Hi!
I have a VPS on a 6 TB (rx + tx) per month plan.
What is most useful for the Tor network:
a) Run it at full speed for about seven days per month (AccountingMax)
or
b) Throttle network speed by setting RelayBandwidthRate and always be
online?
Kind regards
Tor-node.net
Hi!
I run an obfs4 bridge.
1) Why is the advertised bandwidth 56.72 KB/s when the relay is on a
(shared) gigabit connection?
According to my experiments it should be several MB/s.
2) Where can I submit my bridges to help people in Iran, China etc, besides
the Tor BridgeDB?
Kind regards
Tor
Hi!
I know the format for an obfs4 bridge is
obfs4 IP:port fingerprint cert=XX iat-mode=0
I know my IP, port and fingerprint, but where can I find the "cert"-value?
Kind regards
Tor-node.net
_______
tor-relays mailing list
tor-relays@lists.torp
in each direction.
http://www.seflow.net/2/index.php/en/services/flexcloud/flexpricing
munin graphs of a seflow relay:
http://oi67.tinypic.com/2vd66on.jpg
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> On July 28, 2016 at 2:48 PM Markus Koch wrote:
>
>
> exit allowed?
no, that is why I put "non-exit" in the subject of my email.
https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs#Italy1
And yes, their support is poor, but as long as your servers ru
Markus Koch wrote:
> exit allowed?
I can vouch for www.stayon.no
VPS with dedicated, unmetered 1 Gbps connection.
1 GB RAM / 1 CPU @ 2.6 GHz
Price: 149 NOK/month (~ 16 EUR / 17 USD).
Tor exit friendly. Their abuse departement will ask you to block
destination IPs if it's something
> On July 28, 2016 at 8:13 PM "Tor-Node.net" wrote:
>
>
> Markus Koch mailto:niftybu...@googlemail.com >
> wrote:
>
> > exit allowed?
>
> I can vouch forhttp://www.stayon.no
>
>
>
" We are also changing the direction
g the upgrade. (I expected a simple restart
of all running tor instances)
I use debian's multi instance systemd service file.
When upgrading, all running tor instances are stopped (not restarted, as
expected)
syslog shows:
Interrupt: we have stopped accepting new connections, and will shut
> On August 3, 2016 at 11:04 PM Green Dream wrote:
>
>
> > When upgrading, all running tor instances are stopped (not restarted,
> as expected)
>
> > syslog shows:
>
> > Interrupt: we have stopped accepting new connections, and will shut
>
ucible in my case as well I assume you do _not_ have the
following constellation:
tor.service is disabled and stopped (I don't use the default instance)
tor@1 mailto:tor@1 .service is enabled and running
tor@2.service mailto:tor@2.service is enabled and running
_______
https://trac.torproject.org/projects/tor/ticket/19825___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
> On August 4, 2016 at 10:23 AM Peter Palfrader
> wrote:
>
> On Thu, 04 Aug 2016, tor relay wrote:
>
> > >
> > > > >
> > > On August 3, 2016 at 11:51 PM Green Dream
> > > wrote:
> >
ice specific
ways like "if you want to disable it you have to move away its configuration
file).
Simply moving away its configuration file will cause unnecessary logs since
systemd will attempt to start tor.service every time:
Unable to open configuration file "/etc/tor/torrc".
> On August 5, 2016 at 1:24 PM Peter Palfrader wrote:
>
>
> On Fri, 05 Aug 2016, tor relay wrote:
>
> > Also: you can not start/stop/restart tor.service separately without leaving
> > all other tor instances untouched.
>
> tor.service is *not* the def
> > > > Also: you can not start/stop/restart tor.service separately without
> > > > leaving all other tor instances untouched.
> > >
> > > tor.service is *not* the default service. tor.service is the collection
> > > of all service instan
> So there is no way to disable the default instance using systemctl after all?
To answer my own question:
systemctl mask tor@default
disables the default instance for real.
..but I'm still curious why tor@default is a static unit (without [Install]
section)
https://bbs.archl
made a ticket:
https://trac.torproject.org/projects/tor/ticket/19847
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
When upgrading the tor package on debian I get the following syslog messages:
systemd[1]: Failed to reset devices.list on /system.slice: Invalid argument
systemd[1]: Failed to reset devices.list on /system.slice/system-tor.slice:
Invalid argument
Should I be concerned
https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create#n89
is:
systemctl tor@$name start
should be:
systemctl start tor@$name mailto:tor@$name
https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create.8.txt#n18
brdige -> bri
This is only relevant for debian users.
If you assume you can manage your instances with the usual systemctl commands
like
systemctl disable/enable tor@myinstance
beware that they have no effect.
Note: systemctl start/stop works as expected.
This is important to know especially if you have
> fixed, thanks.
https://gitweb.torproject.org/debian/tor.git/commit/?id=040fffc07b430d825e5acc88e6d2085a17b718fa
There is a little typo in the fix
tor@$name "
vs
tor@$name"
_______
tor-relays mailing list
tor-relays@lists.torproj
On Friday 26 August 2016 14:37:48 Toralf Förster wrote:
> On 08/25/2016 07:02 PM, Toralf Förster wrote:
> > This is a fresh new Tor exit, setup 4 days ago,
> > https://atlas.torproject.org/#details/BE2FA9FCB6242567B93ED99FEC5543FC517
> > C9276 , where I do wonder how to i
On Friday 09 September 2016 20:22:47 Ralph Seichter wrote:
> # /etc/tor/torrc
> ORPort 443
> # Policies are kept in separate file for readability
> Include /etc/tor/policies
>
There is a ticket that handles this feature:
https://trac.torproject.org/projects/tor/ticke
00 becomes the low-median. If so, your observed bandwidth might
end up being used as your consensus weight.
The long-term fix for bandwidth measurement this is for the Tor network to
geographically distribute more bandwidth authorities, or use a distributed
bandwidth measurement system (t
This is the same tor box we had at the other place when we
had much much better bandwidth measurement on our relay - reported
bandwidth was a lot closer to what I had the limits set to in torrc.
Google fiber is in mid-deployment now in our neck of the woods but I
think we would probably have to
ed it?
thanks!
[1] https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
--
1AE0 322E B8F7 4717 BDEA BF1D 44BB 1BA7 9F6C 6333
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Tue, Nov 15, 2016 at 12:41:09PM -0800, Arisbe wrote:
> One of my tor guard relays is a medium size VPS operating in the Czech
> Republic. It's been up and stable for several years. Several weeks ago I
> was notified that my VPS was a source of UDP DoS traffic. It was shut down.
Hey all,
I was wondering what the minimum exit policy was (wrt port 80 and 443) for
a Tor exit relay. I
cant find any documentation about the minimum exit policy.
Is it possible to have an exit relay exit only to a /16 or a /8 on port 80
and 443?
I've tried having an exit policy that a
an organization like torservers, nos onions, etc.
I hope others will step up and run high capacity exits. The Tor network needs
your help. I will continue to run a meek bridge.
Regards,
torland
___
tor-relays mailing list
tor-relays
FWIW I run a 100TB (150mbps) exit and am convinced that this size
provides better quality exit connectivity than the highest ranked
monster bandwidth relays. The biggest relays attract the greatest
blacklist treatment due to the volume of abuse emanating from them.
As a user of Tor I frequently
DNS denial-of-service and
could be the problem. either upgrade to 0.3.2.4+ or edit resolve.conf
per
https://trac.torproject.org/projects/tor/wiki/doc/DnsResolver#TuningeventdnscomponentofTorDaemon
also check out https://arthuredelstein.net/exits/
2) if you continue to experience excessive out
quot; wrote:
>
> Normalcitizen: E51620B90DCB310138ED89EDEDD0A5C361AAE24E
>
>
> ---- Original Message
>
>
> Subject: [tor-relays] Become a Fallback Directory Mirror
>
>
> Local Time: 21 December 2017 12:50 AM
>
>
> UTC Time: 2
for a couple of
weeks.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Sun, Mar 4, 2018 at 7:06 PM, Toralf Förster wrote:
> On 03/04/2018 07:41 PM, Dhalgren Tor wrote:
>> the main event-worker thread
>> going from a normal load level of about 30%/core to 100%/core and
>> staying there for about 30 seconds;
> I do wonder if this is just t
ad was pegged
either continuously or intermittently with ingress higher than egress.
Just looked again and see all threads, crypto-worker and main-event
pegging episodically.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torprojec
ortunately, it's time has come.
Thanks.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Respectfully, I disagree.
https://lists.torproject.org/pipermail/tor-relays/2015-October/007904.html
Thank you for the thought however.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo
Hello tor relay community!
I‘d like to introduce six new relays, which are operated by privatesociety,
a community of people, which fighting for privacy based in europe. The six
relays provide a capacity of around 300 mbit/s (total) and are hosted on
networks, which aren‘t much used - so better
). :)
Colin Childs schrieb am Fr. 18. Mai 2018 um 03:30:
> Hi Privatesociety,
>
> Thank you for setting up these relays and contributing to the Tor network!
> I look forward to working with you in the future.
>
> In the #tor-relays IRC channel, there are a number of TorServers people,
&
I had the same problem, you can connect to your bridge by two means:
1. through orport, the bridge line should be:
:
without obfs4 in the beginning.
2. through obfs4: you need to find out your bridge line, it's under
/var/lib/tor/pt_state/obfs4_bridgeline.txt
the line is like this
a.com/mail/
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
liTor
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
!
I know enough Python to create trouble for others and to test things. Is there
an easy way to run the script?
Also I could not find the specific onion.py file at [1].
Regards,
KaliTor
>
> Best,
> Luke
>
> [1] https://github.com/duk3luk3/onion-py
>
>
> On 06/18/2014
ime.
>>
>> If you know python, it shouldn't be too hard to do that, PR's
> welcome!
>>
>> Best,
>> Luke
>>
>> [1] https://github.com/duk3luk3/onion-py
>>
>> On 06/18/2014 12:01 PM, Kali Tor wrote:
>>> H
b/sec, total: 10.8 MB)
Download (0.0 b/sec - avg: 3.6 Kb/sec, total: 52.2 MB)
torrcRelayBandwidthRate 2048 KB
RelayBandwidthBurst 4096 KB
AccountingMax 100 GB
AccountingStart month 1 03:00
DirPort 9030
_______
tor-relays mailing list
tor-relays@lists.torproje
Hmm.. what am I doing wrong here:
> sudo apt-get install python-stem
Reading package lists... Done
Building dependency tree
Reading state information... Done
python-stem is already the newest version.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
> tor@KaliTorLinLon:
Does tor-prompt provide any more info than arm?
-K_
> On Wednesday, June 18, 2014 11:56 PM, Damian Johnson
> wrote:
> >> Hmm.. what am I doing wrong here:
>>
>>> sudo apt-get install python-stem
>> Reading package lists... Done
>>
But I just received this email!
_KaliTor_
On Thu, 6/19/14, Andrew Lewman wrote:
Subject: [tor-relays] Yahoo and AOL emails removed from tor-relays due to
bounces
To: tor-relays@lists.torproject.org
Date: Thursday, June 19, 2014, 12:36 PM
It
this?
-kali-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
untingMax disables DirPort and the DS capability.
-kali-
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi,
> On Thursday, June 26, 2014 4:57 PM, kingqueen wrote:
>
> On 26 June 2014 17:08:51 BST, Roman Mamedov wrote:
>
>> And that Tor node list is, in fact, a web page.
>>
> Yes, I understand how it happens. I was just asking how much of an
> inconvenience
So, no way to offer DS while setting AccountingMax?
-kali-
> On Thursday, June 26, 2014 10:02 PM, Kali Tor wrote:
> >
>
>> I had
>> not read anything about this either, until I tried to enable
>> it
>> and got this in my log:
>
>> 10:15:43
Hi all,
Curious as to how much bandwidth a stable, well established relay node will
chew through in a month on an average?
Anyone has any figures?
-kali-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi
peed. Expect it to use roughly 80% of your
> maximum speed on average, so if you have a 50Mbit/s up/down connection
> you will be uploading 13TB and downloading 13TB.
>
> For high speed relays this might differ a bit if your bottleneck becomes
> the CPU.
>
> Tom
>
>
All,
Are there anything special that needs to be done to make sure that Tor nodes
running inside VMs (VPS) is protected from snooping eyes? Since there is hardly
any data at rest I am assuming not, but then, what do I know!:)
-kali-
___
tor-relays
Hi,
>
> If you are asking how to secure your box better, indeed the public IP
> address list of relays is often scanned and brute forced. That is why
> I recommend:
>
> - - if you run only Tor on that box is best, if not make sure your apps
> are properly secured (m
useful?
>>>
>>> The private keys for the node are sensitive, and even the
>>> .tor/state file for the guard nodes could be if the attacker
>>> does not already have that info, same for any non default
>>> node selection stuff in torrc. Tor presumably
gt;
>> - kali-
>
> Depends, what configuration will that virtual machine have?
> You shouldn't notice too big of a difference, full disk encryption is
> not a resource killer on any configuration.
>
> - --
> s7r
1GB RAM,
Hi all,
When I installed tor for the first on an Ubuntu machine, ran it when logged in
as normal user "tor" using the /etc/tor/torrc. However today I had to reboot
the node and when it came back ps showed that it was using a different torrc
/usr/sbin/tor --defaults-torrc /usr/sha
>From what I read, I should be OK if I copy over the directory structure of
>/home/tor/.tor to /var/lib/tor
Can someone confirm?
-kali-
> On Monday, July 7, 2014 5:30 PM, Kali Tor wrote:
> > Hi all,
>
> When I installed tor for the first on an Ubuntu machine, ran
and it will just work.
>
>
>
> ___________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___________
tor-relays mailing list
tor-relays@lists.torproject.or
I just don't know why Yahoo Mail would bounce any message. I
have not received any warnings from Yahoo about such an action.
Thanks,
-kali-
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/ma
>> Some time ago I proposed that Tor flags some ports as being unacceptable as
>> ORPort[1], but this did not gather much of a momentum.
>
> A port is a number. None of them is special. I really don't see any
> reason to discriminate any.
Oh but they are speci
azon's
us-east-1 servers.
Why is there no option any longer to run a bridge on any other
server farm, like for example Ireland (eu-west-1)?
Thanks in advance
- Puti
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.
oes not log connections to the bridge/my "cloud
thing" at all.
As you may have guessed, my knowledge about this is minimal; it is
just an intriguing concept for me to help someone reach Tor/the
Internet in general from countries where censors
ry happen when this
> happens often.
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
t;>
>
> and by the looks of it, it didn't have much impact on the bandwidth
>
> https://metrics.torproject.org/bandwidth.html#bwhist-flags
>
> https://metrics.torproject.org/bandwidth.html#bandwidth-flags
>
> --
> bastik
>
> ___
Thanks. At least it is good to see the graph stabilizing a bit after the sudden
drop.
-kali-
> On Monday, August 25, 2014 12:31 PM, George Kadianakis
> wrote:
> > Kali Tor writes:
>
>> I wonder why there is a sudden decrease in number of Guard nodes?
>>
>
I have a related question. I have recently built my first Tor relay (ORPort
443, DirPort 80, NOT Exit) with both the bandwidth and burst limits set to
100KB/s.
It has been running for less than 3 days. During that time I have been
monitoring it with 'arm' and on GLOBE and notice a
A correction to my posting below. With reference to what GLOBE says about
my relay, I meant to say "mean written bytes" (mean bandwidth?) is 1.84
kB/s while "mean read bytes" is 1.62 kB/s".
Q
-- Forwarded message --
From: Tor Stuff
Date: Mon, Sep 8, 20
24.000 [warn] failed to get unique circID
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi All,
I am a noob to the Tor community and its fun serving Tor as one of the relays.
I am planning to setup multiple relays however before i jump into anything
further i setup one machine as a non exit relay to test how much traffic i can
route.. Not to forget i also read the article
Torzilla11
===
> Date: Tue, 7 Oct 2014 14:31:54 +0200
> From: julien.robi...@free.fr
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Less Traffic on my relay
>
> Hi, and welcome ;)
>
Hi All,
I just setup a bridge and it looks like i have a bug as per the message log..
Failed to open GEOIP file C:\Users\*ABCD*\AppData\Roaming\tor\geoip.
We've been configured to see which countries can access us as a bridge,
and we need GEOIP information to tell which countries client
database but still
the bridge users will have to manually download the directory every time which
shows low availability of bridges.
But definitely we need some more info on this issue.
Also i guess we might wanna develop a tool where user can test whats the best
option available for their tor
Hi Folks,
I am trying to figure out how the packet flows over a Tor network.. There is a
mix of information.. Some claim that the ISP is not aware of the payload as the
complete data is encrypted whereas some say that your ISP is not used at all
when using Tor network. AFAIK my packets go to
Thanks Derric,
Thats a ton of information which is very much simplified.. Specially the
graphics ;)
I have a clear understanding now.. So what i figured is as far as my ISP goes,
he only knows that i am using Tor, period.
Rest all is good to go.. All thanks to encryption. Then i assume this
Also a quick question jumped in.. Say i have a Raspberry PI which is converted
to a TOR router and i connect my machine to this router. Will this make the
entire traffic go via TOR including something as simple as a ping request. Say
i ping a machine on the web, will it stay anonymous or i will
Thanks again for taking time to answer all the questions..
This helped me a lot.
I am adding Tor-talk mailing
list
to my address book...
Cheers,
Torzilla11
> From: datzr...@alizeepathology.com
> To: tor-relays@lists.torproject.org
> Date: Thu, 9 Oct 2014 16:16:45 -0400
> Subje
Thanks Chris,
I will check the links.. :)
Looks like TOR is still going through a development phase which is a good thing
Thanks,
Torzilla11
> Date: Thu, 9 Oct 2014 22:58:06 +0200
> From: christ...@ph3x.at
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Need
Also i guess its high time that TOR network starts thinking about folks like us
with low bandwidth.
I am in as well for devoting my time for any help required
> Date: Mon, 13 Oct 2014 19:21:49 +0200
> From: toralf.foers...@gmx.de
> To: tor-relays@lists.torproject.org
> Subject: Re:
On 10/12/2014 6:56 PM, subk...@riseup.net wrote:
> [cross-posted on tor-talk and tor-relays]
>
> i've found that the Tor GoodBadISPs list [1] is somewhat outdated on
> current hosts that allow Tor (exit) relays to be hosted. i'm trying to
> find a cheap host that allows
the
connection is stable. The way you have described the issue, it points to a
router malfunction at first glance but if you can flash some more light on it,
you might get an exact solution.
Thanks,
TorZilla11
> Date: Thu, 16 Oct 2014 13:22:42 -0400
> From: humbletoru...@safe-mail.net
>
packet authentication enabled.
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
in all distributions).
--
Random
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Monday 24 November 2014 18:09:34 Libertas wrote:
> Here's the relevant ticket:
>
> https://trac.torproject.org/projects/tor/ticket/13703
>
> A specific topic of conversation is how much of the advice should be
> in the document itself as opposed to linked sources.
>
lUc87Igpvs5EpNGT
=f1un
-END PGP SIGNATURE-
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
n accountability and anonymity which may also pose a
concern for some people.
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
rget prot opt source destination
> REJECT all -- 0.0.0.0/00.0.0.0/0 reject-with
> icmp-port-unreachable
>
> Chain OUTPUT (policy ACCEPT)
> target prot opt source destination
> ACCEPT
On Friday 26 December 2014 15:48:20 Christian Burkert wrote:
> Furthermore, I wondered if the attackers were attracted to my system
> because of the Tor service, or were just randomly picking targets.
> But from your previous descriptions, I rather deduce that it is more
> like the la
seconds.
Is this "normal" and I've just never noticed? I've had ad high as 2000+ connections and never saw it.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
e ncurses based monitoring tool.
Regards,
torland
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Friday 06 February 2015 11:32:42 Hu Man wrote:
> First thought was DDOS but traffic is not high enough to cause any problems.
> I did some digging and in a 5 minute period received the following requests
> to the port tor is listening on (number of requests and source i
Hello,
We have been operating a moderately successful public tor relay for a
while now. Having read about how TOR works back a couple of years ago, I
was more or less sold on the idea that if traffic originating on your
local network uses your own TOR relay as the first hop (entry node), then
Hi s7r,
Thank you for your reply. There's a lot of good info in it and I'll be
reconfiguring the clients.
The fact that I've been doing Tor-through-Tor unawares explains a lot.
It did seem odd to have polipo in the mix, but it makes sense now, that
would only be if the LAN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I have to agree with that, multicore support is really important and
should be on the top of the priority list.
Thomas White:
> Have there been any updated ETAs concerning the development/support
> of multi-core for the core tor workloads?
Great points raised there with your post. Thanks for the reply.
I definitely don't understand everything about Tor but I'm gradually
getting there. The public Tor entry guard relay ran great for over a
year but we ended up taking it down for a while once I realized
something was
Hello All,
I just bought a Raspberry Pi.. Wanted to setup as a Tor non exit relay.
I have read so many instructions online on how to set it up but i am facing
issues with opening ports.
I am using a NetGear Router and require your inputs with the same.
Also is static IP mandatory for setting
I am using a NetGear DGN1000
From: iamthech...@gmail.com
Date: Tue, 23 Jun 2015 19:26:45 +
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Raspberry Pi - Relay Setup
What model of NetGear do you have?
A static IP is not required. You may need to setup a Dynamic DNS if tor has
I did not say i want to setup an exit relay.
I am looking forward to setup a Non-exit relay
===
> Date: Tue, 23 Jun 2015 21:39:01 +0200
> From: t...@bruzzzla.de
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Raspberry Pi - Relay
201 - 300 of 1440 matches
Mail list logo