Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-07 Thread NOC

Hi,

great to see that the Tor network can lose ~20% capacity without having 
impact on the performance of the complete network. So can we get rid of 
the non dual stack relays now too?


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Please help us find a working alternative to using MaxMind's GeoLite2 databases

2020-07-07 Thread Stefan Spühler

Hi Karsten

I'm the operator of bauruine51 (185.204.1.239). Finland is the correct 
location and not Russia.

Other relays with the same hoster which are also wrong:
    - SingularET
    - AutoNoMe
    - whatevr8
    - BlackHall

The nodes that are FI in MaxMind and DE in your alternative are mostly 
(all?) Hetzner Finland servers. e.g. Ranlvor and HORUS1.


Best regards,
Stefan

On 07.07.20 11:19, Karsten Loesing wrote:

On 2020-02-12 16:05, Karsten Loesing wrote:

Hi relay operators,

as you might have heard, MaxMind has changed access and use of their
GeoLite2 databases:

https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases/

This affects Onionoo and tor, and I'm trying to find a working
alternative on the following ticket:

https://trac.torproject.org/projects/tor/ticket/32978

Today I think I found a possible alternative by using data from another
provider. But before I name it here, I'd first want to find out how
accurate it is.

I tried resolving relay IP addresses of relays that have been running in
the past week and compared that to our existing lookups using MaxMind's
October database.

The result is that 7669 relays (93%) had the same country code and ASN.

I put the remaining 7% on the following wiki page:

https://trac.torproject.org/projects/tor/wiki/doc/MetricsGeoipComparison

I'd like to hear from you which data source is right and which is wrong
(or if both are wrong).

If you'd like to help, please leave comments on the ticket or in the
"Comment" column on that wiki page by February 19, 2020.

Thanks for helping!

Hello again,

I'm bumping this thread, because there's (finally) news on finding an
alternative to MaxMind:

https://gitlab.torproject.org/tpo/metrics/trac/-/issues/32978

(Yes, you'll have to scroll down quite a bit to find the news, it's a
long ticket.)

Can relay operators please take a look at that ticket and see if they
find their relay in the table with different country results?

It would be neat to identify patterns there and possibly improve the
accuracy of the new database.

Thanks for your help!

All the best,
Karsten


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-07 Thread Toralf Förster
On 7/7/20 7:13 PM, NOC wrote:
> 
> great to see that the Tor network can lose ~20% capacity
What let you think that this is correct ?

-- 
Toralf



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] >23% Tor exit relay capacity found to be malicious - call for support for proposal to limit large scale attacks

2020-07-07 Thread Matt Corallo
While I fully support the direction here I do wonder if there’s not also other 
information that could be used. Eg in bitcoin-land we have persistent issues 
with anti-privacy services operating large numbers of relays all one three  
ASNs. In the future, we’ll likely be shipping a compressed netblock -> primary 
ASN (where we map stub ASNs that always transit one upstream to their upstream) 
table with the software to limit connections to the same networks. Last I 
heard, Tor’s sybil attackers did something similar, so at least forcing them to 
establish business relationships with many hosting providers by limiting 
percentage of relays in a given ASN may be somewhat limiting. If nothing else, 
it also captures another useful trait that you don’t want to just bounce your 
traffic across five hosts in different OVH datacenters from a traffic 
correlation perspective.

Matt

>> On Jul 5, 2020, at 13:51, nusenu  wrote:
> Thanks for all the positive off-list feedback so far!
> 
> 
>>> a) require a verified email address for the exit or guard relay flag.
>>> (automated verification, many relays)
>> 
>> Wouldn't that be a hurdle for a lot of relay operators? I can imagine
>> that many operators (of smaller relays) don't publish contact
>> information for privacy reasons.
> 
> I believe you can have a valid ContactInfo and privacy.
> 
>> Of course, in your proposal that
>> information would only be shared with the directory authorities
> 
> That is not necessarily the case if the ContactInfo field is used without 
> encryption,
> basically it is not specified yet.
> 
>> but do
>> we have any numbers on how many relay operators are okay with this?
> 
> I can only give you numbers based on the current tor network data
> (but that is not an answer to your question since it does not reveal anything 
> about the 
> operator's intention)
> 
> ~71% of tor's guard capacity has a non-empty ContactInfo. 
> About 700 guard relays have no ContactInfo set and are older than 1 month.
> 
> ~89% of tor's exit capacity has a non-empty ContactInfo. 
> Only about 60 exit relays have no ContactInfo set and are older than 1 month.
> 
> 
>>> b) require a verified physical address for large operators (>=0.5%
>>> exit or guard probability)
>>> (manual verification, low number of operators).
>>> It is not required that the address is public or stored after it got
>>> verified.
>>> For details see bellow [2].
>> 
>> However, 0.5% seems like an arbitrary number to me. Can you provide
>> some background information on how you got to this percentage? Is there
>> maybe some way to calculate a malicious relay operator's
>> deanonymisation success rate?
> 
> The reasoning behind the specific threshold will be covered
> in more detail in the upcoming blog post.
> 
> 
>>> Q: How many operators would be affected by the physical address
>>> verification requirement if we use 0.5% as a threshold?
>>> A: About 30 operators.
>>> There are currently about 18 exit [3] and 12 guard operators that run
 0.5% exit/guard capacity
>>> if we ignore the fresh exit groups from 2020.
>>> Most exit operators (14 out of these 18) are organizations with
>>> public addresses or have their address published in WHOIS
>>> anyway.
>> 
>> Please don't assume that all big relay operators are happy with sharing
>> their physical address because most of them already do. Maybe we can
>> poll the big relay operators to find out if they are okay with this? (I
>> don't know if all of them are represented on this list)
> 
> In fact, my initial email went to many operators (after the mailing list was 
> not happy with so many recipients
> I did resend it to the list without the others in TO, so unfortunately you
> no longer see the full list of recipients),
> but yes, that is the point of this email - getting feedback from operators, 
> especially from big ones.
> I a few replied already.
> 
> 
>> It is definitely an interesting idea, one that I have not thought of at
>> least. But I'm not sure if it would be effective at preventing what it
>> tries to prevent.
> 
> Yes, that is basically the key question and since there appears to be a lot of
> money involved in running malicious relays, they certainly have enough money
> to buy some office services in some random place and get a physical address
> verified but one of the other factors of the proposal is also the additional 
> time
> required for an attacker to go trough the process and that it can no longer 
> be automated completely.
> 
> kind regards,
> nusenu
> 
> 
> 
> 
> -- 
> https://mastodon.social/@nusenu
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Please help us find a working alternative to using MaxMind's GeoLite2 databases

