[tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Matthew Finkel
Hi Ops,

We recently began responding to t-shirt requests again. Sorry for the
long silence. There's been a lot happening around here but not enough
time or people to do everything, so the t-shirt requests simply remained
untouched. But, despite the overload, t-shirts are important because
they are a small token of our thanks and appreciation for making the
network what it is today.

We responded to around 70 t-shirt requests from relay operators in
April, which comprised all requests for which we could verify (within
reason) the request came from the person who controlled the qualifying
relay. We still have another 20 requests where the requestor is not
obviously the owner of the relay. Currently the content of a relay's
Contact field is used, but this does not always provide enough (or any)
information. For this case, we need an authentication mechanism which
proves control of the relay but is something relay operators won't mind
running.
 
My currently plan is to ask relay operators to sign the fingerprint file
which tor creates. The major disadvantage of this method is that it must
be run as root (or a user with access to tor's data directory).

The following process is the current plan, but does anyone have a better
idea? Does it seem logical?


When we receive a t-shirt request from someone who isn't obviously in
control of the relay, we ask them to sign their fingerprint file with
a unique salt.

Assuming the path to their data dir is /var/lib/tor, we ask them to run:

$ (echo -n salt ; cat /var/lib/tor/fingerprint) | openssl sha256 \
  -binary | openssl pkeyutl -inkey /var/lib/tor/keys/secret_id_key \
  -sign -pkeyopt digest:sha256 -pkeyopt rsa_padding_mode:pss \
  -pkeyopt rsa_pss_saltlen:32 | openssl base64  signed_fingerprint

They send us both /var/lib/tor/fingerprint and signed_fingerprint.

When we receive them, we confirm the fingerprint in the fingerprint file
matches the qualifying relay. Then we retrieve the relay's public key
from its descriptor and convert it into pkcs#8 format using:

$ openssl rsa -pubin -in pubkey_pkcs1 -RSAPublicKey_in -out pubkey

and then we verify the sig using following commands:

$ (echo -n salt ; cat fingerprint) | openssl sha256 -binary | \
  openssl pkeyutl -pubin -verify -inkey pubkey -sigfile \
  $(OUT=/tmp/signed_fingerprint_bin; base64 -d signed_fingerprint  \
  ${OUT}; echo ${OUT}) -pkeyopt digest:sha256 -pkeyopt \
  rsa_padding_mode:pss -pkeyopt rsa_pss_saltlen:32; rm \
  /tmp/signed_fingerprint_bin;

This should yield Signature Verified Successfully.



Another disadvantage of this is PSS wasn't implemented in openssl's
apps until 1.0.1. I wonder how many relays are running on servers which
are still using openssl 0.9.8 (and 1.0.0?). For these servers we can
fallback on pkcs#1 v1.5 signatures.



The signature can be created using a command similar to the one above:

$ (echo -n salt ; cat /var/lib/tor/fingerprint) | openssl dgst \
  -sha256 | openssl rsautl -inkey /var/lib/tor/keys/secret_id_key \
  -sign | openssl base64  signed_fingerprint

Again, they provide /var/lib/tor/fingerprint and signed_fingerprint,
and we verify using:

$ test $(openssl base64 -d -in signed_fingerprint | openssl rsautl \
  -pubin -verify -inkey pubkey) = $((echo -n salt ; cat \
  fingerprint) | openssl dgst -sha256); echo $?


In addition, again, we confirm the fingerprint in the fingerprint file
matches the fingerprint of the qualifying relay.


Originally I used a few bashisms which made these simpler, but for
this I suspect portability is important.

Sorry this is a bit long.

Thanks,
Matt



signature.asc
Description: Digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Drop in relay count

2015-05-03 Thread Linus Nordberg
Steve Snyder swsny...@snydernet.net wrote
Sun, 3 May 2015 10:40:59 -0400 (EDT):

| My uninformed guess would be that the higher minimum bandwidth requirements 
in v0.2.6.x forced out the marginal relays.

Interesting. I'll see if I can find out when a majority of directory
authorities upgraded to 0.2.6.x.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Matthew Finkel
On Sun, May 03, 2015 at 12:05:49PM -0700, Aaron Hopkins wrote:
 On Sun, 3 May 2015, Matthew Finkel wrote:
 
 Assuming the path to their data dir is /var/lib/tor, we ask them to run:
 
 Please don't get in the habit of asking relay operators through e-mail to
 run complex bash command lines as root.  As a security practice, this is
 terrible.  (How do you know the suggested command wasn't altered before it
 reached its recipient?)

Yes, this is terrible, and I really hate the idea of asking it. I signed
all my emails for the t-shirt requests, but now we're relying on
everyone fetching my key and verifying the mail - so, that's also a bad
assumption. I don't have a good solution. This is why I'm asking.

 
 If you want to build a utility for this into the tor distribution, and make
 it obvious what it does, I think that's fine.  If the site asked people to
 run tor-request-tshirt or more generically tor-verify-ownership and it
 asked for whatever required information, I'd think that'd be more obviously
 safe.

Unfortunately, for something like that to work seamlessly, it would
need to be setuid or setgid. This may be a better way forward, but I
wonder what we can do now.

 
 Or as Robert suggests, just send verification mail to the listed contact
 address of the relay.  If they don't list one on their config, find an
 alternate verification mechanism like e-mailing whois contacts for the IP or
 domain name, or refuse the request.

I'd prefer not denying them a t-shirt because they don't want to publish
an email address publically, but using whois seems like a stretch and
usually ends at the hosting provider instead of the operator.

Thanks for the idea.

- Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread JovianMallard
Matt,

Inspired by the options to confirm domain ownership with Google,
Could you ask the relay operator to include a randomly generated (by
you) token in their contact field? It may take a while to propagate and
it requires action on the operator's part, but it's not difficult and I
expect it provides the assurance you need.


 On 05/03/2015 04:20 PM, Matthew Finkel wrote:
 On Sun, May 03, 2015 at 12:05:49PM -0700, Aaron Hopkins wrote:
 On Sun, 3 May 2015, Matthew Finkel wrote:
 
 Or as Robert suggests, just send verification mail to the listed contact
 address of the relay.  If they don't list one on their config, find an
 alternate verification mechanism like e-mailing whois contacts for the IP or
 domain name, or refuse the request.

 I'd prefer not denying them a t-shirt because they don't want to publish
 an email address publically, but using whois seems like a stretch and
 usually ends at the hosting provider instead of the operator.
 



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Drop in relay count

2015-05-03 Thread syndikal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


nusenu nus...@openmailbox.org wrote:
  it seems like we've lost about 500 (-7%) relays since the beginning
  of this year.


the Tor network recently lost a large amount of relays (~75 or more)
due to BadExit attacks. this may account for a large sum of the
disappearing nodes (~20%), but it doesn't account for nearly all of
them.
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJVRogzAAoJEHK1ROBEFxGyr6IQAJWPmWo8XDygb2phEw9QoosT
bLMdLgHQtKS+MaZVLnDqMQw1kqdUiw8Z/GW34mYUmJJ1AF3muJXa64Gw6y1ykZg7
TWIUw+uXOUaQwPLe069wgguC2pB51w/B88G5jq8EMQYti6gSPWgk9nghav9G0Nwa
RE77JSboSQbCwQdmCIlCjG+topYqoMGWhp3Dq/dVizesC3tRit97E3OjyTQ5wEEx
FanyF6Rv5fd3/Ds/8rzs+YbQmxckWB3+RzTOxa013GrhigF22A0xeaNYFc2kTgC/
w5Dw9Ts8pfUd/rsJd2RxgjP2z8QG1g1DFLcVBiLTb0LsGa8VbtPMoyISkrSvdgOF
mDyZXhsdnDD3VCuVjYIBMKyuDKass04xAefYO5aDqGCPYukrX1nZXs/ohUpNAwEh
eWsGq6b6iSglQfqGKxdVWcrEdnl/gUQxbkXBFPfBfCqxtKqCtGXv3VByuxcuWgXr
bl2jIE8v2FWNCWmE/YfYnRcTjr98ACh1JPDOMCabDedk1oFYSvB4W4CdclXpnaop
Q/pISFi+xvvqjfzzH0rmCft4VdJjgj4+y6h/0cVgJK1TycMuU3dQYHuubRJT8JR3
OUalYoe+28k75LlC1cm9WQHeUd624AAUZ9oT0oSN1iApCG9HzntaZsTDbumawwse
PBRYaoa4/b7DAaOYHp/W
=u6RR
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Matthew Finkel
On Sun, May 03, 2015 at 09:18:30PM +0200, Sebastian Urbach wrote:
 On May 3, 2015 7:45:39 PM Matthew Finkel matthew.fin...@gmail.com wrote:
 
 Hi Matthew,
 
 Hi Ops,
 
 We recently began responding to t-shirt requests again. Sorry for the
 long silence. There's been a lot happening around here but not enough
 0 time or people to do everything, so the t-shirt requests simply remained
 untouched. But, despite the overload, t-shirts are important because
 they are a small token of our thanks and appreciation for making the
 network what it is today.
 
 We responded to around 70 t-shirt requests from relay operators in
 April, which comprised all requests for which we could verify (within
 reason) the request came from the person who controlled the qualifying
 relay. We still have another 20 requests where the requestor is not
 obviously the owner of the relay. Currently the content of a relay's
 Contact field is used, but this does not always provide enough (or any)
 information. For this case, we need an authentication mechanism which
 proves control of the relay but is something relay operators won't mind
 running.
 
 I'm really not amused. As i recall a bunch of people including myself
 offered to help. 

Amused? This really has nothing to do with amusement. If you want to
work on something, then please come work on it, we really are
overloaded. That being said, correctly handling t-shirt requests and
other similar communications is important and delicate. The Tor Project
is in a difficult situation where it wants to support the Tor network
but not run it. This means, to some extent, we become a trusted
third-party with some information. T-shirt requests are a perfect
example of this, where we receive requests from people who choose not
to publically publish their contact details yet they would like a reward
for their work - which they absolutely deserve. This requires that
operators trust us, so letting anyone help take care of these requests
is not wise.

 I get the distinct impression that you keep everything
 within a small circle of people, no matter what. Even if that means that
 services are suffering.
 

We're a group of security and privacy conscious individuals who want
a world where everyone has secure and private communications, this isn't
exactly a good combination which leads to publically discussioning
everything. I certainly admit sometimes I default to discussing topics
privately rather than sending it to tor-talk or tor-relays - I nearly
did that with this thread. It's a bad habit, but it's not as common as
I think you think it is.

- Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Markus Hitter
Am 03.05.2015 um 22:49 schrieb Matthew Finkel:
 This requires that
 operators trust us, so letting anyone help take care of these requests
 is not wise.

Maybe I'm unique with this opinion, but usually I trust groups open to helping 
hands more than those who consider them selfs to be wiser than the average.

 We're a group of security and privacy conscious individuals who want
 a world where everyone has secure and private communications, this isn't
 exactly a good combination which leads to publically discussioning
 everything.

Sounds almost like the advertising from companies which try to sell their 
closed source software as the most secure thing since the invention of sliced 
bread.

Of course it's not a good idea to publish the addresses of the t-shirt 
receivers, neither to email them randomly around the globe, but printing a 
hundred stickers and placing them on as many bags also isn't something which 
keeps a group of people busy for months.


my $0.02
Markus

-- 
- - - - - - - - - - - - - - - - - - -
Dipl. Ing. (FH) Markus Hitter
http://www.jump-ing.de/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Drop in relay count

2015-05-03 Thread Linus Nordberg
nusenu nus...@openmailbox.org wrote
Sun, 03 May 2015 19:06:39 +:

|  Looking at the graphs showing the total relay bandwidth of the
|  network it seems like the advertised bandwidth has increased with
|  about 25 Mbps (+23%).
| 
| I doubt that 25 Mpbs is 23% of the tor network capacity, I guess it
| should say GBit/s.

Indeed.


| You probably also know about the 0.2.3.x relays:
| https://metrics.torproject.org/versions.html

I didn't. Thanks.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Tom van der Woerdt

Matthew Finkel schreef op 03/05/15 om 14:47:

On Sun, May 03, 2015 at 08:20:54PM +, Matthew Finkel wrote:

On Sun, May 03, 2015 at 12:05:49PM -0700, Aaron Hopkins wrote:

On Sun, 3 May 2015, Matthew Finkel wrote:


Assuming the path to their data dir is /var/lib/tor, we ask them to run:


Please don't get in the habit of asking relay operators through e-mail to
run complex bash command lines as root.  As a security practice, this is
terrible.  (How do you know the suggested command wasn't altered before it
reached its recipient?)


Yes, this is terrible, and I really hate the idea of asking it. I signed
all my emails for the t-shirt requests, but now we're relying on
everyone fetching my key and verifying the mail - so, that's also a bad
assumption. I don't have a good solution. This is why I'm asking.



What if we add the commands to the t-shirt[0] website? Again, this isn't
a great solution, but we already have documentation which requires
running commands with elevated privileges on there, and it's slightly
better than sending it in an email. These commands are still more
complex than I'd like, but if beside providing an executable or
verifiable shell script, I'm running low on solutions.

[0] https://www.torproject.org/getinvolved/tshirt

Thanks,
Matt


Hi Matt,

How about :

 * Primarily using ContactInfo for the verification
 * If you cannot match the ContactInfo, ask people to set it on their 
relays
 * If they are unwilling/unable to do so, ask them to sign their mail 
address using their secret Tor key

 * Implement a --sign option for Tor 0.2.7
 * Starting a year from now, just ask everyone to sign the request

Proving ownership of a Tor relay can be relevant for more applications 
than just Weather, so a simple --sign option can be good to have. That 
doesn't address the immediate concerns though, it's more of a long-term 
solution.


Tom



smime.p7s
Description: S/MIME-cryptografische ondertekening
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread I
Everyone,

Could the relay log have something copied (such as the key) from it and emailed 
with the claim as only the operator can see the relay?

Robert


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Why can't I see authorities bandwith stats

2015-05-03 Thread Dedalo
Hi,

I was making some changes in my relay configuration and I made some
queries in GLOBE and ATLAS and something happened. I noticed that all
authorities are not showing bandwidth stats from the last week and I was
wondering why.

Regards,
Dedalo.

-- 
twitter: @SeguridadBlanca
Github: Dedal0
Blog: https://blog.dedalo.in

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread teor

 Date: Sun, 3 May 2015 17:44:39 +
 From: Matthew Finkel matthew.fin...@gmail.com
 …
 
 Another disadvantage of this is PSS wasn't implemented in openssl's
 apps until 1.0.1. I wonder how many relays are running on servers which
 are still using openssl 0.9.8 (and 1.0.0?). For these servers we can
 fallback on pkcs#1 v1.5 signatures.

OS X still ships with OpenSSL 0.9.8 by default.

But Darwin is such a small fraction of the network, and it's less likely that a 
Darwin server would push enough data to get a t-shirt unless it had an OpenSSL 
version with aes-ni.

teor

teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5

teor at blah dot im
OTR D5BE4EC2 255D7585 F3874930 DB130265 7C9EBBC7



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-03 Thread Seth

On Sun, 03 May 2015 11:50:25 -0700, nusenu nus...@openmailbox.org wrote:

I'd say 7$ for 2TB/mo on 1GB RAM is expensive if you compare it with
100mbps unmetered and lets say you are able to saturate ~50% =
~30TB/mo (~50 mpbs* in one direction) for ~15$/mo with 1GB RAM (in HU,
0.6% CW).


Can't argue with that.

The difference in annual cost ($60 vs $180 USD) is the key factor for me  
right now. Don't want to pay $180/yr out of pocket right now.



..but anyway thanks for adding more OpenBSD relays.


Aye, I'll be trying out your Ansible playbooks in a bit.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-03 Thread Seth
On Sat, 02 May 2015 00:52:07 -0700, Geo Rift  
tim.cochrane.lap...@gmail.com wrote:

I would love to see some more nodes in Australia. I'm located in Perth
and the speed of the network it horrible.


Tim, just deployed an exit node to Sydney location, feel free to test it  
out:


https://atlas.torproject.org/#details/E1E1059D8C41FC48B823C6F09348EA89C4D4C9D4
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread I
Matt,

How many shirts are sent in a year?
What would taking it on entail?

Robert



 Absolutely, but what's the cost? Our current solution using Printfection
 is neither ideal nor cheap, but it is convenient. Tor pays Printfection
 a bunch of money and Printfection creates the t-shirts, gives us
 one-time links, and takes care of the shipping and handling. If we crowd
 sourced creating bags with stickers in them we would need someone who
 can organize all the volunteers, ship the bags and stickers around the
 world, pay the return shipping for the filled bags, and then ship them
 again to the relay operators. That seems like it will become expensive.
 I would love to find a better solution than Printfection, so if anyone
 has suggestions we'd love to hear about it.
 
 - Matt


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Matthew Finkel
On Sun, May 03, 2015 at 03:31:01PM -0700, Tom van der Woerdt wrote:
 Matthew Finkel schreef op 03/05/15 om 14:47:
 On Sun, May 03, 2015 at 08:20:54PM +, Matthew Finkel wrote:
 On Sun, May 03, 2015 at 12:05:49PM -0700, Aaron Hopkins wrote:
 On Sun, 3 May 2015, Matthew Finkel wrote:
 
 Assuming the path to their data dir is /var/lib/tor, we ask them to run:
 
 Please don't get in the habit of asking relay operators through e-mail to
 run complex bash command lines as root.  As a security practice, this is
 terrible.  (How do you know the suggested command wasn't altered before it
 reached its recipient?)
 
