[tor-relays] Best bandwidth setup for exit node

2016-07-14 Thread Tor-Node.net
Hi! I have a VPS on a 6 TB (rx + tx) per month plan. What is most useful for the Tor network: a) Run it at full speed for about seven days per month (AccountingMax) or b) Throttle network speed by setting RelayBandwidthRate and always be online? Kind regards Tor-node.net

[tor-relays] Two bridge relay questions

2016-07-21 Thread Tor-Node.net
Hi! I run an obfs4 bridge. 1) Why is the advertised bandwidth 56.72 KB/s when the relay is on a (shared) gigabit connection? According to my experiments it should be several MB/s. 2) Where can I submit my bridges to help people in Iran, China etc, besides the Tor BridgeDB? Kind regards Tor

[tor-relays] How to find (and test) my obfs4 bridge?

2016-07-27 Thread Tor-Node.net
Hi! I know the format for an obfs4 bridge is obfs4 IP:port fingerprint cert=XX iat-mode=0 I know my IP, port and fingerprint, but where can I find the "cert"-value? Kind regards Tor-node.net _______ tor-relays mailing list tor-relays@lists.torp

Re: [tor-relays] cheap unmetered non-exit VPS offers

2016-07-28 Thread tor relay
in each direction. http://www.seflow.net/2/index.php/en/services/flexcloud/flexpricing munin graphs of a seflow relay: http://oi67.tinypic.com/2vd66on.jpg _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] cheap unmetered non-exit VPS offers

2016-07-28 Thread tor relay
> On July 28, 2016 at 2:48 PM Markus Koch wrote: > > > exit allowed? no, that is why I put "non-exit" in the subject of my email. https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs#Italy1 And yes, their support is poor, but as long as your servers ru

Re: [tor-relays] cheap unmetered non-exit VPS offers

2016-07-28 Thread Tor-Node.net
Markus Koch wrote: > exit allowed? I can vouch for www.stayon.no VPS with dedicated, unmetered 1 Gbps connection. 1 GB RAM / 1 CPU @ 2.6 GHz Price: 149 NOK/month (~ 16 EUR / 17 USD). Tor exit friendly. Their abuse departement will ask you to block destination IPs if it's something

Re: [tor-relays] cheap unmetered non-exit VPS offers

2016-07-28 Thread tor relay
> On July 28, 2016 at 8:13 PM "Tor-Node.net" wrote: > > > Markus Koch mailto:niftybu...@googlemail.com > > wrote: > > > exit allowed? > > I can vouch forhttp://www.stayon.no > > > " We are also changing the direction

[tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-03 Thread tor relay
g the upgrade. (I expected a simple restart of all running tor instances) I use debian's multi instance systemd service file. When upgrading, all running tor instances are stopped (not restarted, as expected) syslog shows: Interrupt: we have stopped accepting new connections, and will shut

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-03 Thread tor relay
> On August 3, 2016 at 11:04 PM Green Dream wrote: > > > > When upgrading, all running tor instances are stopped (not restarted, > as expected) > > > syslog shows: > > > Interrupt: we have stopped accepting new connections, and will shut >

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-03 Thread tor relay
ucible in my case as well I assume you do _not_ have the following constellation: tor.service is disabled and stopped (I don't use the default instance) tor@1 mailto:tor@1 .service is enabled and running tor@2.service mailto:tor@2.service is enabled and running _______

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-03 Thread tor relay
https://trac.torproject.org/projects/tor/ticket/19825___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> > On August 4, 2016 at 10:23 AM Peter Palfrader > wrote: > > On Thu, 04 Aug 2016, tor relay wrote: > > > > > > > > > > > > On August 3, 2016 at 11:51 PM Green Dream > > > wrote: > >

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
ice specific ways like "if you want to disable it you have to move away its configuration file). Simply moving away its configuration file will cause unnecessary logs since systemd will attempt to start tor.service every time: Unable to open configuration file "/etc/tor/torrc".

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> On August 5, 2016 at 1:24 PM Peter Palfrader wrote: > > > On Fri, 05 Aug 2016, tor relay wrote: > > > Also: you can not start/stop/restart tor.service separately without leaving > > all other tor instances untouched. > > tor.service is *not* the def

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> > > > Also: you can not start/stop/restart tor.service separately without > > > > leaving all other tor instances untouched. > > > > > > tor.service is *not* the default service. tor.service is the collection > > > of all service instan

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> So there is no way to disable the default instance using systemctl after all? To answer my own question: systemctl mask tor@default disables the default instance for real. ..but I'm still curious why tor@default is a static unit (without [Install] section) https://bbs.archl

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
made a ticket: https://trac.torproject.org/projects/tor/ticket/19847 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] debian: log messages when upgrading tor package

2016-08-05 Thread tor relay
When upgrading the tor package on debian I get the following syslog messages: systemd[1]: Failed to reset devices.list on /system.slice: Invalid argument systemd[1]: Failed to reset devices.list on /system.slice/system-tor.slice: Invalid argument Should I be concerned

[tor-relays] minor typos in tor-instance-create

2016-08-06 Thread tor relay
https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create#n89 is: systemctl tor@$name start should be: systemctl start tor@$name mailto:tor@$name https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create.8.txt#n18 brdige -> bri

[tor-relays] tor-instance-create users: beware all your instances are always started

2016-08-06 Thread tor relay
This is only relevant for debian users. If you assume you can manage your instances with the usual systemctl commands like systemctl disable/enable tor@myinstance beware that they have no effect. Note: systemctl start/stop works as expected. This is important to know especially if you have

Re: [tor-relays] minor typos in tor-instance-create

2016-08-06 Thread tor relay
> fixed, thanks. https://gitweb.torproject.org/debian/tor.git/commit/?id=040fffc07b430d825e5acc88e6d2085a17b718fa There is a little typo in the fix tor@$name " vs tor@$name" _______ tor-relays mailing list tor-relays@lists.torproj

Re: [tor-relays] interesting network sockets pattern

2016-08-27 Thread tor-admin
On Friday 26 August 2016 14:37:48 Toralf Förster wrote: > On 08/25/2016 07:02 PM, Toralf Förster wrote: > > This is a fresh new Tor exit, setup 4 days ago, > > https://atlas.torproject.org/#details/BE2FA9FCB6242567B93ED99FEC5543FC517 > > C9276 , where I do wonder how to i

Re: [tor-relays] How to include files into torrc?

2016-09-09 Thread tor-admin
On Friday 09 September 2016 20:22:47 Ralph Seichter wrote: > # /etc/tor/torrc > ORPort 443 > # Policies are kept in separate file for readability > Include /etc/tor/policies > There is a ticket that handles this feature: https://trac.torproject.org/projects/tor/ticke

Re: [tor-relays] relay lost most of its consensus weight

2016-10-14 Thread Tor User
00 becomes the low-median. If so, your observed bandwidth might end up being used as your consensus weight. The long-term fix for bandwidth measurement this is for the Tor network to geographically distribute more bandwidth authorities, or use a distributed bandwidth measurement system (t

Re: [tor-relays] relay lost most of its consensus weight

2016-10-19 Thread Tor User
This is the same tor box we had at the other place when we had much much better bandwidth measurement on our relay - reported bandwidth was a lot closer to what I had the limits set to in torrc. Google fiber is in mid-deployment now in our neck of the woods but I think we would probably have to

Re: [tor-relays] Research project - comparing abuse complaints on Tor exits to those of regular ISPs

2016-10-24 Thread tor admin
ed it? thanks! [1] https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy -- 1AE0 322E B8F7 4717 BDEA BF1D 44BB 1BA7 9F6C 6333 _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] DoS from my tor guard VPS

2016-11-15 Thread tor-admin
On Tue, Nov 15, 2016 at 12:41:09PM -0800, Arisbe wrote: > One of my tor guard relays is a medium size VPS operating in the Czech > Republic. It's been up and stable for several years. Several weeks ago I > was notified that my VPS was a source of UDP DoS traffic. It was shut down.

[tor-relays] Minimum port 80 and 443 exit policy

2017-02-02 Thread Mass Tor
Hey all, I was wondering what the minimum exit policy was (wrt port 80 and 443) for a Tor exit relay. I cant find any documentation about the minimum exit policy. Is it possible to have an exit relay exit only to a /16 or a /8 on port 80 and 443? I've tried having an exit policy that a

[tor-relays] Shutdown of TorLand1

2017-02-15 Thread tor-admin
an organization like torservers, nos onions, etc. I hope others will step up and run high capacity exits. The Tor network needs your help. I will continue to run a meek bridge. Regards, torland ___ tor-relays mailing list tor-relays

Re: [tor-relays] About relay size

2017-09-30 Thread Dhalgren Tor
FWIW I run a 100TB (150mbps) exit and am convinced that this size provides better quality exit connectivity than the highest ranked monster bandwidth relays. The biggest relays attract the greatest blacklist treatment due to the volume of abuse emanating from them. As a user of Tor I frequently

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread Dhalgren Tor
DNS denial-of-service and could be the problem. either upgrade to 0.3.2.4+ or edit resolve.conf per https://trac.torproject.org/projects/tor/wiki/doc/DnsResolver#TuningeventdnscomponentofTorDaemon also check out https://arthuredelstein.net/exits/ 2) if you continue to experience excessive out

Re: [tor-relays] Become a Fallback Directory Mirror

2018-01-22 Thread Rhea Tor
quot; wrote: > > Normalcitizen: E51620B90DCB310138ED89EDEDD0A5C361AAE24E > > > ---- Original Message > > > Subject: [tor-relays] Become a Fallback Directory Mirror > > > Local Time: 21 December 2017 12:50 AM > > > UTC Time: 2

[tor-relays] CPU saturation attack/abuse

2018-03-04 Thread Dhalgren Tor
for a couple of weeks. _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] CPU saturation attack/abuse

2018-03-04 Thread Dhalgren Tor
On Sun, Mar 4, 2018 at 7:06 PM, Toralf Förster wrote: > On 03/04/2018 07:41 PM, Dhalgren Tor wrote: >> the main event-worker thread >> going from a normal load level of about 30%/core to 100%/core and >> staying there for about 30 seconds; > I do wonder if this is just t

Re: [tor-relays] CPU saturation attack/abuse

2018-03-04 Thread Dhalgren Tor
ad was pegged either continuously or intermittently with ingress higher than egress. Just looked again and see all threads, crypto-worker and main-event pegging episodically. _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torprojec

[tor-relays] Decommissioning (middle) relay

2018-03-27 Thread tor-relays
ortunately, it's time has come. Thanks. _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Let's increase the amount of exit relays doing DNSSEC validation

2018-04-10 Thread Dhalgren Tor
Respectfully, I disagree. https://lists.torproject.org/pipermail/tor-relays/2015-October/007904.html Thank you for the thought however. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo

[tor-relays] New relay operator here

2018-05-17 Thread privatesociety Tor
Hello tor relay community! I‘d like to introduce six new relays, which are operated by privatesociety, a community of people, which fighting for privacy based in europe. The six relays provide a capacity of around 300 mbit/s (total) and are hosted on networks, which aren‘t much used - so better

Re: [tor-relays] New relay operator here

2018-05-18 Thread privatesociety Tor
). :) Colin Childs schrieb am Fr. 18. Mai 2018 um 03:30: > Hi Privatesociety, > > Thank you for setting up these relays and contributing to the Tor network! > I look forward to working with you in the future. > > In the #tor-relays IRC channel, there are a number of TorServers people, &

Re: [tor-relays] bridge not accessible through obfs4 port

2018-07-13 Thread caioau tor
I had the same problem, you can connect to your bridge by two means: 1. through orport, the bridge line should be: : without obfs4 in the beginning. 2. through obfs4: you need to find out your bridge line, it's under /var/lib/tor/pt_state/obfs4_bridgeline.txt the line is like this

Re: [tor-relays] "as well as block BitTorrent after repeated offenses..."

2014-06-03 Thread Tor Admin
a.com/mail/ _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] CLI tool like Atlast

2014-06-18 Thread Kali Tor
liTor _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] CLI tool like Atlast

2014-06-18 Thread Kali Tor
! I know enough Python to create trouble for others and to test things. Is there an easy way to run the script? Also I could not find the specific onion.py file at [1]. Regards, KaliTor > > Best, > Luke > > [1] https://github.com/duk3luk3/onion-py > > > On 06/18/2014

Re: [tor-relays] CLI tool like Atlast

2014-06-18 Thread Kali Tor
ime. >> >> If you know python, it shouldn't be too hard to do that, PR's > welcome! >> >> Best, >> Luke >> >> [1] https://github.com/duk3luk3/onion-py >> >> On 06/18/2014 12:01 PM, Kali Tor wrote: >>> H

[tor-relays] normal for a new relay node to be under-utilized?

2014-06-18 Thread Kali Tor
b/sec, total: 10.8 MB) Download (0.0 b/sec - avg: 3.6 Kb/sec, total: 52.2 MB) torrcRelayBandwidthRate 2048 KB RelayBandwidthBurst 4096 KB AccountingMax 100 GB AccountingStart month 1 03:00 DirPort 9030 _______ tor-relays mailing list tor-relays@lists.torproje

Re: [tor-relays] CLI tool like Atlast

2014-06-18 Thread Kali Tor
Hmm.. what am I doing wrong here: > sudo apt-get install python-stem Reading package lists... Done Building dependency tree Reading state information... Done python-stem is already the newest version. 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. > tor@KaliTorLinLon:

Re: [tor-relays] CLI tool like Atlast

2014-06-19 Thread Kali Tor
Does tor-prompt provide any more info than arm? -K_ > On Wednesday, June 18, 2014 11:56 PM, Damian Johnson > wrote: > >>  Hmm.. what am I doing wrong here: >> >>>  sudo apt-get install python-stem >>  Reading package lists... Done >> 

Re: [tor-relays] Yahoo and AOL emails removed from tor-relays due to bounces

2014-06-19 Thread Kali Tor
But I just received this email! _KaliTor_ On Thu, 6/19/14, Andrew Lewman wrote: Subject: [tor-relays] Yahoo and AOL emails removed from tor-relays due to bounces To: tor-relays@lists.torproject.org Date: Thursday, June 19, 2014, 12:36 PM It

[tor-relays] Directory Server and bandwidth accounting

2014-06-26 Thread Kali Tor
this? -kali- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Directory Server and bandwidth accounting

2014-06-26 Thread Kali Tor
untingMax disables DirPort and the DS capability. -kali- _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Spam

2014-06-27 Thread Kali Tor
Hi, > On Thursday, June 26, 2014 4:57 PM, kingqueen wrote: > > On 26 June 2014 17:08:51 BST, Roman Mamedov wrote: > >> And that Tor node list is, in fact, a web page. >> > Yes, I understand how it happens. I was just asking how much of an > inconvenience

Re: [tor-relays] Directory Server and bandwidth accounting

2014-06-28 Thread Kali Tor
So, no way to offer DS while setting AccountingMax? -kali- > On Thursday, June 26, 2014 10:02 PM, Kali Tor wrote: > > > >> I had >> not read anything about this either, until I tried to enable >> it >> and got this in my log: > >> 10:15:43

[tor-relays] Bandwidth usage for an established relay node

2014-07-01 Thread Kali Tor
Hi all, Curious as to how much bandwidth a stable, well established relay node will chew through in a month on an average? Anyone has any figures? -kali- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi

Re: [tor-relays] Bandwidth usage for an established relay node

2014-07-01 Thread Kali Tor
peed. Expect it to use roughly 80% of your > maximum speed on average, so if you have a 50Mbit/s up/down connection > you will be uploading 13TB and downloading 13TB. > > For high speed relays this might differ a bit if your bottleneck becomes > the CPU. > > Tom > >

[tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-02 Thread Kali Tor
All, Are there anything special that needs to be done to make sure that Tor nodes running inside VMs (VPS) is protected from snooping eyes? Since there is hardly any data at rest I am assuming not, but then, what do I know!:) -kali- ___ tor-relays

Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-02 Thread Kali Tor
Hi, > > If you are asking how to secure  your box better, indeed the public IP > address list of relays is often scanned and brute forced. That is why > I recommend: > > - - if you run only Tor on that box is best, if not make sure your apps > are properly secured (m

Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-03 Thread Kali Tor
useful? >>> >>> The private keys for the node are sensitive, and even the >>> .tor/state file for the guard nodes could be if the attacker >>> does not already have that info, same for any non default >>> node selection stuff in torrc. Tor presumably

Re: [tor-relays] Running tor in VPS - keep away snooping eyes

2014-07-03 Thread Kali Tor
gt; >> - kali- > > Depends, what configuration will that virtual machine have? > You shouldn't notice too big of a difference, full disk encryption is > not a resource killer on any configuration. > > - -- > s7r 1GB RAM,

[tor-relays] different torrc and fingerprint when rebooted

2014-07-07 Thread Kali Tor
Hi all, When I installed tor for the first on an Ubuntu machine, ran it when logged in as normal user "tor" using the /etc/tor/torrc. However today I had to reboot the node and when it came back ps showed that it was using a different torrc /usr/sbin/tor --defaults-torrc /usr/sha

Re: [tor-relays] different torrc and fingerprint when rebooted

2014-07-07 Thread Kali Tor
>From what I read, I should be OK if I copy over the directory structure of >/home/tor/.tor to /var/lib/tor Can someone confirm? -kali- > On Monday, July 7, 2014 5:30 PM, Kali Tor wrote: > > Hi all, > > When I installed tor for the first on an Ubuntu machine, ran

Re: [tor-relays] different torrc and fingerprint when rebooted

2014-07-09 Thread Kali Tor
and it will just work. > > > > ___________ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > ___________ tor-relays mailing list tor-relays@lists.torproject.or

[tor-relays] "excessive bounces" on tor-relay list

2014-07-09 Thread Kali Tor
I just don't know why Yahoo Mail would bounce any message. I have not received any warnings from Yahoo about such an action. Thanks, -kali- _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/ma

Re: [tor-relays] Oubound Ports

2014-07-14 Thread Kali Tor
>> Some time ago I proposed that Tor flags some ports as being unacceptable as >> ORPort[1], but this did not gather much of a momentum. > > A port is a number. None of them is special. I really don't see any > reason to discriminate any. Oh but they are speci

[tor-relays] Running an AWS bridge on eu-west-1?

2014-08-03 Thread tor-question
azon's us-east-1 servers. Why is there no option any longer to run a bridge on any other server farm, like for example Ireland (eu-west-1)? Thanks in advance - Puti    ___________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.

Re: [tor-relays] Running an AWS bridge on eu-west-1?

2014-08-04 Thread tor-question
oes not log connections to the bridge/my "cloud thing" at all. As you may have guessed, my knowledge about this is minimal; it is just an intriguing concept for me to help someone reach Tor/the Internet in general from countries where censors

Re: [tor-relays] Exit Nodes under DDoS attacks

2014-08-04 Thread tor-admin
ry happen when this > happens often. ___________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] how long till the axe falls on little guard relays?

2014-08-25 Thread Kali Tor
t;> > > and by the looks of it, it didn't have much impact on the bandwidth > > https://metrics.torproject.org/bandwidth.html#bwhist-flags > > https://metrics.torproject.org/bandwidth.html#bandwidth-flags > > -- > bastik > > ___

Re: [tor-relays] how long till the axe falls on little guard relays?

2014-08-25 Thread Kali Tor
Thanks. At least it is good to see the graph stabilizing a bit after the sudden drop. -kali- > On Monday, August 25, 2014 12:31 PM, George Kadianakis > wrote: > > Kali Tor writes: > >> I wonder why there is a sudden decrease in number of Guard nodes? >> >

Re: [tor-relays] Handshake flood now on NTor

2014-09-08 Thread Tor Stuff
I have a related question. I have recently built my first Tor relay (ORPort 443, DirPort 80, NOT Exit) with both the bandwidth and burst limits set to 100KB/s. It has been running for less than 3 days. During that time I have been monitoring it with 'arm' and on GLOBE and notice a

[tor-relays] Fwd: Handshake flood now on NTor

2014-09-08 Thread Tor Stuff
A correction to my posting below. With reference to what GLOBE says about my relay, I meant to say "mean written bytes" (mean bandwidth?) is 1.84 kB/s while "mean read bytes" is 1.62 kB/s". Q -- Forwarded message -- From: Tor Stuff Date: Mon, Sep 8, 20

[tor-relays] [warn] No unused circIDs found on channel without wide circID support

2014-09-29 Thread tor-admin
24.000 [warn] failed to get unique circID ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] Less Traffic on my relay

2014-10-07 Thread Tor Zilla
Hi All, I am a noob to the Tor community and its fun serving Tor as one of the relays. I am planning to setup multiple relays however before i jump into anything further i setup one machine as a non exit relay to test how much traffic i can route.. Not to forget i also read the article

Re: [tor-relays] Less Traffic on my relay

2014-10-07 Thread Tor Zilla
Torzilla11 === > Date: Tue, 7 Oct 2014 14:31:54 +0200 > From: julien.robi...@free.fr > To: tor-relays@lists.torproject.org > Subject: Re: [tor-relays] Less Traffic on my relay > > Hi, and welcome ;) >

Re: [tor-relays] Less Traffic on my relay

2014-10-07 Thread Tor Zilla
Hi All, I just setup a bridge and it looks like i have a bug as per the message log.. Failed to open GEOIP file C:\Users\*ABCD*\AppData\Roaming\tor\geoip. We've been configured to see which countries can access us as a bridge, and we need GEOIP information to tell which countries client

Re: [tor-relays] Less Traffic on my relay

2014-10-07 Thread Tor Zilla
database but still the bridge users will have to manually download the directory every time which shows low availability of bridges. But definitely we need some more info on this issue. Also i guess we might wanna develop a tool where user can test whats the best option available for their tor

[tor-relays] Need Routing Info on Relays

2014-10-09 Thread Tor Zilla
Hi Folks, I am trying to figure out how the packet flows over a Tor network.. There is a mix of information.. Some claim that the ISP is not aware of the payload as the complete data is encrypted whereas some say that your ISP is not used at all when using Tor network. AFAIK my packets go to

Re: [tor-relays] Need Routing Info on Relays

2014-10-09 Thread Tor Zilla
Thanks Derric, Thats a ton of information which is very much simplified.. Specially the graphics ;) I have a clear understanding now.. So what i figured is as far as my ISP goes, he only knows that i am using Tor, period. Rest all is good to go.. All thanks to encryption. Then i assume this

Re: [tor-relays] Need Routing Info on Relays

2014-10-09 Thread Tor Zilla
Also a quick question jumped in.. Say i have a Raspberry PI which is converted to a TOR router and i connect my machine to this router. Will this make the entire traffic go via TOR including something as simple as a ping request. Say i ping a machine on the web, will it stay anonymous or i will

Re: [tor-relays] Need Routing Info on Relays

2014-10-09 Thread Tor Zilla
Thanks again for taking time to answer all the questions.. This helped me a lot. I am adding Tor-talk mailing list to my address book... Cheers, Torzilla11 > From: datzr...@alizeepathology.com > To: tor-relays@lists.torproject.org > Date: Thu, 9 Oct 2014 16:16:45 -0400 > Subje

Re: [tor-relays] Need Routing Info on Relays

2014-10-09 Thread Tor Zilla
Thanks Chris, I will check the links.. :) Looks like TOR is still going through a development phase which is a good thing Thanks, Torzilla11 > Date: Thu, 9 Oct 2014 22:58:06 +0200 > From: christ...@ph3x.at > To: tor-relays@lists.torproject.org > Subject: Re: [tor-relays] Need

Re: [tor-relays] GoodBadISPs revamp?

2014-10-13 Thread Tor Zilla
Also i guess its high time that TOR network starts thinking about folks like us with low bandwidth. I am in as well for devoting my time for any help required > Date: Mon, 13 Oct 2014 19:21:49 +0200 > From: toralf.foers...@gmx.de > To: tor-relays@lists.torproject.org > Subject: Re:

Re: [tor-relays] GoodBadISPs revamp?

2014-10-14 Thread tor-exit0
On 10/12/2014 6:56 PM, subk...@riseup.net wrote: > [cross-posted on tor-talk and tor-relays] > > i've found that the Tor GoodBadISPs list [1] is somewhat outdated on > current hosts that allow Tor (exit) relays to be hosted. i'm trying to > find a cheap host that allows

Re: [tor-relays] Unstable router

2014-10-16 Thread Tor Zilla
the connection is stable. The way you have described the issue, it points to a router malfunction at first glance but if you can flash some more light on it, you might get an exact solution. Thanks, TorZilla11 > Date: Thu, 16 Oct 2014 13:22:42 -0400 > From: humbletoru...@safe-mail.net >

Re: [tor-relays] List of Relays' Available SSH Auth Methods

2014-11-18 Thread tor-exit0
packet authentication enabled. ___________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] doc/HARDENING Draft

2014-11-24 Thread Tor Operator
in all distributions). -- Random ___________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] doc/HARDENING Draft

2014-11-25 Thread tor-admin
On Monday 24 November 2014 18:09:34 Libertas wrote: > Here's the relevant ticket: > > https://trac.torproject.org/projects/tor/ticket/13703 > > A specific topic of conversation is how much of the advice should be > in the document itself as opposed to linked sources. >

Re: [tor-relays] doc/HARDENING Draft

2014-11-25 Thread tor-exit0
lUc87Igpvs5EpNGT =f1un -END PGP SIGNATURE- ___________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] specifying your own entrance and exit nodes

2014-12-10 Thread tor-exit0
n accountability and anonymity which may also pose a concern for some people. signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] iptables

2014-12-24 Thread tor-exit0
rget prot opt source destination > REJECT all -- 0.0.0.0/00.0.0.0/0 reject-with > icmp-port-unreachable > > Chain OUTPUT (policy ACCEPT) > target prot opt source destination > ACCEPT

Re: [tor-relays] Possible DDoS

2014-12-26 Thread tor-admin
On Friday 26 December 2014 15:48:20 Christian Burkert wrote: > Furthermore, I wondered if the attackers were attracted to my system > because of the Tor service, or were just randomly picking targets. > But from your previous descriptions, I rather deduce that it is more > like the la

[tor-relays] odd list of connections

2015-01-03 Thread TOR Zone
seconds. Is this "normal" and I've just never noticed? I've had ad high as 2000+ connections and never saw it. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] how to monitor traffick through a bridge

2015-01-05 Thread tor-admin
e ncurses based monitoring tool. Regards, torland _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Changes in network traffic pattern

2015-02-05 Thread tor-admin
On Friday 06 February 2015 11:32:42 Hu Man wrote: > First thought was DDOS but traffic is not high enough to cause any problems. > I did some digging and in a 5 minute period received the following requests > to the port tor is listening on (number of requests and source i

[tor-relays] How to use our own TOR relay as entry node for local network hosts

2015-05-20 Thread Tor User
Hello, We have been operating a moderately successful public tor relay for a while now. Having read about how TOR works back a couple of years ago, I was more or less sold on the idea that if traffic originating on your local network uses your own TOR relay as the first hop (entry node), then

Re: [tor-relays] How to use our own TOR relay as entry node for local network hosts

2015-05-23 Thread Tor User
Hi s7r, Thank you for your reply. There's a lot of good info in it and I'll be reconfiguring the clients. The fact that I've been doing Tor-through-Tor unawares explains a lot. It did seem odd to have polipo in the mix, but it makes sense now, that would only be if the LAN

Re: [tor-relays] Multi-core Support

2015-06-01 Thread Tor-Admin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I have to agree with that, multicore support is really important and should be on the top of the priority list. Thomas White: > Have there been any updated ETAs concerning the development/support > of multi-core for the core tor workloads?

Re: [tor-relays] How to use our own TOR relay as entry node for local network hosts

2015-06-05 Thread Tor User
Great points raised there with your post. Thanks for the reply. I definitely don't understand everything about Tor but I'm gradually getting there. The public Tor entry guard relay ran great for over a year but we ended up taking it down for a while once I realized something was

[tor-relays] Raspberry Pi - Relay Setup

2015-06-23 Thread Tor Zilla
Hello All, I just bought a Raspberry Pi.. Wanted to setup as a Tor non exit relay. I have read so many instructions online on how to set it up but i am facing issues with opening ports. I am using a NetGear Router and require your inputs with the same. Also is static IP mandatory for setting

Re: [tor-relays] Raspberry Pi - Relay Setup

2015-06-23 Thread Tor Zilla
I am using a NetGear DGN1000 From: iamthech...@gmail.com Date: Tue, 23 Jun 2015 19:26:45 + To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] Raspberry Pi - Relay Setup What model of NetGear do you have? A static IP is not required. You may need to setup a Dynamic DNS if tor has

Re: [tor-relays] Raspberry Pi - Relay Setup

2015-06-23 Thread Tor Zilla
I did not say i want to setup an exit relay. I am looking forward to setup a Non-exit relay === > Date: Tue, 23 Jun 2015 21:39:01 +0200 > From: t...@bruzzzla.de > To: tor-relays@lists.torproject.org > Subject: Re: [tor-relays] Raspberry Pi - Relay

<    1   2   3   4   5   6   7   8   9   10   >