Re: [tor-relays] bitcoin adopt a node idea
Hoi, At hartvoorinternetvrijheid.nl we have been toying with the exact same idea and I think Moritz had the same idea too. Cheap crowd sponsored relays are interesting for several reasons, you feel part of the process as a donator. Next to the fact that, at least we came up with that, that you get statistics of how many people you have helped on to the Tor network, with maybe a few links to relevant censorship news around the world. The donor feels warm from the inside and we get to grow the Tor network. There is work to be done on this, but there is also already work done on this, I guess we just need someone to coordinate all of this. All the best, Jurre On 06/26/2014 03:09 PM, ja...@icetor.is wrote: Sorry perhaps I didn't explain well enough. What I was pointing to was that tor could benefit from the idea of cheaply crowd sponsored relays that use ansible, chef or puppet to spin up for a month. That the article is about bitcoin is merely coincidental. -J On 06/26/2014 05:35 AM, Scott Bennett wrote: ja...@icetor.is wrote: This seems pretty damn similiar to something we should be offering for Tor relays, possibly even exits and bridges (if they only run for a month at a time). Possibly co-ordinated through the EFF? http://www.coindesk.com/adopt-node-project-aims-bolster-bitcoin-network-security/ Assuming that the relevant bitcoin programs could be taught to talk SOCKS, then it seems that tor hidden services would, in principle if not in performance, be an ideal solution. Running those bitcoin full nodes as hidden services might well make them less vulnerable to being shut down by currency counterfeiters (e.g., the Federal Reserve and the central banks of other states, U.S. Dept. of the Treasury). Performance of hidden services, however, are severely constrained by the hidden services protocol, which can slow connection times enough to make one consider USnail as a possible alternative, and the need for circuits of 2n-1 relays, which makes access even slower than normal tor circuits of n relays. Scott Bennett, Comm. ASMELG, CFIAG ** * Internet: bennett at sdf.org *or* bennett at freeshell.org * ** * A well regulated and disciplined militia, is at all times a good * * objection to the introduction of that bane of all free governments * * -- a standing army. * *-- Gov. John Hancock, New York Journal, 28 January 1790 * ** ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Need help to get TorDNSEL compiled
Hey there, this is addressed to the operators of the exitlist nameserver [1] at 'exitlist.torproject.org': After more than one year (referring to the start of this thread) I made another try today to get that TorDNSEL thing compiled, but no success, still the same errors. I'm now using GHC 7.6.3-10 and the current source code from git repo. Some days ago I hardened the torcheck-page at 'torcheck.xenobite.eu' using DNSSEC and DANE. But this makes only the half way sense, if the input information it gets from 'exitlist.torproject.org' wasn't securely transferred in the first place. Since there's probably no way to get the exitlist subdomain (and the dynamic data below) served securely using DNSSEC, I'm again at the point to get TorDNSEL running on the checking host itself, or nearby. The xenobite-check-page has 400-500 requests per hour, so there's at least some demand worth for improving this and I really like to do so. Thanks in advance for any help or advice you can give me! --- $ ./Setup.lhs configure Configuring TorDNSEL-0.1.1... Warning: Instead of 'ghc-options: -DVERSION=0.1.1-dev' use 'cpp-options: -DVERSION=0.1.1-dev' $ ./Setup.lhs build Building TorDNSEL-0.1.1... Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1... src/TorDNSEL/Statistics/Internals.hs:2:16: Warning: -fglasgow-exts is deprecated: Use individual extensions instead no location info: Failing due to -Werror. --- (removed option -Werror) --- $ ./Setup.lhs build ./tordnsel.cabal has been changed. Re-configuring with most recently used options. If this fails, please run configure manually. Configuring TorDNSEL-0.1.1... Warning: Instead of 'ghc-options: -DVERSION=0.1.1-dev' use 'cpp-options: -DVERSION=0.1.1-dev' Building TorDNSEL-0.1.1... Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1... src/TorDNSEL/Statistics/Internals.hs:2:16: Warning: -fglasgow-exts is deprecated: Use individual extensions instead src/TorDNSEL/System/Timeout.hs:1:12: Warning: -fglasgow-exts is deprecated: Use individual extensions instead src/TorDNSEL/TorControl/Internals.hs:4:16: Warning: -fglasgow-exts is deprecated: Use individual extensions instead src/TorDNSEL/ExitTest/Initiator/Internals.hs:2:16: Warning: -fglasgow-exts is deprecated: Use individual extensions instead [ 1 of 39] Compiling TorDNSEL.DistinctQueue ( src/TorDNSEL/DistinctQueue.hs, dist/build/tordnsel/tordnsel-tmp/TorDNSEL/DistinctQueue.o ) [ 2 of 39] Compiling TorDNSEL.DeepSeq ( src/TorDNSEL/DeepSeq.hs, dist/build/tordnsel/tordnsel-tmp/TorDNSEL/DeepSeq.o ) [ 3 of 39] Compiling TorDNSEL.Compat.Exception ( src/TorDNSEL/Compat/Exception.hs, dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Compat/Exception.o ) [ 4 of 39] Compiling TorDNSEL.Util( dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Util.hs, dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Util.o ) src/TorDNSEL/Util.hsc:143:24: Module `GHC.Handle' does not export `fillReadBuffer' src/TorDNSEL/Util.hsc:143:40: Module `GHC.Handle' does not export `readCharFromBuffer' src/TorDNSEL/Util.hsc:145:27: Module `GHC.IOBase' does not export `Buffer(..)' --- Regards BlueStar88 On Tue, 30 Jul 2013 10:05:39 +0200 BlueStar88 bluesta...@xenobite.eu wrote: On Tue, 30 Jul 2013 09:34:06 +0200 Lunar lu...@torproject.org wrote: Remove -Werror from the cabal file. Thank you. I took off the ghc-option '-Werror' from the tordnsel.cabal file. Now I get this: --- # ./Setup.lhs configure Configuring TorDNSEL-0.1.1... Warning: Instead of 'ghc-options: -DVERSION=0.1.1-dev' use 'cpp-options: -DVERSION=0.1.1-dev' --- --- # ./Setup.lhs build Building TorDNSEL-0.1.1... Preprocessing executable 'tordnsel' for TorDNSEL-0.1.1... src/TorDNSEL/Statistics/Internals.hs:2:16: Warning: -fglasgow-exts is deprecated: Use individual extensions instead src/TorDNSEL/System/Timeout.hs:1:12: Warning: -fglasgow-exts is deprecated: Use individual extensions instead src/TorDNSEL/TorControl/Internals.hs:4:16: Warning: -fglasgow-exts is deprecated: Use individual extensions instead src/TorDNSEL/ExitTest/Initiator/Internals.hs:2:16: Warning: -fglasgow-exts is deprecated: Use individual extensions instead [ 4 of 39] Compiling TorDNSEL.Util( dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Util.hs, dist/build/tordnsel/tordnsel-tmp/TorDNSEL/Util.o ) src/TorDNSEL/Util.hsc:143:24: Module `GHC.Handle' does not export `fillReadBuffer' src/TorDNSEL/Util.hsc:143:40: Module `GHC.Handle' does not export `readCharFromBuffer' src/TorDNSEL/Util.hsc:145:27: Module `GHC.IOBase' does not export `Buffer(..)' --- Sorry, I'm quite helpless on all this compiling stuff. The only thing I know is, that warnings are not that worse, than the three errors following them. ;-) Greetings BlueStar88 signature.asc Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org
[tor-relays] Spam
hi, well having run a relay for just under 2 weeks, I've got my first spam on this email address. As you will no doubt have guessed, this is not my usual email address, it is only used for the Tor relay contact details, this email list and a very few other projects that will not have published my email address anywhere. So I guess that this spam is as a result of my email address appearing on Atlas or Globe or similar as a result of it being the contact address for my Tor relay. I know this possibility is mentioned in the Tor documentation; I read it somewhere. I guess there's not much to be done about it; I wouldn't want to remove contact details - the address is already in the public domain anyway, and I want to be contactable with any problems. I guess I just have to use the standard spam filtering and combating measures. Could those with experience of running a relay for longer, please advise if this will become a major problem? Will spam increase substantially? Also, any suggestions very gratefully received. Thank you! KQ --- This email is free from viruses and malware because avast! Antivirus protection is active. http://www.avast.com ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] bitcoin adopt a node idea
On Thu, Jun 26, 2014 at 12:35:00AM -0500, Scott Bennett wrote: ja...@icetor.is wrote: This seems pretty damn similiar to something we should be offering for Tor relays, possibly even exits and bridges (if they only run for a month at a time). Possibly co-ordinated through the EFF? http://www.coindesk.com/adopt-node-project-aims-bolster-bitcoin-network-security/ Assuming that the relevant bitcoin programs could be taught to talk SOCKS, then it seems that tor hidden services would, in principle if not in performance, be an ideal solution. Running those bitcoin full nodes as hidden services might well make them less vulnerable to being shut down by currency counterfeiters (e.g., the Federal Reserve and the central banks of other states, U.S. Dept. of the Treasury). Performance of hidden services, however, are severely constrained by the hidden services protocol, which can slow connection times enough to make one consider USnail as a possible alternative, and the need for circuits of 2n-1 relays, which makes access even slower than normal tor circuits of n relays. I am using btcd, an alternative full-node implementation written in golang. Find it at https://github.com/conformal/btcd. It has built in proxy support. The wallet, btcwallet, is separate. It also has proxy support, so that you may connect to btcd over tor or as a tor hidden service. That can be found at https://github.com/conformal/btcwallet. bitcoind nodes are a nice target to look for wallets. But with btcd, I run that at home while btcwallet runs on my encrypted laptop which connects to btcd over tor. There is no wallet on my btcd node machine. If you're interested in development, testing, or features, see https://github.com/conformal/btcd/wiki#Contact - David ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Spam
On Thu, 26 Jun 2014 15:06:44 +0100 kingqueen kingqu...@btnf.tw wrote: hi, well having run a relay for just under 2 weeks, I've got my first spam on this email address. As you will no doubt have guessed, this is not my usual email address, it is only used for the Tor relay contact details, this email list and a very few other projects that will not have published my email address anywhere. So I guess that this spam is as a result of my email address appearing on Atlas or Globe or similar as a result of it being the contact address for my Tor relay. I know this possibility is mentioned in the Tor documentation; I read it somewhere. I guess there's not much to be done about it; I wouldn't want to remove contact details - the address is already in the public domain anyway, and I want to be contactable with any problems. I guess I just have to use the standard spam filtering and combating measures. Could those with experience of running a relay for longer, please advise if this will become a major problem? Will spam increase substantially? Also, any suggestions very gratefully received. You put your IP on a web page, crawlers can harvest it and use for spam. I've just tried and easily found your E-Mail using search engines such as Google and others. If you didn't want it to be harvested for spam purposes, you could have used at least some minimal obfuscation, e.g. user AT example DOT com. But instead you just published it there in the clear form. Nothing surprising or even strictly speaking Tor-related. -- With respect, Roman signature.asc Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Spam
On Thu, 26 Jun 2014 21:28:36 +0600 Roman Mamedov r...@romanrm.net wrote: You put your IP on a web page Sorry, meant E-Mail address of course :) -- With respect, Roman signature.asc Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Spam
Hello Roman, You put your IP on a web page, crawlers can harvest it and use for spam. I've just tried and easily found your E-Mail using search engines such as Google and others. Really? kingqu...@btnf.tw ? https://www.google.co.uk/search?q=kingqueen%40btnf.tw#q=%22kingqueen%40btnf.tw%22 lists only a Tor node list. But instead you just published it there in the clear form. in .torrc and thus in node lists, yes. kingqu...@btnf.tw is only published on webpages in relation to tor. It is not on any other webpages. That address - the one I am using to correspond on this list - is the one I am now receiving spam on. I suggest you double check your facts. --- This email is free from viruses and malware because avast! Antivirus protection is active. http://www.avast.com ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] [tor-relay] Spam
The spam to my own Tor relay operator email address (same one as in this list) isn't meaningful in volume. I haven't seen any amounts that a delete key couldn't easily handle. In my experience, you should be careful with spam filtering, as you could end up dumping abuse complaints that you wanted to see and maybe respond to, or have legitimate relay list email not come through. I ended up having to whitelist some stuff for this list to work right because of automatic spam behavior of this mail service. It's not like the sight of spam email in your tor relay box is toxic to your workstation. It's usually obvious from the subject what it is, and that it can be safely and immediately deleted. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Spam
I was receiving some spam after a couple weeks so I changed it to user at domain dot com e.g. cbritt at hush dot com It seems to have solved the problem. I think I remember reading somewhere that newer versions automatically reformat email addresses to combat the aforementioned spam issue. Hopefully that helps! On 06/26/2014 at 10:56 AM, kingqueen wrote:hi, well having run a relay for just under 2 weeks, I've got my first spam on this email address. As you will no doubt have guessed, this is not my usual email address, it is only used for the Tor relay contact details, this email list and a very few other projects that will not have published my email address anywhere. So I guess that this spam is as a result of my email address appearing on Atlas or Globe or similar as a result of it being the contact address for my Tor relay. I know this possibility is mentioned in the Tor documentation; I read it somewhere. I guess there's not much to be done about it; I wouldn't want to remove contact details - the address is already in the public domain anyway, and I want to be contactable with any problems. I guess I just have to use the standard spam filtering and combating measures. Could those with experience of running a relay for longer, please advise if this will become a major problem? Will spam increase substantially? Also, any suggestions very gratefully received. Thank you! KQ --- This email is free from viruses and malware because avast! Antivirus protection is active. http://www.avast.com ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] [tor-relay] Spam
The spam to my own Tor relay operator email address (same one as in this list) isn't meaningful in volume. I haven't seen any amounts that a delete key couldn't easily handle. That is good to know, thank you. --- This email is free from viruses and malware because avast! Antivirus protection is active. http://www.avast.com ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] bitcoin adopt a node idea
On Thu, Jun 26, 2014 at 10:44 AM, David Hill dh...@mindcry.org wrote: On Thu, Jun 26, 2014 at 12:35:00AM -0500, Scott Bennett wrote: ja...@icetor.is wrote: http://www.coindesk.com/adopt-node-project-aims-bolster-bitcoin-network-security/ Assuming that the relevant bitcoin programs could be taught to talk SOCKS, then it seems that tor hidden services would, in principle if not in performance, be an ideal solution. Running those bitcoin full nodes as hidden services might well make them less vulnerable to being shut bitcoind works fine with tor and has some onion full nodes. Performance of hidden services, however, are severely constrained by the hidden services protocol, which can slow connection times enough to make one consider USnail as a possible alternative, and the need for circuits of 2n-1 relays, which makes access even slower than normal tor circuits of n relays. Performance of hidden services is actually rather good. ymmv. I am using btcd, an alternative full-node implementation written in golang. Find it at https://github.com/conformal/btcd. It has built in proxy support. The wallet, btcwallet, is separate. It also has proxy support, so that you may connect to btcd over tor or as a tor hidden service. That can be found at https://github.com/conformal/btcwallet. bitcoind nodes are a nice target to look for wallets. But with btcd, I run that at home while btcwallet runs on my encrypted laptop which connects to btcd over tor. There is no wallet on my btcd node machine. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Spam
On 26 June 2014 16:51:11 BST, cbr...@hush.com cbr...@hush.com wrote: I was receiving some spam after a couple weeks so I changed it to user at domain dot com e.g. cbritt at hush dot com It seems to have solved the problem. I think I remember reading somewhere that newer versions automatically reformat email addresses to combat the aforementioned spam issue. Hopefully that helps! It does. Thank you! -- Sent from my Android device with K-9 Mail. Please excuse my brevity. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Directory Server and bandwidth accounting
Hi, Is my understanding correct that if I set AccountingMax, the relay will never be used as a DR? It kind of feels odd because in my situation I can donate 500GB (and maybe even more) but I do want to keep a max limit and at the same time let the relay be a DR as well. Any way to achieve this? -kali- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Directory Server and bandwidth accounting
On 06/26/2014 01:13 PM, s7r wrote: On 6/26/2014 7:46 PM, Kali Tor wrote: Hi, Is my understanding correct that if I set AccountingMax, the relay will never be used as a DR? It kind of feels odd because in my situation I can donate 500GB (and maybe even more) but I do want to keep a max limit and at the same time let the relay be a DR as well. Any way to achieve this? -kali- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays Hi Kali Where did you learn that AccountingMax argument will prevent you from being a directory server? I can not confirm or infirm this information, but as far as I see in the manual there is no such reference for accountingmax. 500GB per month is little amount of traffic, seriously. My 100mbit relays made on virtual servers consume 6-7TB of total traffic per month. Use the accountingmax argument and you should be fine, it's better than capping bandwidth and it is a great help for the network. Thanks for running a relay. I had not read anything about this either, until I tried to enable it and got this in my log: 10:15:43 [NOTICE] Not advertising DirPort (Reason: AccountingMax enabled) signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Directory Server and bandwidth accounting
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 6/26/2014 7:46 PM, Kali Tor wrote: Hi, Is my understanding correct that if I set AccountingMax, the relay will never be used as a DR? It kind of feels odd because in my situation I can donate 500GB (and maybe even more) but I do want to keep a max limit and at the same time let the relay be a DR as well. Any way to achieve this? -kali- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays Hi Kali Where did you learn that AccountingMax argument will prevent you from being a directory server? I can not confirm or infirm this information, but as far as I see in the manual there is no such reference for accountingmax. 500GB per month is little amount of traffic, seriously. My 100mbit relays made on virtual servers consume 6-7TB of total traffic per month. Use the accountingmax argument and you should be fine, it's better than capping bandwidth and it is a great help for the network. Thanks for running a relay. - -- s7r PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11 PGP Pubkey: http://www.sky-ip.org/s...@sky-ip.org.asc -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (MingW32) iQEbBAEBAgAGBQJTrFSwAAoJEIN/pSyBJlsRfVAH+PZzfzkCV6i6p8fC16PmVEBa 1cmbYloi+/edIniSrpo4KnYTSJVRBg/6Sg7CrZYlTymdM5mr5HIrAOFiIrEb5iu1 jUAryPsU9UQzSlgNzX/WwZQrwz0KSoGpp5t9fiF+DdQhObE3r16DVjQkjh7aIQQR c0pqWGoLfGgx3KbXpLqLczQio9++wf9wQ0gKB9tcnTOxYGHl1qFDKpqwFqQ7Y8LB 55XbG70+ncSKWGMhIc6Hkg9XxhRigKo7A97dj+vBupEu8fUdhp1sWGdZUFEmYXKv L5kaZBsD9jsdMWHW7N4U3fATylyNjceOu7ZIU6wouQG/LRH6c26467xOa/W6cQ== =vEBO -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Is my tor exit relay set up correctly?
On Wed, 25 Jun 2014 16:26:14 -0800 I beatthebasta...@inbox.com wrote: Matt, No, I mean every ab initio Tor relay operator. From my experience getting into Tor and from watching the list it is obvious that there is quite often a chasm between those with the goodwill to run a relay and those confident with Linux and Tor jargon/lexicon. Even asking questions on the list is not very useful because it is not really possible to either ask all you need to or to depend on the answers completely if you don't know who's who. The repetitive questions are annoying to some as well. So why not offer reassurance for the security of the Tor network, and confidence and encouragement to the people who might give up? In my case it has been by accident that I have come across some important aspects of torrc settings and now ARM use. It is better to shepherd people consciously than to keep pointing them bluntly to look at the web of links which depends on them understanding. Robert It might be that I'm completely misunderstanding what you are saying. Unless (somehow) automated, I don't think checking with every Tor relay operator 'scales'. How would you go about being a shepherd to every new Tor relay operator? --Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Spam
Spammers subscribe to mailing lists. You post to mailing lists. Have fun. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Directory Server and bandwidth accounting
I had not read anything about this either, until I tried to enable it and got this in my log: 10:15:43 [NOTICE] Not advertising DirPort (Reason: AccountingMax enabled) Exactly what I experienced at my side and hence my assumption that enabling AccountingMax disables DirPort and the DS capability. -kali- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays