Re: [tor-relays] Politically correct?

2016-10-12 Thread Zenaan Harkness
On Fri, Oct 07, 2016 at 10:25:31PM +0200, torser...@datakanja.de wrote:
> for simple - political - reasons, i began contributing otherwise wasted
> bandwith to the tor network about half a year ago. And i am reading this
> list.

> If not, i am seriously reconsidering the futile attempt to engage into
> offering something to the net, that could lead to unveiling users
> activities opposed to what tor seems to promise.

Tor currently has its place at low-level privacy only (research other
corporations, and you are sitting in a competitive corporation, for
example), and perhaps a little darknet research, all only as long as
larger adversaries such as the USA or other Goverments are not entities
you must hide from.


For the future:

 - if you don't own it, you don't control it
 - if you don't control it, it -will- be used against you

So, for longer term, we must build our own physical internet - N2N or
Neighbour to Neighbour network.

One has to start somewhere, so your local residential street, corporate
offices, etc. - build out your own nodes, volunteer to do this for your
corporate partners and / or neighbours. Encourage others. Spread the
word.


When 'the community' properly gets going in this direction, it'll
probably be a good 10 years till we actually have widespread
alternative physical networks, upon which Tor, I2P or future
alternative virtual networks can be designed to work with, to increase
privacy beyond what is possible today.


We start now, from what we have (our current status) as of now. Might
seem silly to say this, but some folks balk at "our own phy network"
saying "that's too big, we'll never get there" etc etc. Which is simply
counterproductive and false fatalism, and arguably subversively
undermining.


Remember to enjoy the journey :)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] #torstrike

2016-08-22 Thread Zenaan Harkness
I concur with all you say below.

Exceptionally well spoken. Evidently you have some solid experience in
your corporate managerial role.

Thanks for speaking up.


On Sun, Aug 21, 2016 at 11:50:37PM -0700, Arisbe wrote:
>Okay, so I've been concerned about the safety of at-risk Tor users since 
> all this shit broke.  New employees at the
>organizational structure serving as the main accuser, an all new board 
> with interrelationships and motivation
>unknown, grenades rolled under office doors and all of the rest leaves a 
> bad taste in my mouth.  I cannot, at this
>time, recommend to a third world citizen, that (s)he trust the Tor 
> network.  I hope that changes.
>The issue is whether or not someone new in the Tor organization will, 
> accidentally or intentionally, put third world
>users at risk.  I cannot trust an all-new board.  Tor needs to be on their 
> best behavior in order for me to
>re-establish trust in the organization.
>As a retired corporate manager I've seen these problems before.  I have 
> several suggestions that I feel are must-do
>tasks for the Tor Project:
>1)  Secure an independent investigator to look into the allegations 
> against Jacob.  Either demonstrate that he is not
>an honorable employee or reinstate him.  No one should trust anonymous 
> claims that can ruin his career.  If Jacob is
>guilty, he should be prosecuted;
>2)  Board member should be open, accessible and available to employees and 
> node operators.  Their background and
>motivation for being a director of the Tor Project should be disseminated. 
>  There interrelationship with other board
>members should be known;
>3)  As one of the founders of Tor, Roger should openly discuss these and 
> all issues in a public manner (on the web
>page, webinar, magazine article, etc.);
>4)  An organizational plan should be placed in the employment manual that 
> puts significant distance between coding
>employees and directors;
>5)  Employees and directors should not operate nor have access to 
> authority servers.
>I've operated a number of exits and guards for several years now 
> (including, as far as I know, the only Tor node in
>Albania). [1]  I will leave these operational for now but I expect changes 
> in this unprofessionally operated 501c3.
>[1]
> 
>A827646DD0F8B92A9963789529CEE3141FF74761
>4061C553CA88021B8302F0814365070AAE617270
>C80DF89B21FF932DEC0D7821F679B6C79E1449C3
>9B31F1F1C1554F9FFB3455911F82E818EF7C7883
>D3E5EDDBE5159388704D6785BE51930AAFACEC6F
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] #torstrike

2016-08-21 Thread Zenaan Harkness
On Sun, Aug 21, 2016 at 11:14:59PM -0400, krishna e bera wrote:
> On 21/08/16 10:02 PM, Zenaan Harkness wrote:
> > Fact: Jacob Applebaum's directory authority was a target of NSA's
> > XKEYSCORE:
> > https://contraspin.co.nz/the-weaponising-of-social-part-3-the-resurrection-of-ioerror/
> 
> Of course, perhaps they all are.
> 
> > Fact: Jacob Applebaum got kicked from Tor Inc, prior to a proper
> > investigation.
> 
> Any organization would do the same with similar allegations.  If he was
> exonerated, he could rejoin afterwards.

Put it to relevant/ external/ unbiased authorities, not internally
compromised "investigation group with chips on their shoulders".


> > Fact: The investigation done by Tor Inc, was run by the primary accusers
> > of Jacob Applebaum.
> 
> Evidence?
> 
> 
> > In the USA's war against Bradley Manning, Julian Assange, Wikileaks and
> > Edward Snowden, Jacob Applebaum was a very high target, and caused the
> > three letter agencies a lot of problems.
> >
> > So yes, operation of the network you use for -genuine- privacy needs, is
> > very much dependent on those running the organisation.
> > 
> > 
> > Fact: The ENTIRE board of Tor Inc got replaced after Jacob was given the
> > boot!
> > 
> > My conclusion: This was a coup, blunt and bloody, take no prisoners,
> > respect no righteousness.
> 
> Overdramatic.  Where's the blood?

Jacob Applebaum's scalp.


> Who was behind the coup, and what hard evidence do you have?  Are you
> looking for #torstrike to prompt leaks of such info?

I don't know that torstrike could be useful ultimately. Forking
possibly.


> Makes more sense for the Board to be distinct from the day to day
> operations people anyway.

The only thing that makes sense is that the core people are trustworthy
- there are now major problems with core Tor Inc people.


> > My conclusion: The operation of the Tor directory authorities can no
> > longer be trusted.
> 
> Perhaps it never could be.  Are you ready to run one?

Is that a genuine offer and a genuine possibility?


> > My conclusion: The deployment of TBB by Tor Inc can no longer be
> > trusted.
> 
> Fork it.

That is happening.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] #torstrike

2016-08-21 Thread Zenaan Harkness
On Sun, Aug 21, 2016 at 07:53:26PM -0600, Marcel Krzystek wrote:
> ​What are the thoughts of relay operators on this?
> https://ghostbin.com/paste/kmnzz
> 
> I can be persuaded otherwise, and perhaps i'm being naive, but i believe
> that operation of the network should remain independent from the politics
> within the organization.

Hi Marcel,

Fact: Jacob Applebaum's directory authority was a target of NSA's
XKEYSCORE:
https://contraspin.co.nz/the-weaponising-of-social-part-3-the-resurrection-of-ioerror/

Fact: Jacob Applebaum got kicked from Tor Inc, prior to a proper
investigation.

Fact: The investigation done by Tor Inc, was run by the primary accusers
of Jacob Applebaum.


In the USA's war against Bradley Manning, Julian Assange, Wikileaks and
Edward Snowden, Jacob Applebaum was a very high target, and caused the
three letter agencies a lot of problems.


So yes, operation of the network you use for -genuine- privacy needs, is
very much dependent on those running the organisation.


Fact: The ENTIRE board of Tor Inc got replaced after Jacob was given the
boot!



My conclusion: This was a coup, blunt and bloody, take no prisoners,
respect no righteousness.

My conclusion: The operation of the Tor directory authorities can no
longer be trusted.

My conclusion: The deployment of TBB by Tor Inc can no longer be
trusted.


Draw your own conclusions.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] suspicious "Relay127001" relays

2016-07-05 Thread Zenaan Harkness
On Tue, Jul 05, 2016 at 05:10:49PM +0200, Niklas K. wrote:
> It's up to directory authority operators to deal with 
> suspicious/rogue/misconfigured relays by marking them as 
> invalid/rejected/badexit.
> 
> Relay operators are not supposed to decide what other relays they may be put 
> in a circuit with (apart from notifying the network which nodes belong to the 
> same operator using MyFamily as you mention).
> 
> FYI, *clients* do have the ability to exclude nodes using the ExcludeNodes 
> directive.

In good news, 91 new high speed exits means Tor network should be
truly blazing for a while :)

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] How to use our own TOR relay as entry node for local network hosts

2015-05-23 Thread Zenaan Harkness
On 5/20/15, s7r  wrote:
> On 5/20/2015 12:07 PM, Tor User wrote:
>> If I'm wrong about this, that's great - I'd love to see some
>> documentation to explain it better if you have any links handy.
>> But if I'm right, how can I configure our TBB clients to actually
>> MAKE them use our TOR proxy as their entry node?
>
> I do not see any benefits in using a Guard on your local network, I
> just don't see the point of it. You can do the following:
>
> 1. The centralized Tor server, as explained above, means you have to
> run only one Tor instance for all the computers in your network. This
> means you don't need Tor on all of the other computers in your
> network, and the entry point (Guard) needs to be defined on the Tor

I think the OP wants to treat their "centralized Tor server" as though
it is a guard, which is why the term "centralized Tor server" perhaps
clarifies the OP's thinking.

As you highlight, with a "centralized Tor server", a separate (local
LAN) "entry guard server" doesn't make sense.

> centralized server (in your case relay) only, and it will affect all
> the clients in the network using it. You will not be able to see
> circuit info (such as path) on the computers using this centralized
> Tor server because they won't have access to the Tor control port,
> which is totally normal.

The thought still lingers though - if one were to run TBB or a Tor
node on each computer in a LAN, and treat the "centralized Tor server"
as an "entry guard" by some manual configuration:

a) This should be doable, workable, and be just fine/ok or in fact
even better than having all local/LAN computers access Tor/internet
through the SOCKS proxy of the "centralized Tor server",

b) It should be possible to set up such a configuration manually -
force the "centralized Tor server" to be "my" (random LAN PC with tor
instance eg TBB) entry guard to the Tor network, even though it does
NOT have the guard relay, assuming I am the LAN admin, or that I trust
the LAN admin,

c) It should be better for security of each LAN PC - since they are
sort of participating natively in the Tor network, since they begin
their own hop in/at their local PC, and so don't have to rely nearly
so much on the LAN admin and the SOCKS proxy running on that
"centralized Tor server" - is getting from my PC to a SOCKS proxy on
some other PC even secure at all, or is some other security layer now
needed to protect/hide agains LAN eavesdroppers?,

d) Because each LAN PC has its own tor node (eg TBB with manual
config), they can see their full circuits in the wider Tor network -
with all circuits always beginning at the (manually configured)
"centralized Tor server configured as my permanent Tor network entry
guard node",

e) TBB "just works" from a "all the various Tor project customizations
for Firefox are baked in, it's much harder for me to f*** it up
somehow" - and I think this is one of the most critically important
benefits that should not be so readily discarded with:

> On the computers in your network you can just use Firefox with some
> privacy plugins and route all traffic (including DNS) through the
> polipo proxy, running on the Tor centralized server / relay.

since "just install some privacy plugins and route DNS through
SOCKS/polipo" can so easily fail big time!

If there's any chance of adversarial eavesdropping or browser attacks,
surely you want to start from a "just works as far as most Tor devs
are aware within the known limits etc" position, and add the minimal
browser config/ manual Tor config on top of that?

What happens when a TBB security fix comes out - does one assume that
normal firefox does not need that? Does one assume that a normal
firefox upgrade, in the face of the full set of manual "TBB like"
customizations (assuming you even implemented them all, and
implemented them all correctly) and that you do -not- need to do a
full firefox reinstall?

There are SO many unanswered security questions for an end user (or
LAN admin trying to be responsible on behalf of their LAN PC users)
that I feel it is dangerous to suggest something other than "use TBB,
with absolute minimal manual config on top, e.g. disable Javascript
:)"!

...
> Want a centralized Tor server and a Guard relay at the same time? Just
> run the relay someplace else, and use StrictNodes and EntryNode on
> that server. I doubt this is what you want since you installed Tor
> Browser on the computers in the network as well.

TBB, albeit with some (hopefully minimal) manual customizations, ought
be "the recommended way" by my reasoning... the only question is how
to achieve a sane setup, optimizing for a particular scenario - in
this case, the OP is optimizing for a LAN environment in which it
appears that the OP may be the admin, and therefore that the OP has a
certain trust in him/her self :)

It might, just possibly, also be the case that other individuals who
use that LAN environment, place some level of trust in their LAN admin
too.

In the face of e

Re: [tor-relays] Subpoena received

2015-04-20 Thread Zenaan Harkness
On 4/21/15, Dave Warren  wrote:
> On 2015-04-20 10:31, Speak Freely wrote:
>> A foreign sovereign can command anything to anyone... without a
>> reasonable expectation that anyone will follow it.
>>
>> Even in Canada, I am not obliged to respond to American subpoenas unless
>> and until my government commands me to. Only your sovereign can command
>> you to do anything. A foreign sovereign has zero right to anything
>> outside of it's own purview.
>
> Keep in mind that if you do respond at all, the US court may claim to
> have waived jurisdictional arguments and consented to the jurisdiction,
> in which case a court order can be enforced cross-jurisdictionally in
> certain cases. Spamhaus learned the hard way when they hired a US lawyer
> to represent them and that lawyer responded incorrectly and enabled the
> lawsuit to become binding upon themselves despite the lack of physical
> presence within the US.
>
> While they ultimately prevailed on their appeal to the greatest degree
> still available, they were unable to vacate the default judgement
> entirely (only the amount), so while they ended up paying a nominal
> amount and winning for more useful purposes, they technically lost the
> case. Had they failed to appeal or lost the appeal, the resulting order
> would have been binding and enforceable in UK courts because Spamhaus's
> actions consented to the plaintiff's choice of jurisdiction.

This is very interesting. In Australia, consent to give evidence and
be cross examined, can later be withdrawn. The principle AIUI (IANAL)
is that where consent can be given, and is given, such freedom to give
is also the freedom to take away and therefore consent can be removed
at any time.

To be safe though, I would recommend that any party giving conditional
consent to appear, in any jurisidiction including their own
jurisdictions ordinarily binding upon themselves, to enter a formal
Conditional Appearance, specifically limiting the extent of the
jurisdiction consented to, and reserving the right to withdraw consent
upon written notice to that court (or any high court if the case goes
to any such court on appeal etc).

I am quite surprised that Spamhaus's lawyer(s) failed to do this,
failed to give conditional consent for Spamhaus to appear in the
jurisdiction, failed to formalise Spamhaus' consent to appear, and
failed to advise Spamhaus that once given, their conditional (or full,
for a time) consent to appear could be withdrawn and that it ought to
have been withdrawn, and in fact that the lawyers should have
immediately withdrawn Spamhaus' consent to appear when that was
needed. I do have a fair idea why Spamhaus' American lawyers
'overlooked' all these things.


> On the criminal side, you can also be extradited in certain cases. Kim
> Dotcom is still working through the complexities of this particular
> situation.
>
> So I would highly recommend engaging a lawyer to verify that your
> actions don't waive any arguments or otherwise consent to anything that
> can be enforced across borders.

The point is, the lawyers that Spamhaus engaged may well have fucked
them over, intentionally or otherwise.

I highly recommend engaging common sense, verify everything you
otherwise assume, and assume your lawyers are not acting in your own
interest and need to be micro managed. E.g., insist on the address for
service being you and you personally, then send copies of all
documents you choose for your lawyer to view, to your lawyer, keeping
the originals. Likwise, e.g. having your lawyer send all documents
they produce on your behalf, to you, and you keeping a copy before you
sending said document(s) to the relevant parties (which may be the
court itself).

Oh, and insist on a detailed schedule of fees before engaging them.

Keep a Strong, Short, Tight leash on your lawyer!!

> (And no, odds of any of this impacting a simple Tor operator are not
> very high unless you're otherwise a high profile or high value target)

Good luck people :)
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 'relay early' attack detection at the infrastructure level

2014-08-01 Thread Zenaan Harkness
On 8/2/14, Roger Dingledine  wrote:
> On Sat, Aug 02, 2014 at 03:38:51PM +1000, Zenaan Harkness wrote:
>> >> the RELAY_EARLY cell has common legitimate uses.
>> >> How can we distinguish an attack from those?
>> >
>> > Correctly-behaving Tor relays never send RELAY_CELL cells backwards
>> > (towards the client) on the circuit.
>
> Gah. I should have written RELAY_EARLY above. Sorry for the confusion.
>
>> > So if you see one, it's somebody not following the protocol.
>>
>> Might be a stupid question sorry, but why not just block such
>> relay-early packets coming in the wrong direction?
>
> New relays do block them. Actually they close the circuit and warn,
> since once somebody has violated the protocol like this, it's unwise to
> let them continue interacting with you.
>
> Or is that what you meant?

ACK. Thanks.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 'relay early' attack detection at the infrastructure level

2014-08-01 Thread Zenaan Harkness
On 8/2/14, Roger Dingledine  wrote:
> On Fri, Aug 01, 2014 at 10:08:41PM -0400, krishna e bera wrote:
>> According to
>>
>> https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack
>>
>> the RELAY_EARLY cell has common legitimate uses.
>> How can we distinguish an attack from those?
>
> Correctly-behaving Tor relays never send RELAY_CELL cells backwards
> (towards the client) on the circuit.
>
> So if you see one, it's somebody not following the protocol.

Might be a stupid question sorry, but why not just block such
relay-early packets coming in the wrong direction?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Oubound Ports

2014-07-10 Thread Zenaan Harkness
On 7/11/14, Greg Moss  wrote:
> Thanks for the help. I have my ORport and DIRport defined in torrc and
> forwarded through the firewall up to the Tor Relay. I was just wondering in
> regards to outbound traffic from the server itself.

What type of tor server did you decide to run (relay, exit, bridge)?

I feel you are rushing things a little.

Do some more reading.

Personally I suggest an exit relay, but without informing
yourself first, how can you make an informed choice? An
exit may be worse, or better, given your needs/ intentions
of what you want to achieve here.


> In the event it gets compromised I really hate to
> open all ports outbound let alone possible DNS
> leaks and what not. Appoligize if this doesn't make
> since I just fired this thing up yesterday and want
> to make sure it is secure.

You want "secure". OK, so does everyone. So what's
your threat model?

If you are worried about a compromised tor server, and
consequent information leaks, perhaps set up whonix?

If you are just impatient, just run TBB.

If security is genuinely important, and you rush things,
you are MUCH more likely to come unstuck.

If you are in a time sensitive situation, and (picking a
random offtopic thought here :) wanting to do some leaks,
the best thing might be to find someone you trust (who is
reasonably technically literate), and pass the material to
them, ask them to post it to various drop boxes and provide
it (anonymously and/ or without any phone calls etc made) to
their own trusted friends etc, to get the info out there.

Do this with a few different people, if you have trustworthy
friends/ contacts.

Your situation sounds like you are impatient.

Go do some reading, and good luck,
Zenaan



> -Original Message-
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
> Of Zenaan Harkness
> Sent: Thursday, July 10, 2014 6:47 PM
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Oubound Ports
>
> On 7/11/14, Greg Moss  wrote:
>> Newbie to Tor but have a Debian server up and running as a relay.  Do
>> I need to filter outbound traffic from the tor server on my firewall.
>> If yes what ports would I need to open.  I am also have a good look a
>> Tails any suggestions would be helpful.
>
> Sounds like you need your config file to read. Try:
> /etc/tor/torrc
>
> That will likely answer your question (hint, the answer is at least one,
> inbound and outbound).
>
> Do read the material on torproject.org - there's lots of it, and much of it
> useful to you if you are running a relay, some of it directly so.
>
> You might also check out whonix.org
>
> Enjoy teh awesome tehclonogy :)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Oubound Ports

2014-07-10 Thread Zenaan Harkness
On 7/11/14, Greg Moss  wrote:
> Newbie to Tor but have a Debian server up and running as a relay.  Do I
> need
> to filter outbound traffic from the tor server on my firewall. If yes what
> ports would I need to open.  I am also have a good look a Tails any
> suggestions would be helpful.

Sounds like you need your config file to read. Try:
/etc/tor/torrc

That will likely answer your question (hint, the answer is
at least one, inbound and outbound).

Do read the material on torproject.org - there's lots of it,
and much of it useful to you if you are running a relay,
some of it directly so.

You might also check out whonix.org

Enjoy teh awesome tehclonogy :)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relays or exits: which is needed?

2014-07-05 Thread Zenaan Harkness
On 7/6/14, michaelb...@riseup.net  wrote:
> I'm (hopefully) going to be running a few high-speed Tor servers sometime
> in the near future. Which type of Tor server (exits vs. relays) is needed
> the most right now?

I thought there used to be a FAQ on this, suggesting exit relays.

I do believe exit relays are the most in demand, and most needed to
make Tor enjoyable to use for the broadest number of people.

If there is an excess of exits (won't happen any time soon), they can
just be used as normal relays anyway, so it is ultimately better for
the network to have more exits, at least at this point in time,
AFAIUI.

Right now all I can find doco wise is:

https://www.torproject.org/docs/tor-relay-debian
"9. If you run an exit relay (great!), don't miss out on our Exit
Guidelines, including setting your reverse DNS hostname to make it
obvious that you're a Tor exit relay, and serving the Tor exit notice
page on your DirPort."

Please do read in detail:
https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines

as well as everything else of any relevance to you at torproject.org

Welcome, and awesome to see solid support for the free speech
networks, in this case tor :)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Ops request: Deploy OpenVPN terminators

2014-06-16 Thread Zenaan Harkness
On 6/16/14, grarpamp  wrote:
> On Thu, May 15, 2014 at 9:36 AM, Jeroen Massar  wrote:

>> If an operator does not want you on their site, do not circumvent it.
>> You are thus stating: I want to circumvent a site's decision to block me.
>
> No, you are still not understanding a (not so delicate, yet very
> important) distinction...
>
> - IP blocking is NOT blocking a particular single user context (ie:
> 'you', 'me', joe, jane, anonuser1543), it is blocking whoever happens
> to be using that IP [1].
>
> In my opinion, that is wrong because it takes out innocent users
> and thus I'm happy to suggest any number of ways to push back against
> it until this effectively 'anti-innocent' model changes.

This is foundational I say - some of us are willing to give up a
little (or a lot) of convenience, for the long term benefits/ freedoms
which we anticipate and strive for.

Today we have an abundance of libre/free software. When Richard
Stallman, and later others, sacrificed their time and their statutory
proprietary-ownership possibilities, for the long term vision, they
did not have the abundance that has since been created - their
sacrifice was MUCH greater than ours today.

Yet the spirit of sacrifice/inconvenience for the longer term greater
good, lives strongly in some of us.

I wholeheartedly support those who live this principle.

Rock on!
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Usefulness of very limited exit policy nodes?

2014-05-31 Thread Zenaan Harkness
>> With the bandwidth level you (Matt) are suggesting
>
> I haven't suggested any bandwidth levels. You might be referring to
> Phil I suspect. :)

Sorry about mixing up the thread participants. Should have said "OP".
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Usefulness of very limited exit policy nodes?

2014-05-30 Thread Zenaan Harkness
On 5/27/14, Matt Puckey  wrote:
> On Tue, 27 May 2014 16:04:00 +1000
> Phil  wrote:
>> Opinions please - is it worthwhile running an exit node on a home DSL
>> connection with limited bandwidth and exit policies?
>
> It all depends on whether or not you want to 'put up' with the potential
> 'hassle', which could be slightly different compared to as if it was in
> a datacenter somewhere. If your ISP is informed that you're an exit
> node, then great. Just remember, you will be mixing your own personal
> traffic with Tor traffic, that is the main issue I think you might face.
>
> I honestly think that you would be better off being a bridge,
> especially if you have a change of public IP address every now and
> then, like most home lines.

I read a lot of the torproject.org website before running our exit
node, and I found the issues laid out to be reasonable from my
perspective - when we believe in something like free speech, or
freedom of travel, some of us (like myself) feel a conscientious duty
to take a stand to promote that which we believe in, as I did.

The website said full exits are needed the most, from the tor network
perspective, so that's what I decided to set up.

With the bandwidth level you (Matt) are suggesting, I think a full
exit would even be fine from that point of view. I ended up cross
grading to a business level plan with our isp iiNet (Australia), in
order to get a static ip, since the effect of ip changes was too
severe on the exit traffic (in my personal opinion) since it usually
meant an effective network drop out once a day. Then Telstra (the
upstream national/backbone isp) started changing the ip address much
more frequently - probably because that had a positive effect on their
overall network availability, with minimal customer complaints. So I
cross graded and got a static IP.

There was a brief day or so when Telstra's ip changing came back into
play, and an incorrect ip was being alternately assigned to the
correct ip address. Once that was sorted, the connection
(gracemissionstor fwiw) has been pretty rock solid, except for the
occasional rural power outage we experience.

Oh, when I cross-graded, I did speak at some length with the iiNet
tech guy about our intention to run our "free speech node" being a TOR
exit node, how that helps wikileaks and various minorities around the
world to experience a level of freedom of speech which is not
otherwise possible.

They were cool with that.

So, primarily I recommend: Speaking with tech support of your isp, and
ask them some question about running a tor "free speech" exit node and
are there are any issues you need to keep in mind when you set that up
on their network.

In this way, you begin to build a relationship of open communication
and readiness to respond to any issues that may (or may not) arise.

Make sure you are diligent in the guides/recommendations on the
torproject.org website, such as having a valid contact email address
etc etc.

Good luck :)
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor relay recommended upgrade procedure?

2014-03-29 Thread Zenaan Harkness
>> > HOWEVER: killing tor in 30 seconds seems to me a little harsh on all
>> > those anonymous connections that were previously going through my exit
>> > relay. Can those clients (if they need) pick up their connections
>> > after about 3 minutes? It appeared that all connections were
>> > completely gone when I finally got tor restarted
>
> As soon as your relay goes away the circuits will be cut, and the streams
> that clients had on those circuits will be cut too. Whether those clients
> will automatically reconnect those streams on new circuits depends on
> the application.

Is there some longer term sense in having a SOCKS protocol enhancement
to have the SOCKS/TOR server notify applications connecting through
it, that it intends to shutdown the relay/socks facility at X minutes
into the future?

In the tor relays itself, this would of course need some TOR control
channel or protocol where the 'relay reboot in X minutes' gets
propagated back to the end users of the channels through this relay/
exit node.

Although 'reconnect' is robust enough, prima facie, a little more
niceness for the users would be a good thing, I'd think.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor relay recommended upgrade procedure?

2014-03-29 Thread Zenaan Harkness
On 3/19/14, Zenaan Harkness  wrote:
> On 3/19/14, Moritz Bartl  wrote:
>> You should add the torproject repository, and then just let it upgrade
>> whenever there is a new version. There's no need to reboot or wait,
>> having the upgrade process restart the service is fine. Your relay will
>> not lose its flags during short downtimes like that.
>
> Thank you, I did that.
>
> The Debian install script evidently gives tor 30 seconds to
> disconnect, since it did stop tor after 30 seconds.
>
> Then it went through the normal upgrade process, I kept my existing
> config file and voi la - tor was no longer running! This bit does not
> seem quite optimal - surely tor ought to have been auto restarted.
>
> Anyway a quick service tor restart started it again and yes, flags intact.
>
> HOWEVER: killing tor in 30 seconds seems to me a little harsh on all
> those anonymous connections that were previously going through my exit
> relay. Can those clients (if they need) pick up their connections
> after about 3 minutes? It appeared that all connections were
> completely gone when I finally got tor restarted, which makes sense
> but:
>
> Is there are a gentler way such as "don't take new connections, notify
> clients we are going down for an upgrade" but allow continuation for
> say up to 10 or 30 minutes?

There is of course MaxAdvertisedBandwidth -
so ought this option be set to say zero for say 10 or 20 minutes,
before stopping/upgrading the server (either manually by admin, me, or
assuming admin config allows this)?

> Would that be better or could that be worse eg for privacy,
> correlation attacks etc?

Should I forward this question (or rather, create a thread) "optimal
tor relay upgrade protocol" on tor-talk?

TIA
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] log: Error binding network socket to 203.217.31.172: Cannot assign requested address

2014-03-27 Thread Zenaan Harkness
>From here:
Mar 27 16:50:35.000 [warn] Error binding network socket to
203.217.31.172: Cannot assign requested address

to here:
Mar 27 23:56:46.000 [warn] Error binding network socket to
203.217.31.172: Cannot assign requested address

I got 828 of those messages.

Why no socket number, or more information in the logs to debug this?
Although it only happened in that time frame above - not happening any
more.

TIA
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor relay recommended upgrade procedure?

2014-03-19 Thread Zenaan Harkness
On 3/19/14, Zenaan Harkness  wrote:
> On 3/19/14, Moritz Bartl  wrote:
>> You should add the torproject repository, and then just let it upgrade
>> whenever there is a new version. There's no need to reboot or wait,
>> having the upgrade process restart the service is fine. Your relay will
>> not lose its flags during short downtimes like that.

> Anyway a quick service tor restart started it again and yes, flags intact.

Correction: HSDIR flag disappeared - was there straight away, but has
since disappeared. I know it comes back in a day. Just wanted to
clarify for the record.

Thanks
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor relay recommended upgrade procedure?

2014-03-18 Thread Zenaan Harkness
On 3/19/14, Moritz Bartl  wrote:
> You should add the torproject repository, and then just let it upgrade
> whenever there is a new version. There's no need to reboot or wait,
> having the upgrade process restart the service is fine. Your relay will
> not lose its flags during short downtimes like that.

Thank you, I did that.

The Debian install script evidently gives tor 30 seconds to
disconnect, since it did stop tor after 30 seconds.

Then it went through the normal upgrade process, I kept my existing
config file and voi la - tor was no longer running! This bit does not
seem quite optimal - surely tor ought to have been auto restarted.

Anyway a quick service tor restart started it again and yes, flags intact.

HOWEVER: killing tor in 30 seconds seems to me a little harsh on all
those anonymous connections that were previously going through my exit
relay. Can those clients (if they need) pick up their connections
after about 3 minutes? It appeared that all connections were
completely gone when I finally got tor restarted, which makes sense
but:

Is there are a gentler way such as "don't take new connections, notify
clients we are going down for an upgrade" but allow continuation for
say up to 10 or 30 minutes?

Would that be better or could that be worse eg for privacy,
correlation attacks etc?

Thanks again,
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] tor relay recommended upgrade procedure?

2014-03-18 Thread Zenaan Harkness
Currently running Debian's stable/wheezy version of tor which 0.2.3.25
on my first relay, gracemissionstor.

I discovered the torproject deb repository here (of course):
https://www.torproject.org/docs/debian

The following google search:
debian upgrade site:torproject.org
didn't give much.

But the following search:
"tor relay" upgrade site:torproject.org
gave:
https://blog.torproject.org/blog/lifecycle-of-a-new-relay

and the FAQ which includes:
https://www.torproject.org/docs/faq.html.en#UpgradeOrMove
which relates how to keep the same relay id when upgrading.

Is there a recommended procedure for upgrading tor relay?

Should I upgrade asap now that I've realised torproject has more
recent (0.2.4) stable version of tor?

Or should I just wait until I have to reboot the server (don't know
when that could be) or until a security alert comes around from tor
developers?

Perhaps I should just rely on the debian package to do the right thing
regardless (which for most services is to restart the service, but I
guess could be 'do nothing until next reboot' if the packager decided
that was wise).

Seeking some guidance on this issue thanks,
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] log: DNS servers not contactable (but only for a few seconds)

2014-03-16 Thread Zenaan Harkness
Notwithstanding the short DNS outage as shown in the logs, I added a
couple of extra Australian DNS servers to resolv.conf since previously
I only had the primary and secondary DNS servers as assigned by the
ISP.

Just wondering if there's anything else I should do to increase
robustness on this front.

TIA
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] tip: when running relay in domestic situation, have server be DHCP dependency

2014-03-16 Thread Zenaan Harkness
Otherwise, others in the household might turn off everything to save
power, and have no idea that this effects their local Free Speech
Server (TM) (C) (R).

If stopping the server from connecting to the modem, or powering down
the server, stops all internet access, local fauna quickly notice said
loss of internet access and appeal with relative urgency to the local
Free Speech Server Guru.

Disconnection problems rapidly reduce in frequency.

Sincere apologies in hindsight to all anonymous clients to
gracemissionstor, which went down again this evening due to a
depressingly monotonously similar reason to the last few times.
But Good News: a report came, via txt message, rapidly followed by
personal phone support personnel (said internet users), whom, and who
would have thought it, said "urgent: our internet connection is down"
Wonder of wonders, awareness can be raised.  :)

Oh happy days! I get multiple personal contacts in almost real time,
from on-site specialists no less (and with direct personal knowledge
of the problem at hand), when our wholesome Free Speech Server
Services stop working!

You'd find it hard to find such service even if paid for :)

TECH Notes:

Put ADSL modem into bridge mode.
Run pppoe (or as appropriate) client on server.
Configure NAT, dhcpd and dnsd on server.
Test all these services work after a reboot.

For bonus points, install upnpd server.

Prophet (for the Guru).
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Are zealous connections to directory port common?

2014-03-13 Thread Zenaan Harkness
On 3/14/14, Tora Tora Tora  wrote:
> On 03/13/2014 09:37 PM, Zenaan Harkness wrote:

>> I think it is unusual.
>>
>> Are you just checking the tor log to see this?
>
> OK, so I am being DOSed then.

Sorry I can't say, it just doesn't sound right. I've only run a relay
for a few weeks, and down the last week.

Good luck
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Are zealous connections to directory port common?

2014-03-13 Thread Zenaan Harkness
> On 03/10/2014 01:14 PM, Tora Tora Tora wrote:
>> I just recently allowed the directory ports of my relay to be listed and
>> noticed that some IPs are a bit overzealous in connecting to the
>> directory port. As in 108 connections within a minute zealous.
>>
>> Is this unusual?

I think it is unusual.

Are you just checking the tor log to see this?


> Anyone knows the answer? It happened again with another IP establishing
> 400+ connections to directory port within a minute. Me thinks it was not
> a good idea to display the directory port.

Maybe try installing some ip blacklist or dynamic firewalling?

rblcheck is a debian package which may be relevant.

Maybe time to do some more research...

Good luck
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Gigabit is powerful

2014-03-06 Thread Zenaan Harkness
On 3/6/14, Felix  wrote:
> Strong relays are a powerful contribution. As long as they are robust
> to resist misuse by attackers.
>
> Last night I received around 250.000 circuits per 5 minutes
> over one hour on a 100Mbit relay. In case the relay would forward this
> it could harm someone who is not prepared. And I would be a part of the
> sender chain.

Sorry, what does it mean "in case the relay would forward this"?

Thanks
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor-relays Digest, Vol 38, Issue 6

2014-03-05 Thread Zenaan Harkness
On 3/5/14, herojide...@live.com  wrote:
> PLS how does relay work and how can I set up my system to work with relay

You need to read the docs.

Go to torproject.org and start there.

If you don't yet use GNU/Linux you might try Fedora or Debian but
probably _don't_ change OS _and_ start running a relay at the same
time. Although it's not 'hard', there is a learning curve.

Good luck,
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] is comcast throttling relays?

2014-03-01 Thread Zenaan Harkness
On 3/1/14, Steve Rich  wrote:
> The question I have now however is, should I set my RelayBandwidth limit to
> 250k?
> Currently the advertised bandwidth is 1MB/s, which doesn't see right.

As with bittorrent, it appears somewhat important to set your
bandwidth, in particular burst bandwidth (the higher of the two), to
some figure below your maximum physical (achieved not ISP advertised)
bandwidth. I think.

The reason is that if outgoing gets saturated, this can cause problems
for various control packets, and for me was causing up to 15s
heartbeat timeouts - I still haven't solved the "unresponsive"
ARM_NOTICE messages though - here's an example:
20:30:18 [ARM_NOTICE] Relay unresponsive (last heartbeat: Sat Mar  1
20:30:06 2014)

Good luck
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] procedure for TBB to use localhost relay

2014-02-28 Thread Zenaan Harkness
On 2/28/14, Zenaan Harkness  wrote:
> I am running a tor relay - gracemissionstor - and have begun providing
> the relay name to friends who would like to use TBB.
>
> What I have not been able to google yet properly, is what
> startup/connection procedure is "best" for those using TBB, _and_ are
> on the local network - many people come and go here and there, and
> connect to the Internet from the LAN/internal network.

Solved this one, at least for the moment: accept defaults for first
two startup steps:
Proxy not required
Ports not filtered

then for "relay bridge" choose IP:port of internal relay, eg:
192.168.5.5:9001

SSH (with port-forwarding and no command only if desired) could be
used to encrypt a SOCKS connection - but I don't really know how this
would work. Anyway, above seems to work for
 internal host -> LAN-internal TOR relay

configuration.

Thanks
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] procedure for TBB to use localhost relay

2014-02-28 Thread Zenaan Harkness
I am running a tor relay - gracemissionstor - and have begun providing
the relay name to friends who would like to use TBB.

What I have not been able to google yet properly, is what
startup/connection procedure is "best" for those using TBB, _and_ are
on the local network - many people come and go here and there, and
connect to the Internet from the LAN/internal network.

Should those connecting in this way, simply select the default
connection options, and add "gracemissionstor" into the final "I need
to use a bridge relay" screen, or is there a preferred way to connect
- I am running the TOR SOCKS proxy for example.

I would like to be able to explain to people how to use TBB and
connect to the local TOR relay when they are connected to the LAN -
either via SOCKS or otherwise - but of course, it does not make sense
to have TBB connect through TOR relay SOCKS (on the local network TOR
relay), just to thereafter be tunnelled through the TOR network, just
to thereafter establish _another_ connection back to the
"gracemissionstor" relay, thereby having all Internet access
travelling multiple times through the TOR network unnecessarily.

Does this make sense?

There ideally ought be a TORButton config option, or similar, to
"connect using local TOR relay SOCKS port" and an easy way to let the
TBB know (perhaps on each startup default to safety option) that (eg
on next boot) we are no longer on a trusted local network.

E.g. when TBB starts up (at least first time, and there SHOULD be
option to have TBB ask _every_ time), and the user chooses "use SOCKS
proxy to connect to Internet", then when TBB connects to the SOCKS
proxy, the TOR relay which is that SOCKS proxy ought notify the TBB
that it is in fact connected to the desired (if the TOR relay name
matches of course) TOR relay. Of course, it would _also_ make sense
for TBB to SSL encrypt its connection to the local tor relay SOCKS
port.

This might all be wishful thinking and pie in the sky, but please
forgive my enquiry if so - I don't yet have a full understanding of
these things.

TIA
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] (no subject)

2014-02-24 Thread Zenaan Harkness
On 2/25/14, Roger Dingledine  wrote:
> On Tue, Feb 25, 2014 at 02:27:22PM +1100, Zenaan Harkness wrote:
>>  tor
>> should never stop running (or crash) with just a config file reload!
>
> Alas, I disagree. The alternative is that it *doesn't* stop running,
> yet you think it's using the new torrc file when it isn't. That would
> be a worse kind of surprise.
>
> Unless you have a third alternative that is better? I agree that the
> current state is not great.
>
> That said, we *do* have a partial answer, in the init script itself -- it
> runs Tor with --verify-config to make sure that the config file itself is
> parseable. So the remaining trouble is when the config file is parseable,
> but the requested changes are incompatible with Tor's current state.

Aha. Thank you.

What would be preferable from my personal POV is that an attempt to
load the config file would fail with an error output to the console.
In debian, there are six standard options for service management:

 status
 start
 stop
 reload
 restart
 force-reload

reload ought not cause the daemon to stop. Sometimes daemons have
restart and force-reload be the same thing.

force-reload is where the daemon might be restarted if there is a
config file change which cannot be effected otherwise.

At least, that's my understanding, although I'm not an expert sorry.


>> DisableDebuggerAttachment 0
>>
>> This is the only change, the one which subsequent to adding that
>> option, and running service tor reload, tor apparently stopped
>> running, as above.
>
> Yes. Please read your Tor logs where it explains why.
>
> https://www.torproject.org/docs/faq#Logs
>
>> So the only change that I am aware of that could have caused the HSDir
>> flag (as shown in arm) to go away, was either that option
>> (DisableDebuggerAttachment 0), or simply the fact that the relay
>> crashed (or somehow otherwise stopped running).
>
> It's the latter -- the HSDir flag is a function of the stability of your
> relay. See
> https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt#l1867

Thank you for the pointers and clarity. Very much appreciated.
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] (no subject)

2014-02-24 Thread Zenaan Harkness
On 2/25/14, Roger Dingledine  wrote:
> On Tue, Feb 25, 2014 at 10:15:11AM +1100, Zenaan Harkness wrote:
>> I'm on Debian and did a service tor reload (not restart) and tor
>> crashed! I didn't realise immediately, took may be a minute to realise
>> and restart. Anyway apologies to any connections that were going
>> through this relay.
>>
>> Should I report a bug to Debian?
>
> First check your logs -- it's likely that it's not a crash, but rather
> Tor read the new torrc file and either couldn't parse it or refused to
> switch to the new parameters.

I ran service tor status, and it was definitely dead. What twigged me
was rerunning arm and arm began with running some wizard for "new
site" configuration, so I knew something had gone wrong, checked the
service and sure enough it was "not running".

service tor start and all was back and running within a minute or
less, and arm showed me as much.

So definitely tor stopped running - in a way that was deterministic (I
did run the service tor reload command) but totally unexpected - tor
should never stop running (or crash) with just a config file reload!

>> Also, this morning, my relay is back up, but no longer with HSDir
>> flag. Is this due to setting that option in the torrc file? And if so,
>> I guess it is recommended to disable that option?
>
> To disable which option? You should leave HidServDirectoryV2 alone in
> general, and let the Tor directory authorities decide whether you're
> stable enough to be used.

DisableDebuggerAttachment 0

This is the only change, the one which subsequent to adding that
option, and running service tor reload, tor apparently stopped
running, as above.

So the only change that I am aware of that could have caused the HSDir
flag (as shown in arm) to go away, was either that option
(DisableDebuggerAttachment 0), or simply the fact that the relay
crashed (or somehow otherwise stopped running).

I am very new to running a relay and still getting up to speed - I
imagine I will be for a while yet, so thanks everyone for your
patience :)

Regards
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] (no subject)

2014-02-24 Thread Zenaan Harkness
On 2/24/14, Jeroen Massar  wrote:
> On 2014-02-24 09:32 , Zenaan Harkness wrote:
>> I saw a hint of some interesting output by arm:
>> flags: Exit, HSDir, Running, V2Dir, ValidleDebuggerAttachment 0' to
>> your torrc and restarting tor. For more information see...
>>
>> This bit "leDebuggerAttachment 0' to your torrc and restarting tor.
>> For more information see..." disappeared pretty quick.
>
> arm needs a few more details from Tor than it can easily get,
> effectively it wants to ptrace the Tor process to collect these details.
> Hence you'll need to set in torrc:
> DisableDebuggerAttachment 0
> That will allow it to collect these details.
> See also the description for that option in:
> https://www.torproject.org/docs/tor-manual.html.en

Thank you. The man page (or something) said that tor would not be able
to apply that option whilst running. Nevertheless I added the option
into torrc so that next time tor gets restarted, I shall be able to
use arm properly.

I'm on Debian and did a service tor reload (not restart) and tor
crashed! I didn't realise immediately, took may be a minute to realise
and restart. Anyway apologies to any connections that were going
through this relay.

Should I report a bug to Debian?

Also, this morning, my relay is back up, but no longer with HSDir
flag. Is this due to setting that option in the torrc file? And if so,
I guess it is recommended to disable that option?

PS Apologies for forgetting the subject line.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] (no subject)

2014-02-24 Thread Zenaan Harkness
I saw a hint of some interesting output by arm:

flags: Exit, HSDir, Running, V2Dir, ValidleDebuggerAttachment 0' to
your torrc and restarting tor. For more information see...

This bit "leDebuggerAttachment 0' to your torrc and restarting tor.
For more information see..." disappeared pretty quick.

Any ideas what that would be?

TIA
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Obfsproxy help

2014-02-22 Thread Zenaan Harkness
Presumably something in your etc/tor/torrc file?

If you are running bleeding edge tor, it might pay to subscribe to
tor-dev, and if you are subscribed there, that might be the best place
to post bleeding edge issues (just an idea - I don't recognise your
problem sorry).

Good luck
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] schedule tor relay uptime/ bandwidth

2014-02-22 Thread Zenaan Harkness
On 2/22/14, r...@goodvikings.com  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> I dunno if there's nything built in to tor. Are you on Linux? You coud use
> cron. Every day at 9 run 'service tor stop', every day at 5 run 'service tor
> start'

Thanks. Sounds rather heavy weight - it would presumably be a useful
configuration to notify potential users of my relay, but I guess there
is a desire to encourage 24/7 uptime.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] schedule tor relay uptime/ bandwidth

2014-02-21 Thread Zenaan Harkness
I know tor relay bandwidth usage per period can be configured, but is
it possible to schedule a tor relay to sleep during business hours,
and only operate after hours?

TIA
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Relay unresponsive

2014-02-21 Thread Zenaan Harkness
Somewhat regularly, I get "relay unresponsive" with a heartbeat delta
of about 12seconds.

Could this mean my upload pipe is still saturated and I need to
throttle back slightly?

recent arm log:
13:12:56 [ARM_NOTICE] Relay resumed [6 duplicates hidden]
13:12:31 [ARM_NOTICE] Relay unresponsive (last heartbeat: Sat Feb 22
13:12:20 2014)
12:11:34 [ARM_NOTICE] Relay unresponsive (last heartbeat: Sat Feb 22
12:11:20 2014)
11:10:33 [ARM_NOTICE] Relay unresponsive (last heartbeat: Sat Feb 22
11:10:20 2014)
09:30:24 [NOTICE] Heartbeat: Tor's uptime is 2:18 hours, with 146
circuits open. I've sent 14.23 GB and received 9.69 GB.
09:09:20 [ARM_NOTICE] Relay unresponsive (last heartbeat: Sat Feb 22
09:09:07 2014)
09:08:30 [ARM_NOTICE] Relay unresponsive (last heartbeat: Sat Feb 22
09:08:19 2014)
07:16:39 [NOTICE] Self-testing indicates your DirPort is reachable
from the outside. Excellent.
07:12:43 [NOTICE] Performing bandwidth self-test...done.
07:11:31 [NOTICE] Self-testing indicates your ORPort is reachable from
the outside. Excellent.
  Publishing server descriptor.
07:11:26 [NOTICE] Your IP address seems to have changed to
203.158.36.137. Updating.
07:09:25 [ARM_NOTICE] Relay unresponsive (last heartbeat: Sat Feb 22
07:09:12 2014)
07:08:04 [ARM_NOTICE] Relay unresponsive (last heartbeat: Sat Feb 22
07:07:51 2014)
03:30:24 [NOTICE] Heartbeat: Tor's uptime is 5:52 hours, with 189
circuits open. I've sent 12.95
  GB and received 12.78 GB.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] [WARN] crypto error while checking RSA signature: padding check failed

2014-02-21 Thread Zenaan Harkness
Occasionally (such as just now) I have seen these two errors in arm:

 │ 13:21:25 [WARN] crypto error while checking RSA signature: padding
check failed (in rsa routines:-
 │   RSA_EAY_PUBLIC_DECRYPT)
 │ 13:21:25 [WARN] crypto error while checking RSA signature: block
type is not 01 (in rsa routines:-
 │   RSA_padding_check_PKCS1_type_1)

Are they anything to worry about?
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] [WARN] Your system clock just jumped 100 seconds forward; assuming established circuits no longer work.

2014-02-21 Thread Zenaan Harkness
On 2/21/14, grarpamp  wrote:
>> something I did to ntpd.conf (probably adding servers above the
>> default debian entries which are:
>> server 0.debian.pool.ntp.org iburst
>
> The order doesn't matter. Though if DNS is not up before
> ntpd on boot, specified poolnames won't resolve and I think it's still a
> oneshot so only servers listed by ip would be loaded. see ntpq -np
> while listing a bogus hostname, a poolname, and an ip.

Well I have a couple of IP listings now, and I haven't seen the
~2minute jump since adding them.

So things have definitely improved on that front.

I still see rather wild deltas (upwards of a second sometime), but at
least it doesn't get worse than that:
Feb 22 11:26:38 lt8 ntpdate[4832]: step time server 192.189.54.17
offset 0.762756 sec
Feb 22 11:31:48 lt8 ntpdate[4836]: adjust time server 203.59.7.248
offset -0.052660 sec
Feb 22 11:37:00 lt8 ntpdate[4839]: adjust time server 203.23.237.200
offset 0.283965 sec
Feb 22 11:42:11 lt8 ntpdate[4841]: adjust time server 203.23.237.200
offset 0.151871 sec
Feb 22 11:47:26 lt8 ntpdate[4843]: adjust time server 150.101.247.149
offset 0.470046 sec
Feb 22 11:52:35 lt8 ntpdate[4845]: adjust time server 27.106.200.45
offset 0.063318 sec
Feb 22 11:57:46 lt8 ntpdate[4847]: adjust time server 130.102.128.23
offset 0.090110 sec
Feb 22 12:03:00 lt8 ntpdate[4851]: step time server 192.189.54.17
offset 0.515640 sec
Feb 22 12:08:12 lt8 ntpdate[4853]: adjust time server 192.189.54.17
offset 0.308896 sec
Feb 22 12:13:20 lt8 ntpdate[4855]: adjust time server 118.88.20.194
offset -0.162371 sec
Feb 22 12:18:33 lt8 ntpdate[4860]: adjust time server 128.184.218.53
offset 0.302422 sec
Feb 22 12:23:44 lt8 ntpdate[4915]: adjust time server 203.161.12.165
offset 0.162629 sec
Feb 22 12:28:54 lt8 ntpdate[4922]: adjust time server 203.161.12.165
offset 0.035504 sec

Your comment above reminds me of something else I saw:
log.3.gz:Feb 19 09:55:50.000 [warn] eventdns: All nameservers have failed
log.3.gz:Feb 19 09:59:07.000 [warn] Your system clock just jumped 100
seconds forward;

This only happened once or twice back then.

What this leads me to is a couple of things - have a couple ntp
servers listed as ip address in case there is dns problems, but also I
think that one thing that may have affected me is I had essentially no
throttling/bandwidth shaping on the tor relay - and if the
uplink/upload gets satturated, this used to be a problem for
bittorrent (still is I think) and probably for tor relay too - if
certain outgoing packets don't make it out in a timely manner, then
problems happen.

So I have set my RelayBandwidthBurst to 90KB (KiB) (and non-burst to
80KB) - it's an ADSL2 connection pretty close to the exchange, so the
full 1MiB upload is generally possible, I think. I'll see how I
continue to go at 90KB.

Thanks all,
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] [WARN] Your system clock just jumped 100 seconds forward; assuming established circuits no longer work.

2014-02-20 Thread Zenaan Harkness
On 2/20/14, grarpamp  wrote:
>>> - configure tor to syslog
>>
>> added
>
> 'Log syslog'

The example in etc/torrc is 'Log notice syslog' which I uncommented.

>>> - send an ntpdate -q pool to syslog every 5min,
>>>  remove when solved.
>>
>> Do you mean disable ntpd daemon, and run this instead? Sounds easy
>> enough, I imagine:
>> service ntp stop; while true; do ntpd -gqn -l /var/log/syslog; sleep 5m;
>> done
>> service ntp start
>
> I meant remove it when solved so you don't forget
> and you're banging on the pool every 5 for eternity.
>
> -l /var/log/syslog - this is potentially overwriting or blocking this file
> which
> is managed by syslogd in syslog.conf, pick another new file, or just
> better to use ntp.conf logconfig option.
>
> if you were running ntpd during problems, and ntpd was not working
> right, then ntpdate would be just a tool to separately query and
> print external pool time without impact to running system, for
> comparing with system time.

Thank you. Restarted ntpd, installed ntpdate, running this script:
while true; do sleep 5m; ntpdate -qsv 3.debian.pool.ntp.org; echo "---"; done

...
> ntpd disciplines kernel clock by calculating drift from the net
> and feeds back small rate deltas to kernel.
> no ntpd -> no discipline -> lots of drift... then these manual slews
> and jumpsets happen for people setting time manually, which is non
> ideal, get the daemon running right on its own.
> Tor said 100sec forward, so it maybe sees what look like
> the forward jumps above as accumulated.
> ntpd would not do that if running right, so check for some
> ntp thing in crontab maybe making your jump.

# cd etc; # grep -in ntp cron*/*
cron.daily/ntp:3:# The default Debian ntp.conf enables logging of
various statistics to
cron.daily/ntp:4:# the /var/log/ntpstats directory.  The daemon
automatically changes
cron.daily/ntp:9:statsdir=$(cat /etc/ntp.conf | grep -v '^#' | sed -n
's/statsdir \([^ ][^ ]*\)/\1/p')

Nothing special at all - just standard debian ntp install.

I've now gone and added some ntp servers from telstra, iinet and ntp.org.

>> So it seems that the slew is somehow not being set properly, or
>> rather, now that ntpd is being run every 5 minutes, it gets to add
>> about .2 of a second pretty regularly (I'll continue to watch of
>> course), so something definitely seems amiss. I'm not loading the
>> system default ntpd config file.
>>
>> It looks like time could be running slow and being _not_ updated,
>> except a few times a day, resulting in the 2-3minute jump.
>
> Maybe ntpd is not working/running and cron is maybe doing manual sets.

I've restarted ntpd and running the above script as mentioned. Will
post some output soon.

# service ntp status
NTP server is running.

>>> - send *.* to /var/log/all
>>
>> intended to be a torrc config? It sounds like a good idea to send
>> everything to one log file for a while, till I debug this.
>
> man syslog.conf

Thanks. Looks like debian defaults to rsyslog. Anyway, I know what you
are referring to now, thanks (I'm a bit green, although have been
reported to have at least 1.5 brain cells - though some dispute this
as being biased sample).

>> interesting repeating lines all over daemon.log re ntpd (but not
>> nothing similar in today's daemon.log though.
>
> ntp automatically chooses who it thinks is best to listen to
> among given peers.

Good. Well now I have a number of ntp servers listed, hopefully it
shall improve the situation.

>>> If [system ntp]date
>>> is set, then under ntpd running for 15min+,
>>> if ntpq -np does not show one asterisk(*) in front
>
> Only one of ntpd or ntpdate should be doing the actual timing.
> For most people that means 'ntpd -g' starting as daemon
> at boot, with 'ntpdate -q' and 'ntpq -np' as just cli checks.

Thanks. That's what I'm doing now.

TOR relay docs should perhaps include, for debian "add your isp's ntp
servers, and possibly a few from ntp.org, to your /etc/ntpd.conf (and
check this file is sane)".

OK, grepping logs time...:
Feb 20 23:51:35 lt8 ntpdate[29233]: adjust time server 130.102.2.123
offset -0.024247 sec
Feb 20 23:57:31 lt8 ntpdate[29289]: adjust time server 54.252.129.186
offset 0.018113 sec
Feb 21 00:02:38 lt8 ntpdate[29329]: adjust time server 59.167.170.228
offset 0.025050 sec
Feb 21 00:07:46 lt8 ntpdate[29377]: adjust time server 121.0.0.41
offset 0.017704 sec
Feb 21 00:12:53 lt8 ntpdate[29380]: adjust time server 203.206.205.83
offset 0.004626 sec
Feb 21 00:18:00 lt8 ntpdate[29395]: adjust time server 27.116.36.44
offset -0.003997 sec
Feb 21 00:23:08 lt8 ntpdate[29411]: adjust time server 118.88.20.194
offset -0.003071 sec

Looking very hopeful - convergence of time offset on the way. I guess
something I did to ntpd.conf (probably adding servers above the
default debian entries which are:
server 0.debian.pool.ntp.org iburst
server 1.debian.pool.ntp.org iburst
server 2.debian.pool.ntp.org iburst
server 3.debian.pool.ntp.org iburst

I'll check it again in the morning. Next stop, l

Re: [tor-relays] [WARN] Your system clock just jumped 100 seconds forward; assuming established circuits no longer work.

2014-02-20 Thread Zenaan Harkness
On 2/20/14, grarpamp  wrote:
> Since you say it repeats you oppurtunity to check the
> system clock first:
> - configure tor to syslog

added

> - send an ntpdate -q pool to syslog every 5min,
>  remove when solved.

Do you mean disable ntpd daemon, and run this instead? Sounds easy
enough, I imagine:
service ntp stop; while true; do ntpd -gqn -l /var/log/syslog; sleep 5m; done
service ntp start

Something like -L seems to be needed but -L doesn't stop, the
following - I don't know what these sorts of lines are (reading docs
now, but it might take a while to figure it out) - ie I don't know why
ntpd listens on LAN:
20 Feb 18:31:26 ntpd[22655]: Listen normally on 3 eth1 192.168.5.2 UDP 123

BTW, looks like ntpd has the same options as ntpdate, intended for the
same functions (at least on Debian, says ntpdate is deprecated).


Now, here's the last short while of this ntpd script output:
ntpd: time slew -0.015558s
ntpd: time slew +0.062676s
ntpd: time set +0.191404s
ntpd: time set +0.187068s
ntpd: time slew -0.029898s
ntpd: time slew +0.027801s

So it seems that the slew is somehow not being set properly, or
rather, now that ntpd is being run every 5 minutes, it gets to add
about .2 of a second pretty regularly (I'll continue to watch of
course), so something definitely seems amiss. I'm not loading the
system default ntpd config file.

It looks like time could be running slow and being _not_ updated,
except a few times a day, resulting in the 2-3minute jump.


> - send *.* to /var/log/all

What's that mean? I need just a little more handholding sorry. Is this
intended to be a torrc config? It sounds like a good idea to send
everything to one log file for a while, till I debug this.

I'll get back to this, but just for the moment, I notice some
interesting repeating lines all over daemon.log re ntpd (but not
recently):

...
daemon.log:Feb 18 03:10:08 lt8 ntpd[2845]: peer 203.24.120.194 now valid
daemon.log:Feb 18 03:15:37 lt8 ntpd[2845]: peer 203.59.9.110 now invalid
daemon.log:Feb 18 03:28:34 lt8 ntpd[2843]: adjusting clock frequency
by 18.354661 to 3.931566ppm
daemon.log:Feb 18 04:08:41 lt8 ntpd[2845]: peer 203.59.9.110 now valid
daemon.log:Feb 18 04:15:29 lt8 ntpd[2845]: peer 118.88.20.194 now invalid
daemon.log:Feb 18 04:15:34 lt8 ntpd[2845]: peer 130.102.2.123 now invalid
daemon.log:Feb 18 04:15:47 lt8 ntpd[2845]: peer 203.171.85.237 now invalid
daemon.log:Feb 18 04:15:52 lt8 ntpd[2845]: peer 202.127.210.37 now invalid
daemon.log:Feb 18 04:16:01 lt8 ntpd[2845]: peer 202.147.104.52 now invalid
daemon.log:Feb 18 04:30:05 lt8 ntpd[2845]: peer 203.59.9.110 now invalid
daemon.log:Feb 18 04:59:11 lt8 ntpd[2845]: 10 out of 20 peers valid
daemon.log:Feb 18 04:59:11 lt8 ntpd[2845]: bad peer from pool
0.debian.pool.ntp.org (130.102.2.123)
daemon.log:Feb 18 04:59:11 lt8 ntpd[2845]: bad peer from pool
0.debian.pool.ntp.org (202.127.210.37)
daemon.log:Feb 18 04:59:11 lt8 ntpd[2845]: bad peer from pool
1.debian.pool.ntp.org (203.59.9.110)
...

nothing similar in today's daemon.log though.


> and see what you find around where the date lines
> start to slide or jump past each other. Graph it
> with rrd/gnuplot if you want. epoch format helps there.
> Your timekeeping is probably just broke somewhere,

sounds like it.


> ie: your system has bad clock drift and also can't sync
> because there's a firewall blocking ntp, so off goes
> your time. Check that first.

Here's what I'm getting every 5 minutes:

Feb 20 18:46:59 lt8 ntpd[22662]: ntpd 4.2.6p5@1.2349-o Sat May 12
09:07:18 UTC 2012 (1)
20 Feb 18:46:59 ntpd[22662]: proto: precision = 2.514 usec
20 Feb 18:46:59 ntpd[22662]: Listen and drop on 0 v4wildcard 0.0.0.0 UDP 123
Feb 20 18:46:59 lt8 ntpd[22662]: logging to file /var/log/syslog
20 Feb 18:46:59 ntpd[22662]: Listen and drop on 1 v6wildcard :: UDP 123
20 Feb 18:46:59 ntpd[22662]: Listen normally on 2 lo 127.0.0.1 UDP 123
20 Feb 18:46:59 ntpd[22662]: Listen normally on 3 eth0 192.168.5.2 UDP 123
20 Feb 18:46:59 ntpd[22662]: Listen normally on 4 eth0
fe80::202:8aff:fe21:77f1 UDP 123
20 Feb 18:46:59 ntpd[22662]: Listen normally on 5 lo ::1 UDP 123
20 Feb 18:46:59 ntpd[22662]: peers refreshed
20 Feb 18:46:59 ntpd[22662]: Listening on routing socket on fd #22 for
interface updates
20 Feb 18:47:12 ntpd[22662]: ntpd: time slew +0.027801 s

again, I don't (yet) understand why ntpd is Listening as seen above.

there appears to be no problems with firewall, that I can tell yet
anyway (also eg the logs above - I've done some grepping etc over the
last few days of logs and everything outgoing appears to work, and
incoming ORPort DIRPort are successfully forwarded and the relay is
chugging away nicely within its limits. Also Internet generally works
(downloading debian boot cd for example) - and no ntp server
connection failures I could spot in the logs just before.


> It's not your isp since you say you're using
> ntpd against external debian pool and odds are
> not someone stuffing you bogus timedata. Though
> your ntp cli 

Re: [tor-relays] [WARN] Your system clock just jumped 100 seconds forward; assuming established circuits no longer work.

2014-02-19 Thread Zenaan Harkness
On 2/19/14, Zenaan Harkness  wrote:
> On 2/19/14, Alexander Makarov  wrote:

>> Could you show the log?
>
> Current and previous tor logs attached. What is also interesting is IP
> address seems to change rather frequently from the ISP (iiNet in this
> case - a home ADSL2 connection, but off-net, so it's a resell of
> Telstra).

Telstra could be running carrier grade NAT or something perhaps? Looks
like IP address changes may be coming faster until there's a 99%
conversion to IPv6.

> I also note an early morning torrc file read (log.1) - there are no
> changes in the torrc file since the 17th, so except that I run service
> tor reload, I do not expect tor to re-read the torrc file; is this
> normal?:
> Feb 19 07:35:19.000 [notice] Read configuration file "/etc/tor/torrc".

Guess I need to get into coding again - or at least code review...
this doesn't make sense to me though - the log message should say a
bit more than it does (eg "confirmed no change" or "changes to BLAH
and BLAG"... the message as it reads is enigmatic to the point of
consternation.

>> Can you rebuild you kernel with debug option and
>> check what kernel events have the same timestamps
>
> I could install a debug kernel - Debian makes them available. How
> would I "check kernel events" - just check the logs?
>
> Happy to investigate... might need some hand holding on the process.

Installed Debian's ...-dbg kernel package. Apparently it's just
symbols - no new kernel. I've asked on debian-user for assistance in
the recommendation to check kernel events.

Thanks
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] [WARN] Your system clock just jumped 100 seconds forward; assuming established circuits no longer work.

2014-02-18 Thread Zenaan Harkness
On 2/19/14, Alexander Makarov  wrote:
> On 18.02.2014 23:39, Zenaan Harkness wrote:
>> On 2/18/14, Alexander Makarov  wrote:
>>> On 18.02.2014 22:02, Zenaan Harkness wrote:
>>>> My tor logs (running on Debian) are showing this warning:
>>>> [WARN] Your system clock just jumped 100 seconds forward; assuming
>>>> established circuits no longer work.
>>>>
>>>> I tried running openntpd as well as ntp packages (debian), and both
>>>> display the same problem - once or twice a day I get this jump in time
>>>> of in the order of a couple of minutes.
>>>>
>>>> Any idea why?
>>
>>> Maybe problem with hardware clocks?
>>
>> OK, I just checked that the time is very close to correct local time
>> (within a couple seconds as best I can tell), and ran
>> hwclock --systohc
>>
>> But, surely the log warning would only happen once? - that's the whole
>> point of running ntp I thought...
>>
>> See how my node goes over the next day or two,

Well, the time jump still happens, roughly 5hrs apart, 2-3 minute jump.


> Could you show the log?

Current and previous tor logs attached. What is also interesting is IP
address seems to change rather frequently from the ISP (iiNet in this
case - a home ADSL2 connection, but off-net, so it's a resell of
Telstra).

I also note an early morning torrc file read (log.1) - there are no
changes in the torrc file since the 17th, so except that I run service
tor reload, I do not expect tor to re-read the torrc file; is this
normal?:
Feb 19 07:35:19.000 [notice] Read configuration file "/etc/tor/torrc".


> Can you rebuild you kernel with debug option and
> check what kernel events have the same timestamps

I could install a debug kernel - Debian makes them available. How
would I "check kernel events" - just check the logs?

Happy to investigate... might need some hand holding on the process.

Thanks
Zenaan


log
Description: Binary data


log.1
Description: Binary data
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] [WARN] Your system clock just jumped 100 seconds forward; assuming established circuits no longer work.

2014-02-18 Thread Zenaan Harkness
On 2/18/14, D.S. Ljungmark  wrote:
> On Tue, Feb 18, 2014 at 12:02 PM, Zenaan Harkness  wrote:
>> My tor logs (running on Debian) are showing this warning:
>> [WARN] Your system clock just jumped 100 seconds forward; assuming
>> established circuits no longer work.
>>
>> I tried running openntpd as well as ntp packages (debian), and both
>> display the same problem - once or twice a day I get this jump in time
>> of in the order of a couple of minutes.

> Are you on a virtual machine?  Do you control the VM host? If not, it could
> be that your host is migrating your VM, or not scheduling it properly,
> which causes time drifts inside the VM.

No VM, an older 32-bit box, 1GiB RAM, no swap.

On 2/19/14, Andreas Krey  wrote:
> It may just be that your machine completely hangs for a while
> occasionally; that will look to tor like a clock jump in that
> direction. Either hard disk timeouts of some kind, or serious
> swapping. If VM then also possibly the entire VM being starved
> occasionally.

Default Debian ntp servers/ config:
server 0.debian.pool.ntp.org iburst
server 1.debian.pool.ntp.org iburst
server 2.debian.pool.ntp.org iburst
server 3.debian.pool.ntp.org iburst
etc
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] [WARN] Your system clock just jumped 100 seconds forward; assuming established circuits no longer work.

2014-02-18 Thread Zenaan Harkness
On 2/18/14, Alexander Makarov  wrote:
> On 18.02.2014 22:02, Zenaan Harkness wrote:
>> My tor logs (running on Debian) are showing this warning:
>> [WARN] Your system clock just jumped 100 seconds forward; assuming
>> established circuits no longer work.
>>
>> I tried running openntpd as well as ntp packages (debian), and both
>> display the same problem - once or twice a day I get this jump in time
>> of in the order of a couple of minutes.
>>
>> Any idea why?

> Maybe problem with hardware clocks?

OK, I just checked that the time is very close to correct local time
(within a couple seconds as best I can tell), and ran
hwclock --systohc

But, surely the log warning would only happen once? - that's the whole
point of running ntp I thought...

See how my node goes over the next day or two,
Thanks
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] [WARN] Your system clock just jumped 100 seconds forward; assuming established circuits no longer work.

2014-02-18 Thread Zenaan Harkness
My tor logs (running on Debian) are showing this warning:
[WARN] Your system clock just jumped 100 seconds forward; assuming
established circuits no longer work.

I tried running openntpd as well as ntp packages (debian), and both
display the same problem - once or twice a day I get this jump in time
of in the order of a couple of minutes.

Any idea why?

TIA
Zenaan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays