_encrypted] on a
smartcard or hardware token like a Nitrokey or Yubikey? This would even
be more secure than storing it on a "normal" USB device.
Unfortunately I have not found much about this on the internet.
Kind regards
telekobold
[1] https://support.torproject.org/relay-operators
After being encouraged in today's relay operators meetup to follow up on
this: Anyone who has experiences with that?
On 21.02.23 13:18, telekobold wrote:
> Dear fellow relay operators,
>
> currently, I'm operating a Tor relay (Middle/Guard) and a Tor Bridge.
>
> Offlin
Hi,
please also note the corresponding blogpost from arma (Roger
Dingeldine): https://blog.torproject.org/lifecycle-of-a-new-relay/
Kind regards
telekobold
On 10.04.23 07:14, Sandro Auerbach wrote:
> As long as your configuration is correct, it still has to go through the
> warm-up phas
implement something like this
myself)?
Kind regards
telekobold
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
quot; is
displayed under distribution mechanisms at metrics.torproject.org, which
means that apparently the bridge is no longer distributed. What could be
the reason that the distribution mechanism suddenly changed?
Kind regards
telekobold
___
tor-relay
t seems to correspond to the penultimate
signing key renewal.
Has anyone observed similar behavior for its relay? (I found it
meaningful to first ask here before creating an issue at [*]).
[*] https://gitlab.torproject.org/hiro/onionoo/-/issues
Kind regards,
, but I would have expected it to be close to zero all along
given the reports.
The number of clients directly connected to Tor seems to be even
comparable to the number of clients connected via bridges for the last
months [2].
Kind regards
telekobold
[1]
https://metrics.torproject.org
Hi Gus,
thank you for the clarification.
Kind regards
telekobold
On 22.07.23 17:12, gus wrote:
Hi,
Great question. First, it is important to highlight that sometimes
censorship is not implemented uniformly across all ISPs in a country.
For example, see Tor Metrics in Russia:
-
https
your relay is publicly known anyway, it also doesn't matter as much as
with a bridge if the relay is running at a cloud provider (e.g.
regarding the situation in Turkmenistan). The disadvantage is, of
course, less diversity in the number of networks in which the relays are
distributed.
Kin
t the planned meetup
in the Fahrplan [*]. Is there already more detailed information about
where and when?
Kind regards
telekobold
[*] https://events.ccc.de/camp/2023/hub/camp23/en/fahrplan
___
tor-relays mailing list
tor-relays@lists.torproject.org
no
connection is established.
So, where is the advantage on additionally providing the fingerprint and
the obfs4 certificate when connecting to Tor (I can imagine that it has
something to do with authenticity)? And how can one do that using the
Tor software respectively the Tor browser bun
d the "complete bridge line"[1].
cheers,
Gus
[1] https://gitlab.torproject.org/tpo/web/manual/-/issues/130
thank you for the clarification! To be honest, I indeed confused
"ORPort" and "obfs4port" for a moment.
Kind regards
telekobold
__
o I didn't want to set it to something else).
Kind regards
telekobold
[1]
http://xmrhfasfg5suueegrnc4gsgyi2tyclcy5oz7f5drnrodmdtob6t2ioyd.onion/relay/setup/bridge/debian-ubuntu/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 07.09.23 12:43, Anonforpeace via tor-relays wrote:
What is the "complete" bridge line?
Bridge obfs4 : cert= iat-mode=0
where PORT is the obfs4 port, not the ORPort. (When using IPv6, ADDRESS> must be in []).
See also https://community.torproject.org/relay/setup/bridge/post-install/
__
ing
connections.
So apparently Tor learned from my behavior and calculated itself when to
turn itself off and on again in order to use as much quota as possible
based on the bandwidth used and/or some other metrics so I don't have to
do this manually in future?
Kind regards
telekobold
_
ement "$F62DF76750" while parsing a
node family.
Oct 01 18:09:11.000 [warn] Bad element "$86A" while parsing a node family.
Kind regards
telekobold
On 01.10.23 20:16, trinity pointard wrote:
Hi,
When using AccountingMax, tor tries to guess how long in will take for
it to u
Hi,
will there be a Tor relay operators meetup @37C3 [*]?
Also, there were apparently no meetups in November and December this year?
Kind regards
telekobold
[*] https://events.ccc.de/congress/2023/infos/startpage.html
___
tor-relays mailing list
tor
role. I'm also using different mail
addresses in the contact info fields of my relays and on this mailing list for
about one and a half year.
Kind regards
telekobold
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torp
k of the TLS certificate
of torproject.org. If the TLS connection would be somehow corrupted at
the moment where one executed the wget command an attacker could corrupt
the whole relay, according to my understanding. Or do I have an error in
my thinking here?
Kind regards
telekobold
19 matches
Mail list logo