Re: [tor-relays] Need help to get TorDNSEL compiled

2013-07-30 Thread Lunar
BlueStar88:
 Got this error on precise:
 
 ---
 # ./Setup.lhs build
 Building TorDNSEL-0.1.1...
 Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1...
 
 src/TorDNSEL/Statistics/Internals.hs:2:16:
 Warning: -fglasgow-exts is deprecated: Use individual extensions instead
 
 no location info: 
 Failing due to -Werror.
 ---
 
 Any suggestions on this?

Remove -Werror from the cabal file.

-- 
Lunar lu...@torproject.org


signature.asc
Description: Digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Need help to get TorDNSEL compiled

2013-07-30 Thread Nick
Hi BluStar88,

Quoth BlueStar88:
 Got this error on precise:
 
 ...
 
 no location info: 
 Failing due to -Werror.

It may not help, but you could try deleting the two instances of 
-Werror in the tordnsel.cabal.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-30 Thread Andy Isaacson
On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote:
 On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote:
  Yes, there are cases of law enforcement seizing all computer gear from a
  house with a exit node -- not just the exit node computer.  Most
  recently in Austria in a child porn investigation.
 
 We did some operational planning for this risk, in conjunction with
 the university legal and IT departments, when we set up the CMU Tor
 exit.

Similarly for Noisebridge / Noisetor, we decided to host at a commercial
facility separate from our production servers both for
cost-per-bandwidth and separation-of-risk reasons.

I don't think it's very likely that cops would bust down a door at CMU
to sieze equipment under an ill-conceived investigation; having an
institution is quite helpful in getting the cops to actually do their
jobs and validate their suspicions.  (Unfortunately.)

 Also, the greater operational threat is having the plug pulled by
 one's connectivity provider.  I personally would not risk having an
 exit node in my house for that reason alone.

In my case (and, I suspect, most of us well paid techies), I would be
back online with new hardware and a 4G modem a few hours after the cops
finished their smash-and-grab, so while losing the higher bandwidth of
the fixed line and the use of my hardware would be quite inconvenient,
it wouldn't be the end of the world.  It's important to have a
contingency plan for this case, though.

-andy
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Home broadband - worth running a relay?

2013-07-30 Thread Samuel Walker
Bridges ideally have very stable IPs, as their addresses aren't stored in an 
hourly consensus, but are instead handed out as needed. This isn't such an 
issue with normal relays as they ill drop out of the consensus after an hour - 
but it does depend how frequently / predictably the IP address changes. IT 
would be hard to build up a stable flag for example.

On 22 Jul 2013, at 10:14, Nick tor-rel...@njw.me.uk wrote:

 Thanks for the advice everyone, I ended up setting up a bridge node.
 
 However I just noticed in looking at the logs that my ISP seem to 
 disconnect me to reassign my IP address several times a day. Which 
 seems like rather terrible service. Presumably that makes my bridge 
 a lot less useful, as the IP address has such a short lifespan?
 
 I tested my broadband speed today and it's around 6.5Mib/s down, 
 410Kib/s up, so somewhat faster than I originally guessed. But with 
 so unstable a connection I suppose even a regular relay may not be 
 worthwhile. Am I correct? It did seem to do well at sending and 
 receiving plenty of traffic when I set it as a normal relay, but if 
 it's also the cause of lots of dropped connections then maybe it 
 wouldn't be worth it.
 
 I know I should look into a VPS thing, I've just never used them and 
 like the idea of putting my home server and bandwidth to more use.
 
 My ISP is the post office, on the broadband extra package. I chose 
 it mainly because it's cheap if you use their phone service too, but 
 the regular disconnections, plus their soon-to-come-into-effect new 
 AUP, make me unsure about whether that was a good idea. I don't know 
 of any good and vaguely affordable ISP in the UK anymore, though, 
 now that Be have gone away.
 
 Nick
 
 Quoth Richard Edmondson:
 Hi Nick,
 
 I'm not sure whether the stories are true or not but I have heard of
 people having their computer kit confiscated for running an exit node.
 
 I'd go for a non-exit relay and see how that works. You can limit the
 bandwidth the node will use, so if you find it eats up all your resource,
 you can lower it.
 
 Just out of interest, which ISP do you use. I'm on Talk Talk and I'm
 having a lot of hassle setting up a non-exit relay. Just can't seem to get
 it to stay on-line.
 
 Cheers,
 Richard
 
 
 Hi there,
 
 I have a reasonable ADSL connection, and a little always-on server.
 The bandwidth is in the region of 2Mib/s down, something less up
 (maybe 256Kib/s). Is it useful for me to run a tor relay with this
 bandwidth? I'd like to run one which isn't an exit, at least for
 now.
 
 If not, am I correct in thinking that a bridge is an appropriate
 help? That's what I'm doing currently, but if a relay would be more
 useful I'd be very happy to do that.
 
 One other unrelated(ish) question: I'm in the UK, where the idea of
 censorship isn't resisted as strongly as it ought to be, and as a
 result my internet connection is subject to a smallish amount of
 censorship: whatever is on the secret IWF blacklist plus the pirate
 bay. Does this mean that running an exit node from a home connection
 here at some point in the future would not be helpful? Or only if
 all HTTP(S) was blocked (as the IWF blacklist is secret there's
 presumably no way to tell the tor network what is inaccessible from
 this node).
 
 Thanks in advance,
 
 Nick
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
 
 -- 
 Best Wishes,
 Richard
 
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Home broadband - worth running a relay?

2013-07-30 Thread Gordon Morehouse
It'd be nice if dynamic DNS could solve this somehow, but it can't with
the current implementation.  :/

I think this may only get worse now that we're essentially out of IPv4
space.

-Gordon


Samuel Walker:
 Bridges ideally have very stable IPs, as their addresses aren't stored in an 
 hourly consensus, but are instead handed out as needed. This isn't such an 
 issue with normal relays as they ill drop out of the consensus after an hour 
 - but it does depend how frequently / predictably the IP address changes. IT 
 would be hard to build up a stable flag for example.
 
 On 22 Jul 2013, at 10:14, Nick tor-rel...@njw.me.uk wrote:
 
 Thanks for the advice everyone, I ended up setting up a bridge node.

 However I just noticed in looking at the logs that my ISP seem to 
 disconnect me to reassign my IP address several times a day. Which 
 seems like rather terrible service. Presumably that makes my bridge 
 a lot less useful, as the IP address has such a short lifespan?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Sitevalley is no longer Tor-friendly

2013-07-30 Thread Chris Patti
That stinks.

Linode has the same policy WRT exit relays.

If they get too many abuse complaints, they ask you to stop running a
relay.  The way US law is structured, I can't actually blame them for this.

However they don't care if you're running a middle node. Your
bandwidth/VPS, your call.   A *lot* of people run bridge nodes there,
myself included.

-Chris
(Running an exit relay in the US cost effectively seems quite difficult)



On Thu, Jul 18, 2013 at 11:51 AM, mick m...@rlogin.net wrote:

 On Thu, 18 Jul 2013 10:49:46 -0400
 Tom Ritter t...@ritter.vg allegedly wrote:

  Sending this out, as I suspect I am not the only person running a node
  on SiteValley, as they have pretty good bandwidth for pretty cheap.
 
  I had inquired in the beginning if they allowed Tor, and they said
  yes, but if we get too many abuse complaints we'll shut it down.  So
  maybe 4 or 5 abuse complaints later they did indeed give me the
  ultimatum to shut it down or get shut down.  So I made them give me a
  new IP address, and made it into a middle node.  (The new IP was
  because I was thinking of making it a bridge.)

 Hmm. Pretty crummy AUP. And /very/ crummy treatment of a customer.

 I wonder if we are going to see more of this sort of thing now. I
 think the tor network needs greater geographic diversity.

 Mick

 -

  Mick Morgan
  gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
  http://baldric.net

 -


 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




-- 
Christopher Patti - Geek At Large | GTalk: cpa...@gmail.com | AIM:
chrisfeohpatti | P: (260) 54PATTI
Technology challenges art, art inspires technology. - John Lasseter,
Pixar
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Home broadband - worth running a relay?

2013-07-30 Thread Roger Dingledine
On Tue, Jul 30, 2013 at 05:13:09PM +0200, Andreas Krey wrote:
 On Tue, 30 Jul 2013 08:03:58 +, Gordon Morehouse wrote:
  It'd be nice if dynamic DNS could solve this somehow, but it can't with
  the current implementation.  :/
 
 Even if - it wouldn't help those users that have an open connection
 through the bridge (or relay) while it does change IP address.
 
 I don't like my ssh sessions severed...

Relays that don't have sufficient mean-time-between-failure don't get the
Stable flag, and streams whose destination ports are in the LongLivedPorts
list avoid relays that don't have the Stable flag.

  V(LongLivedPorts,  CSV,
21,22,706,1863,5050,5190,5222,5223,6523,6667,6697,8300),

Currently moria1 is voting 1068997 seconds for the MTBF threshold,
i.e. a bit over 12 days.

So dynamic relays can still be useful, and hopefully we won't end up
cutting too many ssh sessions.

--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-30 Thread grarpamp
On Tue, Jul 30, 2013 at 6:50 AM, Andy Isaacson a...@hexapodia.org wrote:
 On Mon, Jul 29, 2013 at 01:23:13PM -0400, Zack Weinberg wrote:
 On Mon, Jul 29, 2013 at 12:35 PM, Andy Isaacson a...@hexapodia.org wrote:
  Yes, there are cases of law enforcement seizing all computer gear from a
  house with a exit node -- not just the exit node computer.  Most
  recently in Austria in a child porn investigation.

 We did some operational planning for this risk, in conjunction with
 the university legal and IT departments, when we set up the CMU Tor
 exit.

 Similarly for Noisebridge / Noisetor, we decided to host at a commercial
 facility separate from our production servers both for
 cost-per-bandwidth and separation-of-risk reasons.

Physical standoff distance and preparation is certainly best.
Similarly, has anyone ever put a Tor/EFF exit relay notice and
contact info on their door? Let their neighbors and/or flatmates
know? Consulted with agencies likely to service warrants?
Not to stop such legal process, but to lessen through education
some of the risks involved.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fwd: Computer requirements for a modest (15-20Mbs) relay?

2013-07-30 Thread Andy Isaacson
On Tue, Jul 30, 2013 at 06:20:29PM -0400, grarpamp wrote:
 Similarly, has anyone ever put a Tor/EFF exit relay notice and
 contact info on their door? Let their neighbors and/or flatmates
 know? Consulted with agencies likely to service warrants?
 Not to stop such legal process, but to lessen through education
 some of the risks involved.

Noisebridge has a flier which is printed and available near the door.
Part of the material is aimed at the volunteer who answers the door to
the law enforcement official; part of the material is aimed at the
official.  The material is at

https://www.noisebridge.net/wiki/Noisebridge_Tor/FBI

Since the volunteer who opens the door probably hasn't been directly
trained to handle this situation, it's difficult to provide really good
management of the situation.

Also since the IP address is obviously not at the physical address of
the hackerspace, and the primary contact for LE is by phone, there
aren't very many visits.  We've gotten visits from the Secret Service
and the FBI and the volunteers report that it has been straightforward.
Haven't had a visit or a call in several months; I suspect the word has
gotten around the office that it's not a fruitful avenue of
investigation.

-andy
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Home broadband - worth running a relay?

2013-07-30 Thread Moritz Bartl
On 31.07.2013 04:48, Gordon Morehouse wrote:
 True.  And veering OT, but have you tried mosh yet?  It's ideal for some
 situations over Tor, or where the client changes connections often.
 http://mosh.mit.edu/

Mosh is great, but it still relies exclusively on UDP, right? So no
over Tor...

-- 
Moritz Bartl
https://www.torservers.net/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Home broadband - worth running a relay?

2013-07-30 Thread Gordon Morehouse
Andreas Krey:
 On Tue, 30 Jul 2013 08:03:58 +, Gordon Morehouse wrote:
 It'd be nice if dynamic DNS could solve this somehow, but it can't with
 the current implementation.  :/
 
 Even if - it wouldn't help those users that have an open connection
 through the bridge (or relay) while it does change IP address.
 
 I don't like my ssh sessions severed...

True.  And veering OT, but have you tried mosh yet?  It's ideal for some
situations over Tor, or where the client changes connections often.

http://mosh.mit.edu/

-Gordon


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays