Re: [tor-relays] [tor-dev] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-08-14 Thread Sam
r rather than Onion Service V3) as at the project discussed. Open
Source code needs always to be revised.

So the best is doing nothing and not deciding?, then we have all our own
soup. The Reflec.Tor in Exit.Nodes makes immediately a strong code basis a
Tor-Messenger - and everyone can overtake it or implement it in the own
client.

As a groupchat server is not coded yet in these three clients, there is no
offence and in the opposite it is a gift to have a common sense how to
implement groupchat and offline chat and also to have with a Reflec.Tor a
Server already provided by Tor-Developers. As said, ieven f five or more
exit-operators alreay provide/install an Echo Server on their Exit-IP, then
we just have a different port, but in the same minute Tor-Messaging is
working reliable with the Spot-On Tor-Messenger and the new standard for a
better graph architecture is set.

Why then not implementing it for all the exit-nodes and provide also the
basis for groupchat for the three hidden-server based Messengers?

So the model is less coding (and probably using less funding) by joined
forces.
Kind regards, Sam

Am Mi., 14. Aug. 2024 um 16:04 Uhr schrieb George Hartley via tor-relays <
tor-relays@lists.torproject.org>:

> Hello,
>
> Similar to Briar, even developers of such clients above tell the loss of
> messages and low reliability of the hidden to hidden path. Some of you
> might know, that there were use cases with missing messages in a range of
> 35-45 %.
>
>
> Sorry, but this is just not the case from my experience - it may take a
> while to fetch the descriptor of the hidden service, but once a TCP
> connection is established, aka. the ACK packet has been received, there
> should be no problems with packet-loss, this is one of the core features of
> TCP:
>
> Retransmission on various conditions.
>
> I also hosted a hidden IRC server, as well as a Tor hidden service on my
> grandmothers laptop, to be able to SSH in through Tor and troubleshoot
> problems.
>
> Experienced no packet loss, unless a relay in the circuit suddenly went
> offline.
>
> If you want, I can measure packet loss from various locations (Northern
> Europe, East Europe, and New York, USA).
>
> Also, to improve latency and throughput, you could make the server a one
> hop hidden server by enabling:
>
> HiddenServiceSingleHopMode
>
>
> This way the looking up the server is faster, but clients remain anonymous
> using a normal 3-hop circuit.
>
> I don't think we need extra code for this, you could just build your app
> using the programming language of your desire and use the existing network.
>
> That's what I was doing with my ~200 user IRC server, and it worked fine,
> even while being hosted at home at a limited uplink of 15 Mbps, which now
> got upgraded to 30 Mbps.
>
> Unfortunately fiber is not an option, so we have to rely on 60+ years old
> copper wires maintained by Telecom, I have a quite fancy industrial router
> with modem software and capabilities, and we still use VDSL2 17a G.Vector
> (ITU G.993.5).
>
> I do however own a virtual machine machine on my friends colocated server
> at DataWagon, they are very exit friendly, zero abuse so far, I believe
> they just redirect abuse mails to /dev/null or something.. lol.
>
> Anyway, point is that I never encountered packet loss, and even if, the
> protocol would compensate for it.
>
> This became kind of a rant while I'm at work, so if it's not that useful,
> Im sorry.
>
> Regards,
> George
>
> On Wednesday, August 14th, 2024 at 9:12 AM, Sam 
> wrote:
>
> System wrote via Tor Project :Feedback:
> Please submit the proposal also to tor-dev: tor-dev Info PageIntroducing
> & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor &
> Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes
>
> https://www.reddit.com/r/TOR/comments/1e4te8m/introducing_discussing_reflectors_as_concept/
>
> ==Introducing
> & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor &
> Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes
>
>
> *Tor-Messaging: Introducing & Discussing "Reflec-Tor"s as concept |
> Exit-Relay as Entry-Relay |*
>
> Hello,
>
> I think this belongs to this core, general, relay topic-forum, as it is
> also a development & community issue, request and efford, I post it here
> into the reddit forum for your core discussion:
>
> The idea is to add next to Bridges, Relays and Exit-Nodes also
> "Entry-Nodes" as "Reflec-Tor"(s) to the point of Exit-Nodes. Hence:
> Exit-Nodes are developed futher to be also an Entry-Node.
>
> Some may remem

Re: [tor-relays] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-08-04 Thread Sam
in combination of Tor-Messaging cover many aspects of these
processes and are healing Tor, providing perspectives and need to be
welcomed in the bubble, which is mostly done by understanding, cappable and
innovative developers with a view more on the architecture and environment
rather than the own place to build.

An idea could be to really test in practice - as all is there to install
and to test out - the speed of incomming messages with ReflecTors in
comparison of the Hidden-to-Hidden versions.

Kind regards Sam

Am Sa., 3. Aug. 2024 um 17:18 Uhr schrieb Landon :

> Hello,
>
> I am a bridge relay operator.
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-07-17 Thread Sam
Hello,
as tb discussed further with developers of Tor, the concept of
"Reflec-Tor"s (and Exit-Nodes to be seen also as an Entry-Node) might have
an impact like Snowflakes for Chat and Messaging over Tor and addresses
opinions of Relay admins and university research too.
Regards

-- Forwarded message -
Date: Di., 16. Juli 2024 um 20:36 Uhr
Subject: Fwd: Introducing & Discussing "Reflec-Tor"s as concept |
Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor
to Exit-Nodes
To: 

System wrote via Tor Project :Feedback:
Please submit the proposal also to tor-dev: tor-dev Info PageIntroducing &
Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor &
Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes
https://www.reddit.com/r/TOR/comments/1e4te8m/introducing_discussing_reflectors_as_concept/

==Introducing &
Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor &
Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes


*Tor-Messaging: Introducing & Discussing "Reflec-Tor"s as concept |
Exit-Relay as Entry-Relay |*

Hello,

I think this belongs to this core, general, relay topic-forum, as it is
also a development & community issue, request and efford, I post it here
into the reddit forum for your core discussion:

The idea is to add next to Bridges, Relays and Exit-Nodes also
"Entry-Nodes" as "Reflec-Tor"(s) to the point of Exit-Nodes. Hence:
Exit-Nodes are developed futher to be also an Entry-Node.

Some may remember when gnutella got hybrid with edonkey and then also with
torrent, Mike Stokes from Shareaza did that.

The idea today, 20 years later, is to add some Echo-capabilities to Tor in
regard of the servers for Exit and Entry.

*Vision: Every (updated) Exit-Node is an Echo-Server - For a better
Tor-Messaging.*

What does that mean?

An Echo-Server is a server for chat-messaging to send an incomming message
packet again out to all connected clients at the moment. Ping-in and
Ping-Out to all. That simple, that's why it is called the Echo. Like a
shout in front of a forrest, all connected users can hear and get the
(encrypted) shout or message or packet back from the tree wall.

There are 3 software applications for Echo-Servers:

   -

   https://github.com/textbrowser/spot-on (Desktop, sercer in the Listener
   Tab)
   -

   https://github.com/textbrowser/smokestack (java for Android)
   -

   https://github.com/textbrowser/spot-on-lite (headless deamon for Linux)

Now, the Listener function with ping in and ping out should be implemented
within a Tor-Exit-Node.

When it comes to Tor-Messaging, there are some pathes possible:

A) Tor-Chat-Client-Alice - Tor - Internet - Echo-Server - Internet - Tor -
Tor-Chat-Client-Bob (Tor-proxied Chat-Server, which only accepts encrypted
packets)

B) Tor-Chat-Client-Alice - Echo - Tor - Tor - Echo - Tor-Chat-Client-Bob
(Echo Tor-tunneled)

C) Tor-Chat-Client-Alice - Echo-Server - Tor-Chat-Client-Bob (direct
connection to Echo-Server with only encypted packets)

The request here is to build and develop option A.

That is just right now also possible, by an Exit-Node of Tor running the
Echo-Server-Software on the same machine in parallel. Just the port is
different.

This is an idea for some might be new, but thinking Tor Messaging a bit, it
comes quickly to this ideas and better soluttion.

The way to connect

D) Tor-Chat-Client-Alice - Hidden Onion Server v3 - Tor - Tor - Hidden
Onion Server v3 - Tor-Chat-Client-Bob

is the current given way for clientes like RicoChet Refresh, Quiet or Cwtch.

Similar to Briar, even developers of such clients above tell the loss of
messages and low reliability of the hidden to hidden path. Some of you
might know, that there were use cases with missing messages in a range of
35-45 %. Don't quote me on that, but as core developers and community
members you might be in contact with those who experience this.

Furthermore the Messaging clients are not advanced in functionality, nor
advanced in strong encryption.

It would be third a long development way to got that route.

It is cost effective and needs cappable developers.

Some project have stamped on and made a workable client, but does that
unite all our power in the sense of Tor-Messaging?

Messaging needs a Vision and Statement from the Tor-Core-Developer team
with a discussion in the community in that regard with honor to the
individual projects and also with support for their chosen path (Model D).
At the same time we have to state that it is as it is, a HTTP-Server in the
middle like in Model A is faster than Model D.

In the graph-path the Echo-Server in the middle handles only encrypted
traffic, so it is just like another Relay. We can call it "Reflec-Tor". The
only sense it to multiply incomming encrypted packets from one node to all
connected nodes.

With that Idea, the Messenger Spot-On could be used as a Tor-Messenger.

This Messenger has stong enc

Re: [tor-relays] Policy Question: Tor Exits at Universities, Corporate Networks, etc

2018-09-02 Thread Sam Pizzey
On Sun, Sep 2, 2018 at 1:05 AM, Mirimir  wrote:
> Damn, I hadn't considered that :( I guess that I had assumed such
> blocking was limited to consumer-level ISPs. Not uplinks in data
> centers.

This is the case for the UK, yes (it's not actually even all
consumer-level ISP's, mine for example does not conform to it). Can't
speak for other countries.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Netflix overblocking non-exit Tor relays

2016-12-16 Thread Sam Lanning
Is this now broken / reverted again? I'm getting a "you seem to be using an
unblocker or proxy" warning when trying to access Netflix through my US
middle relay...

On 1 Mar 2016 7:38 pm, "Gero Kuehn"  wrote:

> > I had an update from Neil Hunt @ Netflix
> >> I'm told that we pushed a fix this weekend that should have solved the
> problem - lmk
> > Things are working again at my end - can anyone else confirm?
>
> Yes. The feedback to them seems to have worked and the error message is
> gone now.
> Thanks to everyone who helped to talk them out of this!
>
>   Gero / dc6jgk
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] torworld relays in entry and exit position

2016-12-10 Thread Sam Pizzey
Ansible is GPL'd and free of cost - are you possibly looking at Ansible
Tower, or something similar?
You can find Ansible here:

https://github.com/ansible/ansible
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fw: new message

2016-05-02 Thread Sam Pizzey

It's definitely spam, not me. Don't click it.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Exit node situation in Finland

2016-04-01 Thread Sam Lanning
Hi Juha,

I'd just like to say great work! I'm sure I speak for everyone when I say I
really appreciate the local advocacy and positive vibes you're spreading!
Exciting stuff and a good situation to be in!

I'm sure Alison and Nima in particular will be very excited about the
library stuff!

Cheers,
Sam
On 1 Apr 2016 12:37 p.m., "Nurmi, Juha"  wrote:

> Greetings Tor Relay mailing list,
>
> I decided to write little bit about Finnish exit node situation.
>
> I am maintaining this exit node campaign in Finland:
>
> http://campaigns.ahmia.fi/finnish-tor-campaign/index_en.html
>
> In Finland:
>
> - Running an exit node is absolutely legal
> - ISP may cut your connection because it is listed as malware host
> - The National Cyber Security Center Finland (NCSC-FI) is able to
> "whitelist" your IP address so the ISP does not get those automated malware
> detections
> - Sebastian Mäki got police visit because his exit node
> - The National Bureau of Investigation is using exonerator.torproject.org
> so basically they are considering this information before they rush to your
> home
> - There has been warming up phase that maybe Finnish libraries start some
> Tor activity
>
> I am doing a lot of local advocacy work here :)
>
> Best,
> Juha
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Opt-In Trial: Fallback Directory Mirrors

2015-12-17 Thread Sam Lanning
I'm happy to have ratchet on there: FA3415659444AE006E7E9E5375E82F29700CFDFD

Cheers,
Sam.
On 17 Dec 2015 7:51 p.m., "Kurt Besig"  wrote:

> On 12/17/2015 6:07 AM, Nick Mathewson wrote:
> > TL;DR: Stable non-exit relays can help tor clients use the Tor
> > network. Please opt-in!
> >
> > We want to run a trial of fallback directory mirrors (fallbacks)
> > in Tor. Tor clients contact fallbacks to download the consensus
> > during initial bootstrap, before they contact the directory
> > authorities.
> >
> > Fallbacks allow Tor to bootstrap in networks that block the Tor
> > directory authorities. This allows people to use Tor without
> > manually configuring bridges or pluggable transports.
> >
> > For more information about fallbacks, see:
> >
> https://trac.torproject.org/projects/tor/wiki/doc/FallbackDirectoryMirrors
> >
> >  For this trial, we want to find around 100 stable non-exit relays,
> > as exits currently experience high load.
> >
> > We want relays that expect to be stable for the next 2 years,
> > with:
> >
> > good uptime, the same IP address(es) and port, the same relay
> > identity key, good bandwidth and network connectivity.
> >
> > In December 2015, we created a list of ~400 candidate fallbacks.
> >
> https://trac.torproject.org/projects/tor/attachment/ticket/15775/fallback_dirs.inc
> >
> >  If your relay is on this list, and you expect it to be on the same
> > IP address(es) and port for at least 2 years, please consider
> > opting-in for this trial. (Relays that aren't on the list are
> > welcome to opt-in. They will be considered in future releases, or
> > if the selection criteria change.)
> >
> > For the initial fallback release, we will only add your relay if
> > you opt in. Please reply on the tor-relays mailing list, if you are
> > able. (Opt-ins, opt-outs, and fallbacks chosen for inclusion in
> > tor, will be managed using lists in the publicly available tor git
> > repository.)
> >
> > all best wishes, & thanks for running Tor!
> > ___ tor-relays mailing
> > list tor-relays@lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> >
> Relay was down during transition to new VPS, meets all criteria at
> this point. Available if needed.
> New Fingerprint: 'horizons E65D300F11E1DB12C534B0146BDAB6972F1A8A48'
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Operators Meetup at 32c3: 28.12. 16:45

2015-12-14 Thread Sam Lanning
This will be my first C3 and tor meetup! Looking forward to meeting
everyone there! =)

Sam.
On 12 Dec 2015 2:58 p.m., "Moritz Bartl"  wrote:

> As usual: Let's all gather at 32c3 to discuss Tor relay operation!
>
> Monday, 28.12.2015
> 16:45-18:45
> Hall 13
>
> https://events.ccc.de/congress/2015/wiki/Session:Tor_Relay_Operators_Meetup
>
> See you there!
> --
> Moritz Bartl
> https://www.torservers.net/
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Weather not working?

2015-11-20 Thread Sam Lanning
On Fri, Nov 20, 2015 at 11:30 PM, Moritz Bartl 
wrote:

> We are :-) Yes, the backlog is long, it's all being done manually for
> now until someone works on a nicer Weather. Everyone will get a shirt
> who matches the requirements.
>
> Also, our shirts are fair trade organic cotton and we know the producers
> and order quite large amounts. One downside is that over time we run out
> of some sizes and colors, and also that we have to physically store all
> the shirts "somewhere at home". Now imagine your own flat with an extra
> 19 boxes of 140kg of shirts.
>
> Obviously this is not a final solution, we're slowly working on
> improving the process, along with all the other things.


Is there any way in which those who are willing to help out print / pay for
printing / stock / mail out t-shirts / do admin stuff can help?

Cheers,
Sam.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Ansible repo for setting up relays

2014-06-15 Thread Sam Kottler
Alexander's email about the Puppet module he's putting together has
reminded me to send a mail about an ansible repository I use to manage
my relays.

https://github.com/skottler/tor-ansible is where it lives. Unlike the
puppet module, I'm working on getting a whole environment deployment put
together. Ultimately (when I get some time) I'll have it stand up all
the necessary pieces to securely run (i.e. ssh configuration, user
setup, etc) a relay. For now it just installs Tor.

Let me know if you've got any questions. Pull requests are all welcome,
of course!

-s

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] TTTT

2014-03-02 Thread sam
Is it necessary to run it by scripts or is it possible to create a exe or
dmg file 

-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of Sebastian Urbach
Sent: Sunday, March 2, 2014 2:10 PM
To: tor-relays@lists.torproject.org
Subject: [tor-relays] 

Dear list members,

The next big data review regarding the "Trying Trusted Tor Traceroutes" 
project was initiated this week. It will probably take a while (weeks)
before we have solid conclusions.

We are very close to 100 complete runs from different IP's, in fact 99 right
now. I hope that we will reach this goal very soon :-)

We are not sure yet if we gathered enough data, but time will tell. We want
to thank you for your support and if you want to make sure that we have more
data in case the amount we collected turns out to be insufficient, then join
us or keep running multiple rounds.

Project:

http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html

Results:

http://datarepo.cs.illinois.edu/relay_scoreboard.html

I make sure that this list is getting the results from the data review
before anyone else.

--
Mit freundlichen Grüssen / Sincerely yours

Sebastian Urbach

--
Those who would give up essential Liberty, to purchase a little temporary
Safety, deserve neither Liberty nor Safety.
--
Benjamin Franklin (1706 - 1790),  Inventor, journalist, printer, diplomat
and statesman


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] "Relay info kit" for Tor exits at universities

2012-08-11 Thread Sam Whited
On Sat, Aug 11, 2012 at 4:08 AM, Roger Dingledine  wrote:
> - Georgia Tech (Dave Dagon)
>

This is fantastic news, I used to run an exit relay out of my dorm
room at Georgia Tech. It was a bit of a pain to get set up initially —
ResNET and OIT didn't really understand the concept, but ended up
letting me run it. I've been wanting to set something up with the
College of Computing or GTRI for a while now, so it's good to see that
this is being done. Let me know if you need any help (I'll get in
touch with Dave and mention it to him as well).

> - We should set up a mailing list for university relay operators to share
> experiences and feel solidarity. I'll also encourage them to sign up here.
> We might also post a list of university Tor exits somewhere obvious,
> so new ones can gain more confidence in the idea.
>

Both great ideas. Unfortunately I don't have a lot of feedback on
these issues except to say that I love the idea, and I'm glad to see
that Georgia Tech (which has substantial network resources) will be on
board.

—Sam

-- 
Sam Whited
pub 4096R/EC2C9934

SamWhited.com
s...@samwhited.com
404.492.6008
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Electronic surveillance on major tor exits

2012-07-26 Thread Sam Whited
On Thu, Jul 26, 2012 at 2:47 PM, mick  wrote:
> He specifically used the word "traffic". That does not imply shoulder
> surfing.

I think the original messages point was simply: ``we all know that
some people don't use Tor properly." I doubt he is actually sniffing
traffic on his relay (or looking over a friend's shoulder). Perhaps
not though — I just wouldn't jump to any conclusions.

Best,
Sam

-- 
Sam Whited
pub 4096R/EC2C9934

SamWhited.com
s...@samwhited.com
404.492.6008
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Call for discussion: turning funding into more exit relays

2012-07-25 Thread Sam Whited
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 07/25/2012 12:34 PM, Julian Wissmann wrote:
> Please don't forget non profits, like 501(c)3, under which
> probably many hackerspaces in the US fall or the german e.V., like 
> Zwiebelfreunde e.V., who run torservers.net 
> <http://torservers.net/>.

Absolutely! I meant to use LLC's as an example as they are much easier
to form than a 501(c)3 exempt organization, but my wording was poor. I
intended that to be read, "any company that's not a sole proprietorship."

> I disagree again. We're on the verge of cheap,affordable 10GBit
> (as in torservers has just gotten an offer for unlimited traffic
> 10GBit for $750 with SWIP from a hoster who seems Tor friendly).
> This means, that 100mbit is getting cheaper and cheaper, as does
> GBit. 100mbit already comes at a price diadvantage compared to
> gbit, we don't nead to start on cost-effectiveness of 10mbit, not
> to mention that many people in the west could run 10mbit nodes from
> home by now.

Perhaps you're right; has anyone done any network simulations or run
any tests to see what would be better for network latency and/or
anonymity (more low-throughput relays, or a few larger relays)?

Regardless, I don't think the speed/bandwidth cap (if there is one)
should be set too high. In many countries it may be difficult—if not
impossible—to run a 10, or even a 1GBit node. As great as lots of
1(0+)GBit nodes would be, we don't want to end up with plenty of nodes
in the USA, GB, Germany, etc. and very few elsewhere. Geographic
diversity is also extremely important for the project. That being
said, if we can get good geographic diversity while only paying for
larger nodes it might be more cost-effective. Again, this might need
(further?) research.

—Sam


- -- 
Sam Whited
pub 4096R/EC2C9934

SamWhited.com
s...@samwhited.com
404.492.6008


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=CFjY
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Call for discussion: turning funding into more exit relays

2012-07-24 Thread Sam Whited
On Mon, Jul 23, 2012 at 2:58 PM, Roger Dingledine  wrote:
> Open questions we need to decide about:
>
> 1) What exactly would we pay for?
>

As you said, reimbursing users for hosting is probably the best idea
here, however, we also don't want to get in the situation where users
feel that they _must_ be reimbursed to run an exit relay. What happens
if the sponsors funding dries up in a year and no one wants to donate
bandwidth anymore?

Perhaps only registered companies should be sponsored — as much as I
hate to limit the scope of the project, I think this (might) prevent
abuse to a certain extent. Individuals who wanted to run an exit relay
of their own could still do so, they would just have to use some of
the money to form an LLC (or whatever their countries equivalent is if
the scope of this project extends outside of the US). This gives them
a bit more of an incentive to separate their Tor node form their
personal server/computing resources (in the form of limited
liability), which they should probably be doing anyways.

> I think we should aim to constrain ourselves to talking about >=100mbit
> exits
>

I disagree; as others have said, lots of 10mbit relays will do as much
for the network as a few 100mbit relays. Most peoples use case is
simply checking email, browsing the web, reading news, etc. which
don't necessarily need a huge 100mbit relay.

> 2) Should we fund existing relays or new ones?
>

It's probably not wise to distinguish between the two. If you only
fund new relays, you may see a lot of old relays shut down (and then
restarted as "new relays" to get funding). So you might as well just
sponsor both. More thoughts on this in a bit.

> - Should we prefer big collectives like torservers, noisetor, CCC,
> dfri.se, and riseup (which can get great bulk rates on bandwidth and are
> big enough to have relationships with local lawyers and ISPs), or should
> we prefer individuals since they maximize our operator diversity? I think
> "explore both approaches" is a fine first plan.
>

"Explore both approaches" sounds good; I think we'll find that
operator diversity leads to a healthier (more anonymous) network.
Again, I lean towards small guys that will run a few nodes at
different data centers, but not Sole proprietorship's.

> - For existing relays who pay for hosting…

Picking a certain monthly transfer target might solve this; so
existing relays that are fast could apply for aid, and it would give
slower relays incentive to speed up. The challenge then becomes, where
do we set this cutoff? I'm inclined to think it could be kept
relatively low and still be very beneficial for the network.


> the Tor network must not end up
> addicted to external funding. So long as everybody is running an exit
> relay because they want to save the world, I think we should be fine.
>

This is the core of the entire discussion. We might also consider only
funding relays in areas where we need the diversity by taking into
account…

> There's network diversity (AS / upstream network topology), organization
> and operator diversity, jurisdictional (country) diversity, funding
> diversity, data-center diversity, and more.
>

…this stuff.

>
> 7) How do we audit / track the sponsored relays?
>
> How should we check that your 100mbit relay is really working? What do
> we measure to confirm its capacity? To a first approximation I'm fine
> assuming that nobody is going to try to cheat (say, by colluding with
> an ISP to write legit-looking invoices but then just split the money).
>

Probably better to monitor this carefully from the get-go. Sponsors
like to know where their money is going, and continued funding could
hinge on it.

> Then I'll send individual emails to exit relay operators pointing them
> to it and asking for their feedback
>

Consider asking some of the faster / more stable non-exit relay
operators as well. Many of these folks (myself included) have run an
exit relay at one point or another and stopped—or want to run an exit
but won't—because of the financial burden, or because of legal
ramifications, etc.

Some of them might want to run an exit relay, or change their existing
nodes to exit relays if they could only get a bit of funding to help
cover bandwidth and separate their personal resources / business from
their exit node(s) (via a new server, or a separate business entity,
etc.)


Best,
Sam


-- 
Sam Whited
pub 4096R/EC2C9934

SamWhited.com
s...@samwhited.com
404.492.6008
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays