Re: [tor-relays] TorBrowser HTTPS-Only Mode
On Sun, Apr 25, 2021 at 7:13 PM nusenu wrote: > > > (FWIW: on the client side there is still the HTTPS-only mode in the > > pipeline, which could easily be a game-changer here, too.) > > Is the torproject backporting https-only mode [1] to 78esr / Tor Browser? No. Firefox 78esr has an older version of https-only mode, but newer versions of Firefox have many bugfixes. We don't feel comfortable enabling the current implementation available in Tor Browser, and backporting the fixes/improvements would be challenging. Currently, our recommendation is enabling EASE mode in https-everywhere if you feel comfortable with the trade-offs, but that mode has usability issues as well, and we aren't comfortable enabling that for everyone. When Tor Browser migrates to Firefox 91esr we will look at enabling https-only mode for everyone, but there remains a significant concern that there are many sites that do not support HTTPS (especially more region specific sites) and the question of what messaging Tor Browser should use in that case. > > kind regards, > nusenu > > [1] > https://blog.mozilla.org/security/2020/11/17/firefox-83-introduces-https-only-mode/ > > > -- > https://nusenu.github.io > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Conduct on this list
Please be aware that the Statement of Values [0] and Code of Conduct [1] apply on this mailing list (and all mailing lists provided by the Tor Project). This mailing list started accumulating racist slurs and other insults, which we have held in the moderation queue. Sending a mail containing racist epithets is absolutely not acceptable and will not be tolerated. Racism and sexism are not welcome in this community. Future transgressions will result in the sender being unsubscribed from the mailing lists and reported to the community council. Help us create an open, inclusive, and diverse community supporting Tor's mission. Thanks, Matthew/sysrqb on behalf of the list moderators [0] https://gitweb.torproject.org/community/policies.git/tree/statement_of_values.txt [1] https://gitweb.torproject.org/community/policies.git/tree/code_of_conduct.txt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Tor project helping to attempt to cancel Richard Stallman
On Fri, Mar 26, 2021 at 2:49 PM William Kane wrote: > > Also, more information would be nice - just some "Please shut down all > of your relays, because I / they have a problem with X" isn't very > descriptive. > > Just did some own research: > > "The group recently reappointed the controversial developer and > activist to its board; he had previously departed in the wake of > sexual-harassment allegations and comments he made about the Jeffrey > Epstein case that many found repellent." > > Ah, I see, feminists and leftists must be triggered right now, but how > does this relate to the Tor Project or Mozilla in anyway? Sure, it's > not the best PR for both but if he's a valuable (code) contributor I'd > let it slip - anyone remember the Freedom of speech principle? That's unfortunate because this attitude is counter to the Tor community we are building: https://gitweb.torproject.org/community/policies.git/tree/statement_of_values.txt """ Community health is a shared responsibility. By making the community more inclusive and welcoming, we build a stronger and more resilient Tor. Perfection is not required; a commitment to continuous improvement and learning is. """ We can't simply "turn the other cheek" because we must be better than that. We cannot let misconduct and offenses "slip" for the sake of (code) contribution. We do not live in a cypherpunk/meritocratic crypto-utopia of the 1990s. > > I thought this is why we were doing all this. There isn't one single reason why people contribute and volunteer within and around the Tor community. However, that may be your reason for volunteering your time and resources. > > My relay will still stay online for the time being, but I'd seriously > reconsider priorities here - surely, they shouldn't be political - who > cares what anyone thinks. I'm sorry, but Tor is actually a policy statement and its implementation: anonymity-by-default, privacy-by-design, censorship circumvention; Tor is not a neutral party in the debate on free access to cryptography. The Tor Project having (and voicing) an opinion on these topics, as well as other topics within the larger free software community, are not out of scope and, this should not be a surprise. I hope you continue running your relay and continue supporting the Tor network and its users. Your contribution makes the network stronger for everyone. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Tor project helping to attempt to cancel Richard Stallman
On Thu, Mar 25, 2021 at 12:52 PM Jeffrey Cliff wrote: > > I've been running a relay/exit node for many years. Tor user since ~2004. Thank you for running an exit node. You provided a service to the world and likely helped millions of people. > To the extent that my voice means anything at all here, I would like to > strongly condemn the Tor project joining the attempt to cancel Richard > Stallman. Stallman represents software freedom to me generally and as of > today I will be shutting down my exit node in protest of this action by the > Tor Project. Your voice is meaningful, however it is unfortunate that you are conflating a movement and a community, with one single person. Furthermore, that one person is toxic and diminishes the strength and accomplishments of free software. Richard Stallman should not represent software freedom, we shouldn't put people on pedestals and we should hold everyone accountable for their actions. RMS helped start the free software movement, but he is not untouchable and now there are much better leaders who should replace him. He is holding back the movement and no one should praise him for that. > > I hope the rest of you out there, who depend every day on GNU project code > which would not exist without RMS's project, might consider joining me. No good actions should allow someone to perpetuate toxic behavior and push away people in marginalized groups. I hope you reconsider your position on this. > > Jeff Cliff > > former tor exit node admin > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] reporting Abusive exit nodes
On Fri, Dec 4, 2020 at 4:26 AM BRBfGWMz wrote: > > I frequently find abusive exit nodes. Is there any way to report these to the > tor consensus system, so it deprioritizes them? > Yes, please report them to bad-rel...@lists.torproject.org https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays#HowdoIreportabadrelay ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] don't publish detailed metrics about your relays
On Thu, Aug 20, 2020 at 8:51 PM nusenu wrote: > > > Don't publish detailed metrics about your relays. > > > Here is a good example what NOT to do with your relays: > > http://51.77.135.89:1/#menu_net_submenu_eno1;theme=slate > http://51.75.144.43:1/#menu_net_submenu_eno1;theme=slate > > The relay guide has detailed guidelines on what granularity is considered > safe. In section "System Health Monitoring" on https://community.torproject.org/relay/setup/post-install/ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] ALL GREYPONY SERVERS ARE OPEN FOR DDOS
On Fri, May 03, 2019 at 10:27:14AM +, Stirling Newberry wrote: > ATTENTION GREYPONY USERS > > ALL GREYPONY EXITS WILL BE TARGETED FOR DDOS. THIS REQUEST HAS COME FROM > PRETTY HIGH UP. GAME OVER BITCHES. YOU GUYS ARE GOING TO BE DONE. LOIC WILL > BE USED TO TARGET THE NODES. DON'T SAY YOU WERENT WARNED YOU STUPID SACKS OF > FAGGOT SHIT. Just so we all have the same understanding here, no one should send or respond to emails like this. Just like harassment, threats (even idle threats) are not acceptable here. Thanks, in advance, for your decorum. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Tor website overhaul -- who deserves punishment?
Hi Ralph, On Wed, Mar 27, 2019 at 05:10:08PM +0100, Ralph Seichter wrote: > Not sure if this is the right place to vent, but here goes: > > Whoever changed the Tor website's design seems to a) have a serious > vision impairment and b) done his utmost to hide access to the Tor > source code. Please be respectful. The tone of this message is disrespectful of the time, effort, and skill that went into launching the new website. It's unfortunate you do not appreciate or like the new site, but that does not excuse you. The source code has not moved, it is still available at gitweb.torproject.org, as usual. If you're looking for the download page, then there is an open bug for that, see [0]. [0] https://trac.torproject.org/projects/tor/ticket/29907 > > I think the site feels dumbed down to cater only to those with the > shortest attention spans (and bad eyesight) now. Also, as a relay and > exit operator, I care most about the source code and documentation, not > some management summary. Thank you for running these relay, we all appreciate it. The website, however, is intended for a diverse audience, and most people are not familiar with Tor. This new website is significantly better and more welcoming for the general population, rather than a small percentage of the population. If you have suggestions for improving the new design, then please let us know. Sincerely, Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Relay without OpenSSL
On Wed, Jan 30, 2019 at 05:23:40PM +0100, Nick Mathewson wrote: > On Mon, Jan 28, 2019 at 9:52 PM Alexander Nasonov wrote: > > > > I recently tried updating one of my relays to Tor 0.4.0.1 compiled > > with NSS (and without OpenSSL) but it failed to start, see the logs > > below. I wonder if this configuration is supported at all and > > whether I should try running a brand new relay instead of updating? > > > > Alex > > This warning looks like the one I added for the openssl-related bug > #28973. But I didn't expect it to happen on NSS! Could somebody > please open a ticket here? I can take a look next week, I hope. I opened #29241 for this (because I didn't see anyone else open it). ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] maha's tor-latest on COPR?
On Tue, Sep 18, 2018 at 04:35:46PM +0200, re...@mobtm.com wrote: > Hi *, > > does anyone know if maha still supports his Fedora/Epel repo for the latest > Tor release[1]? > > I'm nearly sure he announced his repo on the list some time ago, but I don't > find the mail anymore... > > With 0.3.3.10 (and 0.3.4.8) released and not really happy with compiling it > myself[2] an up to date repo for redhattish distributions would be very nice. I don't know an answer to your question, but apparently a nice person named Jamie is currently packaging Tor on Fedora: https://trac.torproject.org/projects/tor/wiki/doc/packages https://apps.fedoraproject.org/packages/tor Maybe 0.3.3.10 will be available soon. > > Thanks > Renke > > [1] https://copr.fedorainfracloud.org/coprs/maha/tor-latest/ > [2] too lazy :) ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Something strange noticed on tor metrics
On Fri, Jul 27, 2018 at 04:40:46PM -0700, Keifer Bly wrote: > > Hello, > > So today I w as checking my relay on tor metrics > https://metrics.torproject.org/networksize.html > > I noticed something strange, according to the graph, the number of bridges > seems to have suddenly completely dropped to zero (the bridges line just > after “2018-07”) and now slowly climbing back up. I am wondering did > something happen that knocked all of the bridges offline? It seemed strange > so I just thought I would report. Yes, the Bridge Directory Authority changed, and Metrics only received the bridges from one of the new bridge dirauth. Unfortunately, nearly all of the existing bridges were still publishing to the old bridge dirauth. As a result, Metrics saw the number of bridges drop the approximately zero. Slowly bridges are updating and using the new bridge dirauth instead. [0] https://blog.torproject.org/new-release-tor-0339-bridge-authority-update [1] https://lists.torproject.org/pipermail/tor-announce/2018-July/000162.html ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Relay Guide - IPv6 Connectivity Testing
On Tue, Jun 26, 2018 at 04:31:55AM +1000, teor wrote: > > On 26 Jun 2018, at 02:40, nusenu wrote: > > >> It would also be nice if the relay, itself, performed self-checks of > >> this connectivity and printed a warning log if some failure-threshold is > >> reached (and possibly disabling the IPv6 ORPort). But, in reality, this > >> is a hack > > > > I wouldn't call it a 'hack', I'd consider it a reliability feature. > > Relays already check that their IPv4 ORPorts are working. > > Doing reachability checks for relay IPv6 ORPorts is a bit more > complicated, because we have to teach relays to extend over IPv6 first. > > Here's the master ticket: > https://trac.torproject.org/projects/tor/ticket/24403 > > And if relays use authority IPv6 ORPorts to upload descriptors, they > will get connectivity checks for free: > https://trac.torproject.org/projects/tor/ticket/24777 Good point (and I agree). I'll stopping opening a separate ticket for this. Thanks! ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Relay Guide - IPv6 Connectivity Testing
On Mon, Jun 25, 2018 at 04:40:00PM +, nusenu wrote: > > Considering there are potential critical failures when the IPv6 ORPort > > is configured, should the relay guide suggest the operator confirm they > > have IPv6 connectivity to all of the IPv6-enabled directory > > authorities[2] before enabling it ("Please ping6/telnet/nc to these > > hosts before enabling this.")? > > thanks for this suggestion, I hope you like the change: > > https://trac.torproject.org/projects/tor/wiki/TorRelayGuide?action=diff=218 That change looks great, thanks! ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Relay Guide - IPv6 Connectivity Testing
Over the last few days I've started thinking more about IPv6 and, inevitably, I started thinking about how we can improve support within the Tor network. Within the last few months, there were a few instances of relay operators seeking answers for why their relay did not have the running flag in the consensus. After some investigation, in some cases this was because the relay had an IPv6 ORPort configured but a majority of the IPv6-enabled directory authorities did not believe it was running. Unfortunately, despite IPv6 connectivity being a necessity now, ISP rollout is slow and on-going in some geographical areas and network peering arrangements are sometimes sub-standard or not stable. The Relay Guide[0] has a section describing how an operator can enable an IPv6 ORPort, and there's a supplementary page[1] specifically describing additional information about it. Considering there are potential critical failures when the IPv6 ORPort is configured, should the relay guide suggest the operator confirm they have IPv6 connectivity to all of the IPv6-enabled directory authorities[2] before enabling it ("Please ping6/telnet/nc to these hosts before enabling this.")? It would also be nice if the relay, itself, performed self-checks of this connectivity and printed a warning log if some failure-threshold is reached (and possibly disabling the IPv6 ORPort). But, in reality, this is a hack around a broken internet - and I hesitate advocating for something like this in tor. Maybe there is a compromise we can find between the relay operator manually testing connectivity periodically and tor automatically doing-smart-things. Thoughts? - Matt [0] https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#IPv6 [1] https://trac.torproject.org/projects/tor/wiki/doc/IPv6RelayHowto [2] https://gitweb.torproject.org/tor.git/tree/src/or/auth_dirs.inc ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Verizon AS701 blocking Tor consensus server tor26 (86.59.21.38)
On Wed, May 16, 2018 at 11:36:58AM -0400, Nathaniel Suchy (Lunorian) wrote: > If Verizon is suddenly worried about malware, why not block at the DNS level > with something like Quad9 where it’s managed by more competent professionals? > (Of course still allowing alternate DNS Servers) They probably do this, too. > Does Tor bootstrap by IP Address directly? Yes > > Sent from my iPhone > > > On May 16, 2018, at 11:32 AM, Alex Xuwrote: > > > > Quoting Roger Dingledine (2018-05-16 15:05:29) > >> The fix (if my theory is right) would be to reach whatever engineer made > >> this leap, and teach them about Tor. But it will be extra challenging > >> because they don't even know that there's something they need to learn. > > > > like the fact that malware can have more than one C server? :/ > > ___ > > tor-relays mailing list > > tor-relays@lists.torproject.org > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Verizon AS701 blocking Tor consensus server tor26 (86.59.21.38)
On Wed, May 16, 2018 at 11:33:54AM -0400, Nathaniel Suchy (Lunorian) wrote: > Can you still use Tor on Verizon with bridges? This is only one of the directory authorities. A tor client using Verizon may never notice they can't reach this one server. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Verizon AS701 blocking Tor consensus server tor26 (86.59.21.38)
On Tue, May 15, 2018 at 08:12:50PM -0400, Neel Chauhan wrote: > Hi tor-relays mailing list, > > I have noticed that the Tor consensus server tor26 > (https://metrics.torproject.org/rs.html#details/847B1F850344D7876491A54892F904934E4EB85D) > is blocked on Verizon's UUNET (AS701) backbone, and therefore, Verizon's > retail services like FiOS and Wireless. I can confirm this on FiOS, but I > don't use Verizon Wireless (my smartphone uses Sprint) so I can't test it > there. > > A traceroute to tor26's IP address 86.59.21.38 from a Brooklyn apartment > shows this is filtered on Verizon's backbone: Interesting, thanks for noticing this and investigating. From an Optimum Online connection I can reach tor26: $ traceroute -n 86.59.21.38 traceroute to 86.59.21.38 (86.59.21.38), 30 hops max, 60 byte packets [...] 9 * * * 10 4.69.203.210 87.969 ms 93.582 ms 90.246 ms 11 4.68.110.66 91.896 ms 89.551 ms 87.997 ms 12 130.244.38.232 89.958 ms 94.470 ms 95.286 ms 13 130.244.71.47 132.933 ms 131.108 ms 131.941 ms 14 212.152.189.65 132.910 ms 128.954 ms 149.351 ms 15 86.59.118.145 110.832 ms 111.453 ms 112.767 ms 16 86.59.21.38 116.790 ms 117.539 ms 117.448 ms > In a normal traceroute, you will see ALTER.NET at hop 5. Also, the subnet > 86.59.21.0/24 is not filtered on UUNET. A traceroute to 86.59.21.1 works: > I also receive a response from the IP address immediate below tor26's: $ traceroute -n 86.59.21.37 traceroute to 86.59.21.37 (86.59.21.37), 30 hops max, 60 byte packets [...] 9 * * * 10 4.69.203.210 88.174 ms 92.438 ms 92.715 ms 11 4.68.110.66 90.381 ms 89.487 ms 89.491 ms 12 130.244.38.232 92.294 ms 91.150 ms 93.985 ms 13 130.244.71.47 131.010 ms 131.173 ms 131.000 ms 14 212.152.189.65 131.932 ms 130.328 ms 136.155 ms 15 86.59.118.145 261.323 ms 261.824 ms 261.783 ms 16 86.59.21.37 122.162 ms 121.369 ms 118.289 ms > I got in contact with Peter Palfrader and he says he couldn't help, and also > with Verizon FiOS support and they said the filtering 'isn't on Verizon's > network' (read: isn't on Verizon's internal FiOS network but still on > Verizon's AS701 which I have to go to to get anywhere on the Internet here). Unfortunately, no surprises there. Peter won't have any control over this, and FiOS won't take the blame for this. > But if Verizon didn't unblock tor26, could it actually mean that Verizon > wants to discourage Tor (and VPN/proxy) use to try to mine information of > their customers (and sell ads/information) and direct users to VZ-owned AOL > and Yahoo? Well, I hope they were just sloppy and don't mean to wage war on > Tor. Yeah, either they don't understand how Tor works, or they blocked tor26's IP address for another reason (not because it's a directory authority). > > While I'm not saying you should avoid using anything Verizon at all costs (I > certainly wouldn't want to go to the local cable company), I just want to > point out a blocked consensus server. It's absolutely something we should keep an eye on, especially in the US as ISPs begin testing the FCC's (reinstated) laissez faire policy. Thanks. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] lets stop using central big DNS resolvers (Google, Level3, OpenDNS, Quad9, Cloudflare)
On Fri, May 11, 2018 at 10:54:06PM -0500, Andrew Deason wrote: > On Thu, 10 May 2018 22:37:00 + > Tyler Durdenwrote: > > > All our nodes are using a local DNS caching server and only use google > > as a fallback. > > I was also using google just as a fallback; I've now changed my node to > just use a local resolver, with no fallback. Thank you! > > Neither the email from nusenu nor the documentation pointed to actually > says which of these options is preferable. If you (nusenu) are looking > to reduce the exits using these resolvers, I'd suggest explicitly also > saying to not use them even as a fallback after a local resolver > (assuming that's what you want). Maybe you had intended this to come > across with the existing text, but I don't think it's obvious enough. But isn't that what the subject line says? And the original email contains: > The goal is to be bellow the following thresholds within one year: > not have any single remoteAS entity control more than 10% exit capacity > reduce the overall remoteAS share to bellow 20% exit capacity Maybe it would help clarifying that almost any use of the above mentioned Open DNS resolvers qualifies as using a remoteAS (therefore contributing to its control of exit capacity) - even if that resolver is configured as a fallback. Thanks again for adjusting your configuration. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] PSA regarding Quad9 DNS Resolver
On Fri, May 11, 2018 at 07:41:45AM -0400, Nathaniel Suchy (Lunorian) wrote: > Like OpenDNS, Quad9 is a censoring DNS resolver and exits using it are / > should be considered bad exits. I haven’t seen any exits using it yet however > I thought I’d bring it up. Thoughts? Yes, but nusenu's email is the better course of action. Using Quad9 is one of the examples listed on the wiki page for why a relay is marked as a badexit [0], but if the operator can simply change their configuration then that is a significantly better solution. [0] https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Metrics not functioning?
On Sat, Apr 14, 2018 at 10:30:54AM +1000, teor wrote: > > > On 14 Apr 2018, at 09:48, Matthew Glennonwrote: > > > > Are the right people aware that Metrics has been like this for most of the > > day? No matter what relay you look for it claims old data. > > https://metrics.torproject.org/rs.html#details/9695DFC35FFEB861329B9F1AB04C46397020CE31 > > Yes, but it's their weekend, so it might take a while. And that issue is resolved now (but I didn't do it). ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Port not rechable
Hi! On Fri, Mar 02, 2018 at 09:34:02PM +0100, peter.zehet...@liwest.at wrote: > OK, now I've set PortForwarding in Tor-Arm from "False" to "True", then > restarted Tor: Hrm, I'm not sure this will do what you want. In fact, this may do absolutely nothing. Do you have administative access into your network router? Maybe there is a website interface you used. This is where you should configure port forwarding. Unfortunately this is complicated and not easy plug-n-play. > > ...has not managed to confirm that its DirPort is reachable. Relays do not > publish descriptors until their ORPort and DirPort are reachable. Please > check... > > I'm going to run a non-exit-relay and I'm going to do this at home. > > Peter > ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Running a relay at home (was: Port not rechable)
On Fri, Mar 02, 2018 at 03:01:31PM -0500, Roger Dingledine wrote: > On Fri, Mar 02, 2018 at 07:42:11PM +0000, Matthew Finkel wrote: > > Are you running this relay at your home? If yes, then that is not > > recommended, but > > For the record, it's running *exit* relays at home that is not > recommended. Running non-exit relays at home is typically fine -- the > most likely problems are that some overzealous blacklist will put your > IP address on their list, making some websites not work so well for you > if you also use that IP address for your own traffic. Some of these > overzealous blacklists are just being stupid, because they don't > understand about exit policies: > https://www.torproject.org/docs/faq#ExitPolicies > but others of them are intentionally trying to harm people who are > trying to support Tor: > http://paulgraham.com/spamhausblacklist.html Just for the record, this is exactly why I don't recommend it from my exerience. I lost access to my bank's website (plus some other sites) for a while because I did this. It's must less risky running a non-exit than running an exit, but there may be unintended side effects that make the experience less fun overall for the operator. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Port not rechable
On Fri, Mar 02, 2018 at 08:27:29PM +0100, peter.zehet...@liwest.at wrote: > Hi, I'm still trying to run a tor delay. Here's the error: > Thank you for running a relay. > Your server (81.10.248.112:80) has not managed to confirm that its DirPort is > reachable. Relays do not publish descriptors until their ORPort and DirPort > are reachable. I do not see port 80 open, either: $ torsocks nc -v 81.10.248.112 80 Ncat: Version 7.40 ( https://nmap.org/ncat ) Ncat: Connection timed out. > > But canyouseeme.org said: Your ISP is not blocking port 80 Maybe "not blocking" does not mean "is open". Are you running this relay at your home? If yes, then that is not recommended, but you may need to allow port 80 on your firewall/router. You may need to use port forwarding or add your computer into the DMZ (if your router supports this). If you're not running this relay from home, is the server directly connected to the Internet or is there a router/switch/blackbox in the middle? > > Whats's wrong? > > Thanks > > Peter > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Is there a reason for all exit nodes being public?
On Wed, Dec 07, 2016 at 02:25:03PM +0200, Rana wrote: > > On Wed, Dec 07, 2016 at 11:51:34AM +, Matthew Finkel wrote: > >> On Wed, Dec 07, 2016 at 01:25:59PM +0200, Rana wrote: > >> > I mean, why aren't some exit nodes kept hidden, at least partially > >> > and temporarily, like bridges? This would mitigate web services > >> > denying service to Tor users (Gmail is the most recent example), > >> > plus would increase security. > >> > > I'll simply refer you to the FAQ: > > >That was rude of me, answer below. Do you disagree with the reasoning? > > That was not rude at all, thank you for the reference to the FAQ. I largely > got a satisfactory explanation there although points (b) and (c) might be > controversial. > > The one point I find difficult to agree with is "(a) We can't help but make > the information available, since Tor clients need to use it to pick their > paths." If bridges can be hidden and provided to clients on as-needed basis, > so can exits. Yes, this is true, and it's a topic that comes up every couple years. But, there are significant differences between bridges and exits. First, choosing your circuit's exit manually is a usability nightmare and could destroy your anonymity. Even if you give your tor client a small set of "hidden" exits, over time traffic from these nodes will be linked to your connections and they will be linked to Tor. It's not easy for users know when this happens. Tor tries extremely hard at preventing users from hurting themselves. Research has shown that bridges (and guards) should be used for longer periods of time, but if you use an exit for too long then you risk leaking too much information about your behavior (to both the exit and the destination server). Similarly, using a hidden exit becomes more risky if the user is already using a bridge because there is (currently) less oversight of the bridges than there is for the public network. This would likely be true for hidden exits, as well. This presents the problem that traffic analysis attacks against a small subset of Tor users become incredibly easy. When it comes to hidden nodes, they never remain hidden forever. Some adversaries already crawl the list of bridges and block them, other adversaries would do the same if some exit nodes were not public. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Is there a reason for all exit nodes being public?
On Wed, Dec 07, 2016 at 11:51:34AM +, Matthew Finkel wrote: > On Wed, Dec 07, 2016 at 01:25:59PM +0200, Rana wrote: > > I mean, why aren't some exit nodes kept hidden, at least partially and > > temporarily, like bridges? This would mitigate web services denying service > > to Tor users (Gmail is the most recent example), plus would increase > > security. > > I'll simply refer you to the FAQ: That was rude of me, answer below. Do you disagree with the reasoning? *You should hide the list of Tor relays, so people can't block the exits.* There are a few reasons we don't: a. We can't help but make the information available, since Tor clients need to use it to pick their paths. So if the "blockers" want it, they can get it anyway. Further, even if we didn't tell clients about the list of relays directly, somebody could still make a lot of connections through Tor to a test site and build a list of the addresses they see. b. If people want to block us, we believe that they should be allowed to do so. Obviously, we would prefer for everybody to allow Tor users to connect to them, but people have the right to decide who their services should allow connections from, and if they want to block anonymous users, they can. c. Being blockable also has tactical advantages: it may be a persuasive response to website maintainers who feel threatened by Tor. Giving them the option may inspire them to stop and think about whether they really want to eliminate private access to their system, and if not, what other options they might have. The time they might otherwise have spent blocking Tor, they may instead spend rethinking their overall approach to privacy and anonymity. > > https://www.torproject.org/docs/faq.html.en#HideExits ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Is there a reason for all exit nodes being public?
On Wed, Dec 07, 2016 at 01:25:59PM +0200, Rana wrote: > I mean, why aren't some exit nodes kept hidden, at least partially and > temporarily, like bridges? This would mitigate web services denying service > to Tor users (Gmail is the most recent example), plus would increase > security. I'll simply refer you to the FAQ: https://www.torproject.org/docs/faq.html.en#HideExits ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Faravahar messing with my IP address
On Sat, Oct 24, 2015 at 03:09:00AM +0300, s7r wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Hello, > > Unfortunately this is not the first time we see this, and it did > happen before Faravahar IP address change and before it was > experiencing very high latency ( > https://trac.torproject.org/projects/tor/ticket/17338 ). > > See: > https://trac.torproject.org/projects/tor/ticket/16205#comment:3 > ~5 months ago See another recent instance [0]. This one is interesting, though, because it's actually Faravahar's old IP address. For those who see this happening, do you only see these log entries for a short time after starting the relay or do you see it at arbitrary times, after the relay has run for days? Thanks, Matt [0] https://lists.torproject.org/pipermail/tor-relays/2015-November/008128.html ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Wrong IP from faravahar again
On Mon, Nov 09, 2015 at 06:34:21AM +, Pascal Terjan wrote: > Nov 04 17:06:00.000 [notice] Our IP Address has changed from > 149.18.2.82 to 154.35.32.5; rebuilding descriptor (source: > 154.35.175.225). > Nov 04 17:08:55.000 [notice] Our IP Address has changed from > 154.35.32.5 to 149.18.2.82; rebuilding descriptor (source: > 154.35.175.225). > > 5.32.35.154.in-addr.arpa domain name pointer faravahar.rabbani.jp. Thanks! It'll be easier if we keep a single thread for this issue, so I responded to the older mails about it. Please feel free to respond to those again if you have more helpful info. - Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Faravahar messing with my IP address
On Wed, Nov 04, 2015 at 08:00:52AM +0100, Logforme wrote: > Happened again tonight: > > Nov 04 05:23:43.000 [notice] Our IP Address has changed from > 84.219.173.60 to 185.99.185.61; rebuilding descriptor (source: > 154.35.175.225). > Nov 04 05:23:43.000 [notice] Self-testing indicates your ORPort is > reachable from the outside. Excellent. Publishing server descriptor. > Nov 04 05:23:43.000 [notice] Our IP Address has changed from > 185.99.185.61 to 84.219.173.60; rebuilding descriptor (source: > 154.35.175.225). > Nov 04 05:23:43.000 [notice] Self-testing indicates your ORPort is > reachable from the outside. Excellent. Publishing server descriptor. > > 84.219.173.60 <- My real IP address > 185.99.185.61 <- Holland? > 154.35.175.225 <- faravahar.redteam.net > > Not even a second between getting the wrong IP and then getting the > correct one back, but enough to restart the relay. > After seeing this I upgraded to the latest version 0.2.7.4-rc and on the > restart it again used Faravahar to (correctly) guess the IP: > > Nov 04 07:47:49.000 [notice] Guessed our IP address as 84.219.173.60 > (source: 154.35.175.225). Which version of Tor were you previously running? Have you seen these messages within the last few days, after you upgraded? Thanks, Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] T-shirts and Confirming Relay Control
On Tue, May 05, 2015 at 01:57:04PM +, Speak Freely wrote: Matthew Finkel, It's kind of disingenuous to suggest If you want to work on something, then please come work on it, we really are overloaded. I'm really sorry you interpretted it in that way. It actually was a genuine request for more help. You have to let us work on it, for us to work on it. Do you understand the problem? Sure, that is a problem, but what is the problem? It seems this dilemma is reoccurring and not getting solved. Someone says they are willing to help work on something, possibly someone else says great! we need your help! then nothing happens. Was it an empty offer or did the offer die because no one followed up with the person? Having a volunteer coordinator might help - I hope it would help - but what's the best way to organize that? Is it the responsibly of some people associated with The Tor Project to follow up on every offer they receive or is it the responsibility of the person who made the offer to follow up and get involved? Maybe both? To The Inner Circle (The Tor Project People), I am at the very least the third person to mention in this thread that we have offered to help. No one responded to my offers. I'm pretty sure at least some of their offers were ignored as well, though I can't be bothered to double check. :( I don't know. Obviously, not receiving a response sucks. I completely understand that. Tor's work and day-to-day coordination is heavily based around IRC, so the mailing lists are not great places for offering help. This whole situation seems to be less about an inner circle existing, and more about a disconnection between the announcements and discussions on the mailing lists and what happens on IRC. I don't know of a good way to bridge this gap, though. I get that you're busy. However, Matthew's attitude to Seth is, in my most humble of opinions, unwarranted. We're all busy, it's difficult balancing everything. I'm sorry if my response was unwarranted, and maybe I shouldn't have responded because it was off-topic, in any case. It's frustrating trying to do something and improve a situation, and instead of receiving helpful feedback the thread receives complaints about how Tor is crappy with how it handles volunteers. Maybe this is partially due to miscommunication but I'm at a loss for what to do. You've got several people who out of their own free will, decided to offer our additional help, above and beyond what we already do. I wonder, how would you feel, if after offering free assistance to a community that then goes completely, totally, and utterly UNANSWERED, only to have those very people that we offered to assist, bitch that they are busy and want our help. How would you feel? Angry? A little schadenfreude? Or numb? I'm a husband, a father, and a business owner. I'm a busy guy, yet I still offered to help. I can't express how pissed off I am about this, without going into a obscenity-laced tirade about how your house isn't in order. When I offer assistance to someone, or in Tor's case several people, I damn well expect a response. Yes or no, thanks or fuck off, please or tomorrow, join us! or maybe next time. Deafening silence is in no way a mechanism that encourages support from the broader community, but from my perspective that's all you've given. Thanks. Obviously you're correct, silence is not an answer and not what you deserve as a result of offering your assistance. I don't know why this happened or the context of the offer but, to be blunt, Tor doesn't babysit volunteers. If you want to work on something, then, you must actually follow through and work on it. I learned this personally. A volunteer coordinator would be a great person for helping volunteers become more integrated into the community and work on projects but it is ultimately the person volunteering who decides how, when, and if they help. Tor wants your help, but becoming an active volunteer is your decision. Here's a suggestion to The Inner Circle - Have a volunteer coordinator that actually responds to people. This way, when the next person offers to help, they might actually get a good g*d d@mn f@cking response! Yes, this sounds like a good idea. Who wants to volunteer to be the volunteer coordinator? Again, that is a genuine question. No one has stepped up to do it. If we had one, at least they would respond to most offers. Seeing as how I'm a nobody and my offers aren't worth acknowledging, please continue to do whatever you'd like, with *all* the success it brings. Don't forget to smile. Being a nobody or being a somebody is irrelevant. I'm a nobody too, but I'm trying to do something. I sincerely hope you and the rest of the community will help me and Tor, as a whole, create a better community/network/world. Let's continue this discussion in a new thread. Thanks, Matt ___ tor-relays mailing
[tor-relays] T-shirts and Confirming Relay Control
Hi Ops, We recently began responding to t-shirt requests again. Sorry for the long silence. There's been a lot happening around here but not enough time or people to do everything, so the t-shirt requests simply remained untouched. But, despite the overload, t-shirts are important because they are a small token of our thanks and appreciation for making the network what it is today. We responded to around 70 t-shirt requests from relay operators in April, which comprised all requests for which we could verify (within reason) the request came from the person who controlled the qualifying relay. We still have another 20 requests where the requestor is not obviously the owner of the relay. Currently the content of a relay's Contact field is used, but this does not always provide enough (or any) information. For this case, we need an authentication mechanism which proves control of the relay but is something relay operators won't mind running. My currently plan is to ask relay operators to sign the fingerprint file which tor creates. The major disadvantage of this method is that it must be run as root (or a user with access to tor's data directory). The following process is the current plan, but does anyone have a better idea? Does it seem logical? When we receive a t-shirt request from someone who isn't obviously in control of the relay, we ask them to sign their fingerprint file with a unique salt. Assuming the path to their data dir is /var/lib/tor, we ask them to run: $ (echo -n salt ; cat /var/lib/tor/fingerprint) | openssl sha256 \ -binary | openssl pkeyutl -inkey /var/lib/tor/keys/secret_id_key \ -sign -pkeyopt digest:sha256 -pkeyopt rsa_padding_mode:pss \ -pkeyopt rsa_pss_saltlen:32 | openssl base64 signed_fingerprint They send us both /var/lib/tor/fingerprint and signed_fingerprint. When we receive them, we confirm the fingerprint in the fingerprint file matches the qualifying relay. Then we retrieve the relay's public key from its descriptor and convert it into pkcs#8 format using: $ openssl rsa -pubin -in pubkey_pkcs1 -RSAPublicKey_in -out pubkey and then we verify the sig using following commands: $ (echo -n salt ; cat fingerprint) | openssl sha256 -binary | \ openssl pkeyutl -pubin -verify -inkey pubkey -sigfile \ $(OUT=/tmp/signed_fingerprint_bin; base64 -d signed_fingerprint \ ${OUT}; echo ${OUT}) -pkeyopt digest:sha256 -pkeyopt \ rsa_padding_mode:pss -pkeyopt rsa_pss_saltlen:32; rm \ /tmp/signed_fingerprint_bin; This should yield Signature Verified Successfully. Another disadvantage of this is PSS wasn't implemented in openssl's apps until 1.0.1. I wonder how many relays are running on servers which are still using openssl 0.9.8 (and 1.0.0?). For these servers we can fallback on pkcs#1 v1.5 signatures. The signature can be created using a command similar to the one above: $ (echo -n salt ; cat /var/lib/tor/fingerprint) | openssl dgst \ -sha256 | openssl rsautl -inkey /var/lib/tor/keys/secret_id_key \ -sign | openssl base64 signed_fingerprint Again, they provide /var/lib/tor/fingerprint and signed_fingerprint, and we verify using: $ test $(openssl base64 -d -in signed_fingerprint | openssl rsautl \ -pubin -verify -inkey pubkey) = $((echo -n salt ; cat \ fingerprint) | openssl dgst -sha256); echo $? In addition, again, we confirm the fingerprint in the fingerprint file matches the fingerprint of the qualifying relay. Originally I used a few bashisms which made these simpler, but for this I suspect portability is important. Sorry this is a bit long. Thanks, Matt signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] T-shirts and Confirming Relay Control
On Sun, May 03, 2015 at 12:05:49PM -0700, Aaron Hopkins wrote: On Sun, 3 May 2015, Matthew Finkel wrote: Assuming the path to their data dir is /var/lib/tor, we ask them to run: Please don't get in the habit of asking relay operators through e-mail to run complex bash command lines as root. As a security practice, this is terrible. (How do you know the suggested command wasn't altered before it reached its recipient?) Yes, this is terrible, and I really hate the idea of asking it. I signed all my emails for the t-shirt requests, but now we're relying on everyone fetching my key and verifying the mail - so, that's also a bad assumption. I don't have a good solution. This is why I'm asking. If you want to build a utility for this into the tor distribution, and make it obvious what it does, I think that's fine. If the site asked people to run tor-request-tshirt or more generically tor-verify-ownership and it asked for whatever required information, I'd think that'd be more obviously safe. Unfortunately, for something like that to work seamlessly, it would need to be setuid or setgid. This may be a better way forward, but I wonder what we can do now. Or as Robert suggests, just send verification mail to the listed contact address of the relay. If they don't list one on their config, find an alternate verification mechanism like e-mailing whois contacts for the IP or domain name, or refuse the request. I'd prefer not denying them a t-shirt because they don't want to publish an email address publically, but using whois seems like a stretch and usually ends at the hosting provider instead of the operator. Thanks for the idea. - Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] T-shirts and Confirming Relay Control
On Sun, May 03, 2015 at 09:18:30PM +0200, Sebastian Urbach wrote: On May 3, 2015 7:45:39 PM Matthew Finkel matthew.fin...@gmail.com wrote: Hi Matthew, Hi Ops, We recently began responding to t-shirt requests again. Sorry for the long silence. There's been a lot happening around here but not enough 0 time or people to do everything, so the t-shirt requests simply remained untouched. But, despite the overload, t-shirts are important because they are a small token of our thanks and appreciation for making the network what it is today. We responded to around 70 t-shirt requests from relay operators in April, which comprised all requests for which we could verify (within reason) the request came from the person who controlled the qualifying relay. We still have another 20 requests where the requestor is not obviously the owner of the relay. Currently the content of a relay's Contact field is used, but this does not always provide enough (or any) information. For this case, we need an authentication mechanism which proves control of the relay but is something relay operators won't mind running. I'm really not amused. As i recall a bunch of people including myself offered to help. Amused? This really has nothing to do with amusement. If you want to work on something, then please come work on it, we really are overloaded. That being said, correctly handling t-shirt requests and other similar communications is important and delicate. The Tor Project is in a difficult situation where it wants to support the Tor network but not run it. This means, to some extent, we become a trusted third-party with some information. T-shirt requests are a perfect example of this, where we receive requests from people who choose not to publically publish their contact details yet they would like a reward for their work - which they absolutely deserve. This requires that operators trust us, so letting anyone help take care of these requests is not wise. I get the distinct impression that you keep everything within a small circle of people, no matter what. Even if that means that services are suffering. We're a group of security and privacy conscious individuals who want a world where everyone has secure and private communications, this isn't exactly a good combination which leads to publically discussioning everything. I certainly admit sometimes I default to discussing topics privately rather than sending it to tor-talk or tor-relays - I nearly did that with this thread. It's a bad habit, but it's not as common as I think you think it is. - Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] T-shirts and Confirming Relay Control
On Sun, May 03, 2015 at 03:31:01PM -0700, Tom van der Woerdt wrote: Matthew Finkel schreef op 03/05/15 om 14:47: On Sun, May 03, 2015 at 08:20:54PM +, Matthew Finkel wrote: On Sun, May 03, 2015 at 12:05:49PM -0700, Aaron Hopkins wrote: On Sun, 3 May 2015, Matthew Finkel wrote: Assuming the path to their data dir is /var/lib/tor, we ask them to run: Please don't get in the habit of asking relay operators through e-mail to run complex bash command lines as root. As a security practice, this is terrible. (How do you know the suggested command wasn't altered before it reached its recipient?) Yes, this is terrible, and I really hate the idea of asking it. I signed all my emails for the t-shirt requests, but now we're relying on everyone fetching my key and verifying the mail - so, that's also a bad assumption. I don't have a good solution. This is why I'm asking. What if we add the commands to the t-shirt[0] website? Again, this isn't a great solution, but we already have documentation which requires running commands with elevated privileges on there, and it's slightly better than sending it in an email. These commands are still more complex than I'd like, but if beside providing an executable or verifiable shell script, I'm running low on solutions. [0] https://www.torproject.org/getinvolved/tshirt Thanks, Matt Hi Matt, How about : * Primarily using ContactInfo for the verification * If you cannot match the ContactInfo, ask people to set it on their relays Sounds good. * If they are unwilling/unable to do so, ask them to sign their mail address using their secret Tor key How? For the short-term, do you think asking the operator to run the proposed command is not a crazy idea? * Implement a --sign option for Tor 0.2.7 * Starting a year from now, just ask everyone to sign the request We'd need more than a year for this, likely four years, at the earliest because Jessie only has 0.2.6. Proving ownership of a Tor relay can be relevant for more applications than just Weather, so a simple --sign option can be good to have. That doesn't address the immediate concerns though, it's more of a long-term solution. I think this may be a good idea, especially if CAs being issuing certs for onion sites. Implementing it will not be too difficult, unfortunately its usability may be a little tricky. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] T-shirts and Confirming Relay Control
On Mon, May 04, 2015 at 12:46:01AM +0200, Markus Hitter wrote: Am 03.05.2015 um 22:49 schrieb Matthew Finkel: This requires that operators trust us, so letting anyone help take care of these requests is not wise. Maybe I'm unique with this opinion, but usually I trust groups open to helping hands more than those who consider them selfs to be wiser than the average. I don't think what I said contradicts this. You are certainly not alone with that opinion and we, the thousands of people in the Tor community, make Tor what it is. There is a smaller subset of the community which handles some personal information, and, as it turns out, most people prefer only revealing their information to a few people instead of thousands. Hopefully we will move toward an automated system for these t-shirts, so that the only people in the trusted-set are those who pay for the t-shirts, in this case. But, in general, when dealing with finances and PII, there's certain information that should remain private. That being said, we want more people to help us. Please, come work on some of Tor's projects. We want more review, more input, more feedback. I was not saying we were wise because we aren't 100% public and transparent with what we do. I was saying revealing the personal information about operators to random, unvetted volunteers was not wise - I hope this makes sense. We're a group of security and privacy conscious individuals who want a world where everyone has secure and private communications, this isn't exactly a good combination which leads to publically discussioning everything. Sounds almost like the advertising from companies which try to sell their closed source software as the most secure thing since the invention of sliced bread. Heh. Good thing that wasn't an advertisement and Tor is not a company selling closed-source software :) Of course it's not a good idea to publish the addresses of the t-shirt receivers, neither to email them randomly around the globe, but printing a hundred stickers and placing them on as many bags also isn't something which keeps a group of people busy for months. Absolutely, but what's the cost? Our current solution using Printfection is neither ideal nor cheap, but it is convenient. Tor pays Printfection a bunch of money and Printfection creates the t-shirts, gives us one-time links, and takes care of the shipping and handling. If we crowd sourced creating bags with stickers in them we would need someone who can organize all the volunteers, ship the bags and stickers around the world, pay the return shipping for the filled bags, and then ship them again to the relay operators. That seems like it will become expensive. I would love to find a better solution than Printfection, so if anyone has suggestions we'd love to hear about it. - Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] T-shirts and Confirming Relay Control
On Sun, May 03, 2015 at 06:17:20PM -0400, JovianMallard wrote: Matt, Inspired by the options to confirm domain ownership with Google, Could you ask the relay operator to include a randomly generated (by you) token in their contact field? It may take a while to propagate and it requires action on the operator's part, but it's not difficult and I expect it provides the assurance you need. Thanks for the suggestion! I did consider this and other similar methods. The major disadvantage I see with this one is that there will be a historical record of when the operator requested a t-shirt. Maybe this doesn't matter, though. It's probably a better option than some of the others. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] T-shirts and Confirming Relay Control
On Sun, May 03, 2015 at 10:26:52AM -0800, I wrote: Matt, Thanks for handling the backlog of t-shirts as they are important as an acknowledgement of valuable contributions. Isn't the value of the t-shirt disproportionate to the trouble you're going to to give them out? If the weather message offering the t-shirt is answered by the same address isn't that proof enough? As I haven't received a message yet and my details are plain and simple I wonder what could have gone wrong. Hi Robert, I replied privately about your situation but it's possible this plan is more complicated than it needs to be. In general, I'd prefer we receive t-shirt requests from the same email address as is specified in the Contact field. Obviously, if they are different, we can always send the response and t-shirt link to the address in the Contact field, but that asymmetry seems weird to me, but I'm not against doing this. For the situations where there is no email address in the contact field, I'm not certain how else we can confirm we're sending the t-shirt to the person who deserves it. Thanks for your input! - Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Tor-Tshirts
On Sun, Mar 22, 2015 at 09:02:04AM -0800, I wrote: Would you look at how or when the second design which Jacob wears would be available again, please? Do you have an example of the second design? Thanks, Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Tor-Tshirts
On Sun, Mar 22, 2015 at 06:51:38AM -0400, Roger Dingledine wrote: On Sun, Mar 22, 2015 at 01:03:15AM -0400, Nchinda Nchinda wrote: Is there still someone at Tor Weather managing tshirt distribution? I've been running a two fairly large relays for a couple months, although I also wouldn't mind paying for an official tor shirt. My email to Tor Weather went unanswered. https://atlas.torproject.org/#details/C1CFB375BED9D7506569E07B01753BC67EE87AC2 https://atlas.torproject.org/#details/CAB78BF9BD73536DCB55E5BC98D5F3AAB45CF9EA We indeed have a stack of tshirt requests queued up. I've been working on spinning up another volunteer to help answer all of them. Soon I hope! Yes, real soon now, I hope. That volunteer should send an update when they start working on all the requests in the queue. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Whitelist
On Tue, Dec 23, 2014 at 11:20:32PM +, Thomas White wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Directory Authorities, Can you please remove the following fingerprints/IP's from the blacklist as per my previous updates in tor-talk. D78AB0013D95AFA60757333645BAA03A169DF722 6F545A39D4849C9FE5B08A6D68C8B3478E4B608B 5E87B10B430BA4D9ADF1E1F01E69D3A137FB63C9 0824CE7D452B892D12E081D36E7415F85EA9988F 35961469646A623F9EE03B7B45296527A624AAFD 1EA968C956FBC00617655A35DA872D319E87C597 E5A21C42B0FDB88E1A744D9A0388EFB2A7A598CF 5D1CB4B3025F4D2810CF12AB7A86FC10F139 1324EC51FBFA5FD1A11B94563E8D2A7999CD8F57 93CD9231C260558D77331162A5DC5A4C692F5344 Hi Thomas, I cannot speak for the directory authority operators, but removing these fingerprints from each of their blacklist seems like a bad idea. Whether or not your relays were compromised, it sounds like something happened. Directory authorities accepting these keys again seems risky (even assuming the hardware is secure). Generating new keys is probably a better choice, unfortunately this will add additional overhead and you'll obviously lose a few months reputation and stability-state, but it shouldn't take long before the relays regain their flags and status in the network. Thanks for running these relays, Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] How's your relay doing? Reporting Bad Relays
Hi Relay Operators, A few months ago[0], we announced the bad-rel...@lists.torproject.org mailing list and asked everyone to send reports to that list if they suspected a relay was...bad. We've already received many reports, so please keep them coming. We also want to ask all of you to use that list, as well. If at anytime you think your relay is no longer safe for use, please tell us. Roger tweeted about this yesterday[1][2], too. The Tor network exists because of all of you and we can only keep it safe with your help. Let us know if you have any questions. Thanks! Matt [0] https://blog.torproject.org/blog/how-report-bad-relays [1] https://twitter.com/RogerDingledine/status/530878388605423616 [2] For those who don't want to open Twitter: If your #Tor relay is stolen or you lose control of it, please report it so we can blacklist it: https://blog.torproject.org/blog/how-report-bad-relays @TorProject ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Choosing to run vanilla or obfuscated bridge
On Wed, Oct 29, 2014 at 08:20:15AM +, eliaz wrote: I know that vanilla bridges cannot carry obfsproxy traffic. But can obfsproxied bridges carry vanilla traffic? If not, are there criteria to help me decide which bridge configuration is useful at any particular time? - eliaz Hi eliaz, As a followup to Andreas message, vanilla bridges (only setting the torrc Bridge line) will only speak and look like the Tor protocol on the wire. Pluggable transports usually sit directly in front of Tor and transform the Tor-protocol-looking-data into whatever the pluggable transport creates. At this point, Tor only speaks the Tor protocol and each pluggable transport only speak their specific protocols. Each component does what it does best. So, to answer your question, only Obfsproxy understands the obfuscated protocols (obfs2, obfs3, scramblesuit) and Tor understands Tor. If you are thinking about running a bridge then it would be awesome if you can run a bridge and run the pluggable transports[0]. And, if your brave, you can also try running the new Obfs4proxy[1] pluggable transport. Does this make sense? Let us know if you have any more questions. - Matt [0] https://www.torproject.org/projects/obfsproxy-debian-instructions.html.en#instructions [1] https://lists.torproject.org/pipermail/tor-relays/2014-September/005372.html ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Few questions about relaying
On Sat, Oct 11, 2014 at 02:05:24AM -0400, Blaise Gagnon wrote: Hi and many thanks for developping this project ! I have a dedicated 200Mb (25 MB) fiber optics connection and a dedicated quad-core Linux server (64). What is the best setup to get maximum bandwidth usage ? I'm still stuck at 46.4Kb measured speed and 3,51MB advertised bandwidth. The server has direct connection to the Internet. Fingerprint : 5EF740BB88C75915F8316DFEC8F1C8631FF26F12 Hi Blaise, Thanks for running a relay! It looks like you're currently peaking at a little over 2MB (with a mean of ~1MB)[0][1]. I also see that the relay is currently hibernating. This will certainly impact the amount of bandwidth you use. Did you configure MaxAdvertisedBandwidth? Below is what the network knows about your relay (with some irrelevant details removed). $ curl https://onionoo.torproject.org/details?fingerprint=5EF740BB88C75915F8316DFEC8F1C8631FF26F12 { version:1.1, relays_published:2014-10-11 05:00:00, relays:[ { nickname:QuebecFibe, fingerprint:5EF740BB88C75915F8316DFEC8F1C8631FF26F12, [...] last_seen:2014-10-11 06:00:00, last_changed_address_or_port:2014-10-07 07:00:00, first_seen:2014-07-17 17:00:00, running:true, flags:[Fast,Running,V2Dir,Valid], [...] consensus_weight:5950, host_name:69.159.127.80, last_restarted:2014-10-08 06:31:26, bandwidth_rate:26214400, bandwidth_burst:26214400, observed_bandwidth:3512594, advertised_bandwidth:3512594, exit_policy:[reject *:*], exit_policy_summary:{reject:[1-65535]}, [...] advertised_bandwidth_fraction:2.51E-4, consensus_weight_fraction:2.4263727E-4, guard_probability:0.0, middle_probability:7.2791905E-4, exit_probability:0.0, recommended_version:true, hibernating:true} ], [...] ]} [0] https://globe.torproject.org/#/relay/5EF740BB88C75915F8316DFEC8F1C8631FF26F12 [1] https://atlas.torproject.org/#details/5EF740BB88C75915F8316DFEC8F1C8631FF26F12 Should I run multiple relays on the same machine/IP ? You can, and it may help, but there may be a simpler problem that can be fixed here. - Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] introduction
On Thu, Oct 09, 2014 at 06:57:31PM -0600, Mirimir wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I don't know whether introductions are hopelessly old school on this list, but here's a brief one. Although I've used Tor for many years, it's been just about a year since I decided to understand it better. I've also been catching up on the literature. Now I'm considering the possibility of running some relays. I've read some of the instructions on torservers.net, and have a few questions about security. I'm presuming that this is the best place to ask them. Great! Welcome! This is probably as good a place as any, so please feel free to ask (but please don't overwhelm the list ;) ). ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Directory Server Issue
On Wed, Aug 13, 2014 at 10:32:45AM -0400, Spencer Rhodes wrote: Hi, I have a server (triratna) which I recently put up, which operates on ports 80 and 443, and which initially showed a Directory Server flag. After several days of operation, however, the directory flag disappeared from both the torstatus listing and from the arm display on the console. I would like to know if there is a way to verify that directory services are in fact working, and if so, determine why the server is not flagged properly. I found some old postings to the effect that one could browse to server://tor or server://tor/status/all, but this does not seem to be true any more. Hi Spencer, This should still work. Try using http://ip address:DirPort/tor/status-vote/current/consensus to fetch the current consensus. You can also fetch individual relay descriptors using a similar URI. If you provide your relay fingerprint someone may be able to help further. I tried looking up the name you gave, but I couldn't find it in either Globe[0] nor Atlas[1]. Thanks for running a relay! - Matt [0] https://globe.torproject.org/#/search/query=triratna [1] https://atlas.torproject.org/#search/triratna ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Why did my relay fall out of the consensus?
On Fri, Jul 04, 2014 at 10:06:51AM -0400, Steve Snyder wrote: On June 9th my relay, which was established about 20 months ago, fell out of the cached consensus. There are no errors in the logs, just notices that the relay is not in the cached consensus. Apart from upgrading to Tor v0.2.4.22 3 days earlier I haven't made any changes to the server. Anyone know what's going on here? https://exonerator.torproject.org/?targetaddr=targetPort=ip=5.9.191.52timestamp=2014-06-09#relay Did you fix something? It seems to be running again: https://atlas.torproject.org/#details/9BE67F8BE1B248994A30E4DEEB3EA00CCFBE9F06 https://globe.torproject.org/#/relay/9BE67F8BE1B248994A30E4DEEB3EA00CCFBE9F06 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Lost hsdir flag
On Sat, Jun 21, 2014 at 07:46:54PM +0100, kingqueen wrote: hello, I don't know why, my relay nicknamed kingqueenbtnftw used to have the hsdir flag but now doesn't. I think from what I can gather, hsdir is based purely on the time since last boot / restart Tor service, rather than how long the relay has been up in total? That would explain it. Hi kingqueen, Yup, you are correct. The flag is assigned based on the current uptime of the relay[0]. HSDir -- A router is a v2 hidden service directory if it stores and serves v2 hidden service descriptors, and the authority believes that it's been up for at least 25 hours (or the current value of MinUptimeHidServDirectoryV2). I see your relay was recently restarted, so that does explain why it lost the flag. Thanks for running a relay! [0] https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt#l1877 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Bridge Operators - Heartbleed, Heartwarming, and Increased Help
Hi All, Below is an email we sent last week to almost all of the bridge operators who provided contact information for their bridge(s). For those operators we missed and for those we couldn't contact, this hopefully provides some useful information. All the best, Matt --- Hi Tor Bridge Relay Operator! Unfortunately this email must begin with bad news, but it gets better. Due to the recent Heartbleed OpenSSL vulnerability that was disclosed earlier this week, we are reaching out to you to ask that you install an updated version of OpenSSL. The vulnerability has the potential to decrease the security of your bridge as well as the anonymity of any user connecting to your bridge. As a result of this, we also ask that you generate a new identity key due to the possibility that your current one was leaked. The process to upgrade your version of OpenSSL depends greatly on your operating system. Please ensure you are using a version that was released within the past four days, see the Heartbleed website[0] for more details on the vulnerability and for which versions are affected. Please do this before you regenerate your identity key. When this is done, you will need to restart Tor. At this point you can ask us to retest your bridge to confirm that it is not vulnerable anymore. Next, to regenerate your identity key simply stop Tor and delete the current key. This is done by opening Tor's Data directory and removing the contents in the keys/ directory. Tor's Data directory is located at /var/lib/tor, by default. Let us know if you have trouble locating it. When this is complete, start Tor and it will automatically create a new identity for you. See the recent blog post for many more details: https://blog.torproject.org/blog/openssl-bug-cve-2014-0160 Now that the bad news was said, we want to take this opportunity to thank you, from the bottom of our hearts, for volunteering to run a bridge relay. We know we do not say it often, but it is really appreciated! Please let us know if you have any question, concerns, or suggestions, especially related to how we communicate with you and how bridge relay operators can be more involved. Lastly, if you are not already running the obfsproxy pluggable transport[1] (i.e. obfs3) on your bridge, please follow the Debian instructions[2] (for a Debian-based system) on the website and install it. Your bridge is a great contribution to the Tor network, however as censorship on the internet increases around the world users are forced to use a pluggable transport. Tor does not understand how to communicate with them by default, though. Therefore we are asking that all bridge operators install obfsproxy and help as many users as possible. In addition, also consider subscribing to the tor-relays mailing list[3], if you are not already; we will be posting instructions on how to maximize the contribution of your bridge on that list every now and then. [0] http://heartbleed.com [1] https://www.torproject.org/docs/pluggable-transports.html.en [2] https://www.torproject.org/projects/obfsproxy-debian-instructions.html.en#instructions [3] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays Again, thank you for running a bridge relay and sorry for the bad news. Let us know if you have any questions or if you have any suggestions. All the best, Matt The Tor Project ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] DDOS?
On Sat, Dec 29, 2012 at 11:44:29PM +, mick wrote: On Sat, 29 Dec 2012 22:07:59 + mick m...@rlogin.net allegedly wrote: I shut tor down while I investigated and when running nethogs I noticed a shed load of attempted connections to my tor port (443) from non-tor addresses. A snapshot is at http://rlogin.net/tor/incoming.png Anyone else seeing anything similar? I can't believe I'm the only node being poked. On further investigation, I think many of those addresses are likely to be tor related, possibly clients attempting to join tor through my node. How long does it take from the time a node is shut down to the point where no-one will attempt to connect through it? Mick Hi Mick, Technically clients will attempt to use your node until the majority of the directory authorities agree your node is no longer reachable (should not take more than a little over 1 hour, assuming I understand the code correctly) plus 3 hours (a client considers a consensus valid for at most 3 hours), so roughly 4 hours. However, because some clients have incorrectly set clocks, connections will most likely trickle in past this point. I think after 5 hours no valid clients should still try to connect. HTH, Matt ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays