[0]
FB45183DD82D572CA2B2641C1AB0EB0D8CE7B858
Sent with [Proton Mail](https://proton.me/) secure email.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Good day,
Not sure if this would be the proper avenue to pursue this. I operate a couple
of middle relays from my home server. All seemed well until this morning. Three
days ago one was promoted to guard status while the other lags behind. This
morning I check the Tor metrics page and the
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Hello:
My Tor Bridge has been down for awhile as I was moving to a new home. I have
been trying to bring it up again and have been receiving the messages you see
below. I have checked the the tor project status and see that there is a Ddos
attack affecting the network. Is that why I am getting
P SPT=52636 DPT=50871 WINDOW=1024 RES=0x00 SYN URGP=0
Oct 18 19:06:28 darkhoodie-HP-Compaq-Pro-6300-SFF Tor[73719]: Your server has
not managed to confirm reachability for its ORPort(s) at x.x.x.x:443. Relays do
not publish descriptors until their ORPort and DirPort are reachable. Please
check
Hello David,
again, thanks for your work on adding more metrics to tor's MetricsPort!
Many relay operators will love this and documentation will be useful [1].
I reported
https://gitlab.torproject.org/tpo/core/tor/-/issues/40699
which got closed yesterday, but there was likely a misundersta
ther one for gauges.
thanks for working on this!
best regards,
nat
[1] https://prometheus.io/docs/practices/naming/
_______
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
t the moment I have no possibility to update obfs4proxy, unless I
switch to Debian 11. One of my two hosters is only offering Debian 10
"buster", so even this would not help.
I have read the discussion on [3] and would be very happy to see
obfs4proxy for Ubuntu and Fedora (if the folks a
Hello Tor,
I am looking to set up a relay but have not been successful yet. ALthough I
believe I followed instructions, the relay "Walton" does not appear to be
functioning as I would expect. I was using SNAP as a vehicle to launch the
relay but no luck there as it fails as well.
Hello:
Is this update not available by running apt-get update && apt
Sent from Proton Mail mobile
Original Message
On Nov 3, 2022, 10:34 AM, meskio wrote:
> A reminder: If you operate a obfs4 bridge, please upgrade obfs4proxy to
> 0.0.14 and restart the tor
Hello Ron, thank you for setting up a relay.
What have you tried so far? You followed the instructions at [1]?
How do you know the relay is not functioning? Is there anything in tor logs?
[1] https://community.torproject.org/relay/setup/guard/
On Fri, Oct 28, 2022 at 10:32:48PM +, Ronvau
mailto:tor-relays@lists.torproject.org
I was wondering if anyone had experience running a Tor relay on Gandi.
According to
[good-bad-isps](https://community.torproject.org/relay/community-resources/good-bad-isps/),
Gandi supports all relays.
However, I contacted support asking them their
Hi,
I ran a tor exit on them and it got shut down on the 4th abuse claim, i have no
idea how those 2 exits relays are still going,
I would recommend against them personally, and raised in the spring good-bad
isps needs to be updated alot of ones on their are out of date
Best advice is do your
Hello:
I have setup a new bridge. Relay Search confirms it is up, however I wanted to
verify with you as well. The nickname is:
h4ck3rspace
Thank you
Sent with [Proton Mail](https://proton.me/) secure email.___
tor-relays mailing list
tor-relays
https://metrics.torproject.org/rs.html#details/9BA84E8C90083676F86C7427C8D105925F13716C
is from Nos-Oignons, and they have a close partnership with Gandi.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin
On Saturday, 5 October 2024 00:40 George Hartley via tor-relays wrote:
> You should default to full disk / partition encryption.
Apart from that FDE is _not_ recommended, especially for Tor exits.
What is the point of a 24/7/365 running cloud or KVM server that the admins
can copy at any t
On Saturday, 19 October 2024 20:17 David Adam wrote:
People are crying in the Tor forum that you have to register with an
(anonymous) email. Expressions are used like: Tor Project is dictatorship.
And then redshit links?
OPSEC please, use frontents:
https://github.com/libreddit/libreddit
Hi Kai,
Any systemd/Linux system connected to the internet with IPv4 is going to be hit
with endless bruteforce attempts, not just tor relays (although most tor relays
have their IP addresses published online,
meaning attackers find out about such systems sooner).