 Yes, this is terrible, and I really hate the idea of asking it. I signed
 all my emails for the t-shirt requests, but now we're relying on
 everyone fetching my key and verifying the mail - so, that's also a bad
 assumption. I don't have a good solution. This is why I'm asking.
 
 
 What if we add the commands to the t-shirt[0] website? Again, this isn't
 a great solution, but we already have documentation which requires
 running commands with elevated privileges on there, and it's slightly
 better than sending it in an email. These commands are still more
 complex than I'd like, but if beside providing an executable or
 verifiable shell script, I'm running low on solutions.
 
 [0] https://www.torproject.org/getinvolved/tshirt
 
 Thanks,
 Matt
 
 Hi Matt,
 
 How about :
 
  * Primarily using ContactInfo for the verification
  * If you cannot match the ContactInfo, ask people to set it on their relays

Sounds good.

  * If they are unwilling/unable to do so, ask them to sign their mail
 address using their secret Tor key

How? For the short-term, do you think asking the operator to run the
proposed command is not a crazy idea?

  * Implement a --sign option for Tor 0.2.7
  * Starting a year from now, just ask everyone to sign the request

We'd need more than a year for this, likely four years, at the earliest
because Jessie only has 0.2.6.

 
 Proving ownership of a Tor relay can be relevant for more applications than
 just Weather, so a simple --sign option can be good to have. That doesn't
 address the immediate concerns though, it's more of a long-term solution.

I think this may be a good idea, especially if CAs being issuing certs
for onion sites. Implementing it will not be too difficult,
unfortunately its usability may be a little tricky.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Matthew Finkel
On Mon, May 04, 2015 at 12:46:01AM +0200, Markus Hitter wrote:
 Am 03.05.2015 um 22:49 schrieb Matthew Finkel:
  This requires that
  operators trust us, so letting anyone help take care of these requests
  is not wise.
 
 Maybe I'm unique with this opinion, but usually I trust groups open to 
 helping hands more than those who consider them selfs to be wiser than the 
 average.
 

I don't think what I said contradicts this. You are certainly not alone
with that opinion and we, the thousands of people in the Tor community,
make Tor what it is. There is a smaller subset of the community which
handles some personal information, and, as it turns out, most people
prefer only revealing their information to a few people instead of
thousands. Hopefully we will move toward an automated system for these
t-shirts, so that the only people in the trusted-set are those who pay
for the t-shirts, in this case. But, in general, when dealing with
finances and PII, there's certain information that should remain
private. That being said, we want more people to help us. Please, come
work on some of Tor's projects. We want more review, more input, more
feedback. I was not saying we were wise because we aren't 100% public
and transparent with what we do. I was saying revealing the personal
information about operators to random, unvetted volunteers was not
wise - I hope this makes sense.

  We're a group of security and privacy conscious individuals who want
  a world where everyone has secure and private communications, this isn't
  exactly a good combination which leads to publically discussioning
  everything.
 
 Sounds almost like the advertising from companies which try to sell their 
 closed source software as the most secure thing since the invention of sliced 
 bread.

Heh. Good thing that wasn't an advertisement and Tor is not a company
selling closed-source software :)

 
 Of course it's not a good idea to publish the addresses of the t-shirt 
 receivers, neither to email them randomly around the globe, but printing a 
 hundred stickers and placing them on as many bags also isn't something which 
 keeps a group of people busy for months.

Absolutely, but what's the cost? Our current solution using Printfection
is neither ideal nor cheap, but it is convenient. Tor pays Printfection
a bunch of money and Printfection creates the t-shirts, gives us
one-time links, and takes care of the shipping and handling. If we crowd
sourced creating bags with stickers in them we would need someone who
can organize all the volunteers, ship the bags and stickers around the
world, pay the return shipping for the filled bags, and then ship them
again to the relay operators. That seems like it will become expensive.
I would love to find a better solution than Printfection, so if anyone
has suggestions we'd love to hear about it.

- Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Matthew Finkel
On Sun, May 03, 2015 at 06:17:20PM -0400, JovianMallard wrote:
 Matt,
 
 Inspired by the options to confirm domain ownership with Google,
 Could you ask the relay operator to include a randomly generated (by
 you) token in their contact field? It may take a while to propagate and
 it requires action on the operator's part, but it's not difficult and I
 expect it provides the assurance you need.
 

Thanks for the suggestion! I did consider this and other similar
methods. The major disadvantage I see with this one is that there will
be a historical record of when the operator requested a t-shirt. Maybe
this doesn't matter, though. It's probably a better option than some
of the others.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-03 Thread Seth

On Sat, 02 May 2015 14:37:04 -0700, nusenu nus...@openmailbox.org wrote:

Is there a specific reason why you limit yourself to vultr?


Yes, there are several.

* Price (hardware bang for the buck. SSD, 1000GB bw/mo in most locations.  
Starter pkg is $5/mo)
* Features/usability (really like their control panel and website design.  
Snapshots are key, ability to re-deploy snapshots anywhere. Two factor  
auth with Yubikey.)
* OpenBSD supported via custom ISO install feature (This limits the field  
quickly)

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Drop in relay count

2015-05-03 Thread Steve Snyder
On Sunday, May 3, 2015 10:08am, Linus Nordberg li...@nordberg.se said:

 Hi,
 
 Looking at the graphs showing the number of relays in the network it
 seems like we've lost about 500 (-7%) relays since the beginning of this
 year.
 
   
 https://metrics.torproject.org/networksize.html?graph=networksizestart=2015-01-01end=2015-05-03
   
 https://metrics.torproject.org/networksize.html?graph=networksizestart=2012-01-01end=2015-05-03

My uninformed guess would be that the higher minimum bandwidth requirements in 
v0.2.6.x forced out the marginal relays.


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Drop in relay count

2015-05-03 Thread Linus Nordberg
Hi,

Looking at the graphs showing the number of relays in the network it
seems like we've lost about 500 (-7%) relays since the beginning of this
year.

  
https://metrics.torproject.org/networksize.html?graph=networksizestart=2015-01-01end=2015-05-03
  
https://metrics.torproject.org/networksize.html?graph=networksizestart=2012-01-01end=2015-05-03

Looking at the graphs showing the total relay bandwidth of the network
it seems like the advertised bandwidth has increased with about 25 Mbps
(+23%).

  
https://metrics.torproject.org/bandwidth.html?graph=bandwidthstart=2015-01-01end=2015-05-03
  
https://metrics.torproject.org/bandwidth.html?graph=bandwidthstart=2012-01-01end=2015-05-03

Seems a bit contradictory at first sight. A guess would be that a lower
number of fast relays have replaced a higher number of slow ones but I
haven't looked into it more.

Anyone who's looked into this? And can back up their theory with some
numbers.

Thanks,
Linus
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Roger Dingledine
Matt: Thanks for leading us forward on the tshirt topic! I still, alas,
have a pile of tshirt requests from Jan-Mar that I should collate and
forward to you.

On Sun, May 03, 2015 at 10:26:52AM -0800, I wrote:
 Isn't the value of the t-shirt disproportionate to the trouble you're
going to to give them out?
 If the weather message offering the t-shirt is answered by the same
address isn't that proof enough?

I think I agree with this: if somebody has a copy of a Tor weather
mail, then they -- oh. You can sign up to watch somebody else's relay,
and then you get their tshirt notification?

I guess the obvious fix is to only have weather send tshirt notifications
when it has auto-parsed the contact info itself, rather than when a
human signs up to watch a given relay.

But the obvious fix involves changing Tor Weather. It's my understanding
that we have a rewrite already done by a GSoC student, but nobody has
attempted to deploy the rewrite because nobody wants to mess with the
current weather instance (and because Karsten, the original mentor,
is overloaded).

Tor Weather should really be a community thing, not a service that
Tor maintains, given how we're stretched thin as it is.

I met a nice fellow in Valencia who lives in Berlin and offered to pick
it up. But I haven't heard anything further from that conversation.

Really, Weather is messy because it tries to serve many too many purposes
at once -- two of the extremes are letting people sign up to get email
when their relay goes offline, and also tracking historical relay uptime
data in order to tell us (and the operator) when a given relay has passed
a given milestone.

Of course, making it a community thing could easily mean even more
inconsistency over time. Hm indeed.

--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-03 Thread nusenu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

 * Price (hardware bang for the buck. SSD, 1000GB bw/mo in most 
 locations. Starter pkg is $5/mo)

I'd say 7$ for 2TB/mo on 1GB RAM is expensive if you compare it with
100mbps unmetered and lets say you are able to saturate ~50% =
~30TB/mo (~50 mpbs* in one direction) for ~15$/mo with 1GB RAM (in HU,
0.6% CW).

https://lists.torproject.org/pipermail/tor-relays/2013-January/001835.html

2TB/mo is not a lot of traffic, it translates to less than 4mpbs in
one direction.

..but anyway thanks for adding more OpenBSD relays.



-BEGIN PGP SIGNATURE-
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=PcDq
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Aaron Hopkins

On Sun, 3 May 2015, Matthew Finkel wrote:


Assuming the path to their data dir is /var/lib/tor, we ask them to run:


Please don't get in the habit of asking relay operators through e-mail to
run complex bash command lines as root.  As a security practice, this is
terrible.  (How do you know the suggested command wasn't altered before it
reached its recipient?)

If you want to build a utility for this into the tor distribution, and make
it obvious what it does, I think that's fine.  If the site asked people to
run tor-request-tshirt or more generically tor-verify-ownership and it
asked for whatever required information, I'd think that'd be more obviously
safe.

Or as Robert suggests, just send verification mail to the listed contact
address of the relay.  If they don't list one on their config, find an
alternate verification mechanism like e-mailing whois contacts for the IP or
domain name, or refuse the request.

-- Aaron
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread I
Matt,

Thanks for handling the backlog of t-shirts as they are important as an 
acknowledgement of valuable contributions.

Isn't the value of the t-shirt disproportionate to the trouble you're going to 
to give them out?
If the weather message offering the t-shirt is answered by the same address 
isn't that proof enough?

As I haven't received a message yet and my details are plain and simple I 
wonder what could have gone wrong.

Robert


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Drop in relay count

2015-05-03 Thread nusenu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

 Looking at the graphs showing the number of relays in the network
 it seems like we've lost about 500 (-7%) relays since the beginning
 of this year.
 
 https://metrics.torproject.org/networksize.html?graph=networksizestart=2015-01-01end=2015-05-03

 
https://metrics.torproject.org/networksize.html?graph=networksizestart=2012-01-01end=2015-05-03
 
 Looking at the graphs showing the total relay bandwidth of the
 network it seems like the advertised bandwidth has increased with
 about 25 Mbps (+23%).

I doubt that 25 Mpbs is 23% of the tor network capacity, I guess it
should say GBit/s.


 https://metrics.torproject.org/bandwidth.html?graph=bandwidthstart=2015-01-01end=2015-05-03

 
https://metrics.torproject.org/bandwidth.html?graph=bandwidthstart=2012-01-01end=2015-05-03
 
 Seems a bit contradictory at first sight. A guess would be that a
 lower number of fast relays have replaced a higher number of slow
 ones but I haven't looked into it more.
 
 Anyone who's looked into this? And can back up their theory with
 some numbers.

Unfortunately I've got no historic onionoo details data that goes back
to 2014 to compare with current data, but if anyone has, feel free to
upload it somewhere.

You probably also know about the 0.2.3.x relays:
https://metrics.torproject.org/versions.html
-BEGIN PGP SIGNATURE-
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=Jf3H
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Sebastian Urbach

On May 3, 2015 7:45:39 PM Matthew Finkel matthew.fin...@gmail.com wrote:

Hi Matthew,


Hi Ops,

We recently began responding to t-shirt requests again. Sorry for the
long silence. There's been a lot happening around here but not enough

0 time or people to do everything, so the t-shirt requests simply remained

untouched. But, despite the overload, t-shirts are important because
they are a small token of our thanks and appreciation for making the
network what it is today.

We responded to around 70 t-shirt requests from relay operators in
April, which comprised all requests for which we could verify (within
reason) the request came from the person who controlled the qualifying
relay. We still have another 20 requests where the requestor is not
obviously the owner of the relay. Currently the content of a relay's
Contact field is used, but this does not always provide enough (or any)
information. For this case, we need an authentication mechanism which
proves control of the relay but is something relay operators won't mind
running.


I'm really not amused. As i recall a bunch of people including myself 
offered to help. I get the distinct impression that you keep everything 
within a small circle of people, no matter what. Even if that means that 
services are suffering.



 
My currently plan is to ask relay operators to sign the fingerprint file
which tor creates. The major disadvantage of this method is that it must
be run as root (or a user with access to tor's data directory).

The following process is the current plan, but does anyone have a better
idea? Does it seem logical?


When we receive a t-shirt request from someone who isn't obviously in
control of the relay, we ask them to sign their fingerprint file with
a unique salt.

Assuming the path to their data dir is /var/lib/tor, we ask them to run:

$ (echo -n salt ; cat /var/lib/tor/fingerprint) | openssl sha256 \
   -binary | openssl pkeyutl -inkey /var/lib/tor/keys/secret_id_key \
   -sign -pkeyopt digest:sha256 -pkeyopt rsa_padding_mode:pss \
   -pkeyopt rsa_pss_saltlen:32 | openssl base64  signed_fingerprint

They send us both /var/lib/tor/fingerprint and signed_fingerprint.

When we receive them, we confirm the fingerprint in the fingerprint file
matches the qualifying relay. Then we retrieve the relay's public key
from its descriptor and convert it into pkcs#8 format using:

$ openssl rsa -pubin -in pubkey_pkcs1 -RSAPublicKey_in -out pubkey

and then we verify the sig using following commands:

$ (echo -n salt ; cat fingerprint) | openssl sha256 -binary | \
   openssl pkeyutl -pubin -verify -inkey pubkey -sigfile \
   $(OUT=/tmp/signed_fingerprint_bin; base64 -d signed_fingerprint  \
   ${OUT}; echo ${OUT}) -pkeyopt digest:sha256 -pkeyopt \
   rsa_padding_mode:pss -pkeyopt rsa_pss_saltlen:32; rm \
   /tmp/signed_fingerprint_bin;

This should yield Signature Verified Successfully.



Another disadvantage of this is PSS wasn't implemented in openssl's
apps until 1.0.1. I wonder how many relays are running on servers which
are still using openssl 0.9.8 (and 1.0.0?). For these servers we can
fallback on pkcs#1 v1.5 signatures.



The signature can be created using a command similar to the one above:

$ (echo -n salt ; cat /var/lib/tor/fingerprint) | openssl dgst \
   -sha256 | openssl rsautl -inkey /var/lib/tor/keys/secret_id_key \
   -sign | openssl base64  signed_fingerprint

Again, they provide /var/lib/tor/fingerprint and signed_fingerprint,
and we verify using:

$ test $(openssl base64 -d -in signed_fingerprint | openssl rsautl \
   -pubin -verify -inkey pubkey) = $((echo -n salt ; cat \
   fingerprint) | openssl dgst -sha256); echo $?


In addition, again, we confirm the fingerprint in the fingerprint file
matches the fingerprint of the qualifying relay.


Originally I used a few bashisms which made these simpler, but for
this I suspect portability is important.

Sorry this is a bit long.

Thanks,
Matt




--
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




--
Sincerely yours / Sincères salutations / M.f.G.

Sebastian Urbach

-
Religion is fundamentally opposed to
everything I hold in veneration - courage,
clear thinking, honesty, fairness, and,
above all, love of the truth.
-
Henry Louis Mencken (1880 - 1956),
American journalist, essayist, magazine
editor, satirist and critic.


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] T-shirts and Confirming Relay Control

2015-05-03 Thread Matthew Finkel
On Sun, May 03, 2015 at 10:26:52AM -0800, I wrote:
 Matt,
 
 Thanks for handling the backlog of t-shirts as they are important as an 
 acknowledgement of valuable contributions.
 
 Isn't the value of the t-shirt disproportionate to the trouble you're going 
 to to give them out?
 If the weather message offering the t-shirt is answered by the same address 
 isn't that proof enough?
 
 As I haven't received a message yet and my details are plain and simple I 
 wonder what could have gone wrong.

Hi Robert,

I replied privately about your situation but it's possible this plan is
more complicated than it needs to be. In general, I'd prefer we receive
t-shirt requests from the same email address as is specified in the
Contact field. Obviously, if they are different, we can always send the
response and t-shirt link to the address in the Contact field, but that
asymmetry seems weird to me, but I'm not against doing this.

For the situations where there is no email address in the contact field,
I'm not certain how else we can confirm we're sending the t-shirt to the
person who deserves it.

Thanks for your input!

- Matt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-03 Thread nusenu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

 OVH is pretty good value,
 
 CAD$2.99/mo for 1GB RAM and unlimited transfer at 100Mbps (it’s
 speed limited after 10,000GB) and both IPv4/6.
 
 However there are 424 OVH relays across 12 countries might not fit 
 with your goal to add more diversity

Yes, OVH AS is probably the worst place to add relays from a diversity
pov since it is the AS with the highest CW fraction (10%).
-BEGIN PGP SIGNATURE-
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=Z1Ih
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays