Delivery-Date: Thu, 01 Oct 2015 02:49:44 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 15A0C1E0437;
	Thu,  1 Oct 2015 02:49:43 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id A994937853;
	Thu,  1 Oct 2015 06:49:35 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 3A89437834
 for <tor-talk@lists.torproject.org>; Thu,  1 Oct 2015 06:49:32 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id PSuGxF_KA3rk for <tor-talk@lists.torproject.org>;
 Thu,  1 Oct 2015 06:49:32 +0000 (UTC)
Received: from mail.headstrong.de (mail.headstrong.de [81.7.4.112])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 0B6CA377CD
 for <tor-talk@lists.torproject.org>; Thu,  1 Oct 2015 06:49:32 +0000 (UTC)
Received: from localhost (localhost.localdomain [127.0.0.1])
 by mail.headstrong.de (Postfix) with ESMTP id 0833A1C001E6
 for <tor-talk@lists.torproject.org>; Thu,  1 Oct 2015 08:49:29 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=headstrong.de;
 h=content-transfer-encoding:content-type:content-type
 :in-reply-to:references:subject:subject:mime-version:from:from
 :date:date:message-id:received; s=mail; t=1443682168; x=
 1445496569; bh=688Ntv5q9vcZ2v0Ud9FGI+V7jTne+WwMefMToE1DOwQ=; b=N
 bO734a+qwlx+6SQpsc4Hki1kYRaQTNAl0KUX44QQBSsHybzUIl5qaQkGhoKlIQIJ
 YEvKzkl8FLDA/QK1SN7eIbn+LjwPwlZ76aHzrU36fKr2TztSYALh4YM4ohx5Pq8O
 JoXNb8wD5rPxxvKaW8bVH7fak/wDT9P+zWq2WwaebQ=
X-Virus-Scanned: Debian amavisd-new at mail.headstrong.de
Received: from mail.headstrong.de ([127.0.0.1])
 by localhost (mail.headstrong.de [127.0.0.1]) (amavisd-new, port 10026)
 with ESMTP id NI2ZsT3E9U25 for <tor-talk@lists.torproject.org>;
 Thu,  1 Oct 2015 08:49:28 +0200 (CEST)
Message-ID: <560CD778.9010904@torservers.net>
Date: Thu, 01 Oct 2015 08:49:28 +0200
From: Moritz Bartl <moritz@torservers.net>
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <cca943d8ec30986aaec15e346d2f5ddb@cajuntechie.org>
In-Reply-To: <cca943d8ec30986aaec15e346d2f5ddb@cajuntechie.org>
Subject: Re: [tor-talk] Turn off relaying for a HS
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On 10/01/2015 04:24 AM, Cypher wrote:
> I'm setting up a new Hidden Service and I need to figure out how to turn
> off relaying. I remember this being discussed a while back on this list
> but can't find it. How do I turn relaying off on a HS node?

Simply remove the ORPort statement(s) from your torrc to disable
relaying. In fact, hidden services should not be hosted on (public)
relays, since it is then quite easy from the outside to correlate
downtimes of a relay with downtimes of a hidden service.

-- 
Moritz Bartl
https://www.torservers.net/
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

