Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread Seth

On Sat, 22 Nov 2014 22:42:15 -0800, Mirimir miri...@riseup.net wrote:


How much throughput do you get with your VPS, 1000 GB/mo or 2000 GB/mo?


The 1000 GB/mo applies to whichever value is greater, input or output. So  
far the Tor node is pushing less than 1.5GB per day. Takes a while for  
traffic to ramp up apparently.



As I read comments in torrc, AccountingMax applies separately to sent
and received bytes, not to their sum, and so setting '4 GB' may allow
up to 8 GB total before hibernating.


Yes, others have raised this issue as well and I will look into it.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread Seth

On Sat, 22 Nov 2014 19:13:17 -0800, ZEROF secur...@netmajstor.com wrote:

I saw some info just yesterday, but it's not in actual server  
configuration. Can you provide some good resource for setting  
dnscrypt-proxy? And no logging DNS's is good to protect end users
A caveat: You should probably avoid using the default OpenDNS servers with  
dnscrypt-proxy.


From the 'Bad Relays' wiki page  
https://trac.torproject.org/projects/tor/wiki/doc/badRelays


 The most common misconfiguration I have seen is using ​OpenDNS as a  
host's nameserver with what I think is the OpenDNS default config.  
Services such as OpenDNS lie to you, under the name of protecting you. The  
result is for instance getting redirected to their webpage when you want  
to visit evil sites such as ​https://www.torproject.org/.;___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread ZEROF
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

I'm not using opendns. OpenNic and OpenDNS are not same thing.


On 23 November 2014 at 23:59, Seth  wrote:
On Sat, 22 Nov 2014 19:13:17 -0800, ZEROF  wrote:

I saw some info just yesterday, but it's not in actual server
configuration. Can you provide some good resource for setting
dnscrypt-proxy? And no logging DNS's is good to protect end users
A caveat: You should probably avoid using the default OpenDNS servers
with dnscrypt-proxy.

From the 'Bad Relays' wiki page
https://trac.torproject.org/projects/tor/wiki/doc/badRelays

 The most common misconfiguration I have seen is using ​OpenDNS as a
host's nameserver with what I think is the OpenDNS default config.
Services such as OpenDNS lie to you, under the name of protecting you.
The result is for instance getting redirected to their webpage when
you want to visit evil sites such as ​https://www.torproject.org/.;

___
tor-relays mailing
listtor-relays@lists.torproject.orghttps://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




- --http://www.backbox.orghttp://www.pentester.iz.rs

-BEGIN PGP SIGNATURE-
Version: OpenPGP.js v0.7.2
Comment: http://openpgpjs.org

wsFcBAEBCAAQBQJUcoEyCRDHWR777fxuEQAAT7EP/A+lRfEQ/p2id19oJDhM
3JZZQZaTdUPv0elzrllzhse/pErPTcTzu6uoghyVE7sLbdalcFZ5HATg2RR0
+DpI3czxd9TuOCj3k+kz8vfSxj3J0IDBvIQM+z3d4B7xfbp5DmMrJVxm+OOF
J8TsN+yfspw6g3GJaBMzC7ZlrVGlAsgo47nYSjgMZy8082te6XFVNclAZ76Q
PRT3IQyovTGHVKtx4WTnO5w2oxdPefEzjn4z5LvqR6eQGOw4vpJZUX99zDKL
XQnBWhmhhprLW7wyVo7qLRFUpT6A/HY9GJBPz+j9LNDKCi1962Ajgo5Fl2iP
a76iv/v+jAgEiRJY+XrmVI1vgWYDYaegiMHdH82JExgbA0O717s1/2IPix3k
OEd3wS7iA9veXcrq7EMquyPDuKxAdsOhJTaAE50w74jfYx3a637p59VI9yzB
HdERrwdcfiTRnQVcf+KmKjmYXU+7WjxVE0ebjvJIPFTNC7VMlKrn/Vfmhhl9
Pn4Lm57FNgy2z9ah6VTGEVHLmgxtprGIxt14r10m2GyZFbKR8twO5DU5FXgE
XN1a956m+mh35dUQwlE6QIt7IefgrEvH/h6Pau9NTv2PMxxRlCj1ooR6w+Kn
Cvu9QYxeuXfDpgxZdGBmUOhWl5DG4xsiRVNM3JFWMPuLVGTtWTpSF/1uQjiZ
Brvw
=hwKy
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread Seth

On Sun, 23 Nov 2014 16:53:03 -0800, ZEROF secur...@netmajstor.com wrote:


I'm not using opendns. OpenNic and OpenDNS are not same thing.


I'm aware of the distinction.

What I was trying to point out for the benefit of people just getting  
started with dnscrypt-proxy, is that by default it uses OpenDNS servers.


At least it has in every environment that I've set it up in so far.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread usprey
http://blog.censurfridns.dk/en

Pretty sure this is no fon.

On 24 November 2014 at 02:18, Seth l...@sysfu.com wrote:

 On Sun, 23 Nov 2014 16:53:03 -0800, ZEROF secur...@netmajstor.com wrote:

  I'm not using opendns. OpenNic and OpenDNS are not same thing.


 I'm aware of the distinction.

 What I was trying to point out for the benefit of people just getting
 started with dnscrypt-proxy, is that by default it uses OpenDNS servers.

 At least it has in every environment that I've set it up in so far.

 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Fast Exit Node Operators - ISP in US

2014-11-23 Thread Mirimir
On 11/23/2014 11:05 AM, s7r wrote:
 That is, because in almost all cases, providers allow unmetered
 incoming traffic to your server but keep count and accounting on
 outgoing traffic from your server, which is why the torrc setting acts
 the way it does.

That would be great! I'll confirm with the provider.

I'm also wondering what to set for RelayBandwidthRate for an exit. I see
some old threads on this list, and a question at Tor.SE, but find
nothing that's clear and persuasive.

Assuming that the 1000 GB/mo limit applies to just outgoing traffic,
throughput would need to average ca. 0.4 MB/sec. However, median
advertised exit bandwidth from Tor Metrics is ca. 1 MB/sec, so it seems
unlikely that an exit advertising 0.4 MB/sec would be used very heavily.
And so actual usage would be far less than 0.4 MB/sec.

Conversely, setting RelayBandwidthRate to 3 MB/sec would ultimately lead
to heavy use. But with full utilization at 250 GB per day, the relay
would hibernate after just four days. There must be some intermediate
value that would bring average usage to 0.4 MB/sec.

What is the optimal RelayBandwidthRate for a 1000 GB/mo VPS? I'm
guessing that it's about 1 MB/sec.

 On 11/23/2014 7:58 PM, Seth wrote:
 On Sat, 22 Nov 2014 22:42:15 -0800, Mirimir miri...@riseup.net
 wrote:
 
 How much throughput do you get with your VPS, 1000 GB/mo or 2000
 GB/mo?
 
 The 1000 GB/mo applies to whichever value is greater, input or
 output. So far the Tor node is pushing less than 1.5GB per day.
 Takes a while for traffic to ramp up apparently.
 
 As I read comments in torrc, AccountingMax applies separately to
 sent and received bytes, not to their sum, and so setting '4
 GB' may allow up to 8 GB total before hibernating.
 
 Yes, others have raised this issue as well and I will look into
 it. ___ tor-relays
 mailing list tor-relays@lists.torproject.org 
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays