[tor-relays] DoS attacks are real (probably)

2017-12-11 Thread Alex Xu
tl;dr: run this: conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c | sort -n ignore numbers less than 10. the remaining output should consist of the following: 1. your IP 2. LeaseWeb and Online.net IPs (use rDNS and whois) 3. mobile networks block IPs in set 2 from acces

Re: [tor-relays] DoS attacks are real (probably)

2017-12-11 Thread Alex Xu
Quoting Felix (2017-12-11 17:07:30), as excerpted > Hi Alex > > Great points. > > > conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c | > > sort -n > > On FreeBSD one can do: > yeah, the optimal rule would ban "bad IPs" after some threshold of connections, like "if one

Re: [tor-relays] Configuring your relay

2018-01-09 Thread Alex Xu
Quoting Tommy Collison (2018-01-09 19:55:47) > Hi there, > > I'm Tor's writer/editor. We just got a question on Twitter that I'm > stumped on, and I had a quick look through the documentation and didn't > find anything. Can anyone shed some light? > > - Can you set up a relay to provide more band

Re: [tor-relays] atlas.tpo version aggregate page

2018-01-27 Thread Alex Xu
Quoting nusenu (2018-01-27 10:31:00) > > > Iain Learmonth: > > https://atlas.torproject.org/#aggregate/version > > How can people find that page on atlas.torproject.org without knowing the > full URL? 1. https://atlas.torproject.org/ 2. "Advanced Search" 3. "by Version" (at the bottom) ___

Re: [tor-relays] lets stop using central big DNS resolvers (Google, Level3, OpenDNS, Quad9, Cloudflare)

2018-05-13 Thread Alex Xu
sounds like something that could be scripted. Quoting nusenu (2018-05-10 22:16:00) > Dear Exit Relay Operators, > > I'd like to invite you to check your exit's DNS resolver by > having a look at the following list of exits using resolvers > outside their AS (especially if it is Google, OpenDNS,

Re: [tor-relays] Verizon AS701 blocking Tor consensus server tor26 (86.59.21.38)

2018-05-16 Thread Alex Xu
Quoting Roger Dingledine (2018-05-16 15:05:29) > The fix (if my theory is right) would be to reach whatever engineer made > this leap, and teach them about Tor. But it will be extra challenging > because they don't even know that there's something they need to learn. like the fact that malware can

Re: [tor-relays] Bridge to Relay Balance Notice

2018-05-18 Thread Alex Xu
As far as I know, bridges are currently not under heavy load. This is because not everyone connects via bridge. Moreover, even if everyone did, and nobody used onion services, the total bridge bandwidth should be exactly 1/4 the total bandwidth. Onion services require 5 (or is it 6? I think it's 5

Re: [tor-relays] Tor relay problem

2019-05-17 Thread Alex Xu
Quoting Roger Dingledine (2019-05-16 22:24:47) > On Thu, May 16, 2019 at 06:56:10PM +, findmei wrote: > > May 15 14:42:13.000 [warn] Unable to stat resolver configuration in > > '/etc/resolv.conf': Permission denied > > This one is weird and unexpected. Your relay can't do any dns resolves >

Re: [tor-relays] Running on a Raspberry Pi

2019-09-10 Thread Alex Xu
Quoting William Denton (2019-09-10 02:16:30) > I'm reconfiguring things and decided to move a relay from an old laptop to a > Raspberry Pi. I tried it on a Pi Zero W, which is very cheap but also pretty > slow, and it just didn't work. Now I'm trying it on a Pi Four (which has > four > CPUs a

Re: [tor-relays] TCP CCA for Tor Relays (and especially Bridges)

2020-01-20 Thread Alex Xu
Quoting Iain Learmonth (2020-01-20 16:00:01) > Last time I looked you could not switch TCP congestion control algorithm > in Linux per-namespace (maybe you can now and you don't need to have > multiple VMs). It's been allowed for about two years now [0], but you don't need it anyways. Trying out n

Re: [tor-relays] My relay appear down when it's actually up

2020-07-11 Thread Alex Xu (Hello71)
Excerpts from trinity Pointard's message of July 11, 2020 7:12 am: > Hi, > > Since a few days, my relay A8503903F97FF27F5D1C3CA38817329F581925E6 > appear down according to metrics.torproject.org, and is not getting > the Running flag from 6 out of 9 authorities according to > consensus-health.torp

Re: [tor-relays] Does Tor work with Intel QAT acceleration

2022-04-12 Thread Alex Xu (Hello71) via tor-relays
Excerpts from Andreas Bollhalder's message of April 12, 2022 2:12 am: > > Hello Alex > > Thank you for your nice hint ot QAT_Engine. > > Yes, in theory it really seems to be possible. Looking at the Github repo of > the QAT_Engine, it looks like there are still some issues with OpenSSL 3.0: > S

Re: [tor-relays] [Workshop] Sysadmin 101 for (new) relay operators - June 4th @ 1900 UTC

2022-05-23 Thread Alex Xu (Hello71) via tor-relays
Excerpts from gus's message of May 23, 2022 3:42 pm: > ## How to join the workshop > > The workshop is entirely free, and participants need to fill out this > registration form. The event will take place on BigBlueButton, an online > video conference platform, on June 4th at 1900 - 2030 UTC. > >

Re: [tor-relays] FreeBSD 13.1: clock_gettime(CLOCK_MONOTONIC_FAST) ~ 50 % performance gain

2022-06-21 Thread Alex Xu (Hello71) via tor-relays
Excerpts from Andreas Kempe's message of June 21, 2022 11:50 am: > Hello everyone, > > I was doing some profiling on my two relays running on FreeBSD 13.1 > and noticed that they were spending a lot of time in clock_gettime() > which prompted me to have a look at the implementation. > > Time impl

Re: [tor-relays] List number of circuits per connection

2022-10-20 Thread Alex Xu (Hello71) via tor-relays
Excerpts from Logforme's message of October 19, 2022 8:47 am: > I run the relay 8F6A78B1EA917F2BF221E87D14361C050A70CCC3 > > Like most relays mine has been targeted by the DoS attack. Hundreds of > VPS IPs creating millions of IP connections. This I mitigated with rules > in my firewall. Looking

Re: [tor-relays] Relay no longer acting as a gaurd node?

2023-11-11 Thread Alex Xu (Hello71) via tor-relays
Excerpts from Jonathan Proulx's message of November 9, 2023 10:03 am: > Hi All, > > A little while ago one of my relays switched from usually acting as a > guard node to never acting as a guard node: > > https://metrics.torproject.org/rs.html#details/9715C81BA8C5B0C698882035F75C67D6D643DBE3 > >

Re: [tor-relays] Quick Assist Technology and Tor?

2024-06-24 Thread Alex Xu (Hello71) via tor-relays
Excerpts from mail--- via tor-relays's message of June 22, 2024 5:14 pm: > Hi o/, > > During the Tor Operator Meetup I asked about Quick Assist Technology (QAT) > support and was asked to bring it to the tor-relays mailing list so the > network team can take a look at the question. > > In 2025