Re: [tor-relays] Updating tor issue

2024-05-06 Thread Micah Elizabeth Scott

On 5/6/24 3:19 PM, li...@for-privacy.net wrote:

Did you even only read 2 sentences from the link?


Can we stop just accepting behavior like this on the tor community's 
mailing lists?


Seriously, it makes us all look bad.

I'm sorry folks have to endure so much just to use a computer program 
that's intended to be humane and helpful.


--beth
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Updating tor issue

2024-05-06 Thread lists
On Freitag, 3. Mai 2024 18:17:41 CEST Keifer Bly wrote:
> System is up to date, I run apt-get update regularly.

Did you even only read 2 sentences from the link?
Buster is EOL and will be completely archived in a few weeks.
> > https://www.debian.org/releases/buster/
Debian is 2 releases ahead!
You won't get 3rd party packages (tor) anymore.

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Operator Meetup - Saturday, April 13, 2024 at 19 UTC

2024-05-06 Thread gus
Hi,

Here are the meetup notes from April 2024. Sorry for sharing it only now.

The next meetup will happen this Saturday, May 11, 2024 at 19 UTC.
Feel free to add your topics here:
https://pad.riseup.net/p/tor-relay-may24-meetup-keep

cheers,
Gus

## Notes - Tor Relay Operator Meetup - April 13rd, 2024 @ 19 UTC

- Announcements:
 - New Network Health Team lead
   Read more about the network health team, and its goals and
priorities, at https://gitlab.torproject.org/tpo/network-health/team

 - 0.4.7 EOL removal
   Dir auths upgraded to 0.4.8.11 and relays running 0.4.7 were removed.
Dir auth Serge will upgrade to 0.4.8.11 sometime in May as getting new
bridges is harder than getting new relays.  If you don't upgrade your
logs will tell you that you need to upgrade.

 - Relay operator census: 

   Please fill out their survey! It takes some time to answer the
questions, but it is helpful to us for understanding our community. Even
if you used to run a relay and don't now, it's still useful. We will
publish the results of the survey in an anonymous way. It is funded by
OTF to fund fellowships for the people working on it. 80 responses so
far, which is good since it's only been publicized on the mailing list.
Next step is to mail the ContactInfo addresses for relay operators to
let them know about it.

English: https://survey.torproject.org/index.php/751125?lang=en
Spanish: https://survey.torproject.org/index.php/751125?lang=es

 - Tor-Weather 2.0 Release: 

   Tor weather is a service to notify you when your relay or bridge goes down.

 - New directory authority, tor26, and upcoming return of directory authority, 
Faravahar.
   Not because of any compromise or anything -- it's because tor26
moved to new hardware and a new internet location, so he decided it was
a good time to rotate to fresh keys.

 - Updates on the (D)dos situation Some relay operators are still seeing
   an ongoing overload, and some users were seeing speed issues. It
sounds like some guards are overloaded and some are less.  It sounds
like exit relay operators are less impacted by this recent issue.  What
in particular is overloaded? Memory, sockets, bandwidth? We don't know
-- the "overloaded" flag on relay-search doesn't tell us more specifics.

- Elections 2024: previous (March) / next round (April) Russia: before
  the elections, they blocked ntc.party, which is a major resource for
internet censorship discussion/advice. After the elections, they blocked
one further Tor website mirror. It looks like some of our other mirrors,
e.g. tor.eff.org, had been blocked already there.  Downloads via
official site (dist.torproject.org, not www.torproject.org) still work
though.  Upcoming elections in India, Panama, Dominican Republic, South
Africa For India, check out https://internetshutdowns.in/ run by SFLC in
India. As you've seen from the transparency reports there, the number of
internet shutdowns is in the past five years is unprecedented.

- New policy: guidelines for sustainability and incentivization proposals for 
the Tor network.
  - If you want to get some background on past tor incentive designs, check out 
https://blog.torproject.org/tor-incentives-research-roundup-goldstar-par-braids-lira-tears-and-torcoin/
 (now 10 years old!)
  - The new meta-proposal for how to structure your sustainability / incentives 
ideas will go public after some more interaction between Tor stakeholders 
before opening to the community.
  - Another ideas raised: small grants proposal, to do trainings for relay 
operators in areas or situations or countries where we need more participation.
  - Other ideas: it would be great for somebody to explore a badge-based 
gamification idea. Some of the work involved: what exactly do we want to 
incentivize?
  - Link: 
https://community.torproject.org/policies/relays/001-community-relay-operator-process/

# Questions & Answers

* Q: zimmer family hitting max descriptor size
https://gitlab.torproject.org/tpo/core/tor/-/issues/40837
Any news on a possible solution to this ongoing issue?
This is due to zimmer's family being really big. The eventual plan is to
move to a new design, e.g.
https://gitlab.torproject.org/tpo/core/torspec/-/blob/main/proposals/321-happy-families.md
But the network team doesn't want to spend time working on C-Tor, and
Arti relays are more than a year off, so we're in an awkward holding
pattern.

* Q: the tor-relays@ list needs a moderator now that geko is taking a
break. There are several queued messages from last week.
A: Hiro needs to get the credentials for moderating tor-relays@.

* Q: Is the conflux design actually helping with performance? What stats
do we have there? (Question comes from the recent tor-relays@ thread
about Conflux, crash bugs, and performance.)

A: This is a good question and we would like to see some data that
supports 

Re: [tor-relays] Ansible for Tor Network Webtunnel Bridges

2024-05-06 Thread Jacobo Nájera

Hi, Carlos

Sure,

I started studying Webtunnel technology on July 2023. Once I understood 
its architecture and operation, I began the automation process. This was 
documented through a step-by-step guide with out automation:


https://acuare.la/en/webtunnel-installation/

The ansible role is a result of our project Arrecife at Acuarela. 
Arrecife is an Internet traffic routing system distributed in Latin 
America, covering the Gulf, Caribbean and Atlantic regions. This project 
focuses on the development of new technologies focused on the right to 
communication, through the study, development and implementation of them 
in said system. Currently, Arrecife is focused on the development of 
Webtunnel.


Thanks,
Jacobo


En 01/05/24 16:16, Carlos escribió:

Hi Jacobo,


Would you please detail the steps of your progress in the code, to this 
outcome, for a mere quick audition?


Cheers,
A.

On 4/29/24 5:26 PM, Jacobo Nájera wrote:

Hi,

Share this Ansible role for Webtunnel, with which you can install, 
configure, and operate Tor network Webtunnel bridges. Currently, it 
supports installing bridges on Debian, with support for other 
operating systems coming soon.


Repository with the Ansible role for Webtunnel
https://github.com/nvjacobo/webtunnel

In the Ansible Galaxy repository
https://galaxy.ansible.com/nvjacobo/webtunnel

A small guide to use the role
https://acuare.la/en/ansible-webtunnel-bridges-tor-network/

Feedback are welcome!

Thanks, Jacobo
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Updating tor issue

2024-05-06 Thread Keifer Bly
System is up to date, I run apt-get update regularly.
--Keifer


On Fri, May 3, 2024 at 9:15 AM  wrote:

> On Freitag, 3. Mai 2024 17:00:44 CEST Keifer Bly wrote:
>
> > What is the correct format for adding tor as a trusted source?
> A not outdated system. ¹AFAIK obfs4proxy for buster (oldoldstable) has had
> a
> security hole for a long time and you are putting your users at risk!
>
> > deb-src http://deb.debian.org/debian buster main
> > deb http://security.debian.org/ buster/updates main
> > deb-src http://security.debian.org/ buster/updates main
> First upgrade the system. buster -> bullseye -> bookworm
> https://www.debian.org/releases/buster/
>
> https://www.debian.org/releases/bullseye/releasenotes
> https://www.debian.org/releases/stable/releasenotes
>
> Reinstalling might be easier.
>
> ¹Upgrading your old system & obfs4proxy was recommended here 2-3 years ago.
> Somehow you're going around in circles.
>
> --
> ╰_╯ Ciao Marco!
>
> Debian GNU/Linux
>
> It's free software and it gives you
> freedom!___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays