/
...
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
signature.a
This is _not_ my relay:
https://metrics.torproject.org/rs.html#details/D5A3882CBDBE4CAD2F9DDA2AB80FE761BEDC3F11
https://nusenu.github.io/OrNetStats/w/relay/D5A3882CBDBE4CAD2F9DDA2AB80FE761BEDC3F11.html
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
signature.
On Dienstag, 7. März 2023 03:00:49 CET Sydney wrote:
> Newbie here. No network experience but already running 2 TOR instances: 1
> TOR service + 1 bridge.
Never mix different relay types under one IP.
> I would like to "upgrade" to TOR relays but have a few questions relating to
> hardware needs.
On Mittwoch, 8. März 2023 18:13:01 CET Keifer Bly wrote:
> Strangely, nothing whatsoever is being written to the notices.log file,
> upon checking it it is completely empty, nothing there.
That can't be, please post:
~# ls -A /var/log/tor
In general, everything is always written to /var/log/syslo
On Dienstag, 7. März 2023 13:31:13 CET mail--- via tor-relays wrote:
> Running a few relays on 1-2 CPU cores with limited RAM is
> fine, but just keep an eye on it and don't run other memory intensive stuff
> on the server (like DNS query caching, which can take quite some RAM as
> well).
A recu
On Sonntag, 12. März 2023 04:45:21 CET Keifer Bly wrote:
> I do not use any scripts to start tor, I just type tor to start the process
> on debian.
That's where your problems begin. You start a 2nd tor process as root that
doesn't take the default configs from:
/usr/share/tor/tor-service-defaults-
On Freitag, 17. März 2023 17:25:10 CET Bauruine wrote:
> ... but I'll
> just keep "mining" consensus weight. Because you don't need a modified
> version of Tor and you don't need the blockchain for that. Just download
> the consensus and look at the consensus weight and you have your proof
> of up
On Freitag, 31. März 2023 01:26:42 CEST denny.obre...@a-n-o-n-y-m-e.net wrote:
> Hi,
>
> I just activated my first exit relay. (
> https://metrics.torproject.org/rs.html#details/3B85067588C3F017D5CCF7D8F65B
> 5881B7D4C97C ) I had the following in my torrc (plus some other things):
Don't forget to
Hi denny,
> Hi,
>
> I just activated my first exit relay. (
> https://metrics.torproject.org/rs.html#details/3B85067588C3F017D5CCF7D8F65B
> 5881B7D4C97C ) I had the following in my torrc (plus some other things):
I've answered the rest to the list.
If you want to enable IPv6 at Frantech/BuyVM:
On Freitag, 31. März 2023 16:56:16 CEST denny.obre...@a-n-o-n-y-m-e.net wrote:
> The second IP is still in "Exit Addresses" with the new configuration ...
> https://metrics.torproject.org/rs.html#details/3B85067588C3F017D5CCF7D8F65B
> 5881B7D4C97C
I don't understand that now either. I have at leas
On Dienstag, 11. April 2023 14:09:15 CEST Finn wrote:
> Hello everyone,
>
> We are hosting multiple relays under our AS 210558 and received an email
> from a local police station in Germany requesting user data, nothing
> unusual.
Nothing unusual? I had a house search because of exits but never a
On Mittwoch, 12. April 2023 18:28:09 CEST tor-opera...@urdn.com.ua wrote:
> Finn wrote:
> > The weird thing is, that the relay in question is only a relay and
> > not an exit node since its creation (185.241.208.179)
> > (https://nusenu.github.io/OrNetStats/w/relay/B67C7039B04487854129A66B16F5E
>
On Mittwoch, 12. April 2023 17:14:46 CEST Linux-Hus Oni via tor-relays wrote:
> hi again, actulay i have made my exit to a bridge, so my bandwith is not so
> big for an exit. it is automatically removed from the metrics ?
Get a new IP, you put users at risk!
It doesn't matter, even if your relay
On Freitag, 19. Mai 2023 13:55:10 CEST telekobold wrote:
> If there isn't such an option, does anyone happen to have a script
> ready for this (before I start trying to implement something like this
> myself)?
Yes in toralf's /torutils:
https://github.com/toralf/torutils/blob/main/key-expires.py
On Samstag, 3. Juni 2023 18:18:46 CEST Tschador wrote:
> today I found this warning in the log of my relay
> Jun 03 04:04:33.000 [warn] Possible compression bomb; abandoning stream.
> What does this mean?
A simple log message that the tord didn't unpack a Zip Bomp. DDOS protection
in the Tor so
On Sonntag, 11. Juni 2023 13:46:06 CEST xmrk2 via tor-relays wrote:
> Background: I am running a lightning node, lightning is a layer 2 protocol
> to scale Bitcoin. Lightning nodes need to be connected to each other
> ideally 24/7. I was contacted by the operator of another Lightning node,
> compl
On Dienstag, 20. Juni 2023 23:01:23 CEST gus wrote:
> Just a friendly reminder that the Relay Operator meetup will happen this
> Saturday, June 24 at 18 UTC.
>
> ## Agenda
>
> 1. Announcements
> - Tor Relay Operators meetup @ CCCamp 2023!
> - More unrestricted snowflake proxies are needed
> -
On Samstag, 24. Juni 2023 18:03:47 CEST li...@for-privacy.net wrote:
> On Dienstag, 20. Juni 2023 23:01:23 CEST gus wrote:
> > Just a friendly reminder that the Relay Operator meetup will happen this
> > Saturday, June 24 at 18 UTC.
> >
> > ## Agenda
> >
> > 1. Announcements
> >
> > - Tor Relay
On Montag, 17. Juli 2023 20:12:34 CEST telekobold wrote:
> I have an issue regarding the "first seen" flag at
> metrics.torproject.org: It is definitely wrong for my two bridges - both
> dates are much too close in the past.
> Has anyone observed similar behavior for its relay? (I found it
> mean
On Freitag, 21. Juli 2023 18:07:35 CEST gus wrote:
> New update: In the last few weeks, internal political conflicts and
> other events[1] in Turkmenistan have led to another wave of censorship
> on Tor and anti-censorship tools. Tor bridges have been one of the few
> free alternatives for people
On Montag, 31. Juli 2023 00:55:15 CEST Gary C. New via tor-relays wrote:
> On Sunday, July 30, 2023, 3:30:55 PM MDT, li...@for-privacy.net wrote:
> > I don't know if I should ignore that or better configure it that >way:
> > ORPort 127.0.0.1:8443 NoListen
> > ORPort 8443 NoAdvertise
> > ORPort [::
On Montag, 31. Juli 2023 23:06:54 CEST Gary C. New via tor-relays wrote:
> Please let me know, if you are able to get the OBFS4
> bridge working without exposing the ORPort. Respectfully,
Yes, that's working
All Info about this new feature:
Anti-censorship team meeting notes, 2023-06-29
https://f
On Dienstag, 1. August 2023 19:21:08 CEST Toralf Förster wrote:
> On 8/1/23 18:54, li...@for-privacy.net wrote:
>
> > == Announcements ==
> > rdsys is ignoring the running flag now :)
> > * To hide your bridge's ORPort:
> > ORPort 127.0.0.1:auto
> > AssumeReachable 1
>
>
> I do assume I can igno
On Dienstag, 1. August 2023 23:22:12 CEST Gary C. New via tor-relays wrote:
> On Tuesday, August 1, 2023, 10:54:40 AM MDT, wrote:
>
> On Montag, 31. Juli 2023 23:06:54 CEST Gary C. New via tor-relays wrote:
> >> Please let me know, if you are able to get the OBFS4
> >> bridge working without exp
On Dienstag, 1. August 2023 23:22:12 CEST Gary C. New via tor-relays wrote:
> The failure logs and metrics are going to be confusing to new obfsbridge
> operators. I suppose documenting this on the obfsbridge setup page will
> have to be sufficient in the interim; along, with pointing them to the
On Samstag, 5. August 2023 08:40:42 CEST Marco Predicatori wrote:
> secureh...@gmail.com wrote on 8/4/23 01:46:
> > I tried reporting a similar issue a few months ago (post wasn’t approved
> > by
> > moderator). I was running a relay from my home ISP. After a short while
> > certain websites became
On Montag, 7. August 2023 22:28:32 CEST s7r wrote:
> While all the above is true, a thing to remember is to make sure we
> don't end up all renting too many VPS'es or dedicated servers in the
> same places / same AS numbers - we need network diversity,
Especially at the exits, which unfortunatel
On Dienstag, 8. August 2023 00:30:38 CEST Gary C. New via tor-relays wrote:
> In addition to network diversity, there is the fact that most individuals
> find it necessary to run an at Home internet connection 24 x 7 x 365. So...
> Other than for the reasons inspired by the subject of this post, w
On Montag, 14. August 2023 16:40:09 CEST Jordan Hillis wrote:
> Can I get a copy of the webtunnel-bridge Docker image and
> documentation? Thanks
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/webtunnel#server-setup
More info in the last (June 24) Tor Relay Operator Meetup
So you don't have to dig through the logs:
(as root or sudo)
~# cat /var/lib/tor/pt_state/obfs4_bridgeline.txt
~# cat /var/lib/tor/fingerprint
or with multiple instances:
~# cat /var/lib/tor-instances/NN/pt_state/obfs4_bridgeline.txt
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and i
On Dienstag, 19. Dezember 2023 16:23:27 CET Jordan Savoca via tor-relays
wrote:
> On 12/18/23 6:59 AM, ab...@relayon.org 2023 wrote:
> > These are complete and utter shit.
> >
> > avoid like the plague!
> >
> > nifty
;-) You've landed in the sun again, I envy you.
> Oh? I'm curious to hear more
On Montag, 15. Januar 2024 23:19:37 CET Chris Enkidu-6 wrote:
> I've noticed a new kind of possible attack on some of my relays, as
> early as Dec.23 which causes huge spikes of outbound traffic
>
> I have included charts and excerpts from the log in my post in Tor forum
> at below link:
>
> http
On Mittwoch, 31. Januar 2024 19:50:13 CET Carlo P. via tor-relays wrote:
> I have a relay on 152.53.17.183 / 2a0a:4cc0:1:1333::beef which is listed as
> "German" in metrics.torproject.org, but actually it is in Austria
Was just a topic here recently:
https://lists.torproject.org/pipermail/tor-re
On Donnerstag, 15. Februar 2024 13:54:51 CET s7r wrote:
> I have recently found something interesting on my relays. On all relays
> and clients actually.
>
> As always I am using Debian and apt to get Tor from deb.torproject.org
> tor-nightly-main-bullseye main (for example). I also have the ke
On Sonntag, 18. Februar 2024 01:42:30 CET Keifer Bly wrote:
Every few months the same question with the same log messages :-(
> 00:36:35.000 [warn] You are running Tor as root. You don't need to, and you
> probably shouldn't.
^^Still not fixed.
> Feb 18 00:36:34.640 [notice] Opening OR listener
On Montag, 19. Februar 2024 00:27:04 CET s7r wrote:
> Peter Palfrader wrote:
>
> >
> > our gitlab-ci has not managed to build a tor nightly in ages.
> >
>
>
> Thank you for stepping in! No better person to ask :)
>
> The upgrade via apt from nightly used to work every time, back since
> Debi
On Samstag, 30. März 2024 01:02:54 CEST he...@relaymagic.org via tor-relays
wrote:
> Just wanted to bring this to everyone’s attention if you hadn’t seen it
> already. Developer discovered a backdoor in xz-utils
> https://www.openwall.com/lists/oss-security/2024/03/29/4
Pretty unli
On Freitag, 3. Mai 2024 17:00:44 CEST Keifer Bly wrote:
> What is the correct format for adding tor as a trusted source?
A not outdated system. ¹AFAIK obfs4proxy for buster (oldoldstable) has had a
security hole for a long time and you are putting your users at risk!
> deb-src http://deb.debian.
On Freitag, 3. Mai 2024 18:17:41 CEST Keifer Bly wrote:
> System is up to date, I run apt-get update regularly.
Did you even only read 2 sentences from the link?
Buster is EOL and will be completely archived in a few weeks.
> > https://www.debian.org/releases/buster/
Debian is 2 releases ahead!
Yo
On Dienstag, 4. Juni 2024 23:24:50 CEST Roger Dingledine wrote:
> On Tue, Jun 04, 2024 at 04:42:50PM +, Eldalië via tor-relays wrote:
> > I have to move somewhere else a a (middle) relay I have been running for a
> > few years. It will be down for 2-4 weeks, then be back online in a
> > differ
On Mittwoch, 5. Juni 2024 14:50:20 CEST gus wrote:
> Hi,
>
> As some of you might have noticed, we have a high load situation on the
> network for a couple of weeks now affecting in particular onion services
> (but not only them).[1]
>
> We recommend Onion Services operators to enable our Proof o
I don't know if this was mentioned at the Tor Relay Meeting yesterday, if so,
I missed it. ;-)
A few months ago there was a recommendation to not exposing OrPort for
bridges.
This had the unpleasant effect that all bridges were 'red' on Tor Metrics,
even though they were running perfectly fine.
Oh, the fix only lasted 23 hours. ;-)
'Running' flag is gone again.
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-
On Montag, 8. Juli 2024 19:34:51 CEST Rafo (r4fo.com) via tor-relays wrote:
> But this week I’ve received 2 DDoS alerts from my provider
> (Netcup), both are ~3 gigabits. They seem to be coming from other Tor
> relays.I’m running an Invidious like instance on my server (which uses
> around 600 mega
On Mittwoch, 10. Juli 2024 00:32:04 CEST Osservatorio Nessuno via tor-relays
wrote:
> we are planning to get some hardware to run a physical Tor exit node,
> starting with a 1Gbps dedicated, unmetered uplink (10Gbps downlink). We
> will also route a /24 on it, so we will have large availability o
On Freitag, 2. August 2024 17:49:01 CEST Toralf Förster via tor-relays wrote:
> On 8/2/24 17:38, Hiro wrote:
> > We are now opening NSA for testing
>
> May I ask, what the abbreviation "NSA" means?
Network Status API
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you free
On Dienstag, 30. Juli 2024 18:34:44 CEST George Hartley via tor-relays wrote:
> I would definitely want to be able to change my exit policy by just sending
> a simple "kill -SIGHUP $pid".
>
> So yeah, consider myself interested in this functionality.
>
> But, don't we already have that implemente
On Samstag, 10. August 2024 00:58:29 CEST George Hartley via tor-relays wrote:
> Then these must be targeted attacks, as I have never encountered something
> like this during 10 years of relay operation under different providers and
> aliases.
Of course, these are targeted attacks and have been ex
On Samstag, 10. August 2024 05:25:51 CEST George Hartley via tor-relays wrote:
> If this is a client to guard detection only, then why does my exit node also
block a significant amount of DoS (I had around the same statistics when my
guard probability fraction was still zero, so clearly somethin
On Samstag, 10. August 2024 14:38:27 CEST George Hartley via tor-relays wrote:
> I am very well aware of that and how it works, I have seen your commit that
> got merged, and am a C/C++ programmer as well.
>
> Nevertheless, this is a feature I wanted anyway, so I could just reload the
> config and
Hello,
Can you run a bride and a middle-relay together on a host?
I mean for the safety of users. IPv6 is usually a /64 network and the
various IPv4 are usually also from a subnet.
--
Ciao Marco!
___
tor-relays mailing list
tor-relays@lists.torproje
Am 22.03.2019 08:19, schrieb Roger Dingledine:
On Fri, Mar 22, 2019 at 02:43:13AM +0100, li...@for-privacy.net wrote:
Can you run a bride and a middle-relay together on a host?
I mean for the safety of users. IPv6 is usually a /64 network and the
various IPv4 are usually also from a subnet.
An
Am 05.04.2019 10:58, schrieb ylms:
can someone point me at some information about this warning?
"[WARN] Error binding network socket: Address already in use [991
duplicates hidden]"
Log message is clear:
You have assigned a port number twice.
Either two Tor-instances run on the same (TCP) po
Am 04.04.2019 18:02, schrieb Conrad Rockenhaus:
I have a FreeBSD box on a 1 Gbit/s connection. I'm trying to determine
if we need more high speed relays or high speed exit relays.
You mean _10_Gbit/s uplink. ;-)
If your hoster is not in Rwanda or something, 1Gbit is normal nowadays.
There can
Am 05.04.2019 17:59, schrieb Neel Chauhan:
One thing that could happen (but may not apply to you) is your
SOCKSPort. Set it to 0 to not listen, or to a random number if you
have to listen for SOCKS connections.
Hint for ylms: Socks 0 + reject in the torrc config.
SocksPort 0
SocksPolicy rejec
Am 07.04.2019 13:00, schrieb Toralf Förster:
... tor-exit-notice_DE.html
I did not know the translations yet. Thank you!
If someone else is looking for:
https://github.com/chgans/tor-exit-notice
Grüße aus Bonn ;-)
--
Ciao Marco!
___
tor-relay
Am 06.04.2019 21:19, schrieb Logforme:
The reason I ask is that I wonder if I should run a second Tor
instance or if the current one will be able to make use a a reasonable
part of the 500Mps.
I'm also testing it with one to three instances.
My problem is, I only have 30TB traffic / month. Unf
Am 08.04.2019 06:38, teor wrote:
On 8 Apr 2019, at 13:00, Conrad Rockenhaus
wrote:
If Tor doesn't scale on multicore CPUs, setting NumCPUs to 2 and
running two threads has no effect at all on throughput?
On most systems, Tor automatically sets NumCPUs to the number of
physical CPU cores.
Y
On 01.05.2019 22:22, to...@protonmail.com wrote:
I'm hoping that Verizon will settle down and start renewing my ip
address instead of giving me another every few hours, but of course I
don't know if their pool of addresses is running low and they are
scrambling or what.
Any thoughts? I don't t
Hello,
I do not understand why relay A751D8BEE222564B7BA657F74B6658836FF1AEEA
does not get a guard status.
A few weeks ago I set AccountingMax on this relay. This is off for about
3 weeks. All servers are configured the same.
https://metrics.torproject.org/rs.html#search/TorOrDie4privacyNET
On 17.05.2019 02:22, Neel Chauhan wrote:
But I'd advise just giving up on cron. For automatic updates, you
should look into unattended-upgrades instead of using cron.
+1
on Debian:
apt-get install -y unattended-upgrades apt-listchanges
cp /usr/share/unattended-upgrades/20auto-upgrades
/etc/a
On 28.05.2019 09:45, Keifer Bly wrote:
Is there a way that I can make sure that the auto update is happening?
reading the logfiles in:
var/log/unattended-upgrades
Note:
Integrate server via ftps in konqueror as a network folder and
everything is readable in the filemanager.
logwatch may be
On 31.05.2019 02:43, teor wrote:
On 31 May 2019, at 10:34, Keifer Bly wrote:
Upon trying to open that folder, I got this.
var/log/unattended-upgrades: No such file or directory
Try a leading slash:
/var/log/unattended-upgrades
sorry,
slash was lost when I copy & paste. :-(
If you want to
On 03.06.2019 05:54, Keifer Bly wrote:
So upon opening the file in this folder, I am only seeing a blank file
saying it is unwritable. I wonder why this might be
;-)
Only root can read the logfiles. You have to use sudo or su.
Or you as a user are a member of the group 'adm'. Then you can read
On 03.06.2019 22:26, Keifer Bly wrote:
So I am trying to limit as google cloud has strict pricing plans.
Perhaps
I should go back to just running a bridge for now. What would the
traffic
limit for a useful relay be? Thanks.
At mine Relays ~20Mbit/s advertised bandwith = 40TB - 60TB in one mo
On 06.08.2019 12:57, ger...@bulger.co.uk wrote:
Thanks. I just could not see how Fail2ban would work on an ORport.
What log would it look at? What criteria for the jail? The fai2ban
on my non-tor VPS does not yet work with IPv6, which is partly the
nature of IPV6 rather than a programming i
On 12.08.2019 02:46, Christopher Sheats wrote:
It is discouraging to see so many small and large network operators
not using IPv6. Why is this such a problem? Tor Project, please
increase your #IPv6 awareness/outreach similar to how ARIN and the
other RIRs try very hard to do.
+1
Twitter :-(
On 08.08.2019 14:15, Rob Jansen wrote:
To avoid over-estimating network capacity, we could use IP-based
heuristics to guess which relays share a machine (e.g., if they share
an IP address, or have a nearby IP address). In the long term, it
would be nice if Tor would collect and report some sort
On 19.08.2019 05:03, teor wrote:
We'll be able to judge the right speed once we've released the first
few new IPv6 features. Having funding will also help us go faster.
Maybe this year before Christmas a donation call for IPv6 features could
be made ;-)
Similar to last year, when the Mozilla
On 04.10.2019 12:24, nusenu wrote:
As previously written on 2019-09-03
https://lists.torproject.org/pipermail/tor-relays/2019-September/017711.html
the Tor directory authorities are about to remove
relays from the network if they run end-of-life versions of tor.
Here is the list of affected rel
On 04.10.2019 23:10, skarz wrote:
I’m running Raspian Stretch lite.
What is the proper way to stop/start/restart a relay? I’ve
‘corrupted’ a few relays during this process, for example a relay had
a new fingerprint after restarting the machine. Actually my biggest
problems thus far are all b
On 04.10.2019 23:33, a tor op wrote:
Well, can be hard to say just looking at that number. Linux is not
Windows.. it doesn't have to reboot every time it's patched.
I'm sure every GNU / Linux distri had several kernel upgrades in that
time ;-)
Note: install unattended upgrades, nullmailer and
On 22.10.2019 18:53, Michael Gerstacker wrote:
when i comment out the MyFamily line with an # in the torrc on one
relay it
seems to be still handled like before.
Hitting x in nyx or waiting a few days or rebooting does not make any
change.
Nyx or arm must be called as root to save the config
Ohh fuck. Too many terminals open and in the wrong:
"rm -R / var / lib / tor-instances"
I idiot of course have _no_ backup of the keys. :-(
--
╰_╯ Ciao Marco!
My family:6D6EC2A2E2ED8BFF2D4834F8D669D82FC2A9FA8D
___
tor-relays mailing list
tor-relays@li
On 05.11.2019 17:00, Keifer Bly wrote:
Here is Google Clouds pricing plans
https://cloud.google.com/network-tiers/pricing
"Pricing will be based on both source and destination geolocation of
traffic"
Do you operate there at all Tor-relays?
Forget google cloud for TOR!
There are countless
ched 80-100 MiB/s
Does the Tor-project have any other more secret bridge lists?
Another question:
Is it useful to offer other transport protocols than obfs4?
--
╰_╯ Ciao Marco!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists
distribute your bridge manually by using the
config option "BridgeDistribution none" to tell BridgeDB that it
shouldn't distribute your bridge. If you do this, it's your
responsibility to find users and give them your bridge lines.
I was hoping to hear from private distributi
On 27.12.2019 23:01, John Csuti wrote:
Hi Roger,
Thanks for the direction but I did a ping test on IPv6 and it came
back. I will look-into other possible issues as well and keep you
posted.
Your relay is on metrics but IPv6 is missing:
https://metrics.torproject.org/rs.html#details/2895F832741
/torproject.org xenial InRelease
Err:8 https://deb.torproject.org/torproject.org xenial Release
server certificate verification failed. CAfile:
/etc/ssl/certs/ca-certificates.crt CRLfile: none
Reading package lists... Done
E: The repository 'https://deb.torproject.org/torproject.org xenial
Re
On 22.02.2020 08:42, teor wrote:
Tor also supports "%include (path)" lines in torrcs, which include the
contents of the file at that path.
(If you have logrotate installed, it should issue a HUP every day to
rotate tor's logs. So maybe you can skip that step.)
It's a bit of a pain, I know.
On 09.03.2020 14:51, Станислав wrote:
system openwrt.I have a bunch of odhcpd+unbound.on a unbound works
dns-over-tls in end face log torrc these errors.are what could be the
problem? the unbound is not configured correctly.
Mar 09 15:13:37.000 [warn] Unable to parse '/etc/resolv.conf', or no
na
On 09.03.2020 11:55, Станислав wrote:
hi.I start second instance of tor, but for some reason it stopped
working.after updating the firmware on board pc engines apu2
:-) You have a very nice setup there:
OpenWrt on PC Engines APU 2
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and
lol
Funny pictures, nice stuff.
Where can you get the eff.org and Tor stickers that are under the USB
ports?
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
___
tor-relays mailing list
tor-relays@lists.torproject.or
On 18.03.2020 02:55, teor wrote:
If you include your relay fingerprints, and tshirt size, they might
send you a tshirt as well. (Most long-term relay operators can get
a tshirt, as a thank you for running a relay.)
;-)
I got T-shirts and Tor stickers a few months ago.
Thanks to -KAT
I just do
On 19.03.2020 02:28, Kathi wrote:
NOTE: I know tor.Nyx should not be run as root, I get that. Tor/Nyx
are running as root. I don’t know how to use debian-tor as usr.
~$ sudo -u debian-tor nyx -i 9051
.bashrc aliases for lazy admin ;-)
# My aliases for nyx (tor & tor-instances)
alias nyx='su
On 20.03.2020 09:19, Roger Dingledine wrote:
On Thu, Mar 19, 2020 at 07:57:53PM +0100, Mario Costa wrote:
Or you could just add your user to the debian-tor group, so it will be
able to access the nyx control Unix socket.
This is definitely imo the better approach rather than sudo'ing your
nyx
1 - 100 of 296 matches
Mail list logo