This is my public keyfile. I know this doesn't relate to this message but I couldn't find an actual email address to send it to.
I want to run a bridge relay but am having trouble setting it up.
On 8/2/2018 at 6:05 AM, conrad@rockenhaus.com wrote:I did want to note one thing about these big ASes... sure, they may be big ASes, but they are still lacking in one major area - Exits.
OVH has almost 4.5 Gbit/s of relay bandwidth available within the AS. However, if you search for exits, that rapidly drops to just under 750 mbit/s.
I'm more than positive all of the other big ASes are the same way.
A little off topic, but it just amazes me how much exit capacity these sites actually have, but people aren't willing to sign up for services whose TOS permits running an exit (or can't afford it), so they run a relay at an overly saturated site.
Thanks,
Conrad
--
Conrad Rockenhaus
Fingerprint: 8049 CDBA C385 C451 3348 776D 0F72 F2B5 26DA E93F
Public Key: https://pgp.key-server.io/pks/lookup?op=get&search=0x0F72F2B526DAE93F
https://www.rockenhaus.com
------
Get started with GreyPony Anonymization Today!
https://www.greyponyit.com
-----Original Message-----
From: tor-relays <tor-relays-bounces@lists.torproject.org> On Behalf Of nusenu
Sent: Sunday, July 29, 2018 4:43 PM
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] AS awareness
Mirimir:
> On 07/29/2018 02:26 PM, nusenu wrote:
>>>> If I know the relays IP I could give you the probabilities of your
>>>> relay relaying traffic to others in the same AS (since a relay will
>>>> usually not be used with others in the same /16 netblock)
>>>
>>> It'd be better for relays to avoid connecting within an AS, right?
>>
>> better according to what metric?
>
> Risk of coordinated compromise.
that is a very generic and short description
--
https://twitter.com/nusenu_
https://mastodon.social/@nusenu
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays