NAT "firewall").
I cannot have my personal VPS seen as a Tor node, so cannot do that.
Gerry
-Original Message-
From: tor-relays On Behalf Of
David Goulet
Sent: 25 February 2021 13:16
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] IPv6
On 24 Feb (12:02:11), Dr Gera
Thinking of IPv6:
How far has the team got in implementing IPv6 only OR port facility ?
Currently you can only run tor relay of any sort if there is open IPv4 OR port
to the internet. This is getting a bit quaint.
I am sure I am not alone in having much wasted bandwidth that could be
Fixed it by installing from deb file.
-Original Message-
From: Dr Gerard Bulger
Sent: 21 February 2021 19:09
To: 'tor-relays@lists.torproject.org'
Subject: Nyx
Sorry if wrong forum
Nyx install out of the box, never had this error on starting before Ubuntu
18.04 Trace
Sorry if wrong forum
Nyx install out of the box, never had this error on starting before
Ubuntu 18.04
Traceback (most recent call last):
File "/usr/bin/nyx", line 11, in
load_entry_point('nyx==2.0.4', 'console_scripts', 'nyx')()
File "/usr/lib/python3/dist-packages/pkg_resources/__init__.
IPv6 and port 80 wide open on IPv6.
443 should be the marker as an exit these days.
Gerry
From: tor-relays On Behalf Of Dr
Gerard Bulger
Sent: 11 December 2020 17:14
To: tor-relays@lists.torproject.org
Subject: [tor-relays] No port IPv4 80 so not an called exit even when 443
open wide
It is now out of date that Tor servers are required to have port 80 IPv4
open, even if limited to a single Class A network in order that the relay
can be labelled as an exit. Port 443 should be enough.
For reasons I do not understand, if I open port IPv4 80 to a wider range I
get abuse notic
provider do you use? How much does it cost?
-- Forwarded message --
From: Dr Gerard Bulger mailto:ger...@bulger.co.uk> >
Date: On Tue, Nov 24, 2020 at 08:29 AM
Subject: [tor-relays] Thailand block
To: BRBfGWMz mailto:brbfgwmz@concealed.company> >
I have been run
Done
-Original Message-
From: tor-relays On Behalf Of
Felix
Sent: 24 November 2020 17:05
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Thailand block
Hi Gerry
Running a relay in Thailand is cool :)
Am 23.11.2020 um 09:55 schrieb Dr Gerard Bulger:
> In some w
I have been running an exit (mythaicontribution) in Thailand for 3 Years
(the exit has narrow port 80 range but full 443 and all other less risky
ports open. It has never been that busy as an exit, unlike my other UK and
USA exits of similar profile. I noticed it was off line last week. The
IS
I have had the same today.
Once I left it in this state and next day got bad exit flag, so not sure what
hoovering up actually does, the embarrassing flag took a long time to go.
So when I get those notices I shut tor down as soon as I can, that seems to
stop what they see as an attack i
rex fee credit
> card) but I have no experience with that particular host.
>
> tontu
>
> On 2020-11-09 11:37 a.m., niftybunny wrote:
> > I cant find any prices on the website. What do you get for under a
> dollar?
> >
> >> On 8. Nov 2020, at 23:21, Dr Gerard Bu
Worried about dominance of OVH for relays and exits? How about Google!
Setting up a fast server is SO cheap on their https://cloud.google.com/
platform, it is tempting to set up relays, if not exits there. Looking at
their T&Cs they do not seem to mention TOR or banning running a proxy, but a
Why not run it until they spot it and shut it down?!
-Original Message-
From: tor-relays On Behalf Of mick
Sent: 15 October 2020 11:42
To: tor-relays@lists.torproject.org
Subject: [tor-relays] Shutdown of my digital ocean guard relay
Hi Guys
I today received notification from DO that t
Torrc allows you to exit from a different IP. I thought it a good idea to stop
arbitrary blocking of the advertised Tor exit IP, the captchas and blacklists
that tor users suffer. When IPv6 implemented fully we have a wide range of IPs
to send from on each server.
Perhaps it is not cons
Running from home is not a good idea as high risk for an exit and in many
countries it would get a visit from the police when your hidden users do bad
things. Using 4G/5G many land-line and fibre networks might not work,
as most of these services are now behind CGNAT for IP4 addresses. The wo
I also found failed2ban had much less work to do, banning handful a day, not a
thousand, by stopping ssh password authentication and using private key
authentication. Something I should have done from the start anyway.
It seems when if a server sends public key on attempted login and refuses
pa
If you are on a VPS, a firewall may be external to the server and it is on
the VPS panel. Log into your provider account and VPS settings.
-Original Message-
From: tor-relays On Behalf Of Pham
Minh Duc
Sent: 20 September 2020 07:40
To: tor-relays@lists.torproject.org
Subject: Re: [tor-re
OVH seemed to have upped their game with more information than just
throwing all traffic into "mitigation" which can result in bad exit status,
with no information as to what their systems are detecting as a threat of
denial of service attack.
For the first time I got an email.no mitigation.
I know we should dilute our dependence on OVH, but cheap and seem to ignore
the fact the machine is an exit node.
OVH has a seemingly patented a system to deal with denial of service
attacks. I am not sure what they detect but when they do we get this:
"We have just detected an attack on I
Great news.Well done
We need to be rid of the mandated IPv4 OR port for some situations. There
are now many of us fibre users with 1GB upload and download speeds who have
a reachable range if IPv6 addresses, and we could offer relays and bridges
on a single or pair of IPV6 address with a pin
Where do we get daily builds?
-Original Message-
From: tor-relays On Behalf Of
David Goulet
Sent: 22 July 2020 20:55
To: tor-relays@lists.torproject.org
Subject: [tor-relays] Call for Testing - New Feature: Relay IPv6 Address
Discovery
Greetings everyone!
We've very recently merged upst
Is there any work going on which would allow Tor to work with IPV6 alone?
i.e. no IPV4 OR ports etc.
Gerry
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Conclusion...avoid http, 80 ?
https://blog.duszynski.eu/tor-ip-disclosure-through-http-301-cache-poisoning/
Gerry
Mobile Device
> On 3 Jun 2019, at 9:26 pm, Keifer Bly wrote:
>
> So I am trying to limit as google cloud has strict pricing plans. Perhaps I
> should go back to just running a b
I am getting these warnings, not very often, and the exit (restricted) is
working well otherwise:
"Dec 11 18:07:23.000 [warn] Tried to establish rendezvous on non-OR circuit
with purpose Acting as rendevous (pending)"
Some posts about this elsewhere hinted this warning could be caused by attack
I so far have got away with no abuse with quite a wide range of ports open,
avoiding obvious abuse ports and only allowing port 80 to a single Class A,
chosen belonging to a benign country/service: x.x.x.x/8:80Gets the server
listed as an exit. I have not seen, via arm, anyone use port 80
Direct Exit to a different IP.
I naively thought that the proxy lines in torrc could to that via an https
proxy. Alas that's not what that line is for!
I got an impression from earlier chats a while ago that exiting to a
non-advertised IP was regarded as simply not cricket, in that the interne
exit
relay
Hello Gerry,
Dr Gerard Bulger:
> The DNS 9.9.9.9
>
> https://www.theregister.co.uk/2017/11/20/quad9_secure_private_dns_reso
> lver/
>
> At least is not blocking my exit node IP, simply because it is TOR[sic]!
Nice.
please do not use a filtering DNS servers
The DNS 9.9.9.9
https://www.theregister.co.uk/2017/11/20/quad9_secure_private_dns_resolver/
At least is not blocking my exit node IP, simply because it is TOR!Nice.
So far.
Gerry
___
tor-relays mailing list
tor-relays@lists.torproject.org
ht
Arm says 1568 outbound 151 exit. Since My exit policy blocks abused ports and
has only one /8 range for port 80 I think that is true.
Nyx says 668 outbound 1173 exit. Also nyx does not list the exits by port
number
Gerry
-Original Message-
From: tor-relays [mailto:tor-relays-boun..
How is exit probability counted? Is it only port 80 exit tested? I exit many
1000s of ports, including 443, but not those of high risk of abuse emails and
thus upsetting the ISP. So port 80 along with others are blocked. I realise
no port 80 limits the use of the exit so not expecting so see
So far I have had no abuse emails or complaints after two months on a new
server, using the longer suggested reduced policy list, but I do exclude 80,
which seems safer but limits the role as an exit. But 443 open. I closed other
potential abuse ports such as 22, 8080, 5900.
It's not the compla
-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf Of
Roger Dingledine
Sent: 30 August 2017 16:36
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] DIR Port
On Wed, Aug 30, 2017 at 01:39:34PM +0100, Dr Gerard Bulger wrote:
> DIR p
DIR port on my relay and mini exit as being there on Atlas.
The DIR port is open, indeed the DirPortFrontPage can be seen.
Bandwidth is “fast”
The exit is very limited in scope to avoid abuse claims, so few ports forwarded
such as 443, but not 80. Is that the reason not showing?
Ger
The only way I dared run and exit from home was via a VPN service. Alas the
IP would keep changing, so not that useful. The VPN service was well known to
many services such as BBC so content blocked for copyright reasons. So even
less useful.
Gerry
-Original Message-
From: tor-relays
I wonder if TOR design should now be more supportive of variable IPs and a
spread of IPs for TOR exits. I am not an IT guru.
I gather it was thought to be good manners that the IP of Tor exits were known
to the public. It would at least let recipients know that the originating IP
could not
I would be interested in such a script to SIGHUP each time IP changes if
anyone makes one!
-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of teor
Sent: 03 January 2017 07:32
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Spee
I ran an exit node, but gave up after too many abuse reports that annoyed my
ISP. So I turned al exit ports off, and reports stopped as a rely.After
months and many terabytes of data I get an abuse complaint that my tor IP
has been used for espionage.
"NCSC have been made aware of a repor
I have turned off all exits after worried ISP was forwarding too many abuse
notices. This is pending a solution which, if possible would send all exiting
port data off to a local anonymous proxy or VPN server.
Anonymous proxies and VPN servers seem more impervious or tolerant to abuse
notices
aught with
moral hazard for me. Morally, Tor is about keeping private communications
private, in the hope that more good than bad will come of it.
On 12 Jun 2016 8:40 p.m., "Dr Gerard Bulger" mailto:ger...@bulger.co.uk> > wrote:
Not sure eavesdrop is the right word, since ISPs
ats etc apply)
> On 12 June 2016 at 16:12, Dr Gerard Bulger <mailto:ger...@bulger.co.uk> > wrote:
>> Once TOR
>> exits attempts any filtering where would it stop? It is a slippery slope.
FWIW one of the reasons we have the "pirate" blocks (in the UK) is that t
It is heresy to suggest that Exit relays do anything of a sort, that is
attempt to reject obvious attackers on an IP? Tor is neutral. Once TOR
exits attempts any filtering where would it stop? It is a slippery slope.
I think not, as to extend to other areas would far too complex and have
diminis
p running exits!
On 6/11/2016 1:49 PM, Dr Gerard Bulger wrote:
> My tor exit node has been using a https proxy for a long time with
> great success in that I have had no abuse complaints directed to me and my
VPS
> provider. Until recently.
>
> Traffic has increased as I m
My tor exit node has been using a https proxy for a long time with great
success in that I have had no abuse complaints directed to me and my VPS
provider. Until recently.
Traffic has increased as I made the bandwidth wider, which might be an
explanation.
I am getting complaints directed to
I had a very annoying control freak systems administrator some years back
working on systems I owned, but he sought absolute control so he changed
passwords everywhere. He could not understand how message-of-the-day or
banner would continue to change. To my amusement never mentioned to me the
"sec
-relays] What's this Abuse
> On 20 May 2016, at 11:52, Dr Gerard Bulger wrote:
>
> Point taken. Can admin remove my post?
No, we don't censor our own archives, and we can't censor other public archives.
>
>
>
>
> -Original Message-
>
May 2016, at 11:12, Dr Gerard Bulger wrote:
>
>
> My ISP got a weird Abuse notice with no details. Just said stop. Stop what?
> When we asked what the “abuse” was they sent a 1mb.gz snapshop of their log
> files.
>
> There were a few references to my IP, but I have no i
hrieb Dr Gerard Bulger:
> 5.77.47.142 - - [16/May/2016:15:19:56 -0400] "POST /admin/ HTTP/1.1"
> 302
> 1079 "http://www.liteline.com/admin/"; "Mozilla/5.0 (Windows NT 6.1;
> rv:38.0) Gecko/20100101 Firefox/38.0"
>
On 05/20/2016 05:12 PM, Dr Gerard Bulger wrote:
> I like to respond in a robust manner.
What hinder you to answer politely ?
Did not mean that; might be lost in translation. One can be robust without
being rude. I would like to give a knowledgeable answer. There seems to be
a whole indus
My ISP got a weird Abuse notice with no details. Just said stop. Stop what?
When we asked what the "abuse" was they sent a 1mb.gz snapshop of their log
files.
There were a few references to my IP, but I have no idea what was seen as
abuse:Can anyone tell me what they are fussed about?
But it does happen. BBC block you on bbc iPlayer for example if your IP is
listed as TOR anything. One reason I have my exit node a different IP. BBC
reasoning maybe copyright and that still you have to be UK based to access
the site, but annoying when non-tor use could not access as well. To be
://torstatus.blutmagie.de
So no longer worried
ThanksSent from Samsung tablet
Original message
From: Josef Stautner
Date: 15/05/2016 12:23 (GMT+00:00)
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Tor Stats
Am 15.05.2016 um 13:14 schrieb Dr Gerard Bulger:
>
Tor Atlas and https://torstatus.blutmagie.de does not report any activity
in graphs for my Tor exit. This data has been missing for some days now.
Says online. Not stable yet as I keep it rebooting my new server once a day
for 30 mins as checking if there are any errors. Which leads to another
q
The ISP holding my VPS kindly forwards the abuse complaints for me to answer.
The ISP needs to know that I have done so, and “have taken steps”. I think
the ISP pretends not to know this is from a TOR exit node.
After I connected outgoing TOR to another proxy service (VPN normally but
curr
...@lists.torproject.org] On Behalf
Of grarpamp
Sent: 30 April 2016 18:47
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Search warrant and house search because of an exit
in DE
On 4/30/16, Dr Gerard Bulger wrote:
> Once I set my outgoing connection via a UK and very fast and
> supposedly &quo
-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of Tim Wilson-Brown - teor
Sent: 30 April 2016 12:17
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Search warrant and house search because of an exit
in DE
> On 30 Apr 2016, at 19:34, Dr Gerard Bul
I would have the courage to run a Tor Exit from home; home internet in
London too poor to do that anyway, and do not have two IPs here. The likes
of BBC ban you if your IP is listed as an exit node.
My VPS hosting company sent me various abuse notices once every two months,
which I thought as qu
with iptables ?
On 28/04/16 14:33, Dr Gerard Bulger wrote:
> Currently the rules are thus:
> -A INPUT -p tcp -m tcp --dport 9030 -j ACCEPT -A INPUT -p tcp -m tcp
> --dport 9051 -j ACCEPT Which opens up those TOR ports on BOTH my IPs,
> not what I want (OK torrc is listening to t
The likes of GRC.COM make you think that any port not blocked, stealth is bad.
I wondered why if nothing there. But you can never be certain there is nothing.
I have my TOR Exit node on separate IP form my main server, shared on eth0 as
eth0:1
I would like to close as many ports as possible on
What if you want to shutdown forever.
I am in the process of moving mine to another server. How do I stop tor
atlas listing the old one?
-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of Tim Wilson-Brown - teor
Sent: 28 April 2016 10:30
To
59 matches
Mail list logo