Re: [tor-relays] yui.cat relays: please update 'MyFamily' in your torrc
Hi Jordan, thanks for running exit relays. Please do not forget to update the MyFamily parameter in your torrc configuration to tell clients your relays belong to a single operator, otherwise they might use your relays in multiple positions within a circuit, which is rather bad for their anonymity. If you need help with the MyFamily option let us know. thanks, nusenu https://raw.githubusercontent.com/ornetstats/stats/master/o/potentially_dangerous_relaygroups.txt https://github.com/nusenu/ansible-relayor +--++ | nickname | eFamilyMembers | +--++ | yuicat1 | NULL | | yuicat2 | 4 | | yuicat3 | NULL | | yuicat4 | 4 | | yuicat5 | 4 | | yuicat6 | 4 | +--++ signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] dipulse.it relays: please specify 'MyFamily' in your torrc
Hi, thanks for adding more tor relays. Please do not forget to set the MyFamily parameter in your torrc configuration to tell clients your relays belong to a single operator, otherwise they might use your relays in multiple positions within a circuit, which is rather bad for their anonymity. If you need help with the MyFamily option let us know. thanks, nusenu https://github.com/nusenu/ansible-relayor https://raw.githubusercontent.com/ornetstats/stats/master/o/potentially_dangerous_relaygroups.txt ornetra...@riseup.net: > 2017-02-19 > --- > Up|Ext|JoinTime| IP | AS | CC | ORp | Dirp | OS > | Version | Nickname | eFamlen > --- > 1 | 0 | 12:53:10 | 163.172.189.100 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.3.1.0-alpha-dev | DipulseFR15 | 1 > 1 | 0 | 12:49:39 | 163.172.181.240 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.3.1.0-alpha-dev | DipulseFR16 | 1 > 1 | 0 | 12:45:42 | 163.172.187.152 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.3.1.0-alpha-dev | DipulseFR14 | 1 > 1 | 0 | 12:51:17 | 163.172.183.161 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.3.1.0-alpha-dev | DipulseFR18 | 1 > 1 | 0 | 12:42:14 | 163.172.160.239 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.3.1.0-alpha-dev | DipulseFR13 | 1 > 1 | 0 | 12:52:08 | 163.172.183.220 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.2.8.12 | DipulseFR19 | 1 > 1 | 0 | 12:46:43 | 212.47.245.227 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.3.1.0-alpha-dev | DipulseFR12 | 1 > 1 | 0 | 12:55:27 | 212.47.236.157 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.3.1.0-alpha-dev | DipulseFR17 | 1 > 1 | 0 | 14:29:40 | 163.172.166.1 | Online S.a.s. | fr | 8443 | 8080 | > Linux | 0.3.1.0-alpha-dev | DipulseFR11 | 1 > Fingerprints: > 5928164F3759E3710393E7DC1ED69FACB669BE82,0211F6543B8EB8BE2AAD17ABD05635BD135FFCF7,D3FA077CE59A2D13B6E6B8C62B04A2C03BAC784F,8D60E9C8DB03BE39159B8824680ACCBD642ACF62,AF59C8E3CBB0B2C34D2BDCBA55CD7282BAA22B22,B66760160753DD26A6FD1B4B87F9CB3D0EEACC2D,619B69FD8F3A4642E2E8E40B5E97D2875496C829,B5CFDBA1E8DAFE061C5D259BBC44BF994ACB8C26,EFDCB52BD37CDDEFDD38DEF3F6C7A60DCCF099EE > signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] CentOS Tor exit node broken after updating to 2.8.12
Hello, I recently upgraded my tor version to 2.8.12 from 2.8.9(?) I think. Tor can now no longer bind to ports, as a regular user: /[warn] Could not bind to 0.0.0.0:43: Permission denied/ As root: /Feb 25 11:57:14.942 [notice] Opening OR listener on 0.0.0.0:43// //Feb 25 11:57:14.942 [notice] Opening Directory listener on 0.0.0.0:9030// //Feb 25 11:57:14.942 [notice] Closing partially-constructed Socks listener on 127.0.0.1:9050// //Feb 25 11:57:14.942 [notice] Closing partially-constructed Control listener on 127.0.0.1:9051// //Feb 25 11:57:14.942 [notice] Closing partially-constructed OR listener on 0.0.0.0:43// //Feb 25 11:57:14.942 [notice] Closing partially-constructed Directory listener on 0.0.0.0:9030// //Feb 25 11:57:14.942 [warn] Failed to parse/validate config: Failed to bind one of the listener ports.// / In the former case, I tried using eip to allow tor to bind to ports lower than 1024 but it made no difference. I suspect this an issue with the configuration of the server rather than tor. Where should I start? Best, Chris -- Protect your privacy: encrypt your communications GPG: CF7F98B2 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Is there a logical limit of MyFamily members?
Thank you. :-) > On Feb 25, 2017, at 03:01, nusenuwrote: > > > > John Ricketts: >> I have 30 nodes now and my year end I intend to run enough to reach >> 6% of exit probability. I want to know if there is a logical limit >> per family. > > There is a max. descriptor size limit (20k) [1] and MyFamily is uploaded > via descriptors. > > Taking the descriptor of QuintexAirVPN26 as a sample you could probably > fit another ~380 family members into that descriptor before you hit the > descriptor limit (but any other changes like exit policy influence your > descriptor size as well). > > > [1] https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n364 > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Is there a logical limit of MyFamily members?
John Ricketts: > I have 30 nodes now and my year end I intend to run enough to reach > 6% of exit probability. I want to know if there is a logical limit > per family. There is a max. descriptor size limit (20k) [1] and MyFamily is uploaded via descriptors. Taking the descriptor of QuintexAirVPN26 as a sample you could probably fit another ~380 family members into that descriptor before you hit the descriptor limit (but any other changes like exit policy influence your descriptor size as well). [1] https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n364 signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
[tor-relays] Is there a logical limit of MyFamily members?
All, I have 30 nodes now and my year end I intend to run enough to reach 6% of exit probability. I want to know if there is a logical limit per family. Thanks! John ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] [OrNetRadar] AS: "EDIS GmbH" - Linux (15)
If you added 15 relays on 2017-02-24 (yesterday) on AS38478, please consider setting ContactInfo and MyFamily in your torrc (and maybe a more recent tor version). thanks ornetra...@riseup.net: > 2017-02-24 > --- > Up|Ext|JoinTime| IP | CC | ORp | Dirp |Version | > ContactInfo| Nickname | eFamlen > --- > 1 | 0 |15:31:23| 124.248.229.138 | hk | 9001 | 9051 |0.2.8.9 | None > | coast | 1 > 1 | 0 |15:33:47| 124.248.229.140 | hk | 9001 | 9051 |0.2.8.9 | None > | crop | 1 > 1 | 0 |15:35:17| 124.248.238.194 | hk | 9001 | 9051 |0.2.8.9 | None > | beach | 1 > 1 | 0 |15:39:10| 124.248.238.197 | hk | 9001 | 9051 |0.2.8.9 | None > | queen | 1 > 1 | 0 |15:51:44| 124.248.229.142 | hk | 9001 | 9051 |0.2.8.9 | None > | castle | 1 > 1 | 0 |17:27:16| 103.44.66.2 | None | 9001 | 9051 |0.2.8.9 | None > | tennis | 1 > 1 | 0 |17:39:25| 103.27.126.28 | hk | 9001 | 9051 |0.2.8.9 | None > | court | 1 > 1 | 0 |17:48:57| 103.44.66.4 | None | 9001 | 9051 |0.2.8.9 | None > | waterfall | 1 > 1 | 0 |17:58:26| 103.44.66.5 | None | 9001 | 9051 |0.2.8.9 | None > | camp | 1 > 1 | 0 |18:06:15| 103.27.126.27 | hk | 9001 | 9051 |0.2.8.9 | None > | fighter | 1 > 1 | 0 |18:25:53| 43.242.174.35 | hk | 9001 | 9051 |0.2.8.9 | None > | burn | 1 > 1 | 0 |18:38:11| 43.242.174.36 | hk | 9001 | 9051 |0.2.8.9 | None > | leisure | 1 > 1 | 0 |18:46:30| 43.242.174.37 | hk | 9001 | 9051 |0.2.8.9 | None > | clerk | 1 > 1 | 0 |18:55:48| 150.107.44.3| hk | 9001 | 9051 |0.2.8.9 | None > | servant | 1 > 1 | 0 |19:00:45| 150.107.44.2| hk | 9001 | 9051 |0.2.8.9 | None > | mankind | 1 > Fingerprints: > 25214D40CD1747A06FA2E695E48AED0E988ABA61,25214D43D1FDAF97EBCB68C282D7AA247A1BC487,25214D43CF6621FD4FBEB6FC654A29702965094D,25214D42EC6083C31E1709D86CEBEFFCD4BE1958,7053866617EA5FD3AC0B5D4EB8CE6EC792F99AF5,AB559BE305A7A63962944D32A69AEB2AF9EAC7DC,AB559BE25926F720890BDAE88407E1A676883304,AB559BE2CA986C0EDEFBD78B48621DD36C349AD4,AB559BE02A323465AB8C3D0BB18EA04A1F13E32F,203281E1A349FAA241B6A66456A5AFD1C5B49410,203281E3EBC4E8AB7F040AD8A86B8767A5F6F849,203281E0784DE0DFB5C39C714A39E76AAA61,203281E37E44A5ABCEA7880DA47895197E92D546,203281E1226E3C1EEBA522409109C847AB14A2B9,203281E27627443DB6FE5E06250DDDB6D9718A0C > signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays