Re: [tor-relays] Relay operators meetup @ rC3: today 22:00 UTC+1
Do you guys meet via video? Is there a calendar? On Tue, Dec 29, 2020 at 01:39 PM, kantorkel wrote: > To avoid confusion: We will meet today at 21:00 UTC, that is 22:00 CET > > https://www.starts-at.com/event/2603308559 > > > > On 12/29/20 12:30 PM, kantorkel wrote: > > Hi all, > > > the meetup will take place today, 2020-12-29, at 10pm UTC+1. > > > In rC3 world, we will meet in the bottom right corner of the Jena > hackerspace "Krautspace" > (https://rc3.world/rc3/room/5edc1329-f55c-46e1-a739-b0d642c2c80f/). Please > use https://jitsi.rc3.world/torrelayops-724b5 to join from the outside > world. > > > Thanks to qbi for organizing the room. > > > Best > > kantorkel > > > On 12/27/20 10:54 PM, Stefan Leibfarth wrote: > >> Hello Tor friends and relay operators, > >> > >> I haven't heard of a relay operators meetup at the ongoing rC3. > >> Are there any plans? > >> If not, who of you is interested? > >> > >> It would be my pleasure arrange a session. > >> Please get back to me. > >> > >> Cheers > >> Leibi > >> > >> ___ > >> tor-relays mailing list > >> tor-relays@lists.torproject.org > >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > >> > > ___ > > tor-relays mailing list > > tor-relays@lists.torproject.org > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > \-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication For everyone. https://www.msgsafe.io ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] attacks from problematic tor exit relays
I am trying to guess what kind of target attacks are possible through problematic relays. Suppose the network relay is controlled by the enemy. How do they determine the original IP address of the outbound traffic? Correlation attacks are possible, but they seem very difficult and probably require a lot of resources. Also, changing the route stops this. If I assume that they determine what traffic flow is mine, and that I always use the same route, what attacks are possible? Are there any good posts or videos? \-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication For everyone. https://www.msgsafe.io ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Question: RAM requirement for an exit relay
Olaf is right Get a $ 5 per month VPS On Wed, Dec 16, 2020 at 08:28 AM, Olaf Grimm wrote: > Hello Amadeus! > > When you talk about a RasPi, I assume you mean a home location. > Please read the recommendations. Never operate an Exit Relay at home! > It will be expensive if the wrong people knock on the door. > > By the way, for an Exit Relay the bandwidth should already be 10MBit/s > or better. > > Olaf > > Am 15.12.20 um 01:44 schrieb Amadeus Ramazotti: > > hey, > > partly related to original question: > > I'm planning to set up a new exit. My very first relay. I'm planning to > use a small SoC with 2GB ram. Something running on ARM like a raspberry pi. > > > > Is this feasible or even a good idea? > > > > Regards > > > > > > On 14 Dec 2020, at 15:10, to...@protonmail.com wrote: > > > > I have several 1 G RAM exits running unbound without a problem. They never > seem to hit swap, either. On FreeBSD: > > last pid: 83973; load averages: 0.86, 0.71, 0.62 up 130+15:44:28 16:02:04 > > 23 processes: 2 running, 21 sleeping > > CPU: 43.1% user, 0.0% nice, 2.7% system, 5.5% interrupt, 48.6% idle > > Mem: 101M Active, 734M Inact, 444M Wired, 151M Buf, 210M Free > > Swap: 512M Total, 512M Free > > > > Go for it, > > > > \--Torix > > > > > > Original Message > >> On Monday, December 14, 2020 1:11 PM, wrote: > >> > >>> On 14.12.2020 13:58, li...@for-privacy.net wrote: > >>> > >>> grep VmPeak/proc/$PID/status = 181836 kB > >> A non exit has less: > >> grep VmPeak/proc/$PID/status = 57336 kB > >> tor-proxy-02.for-privacy.net ^^ > >> > >> > \--- > >> > >> p_o Ciao Marco! > >> > >> Debian GNU/Linux > >> > >> It's free software and it gives you freedom! > >> > >> tor-relays mailing list > >> tor-relays@lists.torproject.org > >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > > > ___ > > tor-relays mailing list > > tor-relays@lists.torproject.org > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > ___ > > tor-relays mailing list > > tor-relays@lists.torproject.org > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > \-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication For everyone. https://www.msgsafe.io ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] reporting Abusive exit nodes
It's great. Great content here too: https://wiki.archlinux.org/index.php/Tor Where do you put the configuration file when running a network from real-time distro (tails) that does not allow /etc/tor/torrc modification? On Wed, Dec 9, 2020 at 07:56 PM, li...@for-privacy.net wrote: > On 04.12.2020 05:21, BRBfGWMz wrote: > > I frequently find abusive exit nodes. Is there any way to report these > > to the > > tor consensus system, so it deprioritizes them? > You can also post here or in tor talk. bad-relays is a closed list. :-( > > > Or can I build a configuration file or list of exit nodes that I don't > > want in > > my chain? > > Of course: > > ## A list of identity fingerprints and country codes of nodes to use for the > first hop in your normal circuits. (nuts, NO address patterns!? > EntryNodes $fingerprint,{cc} > ## A list of identity fingerprints, country codes, and address patterns of > nodes to use as exit node. > ExitNodes $fingerprint,{cc},203.0.113.0/24,[2001:DB8::] > ## A list of identity fingerprints, country codes, and address patterns of > nodes to avoid when building a circuit. > ExcludeNodes $fingerprint,{cc},203.0.113.0/24,[2001:DB8::] > ## A list of identity fingerprints, country codes, and address patterns of > nodes to never use when picking an exit node. Nodes listed in ExcludeNodes > are automatically in this list. > ExcludeExitNodes $fingerprint,{cc},203.0.113.0/24,[2001:DB8::] > > ## A list of identity fingerprints, nicknames, country codes, and address > patterns of nodes that are allowed to be used as the second hop in all > client or service-side Onion Service circuits. > HSLayer2Nodes > ## A list of identity fingerprints, nicknames, country codes, and address > patterns of nodes that are allowed to be used as the third hop in all client > and service-side Onion Service circuits. > HSLayer3Nodes > > I don't have set StrictNodes 1. Please read the man page beforehand! > > Ncknames are unfortunately no longer allowed everywhere. I do not use > country codes the database has some errors. > > Soon you can use multiple lines: > > https://github.com/torproject/tor/pull/2066/commits/bb9707420e87a1efc016aeac1e59edbfc6be3f87 > > \-- > p_o Ciao Marco! > > Debian GNU/Linux > > It's free software and it gives you freedom! > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > \-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication For everyone. https://www.msgsafe.io ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] reporting Abusive exit nodes
I frequently find abusive exit nodes. Is there any way to report these to the tor consensus system, so it deprioritizes them? Or can I build a configuration file or list of exit nodes that I don't want in my chain? \-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication For everyone. https://www.msgsafe.io ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Fwd: Thailand block
What provider do you use? How much does it cost? \-- Forwarded message -- From: Dr Gerard Bulger ger...@bulger.co.uk Date: On Tue, Nov 24, 2020 at 08:29 AM Subject: [tor-relays] Thailand block To: BRBfGWMz brbfgwmz@concealed.company I have been running an exit (mythaicontribution) in Thailand for 3 Years (the exit has narrow port 80 range but full 443 and all other less risky ports open. It has never been that busy as an exit, unlike my other UK and USA exits of similar profile. I noticed it was off line last week. The ISP was slow to work out what was going on, to discover that the upstream ISP has blocked the IP “due to DOS attack” I think that is unlikely for such a long block, and assume the hand of MICT. I gather the do not give reasons. (https://en.wikipedia.org/wiki/Internet_censorship_in_Thailand) In some ways surprising it took them so long. Is there a way on Tor’s web pages and data base to look at historical data. I am curious to know when it off line and removed from Tor metrics. Gerry \-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication For everyone. https://www.msgsafe.io ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Cheap Servers? There MUST be a catch
They allow you to do that with the free credits? On Mon, Nov 9, 2020 at 07:37 PM, niftybunny abuse-contact@to-surf-and- protect.net wrote: I cant find any prices on the website. What do you get for under a dollar?On 8. Nov 2020, at 23:21, Dr Gerard Bulger lt;ger...@bulger.co.ukgt; wrote:Worried about dominance of OVH for relays and exits? How about Google! Setting up a fast server is SO cheap on their https://cloud.google.com/ platform, it is tempting to set up relays, if not exits there. Looking at their Tamp;Cs they do not seem to mention TOR or banning running a proxy, but a generic list of don’t do bad things. I have two ubuntu servers doing running other programmes on there now, and so far cost me $0.78 with fixed IP4 addresses. I have not worked out how to attach IPv6 yet.Of course set DNS of the machines not to be Google’s So tell me why this is such a bad idea… Gerry ___tor-relays mailing listtor- relays@lists.torproject.orghttps://lists.torproject.org/cgi- bin/mailman/listinfo/tor-relays \-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication For everyone. https://www.msgsafe.io ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] recently saw 4 tor relays in row on tails. bug in tor?
I recently saw a series of 4 relays connected to each other: itomori, MediumSlesmn, hotbrownie, pellidos itomori, docto, Geheimschreiber, 420isGay Dont most relays in the network of length 3? Bug in tor? \-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication For everyone. https://www.msgsafe.io ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays