Re: how much to use big relays (was Re: bloxortsipt)
On Mon, Jan 04, 2010 at 08:23:28PM +0100, Olaf Selke wrote: > Roger Dingledine schrieb: > > You might instead ask about blutmagie, which at an advertised 41200 KB > > is 3% of the Tor network. > > Nevertheless I catch Roger's point. Is it a good idea exiting so > much/many (never really understood the difference ;-)) tor traffic thru > one exit gw? If it is not, I'm certainly going to reduce exit capacity > by torrc config. I think it's best to offer as much bandwidth as you want to offer, and then let the directory authorities decide how much weight you should get. For example, the bwauthority scripts currently compute how much weight the directory authority suggests that we give to each relay: https://svn.torproject.org/svn/torflow/trunk/NetworkScanners/BwAuthority/README.BwAuthorities http://gitweb.torproject.org/tor/tor.git/blob_plain/HEAD:/doc/spec/proposals/161-computing-bandwidth-adjustments.txt and they cap the vote they produce for any relay to 5% of the total weights they're voting on. So while blutmagie varies between 1% and 5% of the total network, it won't (I think) go higher than that. The big challenge here is to find the right balance between security (not too much centralization) and performance (making use of the bandwidth that relays offer). One theory is "make sure to provide really good decentralization, and one day when we have more relays it'll actually be usable", whereas the other theory is "use what you've got as best you can, and one day when we have more relays it'll be even safer". The 5% heuristic tries to pick the right balance between the two. I'm more willing to tend toward the second one now that we have active bw measurement rather than passive "believe what the relay tells you" measurement. > https://torstatus.blutmagie.de/index.php?SR=Bandwidth&SO=Desc For what it's worth, the numbers you see here aren't the numbers that client use when weighting their path selection. You can see the weights they use in your ~/.tor/cached-consensus file. It would be great if somebody wants to patch the torstatus so it can reflect that. More generally, here's a torstatus wishlist I wrote up a while ago: - Torstatus's relay listings should look in extrainfo descriptors and figure out the average actual bandwidth used by the relay. (Add up all the read and write histories, and divide by the number of seconds in the intervals.) That's the main bandwidth number it should show when ranking and sorting the relays. Maybe for completeness, we could add another column which just shows a number for the bandwidth the relay is advertising. - Be sure to grab the advertised bandwidth from the consensus (the "w" line), not from the descriptor. Clients use the one in the consensus as of Tor 0.2.1.18. - I think torstatus still uses its own "tor check" variant. We should make it use the tordnsel instead (e.g. via fetching the list of current IP addresses from the bulk exitlist at https://check.torproject.org/cgi-bin/TorBulkExitList.py and comparing locally). Volunteers happily encouraged. :) --Roger *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: git.torproject.org?
On Tue, Jan 05, 2010 at 01:42:05AM -, ya...@sdf.lonestar.org wrote: > Is git.torproject.org down for everybody? Or am I special? > > Just curious if there is an uptime ETA or something... > > Just noticed my daily updates failed 2 days in a row... Yep, it's down for now. We're setting up a new host that will serve just git. The machine it's on right now provides too many services, and it looks like it may have had some potential security issues recently. While we investigate them, it seems smartest to leave some services down until we've moved them to a more robust location. It will hopefully be back up in a few days. Or for those that can't wait, you might like http://gitweb.torproject.org/ Thanks, --Roger *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
git.torproject.org?
Is git.torproject.org down for everybody? Or am I special? Just curious if there is an uptime ETA or something... Just noticed my daily updates failed 2 days in a row... --gene *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: [Kraut] Re: tor-proxy.net
Thus my exit node still neither collects any data nor do I store any (already not existing) logs for six months. So there is, even in germany, the possiblity not to store anything at all. That would be possible for tor-proxy.net aswell...but hey, they have several ads on their landing page, so your privacy is gone once you call their main page ;) I have https://morphium.info/, an anonymous web proxy, and I'm sitting in germany, too. I never had logs there (and will never have), and the law enforcment has to accept it, that I can not retain logs where logs aren't created. Best regards, morphium signature.asc Description: OpenPGP digital signature
Re: [Kraut] Re: tor-proxy.net
Thanks much for the info everyone, and thanks for the links Karsten N. On Sun, Jan 3, 2010 at 7:52 PM, Olaf Selke wrote: > Benjamin S. schrieb: > > > > I don't know if anonymouse is logging and if so, under which > > circumstances they give those logs. I do log, because I'm sitting in > > Germany where I'm forced to do so by the data retention law. > > to make a long story short: I'm on Bundesnetzagentur's radar since at > least one year by police's request regarding obligation for data > retention "ยง113a TKG Vorratsdatenspeicherung". In June 2009 there has > been some correspondence in writing between the Bundesnetzagentur and my > lawyer. In the end they no longer threatened me with a fine for > violating German data retention law. Thus my exit node still neither > collects any data nor do I store any (already not existing) logs for six > months. > > > Even I'm law-student, so I know a little bit 'bout when I have to give > > away the logs and when not. (you can read about this here[1]) > > Germany situation is such that you have to hand over your logs on > authority's request. There's no choice to retain them. > > Olaf > > * the German Bundesnetzagentur is similar to the Ofcom in the UK. > http://en.wikipedia.org/wiki/Ofcom > *** > To unsubscribe, send an e-mail to majord...@torproject.org with > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ >
Re: I exclude all bloxortsipt nodes in my tor use
Roger Dingledine schrieb: > > You might instead ask about blutmagie, which at an advertised 41200 KB > is 3% of the Tor network. I'm pushing hard with all kind of gcc/icc compiler optimizations but at about 170 MBit/s throughput the E8600 cpu is running at its limits. Unfortunately server bios doesn't come up with overclocking features. Nevertheless I catch Roger's point. Is it a good idea exiting so much/many (never really understood the difference ;-)) tor traffic thru one exit gw? If it is not, I'm certainly going to reduce exit capacity by torrc config. https://torstatus.blutmagie.de/index.php?SR=Bandwidth&SO=Desc Olaf *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
A question
Hi, everyone! There is a question! When I configure my Tor to use bridges to connect to network, how my Tor get other Tor routers' descriptors and information? Is it like: MyTor -> bridges -> DirectoryServer and the DirServer returns the descriptors or: MyTor -> bridge and the bridge returns its own descriptors ? Thanks a lot!
Re: signal newnym and rate limiting
On Mon, 04 Jan 2010 12:34:39 +0100 Nico Weinreich wrote: >Hi, in tor log I can see, that tor delayes sometimes the newnym signal. >Is there a way to get this information (including the delayed time in >seconds) trough control port after sending the newnym signal? Cheers I didn't know that tor could be so pokey about acknowledging input from the control port, but I've noted here in the past that tor often ignores a SIGHUP or SIGINT for a rather long period of time before finally accepting it. I've seen delays well over a minute and approaching two minutes after sending tor either of those signals before it finally responds. Why? I have no idea. The only way I know of to see the delay time is to watch the log file. Scott Bennett, Comm. ASMELG, CFIAG ** * Internet: bennett at cs.niu.edu * ** * "A well regulated and disciplined militia, is at all times a good * * objection to the introduction of that bane of all free governments * * -- a standing army." * *-- Gov. John Hancock, New York Journal, 28 January 1790 * ** *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
signal newnym and rate limiting
Hi, in tor log I can see, that tor delayes sometimes the newnym signal. Is there a way to get this information (including the delayed time in seconds) trough control port after sending the newnym signal? Cheers *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/