2020-07-07 Thread Pascal Terjan
On Tue, 7 Jul 2020 at 10:20, Karsten Loesing  wrote:
>
> On 2020-02-12 16:05, Karsten Loesing wrote:
> > Hi relay operators,
> >
> > as you might have heard, MaxMind has changed access and use of their
> > GeoLite2 databases:
> >
> > https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases/
> >
> > This affects Onionoo and tor, and I'm trying to find a working
> > alternative on the following ticket:
> >
> > https://trac.torproject.org/projects/tor/ticket/32978
> >
> > Today I think I found a possible alternative by using data from another
> > provider. But before I name it here, I'd first want to find out how
> > accurate it is.
> >
> > I tried resolving relay IP addresses of relays that have been running in
> > the past week and compared that to our existing lookups using MaxMind's
> > October database.
> >
> > The result is that 7669 relays (93%) had the same country code and ASN.
> >
> > I put the remaining 7% on the following wiki page:
> >
> > https://trac.torproject.org/projects/tor/wiki/doc/MetricsGeoipComparison
> >
> > I'd like to hear from you which data source is right and which is wrong
> > (or if both are wrong).
> >
> > If you'd like to help, please leave comments on the ticket or in the
> > "Comment" column on that wiki page by February 19, 2020.
> >
> > Thanks for helping!
>
> Hello again,
>
> I'm bumping this thread, because there's (finally) news on finding an
> alternative to MaxMind:
>
> https://gitlab.torproject.org/tpo/metrics/trac/-/issues/32978
>
> (Yes, you'll have to scroll down quite a bit to find the news, it's a
> long ticket.)
>
> Can relay operators please take a look at that ticket and see if they
> find their relay in the table with different country results?
>
> It would be neat to identify patterns there and possibly improve the
> accuracy of the new database.
>
> Thanks for your help!

I run 3 relays with Scaleway, one in Paris and 2 in Amsterdam, the new
alternative places them all in France.

whois correctly describes the range as being in Amsterdam:

% Information related to '51.15.0.0/17AS12876'

route:  51.15.0.0/17
descr:  SCALEWAY
descr:  Amsterdam, Netherlands
origin: AS12876
mnt-by: MNT-TISCALIFR
created:2019-10-03T15:11:06Z
last-modified:  2019-10-03T15:11:06Z
source: RIPE

% This query was served by the RIPE Database Query Service version
1.97.2 (WAGYU)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Please help us find a working alternative to using MaxMind's GeoLite2 databases

2020-07-07 Thread Karsten Loesing
On 2020-02-12 16:05, Karsten Loesing wrote:
> Hi relay operators,
> 
> as you might have heard, MaxMind has changed access and use of their
> GeoLite2 databases:
> 
> https://blog.maxmind.com/2019/12/18/significant-changes-to-accessing-and-using-geolite2-databases/
> 
> This affects Onionoo and tor, and I'm trying to find a working
> alternative on the following ticket:
> 
> https://trac.torproject.org/projects/tor/ticket/32978
> 
> Today I think I found a possible alternative by using data from another
> provider. But before I name it here, I'd first want to find out how
> accurate it is.
> 
> I tried resolving relay IP addresses of relays that have been running in
> the past week and compared that to our existing lookups using MaxMind's
> October database.
> 
> The result is that 7669 relays (93%) had the same country code and ASN.
> 
> I put the remaining 7% on the following wiki page:
> 
> https://trac.torproject.org/projects/tor/wiki/doc/MetricsGeoipComparison
> 
> I'd like to hear from you which data source is right and which is wrong
> (or if both are wrong).
> 
> If you'd like to help, please leave comments on the ticket or in the
> "Comment" column on that wiki page by February 19, 2020.
> 
> Thanks for helping!

Hello again,

I'm bumping this thread, because there's (finally) news on finding an
alternative to MaxMind:

https://gitlab.torproject.org/tpo/metrics/trac/-/issues/32978

(Yes, you'll have to scroll down quite a bit to find the news, it's a
long ticket.)

Can relay operators please take a look at that ticket and see if they
find their relay in the table with different country results?

It would be neat to identify patterns there and possibly improve the
accuracy of the new database.

Thanks for your help!

All the best,
Karsten



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays