Re: [tor-relays] tor relay shutsdown

2019-02-01 Thread Ben Tasker
For what it's worth, I previously had similar behaviour.

It turned out it was against the host's AUP (I hadn't spotted it in there),
and when they detected it they automatically shut the system off (it was an
OpenVZ slice so fairly easy for them to monitor).

On Fri, Feb 1, 2019 at 11:02 AM Neelix  wrote:

>
> On 2/1/19 11:48 AM, Roger Dingledine wrote:
> > On Fri, Feb 01, 2019 at 11:29:25AM +0100, Neelix wrote:
> >> The entire machine shuts down. Very strange.
> > Two possibilities to explore:
> >
> > (1) The machine is more fragile than you think, and the CPU load from
> > the Tor process pushed it over the edge, so one of its automatic hardware
> > sensors shut it off to protect it.
> >
> > (2) Some admin on your local network noticed a bunch of weird traffic,
> > or even just a bunch of traffic, and thought they were helping by turning
> > it off.
> >
> > --Roger
> >
> Ah! This might be the problem. Tor is almost using 100% of the CPU.
> Is there a way to reduce the CPU usage? Or should I upgrade the server?
>
> --
> Regards,
>
> Neelix
>
> fingerprint: 32A6 5D7A 955C 546C 0E9B F559 EB09 D028 36A3 79E0
> xmpp: neelix@yourdata.forsale
>
>
> _______
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>


-- 
Ben Tasker
https://www.bentasker.co.uk
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] OVH Mitigation

2020-09-10 Thread Ben Tasker
On Thu, Sep 10, 2020 at 8:48 AM Dr Gerard Bulger 
wrote:

> I know we should dilute our dependence on OVH, but cheap and seem to
> ignore the fact the machine is an exit node.
>
>
>
> OVH has a seemingly patented a system to deal with denial of service
> attacks.  I am not sure what they detect but when they do we get this:
>
>
>
> *“We have just detected an attack on IP address x.x.x.x.  In order to
> protect your infrastructure, we vacuumed up your traffic onto our
> mitigation infrastructure. The entire attack will thus be filtered by our
> infrastructure, and only legitimate traffic will reach your servers. At the
> end of the attack, your infrastructure will be immediately withdrawn from
> the mitigation”*
>
>
>
I have a server (not a relay) with OVH, and also started receiving these
recently. I raised a ticket with them to ask for more information about the
detected attack (what port/proto etc) because there are legitimate uses
that may look a bit like an attack (the boxes sit behind a CDN, so you can
end up with a lot of requests/connections from not may IPs)

Worryingly, they couldn't actually tell me - all I managed to get back was
"looks like it's a false positive". It's triggered a few times since, with
no sign of anything even remotely suspicious in my traffic graphs.

I know this doesn't really add much knowledge about what they're detecting,
but the point is more that they don't seem to be overly clear themselves


-- 
Ben Tasker
https://www.bentasker.co.uk
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor project helping to attempt to cancel Richard Stallman

2021-03-26 Thread Ben Tasker
On Fri, Mar 26, 2021 at 3:11 PM Roman Mamedov  wrote:

>
> Could be important to note that no harassment allegations were ever aimed
> at
> RMS himself, he's just being attacked for posting a personal opinion about
> unrelated events.
>
>
This is untrue, it's even covered in the open letter

https://selamjie.medium.com/remove-richard-stallman-appendix-a-a7e41e784f88

> Long before this incident, Stallman was contributing to an uncomfortable
environment for women at MIT in a very real and visceral way.

> Many, many years ago, women in the AI and CS labs met to deal with the
problematic atmosphere for women in the labs. We met as a group, discussed
the issues, complied examples, presented them to the labs, then wrote a
report. In the early 80’s, it was a pretty big deal but it would seem it
did not have lasting effects.

This isn't a case of him just being attacked for a personal opinion.

Even if it was, at what point do we accept that repeatedly stating that
opinion undermines the work your foundation is supposed to be doing?



> > Ah, I see, feminists and leftists must be triggered right now, but how
> > does this relate to the Tor Project or Mozilla in anyway?
>
> It's always fun to get in a group and pick on someone who is weak and
> cannot
> answer, i.e. the "schoolyard" mentality.

> Sure, it's not the best PR for both but if he's a valuable (code)
> > contributor I'd let it slip - anyone remember the Freedom of speech
> > principle?
>
> He doesn't code as much these days, but he launched Free Software as a
> concept,
> wrote the General Public License and some cornerstone software such as GCC,
> it is thanks to him that we have such operating system as GNU/Linux.
> Here's how it all went: https://www.oreilly.com/openbook/freedom/
>
>
It's true, we have a lot to thank RMS for. It doesn't necessarily follow
that he's still the right figurehead, or even an appropriate one.



> --
> With respect,
> Roman
> ___________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>


-- 
Ben Tasker
https://www.bentasker.co.uk
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays