Re: [tor-relays] Traceroute measurement from Tor relays

2013-10-24 Thread Geoff Down
On Wed, Oct 23, 2013, at 04:09 PM, Karsten Loesing wrote:
 The measurements will work best if you have the scamper tool from
 the Cooperative Association for Internet Data Analysis (CAIDA)
 installed (see the README for installation instructions). 

Your README should probably explicitly say that you need to run
sudo chmod 04555 /path/to/scamper
after installing scamper or it won't work.
GD

-- 
http://www.fastmail.fm - Or how I learned to stop worrying and
  love email again

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Cheap non exit relay recommendation

2013-10-24 Thread Roman Mamedov
On Thu, 24 Oct 2013 19:08:22 +0200
Christian Dietrich christian.d.dietr...@gmail.com wrote:

 Anyway, i can recommend my current hoster for non exit tor nodes, you 
 will get:
 
 HP ML310e G8 Server (/w iLO4)
 Intel XEON E3-1230v2 (4x 3,3 GHz /w HT)
 16 GB DDR3 ECC
 2x 1 TB SATA RAID1 Disks
 1000mbit unmetered traffic (pushed ~100 TB so far, no problems)
 1 IPv4 Adress (5,-€ per additional) / /64 IPv6
 for 69,99€ (currently ~96 USD)
 
 hXXp://goo.gl/pXkb78
 
 Germany based. I think this is currently the best deal for non exit relays.

Thanks, definitely very interesting/useful.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] running Tor relay live with AddressSanitizer

2013-10-24 Thread starlight . 2013q4
Has anyone tried running a live relay with
an image built using GCC 4.8 and
-fsanitize=address?

AddressSanitizer documentation says it should
be no worse than about x4 on CPU and typically
about x2, so it looks reasonable to try.
I'm seeing peak CPU of about 7-8% of a 2.2GHz
AMD core.

I'd probably create a static build, with
'libevent' and 'tor' compiled using

  -fsanitize=address -O1 -fno-omit-frame-pointer -g

per the Google documentation and 'libz' compiled
normally since 'zlib' is stable and mature.

Any thoughts or experience?

Thanks

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Traceroute measurement from Tor relays

2013-10-24 Thread Jesse Victors

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


 That's where you come in. To figure out where traffic travels from
 your relay, we'd like you to run a bunch of traceroutes - network
 measurements that show the paths traffic takes. This is a one-time
 experiment for now, but, depending on what we find out, regularly
 making such measurements may become a part of Tor itself. We have
 already gotten some results thanks to Linus Nordberg of DFRI and
 Moritz Bartl of
 torservers.net, and now it's time to ask all relay operators to help.
 We would like to start this right away.
How much bandwidth will this be taking up, and roughly how much will be
uploaded/downloaded? I've cloned the repo, but I'm nervous about running
this if it's going to be a significant bandwidth hog for a whole week.
As Aaron said in Issue 39, it looks like it's going to be a lot of IPs
and a large amount of packets. Also, ISPs may not take kindly to all
these scans. What's the word on that? Has anyone run this tool, and
what's their opinion? I'd be happy to help, but I'd like to know the
full details of the various resources this tool will be consuming.

Jesse V.


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
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=
=yDvu
-END PGP SIGNATURE-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Advice on dealing with ISP's response to DMCA takedown notice.

2013-10-24 Thread Roger Dingledine
On Thu, Oct 24, 2013 at 09:10:15PM -0400, Christopher Jones wrote:
 Suggestions are welcome. I?m running with the default exit node policy,
which should block most of the abuse-laden ports. BitTorrent?s a little
harder to deal with. I?ve no qualms working with the ISP to mitigate
their concerns, but I?m not sensing their returning the same spirit
of cooperation.

You might like the 'reduced exit policy':
https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines

But it sounds like it won't entirely solve your problem at this point,
and it's time for either diplomacy and education, or some other ideas.
I'll let others chime in with suggestions.

Thanks!
--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] TCP: drop open request

2013-10-24 Thread mett
Hi!

Since yesterday, the kern.log of the relay I'm running is flooded with 
TCP: drop open request from.

I first thought it was a kind of DDOS on our servers but it seems to
be related to Tor (When I stop Tor, kernel doesn't
complain anymore).

Does somebody have an idea of why this is happening and what to do to
mitigate it?

Thanks a lot.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Advice on dealing with ISP's response to DMCA takedown notice.

2013-10-24 Thread grarpamp
On Thu, Oct 24, 2013 at 11:45 PM, Roger Dingledine a...@mit.edu wrote:
 You might like the 'reduced exit policy':
 https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines

 But it sounds like it won't entirely solve your problem at this point,
 and it's time for either diplomacy and education, or some other ideas.
 I'll let others chime in with suggestions.

As others have said:
- Work together with your hoster to adjust the policy
- Offer to handle their ticket issues for them by asking for the
full email of the complaint with addresses you can reply to
(as a service operator in the US that's pretty much your
responsibility to field those directly, then that of your upstream
if you don't). Then contact the complainer, send them the Tor
docs, tell them your server has no data on it and get them
to remove you from their lists and close their case. Keep
your hoster informed and especially copy them on any
case closed or delisting success.
- Some relay operators opt to SWIP the address space
to them and effectively become the ISP of record.
- If those don't work, close your account yourself and tell
them that based on your poor experience with them that
you will let others know not to buy from them when the
topic of hosting comes up.
- Add an entry to the goodbadproviders wiki page and
point them to it.

Details for all of this are in the archives of this list.
Thanks for relaying traffic :)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] TCP: drop open request

2013-10-24 Thread grarpamp
On Fri, Oct 25, 2013 at 12:10 AM, Roger Dingledine a...@mit.edu wrote:
 On Fri, Oct 25, 2013 at 12:43:42PM +0900, mett wrote:
 Since yesterday, the kern.log of the relay I'm running is flooded with
 TCP: drop open request from.

 I first thought it was a kind of DDOS on our servers but it seems to
 be related to Tor (When I stop Tor, kernel doesn't
 complain anymore).

 if you're in BSD-land.

It's a Linux message. Feed it to a search engine and you'll find
several things to try depending on what the cause is. It shuts
off either because Tor is attracting the syn's or the overall count
is lower with Tor off, you'll have to tcpdump to see. Look into
syn cookies, packet filter rules, and stack tuning.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays