[tor-relays] Tor and Freenode

2015-01-24 Thread Markus Hitter
Hello all, after yesterday watching "State of the Onion", a speech held at 31C3 recently, I spontanuously decided to also run a Tor relay. After some back and forth it appears to be running fine on my OpenWRT based router. The only ORPort is 9001, which is also the only hole punched into the fi

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread David Serrano
On 2015-01-24 12:48:18 (+0100), Markus Hitter wrote: > > http://www.freenode.org/irc_servers.shtml#tor Besides the snippet you quoted, that page says "The primary Tor hidden service address for freenode is frxleqtzgvwkv7oz.onion". This is how Freenode welcomes tor users. "Connections to freenode

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Lukas Erlacher
Hello, I recommend you reread freenode's explanations carefully. > If you do want to be a Tor exit node and still use freenode, you will > have to configure your exit policy to block all of the IRC ports > we use, in addition > to ports 80 and 443

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Markus Hitter
Am 24.01.2015 um 14:28 schrieb David Serrano: > On 2015-01-24 12:48:18 (+0100), Markus Hitter wrote: >> >> http://www.freenode.org/irc_servers.shtml#tor > > Besides the snippet you quoted, that page says "The primary Tor hidden service > address for freenode is frxleqtzgvwkv7oz.onion". This is how

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Lukas Erlacher
Am 24.01.2015 um 14:30 schrieb Lukas Erlacher: I recommend you reread freenode's explanations carefully. I did, and the still open question is, doesn't mean restricting ports 80, 443 and the IRC ones make running the relay a pretty useless operation? Without all these ports, which kinds of com

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread David Serrano
On 2015-01-24 15:40:38 (+0100), Markus Hitter wrote: > > What bugs me is that it's apparently impossible or at least severely > restricted to participate in IRC the normal, non-tor way and to run a Tor > relay at the same time. This doesn't match well, IMHO. Keep in mind that you're running an /e

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Markus Hitter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Am 24.01.2015 um 15:45 schrieb Lukas Erlacher: > Completely disabling exit operation (with the reject *:* line) turns > you into a middle relay. OK, thanks. Jacob Applebaum stated in this speech he wants to have thousands of relays and make using ano

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Lukas Erlacher
Your idealism is noble, but it isn't going to work that way. IRC networks aren't going to open up to Tor more than Freenode already does, for the simple reasons that it makes controlling trolls and spammers absolutely impossible. You should probably run a middle relay until you've learned more

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Markus Hitter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Am 24.01.2015 um 16:21 schrieb Lukas Erlacher: > Your idealism is noble, but it isn't going to work that way. IRC > networks aren't going to open up to Tor more than Freenode already > does, for the simple reasons that it makes controlling trolls and >

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Matthew Anderson
Hi, I've been running a few relays for about a week, so I'm fairly new to all of this fun stuff as well! I think you've missed a few steps, and have over-reacted a bit to the new technology. There are many reasons why you cannot, and should not, connect to the network from an exit relay. B

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Michael Edwards
-BEGIN PGP MESSAGE- Version: GnuPG v2 hQEMA22Nc/OMyTy8AQgAt76bA92YgnGcymH4H+jGorceD36/o6UsQKDGctj22eip BduAfsf+0P+QSz+oeGgzjord/LemSNzL8HfhxRaLvk+HzymNGwrJ23sbC9ftQnbn G/u5F1VCQeYf+JF6I19esTfqa20mvJjk3vgrMkYo3D7q030EjYJGOyxFEd2ajW58 oks8litJzFhHihJlq1d1nJCd+1KOfS9zMVqKulgr5lFJRrft5VPKN7Qz6

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Justaguy
Please send this in an unencrypted form. On 01/24/2015 06:16 PM, Michael Edwards wrote: > -BEGIN PGP MESSAGE- > Version: GnuPG v2 > > hQEMA22Nc/OMyTy8AQgAt76bA92YgnGcymH4H+jGorceD36/o6UsQKDGctj22eip > BduAfsf+0P+QSz+oeGgzjord/LemSNzL8HfhxRaLvk+HzymNGwrJ23sbC9ftQnbn > G/u5F1VCQeYf+JF6I19esTf

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Michael Edwards
Uh sorry, I just sent an encrypted draft email that I meant to delete... Ignore me while I cower in shame in the corner! Mike ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] could smoothing/smearing a consensus weights change makes sense

2015-01-24 Thread Julien ROBIN
I also think that, once a server is running for weeks (or month(s) ?) it could be usefull if the bandwidth authorithy system is able to "lock" a good speed based on the server history. Instead of "rising, falling, rising, falling, rising, falling" in unstable loop, because if it's day or night,

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Markus Hitter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Am 24.01.2015 um 17:16 schrieb Matthew Anderson: > But I have to ask, why would you want to connect to freenode from an > exit relay when you can connect from within? - - It adds unneccessary load to the Tor network. - - It triples general network lo

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Philipp Defner
> Seeing pretty much all participants on this list (a Tor list!) are opposed to > improving the situation of Tor isn't exactly encouraging to write some code > to solve this problem. Perhaps I should return to hacking 3D printers. You should probably read: https://blog.torproject.org/blog/call-

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread cacahuatl
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Markus Hitter: > Am 24.01.2015 um 17:16 schrieb Matthew Anderson: >> But I have to ask, why would you want to connect to freenode >> from an exit relay when you can connect from within? > > - It adds unneccessary load to the Tor network. > Most o

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread David Serrano
On 2015-01-24 20:16:13 (+), cacahuatl wrote: > Markus Hitter: > > - It's a hassle to setup. Proxies and such stuff. > > > Running Tor Browser and setting some options on your IRC client? Tor Browser isn't even needed. Once he has a relay in place, all he has to do is teach the IRC client to c

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Markus Hitter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Am 24.01.2015 um 19:18 schrieb Philipp Defner: > You should probably read: > https://blog.torproject.org/blog/call-arms-helping-internet-services-accept-anonymous-users Thanks for the pointer. Interesting reading indeed. At least /some/ people shari

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Seth
On Sat, 24 Jan 2015 12:32:24 -0800, David Serrano wrote: On 2015-01-24 20:16:13 (+), cacahuatl wrote: Markus Hitter: > - It's a hassle to setup. Proxies and such stuff. > Running Tor Browser and setting some options on your IRC client? Tor Browser isn't even needed. Once he has a relay i

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Markus Hitter
Am 25.01.2015 um 01:46 schrieb Seth: > I run a Tor relay 24/7 at home on a dedicated computer. I like to setup a ZNC > IRC bouncer on the same host have have it connect the Tor relay's SOCKS5 port > via Proxychains. You'll need to authenticate the ZNC Freenode server nick via > SASL if memory se

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Mirimir
On 01/24/2015 04:48 AM, Markus Hitter wrote: > Hello all, > > after yesterday watching "State of the Onion", a speech held at 31C3 > recently, I spontanuously decided to also run a Tor relay. After some > back and forth it appears to be running fine on my OpenWRT based > router. The only ORPort is

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Dave Warren
On 2015-01-24 07:46, Markus Hitter wrote: Without a room there's not much to spam. Unfortunately this is very much not true. There are all sorts of attacks on IRC, including bots that use multiple connections where one collects data from channels and another actually sends the spam via direct