Re: [tor-relays] Bridge Distribution Mechanism none

2022-04-19 Thread lists
On Tuesday, April 19, 2022 2:28:01 PM CEST 55578 via tor-relays wrote:
> Probably because obfs4 is not installed or not running properly.
Get the obfs4proxy package from backports. Outdated obfs bridges are rejected 
AFAIK.

https://lists.torproject.org/pipermail/tor-relays/2022-March/020447.html

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Instabilities in Hydra family expected

2022-04-19 Thread Spydar007 via tor-relays
Hello,

Regarding Yourserver.se: I too recently began running an exit there.[1] I 
receive multiple abuse complaints a week, they simply forward them and close 
the ticket without needing a response.

I have been a customer of Yourserver.se for many years, back when Sweden was 
the only option for a location, back when they were only providing OpenVZ and 
not KVM, back when they would limit servers running Tor relays to 5Mbps (which 
they no longer seem to bother with).

I ran a middle relay back then, and I remember having discussions with them 
about Tor - they didn't really understand the principle of an exit relay, so I 
chose to just stick with a middle relay to be safer. Now having come back to 
relay operation I decided I would give an exit a go there - there are several 
others across their two ASNs[2][3] (majority Hydra) and having been a customer 
and having extensive contact with their team over the years I figured I am 
likely to have more of an understanding with them.

The exit did get suspended a few weeks back for "malware", and I opened a 
ticket explaining Tor and how I am not responsible for whatever they mean 
"malware" to be. They unsuspended it with the response:
> The VPS was blocked for malware.
> We don't accept this malware.
> We unspended Your VPS.

I took that to mean that the "malware" being distributed over Tor is irrelevant 
to them.

Everything has been fine since, until today (ironically) when it got suspended 
for "spam". They responded with:
> We allow TOR, but don't allow spam.
> We unsuspend Your VPS.
> We receive very much spam abuse about Your VPS.
> Please, check Your VPS.

I think they continue to misunderstand the purpose of Tor or would prefer 
people to somehow run exits without any issues whatsoever.

I do run my exit with an almost completely open exit policy (except for mail 
ports and ports they block[4]), so I plan to now set it to reduced and see if 
that helps them be ok with it. I notice the Hydra relays are already on a 
substantially reduced policy (beyond even the reduced-reduced policy), so 
perhaps this will make no difference in my case either and I will end up also 
needing to move them elsewhere. I am happy to endure with Yourserver.se though, 
I do not want my years of being a happy customer to be ended because they don't 
understand Tor well enough.

With regards alternative hosts, I recently discovered rdp.sh[5], who operate 
under a new ASN.[6] They are happy with Tor exits if you comply with their 
policy[7] (let them know first and block mail ports), and they provide 
unmetered 5 Gbps connection in the Netherlands.[8] They also run some reduced 
exits and middle relays themselves, and the operators of the bauruine family 
also began running exits a few days before me.
It's worth noting however that they don't provide IPv6 right now, and won't set 
reverse DNS PTR records on request (I tried).
They could prove to be a good replacement for Yourserver.se if you need one.

Cheers,
Spydar007

[1] 
https://metrics.torproject.org/rs.html#details/CC8732E6E34D8C1AA61A3B7FE95DDD71BCE9C880
[2] https://metrics.torproject.org/rs.html#search/as:AS43513%20flag:exit
[3] https://metrics.torproject.org/rs.html#search/as:AS52173%20flag:exit
[4] https://www.yourserver.se/knowledgebase/35/Blocked-ports.html
[5] https://rdp.sh
[6] https://metrics.torproject.org/rs.html#search/as:AS210558
[7] https://rdp.sh/docs/faq/tor
[8] https://rdp.sh/docs/faq/traffic-limit
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Bridge Distribution Mechanism none

2022-04-19 Thread 55578 via tor-relays
Probably because obfs4 is not installed or not running properly.

Check your logs for obfs4 errors, and for Apparmor error messages as well.

On Mon, Apr 18, 2022 at 09:07, Ross Camm  wrote:

> I have been up and running with my Tor Bridge for a number of months now, yet 
> Tor Metrics reports that the Bridge Distribution Mechanism for my server is 
> stuck on 'none'.
>
> Consequently I see no incoming connections to my Bridge.
>
> I have tried altering the following
>
> BridgeRelay 1
>
> PublishServerDescriptor bridge
> BridgeDistribution moat
>
> with no success.
>
> The mechanism is always noneand I have left the changes for a week to see 
> if Metrics updates to no avail.
>
> I have a static IPv4 address and functional IPv6 and have confirmed my ports 
> are publicly accessible for both protocols
>
> Self-testing indicates your ORPort [::::XXX]:993 is reachable 
> from the outside. Excellent.
> Self-testing indicates your ORPort XXX.XXX.XXX.XXX:993 is reachable from the 
> outside. Excellent. Publishing server descriptor.
>
> I am running raspberry pi os buster which had an obsolete Tor version.
>
> I subsequently upgraded and stay up to date with the latest bullseye version 
> via bullseye backports,
>
> Currently Tor 0.4.6.10-1~bpo10+1
>
> Any ideas of why my servers Bridge Distribution Mechanism is always reported 
> and behaving as none ?
>
> Thanks in advance ;)
>
> Ross___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor Relay showing as down

2022-04-19 Thread Alexandre Corradi Guerreiro
I have been running a ToR Relay for almost a year.
https://metrics.torproject.org/rs.html#details/6C6C87A774A211F53DE5116A7A8A9C447103A08B
and suddenly it stopped working.
I don't see any errors on the logs but the relay is always showing in the
relay search page as down. I even tried to upgrade the Tor client to a new
version 0.4.6.10 to see if something changes, but no success.
The process is running all the time, I see some circuit connections forming
and after a while no more traffic going.
Based on the syslog I see that everything looks fine, see next example.
Apr 18 20:32:17 ubu01 Tor[1093]: Bootstrapped 10% (conn_done): Connected to
a relay
Apr 18 20:32:17 ubu01 Tor[1093]: Bootstrapped 14% (handshake): Handshaking
with a relay
Apr 18 20:32:18 ubu01 Tor[1093]: Bootstrapped 15% (handshake_done):
Handshake with a relay done
Apr 18 20:32:18 ubu01 Tor[1093]: Bootstrapped 75% (enough_dirinfo): Loaded
enough directory info to build circuits
Apr 18 20:32:18 ubu01 Tor[1093]: Bootstrapped 90% (ap_handshake_done):
Handshake finished with a relay to build circuits
Apr 18 20:32:18 ubu01 Tor[1093]: Bootstrapped 95% (circuit_create):
Establishing a Tor circuit
Apr 18 20:32:19 ubu01 Tor[1093]: Bootstrapped 100% (done): Done
Apr 18 20:32:54 ubu01 Tor[1093]: New control connection opened.
Apr 18 20:37:51 ubu01 Tor[1093]: External address seen and suggested by a
directory authority: 187.74.71.95
Apr 18 20:38:17 ubu01 Tor[1093]: Now checking whether IPv4 ORPort
187.74.71.95:9001 is reachable... (this may take up to 20 minutes -- look
for log messages indicating success)
Apr 18 20:39:20 ubu01 Tor[1093]: Self-testing indicates your ORPort
187.74.71.95:9001 is reachable from the outside. Excellent. Publishing
server descriptor.
Apr 18 20:40:27 ubu01 Tor[1093]: New control connection opened.
Apr 18 20:42:20 ubu01 Tor[1093]: Performing bandwidth self-test...done.

I tried to test my income connection from another computer to validate that
there was no block on the ISP side, I could connect successfully to port
9001 as indicated on the logs.
How can I troubleshoot  this problem?
--
Alexandre C Guerreiro
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays