Hey folks!
How about trying it with /8 and if that fails falling back to /16.
Is it possible to set the limit to /14 /12 or maybe /10?
And Conrad, the main concern is mostly like in my case to get kicked out while you still have production systems running or the worst case a police raid.
Best Regards Tobias
Am 02.08.2018 um 08:05 schrieb conrad@rockenhaus.com conrad@rockenhaus.com:
I did want to note one thing about these big ASes... sure, they may be big ASes, but they are still lacking in one major area - Exits.
OVH has almost 4.5 Gbit/s of relay bandwidth available within the AS. However, if you search for exits, that rapidly drops to just under 750 mbit/s.
I'm more than positive all of the other big ASes are the same way.
A little off topic, but it just amazes me how much exit capacity these sites actually have, but people aren't willing to sign up for services whose TOS permits running an exit (or can't afford it), so they run a relay at an overly saturated site.
Thanks,
Conrad
-- Conrad Rockenhaus Fingerprint: 8049 CDBA C385 C451 3348 776D 0F72 F2B5 26DA E93F Public Key: https://pgp.key-server.io/pks/lookup?op=get&search=0x0F72F2B526DAE93F https://www.rockenhaus.com
Get started with GreyPony Anonymization Today! https://www.greyponyit.com
-----Original Message----- From: tor-relays tor-relays-bounces@lists.torproject.org On Behalf Of nusenu Sent: Sunday, July 29, 2018 4:43 PM To: tor-relays@lists.torproject.org Subject: Re: [tor-relays] AS awareness
Mirimir:
On 07/29/2018 02:26 PM, nusenu wrote:
If I know the relays IP I could give you the probabilities of your relay relaying traffic to others in the same AS (since a relay will usually not be used with others in the same /16 netblock)
It'd be better for relays to avoid connecting within an AS, right?
better according to what metric?
Risk of coordinated compromise.
that is a very generic and short description
-- https://twitter.com/nusenu_ https://mastodon.social/@nusenu
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays