Re: [tor-relays] Need help to get TorDNSEL compiled
BlueStar88: Got this error on precise: --- # ./Setup.lhs build Building TorDNSEL-0.1.1... Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1... src/TorDNSEL/Statistics/Internals.hs:2:16: Warning: -fglasgow-exts is deprecated: Use individual extensions instead no location info: Failing due to -Werror. --- Any suggestions on this? Remove -Werror from the cabal file. -- Lunar lu...@torproject.org signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Need help to get TorDNSEL compiled
Hi BluStar88, Quoth BlueStar88: Got this error on precise: ... no location info: Failing due to -Werror. It may not help, but you could try deleting the two instances of -Werror in the tordnsel.cabal. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?
On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote: On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote: Yes, there are cases of law enforcement seizing all computer gear from a house with a exit node -- not just the exit node computer. Most recently in Austria in a child porn investigation. We did some operational planning for this risk, in conjunction with the university legal and IT departments, when we set up the CMU Tor exit. Similarly for Noisebridge / Noisetor, we decided to host at a commercial facility separate from our production servers both for cost-per-bandwidth and separation-of-risk reasons. I don't think it's very likely that cops would bust down a door at CMU to sieze equipment under an ill-conceived investigation; having an institution is quite helpful in getting the cops to actually do their jobs and validate their suspicions. (Unfortunately.) Also, the greater operational threat is having the plug pulled by one's connectivity provider. I personally would not risk having an exit node in my house for that reason alone. In my case (and, I suspect, most of us well paid techies), I would be back online with new hardware and a 4G modem a few hours after the cops finished their smash-and-grab, so while losing the higher bandwidth of the fixed line and the use of my hardware would be quite inconvenient, it wouldn't be the end of the world. It's important to have a contingency plan for this case, though. -andy ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Home broadband - worth running a relay?
Bridges ideally have very stable IPs, as their addresses aren't stored in an hourly consensus, but are instead handed out as needed. This isn't such an issue with normal relays as they ill drop out of the consensus after an hour - but it does depend how frequently / predictably the IP address changes. IT would be hard to build up a stable flag for example. On 22 Jul 2013, at 10:14, Nick tor-rel...@njw.me.uk wrote: Thanks for the advice everyone, I ended up setting up a bridge node. However I just noticed in looking at the logs that my ISP seem to disconnect me to reassign my IP address several times a day. Which seems like rather terrible service. Presumably that makes my bridge a lot less useful, as the IP address has such a short lifespan? I tested my broadband speed today and it's around 6.5Mib/s down, 410Kib/s up, so somewhat faster than I originally guessed. But with so unstable a connection I suppose even a regular relay may not be worthwhile. Am I correct? It did seem to do well at sending and receiving plenty of traffic when I set it as a normal relay, but if it's also the cause of lots of dropped connections then maybe it wouldn't be worth it. I know I should look into a VPS thing, I've just never used them and like the idea of putting my home server and bandwidth to more use. My ISP is the post office, on the broadband extra package. I chose it mainly because it's cheap if you use their phone service too, but the regular disconnections, plus their soon-to-come-into-effect new AUP, make me unsure about whether that was a good idea. I don't know of any good and vaguely affordable ISP in the UK anymore, though, now that Be have gone away. Nick Quoth Richard Edmondson: Hi Nick, I'm not sure whether the stories are true or not but I have heard of people having their computer kit confiscated for running an exit node. I'd go for a non-exit relay and see how that works. You can limit the bandwidth the node will use, so if you find it eats up all your resource, you can lower it. Just out of interest, which ISP do you use. I'm on Talk Talk and I'm having a lot of hassle setting up a non-exit relay. Just can't seem to get it to stay on-line. Cheers, Richard Hi there, I have a reasonable ADSL connection, and a little always-on server. The bandwidth is in the region of 2Mib/s down, something less up (maybe 256Kib/s). Is it useful for me to run a tor relay with this bandwidth? I'd like to run one which isn't an exit, at least for now. If not, am I correct in thinking that a bridge is an appropriate help? That's what I'm doing currently, but if a relay would be more useful I'd be very happy to do that. One other unrelated(ish) question: I'm in the UK, where the idea of censorship isn't resisted as strongly as it ought to be, and as a result my internet connection is subject to a smallish amount of censorship: whatever is on the secret IWF blacklist plus the pirate bay. Does this mean that running an exit node from a home connection here at some point in the future would not be helpful? Or only if all HTTP(S) was blocked (as the IWF blacklist is secret there's presumably no way to tell the tor network what is inaccessible from this node). Thanks in advance, Nick ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -- Best Wishes, Richard ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays signature.asc Description: Message signed with OpenPGP using GPGMail ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Home broadband - worth running a relay?
It'd be nice if dynamic DNS could solve this somehow, but it can't with the current implementation. :/ I think this may only get worse now that we're essentially out of IPv4 space. -Gordon Samuel Walker: Bridges ideally have very stable IPs, as their addresses aren't stored in an hourly consensus, but are instead handed out as needed. This isn't such an issue with normal relays as they ill drop out of the consensus after an hour - but it does depend how frequently / predictably the IP address changes. IT would be hard to build up a stable flag for example. On 22 Jul 2013, at 10:14, Nick tor-rel...@njw.me.uk wrote: Thanks for the advice everyone, I ended up setting up a bridge node. However I just noticed in looking at the logs that my ISP seem to disconnect me to reassign my IP address several times a day. Which seems like rather terrible service. Presumably that makes my bridge a lot less useful, as the IP address has such a short lifespan? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Sitevalley is no longer Tor-friendly
That stinks. Linode has the same policy WRT exit relays. If they get too many abuse complaints, they ask you to stop running a relay. The way US law is structured, I can't actually blame them for this. However they don't care if you're running a middle node. Your bandwidth/VPS, your call. A *lot* of people run bridge nodes there, myself included. -Chris (Running an exit relay in the US cost effectively seems quite difficult) On Thu, Jul 18, 2013 at 11:51 AM, mick m...@rlogin.net wrote: On Thu, 18 Jul 2013 10:49:46 -0400 Tom Ritter t...@ritter.vg allegedly wrote: Sending this out, as I suspect I am not the only person running a node on SiteValley, as they have pretty good bandwidth for pretty cheap. I had inquired in the beginning if they allowed Tor, and they said yes, but if we get too many abuse complaints we'll shut it down. So maybe 4 or 5 abuse complaints later they did indeed give me the ultimatum to shut it down or get shut down. So I made them give me a new IP address, and made it into a middle node. (The new IP was because I was thinking of making it a bridge.) Hmm. Pretty crummy AUP. And /very/ crummy treatment of a customer. I wonder if we are going to see more of this sort of thing now. I think the tor network needs greater geographic diversity. Mick - Mick Morgan gpg fingerprint: FC23 3338 F664 5E66 876B 72C0 0A1F E60B 5BAD D312 http://baldric.net - ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -- Christopher Patti - Geek At Large | GTalk: cpa...@gmail.com | AIM: chrisfeohpatti | P: (260) 54PATTI Technology challenges art, art inspires technology. - John Lasseter, Pixar ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Home broadband - worth running a relay?
On Tue, Jul 30, 2013 at 05:13:09PM +0200, Andreas Krey wrote: On Tue, 30 Jul 2013 08:03:58 +, Gordon Morehouse wrote: It'd be nice if dynamic DNS could solve this somehow, but it can't with the current implementation. :/ Even if - it wouldn't help those users that have an open connection through the bridge (or relay) while it does change IP address. I don't like my ssh sessions severed... Relays that don't have sufficient mean-time-between-failure don't get the Stable flag, and streams whose destination ports are in the LongLivedPorts list avoid relays that don't have the Stable flag. V(LongLivedPorts, CSV, 21,22,706,1863,5050,5190,5222,5223,6523,6667,6697,8300), Currently moria1 is voting 1068997 seconds for the MTBF threshold, i.e. a bit over 12 days. So dynamic relays can still be useful, and hopefully we won't end up cutting too many ssh sessions. --Roger ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?
On Tue, Jul 30, 2013 at 6:50 AM, Andy Isaacson a...@hexapodia.org wrote: On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote: On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote: Yes, there are cases of law enforcement seizing all computer gear from a house with a exit node -- not just the exit node computer. Most recently in Austria in a child porn investigation. We did some operational planning for this risk, in conjunction with the university legal and IT departments, when we set up the CMU Tor exit. Similarly for Noisebridge / Noisetor, we decided to host at a commercial facility separate from our production servers both for cost-per-bandwidth and separation-of-risk reasons. Physical standoff distance and preparation is certainly best. Similarly, has anyone ever put a Tor/EFF exit relay notice and contact info on their door? Let their neighbors and/or flatmates know? Consulted with agencies likely to service warrants? Not to stop such legal process, but to lessen through education some of the risks involved. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?
On Tue, Jul 30, 2013 at 06:20:29PM -0400, grarpamp wrote: Similarly, has anyone ever put a Tor/EFF exit relay notice and contact info on their door? Let their neighbors and/or flatmates know? Consulted with agencies likely to service warrants? Not to stop such legal process, but to lessen through education some of the risks involved. Noisebridge has a flier which is printed and available near the door. Part of the material is aimed at the volunteer who answers the door to the law enforcement official; part of the material is aimed at the official. The material is at https://www.noisebridge.net/wiki/Noisebridge_Tor/FBI Since the volunteer who opens the door probably hasn't been directly trained to handle this situation, it's difficult to provide really good management of the situation. Also since the IP address is obviously not at the physical address of the hackerspace, and the primary contact for LE is by phone, there aren't very many visits. We've gotten visits from the Secret Service and the FBI and the volunteers report that it has been straightforward. Haven't had a visit or a call in several months; I suspect the word has gotten around the office that it's not a fruitful avenue of investigation. -andy ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Home broadband - worth running a relay?
On 31.07.2013 04:48, Gordon Morehouse wrote: True. And veering OT, but have you tried mosh yet? It's ideal for some situations over Tor, or where the client changes connections often. http://mosh.mit.edu/ Mosh is great, but it still relies exclusively on UDP, right? So no over Tor... -- Moritz Bartl https://www.torservers.net/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Home broadband - worth running a relay?
Andreas Krey: On Tue, 30 Jul 2013 08:03:58 +, Gordon Morehouse wrote: It'd be nice if dynamic DNS could solve this somehow, but it can't with the current implementation. :/ Even if - it wouldn't help those users that have an open connection through the bridge (or relay) while it does change IP address. I don't like my ssh sessions severed... True. And veering OT, but have you tried mosh yet? It's ideal for some situations over Tor, or where the client changes connections often. http://mosh.mit.edu/ -Gordon ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays