On 26.02.2016 11:54, Tim Wilson-Brown - teor wrote:
>
>> On 26 Feb 2016, at 11:52, Random Tor Node Operator
>> mailto:t...@unterderbruecke.de>> wrote:
>>
>> On 26.02.2016 05:15, torser...@datakanja.de
>> <mailto:torser...@datakanja.de> wrote:
>>
On 26.02.2016 13:50, Roman Mamedov wrote:
> On Fri, 26 Feb 2016 12:27:07 +0100
> Random Tor Node Operator wrote:
>
>> So in terms of censorship resistance, bridges with occasionally changing
>> IP are better for the Tor network than those with static IP.
>
>
least 1
GB RAM.
signature.asc
Description: OpenPGP digital signature
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 08.03.2016 19:30, Volker Mink wrote:
> You can take it down for some days without losing any flags or consensus
> weight.
> Had it with my exit i have at home.
> I had to reinstall it and i have the same stats as before.
The HSDir flag will be cleared after each restart of th
On 25.04.2016 11:45, Petrusko wrote:
> 4. I'm confused, the "bridge" is acting like a relay ? (like a router on
> a network, 50% upload / 50% download...?). Or like a hidden door to
> contact the Tor network, and the client will only use relays after
> without the br
20:00 UK time.
Please quote support ID 13240401227566764688
signature.asc
Description: OpenPGP digital signature
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
d.
A Reduced Exit Policy[1] may be what you are looking for.
[1] https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
On 05/22/2016 03:34 PM, Markus Koch wrote:
> If things go wrong (and with my luck they will) how many and which
> ports do I have to forward to be useful as
tion: OpenPGP digital signature
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
7
> and so on,...
>
> is there a reason, why there is such a high number of relays, which
> fail to specify a family, since this seams rather striking?
>
> aurel
> _______
> tor-relays mailing list
> tor-relays@lists.
Wouldn't it be possible to code the Tor clients to not build circuits
using relays in the same /24 or with "similar" names? While that wouldn't
fix ALL possible attack scenarios, that could certainly help, and help
against accidental (or malicious) misconfigured nodes.
On Tu
I just got this sent to me, not sure if it is legit or not. I'm going to
assume the worst for now, thought I'd send it out here for discussion and
as a heads up for anyone who hasn't yet gotten one of these. I'm hesitant
to run anything from someone wanting to do a "stud
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello everybody,
since this botnet started flooding Tor, my Tor relay Bazinga
($196832C61F30E9D6D179393C9AED4E47FD29796B) has been experiencing some
issues.
Previously, it was relaying 100 Mbit/s for a few months without problem.
When the botnet
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/11/2013 12:37 PM, Roger Dingledine wrote:
>> In my case I use 'monit' to monitor my server and the running
>> services - including tor. Once in a while the automated TCP check
>> on either the OR-Port or the DIR-P
tor my server and the running
> services - including tor. Once in a while the automated TCP check
> on either the OR-Port or the DIR-Port failed which resulted in
> monit stopping and starting tor.
>
> I reconfigured monit not to restart tor until at least three
> consecutive TCP checks fa
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/11/2013 02:18 PM, Stephan wrote:
> On 11.09.2013 13:33, Random Tor Node Operator wrote:
>> Could you post the corresponding line(s) in your monitrc?
>
> Of course. I use the default of "set daemon 120", so tor is
.
I agree with that point, because currently, relay operators have the
incentive to not update to the latest Tor version whenever a new
version is released, in order to keep the consecutive uptime high.
That is probably not in the best interest of Tor.