The solution is to disable
On Thursday, 17 October 2024 13:34 DiffieHellman via tor-relays wrote:
> The solution is to disable password auth and use pubkeys only
Yes, SSH key auth should be the minimum requirement.
2FA SSH key's the way to go.
> You still get logspam, but you can stop that with sshguard or ail
On Thursday, 3 October 2024 18:59 Osservatorio Nessuno via tor-relays wrote:
> We are writing this email in advance, since the node is in
> the FallbackDir list and embedded in Tor. The cluster will be powered
> off on 25th November.
FallbackDir have been selected 'automatically&
On Tuesday, 22 October 2024 19:24 Top wrote:
> My tor relays[1] traffic decreased a lot and I think this *might* be
> connected to some kind of DDOS attack.
> So I wanted to use this situation to set up some DDOS protection.
> For that I stumbled upon Enkidus tor DDOS mitigatio
Tossing this kdea out there since it is more an attack on bitcoin style
decentralization rather than Tor style decentralization. I do not know if it
applies to Tor.
Could this be a form of an "Eclipse" attack?
"Eclipse attacks occur when a node is isolated from all honest pee
It works. My relay is running on a Raspberry Pi 4B with 4 GB RAM.
Bandwith for the relay is 2 Mbit/s, CPU Load of the relay is about 20 %
Am 02.11.24 um 02:15 schrieb Keifer Bly:
Hi,
So I am wondering, is a Raspberry Pi 4 a recommended device to run a
tor relay on? In terms of traffic load
Adding another me too.
2 of 5 different ISPs for middle and entry nodes shared same abuse complaints
other received.
First time in 10 years to receive abuse complaints from middle/entry nodes.
Not fun.
It'd be great for Tor to publish a blog on what is happening / what happened so
w
On Wednesday, 23 October 2024 04:49 tor-relays+tor-rel...@queer.cat wrote:
> I believe that the mitigations found in the community-maintained
> anti-DDoS scripts, such as limiting the number of open connections from
> a single IP, are now integrated into tor itself.
I think you are conf
sc
Description: OpenPGP digital signature
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tify the protocol. In hindsight, it was >probably
>a mistake to expose the iat option to users and bridge operators.
>
>Cheers,
>Philipp
https://lists.torproject.org/pipermail/tor-relays/2021-February/019370.html
On 23/09/2024 12:15, George Hartley via tor-relays wrote:
Hello Tor co
scripts for Mikrotik.
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
signature.asc
Description: This is a digitally signed message part.
___________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Osservatorio Nessuno via tor-relays wrote:
> our organization is working to add more physical nodes, in our little
> Italy headquarter[1]. We have reached an agreement with one of the
> available fiber reseller there, where we will pay for L2 transport to a
> datacenter, where we
Out of curiosity, can any other options be passed with ServerTransportOptions
besides iat-mode?
I could only find this article saying there is a 'cert=' option, which
initially appear useful for Tor.
https://hamy.io/post/000d/how-to-hide-obfuscate-any-traffic-using-obfs4/
Thank you
Toralf Förster via tor-relays wrote:
> On 9/24/24 15:40, boldsuck via tor-relays wrote:
> > https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukD
> > DZo6BQqwQURzjQy
> OT, but useless use of cat ;)
Oh, you're right. It's nicer because I have
On Montag, 23. September 2024 22:27:25 CEST Fran via tor-relays wrote:
> Philipp Winter regarding iat mode:
> >The feature introduces a substantial performance penalty for a dubious
> >and poorly understood privacy gain. If I were to write an algorithm to
> >detect obf
pasture_clubbed242--- via tor-relays wrote:
> I could only find this article saying there is a 'cert=' option, which
> initially appear useful for Tor.
Cert is default in obfs4 bridelines, you can create yours with:
~# cat /var/lib/tor-instances/01/fingerprint
nikname fingerp
On Thursday, 26 September 2024 08:01 Tor Relay Net Ops via tor-relays wrote:
> I think it might have not recognized the address has changed, because it
> doesn't recover after a while (I waited around 3~ days)
> There are no firewall rules that would intervene with this process, on
There are some very significant recent CVEs out for CUPS, the unix
printing system.
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=cups
It's an ideal moment to remind relay operators that a Tor node, relay or
bridge, should be a single-purpose internet server.
Running alternate int
On Tuesday, 1 October 2024 19:32 denny.obre...@a-n-o-n-y-m-e.net wrote:
>After my last restart I have:
>
>```
>
>Read configuration file "/usr/share/tor/tor-service-defaults-torrc".
>
> Read configuration file "/etc/tor/torrc"
On Mittwoch, 18. September 2024 09:10:31 CEST Florian Kohrt via tor-relays
wrote:
A few facts from these German films and notes:
- "Boystown" was one of the largest pedophile darknet forums of all time.
400.000 User
- The administrator's chats played a crucial role in tracking
On Wednesday, 2 October 2024 17:07 Toralf Förster via tor-relays wrote:
> On 10/2/24 13:03, meskio wrote:
> > Not a concrete one. My plan is to review the situation early next month
> > and
> > depending on the usage bring the conversation on what to do with those
> > br
On Wednesday, 2 October 2024 21:24 Sebastian Hahn wrote:
> > On 2. Oct 2024, at 09:05, George Hartley via tor-relays
> > wrote:
> >
> >
> > It could be that your provider has throttled you temporarily.
> >
> > I don't think so, I get that messag
isabela fernandes wrote on 2024-09-16:
I am reaching out to inform you of an upcoming news story concerning a
potential deanonymization attack on Onion Services.
These are the articles, in German language:
Ermittlungen im Darknet: Strafverfolger hebeln Tor-Anonymisierung aus
<ht
es, the answers would be the same?
¹All node types are involved in hidden services (guard, middle, exit).
Every assistant admin at Hetzner and OVH can monitor a significant part of the
Tor network. In addition, Netflow data is transmitted to anyone who can pay for
it. But well-known relay gr
pdate module github.com/pion/ice/v4 to v4.0.3
I wonder if this is a problem of my local setup or a bug snowflake itself. Any
ideas?
Best regards,
0x5fcfbd30
_______
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email t
Hej Dionysios,
guess you have to additionally put the following to your torrc:
ORPort [::1]:auto
AssumeReachableIPv6 1
Best regards,
atari
___
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le
it helps to diagnose the problem further. Meanwhile, I disabled
rechecking and simply try until I get lucky during the NAT testing.
_______
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
ridgeDistribution email
> ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
> ServerTransportListenAddr obfs4 0.0.0.0:
> ExtOrPort auto
> ExitPolicy reject *:*
> ContactInfo keiferdodderblyyatgmaildoddercom
>
> --Keifer___
tor-r
Hi, I had very similar reports to
[tor-operator_urdn.co](https://forum.torproject.org/u/tor-operator_urdn.co):
DateTime Action AttackClass SourceIP Srcport Protocol DestinationIP DestPort
0 30-Oct-2024 14:06:13 BLOCKED attempted-recon 92.51.45.21 0 202.91.162.47 22
1 30-Oct-2024 14:43:35 BLOCKED
On Sun Dec 1, 2024 at 8:15 PM CET, Keifer Bly wrote:
> Hi,
>
> So on Debain 12, is there a way to configure tor to start automatically
> when the os boots? Thanks.
>
> --Keifer
Do you mean something like, `systemctl enable tor`?
_______
ation & discussion
https://direct.mit.edu/books/oa-monograph/5761/TorFrom-the-Dark-Web-to-the-Future-of-Privacy
## How to join
Meetup details:
- Room link: https://tor.meet.coop/gus-og0-x74-dzn
- Date & Time: Saturday, December 7th, 2024 @ 19.00 UTC
- Duration: 60 to 90 minutes
sses for a small fee so I'm planning to run 5 bridges from 1 VPS to make
> management easier. Is this enough horsepower to run 5 WebTunnel bridges?
>
> - 4 vCore AMD EPYC Rome
> - 8 GB memory
> - 48 GB SSD
The tor process is by far the main consumer of resources in a webtun
Hello,
Thanks everyone for joining us last Saturday. Here are the meetup notes.
Our next online meetup will happen at the end of January 2025.
I'll announce it in January.
cheers,
Gus
## Tor Relay Operator Meetup - 2024-12-07
### Phase zero, announcements
New WebTunnel bridges cam
On Mon, Jan 06, 2025 at 01:11:15PM +, Brook Rameev via tor-relays wrote:
> Today all my web tunnel relays become offline according to
> https://metrics.torproject.org/rs.html#search/BrookRameev (my web
> tunnel bridges have the 'W' suffix). But they are surely online
>
/community/-/issues/329
If you can use your bridge and its shown as “webtunnel: functional” when you
check here: https://bridges.torproject.org/status?id=$YOURFINGERPRINT
everything should be fine.
Best regards,
atari
___
tor-relays mailing list -- tor-relays
On Thursday, December 26th, 2024 at 12:00,
tor-relays-requ...@lists.torproject.org
wrote:
>
>
> Send tor-relays mailing list submissions to
> tor-relays@lists.torproject.org
>
> To subscribe or unsubscribe via email, send a message with subject or
> body '
FYI: My Tor node »TorMachine« (6A7551EEE18F78A9813096E82BF84F740D32B911)
will be shut down on 2024-12-31.
Sorry folks – but I'm too old for the job.
Good luck and all the best wishes for the future!
_______
tor-relays mailing list -- tor-r
possible to make a change!
Zachary___
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
ndub via tor-relays wrote:
I'm also facing the same problem. I'm wondering whether this also
happens to bridges and if it doesn't, why not running a bridge ?
Because of how everyone *thinks* that understands internet and
particularly internet security... not to mention the
I'm also facing the same problem. I'm wondering whether this also
happens to bridges and if it doesn't, why not running a bridge ?
--
ndub
On 25/12/2024 08:29, Richie via tor-relays wrote:
Hi, tierce,
can confirm (germany), and afaik a known issue for quite a long time
now. M
ing a common browser using the basic services of
the ISPs (no torbrowser, no tor network) and at least since may 2023,
I've observed that some websites (banks, federal services,…) simply
don't respond when I want to open their webpages.
If I use another IP from the same locations
http://hctxrvjzfpvmzh2jllqhgvvkoepxb4kfzdjm6h7egcwlumggtktiftid.onion/rs.html#details/87EBD436D6EC7E2A83AC1CAAF46B44CFF15CDCA8
( CCed)
always from port 9001 but to different, high number destination (on my vps)
ports which ufw is blocking.
This isn't Tor traffic I'm blocking, right? That would only come to my O
Individual bridge IPs are not published anywhere and so cannot be
blocked like this.
Unless they are collateral damage from a block of IPs being banned
because of relays. Like all IPs from a VPS provider.
Cheers.
On 12/26/2024 4:02 AM, ndub via tor-relays wrote:
I'm also facing the
Hi All,
Looking for guidance around running high performance Tor relays on Ubuntu.
Few questions:
1) If a full IPv4 /24 Class C was available to host Tor relays, what are some
optimal ways to allocate bandwidth, CPU cores and RAM to maximize utilization
of the IPv4 /24 for Tor?
2) If a full
can
have from 6 to 40MBs
2. Run a separate tor instance for every physical core that you have
3. Allocation ~500MB of memory for every instance, this is quite
empirical for my experience
5. Try to use a different ip for every instance, this is not mandatory
but if you share multiple relay on the
we wrote down some notes on our experiece:
https://osservatorionessuno.org/blog/2025/02/how-to-configure-multiple-tor-relays-on-the-same-interface-with-different-ips/
On 2/4/25 9:41 AM, bic wrote:
hello
I have a configuration quite similar[1] to yours and previously posted a
similar question
seems that the person harvested emails and indiscriminately
spammed everybody: the recipients list contains @torproject.org too.
I agree regarding this not being malicious. However. If we’re wrong,
I see two options to be cautious about. It may be FUD against Tor: the
network or the project. W
Appreciate the details!
Some questions to better understand:
1) Why did you limit relay bandwidth? How did you calculate the values to use
for the limits?
"BandwidthRate 75 MBits
BandwidthBurst 100 MBits"
2) CPU - how did you decide to only use 4 out of 6 cores?
Why use 4 cores to 1
ongoing attack
I have some evidence of the attack: the Torproject doesn't allow people to run
relays by removing them from the network or making them unusable as Guard or
Exit for no known reason for years. A random person cannot run a Guard or Exit
relay. Thus the Tor network is entirely r
I'm asking the Torpoject to publicly answer the question: why do you add BadExit
and MiddleOnly flags to new relays?
Please don't lie as you did before and list the criteria here
_______
tor-relays mailing list -- tor-relays@lists.torproj
On Sunday, 9 February 2025 19:35 ZK via tor-relays wrote:
> I'm asking the Torpoject to publicly answer the question: why do you add
> BadExit and MiddleOnly flags to new relays?
The TorProject is an open source project and you can read all the information
about
what, why, when and h
Hello!
A couple of days ago, on 2025-02-06, an unknown family with 24 exit
relays showed up in the Tor network. We followed our usual approach[1]
in those cases: reaching out to the operator welcoming them in our
community while at the same time being cautious and keeping the relays
in a
Hello,
does anybody use the Opensense Plugin for Tor?
I followed every step in the Documention for setting up a Relay but it doesn't
work and the opnsense community can't help either.
Best regards
Azra
Sent from Proton Mail Android
publickey - azraxiel@proton.me - 0x2AAAF94E.asc
D
heers
_______
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
ation at
fault, not tor, but I thought I'd throw it out for ideas, as I'm not
that confident (yet) with IPv6 stuff.
Here's the interface:
2: eth0: mtu 1500 qdisc fq_codel state
UP group default qlen 1000
link/ether a6:6a:08:73:42:27 brd ff:ff:ff:ff:ff:ff
altname enp
Hello,
Join us for Tor activities @ 38th Chaos Communication Congress (38C3):
https://events.ccc.de/congress/2024/
The 38th Chaos Communication Congress runs from December 27 to 30, 2024 in
Hamburg.
We've got a lineup of Tor activities happening during this congress!
- Decemb
Greetings fellow relay operators!
Sorry for the last minute notice, but we're postponing the usual relay
operators meeting previously set for tomorrow.
Stay tuned for a new date.
George
--
43C2 85B0 41B6 4AC1 0E02 2767 7092 AEB3 40B0 C804
______
)
Best regards,
atari
_______
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
Hello,
Thank you. I have read all of it.
I have also re-sent my Email, please let me know if you see it now.
Thank you.
___
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
> Possible attack on servers via Tor Guard relays
With the written above, the Tor node attributes should not play
a role.
> the connection is terminated. (MSG1) Upon connecting for
> the second time, everything goes smooth. (MSG2)
Starting with MSG2 the ssh connection seems to work.
Hello,
What are some of the most common reasons for relays and exits to be banned from
Tor?
Had it happen to all of my 5 nodes and I'm currently awaiting response from
bad-relays list.
They all present this in logs
Jan 18 20:41:40 example.com Tor[2439671]: http status 400 ("Fingerpr
Web tunnel bridges Port 443, https
I set up three of these. One in UK, one in Australia and one in USA.
Only the USA service is attracting traffic. This might be normal.
The others are very quiet.
Then I look at it on Tor Relay metric it reports Running
<ht
Carlo P. via tor-relays wrote:
Hello experts,
I have, from the same provider, two VPS with same specs (also same port
speed of 200MBit/s, verified via speedtest-cli) - one in Germany, one in
South Africa.
Whilst the German one behaves as expected (two fast relays on it), the
two relays in
ell them/offer
them migitation methods). I'd be happy to hear success stories on
deblocking tor relay IPs, but i doubt that i'll see this happen.
Thanks for running a relay,
Richie
Am 24.12.24 um 08:07 schrieb gniping via tor-relays:
Hello,
I'm located in Belgium.
I keep two
There is a hacky fix available:
https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/460
___
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le
Hi,
I am running a relay and other servers. Sometimes doing SSHD over Tor
via a hidden service in a VPS in openbsd.amsterdam. In all my other
setups, in other providers, I do not see this problem happening.
Upon connecting for the first time, I do get a "banner line contains
in
Hello. For the past few days I've been trying to open a tor-relay on my old
laptop running arch. The tor service starts fine but when I check nyx no
traffic goes through me, both download and upload is 0. Nyx shows
Unknown:portnumber. I doubt that the port is closed or somehow unavai
I already asked people who know why it happens. BadExit flag was added manually
> On Wednesday, 12. February 2025 6:12, Marco Moock via tor-relays
> [/webmail/send?to=tor-relays@lists.torproject.org] wrote:
>
>
>
> Am Wed, 12 Feb 2025 04:46:14 +
> schrieb ZK :
>
15 min from htop
RAM Capacity: 64GB + 64GB Swap
RAM Usage: 55G + 14G Swap (previously maxed out 64G and needed swap added)
Tor Relays: 30, 2 per IPv4
IPv4 Addresses: 15
Time: 45 days, 9/15/2022 - 10/30/2022
Traffic: 2 PB total. Max In: 2.15 gbps, Max Out: 2.15 gbps
Per Day: 40TB, (0.04 PB) = 2 PB /
On Wednesday, 19 February 2025 06:35 Tor at 1AEO wrote:
Already replied via PM.
> Can you say more on why you say this, "You can't fully utilize a /24 with 6x
> 64 core servers on a 100G Router."?
6x 64c/128t = 768
DirAuth's allow 8 relays/IP
A routed /24 256x8 =
On Friday, 21 February 2025 11:40 mail--- via tor-relays wrote:
> > Are the clock speeds you listed base or turbo numbers (3.4, 2.25 and 2.0
> > Ghz)?
CPU Data sheets provide more details.
> Base indeed. No CPU is able to consistently maintain their turbo speed on
> this ma
her
operating system may impact the performance/overhead (either positively or
negatively). Also your RAM budget of 4 GB per relay may be a bit on the safe
side, I don't think it would hurt to lower this.
> What are the primary factors that justify running up to two Tor relays per
>
is a show stopper.
Will this limit likely be (significantly) increased in future yubikey releases?
kind regards,
nusenu
[1] https://github.com/nusenu/ansible-relayor
--
https://nusenu.github.io
_______
tor-relays mailing list -- tor-relays@lists.torprojec
On Monday, 24 February 2025 15:32 Clara Engler via tor-relays wrote:
> This made me think about how we could solve that issue by storing the
> Ed25519 identity key on a Yubikey and let it sign the relevant
> certificates.
Nice feature, has been requested by some in recent years.
&g
On Saturday, 22 February 2025 06:49 Tor at 1AEO via tor-relays wrote:
> >> https://metrics.torproject.org/rs.html#search/185.220.101.
> >> We are 5 relay orgs sharing a /24. would be nice if you share the subnet
> >> with 1-2 other relay operators.
> Logisticall
Hi,
Many people already replied, but here are my (late) two cents.
> 1) If a full IPv4 /24 Class C was available to host Tor relays, what are some
>optimal ways to allocate bandwidth, CPU cores and RAM to maximize utilization
>of the IPv4 /24 for Tor?
"Optimal" depends on y
cores how many 8
where are you getting them from ?
On Wed, 19 Feb 2025, 03:47 boldsuck via tor-relays, <
tor-relays@lists.torproject.org> wrote:
> On Tuesday, 18 February 2025 17:00 usetor.wtf via tor-relays wrote:
> > Another question - what's the most optimal count of Tor
11 ? your luck. keep posted
On Wed, 19 Feb 2025, 03:48 Gurpinder, wrote:
> cores how many 8
> where are you getting them from ?
>
> On Wed, 19 Feb 2025, 03:47 boldsuck via tor-relays, <
> tor-relays@lists.torproject.org> wrote:
>
>> On Tuesday, 18 February 2025 1
On Tuesday, 18 February 2025 17:00 usetor.wtf via tor-relays wrote:
> Another question - what's the most optimal count of Tor relays per IP when
> using an IPv4 /24, i.e. roughly 256 IPs? Looking for thoughts / guidance as
> this can quickly be a costly endeavor with slow turn a
Hello,
We've reached our goal of 200 new WebTunnel bridges! But more bridges is
always better, and there's still time to join the campaign and help Tor
users bypass censorship. As a thank you, you'll also get a Tor t-shirt!
Read our blog post & bridge campaign rules for p
On Sunday, 9 March 2025 22:59 Tor at 1AEO via tor-relays wrote:
> New constraint - any guidance? Math seem right?
> All relay operators / families are limited to a maximum of ~360 Tor relays:
> https://gitlab.torproject.org/tpo/core/tor/-/issues/40837 I'll likely
> create an ac
On Monday, 10 March 2025 15:34 boldsuck via tor-relays wrote:
> The Tor network is a dynamic massive network and bandwidth contributions and
> overall consensus weight are constantly changing. When a larger operator
> (like NTH or RWTH Aachen) goes up or down everything changes.
>
, but our relays use
*significantly* less memory. You shouldn't need more than 128 GB of memory for
~10 Gb/s of Tor traffic, although 256 GB is recommended for some headroom for
attacks and spikes and such.
Could you share your general setup, software versions and Tor configuration?
Perhaps
901 - 1000 of 1440 matches
Mail list logo