[tor-relays] DirAuths are blocking my node on Amazon EC2. Why?

Tim Wilson-Brown - teor teor2345 at gmail.com
Mon Nov 2 06:38:13 UTC 2015


> On 31 Oct 2015, at 08:42, Yousif Al Saif <yousifnet at gmail.com> wrote:
> 
> On 10/31/15, 12:11 AM, "tor-relays on behalf of Philipp Winter" <tor-relays-bounces at lists.torproject.org on behalf of phw at nymity.ch> wrote:
> 
>> 
>> Was your relay doing experiments on onion services or Tor's distributed
>> hash table?
> 
> The node itself is not contributing much bandwidth but I am trying to maintain the limits set by the free tier of the Amazon EC2. Nevertheless, are experiments on Tor’s DHT not welcome?

Experiments on Tor's DHT often try to discover hidden service addresses. This is considered an attack, and relays that perform this attack are currently being blocked.

Tim

Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP 968F094B

teor at blah dot im
OTR CAD08081 9755866D 89E2A06F E3558B7F B5A9D14F

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20151102/8e988d0b/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20151102/8e988d0b/attachment.sig>


More information about the tor-relays mailing list