sideration :blush:).
so seems like a won't implement for me atm anyway.
On 10/3/23 10:30, Toralf Förster wrote:
On 10/3/23 10:24, Fran via tor-relays wrote:
Any ideas?
yes - DNAT the remote prometheus ip to the local address [1]
[1]
https://github.com/toralf/tor-relays/blob/main/playbo
Hey there,
snowflake v2.6.1 offers a prometheus metrics endpoint `-metrics`.[1]
Unfortunately I am unable to figure out how to let it listen to
non-localhost address:
tcp LISTEN 04096 127.0.0.1:
0.0.0.0:* users:(("snowflake",pid=402248,f
Hey,
the paper is from August 2018 (if I looked at the correct one), not so
recent :)
And e. g. Philipp Winter questions the usefulness of iat_mode:
> substantial performance penalty for a dubious and poorly understood
privacy gain
https://lists.torproject.org/pipermail/tor-relays/2021-Feb
Philipp Winter regarding iat mode:
>The feature introduces a substantial performance penalty for a dubious
>and poorly understood privacy gain. If I were to write an algorithm to
>detect obfs4, I wouldn't bother dealing with its flow properties; there
>are easier ways to identify the protocol.
Hej,
thanks David!
In the meantime, we know that the "CellStatistics" option is very very memory
hungry and so you could disable that one and see if this stabilizes thing for
you.
This helped regarding the memory consumption. It's still up to 6G
The current network conditions are abnormal a
Hey,
1) what exactly do I add to my in-addr.arpa zone file?
This has to be done on the DNS server which is responsible for the
reverse DNS zone of the IP address prefix. Some providers offer to set
the PTR records for customers. You need a domain name for this.
If you tor node has the IP ad
Hey Cristian,
you could run both, but some people think it's not the best idea because
if one service gets blocked the other one is also affected.
With dynamic IP addresses, also if they're only changing every other few
days, its probably better to run a snowflake proxy as obtaining new
brid
Hej,
TLS handshake succeeds for me from my laptop:
$ curl --insecure https://[2a02:a446:5ef1:1:d072:53ff:fef4:ea59] -v
* Trying 2a02:a446:5ef1:1:d072:53ff:fef4:ea59:443...
* Connected to 2a02:a446:5ef1:1:d072:53ff:fef4:ea59
(2a02:a446:5ef1:1:d072:53ff:fef4:ea59) port 443 (#0)
* ALPN, offerin
Hey,
never mind, with some coffee I find them :blush:
Not blocked in Russia (yet) \o/
Thanks anyway and have a great weekend!
Fran
On 3/4/22 19:08, Fran via tor-relays wrote:
Hey,
stuff like this happens meskio, thanks for the effort!
Slightly off topic:
I couldn't find my bridges i
Hey,
stuff like this happens meskio, thanks for the effort!
Slightly off topic:
I couldn't find my bridges in the files under
https://metrics.torproject.org/collector/recent/bridge-pool-assignments/
But they seem to work (although not getting much traffic):
Heartbeat: Tor's uptime is 16 days
Hey Olaf,
I'd try the following:
- restart tor
- restart whole server
- try setting:
Address 107.189.14.123
in torrc.
I have no experience with nyx and if it displays logs from tor or if
some unicorns are in between, so maybe take a look if the logs written
by tor itself differ from the nyx
Thanks meskio, this helped a lot to clarify things.
So I thought of trying to run a bride and a snowflakeproxy on one VM
with individual IP addressing in v4 and v6 for each by adding secondary
addresses to to the WAN interface. But after compiling the go binary I
fail to find out how to tell s
Hey Gus,
thanks for your answer.
You should not run both on the same IP address. If a censor blocks your
obfs4 bridge IP, a user won't be able to connect using your snowflake
proxy.
Let me try to rephrase:
I don't know how bridges with obfs4 vs snowflake work in hiding that
they provide acc
Hej Eldalië,
thanks for your answer.
Tor project runs campaigns for running more bridges [1-3] because there
was/is (?) a shortage and/or countries changed their censorship policy
(e. g. Russia). So I'd say the statement in the FAQ is a little bit to
simple. At different times a shortage of on
Hey,
I just saw, that it's possible to run snowflake[1] not only as browser
plugin, but also standalone. So I am wondering what makes more sense,
run a bridge with obsf4 or run a snowflake instance instead of a bridge.
Or would it even make sense to install both on one server?
And generally,
Hej David,
Thanks for reporting and investigating!! :)
Thank you for fixing and implementing in the first place!
Really looking forward to see some nice graphs showing how many
people use our services via onion.
BTW: Implementation of nusenu feature request[1] for exposing more relay
health
Hej,
taking another look and comparing it to onion_services exporter there is
a slight difference in the metrics output.
prometheus-onion-service-exporter:
onion_service_up{address="foobar:587",name="mail_v3_587",type="tcp"} 1
vs output from tor:
tor_hs_app_write_bytes_total{onion=foobar,po
Hej,
I just found out about the integrated prometheus exporter in tor - yay,
thanks for that!
I can scrape it with curl:
$ curl http://:9035/metrics
# HELP tor_hs_rdv_num_total Total number of rendezvous circuit created
# TYPE tor_hs_rdv_num_total counter
tor_hs_rdv_num_total{onion=} 4
# HELP
18 matches
Mail list logo