[tor-relays] Network scan results for CVE-2016-5696 / RFC5961
pa011
pa011 at web.de
Sat Dec 10 20:52:39 UTC 2016
Am 10.12.2016 um 21:12 schrieb Ivan Markin:
> pa011:
>> What about relays not on the list at all?
>
> You mean that are not subscribed for tor-relays@?
No, forget that one - was my mistakable in the spreadsheet
>
> btw, it would be awesome to give away t-shirts or something for running
> diverse relays.
that was a least a promise the year ago (its not any more)- and I believe one should stand to his promises
>
>> I would assume that not everybody of that 23 percent does know what
>> exactly to do, apart from better running on BSD - could you please
>> give detailed recommendation for beginners - your discussion seems on
>> a high level :-)
>
> Agree, I personally don't see any way to notify these operators about
> what to do (except clear instructions at blog.tpo or tor-relays@).
> With pleasure.
Yes please spread this out - as simple as possible - the list has about 1700 hundret subscribers I, if I am correct - I reckon the important and interested ones are on it
There is an awesome The Tor BSD Diversity Project. The
> instructions for BSD beginners can be found here [1].
I used them about a week ago - they were the best I could find - sure they have room for improvement, especially for beginners, but there are several nice people out there -glad to help - some awful question have me done here by me already
> [1] https://torbsd.github.io/relay-guides.html
Could you give some explanation please on the difference between:
-lots of challenge ACKs
-multiple challenge ACKs
-one challenge ACK
-two challenge ACKs
-vulnerable
-zero challenge
Thanks
Paul
More information about the tor-relays
mailing list