This is my public keyfile. I know this doesn't relate to this message but I couldn't find an actual email address to send it to. I want to run a bridge relay but am having trouble setting it up.
On 8/2/2018 at 6:05 AM, conrad@rockenhaus.com wrote:I did want to note one thing about these big ASes... sure, they may be big ASes, but they are still lacking in one major area - Exits.
OVH has almost 4.5 Gbit/s of relay bandwidth available within the AS. However, if you search for exits, that rapidly drops to just under 750 mbit/s.
I'm more than positive all of the other big ASes are the same way.
A little off topic, but it just amazes me how much exit capacity these sites actually have, but people aren't willing to sign up for services whose TOS permits running an exit (or can't afford it), so they run a relay at an overly saturated site.
Thanks,
Conrad
-- Conrad Rockenhaus Fingerprint: 8049 CDBA C385 C451 3348 776D 0F72 F2B5 26DA E93F Public Key: https://pgp.key-server.io/pks/lookup?op=get&search=0x0F72F2B526DAE93F https://www.rockenhaus.com ------ Get started with GreyPony Anonymization Today! https://www.greyponyit.com
-----Original Message----- From: tor-relays On Behalf Of nusenu Sent: Sunday, July 29, 2018 4:43 PM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] AS awareness Mirimir:
On 07/29/2018 02:26 PM, nusenu wrote:
If I know the relays IP I could give you the probabilities of
your
relay relaying traffic to others in the same AS (since a relay
will
usually not be used with others in the same /16 netblock)
It'd be better for relays to avoid connecting within an AS, right?
better according to what metric?
Risk of coordinated compromise.
that is a very generic and short description -- https://twitter.com/nusenu_ https://mastodon.social/@nusenu _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays