Re: [tor-relays] Relay operators meetup @ rC3: today 22:00 UTC+1

2020-12-31 Thread BRBfGWMz
Do you guys meet via video?

Is there a calendar?

On Tue, Dec 29, 2020 at 01:39 PM, kantorkel 
wrote:

> To avoid confusion: We will meet today at 21:00 UTC, that is 22:00 CET

>

> https://www.starts-at.com/event/2603308559

>

>

>

> On 12/29/20 12:30 PM, kantorkel wrote:

> > Hi all,

> > > the meetup will take place today, 2020-12-29, at 10pm UTC+1.

> > > In rC3 world, we will meet in the bottom right corner of the Jena
> hackerspace "Krautspace"
> (https://rc3.world/rc3/room/5edc1329-f55c-46e1-a739-b0d642c2c80f/). Please
> use https://jitsi.rc3.world/torrelayops-724b5 to join from the outside
> world.

> > > Thanks to qbi for organizing the room.

> > > Best

> > kantorkel

> > > On 12/27/20 10:54 PM, Stefan Leibfarth wrote:

> >> Hello Tor friends and relay operators,

> >>

> >> I haven't heard of a relay operators meetup at the ongoing rC3.

> >> Are there any plans?

> >> If not, who of you is interested?

> >>

> >> It would be my pleasure arrange a session.

> >> Please get back to me.

> >>

> >> Cheers

> >> Leibi

> >>

> >> ___

> >> tor-relays mailing list

> >> tor-relays@lists.torproject.org

> >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

> >>

> > ___

> > tor-relays mailing list

> > tor-relays@lists.torproject.org

> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

> ___

> tor-relays mailing list

> tor-relays@lists.torproject.org

> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

>

\-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication
For everyone. https://www.msgsafe.io


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] attacks from problematic tor exit relays

2020-12-27 Thread BRBfGWMz
I am trying to guess what kind of target attacks are possible through
problematic relays.

Suppose the network relay is controlled by the enemy.

How do they determine the original IP address of the outbound traffic?
Correlation attacks are possible, but they seem very difficult and probably
require a lot of resources. Also, changing the route stops this.

If I assume that they determine what traffic flow is mine, and that I always
use the same route, what attacks are possible? Are there any good posts or
videos?

\-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication
For everyone. https://www.msgsafe.io


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Question: RAM requirement for an exit relay

2020-12-18 Thread BRBfGWMz
Olaf is right

Get a $ 5 per month VPS

On Wed, Dec 16, 2020 at 08:28 AM, Olaf Grimm  wrote:

> Hello Amadeus!

>

> When you talk about a RasPi, I assume you mean a home location.

> Please read the recommendations. Never operate an Exit Relay at home!

> It will be expensive if the wrong people knock on the door.

>

> By the way, for an Exit Relay the bandwidth should already be 10MBit/s

> or better.

>

> Olaf

>

> Am 15.12.20 um 01:44 schrieb Amadeus Ramazotti:

> > hey,

> > partly related to original question:

> > I'm planning to set up a new exit. My very first relay. I'm planning to
> use a small SoC with 2GB ram. Something running on ARM like a raspberry pi.

> >

> > Is this feasible or even a good idea?

> >

> > Regards

> >

> >

> > On 14 Dec 2020, at 15:10, to...@protonmail.com wrote:

> >

> > I have several 1 G RAM exits running unbound without a problem. They never
> seem to hit swap, either. On FreeBSD:

> > last pid: 83973; load averages: 0.86, 0.71, 0.62 up 130+15:44:28 16:02:04

> > 23 processes: 2 running, 21 sleeping

> > CPU: 43.1% user, 0.0% nice, 2.7% system, 5.5% interrupt, 48.6% idle

> > Mem: 101M Active, 734M Inact, 444M Wired, 151M Buf, 210M Free

> > Swap: 512M Total, 512M Free

> >

> > Go for it,

> >

> > \--Torix

> >

> >

> >  Original Message   

> >> On Monday, December 14, 2020 1:11 PM,  wrote:

> >>

> >>> On 14.12.2020 13:58, li...@for-privacy.net wrote:

> >>>

> >>> grep VmPeak/proc/$PID/status = 181836 kB

> >> A non exit has less:

> >> grep VmPeak/proc/$PID/status = 57336 kB

> >> tor-proxy-02.for-privacy.net ^^

> >>

> >>
> \---

> >>

> >> p_o Ciao Marco!

> >>

> >> Debian GNU/Linux

> >>

> >> It's free software and it gives you freedom!

> >>

> >> tor-relays mailing list

> >> tor-relays@lists.torproject.org

> >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

> >

> > ___

> > tor-relays mailing list

> > tor-relays@lists.torproject.org

> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

> > ___

> > tor-relays mailing list

> > tor-relays@lists.torproject.org

> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

>

>

> ___

> tor-relays mailing list

> tor-relays@lists.torproject.org

> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

>

\-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication
For everyone. https://www.msgsafe.io


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] reporting Abusive exit nodes

2020-12-11 Thread BRBfGWMz
It's great. Great content here too: https://wiki.archlinux.org/index.php/Tor
Where do you put the configuration file when running a network from real-time
distro (tails) that does not allow /etc/tor/torrc modification?

On Wed, Dec 9, 2020 at 07:56 PM, li...@for-privacy.net 
wrote:

> On 04.12.2020 05:21, BRBfGWMz wrote:

> > I frequently find abusive exit nodes. Is there any way to report these >
> to the

> > tor consensus system, so it deprioritizes them?

> You can also post here or in tor talk. bad-relays is a closed list. :-(

>

> > Or can I build a configuration file or list of exit nodes that I don't >
> want in

> > my chain?

>

> Of course:

>

> ## A list of identity fingerprints and country codes of nodes to use for the
> first hop in your normal circuits. (nuts, NO address patterns!?

> EntryNodes $fingerprint,{cc}

> ## A list of identity fingerprints, country codes, and address patterns of
> nodes to use as exit node.

> ExitNodes $fingerprint,{cc},203.0.113.0/24,[2001:DB8::]

> ## A list of identity fingerprints, country codes, and address patterns of
> nodes to avoid when building a circuit.

> ExcludeNodes $fingerprint,{cc},203.0.113.0/24,[2001:DB8::]

> ## A list of identity fingerprints, country codes, and address patterns of
> nodes to never use when picking an exit node. Nodes listed in ExcludeNodes
> are automatically in this list.

> ExcludeExitNodes $fingerprint,{cc},203.0.113.0/24,[2001:DB8::]

>

> ## A list of identity fingerprints, nicknames, country codes, and address
> patterns of nodes that are allowed to be used as the second hop in all
> client or service-side Onion Service circuits.

> HSLayer2Nodes

> ## A list of identity fingerprints, nicknames, country codes, and address
> patterns of nodes that are allowed to be used as the third hop in all client
> and service-side Onion Service circuits.

> HSLayer3Nodes

>

> I don't have set StrictNodes 1. Please read the man page beforehand!

>

> Ncknames are unfortunately no longer allowed everywhere. I do not use
> country codes the database has some errors.

>

> Soon you can use multiple lines:

>
> https://github.com/torproject/tor/pull/2066/commits/bb9707420e87a1efc016aeac1e59edbfc6be3f87

>

> \--

> p_o Ciao Marco!

>

> Debian GNU/Linux

>

> It's free software and it gives you freedom!

> ___

> tor-relays mailing list

> tor-relays@lists.torproject.org

> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

>

\-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication
For everyone. https://www.msgsafe.io


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] reporting Abusive exit nodes

2020-12-03 Thread BRBfGWMz
I frequently find abusive exit nodes. Is there any way to report these to the
tor consensus system, so it deprioritizes them?

Or can I build a configuration file or list of exit nodes that I don't want in
my chain?

\-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication
For everyone. https://www.msgsafe.io


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Fwd: Thailand block

2020-11-26 Thread BRBfGWMz
What provider do you use? How much does it cost?

\-- Forwarded message --

From: Dr Gerard Bulger ger...@bulger.co.uk

Date: On Tue, Nov 24, 2020 at 08:29 AM

Subject: [tor-relays] Thailand block

To: BRBfGWMz brbfgwmz@concealed.company

I have been running an exit (mythaicontribution) in Thailand for 3 Years (the
exit has narrow port 80 range but full 443 and all other less risky ports
open.  It has never been that busy as an exit, unlike my other UK and USA
exits of similar profile.   I noticed it was off line last week.   The ISP was
slow to work out what was going on, to discover that the upstream ISP has
blocked the IP “due to DOS attack”    I think that is unlikely for such a long
block, and assume the hand of MICT.  I gather the do not give reasons.
(https://en.wikipedia.org/wiki/Internet_censorship_in_Thailand) In some ways
surprising it took them so long. Is there a way on Tor’s web pages and data
base to look at historical data.   I am curious to know when it off line and
removed from Tor metrics.   Gerry

\-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication
For everyone. https://www.msgsafe.io


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Cheap Servers? There MUST be a catch

2020-11-10 Thread BRBfGWMz
They allow you to do that with the free credits?

On Mon, Nov 9, 2020 at 07:37 PM, niftybunny abuse-contact@to-surf-and-
protect.net wrote:

 I cant find any prices on the website. What do you get for under a
dollar?On 8. Nov 2020, at 23:21, Dr Gerard Bulger
lt;ger...@bulger.co.ukgt; wrote:Worried about dominance of OVH  for
relays and exits?   How about Google!    Setting up a fast server is SO cheap
on their https://cloud.google.com/   platform,  it is tempting to set up
relays, if not exits there.  Looking at their Tamp;Cs they do not seem to
mention TOR or banning running a proxy, but a generic list of don’t do bad
things.   I have two ubuntu servers doing running other programmes on there
now, and so far cost me $0.78  with fixed IP4 addresses.   I have not worked
out how to attach IPv6 yet.Of course set DNS of the machines not to be
Google’s So tell me why this is such a bad idea… Gerry
___tor-relays mailing listtor-
relays@lists.torproject.orghttps://lists.torproject.org/cgi-
bin/mailman/listinfo/tor-relays

\-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication
For everyone. https://www.msgsafe.io


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] recently saw 4 tor relays in row on tails. bug in tor?

2020-10-22 Thread BRBfGWMz
I recently saw a series of 4 relays connected to each other:  
  
itomori, MediumSlesmn, hotbrownie, pellidos  
itomori, docto, Geheimschreiber, 420isGay  
  
Dont most relays in the network of length 3? Bug in tor?

\-- Sent using MsgSafe.io's Free Plan Private, encrypted, online communication
For everyone. https://www.msgsafe.io


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays