Re: [tor-relays] Fast Exit Node Operators - ISP in US
On Sat, 22 Nov 2014 22:42:15 -0800, Mirimir miri...@riseup.net wrote: How much throughput do you get with your VPS, 1000 GB/mo or 2000 GB/mo? The 1000 GB/mo applies to whichever value is greater, input or output. So far the Tor node is pushing less than 1.5GB per day. Takes a while for traffic to ramp up apparently. As I read comments in torrc, AccountingMax applies separately to sent and received bytes, not to their sum, and so setting '4 GB' may allow up to 8 GB total before hibernating. Yes, others have raised this issue as well and I will look into it. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Fast Exit Node Operators - ISP in US
On Sat, 22 Nov 2014 19:13:17 -0800, ZEROF secur...@netmajstor.com wrote: I saw some info just yesterday, but it's not in actual server configuration. Can you provide some good resource for setting dnscrypt-proxy? And no logging DNS's is good to protect end users A caveat: You should probably avoid using the default OpenDNS servers with dnscrypt-proxy. From the 'Bad Relays' wiki page https://trac.torproject.org/projects/tor/wiki/doc/badRelays The most common misconfiguration I have seen is using OpenDNS as a host's nameserver with what I think is the OpenDNS default config. Services such as OpenDNS lie to you, under the name of protecting you. The result is for instance getting redirected to their webpage when you want to visit evil sites such as https://www.torproject.org/.;___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Fast Exit Node Operators - ISP in US
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I'm not using opendns. OpenNic and OpenDNS are not same thing. On 23 November 2014 at 23:59, Seth wrote: On Sat, 22 Nov 2014 19:13:17 -0800, ZEROF wrote: I saw some info just yesterday, but it's not in actual server configuration. Can you provide some good resource for setting dnscrypt-proxy? And no logging DNS's is good to protect end users A caveat: You should probably avoid using the default OpenDNS servers with dnscrypt-proxy. From the 'Bad Relays' wiki page https://trac.torproject.org/projects/tor/wiki/doc/badRelays The most common misconfiguration I have seen is using OpenDNS as a host's nameserver with what I think is the OpenDNS default config. Services such as OpenDNS lie to you, under the name of protecting you. The result is for instance getting redirected to their webpage when you want to visit evil sites such as https://www.torproject.org/.; ___ tor-relays mailing listtor-relays@lists.torproject.orghttps://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays - --http://www.backbox.orghttp://www.pentester.iz.rs -BEGIN PGP SIGNATURE- Version: OpenPGP.js v0.7.2 Comment: http://openpgpjs.org wsFcBAEBCAAQBQJUcoEyCRDHWR777fxuEQAAT7EP/A+lRfEQ/p2id19oJDhM 3JZZQZaTdUPv0elzrllzhse/pErPTcTzu6uoghyVE7sLbdalcFZ5HATg2RR0 +DpI3czxd9TuOCj3k+kz8vfSxj3J0IDBvIQM+z3d4B7xfbp5DmMrJVxm+OOF J8TsN+yfspw6g3GJaBMzC7ZlrVGlAsgo47nYSjgMZy8082te6XFVNclAZ76Q PRT3IQyovTGHVKtx4WTnO5w2oxdPefEzjn4z5LvqR6eQGOw4vpJZUX99zDKL XQnBWhmhhprLW7wyVo7qLRFUpT6A/HY9GJBPz+j9LNDKCi1962Ajgo5Fl2iP a76iv/v+jAgEiRJY+XrmVI1vgWYDYaegiMHdH82JExgbA0O717s1/2IPix3k OEd3wS7iA9veXcrq7EMquyPDuKxAdsOhJTaAE50w74jfYx3a637p59VI9yzB HdERrwdcfiTRnQVcf+KmKjmYXU+7WjxVE0ebjvJIPFTNC7VMlKrn/Vfmhhl9 Pn4Lm57FNgy2z9ah6VTGEVHLmgxtprGIxt14r10m2GyZFbKR8twO5DU5FXgE XN1a956m+mh35dUQwlE6QIt7IefgrEvH/h6Pau9NTv2PMxxRlCj1ooR6w+Kn Cvu9QYxeuXfDpgxZdGBmUOhWl5DG4xsiRVNM3JFWMPuLVGTtWTpSF/1uQjiZ Brvw =hwKy -END PGP SIGNATURE- ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Fast Exit Node Operators - ISP in US
On Sun, 23 Nov 2014 16:53:03 -0800, ZEROF secur...@netmajstor.com wrote: I'm not using opendns. OpenNic and OpenDNS are not same thing. I'm aware of the distinction. What I was trying to point out for the benefit of people just getting started with dnscrypt-proxy, is that by default it uses OpenDNS servers. At least it has in every environment that I've set it up in so far. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Fast Exit Node Operators - ISP in US
http://blog.censurfridns.dk/en Pretty sure this is no fon. On 24 November 2014 at 02:18, Seth l...@sysfu.com wrote: On Sun, 23 Nov 2014 16:53:03 -0800, ZEROF secur...@netmajstor.com wrote: I'm not using opendns. OpenNic and OpenDNS are not same thing. I'm aware of the distinction. What I was trying to point out for the benefit of people just getting started with dnscrypt-proxy, is that by default it uses OpenDNS servers. At least it has in every environment that I've set it up in so far. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Fast Exit Node Operators - ISP in US
On 11/23/2014 11:05 AM, s7r wrote: That is, because in almost all cases, providers allow unmetered incoming traffic to your server but keep count and accounting on outgoing traffic from your server, which is why the torrc setting acts the way it does. That would be great! I'll confirm with the provider. I'm also wondering what to set for RelayBandwidthRate for an exit. I see some old threads on this list, and a question at Tor.SE, but find nothing that's clear and persuasive. Assuming that the 1000 GB/mo limit applies to just outgoing traffic, throughput would need to average ca. 0.4 MB/sec. However, median advertised exit bandwidth from Tor Metrics is ca. 1 MB/sec, so it seems unlikely that an exit advertising 0.4 MB/sec would be used very heavily. And so actual usage would be far less than 0.4 MB/sec. Conversely, setting RelayBandwidthRate to 3 MB/sec would ultimately lead to heavy use. But with full utilization at 250 GB per day, the relay would hibernate after just four days. There must be some intermediate value that would bring average usage to 0.4 MB/sec. What is the optimal RelayBandwidthRate for a 1000 GB/mo VPS? I'm guessing that it's about 1 MB/sec. On 11/23/2014 7:58 PM, Seth wrote: On Sat, 22 Nov 2014 22:42:15 -0800, Mirimir miri...@riseup.net wrote: How much throughput do you get with your VPS, 1000 GB/mo or 2000 GB/mo? The 1000 GB/mo applies to whichever value is greater, input or output. So far the Tor node is pushing less than 1.5GB per day. Takes a while for traffic to ramp up apparently. As I read comments in torrc, AccountingMax applies separately to sent and received bytes, not to their sum, and so setting '4 GB' may allow up to 8 GB total before hibernating. Yes, others have raised this issue as well and I will look into it. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays