Re: [tor-relays] Tor Relay Setup

2018-02-25 Thread Conrad Rockenhaus
You're currently not measured, per atlas it's been only 12 hours since this 
node has been online. It takes about three days to get a nominal measurement. 
I had a node on a 200mbps connection sit at 0bps for two days straight, then 
it finally had some movement in the evening of day three. I would wait at least 
another day and a half before worrying about this issue because it does take 
some time for the bandwidth measurements to complete.

Please also review: https://blog.torproject.org/lifecycle-new-relay

Regards,

Conrad

On Sunday, February 25, 2018 4:49:00 PM CST Gabe D. wrote:
> https://metrics.torproject.org/rs.html#details/53CDD268FAD52B0236A4E7F478425
> 9A41C6E3414
> 
> 
> 
> ‐‐‐ Original Message ‐‐‐
> 
> On 24 February 2018 5:59 PM, s7r  wrote:
> > Gabe D. wrote:
> > > Feb 24 10:45:08.668 \[notice\] Tor 0.3.2.9 (git-64a719dd25a21acb)
> > > running on Linux with Libevent 2.0.19-stable, OpenSSL 1.0.1t, Zlib
> > > 1.2.7, Liblzma N/A, and Libzstd N/A.
> > > 
> > > Feb 24 10:45:08.668 \[notice\] Tor can't help you if you use it wrong!
> > > Learn how to be safe at https://www.torproject.org/downl
> > > oad/download#warning
> > > 
> > > Feb 24 10:45:08.668 \[notice\] Read configuration file "/etc/tor/torrc".
> > > 
> > > Feb 24 10:45:08.671 \[notice\] Based on detected system memory,
> > > MaxMemInQueues is set to 2891 MB. You can override this by sett ing
> > > MaxMemInQueues by hand.
> > > 
> > > Feb 24 10:45:08.671 \[notice\] Scheduler type KIST has been enabled.
> > > 
> > > Feb 24 10:45:08.671 \[notice\] Opening Socks listener on 127.0.0.1:9050
> > > 
> > > Feb 24 10:45:08.671 \[notice\] Opening Control listener on
> > > 127.0.0.1:9051
> > > 
> > > Feb 24 10:45:08.671 \[notice\] Opening OR listener on 0.0.0.0:9001
> > > 
> > > Feb 24 10:45:08.671 \[notice\] Opening Directory listener on 0.0.0.0:80
> > > 
> > > Feb 24 10:45:08.000 \[notice\] Not disabling debugger attaching for
> > > unprivileged users.
> > > 
> > > Feb 24 10:45:08.000 \[notice\] Parsing GEOIP IPv4 file
> > > /usr/share/tor/geoip.
> > > 
> > > Feb 24 10:45:08.000 \[notice\] Parsing GEOIP IPv6 file
> > > /usr/share/tor/geoip6.
> > > 
> > > Feb 24 10:45:08.000 \[notice\] Configured to measure statistics. Look
> > > for the *-stats files that will first be written to the d ata directory
> > > in 24 hours from now.
> > > 
> > > Feb 24 10:45:08.000 \[warn\] You are running Tor as root. You don't need
> > > to, and you probably shouldn't.
> > > 
> > > Feb 24 10:45:08.000 \[notice\] Your Tor server's identity key
> > > fingerprint is '123'
> > > 
> > > Feb 24 10:45:08.000 \[notice\] Bootstrapped 0%: Starting
> > > 
> > > Feb 24 10:45:09.000 \[notice\] Starting with guard context "default"
> > > 
> > > Feb 24 10:45:09.000 \[notice\] Bootstrapped 80%: Connecting to the Tor
> > > network
> > > 
> > > Feb 24 10:45:10.000 \[notice\] Bootstrapped 85%: Finishing handshake
> > > with first hop
> > > 
> > > Feb 24 10:45:11.000 \[notice\] Bootstrapped 90%: Establishing a Tor
> > > circuit
> > > 
> > > Feb 24 10:45:12.000 \[notice\] Tor has successfully opened a circuit.
> > > Looks like client functionality is working.
> > > 
> > > Feb 24 10:45:12.000 \[notice\] Bootstrapped 100%: Done
> > > 
> > > Feb 24 10:45:12.000 \[notice\] Now checking whether ORPort ***:9001 and
> > > DirPort ***:80 are reachable... (th is may take up to 20 minutes --
> > > look for log messages indicating success)
> > > 
> > > Feb 24 10:45:13.000 \[notice\] Self-testing indicates your DirPort is
> > > reachable from the outside. Excellent.
> > > 
> > > Feb 24 10:45:13.000 \[notice\] Self-testing indicates your ORPort is
> > > reachable from the outside. Excellent. Publishing server d escriptor.
> > > 
> > > Feb 24 10:45:14.000 \[notice\] Performing bandwidth self-test...done.
> > 
> > You need to give us the IP address of the relay so that one can check if
> > 
> > the ORPort is reachable. It should be, since that is indicated in the
> > 
> > log messages but doesn't hurt to check.
> > 
> > It takes some time until you can see it on atlas / relay search, it's
> > 
> > not instant. Give it up to 24 hours. You will see it earlier here (but
> > 
> > not instantly under any circumstances):
> > 
> > https://consensus-health.torproject.org/consensus-health.html
> > 
> > (careful, large page and can take some time to load) by searching for
> > 
> > your nickname or fingerprint - see what the directory authorities have
> > 
> > to say about your relay.
> > 
> > The IP addresses of all relays in the network are public and not
> > 
> > considered sensible information, but I can see a possibility where you
> > 
> > don't want a certain IP address tied to the email you are posting here
> > 
> > with, so it's up to you to decide but you can go to a port checking
> > 
> > website (google it) and check the relay IP address ORPort if open or not.
> > 
> > If yes, wait for 24 hours and check back on relay search.
> > 
> > tor-relays mailing list
> > 
> > tor-relays@lists.torproj

Re: [tor-relays] Tor Relay Setup

2018-02-25 Thread Gabe D.
https://metrics.torproject.org/rs.html#details/53CDD268FAD52B0236A4E7F4784259A41C6E3414



‐‐‐ Original Message ‐‐‐

On 24 February 2018 5:59 PM, s7r  wrote:

> Gabe D. wrote:
> 
> > Feb 24 10:45:08.668 \[notice\] Tor 0.3.2.9 (git-64a719dd25a21acb) running 
> > on Linux with Libevent 2.0.19-stable, OpenSSL 1.0.1t, Zlib 1.2.7, Liblzma 
> > N/A, and Libzstd N/A.
> > 
> > Feb 24 10:45:08.668 \[notice\] Tor can't help you if you use it wrong! 
> > Learn how to be safe at https://www.torproject.org/downl 
> > oad/download#warning
> > 
> > Feb 24 10:45:08.668 \[notice\] Read configuration file "/etc/tor/torrc".
> > 
> > Feb 24 10:45:08.671 \[notice\] Based on detected system memory, 
> > MaxMemInQueues is set to 2891 MB. You can override this by sett ing 
> > MaxMemInQueues by hand.
> > 
> > Feb 24 10:45:08.671 \[notice\] Scheduler type KIST has been enabled.
> > 
> > Feb 24 10:45:08.671 \[notice\] Opening Socks listener on 127.0.0.1:9050
> > 
> > Feb 24 10:45:08.671 \[notice\] Opening Control listener on 127.0.0.1:9051
> > 
> > Feb 24 10:45:08.671 \[notice\] Opening OR listener on 0.0.0.0:9001
> > 
> > Feb 24 10:45:08.671 \[notice\] Opening Directory listener on 0.0.0.0:80
> > 
> > Feb 24 10:45:08.000 \[notice\] Not disabling debugger attaching for 
> > unprivileged users.
> > 
> > Feb 24 10:45:08.000 \[notice\] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
> > 
> > Feb 24 10:45:08.000 \[notice\] Parsing GEOIP IPv6 file 
> > /usr/share/tor/geoip6.
> > 
> > Feb 24 10:45:08.000 \[notice\] Configured to measure statistics. Look for 
> > the *-stats files that will first be written to the d ata directory in 24 
> > hours from now.
> > 
> > Feb 24 10:45:08.000 \[warn\] You are running Tor as root. You don't need 
> > to, and you probably shouldn't.
> > 
> > Feb 24 10:45:08.000 \[notice\] Your Tor server's identity key fingerprint 
> > is '123'
> > 
> > Feb 24 10:45:08.000 \[notice\] Bootstrapped 0%: Starting
> > 
> > Feb 24 10:45:09.000 \[notice\] Starting with guard context "default"
> > 
> > Feb 24 10:45:09.000 \[notice\] Bootstrapped 80%: Connecting to the Tor 
> > network
> > 
> > Feb 24 10:45:10.000 \[notice\] Bootstrapped 85%: Finishing handshake with 
> > first hop
> > 
> > Feb 24 10:45:11.000 \[notice\] Bootstrapped 90%: Establishing a Tor circuit
> > 
> > Feb 24 10:45:12.000 \[notice\] Tor has successfully opened a circuit. Looks 
> > like client functionality is working.
> > 
> > Feb 24 10:45:12.000 \[notice\] Bootstrapped 100%: Done
> > 
> > Feb 24 10:45:12.000 \[notice\] Now checking whether ORPort ***:9001 and 
> > DirPort ***:80 are reachable... (th is may take up to 20 minutes -- look 
> > for log messages indicating success)
> > 
> > Feb 24 10:45:13.000 \[notice\] Self-testing indicates your DirPort is 
> > reachable from the outside. Excellent.
> > 
> > Feb 24 10:45:13.000 \[notice\] Self-testing indicates your ORPort is 
> > reachable from the outside. Excellent. Publishing server d escriptor.
> > 
> > Feb 24 10:45:14.000 \[notice\] Performing bandwidth self-test...done.
> 
> You need to give us the IP address of the relay so that one can check if
> 
> the ORPort is reachable. It should be, since that is indicated in the
> 
> log messages but doesn't hurt to check.
> 
> It takes some time until you can see it on atlas / relay search, it's
> 
> not instant. Give it up to 24 hours. You will see it earlier here (but
> 
> not instantly under any circumstances):
> 
> https://consensus-health.torproject.org/consensus-health.html
> 
> (careful, large page and can take some time to load) by searching for
> 
> your nickname or fingerprint - see what the directory authorities have
> 
> to say about your relay.
> 
> The IP addresses of all relays in the network are public and not
> 
> considered sensible information, but I can see a possibility where you
> 
> don't want a certain IP address tied to the email you are posting here
> 
> with, so it's up to you to decide but you can go to a port checking
> 
> website (google it) and check the relay IP address ORPort if open or not.
> 
> If yes, wait for 24 hours and check back on relay search.
> 
> tor-relays mailing list
> 
> tor-relays@lists.torproject.org
> 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Setup

2018-02-24 Thread Conrad Rockenhaus
Ok, so you’re going to censor your IP address even though it’s getting 
broadcasted worldwide through not only the atlas search engine, but the Tor 
network itself. 

If you run a relay, expect to have your IP address broadcasted. In addition, if 
you run a relay, expect that that some way to contact you is associated with 
that IP address. We give up our anonymity so others may have it.

Conrad Rockenhaus
(254) 292-3350

On Feb 24, 2018, at 3:03 PM, teor  wrote:

>>> Feb 24 10:45:08.000 [warn] You are running Tor as root. You don't need to, 
>>> and you probably shouldn't.
> 
> 
> You should set the User option to an unprivileged user in your torrc.
> 
>> On 25 Feb 2018, at 04:59, s7r  wrote:
>> 
>> The IP addresses of all relays in the network are public and not
>> considered sensible information, but I can see a possibility where you
>> don't want a certain IP address tied to the email you are posting here
>> with, so it's up to you to decide but you can go to a port checking
>> website (google it) and check the relay IP address ORPort if open or not.
> 
> From the log messages, it seems like the ORPort and DirPort are
> reachable from at least a few relays. But they need to be reachable all
> over the world.
> 
>> If yes, wait for 24 hours and check back on relay search.
> 
> Relay search appears to be down right now.
> 
> T
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Setup

2018-02-24 Thread teor
>> Feb 24 10:45:08.000 [warn] You are running Tor as root. You don't need to, 
>> and you probably shouldn't.


You should set the User option to an unprivileged user in your torrc.

> On 25 Feb 2018, at 04:59, s7r  wrote:
> 
> The IP addresses of all relays in the network are public and not
> considered sensible information, but I can see a possibility where you
> don't want a certain IP address tied to the email you are posting here
> with, so it's up to you to decide but you can go to a port checking
> website (google it) and check the relay IP address ORPort if open or not.

From the log messages, it seems like the ORPort and DirPort are
reachable from at least a few relays. But they need to be reachable all
over the world.

> If yes, wait for 24 hours and check back on relay search.

Relay search appears to be down right now.

T
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Setup

2018-02-24 Thread s7r
Gabe D. wrote:
> Feb 24 10:45:08.668 [notice] Tor 0.3.2.9 (git-64a719dd25a21acb) running on 
> Linux with Libevent 2.0.19-stable, OpenSSL 1.0.1t,
>   Zlib 1.2.7, Liblzma N/A, and Libzstd N/A.
> Feb 24 10:45:08.668 [notice] Tor can't help you if you use it wrong! Learn 
> how to be safe at https://www.torproject.org/downl
>  oad/download#warning
> Feb 24 10:45:08.668 [notice] Read configuration file "/etc/tor/torrc".
> Feb 24 10:45:08.671 [notice] Based on detected system memory, MaxMemInQueues 
> is set to 2891 MB. You can override this by sett  
>ing MaxMemInQueues by hand.
> Feb 24 10:45:08.671 [notice] Scheduler type KIST has been enabled.
> Feb 24 10:45:08.671 [notice] Opening Socks listener on 127.0.0.1:9050
> Feb 24 10:45:08.671 [notice] Opening Control listener on 127.0.0.1:9051
> Feb 24 10:45:08.671 [notice] Opening OR listener on 0.0.0.0:9001
> Feb 24 10:45:08.671 [notice] Opening Directory listener on 0.0.0.0:80
> Feb 24 10:45:08.000 [notice] Not disabling debugger attaching for 
> unprivileged users.
> Feb 24 10:45:08.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
> Feb 24 10:45:08.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
> Feb 24 10:45:08.000 [notice] Configured to measure statistics. Look for the 
> *-stats files that will first be written to the d 
> ata directory in 24 hours from now.
> Feb 24 10:45:08.000 [warn] You are running Tor as root. You don't need to, 
> and you probably shouldn't.
> Feb 24 10:45:08.000 [notice] Your Tor server's identity key fingerprint is 
> '123'
> Feb 24 10:45:08.000 [notice] Bootstrapped 0%: Starting
> Feb 24 10:45:09.000 [notice] Starting with guard context "default"
> Feb 24 10:45:09.000 [notice] Bootstrapped 80%: Connecting to the Tor network
> Feb 24 10:45:10.000 [notice] Bootstrapped 85%: Finishing handshake with first 
> hop
> Feb 24 10:45:11.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
> Feb 24 10:45:12.000 [notice] Tor has successfully opened a circuit. Looks 
> like client functionality is working.
> Feb 24 10:45:12.000 [notice] Bootstrapped 100%: Done
> Feb 24 10:45:12.000 [notice] Now checking whether ORPort ***:9001 and DirPort 
> ***:80 are reachable... (th 
> is may take up to 20 minutes -- look for log messages indicating success)
> Feb 24 10:45:13.000 [notice] Self-testing indicates your DirPort is reachable 
> from the outside. Excellent.
> Feb 24 10:45:13.000 [notice] Self-testing indicates your ORPort is reachable 
> from the outside. Excellent. Publishing server d  
>escriptor.
> Feb 24 10:45:14.000 [notice] Performing bandwidth self-test...done.
> 

You need to give us the IP address of the relay so that one can check if
the ORPort is reachable. It should be, since that is indicated in the
log messages but doesn't hurt to check.

It takes some time until you can see it on atlas / relay search, it's
not instant. Give it up to 24 hours. You will see it earlier here (but
not instantly under any circumstances):

https://consensus-health.torproject.org/consensus-health.html

(careful, large page and can take some time to load) by searching for
your nickname or fingerprint - see what the directory authorities have
to say about your relay.

The IP addresses of all relays in the network are public and not
considered sensible information, but I can see a possibility where you
don't want a certain IP address tied to the email you are posting here
with, so it's up to you to decide but you can go to a port checking
website (google it) and check the relay IP address ORPort if open or not.

If yes, wait for 24 hours and check back on relay search.



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Setup

2018-02-24 Thread Gabe D.
Feb 24 10:45:08.668 [notice] Tor 0.3.2.9 (git-64a719dd25a21acb) running on 
Linux with Libevent 2.0.19-stable, OpenSSL 1.0.1t,  
Zlib 1.2.7, Liblzma N/A, and Libzstd N/A.
Feb 24 10:45:08.668 [notice] Tor can't help you if you use it wrong! Learn how 
to be safe at https://www.torproject.org/downl  
   oad/download#warning
Feb 24 10:45:08.668 [notice] Read configuration file "/etc/tor/torrc".
Feb 24 10:45:08.671 [notice] Based on detected system memory, MaxMemInQueues is 
set to 2891 MB. You can override this by sett   
  ing MaxMemInQueues by hand.
Feb 24 10:45:08.671 [notice] Scheduler type KIST has been enabled.
Feb 24 10:45:08.671 [notice] Opening Socks listener on 127.0.0.1:9050
Feb 24 10:45:08.671 [notice] Opening Control listener on 127.0.0.1:9051
Feb 24 10:45:08.671 [notice] Opening OR listener on 0.0.0.0:9001
Feb 24 10:45:08.671 [notice] Opening Directory listener on 0.0.0.0:80
Feb 24 10:45:08.000 [notice] Not disabling debugger attaching for unprivileged 
users.
Feb 24 10:45:08.000 [notice] Parsing GEOIP IPv4 file /usr/share/tor/geoip.
Feb 24 10:45:08.000 [notice] Parsing GEOIP IPv6 file /usr/share/tor/geoip6.
Feb 24 10:45:08.000 [notice] Configured to measure statistics. Look for the 
*-stats files that will first be written to the d   
  ata directory in 24 hours from now.
Feb 24 10:45:08.000 [warn] You are running Tor as root. You don't need to, and 
you probably shouldn't.
Feb 24 10:45:08.000 [notice] Your Tor server's identity key fingerprint is '123'
Feb 24 10:45:08.000 [notice] Bootstrapped 0%: Starting
Feb 24 10:45:09.000 [notice] Starting with guard context "default"
Feb 24 10:45:09.000 [notice] Bootstrapped 80%: Connecting to the Tor network
Feb 24 10:45:10.000 [notice] Bootstrapped 85%: Finishing handshake with first 
hop
Feb 24 10:45:11.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
Feb 24 10:45:12.000 [notice] Tor has successfully opened a circuit. Looks like 
client functionality is working.
Feb 24 10:45:12.000 [notice] Bootstrapped 100%: Done
Feb 24 10:45:12.000 [notice] Now checking whether ORPort ***:9001 and DirPort 
***:80 are reachable... (th is 
may take up to 20 minutes -- look for log messages indicating success)
Feb 24 10:45:13.000 [notice] Self-testing indicates your DirPort is reachable 
from the outside. Excellent.
Feb 24 10:45:13.000 [notice] Self-testing indicates your ORPort is reachable 
from the outside. Excellent. Publishing server d
 escriptor.
Feb 24 10:45:14.000 [notice] Performing bandwidth self-test...done.






‐‐‐ Original Message ‐‐‐

On 24 February 2018 5:40 PM, teor  wrote:

> > On 25 Feb 2018, at 04:23, Gabe D. ga...@protonmail.com wrote:
> > 
> > Hey Guys,
> > 
> > Ive an issue... I wanted to aid the network and setup a tor exit node, 
> > however its failing to do so, everything looks perfect config wise and it 
> > says "publishing server descriptor" no errors but the node never shows up 
> > in tor atlas, is there something i may be doing wrong?
> > 
> > This is my config:
> > 
> > ORPort 9001
> > 
> > ExitRelay 1
> > 
> > Nickname **
> > 
> > ContactInfo **
> > 
> > DirPort 80
> > 
> > DisableDebuggerAttachment 0
> > 
> > ControlPort 9051
> > 
> > CookieAuthentication 1
> 
> What does Tor say in its logs when it starts up?
> 
> We need to see the all the lines up to "publishing descriptor".
> 
> Is your relay on a public IP address?
> 
> T
> 
> tor-relays mailing list
> 
> tor-relays@lists.torproject.org
> 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Setup

2018-02-24 Thread Sebastian Urbach


Hi,

Am 24. Februar 2018 18:24:07 schrieb "Gabe D." :


Hey Guys,
Ive an issue... I wanted to aid the network and setup a tor exit node, 
however its failing to do so, everything looks perfect config wise and it 
says "publishing server descriptor" no errors but the node never shows up 
in tor atlas, is there something i may be doing wrong?


This is my config:

ORPort 9001
ExitRelay 1
Nickname **
ContactInfo **
DirPort 80
DisableDebuggerAttachment 0
ControlPort 9051
CookieAuthentication 1

--
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


The Exit Policy ?
--

Sincerely yours / M.f.G. / Sincères salutations

Sebastian Urbach


We can igenore reality, but we cannot ignore
the consequences of ignoring reality.

Alissa Sinowjewna Rosenbaum (1905-1982)


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Setup

2018-02-24 Thread teor

> On 25 Feb 2018, at 04:23, Gabe D.  wrote:
> 
> Hey Guys,
> Ive an issue... I wanted to aid the network and setup a tor exit node, 
> however its failing to do so, everything looks perfect config wise and it 
> says "publishing server descriptor" no errors but the node never shows up in 
> tor atlas, is there something i may be doing wrong?
> 
> This is my config:
> 
> ORPort 9001
> ExitRelay 1
> Nickname **
> ContactInfo **
> DirPort 80
> DisableDebuggerAttachment 0
> ControlPort 9051
> CookieAuthentication 1

What does Tor say in its logs when it starts up?
We need to see the all the lines up to "publishing descriptor".

Is your relay on a public IP address?

T
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Setup

2018-02-24 Thread Jonathan Marquardt
On Sat, Feb 24, 2018 at 12:23:34PM -0500, Gabe D. wrote:
> Ive an issue... I wanted to aid the network and setup a tor exit node, 
> however its failing to do so, everything looks perfect config wise and it 
> says "publishing server descriptor" no errors but the node never shows up in 
> tor atlas, is there something i may be doing wrong?

How long did you wait? It can take a few hours for your relay to show up in 
Atlas. If it still doesn't show up the next day, make sure that your ORPort 
and DirPort are reachable from the internet.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay setup

2014-03-26 Thread curare...@t-online.de
Hi,
should be fine from now on?
changed ssh to very high port.
sadly it seems my consensous weight is lost! :(
cheers, Curare
 
 
-Original-Nachricht-
Betreff: Re: [tor-relays] Tor relay setup
Datum: Tue, 25 Mar 2014 08:21:56 +0100
Von: "curare...@t-online.de" 
An: "tor-relays@lists.torproject.org" 
 
 

Hi, is anything misconfigured?
please tell me how to "change the ssh port"
cheers, Curare
 
-Original-Nachricht-----
Betreff: Re: [tor-relays] Tor relay setup
Datum: Sat, 15 Mar 2014 23:56:57 +0100
Von: I 
An: tor-relays@lists.torproject.org
 
 
You should at least change the ssh port immediately now that you have published the address.

 
Postfach fast voll? Jetzt kostenlos E-Mail Adresse @t-online.de sichern und endlich Platz für tausende Mails haben.http://www.t-online.de/email-kostenlos Postfach fast voll? Jetzt kostenlos E-Mail Adresse @t-online.de sichern und endlich Platz für tausende Mails haben.http://www.t-online.de/email-kostenlos


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay setup

2014-03-25 Thread curare...@t-online.de
Hi, is anything misconfigured?
please tell me how to "change the ssh port"
cheers, Curare
 
-Original-Nachricht-
Betreff: Re: [tor-relays] Tor relay setup
Datum: Sat, 15 Mar 2014 23:56:57 +0100
Von: I 
An: tor-relays@lists.torproject.org
 
 
You should at least change the ssh port immediately now that you have published the address. Postfach fast voll? Jetzt kostenlos E-Mail Adresse @t-online.de sichern und endlich Platz für tausende Mails haben.http://www.t-online.de/email-kostenlos


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay setup

2014-03-23 Thread mick
On Sun, 23 Mar 2014 03:12:47 -0800
I  allegedly wrote:
> 
> I suggested the port change because that is what the VPS operators
> have told me was the first thing to do to avoid being constantly
> 'hacked' which has happened over and over to me. 

Actually I agree that moving ssh from the standard port can be a good
idea. Whilst offering no more than security through obscurity against
a determined adversary it does at least provide some protection against
the mindless robots which constantly probe port 22.

Every little helps.

Mick
-

 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
 http://baldric.net

-



signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay setup

2014-03-23 Thread eugene zhukovsky
Thank you very much Roger for the advice.
I can't seem to make it work, so I'll just try setting it up on a different
box

---
Best wishes,
Eugene Zhukovsky


On Sun, Mar 23, 2014 at 11:12 AM, I  wrote:

> Roger,
>
> I beg your pardon.  I would not want  "fud" to deter new relays. I think
> the risks are overplayed as it is.
>
> It was only that it was published on this list. I published the relay
> nickname somewhere and regret it.
>
> I suggested the port change because that is what the VPS operators have
> told me was the first thing to do to avoid being constantly 'hacked' which
> has happened over and over to me.
>
> It does seem logical to me to have a Tor Project section devoted to
> setting up and securing remote Tor servers.
>
> Robert
>
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay setup

2014-03-23 Thread I
Roger,

I beg your pardon.  I would not want  "fud" to deter new relays. I think the 
risks are overplayed as it is.

It was only that it was published on this list. I published the relay nickname 
somewhere and regret it.

I suggested the port change because that is what the VPS operators have told me 
was the first thing to do to avoid being constantly 'hacked' which has happened 
over and over to me. 

It does seem logical to me to have a Tor Project section devoted to setting up 
and securing remote Tor servers.

Robert



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay setup

2014-03-23 Thread Roger Dingledine
On Sat, Mar 15, 2014 at 08:46:44PM +, eugene zhukovsky wrote:
> I am trying to setup Tor relaying, but it doesn't work so far.
> Windows 8, private vpn.
> I opened ports 80,443,9001 and 9030 (both TCP and UDP) on my Comcast router
> to be forwarded to the box I'm trying to configure.
> I added inbound and outbound rules in the firewall setup for ports
> 80,443,9001 and 9030 (both TCP and UDP)
> but I'm still getting
> 
> Mar 15 15:30:58.654 [Warning] Your server (62.210.167.197:443) has not
> managed to confirm that its ORPort is reachable. Please check your
> firewalls, ports, address, /etc/hosts file, etc.
> Mar 15 15:30:58.658 [Warning] Your server (62.210.167.197:9030) has not
> managed to confirm that its DirPort is reachable. Please check your
> firewalls, ports, address, /etc/hosts file, etc.

Hi Gene,

Assuming your relay is still running, it sure is acting weird. Port 443
answers but doesn't do anything useful, and port 9030 doesn't answer
at all.

I'd say your best bet (since there was quiet here) is to show up to irc
and see if people can help you in a more interactive way.

https://www.torproject.org/about/contact#irc

Thanks for wanting to help,
--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay setup

2014-03-23 Thread Roger Dingledine
On Sat, Mar 15, 2014 at 02:56:36PM -0800, I wrote:
> You should at least change the ssh port immediately now that you have
>published the address.

No, this is bad advice.

First because Tor relays (and their addresses) are public anyway.

And second because having an ssh port exposed to the Internet will draw
enough scans that it had better be secure, regardless of whether running
a Tor relay nearby to it draws any more attention to it.

(Please don't spread fud about the risks of running relays. Especially
as there *are* risks, like any other Internet service.)

--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay setup

2014-03-15 Thread I




You should at least change the ssh port immediately now that you have published the address.



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays