Re: [tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-10 Thread George Hartley via tor-relays
boot. However, most big organization running Tor nodes have either their own colocated servers like me (except I am not a big contributor) or dedicated servers giving you more options. I even have an intrusion (case-opening) sensor on my server which wipes RAM and kills power once activated.

Re: [tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-06 Thread boldsuck via tor-relays
On Saturday, 5 October 2024 00:40 George Hartley via tor-relays wrote: > You should default to full disk / partition encryption. Apart from that FDE is _not_ recommended, especially for Tor exits. What is the point of a 24/7/365 running cloud or KVM server that the admins can copy at any t

Re: [tor-relays] Exit relay not in consensus

2024-10-06 Thread George Hartley via tor-relays
Try to use mtr to that specific DirAuth, and see where you are being nullrouted. Then contact that ASN (would be better if your provider did this in your name) and ask why your origin is excluded / not routed-through. They don't have to be "bad guys" or "Tor-unfriendly"

Re: [tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-06 Thread George Hartley via tor-relays
oot up with one descriptor / secret_key gets favored, the other / "fake" I believe I read a while back will not be allowed on to the network, but take this with a grain of salt. -GH On Friday, October 4th, 2024 at 11:51 PM, Osservatorio Nessuno via tor-relays wrote: > Hi,

Re: [tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-04 Thread Osservatorio Nessuno via tor-relays
Hi, thanks both for your input. On 03/10/2024 21:24, boldsuck via tor-relays wrote: But: FallbackDir can also move to another provider/host. Simply copy the Tor keys of the instance to the new host. I've done that several times. While we could, I would think it is not a great sec

Re: [tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-03 Thread George Hartley via tor-relays
Yes, you can do this, you need to back up the following two files: > secret_id_key > ed25519_master_id_secret_key But the problem I think is that while you can move your node, the old IP and port is still hardcoded into the Tor codebase. -GH On Thursday, October 3rd, 2024 at 9:24 PM, bo

Re: [tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-03 Thread boldsuck via tor-relays
On Thursday, 3 October 2024 18:59 Osservatorio Nessuno via tor-relays wrote: > We are writing this email in advance, since the node is in > the FallbackDir list and embedded in Tor. The cluster will be powered > off on 25th November. FallbackDir have been selected 'automatically&

Re: [tor-relays] Exit relay not in consensus

2024-10-03 Thread boldsuck via tor-relays
On Wednesday, 2 October 2024 21:24 Sebastian Hahn wrote: > > On 2. Oct 2024, at 09:05, George Hartley via tor-relays > > wrote: > > > > > > It could be that your provider has throttled you temporarily. > > > > I don't think so, I get that messag

[tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-03 Thread Osservatorio Nessuno via tor-relays
list and embedded in Tor. The cluster will be powered off on 25th November. punki E43244684E0C924EC082B8ECC735FAF2F8CF1C45 Cheers Giulio [1] - https://metrics.torproject.org/rs.html#details/E43244684E0C924EC082B8ECC735FAF2F8CF1C45 ___ tor-relays

Re: [tor-relays] turning off BridgeDB and the future of moat bridges

2024-10-03 Thread boldsuck via tor-relays
On Wednesday, 2 October 2024 17:07 Toralf Förster via tor-relays wrote: > On 10/2/24 13:03, meskio wrote: > > Not a concrete one. My plan is to review the situation early next month > > and > > depending on the usage bring the conversation on what to do with those > > br

Re: [tor-relays] turning off BridgeDB and the future of moat bridges

2024-10-02 Thread Toralf Förster via tor-relays
On 10/2/24 17:43, meskio wrote: I think best right now is to configure them to be distributed over "settings". As this is what will be automatically used by Tor Browser and other clients. Thx. -- Toralf _______ tor-relays mailing list

Re: [tor-relays] Exit relay not in consensus

2024-10-02 Thread George Hartley via tor-relays
should show it as online, as you don't need IPv6 to be reachable to get the online flag. -GH On Tuesday, October 1st, 2024 at 7:55 PM, boldsuck via tor-relays tor-relays@lists.torproject.org wrote: > On Tuesday, 1 October 2024 19:32 denny.obre...@a-n-o-n-y-m-e.net wrote: > >

Re: [tor-relays] turning off BridgeDB and the future of moat bridges

2024-10-02 Thread Toralf Förster via tor-relays
moat bridges. What methods are currently preferred? -- Toralf ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Exit relay not in consensus

2024-10-01 Thread boldsuck via tor-relays
On Tuesday, 1 October 2024 19:32 denny.obre...@a-n-o-n-y-m-e.net wrote: >After my last restart I have: > >``` > >Read configuration file "/usr/share/tor/tor-service-defaults-torrc". > > Read configuration file "/etc/tor/torrc"

Re: [tor-relays] Exit relay not in consensus

2024-10-01 Thread George Hartley via tor-relays
odem and kernel command line. Can you attach your tor log file? You can also adjust the log verbosity of certain "domains" within Tor like so: https://2019.www.torproject.org/docs/tor-manual.html.en#Log Please let us know what you find. Thanks, George On Tuesday, October 1st, 20

Re: [tor-relays] relays and CUPS vulnerabilities

2024-09-30 Thread George Hartley via tor-relays
find out-of-date / potentially vulnerable nodes and e-mail the associated e-mail address. On average 10% actually respond, but most don't care or simply forgot about their exclusively for Tor-purposes made e-mail address. I usually wait 48 hours, and if they didn't respond by then, I try again

Re: [tor-relays] turning off BridgeDB and the future of moat bridges

2024-09-30 Thread Toralf Förster via tor-relays
On 9/19/24 18:46, meskio wrote: We plan to watch the usage of moat bridges and evaluate moving them to another distributor depending on the usage[3]. Is there any timeline for the movement? -- Toralf ___ tor-relays mailing list tor-relays

Re: [tor-relays] relays and CUPS vulnerabilities

2024-09-28 Thread George Hartley via tor-relays
Hello, I don't see how this is an issue, because Tor guards / middles only ever relay traffic, and exits already have sufficient REJECT rules: > reject 0.0.0.0/8:* > reject 169.254.0.0/16:* > reject 127.0.0.0/8:* > reject 192.168.0.0/16:* > reject 10.0.0.0/8:* > reject

[tor-relays] relays and CUPS vulnerabilities

2024-09-27 Thread George via tor-relays
There are some very significant recent CVEs out for CUPS, the unix printing system. https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=cups It's an ideal moment to remind relay operators that a Tor node, relay or bridge, should be a single-purpose internet server. Running alternate int

Re: [tor-relays] Relay disconnect & offline on IP change

2024-09-26 Thread boldsuck via tor-relays
On Thursday, 26 September 2024 08:01 Tor Relay Net Ops via tor-relays wrote: > I think it might have not recognized the address has changed, because it > doesn't recover after a while (I waited around 3~ days) > There are no firewall rules that would intervene with this process, on

Re: [tor-relays] Relay disconnect & offline on IP change

2024-09-26 Thread Tor Relay Net Ops via tor-relays
it recover if you wait a while? I think it might have not recognized the address has changed, because it doesn't recover after a while (I waited around 3~ days) There are no firewall rules that would intervene with this process, on the MikroTik side it's just an DST-NAT rule to my to

Re: [tor-relays] Relay disconnect & offline on IP change

2024-09-25 Thread boldsuck via tor-relays
scripts for Mikrotik. -- ╰_╯ Ciao Marco! Debian GNU/Linux It's free software and it gives you freedom! signature.asc Description: This is a digitally signed message part. ___________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Relay disconnect & offline on IP change

2024-09-25 Thread George Hartley via tor-relays
>From my experience, it should come back online, but not instantly - you likely >need to wait for the next descriptor to be uploaded (once every 6 hours >usually). All the best, George On Wednesday, September 25th, 2024 at 12:53 PM, Tor Relay Net Ops via tor-relays wrote: > Gree

[tor-relays] Relay disconnect & offline on IP change

2024-09-25 Thread Tor Relay Net Ops via tor-relays
Greetings fellow relay operators! I'm currently running a tor relay on a dynamic IP Address connection, usually my ISP gives me a new address every day or so- Lately [for the past like week or so- /can't remember when it started happening/], I have to manually restart it when

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-25 Thread George Hartley via tor-relays
tly-deployed pluggable transports, showing that meek > and obfs4-iat0 provide little protection against DeepCorr’s flow > correlation, while obfs4-iat1 provides a better protection against > DeepCorr (note that none of these obfuscation mechanisms are > currently deployed by public Tor relays,

Re: [tor-relays] Looking for a ipv4 block and strategy

2024-09-24 Thread Osservatorio Nessuno via tor-relays
Hi, On 24/09/2024 14:32, boldsuck via tor-relays wrote: Some uplink providers offer BGP+IPv6+IPv4 in a bundle. (he.net) sadly we do not have this option at the moment. Since you can operate 32-40 nodes with 4-5 IPs, this would be an option to start with. With fast CPUs (clock speed), you

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread Toralf Förster via tor-relays
On 9/24/24 20:56, boldsuck via tor-relays wrote: Oh, you're right. It's nicer because I have instance name in front of it. Then "grep -h" is your friend ;) -- Toralf ___ tor-relays mailing list tor-relays@lists.

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
Toralf Förster via tor-relays wrote: > On 9/24/24 15:40, boldsuck via tor-relays wrote: > > https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukD > > DZo6BQqwQURzjQy > OT, but useless use of cat ;) Oh, you're right. It's nicer because I have

Re: [tor-relays] Why I do have so often an "8" in my bridge stats?

2024-09-24 Thread Toralf Förster via tor-relays
On 9/24/24 18:39, David Fifield wrote: The numbers are rounded to reduce precision. https://spec.torproject.org/dir-spec/extra-info-document-format.html ah, thx. I'm just curious, if 4 is rounded to 0 or to 8 ? -- Toralf _______ tor-relays ma

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
pasture_clubbed242--- via tor-relays wrote: > I could only find this article saying there is a 'cert=' option, which > initially appear useful for Tor. Cert is default in obfs4 bridelines, you can create yours with: ~# cat /var/lib/tor-instances/01/fingerprint nikname fingerp

[tor-relays] Why I do have so often an "8" in my bridge stats?

2024-09-24 Thread Toralf Förster via tor-relays
,mu=8,nl=8,tr=8,us=8 i26 bridge-ips de=8 luchs bridge-ips de=8 -- Toralf _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread Toralf Förster via tor-relays
On 9/24/24 15:40, boldsuck via tor-relays wrote: https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukDDZo6BQqwQURzjQy OT, but useless use of cat ;) -- Toralf ___ tor-relays mailing list tor-relays@lists.torproject.org https

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
On Montag, 23. September 2024 22:27:25 CEST Fran via tor-relays wrote: > Philipp Winter regarding iat mode: > >The feature introduces a substantial performance penalty for a dubious > >and poorly understood privacy gain. If I were to write an algorithm to > >detect obf

Re: [tor-relays] Looking for a ipv4 block and strategy

2024-09-24 Thread boldsuck via tor-relays
Osservatorio Nessuno via tor-relays wrote: > our organization is working to add more physical nodes, in our little > Italy headquarter[1]. We have reached an agreement with one of the > available fiber reseller there, where we will pay for L2 transport to a > datacenter, where we

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-23 Thread pasture_clubbed242--- via tor-relays
Out of curiosity, can any other options be passed with ServerTransportOptions besides iat-mode? I could only find this article saying there is a 'cert=' option, which initially appear useful for Tor. https://hamy.io/post/000d/how-to-hide-obfuscate-any-traffic-using-obfs4/ Thank you

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-23 Thread Fran via tor-relays
tify the protocol. In hindsight, it was >probably >a mistake to expose the iat option to users and bridge operators. > >Cheers, >Philipp https://lists.torproject.org/pipermail/tor-relays/2021-February/019370.html On 23/09/2024 12:15, George Hartley via tor-relays wrote: Hello Tor co

[tor-relays] Looking for a ipv4 block and strategy

2024-09-23 Thread Osservatorio Nessuno via tor-relays
recipients of any abuse. We have now two options: either look for someone willing to lease a /24 to Tor operators, which is not an easy task since the block reputation will be tainted and depreciate the block. We have found someone willing to, for $119/mo, but it is hard to tell how long that

[tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-23 Thread George Hartley via tor-relays
Hello Tor community, this e-mail applies to you if you are running an obfs4 (now known under the name lyrebird) bridge or want to do so in the future. Some recent posts on this list has shown that traffic timing analysis can be used to locate a users or onion services guard nodes or bridges

Re: [tor-relays] Read/written bytes on a relay differ

2024-09-22 Thread George Hartley via tor-relays
as guard? This is just my guess though. Alles Gute (since you are German), George On Wednesday, September 18th, 2024 at 6:35 PM, Richie wrote: > Hi everyone, > > nothing of real concern, but out of curiosity: since some years now i > use overhead traffic on my ISP for Tor, wit

[tor-relays] Docker Snowflake Proxy Multiple IPs

2024-09-22 Thread admin--- via tor-relays
sc Description: OpenPGP digital signature ___________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-19 Thread boldsuck via tor-relays
On Mittwoch, 18. September 2024 09:10:31 CEST Florian Kohrt via tor-relays wrote: A few facts from these German films and notes: - "Boystown" was one of the largest pedophile darknet forums of all time. 400.000 User - The administrator's chats played a crucial role in tracking

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-18 Thread Lars via tor-relays
isabela fernandes wrote on 2024-09-16: I am reaching out to inform you of an upcoming news story concerning a potential deanonymization attack on Onion Services. These are the articles, in German language: Ermittlungen im Darknet: Strafverfolger hebeln Tor-Anonymisierung aus <ht

[tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-18 Thread Florian Kohrt via tor-relays
Hi all, Today, NDR issued a press release with more details on the subject: https://www.ndr.de/der_ndr/presse/mitteilungen/Ermittlungen-im-sogenannten-Darknet-Strafverfolger-hebeln-Tor-Anonymisierung-aus,pressemeldungndr24724.html It mentions that the (German) Federal Criminal Police Office

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-16 Thread pasture_clubbed242--- via tor-relays
Greetings Marco, Something I always found confusing is what the difference is between the Vanguards Github project, and the version of Vanguards that Tor has implemented. I thought Vanguards was added into Tor no? Is the Vanguards project still useful despite this? I'm not sure if this

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-16 Thread boldsuck via tor-relays
On Montag, 16. September 2024 22:03:02 CEST Toralf Förster via tor-relays wrote: > On 9/16/24 21:13, boldsuck via tor-relays wrote: > > Some court documents are linked here, in the google sheets: > > https://safereddit.com/r/TOR/comments/19benkx/operation_liberty_lane_le_ru >

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-16 Thread Toralf Förster via tor-relays
On 9/16/24 21:13, boldsuck via tor-relays wrote: Some court documents are linked here, in the google sheets: https://safereddit.com/r/TOR/comments/19benkx/operation_liberty_lane_le_running_gaurd_and/?rdt=40060 Gus may have gotten some more documents. returns: "Failed to parse page JSON

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-16 Thread boldsuck via tor-relays
On Montag, 16. September 2024 12:31:24 CEST isabela fernandes wrote: > On September 9, 2024, The Tor Project received a press inquiry from > Norddeutscher Rundfunk (NDR, part of ARD, a German public broadcaster) with > The reporter claims to have "evidence that shows that in

[tor-relays] Relay suddenly pushing very little traffic

2024-09-13 Thread Zachary via tor-relays
. I am running Tor 4.8.12 installed from the official Tor repositories in Ubuntu 22.04 with OR port 9001. The entire network is an EdgeRouter plugged into WAN and then a firewall rule letting traffic hit the host for Tor. The relay is indeed working, but everyday it seems that less and less

Re: [tor-relays] Artikel 5 e.V. - Another police raid in Germany - general assembly on Sep 21st 2024

2024-09-09 Thread George Hartley via tor-relays
home using your own routers and IPv4 addresses, possibly by using a business cable / fiber plan? If not, then I do not see the need to raid the homes of exit operators, as even in Germany, most police agents are aware of Tor and some of the abuse (Child porn, and so on) that it is used for, however

Re: [tor-relays] Artikel 5 e.V. - Another police raid in Germany - general assembly on Sep 21st 2024

2024-09-09 Thread Volker Mink via tor-relays
  Hi Gero.   Im sorry for this! Staatsanwaltschaft is really not able to use google or wants to learn basic understanding of TOR and its infrastructure. I unfortunately made the same experience about 2 years ago! 6am, knock knock, police.   There is a Strafentschädigungsgesetz which allows

Re: [tor-relays] Next Tor Relay Operator Meetup - September 7th, 2024 at 19UTC

2024-09-08 Thread Felix via tor-relays
Am Sat, 7 Sep 2024 15:14:56 -0300 schrieb gus : > > > https://pad.riseup.net/p/tor-relayop-sept7th-meetup-keep Room > > Gus Hi Gus During reading through the pad I think I unfortunately deleted the link under "4. New Relay Governance docs" when I clicked the link on

Re: [tor-relays] Next Tor Relay Operator Meetup - September 7th, 2024 at 19UTC

2024-09-07 Thread boldsuck via tor-relays
-- ╰_╯ Ciao Marco! Debian GNU/Linux It's free software and it gives you freedom! signature.asc Description: This is a digitally signed message part. _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mai

Re: [tor-relays] Next Tor Relay Operator Meetup - September 7th, 2024 at 19UTC

2024-09-07 Thread boldsuck via tor-relays
On Donnerstag, 5. September 2024 19:53:00 CEST gus wrote: > Just a friendly reminder that we're meeting this Saturday, > September 7th @ 1900 UTC. > > Meeting pad: https://pad.riseup.net/p/tor-relayop-sept7th-meetup-keep > Room link: https://tor.meet.coop/gus-og0-x74-dzn &g

Re: [tor-relays] simple instructions to the expiredkey issue, pls.?

2024-09-06 Thread boldsuck via tor-relays
On Freitag, 6. September 2024 08:47:14 CEST eff_03675...@posteo.se wrote: OK, looks like TorProject (Gus) renamed the key and resolved tor-archive-keyring.gpg vs. deb.torproject.org-keyring.gpg mismatch. https://gitlab.torproject.org/tpo/web/support/-/issues/368 Then I can update my sources

Re: [tor-relays] simple instructions to the expiredkey issue, pls.?

2024-09-03 Thread boldsuck via tor-relays
On Montag, 2. September 2024 19:01:16 CEST code9n via tor-relays wrote: > I know I should have sorted this some weeks ago but can anyone tell me a > simple method of dealing with the: As root, one line: wget -qO- https://deb.torproject.org/torproje

[tor-relays] simple instructions to the expiredkey issue, pls.?

2024-09-03 Thread code9n via tor-relays
.___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Supporting TOR: Seeking Affordable and Reliable Server Providers in Eastern Europe

2024-09-02 Thread boldsuck via tor-relays
On Montag, 2. September 2024 14:54:55 CEST gus wrote: Hello Alex, First of all, it's nice that you're on the list. Maybe you would like to listen in on the meeting on Saturday. (It's anonymous and without a webcam) https://lists.torproject.org/pipermail/tor-relays/2024-August/02

[tor-relays] Supporting TOR: Seeking Affordable and Reliable Server Providers in Eastern Europe

2024-08-31 Thread Alex Swabbie via tor-relays
Hello everyone, I’ve been a fan of Tor for many years now, and my affinity for anonymity naturally extends to other interests, such as Monero… 😉 I’ve successfully rallied like-minded individuals who have generously supported our cause through various grants, and we’ve even received a

Re: [tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-30 Thread boldsuck via tor-relays
On Freitag, 30. August 2024 14:35:26 CEST Alessandro Greco via tor-relays wrote: > I noticed that you have a lot of Bridges active and in this regard I wanted I have different subnets on the servers and each bridge has a different IP+IPv6. Until 3 years ago you could get 1 IP for less tha

Re: [tor-relays] Request for Tor to support armhf architecture

2024-08-30 Thread DiffieHellman via tor-relays
Hi Landon, >but keeping it up to date is not easy. >Plus, I don't really know how to keep it up to date like that. You check for a tor update every month or three, download the latest archive, compile and install that and as soon as you restart tor, it'll be up to date. It bein

Re: [tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-30 Thread Alessandro Greco via tor-relays
Description: application/pgp-keys signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-28 Thread boldsuck via tor-relays
On Mittwoch, 28. August 2024 07:53:21 CEST Alessandro Greco via tor-relays wrote: > > Once your bridge has been running stable for a few weeks, an advanced but > > experimental feature is to hide OrPort. > > So is it possible to remove the ports from the torrc file while keepin

Re: [tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-28 Thread Alessandro Greco via tor-relays
> Once your bridge has been running stable for a few weeks, an advanced but > experimental feature is to hide OrPort. So is it possible to remove the ports from the torrc file while keeping them unchanged? But what if for some reasons (For istance necessary updates) you have to restart to

Re: [tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-27 Thread boldsuck via tor-relays
ine too. Also be sure to learn > about 'BandwidthBurst' in case its behavior is surprising to you. > If a bridge reaches 20-30 MBytes, that's already a lot. There are only very few (guard|exit) relays on Tor-Metrics that reach 100 MBytes. > Should an anti DDoS system be configu

Re: [tor-relays] 2024 : time to stop using Telegram (e.g. in Bridge line communication.).

2024-08-27 Thread boldsuck via tor-relays
On Montag, 26. August 2024 17:33:22 CEST Marco Predicatori wrote: > All this is pretty scary. Pretty much any exit node manager can be arrested > on the very same basis. No. A Tor router does not host any data, it is a router like any other ISP or backbone router. I am currently updati

Re: [tor-relays] 2024 : time to stop using Telegram (e.g. in Bridge line communication.).

2024-08-26 Thread boldsuck via tor-relays
q I've been using it for a few months. Decentralized, no ID, protected metadata, multiple user profiles, some designs taken from the Tor protocol. All SimpleX servers optionally accessible via Tor and you can run your own private SimpleX server. Jack Dorsey invested a large sum in further

[tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-26 Thread Alessandro Greco via tor-relays
Dear all, In the past, I set up a middle relay node, and today I am looking to experiment with configuring a Bridge node to support the Tor project and its community. Since this is a very sensitive task, I decided to reach out to you to ensure that the setup is correct and that the

Re: [tor-relays] [network-health] help metrics torpoject

2024-08-21 Thread George Hartley via tor-relays
GP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] a couple noob questions

2024-08-21 Thread George Hartley via tor-relays
Hey, this should help you out: https://blog.torproject.org/lifecycle-of-a-new-relay/ Sincerely, George On Monday, August 19th, 2024 at 8:01 PM, observatory123 via tor-relays wrote: > Dear fellow relay operators, > > I've been hosting a tor relay on a VPS (strato) for a c

Re: [tor-relays] DDOS alerts from my provider

2024-08-20 Thread boldsuck via tor-relays
On Donnerstag, 8. August 2024 22:20:35 CEST eff_03675...@posteo.se wrote: > Hi Rafo, > > My apologies for the late reply in your request for the code on banning > tor exits into *GUARDS or middle-relays* Before many people copy this, a note: A relay with exit flag is MOSTLY used for

[tor-relays] DMARC helps prevent Tor-exit from being abused for email SPAM.

2024-08-20 Thread boldsuck via tor-relays
F to strict adkim=s; aspf=s; and DMARC subdomain policy to reject sp=reject; Since then, emails about Tor-exits have dropped to 0 ;-) -- ╰_╯ Ciao Marco! Debian GNU/Linux It's free software and it gives you freedom! signature.asc Description: This is a digitally signed mes

Re: [tor-relays] DDOS alerts from my provider

2024-08-20 Thread boldsuck via tor-relays
On Sonntag, 14. Juli 2024 15:54:45 CEST Toralf Förster via tor-relays wrote: > On 7/12/24 00:14, boldsuck wrote: > > The idea is not bad. But can you simply discard every ≤ 50byte packet? > > Probably not > > > I drop fragments and uncommon TCP MSS values. > > ip

Re: [tor-relays] An Internet backbone blocklisted my Tor server!

2024-08-20 Thread boldsuck via tor-relays
On Dienstag, 20. August 2024 12:12:22 CEST Tzanca via tor-relays wrote: > > I bet the reason that my server periodically goes offline is because it is > > being blocked and not because it is actually offline! > > It can be the metrics server seeing server down but server actuall

Re: [tor-relays] a couple noob questions

2024-08-20 Thread Tzanca via tor-relays
Hello, Yes it's very normal. After 2 weeks you will see the speed increasing. You can read here about the lifecycle of a new relay https://blog.torproject.org/lifecycle-of-a-new-relay/ Kind regards, Tzanca On Monday, August 19th, 2024 at 9:01 PM, observatory123 via tor-relays wrote: &

Re: [tor-relays] An Internet backbone blocklisted my Tor server!

2024-08-20 Thread Tzanca via tor-relays
don wrote: > TL;DR... > Write down your Tor server's GATEWAY IP address. if your server goes offline, > try tracerouting to your Tor server's gateway IP address as well as your Tor > server's IP address! You might be surprised by what you see! > > And also install M

Re: [tor-relays] a couple noob questions

2024-08-20 Thread mail--- via tor-relays
with their own headaches/challenges vs. guard relays. This is normal as well. I don't know speedtest-cli specifically, but I imagine it's a regular tcp/udp speedtest while Tor traffic is more likely to be CPU limited instead of network throughput limited. Just pushing some udp/tcp traffic

[tor-relays] a couple noob questions

2024-08-19 Thread observatory123 via tor-relays
Dear fellow relay operators, I've been hosting a tor relay on a VPS (strato) for a couple days now. I've never done this before, so I have a couple of questions: - Is it normal for my relay to only use up only about 2 MB/s after nearly 5 days of uptime despite bandwidth speed tests

Re: [tor-relays] Request for Tor to support armhf architecture

2024-08-19 Thread DiffieHellman via tor-relays
Hi Landon, Aarch64 is a supported architecture for tor, although it appears there isn't a buildbot for binaries. It'll be easiest to just compile from source, which I'll help you with. First you install dependencies and fine GNU software (I'm guessing some of the depende

Re: [tor-relays] An Internet backbone blocklisted my Tor server!

2024-08-19 Thread tor-operator
Even though Cogent has ethical issues, this is unlikely what happened. Most likely, either an outage occurred or a voluntary filtering had been put in place on your Virtual Machine by the ISP at which it is hosted. ___ tor-relays mailing list tor-relays

Re: [tor-relays] [tor-dev] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-08-19 Thread George Hartley via tor-relays
I just typed up a huge reply and it did not get saved for some reason.  Okay, let's do it this way then:  1.) I don't think we need to re-invent the wheel, (q)Tox can be used over Tor, that is likely one of the messengers you mentioned.  2.) I am currently not receiving the medicatio

Re: [tor-relays] Archive key from deb.torproject.org was renewed - mind the * deb * !

2024-08-15 Thread George Hartley via tor-relays
I just typed up a huge reply and it did not get saved for some reason. Okay, let's do it this way then: 1.) I don't think we need to re-invent the wheel, (q)Tox can be used over Tor, that is likely one of the messengers you mentioned. 2.) I am currently not receiving the medicatio

Re: [tor-relays] DOS Protection mini RFC

2024-08-14 Thread George Hartley via tor-relays
ds to put on the line for it to drop or get null-routed automatically. On Wednesday, August 14th, 2024 at 3:47 PM, George Hartley via tor-relays wrote: > If there is DoS on bridges on domestic connections, or connections with very > low throughput, then handling (D)DoS at an application la

Re: [tor-relays] Archive key from deb.torproject.org was renewed - mind the * deb * !

2024-08-14 Thread Toralf Förster via tor-relays
o use needrestart to detect services and/or kernel requiring a reboot and do it [2]. So it works all out of the box w/o manual intervention here. [1] https://github.com/toralf/tor-relays/blob/main/playbooks/roles/setup_common/tasks/auto-update.yaml [2] https://github.com/toralf/tor-relays/blob/main/play

Re: [tor-relays] Archive key from deb.torproject.org was renewed - mind the * deb * !

2024-08-14 Thread Toralf Förster via tor-relays
On 8/14/24 16:13, boldsuck wrote: If you have 'unattended upgrades' enabled, you will get an ERROR email. Highly depends on a configured mailer IMO. -- Toralf _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torp

Re: [tor-relays] [tor-dev] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-08-14 Thread George Hartley via tor-relays
so hosted a hidden IRC server, as well as a Tor hidden service on my grandmothers laptop, to be able to SSH in through Tor and troubleshoot problems. Experienced no packet loss, unless a relay in the circuit suddenly went offline. If you want, I can measure packet loss from various locations

Re: [tor-relays] DOS Protection mini RFC

2024-08-14 Thread George Hartley via tor-relays
:20 PM, pasture_clubbed242--- via tor-relays wrote: > Since it is still all fresh in our heads, I wanted to pitch an idea real > fast. No idea if it was covered at a tor meeting at some point. > > For bridge relay operators, such as those with very low bandwidth, it may be > w

[tor-relays] DOS Protection mini RFC

2024-08-13 Thread pasture_clubbed242--- via tor-relays
Since it is still all fresh in our heads, I wanted to pitch an idea real fast. No idea if it was covered at a tor meeting at some point. For bridge relay operators, such as those with very low bandwidth, it may be worth it to keep lower-than-consensus-restrictions using the DOS flags here

Re: [tor-relays] Recent Tor versions not reloading config on / ignoring HUP kill signal.

2024-08-10 Thread George Hartley via tor-relays
PM, George Hartley wrote: > Hi, > > I think this started with release 0.4.8.10, but both of my Tor relays no > longer reload their config when doing for example: > > > - systemctl reload tor@exit > > > Here is the relevant part of the unit file:

Re: [tor-relays] Reapply exit policy on reload

2024-08-10 Thread George Hartley via tor-relays
licy allows. > DoSCircuitCreation/DoSConnection are enacted by guards, to protect > themselves, and to some extent the rest of the network, from "noisy > IPs" trying to connect to Tor. > ReevaluateExitPolicy is not a DoS option, it doesn't take any action > automatically. It is

Re: [tor-relays] Reapply exit policy on reload

2024-08-10 Thread George Hartley via tor-relays
P.S: If this is a client to guard detection only, then why does my exit node also block a significant amount of DoS (I had around the same statistics when my guard probability fraction was still zero, so clearly something is working): > Aug 09 21:08:36 matrix tor[XXX]: Aug 09 21:08:36.

Re: [tor-relays] Reapply exit policy on reload

2024-08-09 Thread George Hartley via tor-relays
Then these must be targeted attacks, as I have never encountered something like this during 10 years of relay operation under different providers and aliases. Sorry, but the Tor logs that I am seeing suggest that most DoS gets mitigated. As far as I know, the concurrent connection (not circuit

Re: [tor-relays] Reapply exit policy on reload

2024-08-09 Thread George Hartley via tor-relays
This is already impossible, as both circuit and concurrent connection DoS both gets detected and the IP in question flagged and blacklisted. Please see the manual on this: https://2019.www.torproject.org/docs/tor-manual.html.en#DoSCircuitCreationEnabled All the best, George On Sunday, August

Re: [tor-relays] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-08-09 Thread George Hartley via tor-relays
> I also don't like the idea of using exit servers as entrances to Tor. But you do realize that Tor exits also receive the Guard flag, and Guard probability assigned? Check my server: https://metrics.torproject.org/rs.html#details/0F8538398C61ECBE83F595E3716F7CE7E4C77B21 It mostly ac

Re: [tor-relays] Reapply exit policy on reload

2024-08-03 Thread George Hartley via tor-relays
I would definitely want to be able to change my exit policy by just sending a simple "kill -SIGHUP $pid". So yeah, consider myself interested in this functionality. But, don't we already have that implemented? I remember changing my exit policy then doing "systemctl relo

Re: [tor-relays] Opening metrics-api.torproject.org for testing

2024-08-02 Thread Toralf Förster via tor-relays
On 8/2/24 17:38, Hiro wrote: We are now opening NSA for testing May I ask, what the abbreviation "NSA" means? -- Toralf _______ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Archive key from deb.torproject.org was renewed!

2024-08-01 Thread Martin Gebhardt via tor-relays
>> Since you are all tinkering with your servers anyway, why don't you try >> deb822-style ;-) > > Because that doesn't make sense for public Tor nodes, but rather for .onion > services. > Many ISPs and providers have a Debian and Tor mirror and I use them via

Re: [tor-relays] Tor Metrics 'Running' flag is back for bridges who don't publish the OrPort

2024-07-29 Thread Toralf Förster via tor-relays
___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] tor middle relay issue

2024-07-22 Thread theyarewatching via tor-relays
I have had two ubuntu based tor middle relays fail.I am using a proxmox server and have tried both ubuntu server 20.04 and a fresh download of ubuntu 24.04. I follow the tor website install instructions. The results show the same no matter what version of ubuntu. "failed to start

Re: [tor-relays] Archive key from deb.torproject.org was renewed!

2024-07-16 Thread Martin Gebhardt via tor-relays
Hi, >> wget >> -qO-https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc >> | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg >> >/dev/null > > Is the name important? I assume it's Debian? The onfigurat

Re: [tor-relays] Archive key from deb.torproject.org was renewed!

2024-07-16 Thread Toralf Förster via tor-relays
On 7/16/24 14:03, boldsuck wrote: wget -qO-https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg >/dev/null Is the name important? I'm asking b/c Ansible [1] seems to use "deb.t

  1   2   3   4   5   6   7   8   9   10   >