Maybe Tor Weather could look at the flags
after I shift-m to get to the
> menu and switch around a few times. Has anyone else experienced
> this and how did you solve it? -Jason
> ___________ tor-relays mailing
> list tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/m
If I remember correctly, Firefox has a bug where it won't do DNS lookups
over a SOCKS proxy. It will, however do DNS lookups through an HTTP proxy
that supports it, such as Polipo. If you configure Polipo to act as an HTTP
proxy that forwards to the Tor SOCKS proxy, and add Polipo to your Fi
On Thu, 10 Apr 2014 01:20:51 -0300, Enrique Fynn
wrote:
> On 10 April 2014 01:01, Tor Relays at brwyatt.net
wrote:
>>
>> If I remember correctly, Firefox has a bug where it won't do DNS
lookups
>> over a SOCKS proxy. It will, however do DNS lookups through an HTTP
proxy
email address as my first contact then my GPG fingerprint as a second
contact but the fingerprint is displayed not the email. Now I have it all on
one line with the email address first.
Which brings me to my main question; when I run systemctl restart tor@default
shouldn’t the new settings in
tell people.
6 ##
7 ## HiddenServicePort x y:z says to redirect requests on port x to the
8 ## address y:z.
9
10 #HiddenServiceDir /var/lib/tor/hidden_service/
11 #HiddenServicePort 80 127.0.0.1:80
12
13 #HiddenServiceDir /var/lib/tor/other_hidden_service/
14 #HiddenServicePort 80 127.0.0.1:8015 #HiddenService
Hello:
I hope you can help me. I'm having trouble keeping my bridge up. Ports are
forwarded. Running latest version of Tor. I had it running for at least roughly
7 to 10 days and then it went down and keeping it up is trouble. I even setup
dynamic dns on my router using no-ip.com to s
I'm not sure I understand. Are you showing me more lines of code to add?
Sent from Proton Mail mobile
Original Message
On Dec 21, 2022, 5:18 AM, Toralf Förster wrote:
> On 12/20/22 15:27, Anonforpeace via tor-relays wrote: > Dec 20 08:55:16
> mxh-HP-Compaq-Pro-6
logs you sent. It looks
> like apparmor didn't want obfs4proxy to open some file.
> I'm not sure why obfs4proxy would care about this file, maybe it's
> something the go runtime likes to look at. It does not look fatal
> though.
>
> Logs also says
>
> &
pparmor to flag the file/program as
safe/legit.
On Sat, 2022-12-24 at 18:19 +, Anonforpeace via tor-relays wrote:
> Thank you for this. Is there any way around this? This didn't used to
> be problem.
>
_______
tor-relays m
before I start
working on a relay install only to waste my time.
Thanks for any useful info and while I'm here, sup people?
I'm the new guy._______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I now wonder if I can simply
ignore that and enable IPv6, or if this isn't recommended (and probably
also what I could do in this case).
Thanks a lot.
--
Best,
shruub
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Alright, good to know, thanks for your reply.
--
Best,
shruub
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
s time. We told them we're hosting tor nodes, and that there
is little we can do to prevent morons from abusing the network and using
our relays for bad things™, but the netcraft spam keeps coming, annoying
everyone.
Is this something other operators have seen too or are we alone? If so,
is ther
Cant see it without enabling javascript and I'd rather not
On January 11, 2023 4:50:18 PM UTC, gus wrote:
>Dear relay operators,
>
>Save the date: our next Tor relay operator meetup will happen on January 28 at
>19:00 UTC!
>
>We're drafting the agenda here:
> - pa
Hello:
I have recently built a Tor Bridge (nickname is h4ck3rspace) and when it first
went up, it was up to about two weeks and then it went down. So I brought it up
again and ever since, it routinely goes down every 1 to 3 nights, between 8p
and 10p EST. I've never seen this type of beh
Asked this before, but no one answered, so I'll try adding on this thread.
What are the Tor signing keys? What key is being used here:
https://dist.torproject.org/tor-0.4.7.13.tar.gz.sha256sum.asc
On Mon, January 23, 2023 3:59 pm, Georg Koppen wrote:
> Hello!
>
> In case it
I'm running a relay on Debian (flavor) - all software is up-to-date and the tor
version installed is 4.5.16. So I think it's up the Debian admins to update tor
on their repositories (?); that way at least the Debian relays would get a
proper update I assume.
--- Origin
On Tue, Jan 24, 2023 at 08:41:39AM +, Petrarca via tor-relays wrote:
> I'm running a relay on Debian (flavor) - all software is up-to-date and the
> tor version installed is 4.5.16. So I think it's up the Debian admins to
> update tor on their repositories (?); that way
My CPU architecture is 'armhf' (hardware is Raspberry pi). So the post
referenced below starts with pointing out that this setup is not supported. So
any other way on how to upgrade easily on a new version of Tor ?
--- Original Message ---
trinity pointard schrieb am Di
Hello everyone.
At last Saturday's Tor Relay Operators Meetup, ongoing work on a "relays at
universities" campaign was announced. I am interested in it as I may be able
to help a little, so I'd like to receive any news, but I don't remember any
message about it on tor-re
.
TAW___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi Tor operators,
Some of us took/will take advantage of the increase in allowed Tor relays per
IPv4 address[1] to reduce costs for running Tor relays. This change will result
in more relays sharing the same source IP address than before, which means
other relays using rate limits on their
My bridge was showing the same thing. Then I learned that there is a bug in the
relay search page and you should only trust \var\log\syslog
Sent from Proton Mail mobile
Original Message
On Feb 2, 2023, 4:40 PM, theyarewatching--- via tor-relays wrote:
> Good day,
> My
Hello,
so my relay regulary gets overloaded, for what I can only assume is an
hardware issue, (which I can't upgrade rn) since I already applied the
tor anti ddos scripts. It seems to be able to recover, however with a
lower Consensus Weight. I also (stupidly) tried to have a cron restarti
gt; necessarily
> imply a restart once in a while.
>
> Best,
> trinity-1686a
>
>
> On Sat, 18 Feb 2023 at 11:43, shruub via tor-relays
> wrote:
>>
>> Hello,
>>
>> so my relay regulary gets overloaded, for what I can only assume is an
>>
metrics) or
just how long it's been running.
> Thanks for running a relay!
:)
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I'm running a tor relay on some older hardware that I didn't want to discard
when I could still put it so good use.
Some details of the box are:
-- CPU: Intel(R) Core(TM)2 Duo CPU P8600 @ 2.40GHz
-- RAM: 4GB
-- ARCH: x86_64
-- HDD: 250GB
-- OS: Ubuntu 22.04.1
I originally configure
Hello,
thanks for supporting the tor network! If I recall correctly, the lower
the better. E.g. if you start at 32768, which is the recommended port
range due to it not being used else where "officially", until 33018.
However, 6 - 60250 should also work well. You might also want
hnically a good idea, I
personally just wouldn't know how to implement it correctly.
Best,
shruub
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hi,
> No network experience but already running 2 TOR instances: 1 TOR service + 1
> bridge.
Very nice! You're asking some great questions and I'll try to answer as many as
I can :).
> My preferred choice at the moment is [3] where I would like to have 3 relays
> (on
Greetings all!
Setting up a new Digital Ocean Tor Relay. DO is giving me 3000 Gig a month. Is
there a tutorial that I can use to calculate the bandwidth? I've searched
around the web and for some reason people seem to dance around the question.
They give examples not relevant to me and
Hi all,
I'm running a Tor middle/guard relay on OpenBSD. I'm wondering if there are any
steps I should take to guard my relay from DoS attacks.
My thanks
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.o
Thanks for the reply. What would be a reasonable per-ip rate limit (connections
per second) for a Tor middle relay?
Thanks
On April 16, 2023 7:22:03 p.m. UTC, George wrote:
>On 4/14/23 23:54, null via tor-relays wrote:
>> Hi all,
>>
>> I'm running a Tor middle/g
Hey,
the paper is from August 2018 (if I looked at the correct one), not so
recent :)
And e. g. Philipp Winter questions the usefulness of iat_mode:
> substantial performance penalty for a dubious and poorly understood
privacy gain
https://lists.torproject.org/pipermail/tor-relays/2
I'd like to raise awareness of the Comcast blocking.
As stated in subject, I believe Comcast blocks all traffic between its
customers and public tor relay nodes. That is, the blocking is not limited to
tor-related traffic, all other services / ports on the tor relay are blocked.
Backgrou
onvo, he could do some tests from inside
Comcast's network. He sounded a bit resigned though, so no guarantees obviously.
And thanks for encouragement, up to now my efforts have fallen mostly to deaf
ears.
_______
tor-relays mailing list
tor-relays@l
Okay, you planted some doubt. This is a quote what my peer wrote me about the
issue, I hope it is ok to quote, contains no personal or sensitive info,
emphasis added:
> Comcast/Xfinity! has a bumpy past with tor. They periodically block it, get
> yelled out by their subscribers and the
e doing so, nobody was able to
connect to his lightning node via IPv4 (clearnet, not tor). He claims to have
done this back in July or August. We tested just today, and both sides were
able to successfully initiate TCP connection, no blocking here. Importantly, at
the same time I was not able to conn
blocking.
>
> As stated in subject, I believe Comcast blocks all traffic between its
> customers and public tor relay nodes. That is, the blocking is not limited to
> tor-related traffic, all other services / ports on the tor relay are blocked.
>
> Background: I am running a lightning n
rying the well known file on my webserver for the last few days. Am I
missing something?
relay fingerprint: CA1D49840F37E0C9D5F1770A5F033D80EB6AF369
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/ma
Hi chani,
When I try to access
https://vagabyte.com/.well-known/tor-relay/rsa-fingerprint.txt I get a 404 Not
Found. So my guess is that this is (at least one of the) problem(s). See
https://nusenu.github.io/tor-relay-well-known-uri-spec/#well-knowntor-relayrsa-fingerprinttxt
as well for more
I have only experienced similar problems while running tor exit node, even with
very restricted exit policy. Allowing exit only to port X, and unable to
initiate connections to port Y (typically Y=HTTPS=443, of course X =/= Y).
Note that those problems are not Comcast's fault, although th
Hello,
It is a good sign that Comcast cares and wants to defend itself. Another
positive is that you did not try things like "tor is only for
criminals/terrorists".
As to the blog post you mention. (Note that to see the post one may need to
delete the trailing full stop from th
nd regards,
nusenu
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Yes, I agree 100% with Danny's summary here, so I have to concede, I did not
found enough evidence that Comcast blocks connections *to* tor relays. I
apologize. Specifically, I did some tests with ronqtorrelays at risley.net ,
who is a Comcast Business customer, and he had no problem initi
via tor-relays
:
> Hello,
>
> It is honestly still puzzling to me considering that the relay wasn’t
> compromised or misconfigured.
>
> If you or anyone wants to check out the reports
> https://www.abuseipdb.com/check/23.132.184.31
>
>
> On Wed, Jul 2
Hello there!
I've been running for over 1.5 year a middle relay on an IP address I also use
to browse, withous issues. However it's now some weeks since many websites that
always refused tor traffic started to also refuse normal traffic from my IP. I
suppose this is related to the relay,
number of
Tor users. And which is less likely to be blocked in the future. What
are the best practices?
PS: Thanks for the webtunnel-bridge Docker image and the documentation
on how to run it. It was very helpful and made setup easy.
_______
tor-relays mailin
ey is attached. Please, use it and provide me yours!
signature.asc
Description: PGP signature
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
dan Hillis wrote:
> Can I get a copy of the webtunnel-bridge Docker image and
> documentation? Thanks
>
> On Mon, Aug 14, 2023 at 6:43 AM tor-home at encryptfirst.com <
> tor-h...@encryptfirst.com> wrote:
>
>> When running a WebTunnel bridge, what types of IP
on my network, but the machine that is running Tor
bridge is not filtered by it. I do have a couple of TOR feed enabled in
pfblockerng but only incoming traffic is filtered.
I have no idea how the bridge stats are passed to metrics.torproject.org so it
is very challenging for me to tamp down on
What is the "complete" bridge line?
Sent from Proton Mail mobile
Original Message
On Sep 7, 2023, 6:28 AM, telekobold wrote:
> Hi gus, On 06.09.23 21:27, gus wrote: > If you add just IP:ORPort (**ORPort**
> and not the OBFS4 Port) you have a > "va
Ok good I have those in my bridge.
Sent from Proton Mail mobile
Original Message
On Sep 7, 2023, 9:22 AM, telekobold wrote:
> On 07.09.23 12:43, Anonforpeace via tor-relays wrote: > What is the
> "complete" bridge line? Bridge obfs4 : cert= iat-mode=
ickey - EmailAddress(s=sagersplit@protonmail.com) - 0xEB956CEC.asc
Description: application/pgp-keys
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
pid=402248,fd=6))
Any ideas?
Thansk!
f.
[1]
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/142/diffs?commit_id=d932cb2744afde266795cece6c4e761d2422aded
_______
tor-relays mailing list
now replying via the list :)
thanks Toralf but I'd like not to tinker.
There is no FW running on the VM and for the tor bridge which is running
there as well I use:
MetricsPortPolicy accept 192.0.2.1
so something like this would be needed as well (didn't take this into
con
As far as I know tor won’t spread the 5TB across the month. It’ll just run
until it hits that limit and then hibernate for the rest of the define period.
So if it hits 5T at 15 days it’ll hibernate for the next 15.
You can try to spread this out yourself by using daily limits and divide your
on
a commercial vps, costs me around $200 a year. I'd run more but the money
starts to pile up . . . so if I got significant enough recompense I would run
more - good for Tor.
Also, has it been decided exactly how the money will be shared out? If it's on
the number or relays you op
refused me permission to change mine to an exit node. That's today, 2023-12-02.
They're pretty good, I've had no problems, efficient customer support,
unlimited bandwidth, but 'no' to exit relays.
I don't know about bridges. ASN : AS42831.
regards,_____
ck on after I
restarted the tor daemon and rebooted the server. I'm starting to think my
firewall configurations might have been the culprit, even though I ran a very
rudimentary setup. Basically just:
-A INPUT -p tcp --dport -j ACCEPT
-A INPUT -p tcp --dport 9050 -j ACCEPT
-A INPUT -p tcp -
www.youtube.com/playlist?list=PLWSQygNuIsPc8bOJ2szOblMK4i6T79S1m
Thank you for the paper and the presentation.
Chapter 3 (Multiple Tor processes) shows the structure:
> mypt - HAproxy = multiple tor services
At the end of chapter 3.1 it is written
> the loss of country- and transport-specific metrics
How will th
ays I can configure my server to boost traffic?
<https://metrics.torproject.org/rs.html#details/292FCACE773DC259B799914A23BE65A6A6178E8F>
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/l
Hey telekobold,
> will there be a Tor relay operators meetup @37C3 [*]?
There seems to be a Tor meetup as SoS (Self-organized session) by Q
Misell:
https://events.ccc.de/congress/2023/hub/en/event/tor-meetup
fossdd
signature.asc
Description: PGP signat
Hi,
I set up a middle relay at first, but I changed my mind to run a bridge to
avoid blacklisting of my public IP by certain websites.
Is it possible to immediately remove my relay from relay search on Tor Metrics?
If not, when will my relay be removed from the relay list?
Thanks
Thanks for your answers guys, I keep you informed.
Happy holidays to all
Nemeto
Le mar. 26 déc. 2023 à 06:45, George Hartley via tor-relays
<[tor-relays@lists.torproject.org](mailto:Le mar. 26 déc. 2023 à 06:45, George
Hartley via tor-relays < a écrit :
> - Is it possible to im
I think it's after 30 days it gets automatically removed.
Malcolm
On Mon, Dec 25, 2023, 15:25 nemeto via tor-relays <
tor-relays_at_lists.torproject.org_0tpcq...@duck.com> wrote:
> Hi, I set up a middle relay at first, but I changed my mind to run a
> bridge to avoid blacklis
ying it's a new relay. Don't know why this would happen as
> it's been running for a few years, but suddenly saying it's new?
>
> Thanks.
>
> --Keifer_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I had this issue too. It resolved itself shortly within a few hours.
Original Message
On Jan 15, 2024, 05:23, Petrarca via tor-relays wrote:
> Just to confirm - the same happens to my relay, so this seems to be a general
> issue.
>
> Keifer Bly schrieb am Montag
Hi
>Sorry, but I'm going to vent a little bit. I'm not a network
>specialist, so 11 days ago I sent the following email to this
> mailing list asking for help because two of my Tor exit relays were
> completely frozen and I was unable to put them online aga
Hi
> > I've noticed a new kind of possible attack on some of my relays, as
> > early as Dec.23 which causes huge spikes of outbound traffic that
> > eventually maxes out RAM and crashes Tor. The newest one today
> > lasted for 5 hours switching between two of the th
https://www.infobyip.com/ip-198.13.48.219.html
Shows Japan!
Malcolm
On Thu, Jan 18, 2024 at 4:00 PM NodNet <
tor_at_nodnetwork.org_0tpcq...@duck.com> wrote:
> I think tor and Tor Project use IPFire's DB for GeoIP lookups, and
> 198.13.48.219 shows the following:
>
>
IP database are like phone books. They’re always accurate until they’re not.
For positive confirmation you could always perform a traceroute.
On Thu, 18 Jan 2024 21:07:30 GMT, 0tpcqovw--- via tor-relays
tor-relays@lists.torproject.org wrote:
https://www.infobyip.com/ip-198.13.48.219.html
Hi,
> If I want to serve an HTML page for my exit node do I need Apache2/nginx or
> can I just modify my torrc?
You don't need a dedicated webserver as long as unencrypted HTTP is acceptable.
You can read more about the default HTML exit notice for Tor exit relays h
The "first seen" date on my relay
A00E3AAF5A24DC69740FA7A3A1C4A0ECB7972722
Got reset today while I was at work. It's not a problem and I don't
particularly care, but is there anything that would cause this? IP hasn't
changed, Tor version has
offline? Thanks.
> --Keifer
>
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
s per ONE IPv4,
> and found only outdated problems unwell built.
>
>
> Please when you have a bash sript / receipe,
> I would welcome that.
>
> Hardening options would be very welcome too.
>
>
> C.
> _______
> tor-rela
On 09/02/2024 00:48, admin--- via tor-relays wrote:
You can have 2 separate relays on the same IPv4 address. Are you running into
issues?
It has been increased to 4 and then to 8 tor instances per IP address:
https://forum.torproject.org/t/tor-relays-8-relays-pers-ip-address-are-allowed
the router going
to fail entirely, slow down, or something else?Thanks in advance.
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
heartbeat messages indicate
the relay is working fine. The IP address is the same every time, and it's not
mine. Anything to worry about? _______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailm
Just try it!
Tor will limit the amount of connections it accepts based on how much RAM you
have.
\ Original Message
On Feb 20, 2024, 06:16, snowmanonahoe--- via tor-relays <
tor-relays@lists.torproject.org> wrote:
>
>
>
> Hello all,
>
>
>
>
Hello- Im looking for <= $6/mo VPS suggestions for general non-tor
server and also for tor. Some super-cheap hosts pre-install O/S and give
root but I want to install O/S myself so can put in FDE. Hard to see
which hosts can do this.
I tried Linode before and yes, could get FDE
($5 1GB, 1
Greetings,
I believe there is a larger sized guard relay that has been having MTU issues
for about a week. All connections with packets above a certain size are
dropped. This results in partially loaded or broken webpages, broken file
downloads, etc. Do Tor directory authorities test MTU
Usually lower MTUs are not a problem for properly configured networks, as even
lower MTU systems should begin fragmenting traffic. The issue comes where there
is a mismatch, and suddenly, larger than expected packets are dropped.
So I think the tor protocol does not need to support identifying
On 26/02/2024 21:03, Toralf Förster via tor-relays wrote:
On 2/26/24 20:07, meskio wrote:
At the moment we're
looking for 10 new bridges for Lox.
9 left
And one more added, so 8 left.
Meskio,
Feel free to reach me directly if further information needed.
Co
601 - 700 of 1440 matches
Mail list logo