Re: [tor-relays] Bridge operator iat_mode setting

2021-02-24 Thread William Kane
Thank you for running obfs4 bridges with iat_mode != 0, only very few obfs4 bridges support the additional traffic obfuscation in both directions. Kudos to you my friend. - William 2021-02-23 1:18 GMT, torjoy : > Hi All, > > I work with time and frequency references and run some tor bridges.

Re: [tor-relays] IPv6

2021-02-24 Thread Dr Gerard Bulger
Thinking of IPv6: How far has the team got in implementing IPv6 only OR port facility ? Currently you can only run tor relay of any sort if there is open IPv4 OR port to the internet. This is getting a bit quaint. I am sure I am not alone in having much wasted bandwidth that could be

Re: [tor-relays] syn flood iptables rule

2021-02-24 Thread Toralf Förster
On 2/22/21 7:29 PM, William Kane wrote: A hard limit of 9 might be a little too low - then again, a legit, unmodified tor binary would hold it's TCP connection established for as long as needed - Hhm, I'm really under the impression that even 5 or 4 should be enough. If a client connects more

Re: [tor-relays] syn flood iptables rule

2021-02-24 Thread Toralf Förster
On 2/22/21 7:44 PM, Stephen Mollett wrote: Have you tried adding "xt_recent.ip_list_tot=" to your kernel command line? That formula works for most module parameters when their module is built-in, I think. Stephen Yep, that works. Thx. -- Toralf

[tor-relays] Bridge operator iat_mode setting

2021-02-24 Thread torjoy
Hi All, I work with time and frequency references and run some tor bridges. What is the objective of "iat_mode" setting? Is an good timming reference important for this setting? For now, i'm adminstrating 3 briges, one with iat_mode=0, iat_mode=1 and iat_mode=2. Could you explain or forward me

Re: [tor-relays] syn flood iptables rule

2021-02-24 Thread William Kane
>Are there any objections against this approach? A hard limit of 9 might be a little too low - then again, a legit, unmodified tor binary would hold it's TCP connection established for as long as needed - so maybe this will block some of the attacks, but it's very basic - I'd try to go with a

Re: [tor-relays] syn flood iptables rule

2021-02-24 Thread Stephen Mollett
Hi, On 22/02/2021 14:27, Toralf Förster wrote: Unfortunately I cannot change the "ip_list_tot" of "xt_recent" b/c I do use a non-modular kernel. Does anybody knows a circumvention? Have you tried adding "xt_recent.ip_list_tot=" to your kernel command line? That formula works for most module

Re: [tor-relays] Stable flag and client load

2021-02-24 Thread enrollado
Entiendo. The distribution method is HTTPS. I see messages on this list about hundreds of connected clients. That has never happened on this bridge. I wondered if I was doing something wrong. Thank you. ~~~ No me preguntas nada, no te diré una mentira. Enrollado

Re: [tor-relays] IPv6 auto-discovery vs. privacy extensions

2021-02-24 Thread Casper
Onion Operator a écrit : >Saluton, >My relay started to log this message since 0.4.5.5: >Auto-discovered IPv6 address [...]:443 has not been found reachable. >However, IPv4 address is reachable. Publishing server descriptor without >IPv6 address. [2 similar message(s)

[tor-relays] IPv6 auto-discovery vs. privacy extensions

2021-02-24 Thread Onion Operator
Saluton, My relay started to log this message since 0.4.5.5: Auto-discovered IPv6 address [...]:443 has not been found reachable. However, IPv4 address is reachable. Publishing server descriptor without IPv6 address. [2 similar message(s) suppressed in last 2400 seconds] I think it started

Re: [tor-relays] Bridge operator iat_mode setting

2021-02-24 Thread Felix
Hi Luiz Am 23.02.2021 um 02:18 schrieb torjoy: I work with time and frequency references and run some tor bridges. What is the objective of "iat_mode" setting? Is an good timming reference important for this setting? For now, i'm adminstrating 3 briges, one with iat_mode=0, iat_mode=1 and