-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 5/19/2014 12:48 AM, zwie...@quantentunnel.de wrote:
> I see, network admin. Good to have you back again. If you can push
> 850Mbit from an university we should bring it to run. I am on
> midrange machines LE 100Mbit/s. We could go through some deta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 6/16/2014 11:49 PM, no.thing_to-h...@cryptopathie.eu wrote:
> Hello Tor!
>
> I run an internal Tor relay on Debian Wheezy. Today the OpenSSL
> version was updated to 1.0.1e-2+deb7u11 . Do I need to delete the
> old SSL keys like after the Heartble
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 6/18/2014 7:04 PM, Kali Tor wrote:
> Is it normal for a new relay node to carry almost no traffic even
> after 24 hrs?
>
> From Atlast
>
> Uptime: 1 day 8 hours 30 minutes and 28 seconds Advertised
> Bandwidth: 59.71 KB/s
>
> From arm Bandwidth (
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 6/18/2014 10:46 PM, Relay Admin wrote:
> Both has downsides but I think daily is better, if it starts to get
> a lot traffic than it will serve the network for a few hours every
> day, but in monthly if it use the all available bw in 4 days, it
> wo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 6/23/2014 3:00 AM, Sander Bongers wrote:
> Hi,
>
> A few weeks ago I setup a tor exit relay, using this documentation:
> https://www.torproject.org/docs/tor-relay-debian.html.en
>
> I have somewhat experience, so I kinda knew what I was doing, and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
The same virtualization technique at different providers gives me
different advertised bandwidth for relays in atlas:
one provider 8-9MB/s
other 3-4 MB/s
The relays are all exit, having the same RAM and CPU configuration, as
well as 100mbit port
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
The servers from my ISP are not stable or good enough to handle the
traffic for this Tor exit router.
I get this in the log very often:
Apr 24 15:14:07.000 [notice] Circuit handshake stats since last time:
91633/91636 TAP, 15962/15962 NTor.
Apr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 4/25/2014 3:26 PM, Linus Nordberg wrote:
> "s...@sky-ip.org" wrote Thu, 24 Apr 2014 19:20:37
> +0300:
>
> | I get this in the log very often: | Apr 24 15:14:07.000 [notice]
> Circuit handshake stats since last time: |
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 4/29/2014 1:31 AM, I wrote:
> One VPS company has just asserted that SSH scans are being run from
> my Tor exit rather than another process on the VPS. Is this
> happening to anyone else? Does anyone know what can be done to stop
> it?
>
> Robert
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 5/7/2014 12:56 PM, Pika ohc wrote:
> Hi there,
>
> I was considering to run an Exit node with my own pc, however, i
> have some questions about exit node.
>
It's very nice you want to contribute to the Tor network by running a
relay. If you can
10 matches
Mail list logo