Re: [tor-relays] Boosting throughput with own DNS resolvers

2015-07-20 Thread Seth
On Sun, 19 Jul 2015 13:52:32 -0700, Tom van der Woerdt i...@tvdw.eu  
wrote:

All my exits run with pdns-recursor installed, because I don't want to
be uploading people's DNS data to Google's search indexer :-)


How does pdns-recursor stack up against unbound chained with  
dnscrypt-proxy?


I've been running the latter but this is the first I've heard of using  
pdns on an exit node.


The pdns + Tor configuration tweaks were very helpful, thanks.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] de-centralised bad exit list files - a bad and/or naive idea ?

2015-07-03 Thread Seth
On Fri, 03 Jul 2015 04:27:50 -0700, Toralf Förster  
toralf.foers...@gmx.de wrote:


Reading [tor-relays] unflagged BAD EXIT nodes /me wonders, such a  
feature would makes sense.


Technically this could yield to a ./torrc.d config directory, where tor  
users could store the (regular updated) list/s they do trusts.


That would be nice, right now copying in the fingerprints of dozens of  
exit nodes into torrc is downright painful, especially since they can't be  
listed on their own lines.


The ability to use nginx style include statements in torrc would also be  
helpful, that way values like 'ExitNodes' could be maintained in a  
separate file.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Please enable IPv6 on your relay!

2015-05-13 Thread Seth
On Tue, 12 May 2015 22:45:24 -0700, Brian Kroll  
br...@fiberoverethernet.com wrote:



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I just enabled four relays, who has the next two? ^_^


Sydney Australia's in the IPv6 house now, wut wut.

https://atlas.torproject.org/#details/E1E1059D8C41FC48B823C6F09348EA89C4D4C9D4
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-03 Thread Seth

On Sun, 03 May 2015 11:50:25 -0700, nusenu nus...@openmailbox.org wrote:

I'd say 7$ for 2TB/mo on 1GB RAM is expensive if you compare it with
100mbps unmetered and lets say you are able to saturate ~50% =
~30TB/mo (~50 mpbs* in one direction) for ~15$/mo with 1GB RAM (in HU,
0.6% CW).


Can't argue with that.

The difference in annual cost ($60 vs $180 USD) is the key factor for me  
right now. Don't want to pay $180/yr out of pocket right now.



..but anyway thanks for adding more OpenBSD relays.


Aye, I'll be trying out your Ansible playbooks in a bit.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-03 Thread Seth
On Sat, 02 May 2015 00:52:07 -0700, Geo Rift  
tim.cochrane.lap...@gmail.com wrote:

I would love to see some more nodes in Australia. I'm located in Perth
and the speed of the network it horrible.


Tim, just deployed an exit node to Sydney location, feel free to test it  
out:


https://atlas.torproject.org/#details/E1E1059D8C41FC48B823C6F09348EA89C4D4C9D4
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-03 Thread Seth

On Sat, 02 May 2015 14:37:04 -0700, nusenu nus...@openmailbox.org wrote:

Is there a specific reason why you limit yourself to vultr?


Yes, there are several.

* Price (hardware bang for the buck. SSD, 1000GB bw/mo in most locations.  
Starter pkg is $5/mo)
* Features/usability (really like their control panel and website design.  
Snapshots are key, ability to re-deploy snapshots anywhere. Two factor  
auth with Yubikey.)
* OpenBSD supported via custom ISO install feature (This limits the field  
quickly)

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-01 Thread Seth
I'm standing up a new exit relay on the VULTR network. How would a person  
go about determining which location is in most need of additional exit  
relay capacity?


Available locations: https://www.vultr.com/locations/

* Miami, Florida
* Chicago, Illinois
* New York / New Jersey
* Dallas, Texas
* Seattle, Washington
* Atlanta, Georgia
* Los Angeles, California
* Silicon Valley, California
* (AU) Sydney, Australia
* (Asia) Tokyo, Japan
* (EU) Amsterdam, NL
* (EU) London, UK
* (EU) Paris, France
* (EU) Frankfurt, DE


Also, curious to hear people's thoughts on any potential jurisdictional  
arbitrage benefits to be gleaned by choosing a location other than ones  
country of residence or citizenship.


For the sake of argument, consider a VULTR account opened by U.S. citizen  
residing in the U.S. Choopa LLC (VULTR parent company) is also a US based  
company. http://start.cortera.com/company/research/k5o8lvm2j/choopa-llc/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Determining geographical locations for a new exit relay would help most

2015-05-01 Thread Seth

On Fri, 01 May 2015 10:01:45 -0700, nusenu nus...@openmailbox.org wrote:

It might be oversimplified but using compass with group by country
ordered by consensus weight (or in your case exit probability) shows
you where most of tor network capacity is currently located. The goal
is to setup relays in new or rarely used locations.

So by using compass your list would look like this, ordered from
better to less good:

* (AU) Sydney, Australia (0.01% CW)
* (Asia) Tokyo, Japan (0.8% CW)
* UK (4.6% CW)
* US (10.1%)
* NL (12.4% CW)
* France (21.6%)
* DE (25.7% CW)
Note: the is a current snapshot and numbers change but AU or JP is
better then DE (from a capacity divers. point of view) - this will
also be the case in a week or a month.

You might also want to consider the exit probability and use that in
addition or instead of CW.

I don't know if VULTR has multiple ASes but if they do you might also
want to have a look at the group by AS results (if they allow you to
choose).


Thanks for the breakdown, that helps. The only hitch with the Sydney and  
Toyko locations is that instead of 1000GB/mo of bandwidth, you only get  
200GB/mo.


Would it be better (all things considered) to go with the UK location at  
1000GB/mo vs Tokyo or Sydney at 200GB/mo?

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Effectively donating bandwidth

2015-04-29 Thread Seth
On Wed, 29 Apr 2015 17:44:38 -0700, Curtis Gagliardi cur...@curtis.io  
wrote:

Spreading it out feels like the right thing to do, but is it actually
the most helpful?  Maybe burning my bandwidth is faster bursts is more
helpful.


Also found these relevant threads by searching the archives for  
'hibernate' :


http://www.mail-archive.com/tor-relays%40lists.torproject.org/msg05002.html
http://www.mail-archive.com/tor-relays@lists.torproject.org/msg05569.html

There was some other discussion (can't remember exactly where off-hand,  
might have been another lits) disputing the Tor manual's stance of better  
have a fast relay part of the time than a slow relay all the time. Maybe  
this is case dependent on what the minimum bandwidth levels are, dunno.


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Effectively donating bandwidth

2015-04-29 Thread Seth
On Wed, 29 Apr 2015 17:44:38 -0700, Curtis Gagliardi cur...@curtis.io  
wrote:



I'm running a relay with the extra bandwidth on my VPS, but I'm unsure
if it's optimally configured.

I have 2.5TB of bandwidth I want to use every month.  Given that, how do
I configure my relay in the most helpful way?

The docs mention dividing my bandwidth by 30 and setting an accounting
max of 1 day.   It also suggests You might also consider rate limiting
to spread your usefulness over more of the day.  What not use an
accouting period of a month and spread it out over the full month?
Spreading it out feels like the right thing to do, but is it actually
the most helpful?  Maybe burning my bandwidth is faster bursts is more
helpful.

If spreading it over the month using a low bandwidth rate and a monthly
accounting period is ideal, is there a better way to configure it than
busting out a calculator and coverting TB/month to KB/s?

How should I determine my BandwidthBurstRate?  I understand what it is,
but should it be defined in relation to my bandwidth rate?


I'm running an exit node on an entry level VULTR VPS which comes with  
1000GB per month.


This is all I put in the torrc file to limit bandwidth usage:

# Bandwidth and data caps
AccountingStart day 19:45 # calculate once a day at 7:45pm
AccountingMax 33 GBytes

It's surprisingly accurate. As of today VPS usage is at 98% of monthly  
allowance. I didn't bother with burst rate because it never seems to climb  
over 10Mbps usage, and the interface is a 100Mbps connection.


As far as letting in run full steam and then shut down for potentially  
hours every day vs. finding a steady rate that it can burn bandwidth at  
for the entire month, that's been discussed already in the list archives  
here:  
http://www.mail-archive.com/tor-relays%40lists.torproject.org/msg05478.html

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay from home

2015-04-08 Thread Seth
On Wed, 08 Apr 2015 03:57:20 -0700, Jannis Wiese m...@janniswiese.com  
wrote:


maybe this is a dumb question, but as I couldn’t find any real advise  
anywhere on the net: Does it make sense to start operating a non-exit  
relay from home for a longer term? I’m thinking about at least getting a  
T-Shirt (the more uptime, the better).

However, my concerns are the daily disconnect and the dynamic IP.

What do you think? Any first-hand tips are of course appreciated.


Been running a relay at home for about 3-4 months now and like other  
poster barely notice the traffic. IIRC recommended upstream bandwidth is  
2Mpbs or greater, if you run a relay on a connection without enough  
bandwidth (in either direction) it's not really helping the network,  
(Roger sez!). Sorry don't have a reference link handy for this factoid.  
Also make sure the connection is stable.


Another reason I think it's a good idea to run a relay 24/7 is that it  
provides cover traffic. It becomes more difficult for an observer to  
determine when you yourself are using the Tor network, helping to thwart  
time of usage correlation attacks.


Just _make sure_ that your exit policy is set to reject all, the default  
torrc config makes it an exit node with no outbound restrictions last time  
I checked.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor and Freenode

2015-01-25 Thread Seth

On Sat, 24 Jan 2015 18:06:40 -0800, Markus Hitter m...@jump-ing.de wrote:


Thanks for describing what I meant with extra hassle. Makes also a  
more detailed description than what I could find on the web so far.


It is sort a of pain in the neck I agree, especially when you have to go  
about figuring it out for yourself.


I need to write this up anyway for my own personal reference, I'll post a  
HOWTO to the list if enough people are interested and feel that it's  
relevant.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Seth

On Sat, 24 Jan 2015 12:32:24 -0800, David Serrano t...@dserrano5.es wrote:


On 2015-01-24 20:16:13 (+), cacahuatl wrote:

Markus Hitter:
 - It's a hassle to setup. Proxies and such stuff.

Running Tor Browser and setting some options on your IRC client?


Tor Browser isn't even needed. Once he has a relay in place, all he has  
to do

is teach the IRC client to connect through it.


I run a Tor relay 24/7 at home on a dedicated computer. I like to setup a  
ZNC IRC bouncer on the same host have have it connect the Tor relay's  
SOCKS5 port via Proxychains. You'll need to authenticate the ZNC Freenode  
server nick via SASL if memory serves correctly.


Then configure your IRC client to connect to the ZNC bouncer. Set it and  
forget it.


The only non Tor trafic exposure is registering the Freenode nick.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] building Tor against LibreSSL 2.1.1 fails with undefined reference to `EVP_aes_128_ctr' error

2015-01-15 Thread Seth

On Thu, 01 Jan 2015 10:55:18 -0800, Seth l...@sysfu.com wrote:

On Sun, 28 Dec 2014 16:01:12 -0800, Nick Mathewson ni...@freehaven.net  
Maybe something like this would work?


CFLAGS=-I/usr/local/include LDFLAGS=-L/usr/local/lib ./configure


That resolves the tortls.o error, thanks!

This is the line I used for OpenBSD:

env CFLAGS=-I/usr/local/include LDFLAGS=-L/usr/local/lib ./configure  
--disable-asciidoc --sysconfdir=/etc

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] building Tor against LibreSSL 2.1.1 fails with undefined reference to `EVP_aes_128_ctr' error

2015-01-13 Thread Seth
On Sun, 28 Dec 2014 16:01:12 -0800, Nick Mathewson ni...@freehaven.net  
wrote:



Maybe the autoconf script is looking at the headers in /usr/include,
instead of /usr/local/include ? That would mess it up.

Instead of using --with-openssl-dir=/usr/local, what happens if you
set CFLAGS and LDFLAGS by hand when compiling?


I tried to find out how to do this by myself but I don't understand very  
well how these flags work.


Could you please provide some examples and I'll test?

Also of note, I was able to get tor-0.2.6.2-alpha to build succesfully on  
a the release version of OpenBSD 5.6 which includes LibreSSL 2.0-something.


When I tried to  build tor-0.2.6.2-alpha against libressl 2.1.2 on the  
same system using ./configure --with-openssl-dir=/usr/local it bails out  
with same the tortls.o error.



For the meantime, is there a compiler macro we can use to distinguish
libressl from openssl at compile-time?


Do not know.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Secure secure Shell update protocols

2015-01-10 Thread Seth

On Fri, 09 Jan 2015 12:46:11 -0800, 0x23 rus...@gmx.net wrote:
wanna share some current insights regarding secure shell(ssh) on how to  
harden sys after the German 'Der Spiegel' disclosed documents.h


https://stribika.github.io/2015/01/04/secure-secure-shell.html


Before anyone goes and implements the above, you should probably read the  
related thread on the Applied Crypto Hardening mailing list discussing the  
pros and cons of this particular write-up.  
http://lists.cert.at/pipermail/ach/2015-January/001684.html

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Atlas / Globe backend appears to be down

2015-01-10 Thread Seth

On Sat, 10 Jan 2015 18:09:46 -0800, starlight.201...@binnacle.cx wrote:

Can't pull anything up on either Atlas or Globe.


My searches have been failing there for an hour or so too. Have you mailed  
a...@torproject.org?

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Reminder: exit nodes probably shouldn't be using Google's DNS servers

2015-01-08 Thread Seth
On Thu, 08 Jan 2015 08:38:35 -0800, Paul Syverson  
paul.syver...@nrl.navy.mil wrote:
The flip side is that, against such an adversary, using a DNS server  
that supports encryption of

queries and responses is probably more important than it being local.


I like to chain unbound up to dnscrypt-proxy in order to encrypt DNS  
traffic for this very reason.


dnscrypt-proxy frequently is unable to keep up however, so I currently  
have unbound configured to make queries directly if dnscrypt-proxy is not  
responding.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] building Tor against LibreSSL 2.1.1 fails with undefined reference to `EVP_aes_128_ctr' error

2015-01-01 Thread Seth
On Sun, 28 Dec 2014 16:01:12 -0800, Nick Mathewson ni...@freehaven.net  
wrote:



Instead of using --with-openssl-dir=/usr/local, what happens if you
set CFLAGS and LDFLAGS by hand when compiling?


Maybe something like this would work?

CFLAGS=-I/usr/local/include LDFLAGS=-L/usr/local/lib ./configure
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Someone broke the tor-relay speed record?

2014-12-31 Thread Seth

On Wed, 31 Dec 2014 01:13:52 -0800, Justaguy justa...@riseup.net wrote:


Oh wait?
This is only advertised bandwith and not the actual bandwith.
maybe the actual bandwith will reach the advertised bandwith some day.
This relay is only running for 3 days so..


The advertised Tor bandwidth for the exit node that I control matches up  
well with the bandwidth graph provided by the ISP, so I believe it is  
fairly accurate.


https://globe.torproject.org/#/relay/E1E1059D8C41FC48B823C6F09348EA89C4D4C9D4

Seems like it should be impossible however for a relay to jump to 149MB/s  
of advertised bandwidth in less than a week.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] building Tor against LibreSSL 2.1.1 fails with undefined reference to `EVP_aes_128_ctr' error

2014-12-24 Thread Seth
On Tue, 23 Dec 2014 09:16:56 -0800, Nick Mathewson ni...@freehaven.net  
wrote:

Strange!  There is code in git master that is supposed to prevent
this.


Yes, I thought it had been fixed by your commit from this ticket  
https://trac.torproject.org/projects/tor/ticket/13325



The current Tor's find_cipher_by_id is supposed to avoid
looking at the get_cipher_by_id field.  Do you really get the same
errors with master, or is the error different?


Makes no difference, same error for master branch as the rest.

latest Git - master branch - git clone https://git.torproject.org/git/tor
-

# cd tor; git status
On branch master
Your branch is up-to-date with 'origin/master'.
nothing to commit, working directory clean

# sh autogen.sh ; ./configure --with-openssl-dir=/usr/local  
--disable-asciidoc ; make


src/common/tortls.c: In function 'find_cipher_by_id':
src/common/tortls.c:1478: error: 'SSL_METHOD' has no member named  
'get_cipher_by_char'
src/common/tortls.c:1484: error: 'SSL_METHOD' has no member named  
'get_cipher_by_char'

*** [src/common/tortls.o] Error code 1


Alpha - https://www.torproject.org/dist/tor-0.2.6.1-alpha.tar.gz


#./configure --with-openssl-dir=/usr/local --disable-asciidoc ; make

src/common/tortls.c: In function 'find_cipher_by_id':
src/common/tortls.c:1478: error: 'SSL_METHOD' has no member named  
'get_cipher_by_char'
src/common/tortls.c:1484: error: 'SSL_METHOD' has no member named  
'get_cipher_by_char'

*** [src/common/tortls.o] Error code 1

Stable - https://www.torproject.org/dist/tor-0.2.5.10.tar.gz


# ./configure --with-openssl-dir=/usr/local --disable-asciidoc ; make

src/common/tortls.c: In function 'find_cipher_by_id':
src/common/tortls.c:1480: error: 'SSL_METHOD' has no member named  
'get_cipher_by_char'
src/common/tortls.c:1486: error: 'SSL_METHOD' has no member named  
'get_cipher_by_char'

*** [src/common/tortls.o] Error code 1
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] building Tor against LibreSSL 2.1.1 fails with undefined reference to `EVP_aes_128_ctr' error

2014-12-23 Thread Seth
On Tue, 23 Dec 2014 06:33:44 -0800, Nick Mathewson ni...@freehaven.net  
wrote:

What version of Tor are you using here?  I think we have this fixed in
0.2.6.1-alpha with this commit:
   d1fa0163e571913b8e4972c5c8a2d46798f46156
And this ticket:
   https://trac.torproject.org/projects/tor/ticket/13325


I tried unsuccessfully with all three versions: stable, alpha and the  
latest from git.


Tor builds no problem when using the previous LibreSSL version (2.1.1) on  
FreeBSD 9.3.


As a side note, LibreSSL 2.1.2 also caused nginx builds using libressl as  
a dependency to fail.


OpenSMTPD and Dovecot will still build successfully against LibreSSL 2.1.2  
on the same system.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] building Tor against LibreSSL 2.1.1 fails with undefined reference to `EVP_aes_128_ctr' error

2014-12-22 Thread Seth

On Sat, 22 Nov 2014 17:33:59 -0800, Seth l...@sysfu.com wrote:
Thanks for the information. I was able to get the latest git version of  
Tor build against the libressl-2.1.1 pkg in a fresh FreeBSD 9x jail  
using the following steps:


pkg install libressl autoconf git gmake gettext
mkdir /usr/local/src;cd /usr/local/src;git clone  
https://git.torproject.org/git/tor
cd tor;sh autogen.sh;./configure --with-openssl-dir=/usr/local  
--disable-asciidoc

make;make install;tor


Unfortunately after upgrading LibreSSL from 2.1.1 to 2.1.2 this method now  
fails with the error:


src/common/tortls.c: In function 'find_cipher_by_id':
src/common/tortls.c:1480: error: 'SSL_METHOD' has no member named  
'get_cipher_by_char'
src/common/tortls.c:1486: error: 'SSL_METHOD' has no member named  
'get_cipher_by_char'

*** [src/common/tortls.o] Error code 1

I'll post a comment in the related Tor trac ticket
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Hibernation and Guard flag

2014-12-21 Thread Seth

On Sun, 21 Dec 2014 11:09:33 -0800, Filippo Valsorda h...@filippo.io wrote:


1. Is daily accounting preferable? That is, what's best, shorter or
longer hibernation periods?


This issued was touched on recently here:  
http://www.mail-archive.com/tor-relays%40lists.torproject.org/msg04996.html


Excerpt: As the Tor manual says, it's better to have a fast relay  
available

some of the time instead of having a slow relay available all the time.


2. How does hibernation play with the Guard flag? I know Guards rotation
plays a crucial role in users privacy, and it seems to me hibernation
would really hurt a client that selected you as its Guard, since it will
have either to run with one less available Guard, or pick a new one and
increase its risk. Also, I know there are talks about making only 1
Guard selected, how would that play with hibernation?


Not sure but I think the configuration made to satisfy question #1 is  
going to override this concern.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] specifying your own entrance and exit nodes

2014-12-10 Thread Seth
Assuming there are certain Tor notes being run by parties hostile to my  
own interests, what are
the pros and cons of specifying one's own list of trusted entrance and  
exit nodes?


I run a Tor relay at home 24/7 and use that as my entrance point. I do  
this to provide cover traffic for my own Tor use as well as help out the  
network.


I also try to use Tor for all my daily web browsing when possible. This  
has given be a lot of headaches.


Besides the demoralizing barrage of Cloudfare captchas, I've had a lot of  
problems with dropped connections, timeouts, SSL cert warnings, fatal  
errors connecting to HTTPS sites. I started to get a gut feeling,  
warranted or not, that some exits nodes might be meddling with my traffic.


To combat this I changed the configuration on my local Tor relay to use  
only exit nodes run by organizations or people that I felt I could trust.  
I didn't bother with specifying entrance nodes because I could not see  
what the gain would be.


This seems to have curbed some of the problems, with the tradeoff that  
responsiveness is much more inconsistent.


I'm just curious if restricting exit nodes to a few dozen that you trust  
effectively defeats most of the purpose of using Tor. What would be the  
bare minimum of Tor exit nodes a person would need to use in order to make  
life difficult for the Panopticon surveillor scum?


If this post is more appropriate for Tor-talk, please let me know
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread Seth

On Sat, 22 Nov 2014 22:42:15 -0800, Mirimir miri...@riseup.net wrote:


How much throughput do you get with your VPS, 1000 GB/mo or 2000 GB/mo?


The 1000 GB/mo applies to whichever value is greater, input or output. So  
far the Tor node is pushing less than 1.5GB per day. Takes a while for  
traffic to ramp up apparently.



As I read comments in torrc, AccountingMax applies separately to sent
and received bytes, not to their sum, and so setting '4 GB' may allow
up to 8 GB total before hibernating.


Yes, others have raised this issue as well and I will look into it.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread Seth

On Sat, 22 Nov 2014 19:13:17 -0800, ZEROF secur...@netmajstor.com wrote:

I saw some info just yesterday, but it's not in actual server  
configuration. Can you provide some good resource for setting  
dnscrypt-proxy? And no logging DNS's is good to protect end users
A caveat: You should probably avoid using the default OpenDNS servers with  
dnscrypt-proxy.


From the 'Bad Relays' wiki page  
https://trac.torproject.org/projects/tor/wiki/doc/badRelays


 The most common misconfiguration I have seen is using ​OpenDNS as a  
host's nameserver with what I think is the OpenDNS default config.  
Services such as OpenDNS lie to you, under the name of protecting you. The  
result is for instance getting redirected to their webpage when you want  
to visit evil sites such as ​https://www.torproject.org/.;___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread Seth

On Sun, 23 Nov 2014 16:53:03 -0800, ZEROF secur...@netmajstor.com wrote:


I'm not using opendns. OpenNic and OpenDNS are not same thing.


I'm aware of the distinction.

What I was trying to point out for the benefit of people just getting  
started with dnscrypt-proxy, is that by default it uses OpenDNS servers.


At least it has in every environment that I've set it up in so far.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-22 Thread Seth

On Sat, 22 Nov 2014 16:35:18 -0800, I beatthebasta...@inbox.com wrote:

So USA can be fast and cheap but beware when they agree Tor is  
acceptable because there are poor trade practices laws to get refunds  
and rights.


FWIW I spun up a Tor exit node on VULTR. I pro-actively informed them I  
was doing so by creating a support ticket with this text:


Just giving you guys a heads up that I've setup a new Tor exit node.

It's using the ReducedExitPolicy detailed here:

https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy

The reduced exit policy has been successful in eliminating the vast  
majority of DMCA complains according to this Tor blog post:


https://blog.torproject.org/running-exit-node

If there are any complaints about traffic from this node, please alert me  
immediately so I can deal with them. I have a dedicated email setup for  
this purpose at t...@sysfu.com.


Regards,
Seth

The response was a simple Thank you for the updateso they seem  
pretty cool about it.


If you look at https://torstatus.rueckgr.at/ you'll see a half dozen other  
nodes running on VULTR.


The starter $5/mo size gets you 1000GB of bandwidth per month, can't beat  
that with a stick.


Another thing I like about VULTR is that you can install your own custom  
OS via an ISO or iPXE script. Also none of that fixed kernel nonsense I  
dealt with at Digital Ocean. And they accept Bitcoin.


That fact that thousands of average joe sysadmins can now spin up a  
powerful Tor relay or exit node, on the operating system of their choice,  
for $5/mo payable in Bitcoin...I think that's a big deal.

--
Seth
I 3 nicely trimmed email replies
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-22 Thread Seth

On Sat, 22 Nov 2014 18:46:18 -0800, ZEROF secur...@netmajstor.com wrote:

I use servernames without logging from this this list  
http://wiki.opennicproject.org/Tier2 (France).

Great resource of logless DNS servers, I'm a big fan of OpenNIC.

Have you bothered to encrypt DNS traffic by setting up dnscrypt-proxy or  
the like? These days it's something I include as standard.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] building Tor against LibreSSL 2.1.1 fails with undefined reference to `EVP_aes_128_ctr' error

2014-11-21 Thread Seth
On Fri, 21 Nov 2014 09:10:11 -0800, David Stainton  
dstainton...@gmail.com wrote:



I am also very interested in hearing from people who have built tor
with LibreSSL...


If you want to try building a FreeBSD port using LibreSSL instead of  
OpenSSL add this to /etc/make.conf


OPENSSL_PORT=security/libressl
WITH_OPENSSL_PORT=yes


specifically I'd love it if someone worked out all the details to do
this as a static build in OpenBSD.


Not sure about static builds, what's the benefit?

I do know OpenBSD 5.6 has LibreSSL baked in and it works with Tor. Just  
install the tor package, edit /etc/tor/torrc and you're up and running.


Next time I stand up another relay or exit node on OpenBSD I think I'll  
kick it up a notch with some chroot and/or systrace sauce.


https://trac.torproject.org/projects/tor/wiki/doc/OperationalSecurity#RunTorandOtherServicesinaRestrictedEnvironment

Am also interested in hearing any tips for minimizing data retention. I  
thought about making a hardlink or symlink from /var/log to /dev/null, but  
I have a feeling there's more to it than that.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Re-installed Tor relay node as exit node with same name, different OS.

2014-11-19 Thread Seth
I recently re-installed the operating system for a VPS that was running  
Parabola GNU/Linux and acting as a Tor relay.


The new OS is OpenBSD 5.6 running tor-0.2.5.10. Instead of running as a  
relay I modified torrc so it runs a ReducedExitPolicy policy.


Initially there were several problems with Tor exit node traffic being  
blocked by the firewall which has since been resolved.


The Tor status page however still does not list this router as an exit  
node.


http://jlve2y45zacpbz6s.onion/router_detail.php?FP=e1e1059d8c41fc48b823c6f09348ea89c4d4c9d4

Any ideas why?
--
Seth
I 3 nicely trimmed email replies
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Re-installed Tor relay node as exit node with same name, different OS.

2014-11-19 Thread Seth

On Wed, 19 Nov 2014 12:50:16 -0800, Libertas liber...@mykolab.com wrote:


Did you restore the relay's secret identity key when reinstalling?


No, that's the part I flubbed.


If you backed up your Linux system, you can restore the key from there.


Linux system was buried somewhere in the cloud


If not, that's fine, you'll just have to wait a little while
for your new relay to build up consensus weight. This might even be a
good thing, as you have forward secrecy (in terms of identity) if your
Linux install was compromised.


Interesting bit about consensus weight. I like the 'forward secrecy'  
aspect of just waiting it out.



* More specifically, this is /var/lib/tor in Linux and
/usr/local/lib/tor in OpenBSD by default, IIRC.


Thanks, I'll take note of that for any future migrations.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] List of Relays' Available SSH Auth Methods

2014-11-18 Thread Seth

On Tue, 18 Nov 2014 09:40:13 -0800, Ryan Getz ry...@getzmail.com wrote:


As, Libertas said, pub key auth is generally best... or even for some,
disabling SSH altogether may be possible. If your relay is a VPS and you
have access to a (java) console or some form of IPMI/drac/iLo
management, you may not even need ssh access but these could open up
additional security issues (particularly old firmware for out of band
management).


Another option is to install ZeroTier One and configure the SSH daemon to  
listen only on the zt0 device for your private network.  
https://www.zerotier.com/

--
Seth
I 3 nicely trimmed email replies
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays