[tor-relays] Ext Relay Operators: Please Upgrade to 0.4.7.7!

2022-05-04 Thread Mike Perry
-operators/relay-bridge-overloaded/ P.S. There is a known warn bug with vanguards-lite on first startup. It is harmless: https://gitlab.torproject.org/tpo/core/tor/-/issues/40603 -- Mike Perry ___ tor-relays mailing list tor-relays

Re: [tor-relays] cases where relay overload can be a false positive

2022-02-07 Thread Mike Perry
On 1/23/22 5:28 PM, s7r wrote: Mike Perry wrote: We need better DoS defenses generally :/ Of course we need better defense, DoS is never actually fixed, no matter what we do. It's just an arms race the way I see it. Well, I am extremely optimistic about https://gitlab.torproject.or

Re: [tor-relays] cases where relay overload can be a false positive

2022-01-12 Thread Mike Perry
can make it such that an attack has to be "severe" and "ongoing" long enough such that a relay has lost capacity and/or lost the ability to complete circuits, and that relay can't do anything about it, that relay unfortunately should not be used as much. It's not like

Re: [tor-relays] growing guard probability on exits (2020-10-15)

2020-10-16 Thread Mike Perry
g issues with our attempt at solving it, see: https://gitlab.torproject.org/tpo/core/tor/-/issues/16255 -- Mike Perry signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] rerouting exits

2020-10-11 Thread Mike Perry
h this info anymore. I think this and similar ideas should be explored. We're trying to figure out how to put it all together into an approach that makes sense. -- Mike Perry signature.asc Description: OpenPGP digital signature ___ tor-

Re: [tor-relays] BadExit: Rerouting exit relays detected (1) 45.63.11.98

2020-10-11 Thread Mike Perry
don't think there > is any policy change necessary. Ok great! Sometimes I am surprised by their decisions, and I didn't see this one. -- Mike Perry signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] BadExit: Rerouting exit relays detected (1) 45.63.11.98

2020-10-11 Thread Mike Perry
directory authorities are deliberately independent from TPI though, and even what I think is not necessarily what TPI thinks. The dirauths may have different opinions. Coordinating policy of this nature is difficult and requires consensus building. Ag

Re: [tor-relays] Collaborative Bad-Abuse-Sender Blocklist

2020-10-09 Thread Mike Perry
ort the business interests of tech oligarchs that believe that the world should be run by a handful of oligarchical ISPs and email providers, with government-issued identity for all. Fuck that. Good luck, Matt! Thanks for being awesome! P.S. Your mails ended up in my provider's spam filter.

Re: [tor-relays] Malicious Tor relays - post-analysis after two months

2020-10-06 Thread Mike Perry
On 10/5/20 9:15 AM, Georg Koppen wrote: > Mike Perry: >> On 10/3/20 6:38 AM, nusenu wrote: >>>> Me and several tor relay operator friends have questions about >>>> Malicious Tor exit nodes. How do you define a node as malicious ? >>> >>> In

Re: [tor-relays] Malicious Tor relays - post-analysis after two months

2020-10-03 Thread Mike Perry
earch from me, and a couple months of proposal review, with one revision round. Because of these issues on both sides, it has literally been years since we identified this problem area, and got funding to act on it. The good news is we start Monday. 1. https://en.wikipedia.org/wiki/O

Re: [tor-relays] Operator straw poll: Reasons why you use Tor LTS versions?

2019-09-05 Thread Mike Perry
Roman Mamedov: > > On Thu, 05 Sep 2019 02:11:00 +0000 > Mike Perry wrote: > >> 1. "I didn't know that Debian's backports repo has latest-stable Tor!" > > I only looked to backports when I get a warning on the metrics website that my > versions

Re: [tor-relays] Operator straw poll: Reasons why you use Tor LTS versions?

2019-09-04 Thread Mike Perry
teor: >> On 5 Sep 2019, at 12:11, Mike Perry wrote: >> >> Unfortunately, we still have something like 2500 relays on either Tor >> 0.2.9-LTS or Tor 0.3.5-LTS. >> >> What are the reasons for this? My guess is the top 5 most common >> responses are: >&

[tor-relays] Operator straw poll: Reasons why you use Tor LTS versions?

2019-09-04 Thread Mike Perry
or." 4. "I rolled my own custom Tor from git and forgot about it." 5. "My relay machine was not getting any updates at all. Oops." Does anyone have a reason that they think many other relay operators also share? How can we fix that for you, or at least, how can we make it

Re: [tor-relays] Canned Abuse Response

2018-08-04 Thread Mike Perry
___ > > tor-relays mailing list > > tor-relays@lists.torproject.org > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > > _______ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mai

Re: [tor-relays] HoneyPot?

2015-10-29 Thread Mike Perry
legitimate content at some rate. Nobody was using anything more advanced than snort-style regular expressions that matched things that happened to look like exploits. FWIW, I am personally in favor of reinstating such a policy. I doubt the situation has changed. -- Mike Perry signature.asc D

Re: [tor-relays] Tor relays without AESNI

2015-09-15 Thread Mike Perry
is Intel(R) Core(TM)2 Quad CPU Q8200 @ 2.33GHz. If this is 14-25 Megabytes/sec per core (and corresponding tor process), then this is also consistent with what I remember. Without AES-NI: ~100Mbit per core. With AES-NI: over 300Mbit per core. -- Mike Perry signature.asc Description: Digita

Re: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")

2015-08-21 Thread Mike Perry
grarpamp: > On Fri, Aug 21, 2015 at 12:30 AM, Mike Perry wrote: > > I submitted a proposal to tor-dev describing a simple defense against > > this default configuration: > > https://lists.torproject.org/pipermail/tor-dev/2015-August/009326.html > > nProbe should be add

Re: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")

2015-08-20 Thread Mike Perry
grarpamp: > On Thu, Aug 13, 2015 at 3:40 AM, Mike Perry wrote: > >> But consider looking at average flow lifetimes on the internet. There may > >> be case for going longer, bundling or turfing across a range of ports to > >> falsely > >> trigger a record

Re: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")

2015-08-13 Thread Mike Perry
Mike Perry: > grarpamp: > > The questions were of a general "intro to netflow" nature, thus > > the links, they and other resource describe all the data fields, > > formation of records, timeouts, aggregation, IPFIX extensibility, etc. > > Others and I o

Re: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")

2015-08-13 Thread Mike Perry
some standard (if heavy-handed) connection-level logging policy. I suspect that type of adversary will be possible to defeat with similar amounts of padding that will defeat hidden service circuit setup fingerprinting, website traffic fingerprinting, traffic type classification, and a host of oth

Re: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")

2015-08-13 Thread Mike Perry
grarpamp: > On Thu, Aug 13, 2015 at 3:40 AM, Mike Perry wrote: > > However, Tor still closes the TCP connection after just one > > hour of inactivity. What if we kept it open longer? > > The exporting host has open flow count limited by memory (RAM). > A longer flow mig

Re: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")

2015-08-13 Thread Mike Perry
. What makes you think it might? Well, it seems harder to store a full connection tuple for open until close, because you have no idea when the connection actually closed (unless you are recording a tuple for every second during which there is any activity, or similar). -- Mike Perry signatu

Re: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")

2015-08-13 Thread Mike Perry
grarpamp: > On Wed, Aug 12, 2015 at 7:45 PM, Mike Perry wrote: > > At what resolution is this type of netflow data typically captured? > > > > Are we talking about all connection 5-tuples, bidirectional/total > > transfer byte totals, and open and close timestamps, o

Re: [tor-relays] clarification on what Utah State University exit relays store ("360 gigs of log files")

2015-08-12 Thread Mike Perry
ed in these cases would be very useful to inform how we might want to design padding and connection usage against this and other issues. Information about how UDP is treated would also be useful if/when we manage to switch to a UDP transport protocol, independent of any p

Re: [tor-relays] BWauth no-consensus state in effect

2015-08-04 Thread Mike Perry
s still going to be "OMG Tor is like SO UNUSABLY SLOW!!" So long as this keeps happening, I suspect it is unlikely for people to rush to Tor because it is now faster. I think once we expect most of the clients to have switched to 1 guard, we should get some torperf g

[tor-relays] Ports 465 and 587 vanished from reduced exit policy?

2015-06-24 Thread Mike Perry
d not spam. Has anyone experienced any abuse from these ports that involved non-authenticated mail/spam? Otherwise, it seems that exit operators who were using the reduced exit policy should consider updating their polices to include these ports. -- Mike Perry signature.asc Description: Di

Re: [tor-relays] Fwd: [Site5 #TZZN-12908]: DMCA Complaint: mybox.ganton.ca

2015-06-24 Thread Mike Perry
yMjMzOSxcInZcIjoxLFwidXJsXCI6XCJodHRwOlxcXC9cXFwvYmFja3N0YWdlLnNpdGU1LmNvbVwiLFwiaWRcIjpcIjEwOTljMmE1MWVkMDQ5YjViMzkxZDVjODA1ZTNhOTM1XCIsXCJ1cmxfaWRzXCI6W1wiZjkzNjUxMGE2YWRmNTJlZDkxNjU3NTg2YjU2YzViMWZiY2E3ODYzMVwiXX0ifQ> > | Service Notices > <http://mandrillapp.com/track/click/14822339/forums.site5.com?p=eyJzIjoiOG95VEtHWXlMRl9CUlVmRzVBV1R6VFR3RHMwIiwidiI6MSwicCI6IntcInVcIjoxNDgyMjMzOSxcInZcIjoxLFwidXJsXCI6XCJodHRwOlxcXC9cXFwvZm9ydW1zLnNpdGU1LmNvbVxcXC9mb3J1bWRpc3BsYXkucGhwP2Y9NFwiLFwiaWRcIjpcIjEwOTljMmE1MWVkMDQ5YjViMzkxZ

Re: [tor-relays] [tor-talk] Quantum Insert detection for everyone

2015-04-22 Thread Mike Perry
ting a much more comprehensive blog post; it > >will be filled with gory technical details AND it will include > >information on how to use HoneyBadger. HoneyBadger has optional (off > >by default) full-take logging which could enable you to capture a > >zero-day payload from

Re: [tor-relays] Fwd: [tor-talk] please advise on renting a gigabit capable dedicated server

2015-01-05 Thread Mike Perry
vailable, but they were Tor-friendly. 1. https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy 2. http://www.appliedops.net/. -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lis

Re: [tor-relays] Anonbox Project

2014-10-16 Thread Mike Perry
substantiated, and inaccurate claims, especially with our trademark and logo plastered on the thing, as if it were an endorsement, or even our product. -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Oniontip

2014-09-29 Thread Mike Perry
we think we want to encourage in the network. If we get an idea as to if Exits are actually more expensive to run than non-Exits, we can use that to guide these bonuses. Thanks a lot for OnionTip! It's now got my vote for inclusion on the Tor donations page! > On Sun, 2014-09-28 at 02:32 -

Re: [tor-relays] Oniontip

2014-09-28 Thread Mike Perry
showing donations received to my > > address: > > http://blockchain.info/address/1GXZVChXoxgrBzqMsCrWGu2ua6VTKSH6U1 > > > >> My concern (which has been highlighted before by Mike Perry) is > >> that the site lacks accountability and transparency. There is no > &g

Re: [tor-relays] Estimating the value and cost of the Tor network

2014-09-25 Thread Mike Perry
I run a non-exit relay > there. (Thinking about making it an exit.) > Kees > > -- > Kees on the move > > > On 25 Sep 2014, at 03:03, Mike Perry wrote: > > > > Moritz Bartl: > >> Prices vary widely across different countries. We pay between $400

Re: [tor-relays] Estimating the value and cost of the Tor network

2014-09-24 Thread Mike Perry
c identity fingerprints and prices to do that calculation first. Again, I want to extrapolate from real relays, using our current load balancing. So far only two people have given me identity fingerprints with actual pricing information. I need way more. -- Mike Perry sign

[tor-relays] Estimating the value and cost of the Tor network

2014-09-23 Thread Mike Perry
ot need to send this information publicly to the list. I am happy to receive it privately via GPG. My GPG key id is 0x29846B3C683686CC, and that key signs all of my mail to all torproject lists. You can get it here: https://pgp.mit.edu/pks/lookup?op=get&search=0x29846B3C683686CC -- Mike Perry

[tor-relays] Fwd: Call for a big fast bridge (to be the meek backend)

2014-09-17 Thread Mike Perry
/mailman/listinfo/tor-dev - End forwarded message - -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] oniontip.com

2014-09-01 Thread Mike Perry
Donncha O'Cearbhaill: > Thanks everyone for all the feedback I've received about OnionTip. It > was originally created in a rush during a hackathon so there is > definitely room for improvement. > > Mike Perry, as Mike Cardwell has said, it is currently possible to >

Re: [tor-relays] oniontip.com

2014-08-28 Thread Mike Perry
s should have their own dedicated (intermediate/flow-through?) BTC address, so it is possible to perform auditing for each of them using only the blockchain. -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-rela

Re: [tor-relays] Problems with domestic ISP blocking publicly listed relays

2014-01-28 Thread Mike Perry
like a Tor. As far as I know, we don't provide packages for this yet, but if you are technically inclined, you can set one up manually on Linux by following these instructions: https://www.torproject.org/projects/obfsproxy-instructions.html.en#instr

Re: [tor-relays] How effective is "NumCPUs"?

2014-01-24 Thread Mike Perry
not depend much on the amount of traffic, > >but much more on the number of connections/handshakes. > >___ > >tor-relays mailing list > >tor-relays@lists.torproject.org > >https://lists.torproject.org/cgi-bin/mailman/listinfo/to

Re: [tor-relays] Would be good if Tor were more multithreaded.

2014-01-24 Thread Mike Perry
; ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] bandwidth authority algorithm is cracked

2014-01-21 Thread Mike Perry
gt; > > ___ tor-relays mailing > > list tor-relays@lists.torproject.org > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > ___ tor-relays mailing > > list tor

[tor-relays] New GPG key for Mike Perry

2013-09-27 Thread Mike Perry
y old key) at: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x29846B3C683686CC Here's the fingerprint and current subkey information for reference: pub 8192R/29846B3C683686CC 2013-09-11 Key fingerprint = C963 C21D 6356 4E2B 10BB 335B 2984 6B3C 6836 86CC uid

[tor-relays] Overload data for Exit vs Non-Exit (and Guard vs Middle)?

2013-08-30 Thread Mike Perry
;m also wondering if any aspects of the load has any other relation to node flags. -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] hardware

2013-07-11 Thread Mike Perry
ally considered poor form to run too much of the Tor network by yourself until other people can catch up and balance your efforts. I would look for ways to decentralize/delegate once you got beyond a couple gbits or so for this reason. Please feel free to ask the list for suggestions on lega

Re: [tor-relays] Final Warning Notice

2013-07-11 Thread Mike Perry
more? Note that only 1 IP means you can only run 2 Tor instances on that, and even with AES-NI, each Tor instance probably caps out at about 300Mbit at most. Without AES-NI, you probably could only push 100-150Mbit per Tor instance... -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Final Warning Notice

2013-07-11 Thread Mike Perry
rg/projects/tor/ticket/7028 Did they shut you down entirely, even forbidding non-exit for some reason? Or did you decide to move to a new ISP that supports exits? -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] [tor-talk] Theft of Tor relay private keys?

2013-07-02 Thread Mike Perry
city. > Would it be able to keep the nickname or would it have to change also? > Would this have effect on the onion address if I had a hidden server? No and no, but your hidden server might have brief downtimes/descriptor publish times that correlate with your key rotation. Not

Re: [tor-relays] [tor-talk] Tor 0.2.4.13-alpha is out

2013-06-16 Thread Mike Perry
rspec.git. Fixes bug 8965. > > o Code simplification and refactoring: > - Avoid using character buffers when constructing most directory > objects: this approach was unwieldy and error-prone. Instead, > build smartlists of strings, and concatenate them wh

Re: [tor-relays] [tor-talk] Skype banned tor-nodes?

2013-05-28 Thread Mike Perry
ypothesis is right I ask owners of Exit-nodes, if it > possible, to let that port in their ExitPolicies. Not sure if that's actually the problem, but if the only way you can get to Skype is to use a Bittorrent-supporting exit, it certainly seems like a possibility. Th

Re: [tor-relays] Can you double check my exit policy for usefulness while minimizing complaints

2013-04-09 Thread Mike Perry
st of the abuse mail you'll get will be due to 80 and 443 anyway. There are also technical reasons to avoid having 1000 slightly different versions of the reduced exit policy. Hence the reduced policy allows every app port that we could find in use, *except* bittorrent. -- Mike P

Re: [tor-relays] Massive ongoing google groups spamming

2012-09-13 Thread Mike Perry
ion Gmail has hated on account creation over Tor for some time now.. If that is still true, it's likely this new abuser uses both Tor and non-Tor... Thus simply blocking Tor from Usenet (even if we could) as the abuse complaint demands is unlikely to stop the abuse. -- Mike Perry

Re: [tor-relays] Exit Port Usage Statistics for "Allow all" nodes

2012-08-15 Thread Mike Perry
Thus spake Steve Snyder (swsny...@snydernet.net): > On Wednesday, August 15, 2012 4:44pm, "Mike Perry" > said: > > Here's the read and write statistics from the ExtraInfo descriptors > > from a handful of the fastest default-policy and reduced-policy > >

Re: [tor-relays] Exit Port Usage Statistics for "Allow all" nodes

2012-08-15 Thread Mike Perry
5.2% 8333: 1.1% other: 0.5% 8080: 0.1% 995: 0.0% Misc Exit raskin read 670.2M 80: 77.6% 443: 21.2% 8080: 0.3% 563: 0.2% other: 0.2% 81: 0.2% Misc Exit raskin wrote 30.3M 443: 57.3% 80: 42.1% 8333: 0.3% other: 0.3% 995: 0.0% 8080: 0.0% -- Mike Perry si

Re: [tor-relays] Call for discussion: turning funding into more exit relays

2012-07-24 Thread Mike Perry
Thus spake Nils Vogels (bacardic...@gmail.com): > On Tue, Jul 24, 2012 at 9:17 AM, Mike Perry wrote: > > > Thus spake k...@damnfbi.tk (k...@damnfbi.tk): > > > > > Hey all, > > > Have you contemplated sending this over to the hackerspaces list? > > > &

Re: [tor-relays] Call for discussion: turning funding into more exit relays

2012-07-24 Thread Mike Perry
cus on? Announce? Discuss? Other? Also, how do we recognize reputable Hackerspaces from "Sketchy bunch of d00dz who think it will be totally awesome fun to pwn a bunch of Tor users?" Should we check for previous reliable Tor relays from them? Should we just not care? -- Mike Perry

Re: [tor-relays] How many PK operations does a typical home-run relay or bridge do in 24 hours?

2012-07-14 Thread Mike Perry
s to divide by the total uptime of the relay? Does SIGHUP clear them? Can they get cleared in other sitations? -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] case law on for exit nodes

2012-05-24 Thread Mike Perry
legal opinion on if these things can actually be arbitrarily coercive in nature. "Give me your key. Also, keep using it. Also, tell your mother you hate her and wish she was dead." Does the madness ever end? -- Mike Perry signature.asc Description: Digital signature _

Re: [tor-relays] too many abuse reports

2012-05-22 Thread Mike Perry
Thus spake Jon (torance...@gmail.com): > On Tue, May 22, 2012 at 3:17 PM, Mike Perry wrote: > > > > On Tue, 22 May 2012 13:29:54 -0500 > > > Jon allegedly wrote: > > > > > > > Yep same here, got notice today from ISP on a report of the 20th for >

Re: [tor-relays] case law on for exit nodes

2012-05-22 Thread Mike Perry
o busy to dig them up right now). There have also been several equipment seizures in the EU that never escalated to a court case... -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] too many abuse reports

2012-05-22 Thread Mike Perry
rth paying a premium for, because it does require more resources at the ISPs end in terms of occasional abuse noise. You could also try negotiating upwards if your ISP's prices are already competitive with FDC's for middle service. Something tel

Re: [tor-relays] sustained bandwidth drop through noisetor

2012-05-02 Thread Mike Perry
all 5 bw auths are voting, and I have not changed the algorithms. -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Towards a Tor Node Best Best Practices Document

2012-04-29 Thread Mike Perry
ompromised exit. Yes, there are things we can do to defend against these attacks in the client. See https://trac.torproject.org/projects/tor/ticket/5456 for some of those. But I think we should also take this opportunity to think a little deeper about protecting and rotating relay keys in the first place. -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Towards a Tor Node Best Best Practices Document

2012-04-16 Thread Mike Perry
Thus spake Mike Perry (mikepe...@torproject.org): > You're failing to see the distinction made between adversaries, which > was the entire point of the motivating section of the document. Rekeying > *will* thwart some adversaries. > > > I suspect getting the keys through

Re: [tor-relays] Towards a Tor Node Best Best Practices Document

2012-04-16 Thread Mike Perry
ur > suggestions in a section that starts with a paragraph like: > > | Here are a couple of things you could do to improve your > | relay's security some more. Whether or not you consider > | them worthwhile is up to you and if you decide against some > | or all of them or if they don't work on your system, your > | relay is still appreciated. Ok, yes, I have no intention of making anything mandatory. It's not really possible anyways, and heterogeneity probably trumps it. For the paragraphs I've trimmed, assume I more or less agree with your statements. -- Mike Perry signature.asc Description: Digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] Towards a Tor Node Best Best Practices Document

2012-04-12 Thread Mike Perry
s actually accomplish that? If so, should we work on providing scripts to make the loopback filesystem creation process easier, and/or provide loopback images themselves? Even the APT defenses end up not working out, I would sleep a lot better at night if most rela

Re: [tor-relays] bandwidth scanner status ?

2012-01-19 Thread Mike Perry
other feedback params were set for the duration. See https://gitweb.torproject.org/torflow.git/blob/HEAD:/NetworkScanners/BwAuthority/README.spec.txt#l477 for more info on the consensus params that alter bw auth behavior, and please read the rest of the spec if you're interested in getting

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-19 Thread Mike Perry
e bwauths. I also think #4730 is more likely to capture the problem we were seeing with fast nodes being fast only sometimes, and it will be way less work. Thanks for bearing with me, but we still might have a ways to go before we really get to the bottom of this

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-15 Thread Mike Perry
erval from 2 weeks to 1 week. My plan is to let these changes run for another couple days, and if they don't seem to change anything, I plan to try 1 week on, 1 week off cycles of the experiment, to see if we can detect any patterns in exactly when and why torperf

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-13 Thread Mike Perry
ave? Some combos of are pretty abysmal about IRQ load balancing and interrupt optimizations, or at least they were on old kernels (which may still apply if you are CentOS). -- Mike Perry pgpZotrS0hGmK.pgp Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-12 Thread Mike Perry
Thus spake Mike Perry (mikepe...@torproject.org): > Thus spake Tim Wilde (twi...@cymru.com): > > > > I try to keep everything I do documented on that wiki. All these > > > servers run four instances of Tor each (one per core) and traffic > > > is accounted for

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-12 Thread Mike Perry
ing into TCP socket exhaustion on any of your relays? It is a possibility, esp for Guard+Exits with gobs of CPU and gobs of throughput. I am curious if we will need to do this or not: https://trac.torproject.org/projects/tor/ticket/4709 -- Mike Perry pgp2w2GmofAI1.pgp Description: PGP signature _

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-12 Thread Mike Perry
d to keep an eye on things for a bit longer to be sure, I suspect. -- Mike Perry pgpNDRjUdtLcC.pgp Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-12 Thread Mike Perry
f web browser tech for user-generated video still sucks in the absence of Flash, so it is still not yet our primary focus. -- Mike Perry pgpNaqqbt2Axf.pgp Description: PGP signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://li

Re: [tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-09 Thread Mike Perry
Thus spake Sebastian Urbach (sebast...@urbach.org): > Am Sat, 3 Dec 2011 18:57:22 -0800 > schrieb Mike Perry : > > Hi, > > > I've made five major changes to try to address these issues: > > happens over the next week or so. > > Well, somebody has to say it

[tor-relays] Bandwidth Authority PID Feedback Experiment #2 Starting

2011-12-03 Thread Mike Perry
haps longer if it doesn't explode and seems to improve performance on https://metrics.torproject.org/performance.html) starting tonight or tomorrow. Please keep an eye on your relays and tell us if anything unexpected happens over the next week or so. Thanks! -- Mike Perry pgpwKXGhGFtO5.

Re: [tor-relays] Sorry, HotMail users, you're rejected

2011-08-22 Thread Mike Perry
that your actual legal responsibility is zero in most countries, but it might make them feel better that you acknowledge it will be you proving that in court, not them. -- Mike Perry Mad Computer Scientist fscked.org evil labs pgpqhUGZ8U6Ao.pgp Description: PGP signature __

Re: [tor-relays] Sorry, HotMail users, you're rejected

2011-08-22 Thread Mike Perry
have to curtail exit access to HotMail. Yeah, it sucks, but I know of > no way to block the sending of webmail while still allowing it to be > retrieved. Make sure this is done via exit policy and not iptables or DNS filter. Also, are you sure you have the whole hotmail netblock? -- Mi