Re: [tor-relays] Tor Relay Software Warns When Current RunningVersion Of Tor Is No Longer Recommended, But Not When A Newer Version IsAvailable?

2018-09-20 Thread Felix


Am 21.09.2018 um 00:39 schrieb teor:
> 
>> On 21 Sep 2018, at 04:00, Keifer Bly  wrote:
>>
>> So what would be an advised way to make sure tor is 100% up to date, besides 
>> the update command? Thank you.
> 
> Since you are on macOS and using Homebrew, you should use "brew update".
> No extra steps are needed.
> 
> If you want, you can watch the logs for warnings that your tor version is
> not recommended.

And you can find the list of the good ones on your pc. All tor instances
need a file `cached-microdesc-consensus´. Read the text and find the
`client-versions´ line.

Currently the entry says:

client-versions
0.2.9.14,0.2.9.15,0.2.9.16,0.2.9.17,0.3.2.6-alpha,0.3.2.7-rc,0.3.2.8-rc,0.3.2.9,0.3.2.10,0.3.2.11,0.3.2.12,0.3.3.1-alpha,0.3.3.2-alpha,0.3.3.3-alpha,0.3.3.4-alpha,0.3.3.5-rc,0.3.3.6,0.3.3.7,0.3.3.8,0.3.3.9,0.3.3.10,0.3.4.1-alpha,0.3.4.2-alpha,0.3.4.3-alpha,0.3.4.4-rc,0.3.4.5-rc,0.3.4.6-rc,0.3.4.7-rc,0.3.4.8,0.3.5.1-alpha

-- 
Cheers, Felix
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Jerk spammers on tor-relays (was Re: Fwd: Tor GuardRelay)

2018-09-20 Thread Keifer Bly
So, for me, it appears that the jerk spammers have advanced, Instead of
sending spam to the tor-relays@lists.torproject.org email address, they are
now directly sending spam to specific addresses subscribed to the list. I
got one today from  colemanroset...@gmail.com, and have been receiving some
over the last few days that were sent directly to this email address. I did
not think they were related, but the other email addresses the one I
received today was also sent to the addresses below, which I believe are
addresses that are subscribed to the list. I have reported it to Google via
their abuse report email address which is registrar-ab...@google.com, so I
will see what they say (and forward it to the list if requested).

The other addresses were: johndalton...@gmail.com, and teor2...@gmail.com.
I tried attaching a photo of the "to" field but it was rejected due to size
limitations.


Just thought I'd give a heads up.

On Thu, Sep 20, 2018 at 9:10 PM Keifer Bly  wrote:

> So, for me, it appears that the jerk spammers have advanced, Instead of
> sending spam to the tor-relays@lists.torproject.org email address, they
> are now directly sending spam to specific addresses subscribed to the list.
> I got one today from  colemanroset...@gmail.com, and have been
> receiving some over the last few days that were sent directly to this email
> address. I did not think they were related, but the other email addresses
> the one I received today was also sent to the addresses in the attached
> photo, which I believe are addresses that are subscribed to the list. I
> have reported it to Google via their abuse report email address which is
> registrar-ab...@google.com, so I will see what they say (and forward it
> to the list if requested).
>
> Just thought I'd give a heads up.
>
>
>
> On Fri, Jul 13, 2018 at 7:47 PM Keifer Bly  wrote:
>
>> I looked it up. You can forward the spams that the Gmail address are
>> sending to registrar-ab...@google.com, which reports spam emails and
>> inappropriate content being sent by Gmail users to Google. Try that.
>>
>>
>>
>> *From: *Mirimir 
>> *Sent: *Friday, July 13, 2018 7:41 PM
>> *To: *tor-relays@lists.torproject.org
>> *Subject: *Re: [tor-relays] Jerk spammers on tor-relays (was Re: Fwd:
>> Tor GuardRelay)
>>
>>
>>
>> On 07/13/2018 03:07 PM, Keifer Bly wrote:
>>
>> > Dang. I stopped getting them for a while due to the SPAM filter I
>>
>> > configured in Gmail, however they are now coming through again. These
>>
>> > spammers are trying to be smart by sending these spam messages from
>>
>> > different domains; they are now coming from
>>
>> > scarlettsofia710...@it.argmx.com
>>
>> >
>>
>> > Anyone else  getting these?
>>
>> >
>>
>> > Thanks.
>>
>>
>>
>> I haven't received those after posts since June 27. And nothing from
>>
>> *.argmx.com. But I am getting sex spam from a few Gmail addresses, with
>>
>> blank subject lines. New, and perhaps related.
>>
>>
>>
>> > On Sat, Jun 9, 2018 at 10:38 PM Roger Dingledine  wrote:
>>
>>
>>
>> 
>>
>>
>>
>> >> Maybe there is a mailman module that lets you send a different
>> watermarked
>>
>> >> mail to each subscriber, or to send mails out with different timing
>>
>> >> patterns to do a binary search over the list, in order to discover
>> which
>>
>> >> addresses are triggering the spam? But I don't know of an easy way to
>>
>> >> do it.
>>
>>
>>
>> That would be a bad precedent, I think ;)
>>
>>
>>
>> >> Also, I hear from at least one person that some tor-dev subscribers are
>>
>> >> getting spams too. :(
>>
>>
>>
>> Searching for the spam addresses, I found reports from other mail lists.
>>
>> So it's not just Tor lists.
>>
>>
>>
>> 
>>
>> ___
>>
>> tor-relays mailing list
>>
>> tor-relays@lists.torproject.org
>>
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
>>
>>
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay out of consensus after node migration

2018-09-20 Thread teor

> On 21 Sep 2018, at 04:26, T0r-n0d3  wrote:
> 
> I recently migrated my tor node to new hardware:
> t0rnod3 5582BBEC12380E34D7DFB8C237939A0B317B205E
> 
> Copying  the /var/lib/tor/keys/ folder on the process.
> Now my node do not handles circuits, nor it's shown in atlas and I see the 
> following on the logs:
> [notice] Heartbeat: It seems like we are not in the cached consensus.

What does your relay log when it uploads its descriptor to the directory
authorities?

Please restart your relay, and send us your notice-level logs via a pastebin
service.

https://paste.debian.net/ is accessible over tor, for those of us who use
Tor Browser.

T___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Software Warns When Current RunningVersion Of Tor Is No Longer Recommended, But Not When A Newer Version IsAvailable?

2018-09-20 Thread teor

> On 21 Sep 2018, at 04:00, Keifer Bly  wrote:
> 
> So what would be an advised way to make sure tor is 100% up to date, besides 
> the update command? Thank you.

Since you are on macOS and using Homebrew, you should use "brew update".
No extra steps are needed.

If you want, you can watch the logs for warnings that your tor version is
not recommended.

T

>> On Wed, Sep 19, 2018 at 11:13 PM teor  wrote:
>> 
>>> On 20 Sep 2018, at 07:02, Keifer Bly  wrote:
>>> 
>>>  
>>> 
>>> A few days ago, I upgraded my version of tor from 0.3.3.9 to tor 0.3.4.8. I 
>>>  noticed, however, that tor does not tell me when a new version is 
>>> available. But in the past when I was a few versions behind, it popped up 
>>> with a message saying “WARNING: this version of tor is out of date or no 
>>> longer recommended.”
>>> 
>>>  
>>> 
>>> So, I am just wondering, why is it that the tor software warns when the 
>>> current version is “no longer recommended” but does not warn when an update 
>>> is available?
>>> 
>> 
>>> From: teor
>>> Sent: Wednesday, September 19, 2018 5:04 PM
>>> 
>>> Tor only warns about obsolete versions.
>>> 
>>> It doesn't warn when there is a new release or "new in series" version 
>>> available.
>>> 
>>>  
>>> 
>>> Definitions here:
>>> 
>>> https://gitweb.torproject.org/torspec.git/tree/version-spec.txt#n53
>>> 
>> 
>>> On 20 Sep 2018, at 12:56, Keifer Bly  wrote:
>>> 
>>> So does this mean any version of tor is safe to use as long as it is not 
>>> considered “obsolete”? Thanks.
>>> 
>> 
>> Sometimes, a supported releases series will have serious security bugs.
>> 
>> When we fix those bugs, we "un-recommend" that version, and recommend
>> the newer versions in that series.
>> 
>> So please don't run "obsolete" or "un-recommended" Tor versions.
>> 
>> T
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Help! TOR Relat dead after upgrading Ubuntu to 18.04

2018-09-20 Thread Stephen Mollett
Hi,

On 20/09/2018 10:37, Ben Riley wrote:
> ... I've actually got 4 ports open on the router for TOR - 9001, 9030,
> 9050 & 9051.
> 
> I set 9030 as my control port in torrc - does that port need to be open
> on the router? ...
You probably don't need or want either the control port or the SOCKS
port open on the router.

The control port is normally used to allow "front end" software like
Vidalia to connect to the node and get diagnostic information, change
some configuration settings, tell it to do things like build a new
circuit, etc. so it only needs to be accessible to machines from which
you want to manage the node in this way. If, for some reason, you did
want to manage the node over the internet, I would recommend keeping the
port blocked on the router anyway and tunnelling it through an SSH
connection to the server.

The SOCKS port is used to tunnel connections through Tor, either
directly from software that supports SOCKS, via a wrapper such as
socksify or torify or through a proxy server like Privoxy. Again, that
only needs to be accessible to machines from which you want to "use"
Tor. Again, if you want to use your node as a "gateway" into Tor from
elsewhere, you should tunnel the port over SSH.

Hope this helps,
Stephen
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] IPv6 on DSL

2018-09-20 Thread Paul
Thank you for your hint Ralph - the domain could be spoofing :-), but yes you 
are right, its non exit traffic.

@nusenu: what whould be this list without you - thanks!! 

> 
> Based on your email domain and your question about a dynamic DSL link,
> I'm guessing you are considering running a Tor relay at home? As stated
> in https://www.torproject.org/docs/faq-abuse.html.en : "In general, it's
> advisable not to use your home internet connection to provide a Tor
> relay."
> 
> -Ralph
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Relay out of consensus after node migration

2018-09-20 Thread T0r-n0d3
Hi,
I recently migrated my tor node to new hardware:
t0rnod3 5582BBEC12380E34D7DFB8C237939A0B317B205E

Copying  the /var/lib/tor/keys/ folder on the process.
Now my node do not handles circuits, nor it's shown in atlas and I see the 
following on the logs:
[notice] Heartbeat: It seems like we are not in the cached consensus.

Kind regards

Sent with [ProtonMail](https://protonmail.com) Secure Email.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] IPv6 on DSL

2018-09-20 Thread Ralph Seichter
On 20.09.18 16:54, Paul wrote:

> Can Tor cope with a daily changing IPv6 Address?

Based on your email domain and your question about a dynamic DSL link,
I'm guessing you are considering running a Tor relay at home? As stated
in https://www.torproject.org/docs/faq-abuse.html.en : "In general, it's
advisable not to use your home internet connection to provide a Tor
relay."

-Ralph
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Relay Software Warns When Current RunningVersion Of Tor Is No Longer Recommended, But Not When A Newer Version IsAvailable?

2018-09-20 Thread Keifer Bly
So what would be an advised way to make sure tor is 100% up to date,
besides the update command? Thank you.

On Wed, Sep 19, 2018 at 11:13 PM teor  wrote:

>
> On 20 Sep 2018, at 07:02, Keifer Bly  wrote:
>
>
>
> A few days ago, I upgraded my version of tor from 0.3.3.9 to tor 0.3.4.8.
> I  noticed, however, that tor does not tell me when a new version is
> available. But in the past when I was a few versions behind, it popped up
> with a message saying “WARNING: this version of tor is out of date or no
> longer recommended.”
>
>
>
> So, I am just wondering, why is it that the tor software warns when the
> current version is “no longer recommended” but does not warn when an update
> is available?
>
>
> *From: *teor 
> *Sent: *Wednesday, September 19, 2018 5:04 PM
>
> Tor only warns about obsolete versions.
>
> It doesn't warn when there is a new release or "new in series" version
> available.
>
>
>
> Definitions here:
>
> https://gitweb.torproject.org/torspec.git/tree/version-spec.txt#n53
>
>
> On 20 Sep 2018, at 12:56, Keifer Bly  wrote:
>
> So does this mean any version of tor is safe to use as long as it is not
> considered “obsolete”? Thanks.
>
>
> Sometimes, a supported releases series will have serious security bugs.
>
> When we fix those bugs, we "un-recommend" that version, and recommend
> the newer versions in that series.
>
> So please don't run "obsolete" or "un-recommended" Tor versions.
>
> T
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] More IPv6 questions

2018-09-20 Thread nusenu


Paul:
> https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#Parttwo:technicalsetup
> 
> uses "ORPort [IPv6-address]:9001"  - so can i use the same port number for 
> IPv4 and IPv6?

yes


> If I run more than one instance on the same machine, can i use the same IPv6 
> address like in the first instance - as i can do in IPv4?

yes
 




-- 
https://twitter.com/nusenu_
https://mastodon.social/@nusenu



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] IPv6 on DSL

2018-09-20 Thread nusenu


Paul:
> Can Tor cope with a daily changing IPv6 Address?

unfortunatelly the IPv6 address currently has to be in the torrc file,
so a daily changing IPv6 address won't be much fun

-- 
https://twitter.com/nusenu_
https://mastodon.social/@nusenu



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] More IPv6 questions

2018-09-20 Thread Paul
https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#Parttwo:technicalsetup

uses "ORPort [IPv6-address]:9001"  - so can i use the same port number for IPv4 
and IPv6?

If I run more than one instance on the same machine, can i use the same IPv6 
address like in the first instance - as i can do in IPv4? 

"ip addr|grep inet6|grep global" doesn't give an answer on every server - what 
to do instead please to fill the square brackets?

Thanks Paul
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] IPv6 on DSL

2018-09-20 Thread Paul
Can Tor cope with a daily changing IPv6 Address?

If so, are there any additional inputs in torrc to be made as "ip addr|grep 
inet6|grep global" is not giving a fix value (global noprefixroute dynamic )


Thanks 


Paul
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Help! TOR Relat dead after upgrading Ubuntu to 18.04

2018-09-20 Thread Ben Riley
I'm back in business THANK YOU!!

So I changed a couple of ports and also opened those on my router.
Previously I only had 9030 & 9001. I've added DirPort on 9051, Socks on
9050. I've actually got 4 ports open on the router for TOR - 9001, 9030,
9050 & 9051.

I set 9030 as my control port in torrc - does that port need to be open on
the router? Or can I remove that port forward? I have one of the
authentication methods unhashed, so I believe that protects that somewhat.

netstat -tlpn returns the following:

Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address   Foreign Address
State   PID/Program name
tcp0  0 0.0.0.0:90510.0.0.0:*
LISTEN  9531/tor
tcp0  0 127.0.0.1:9030  0.0.0.0:*
 LISTEN  9531/tor
tcp0  0 0.0.0.0:90010.0.0.0:*
  LISTEN  9531/tor
tcp0  0 127.0.0.1:5939  0.0.0.0:*
LISTEN  1342/teamviewerd
tcp0  0 127.0.0.53:53   0.0.0.0:*
LISTEN  747/systemd-resolve
tcp0  0 127.0.0.1:631   0.0.0.0:*
 LISTEN  6055/cupsd
tcp0  0 127.0.0.1:9050  0.0.0.0:*
LISTEN  9531/tor
tcp6   0  0 ::1:631 :::*
   LISTEN  6055/cupsd

nyx appears to be running fine now. I can see the graph and log messages
like previously.
It pulled my previous Nickname, but I currently have no flags, so I'm
guessing that will update later.

I've got the exit policy set to reject *:* however, as I don't want to blow
my ISP off.

Is that about it? Can anyone think of anything else I need to check?

Thank you to everyone who offered solutions!



On Thu, Sep 20, 2018 at 4:19 AM Chad MILLER  wrote:

> I maintain the tor-middle-relay Snap package. It listens on system-chosen,
> arbitrary ports. May be useful to you, itself, or to steal ideas from.
>
> $ sudo snap install tor-middle-relay
>
>
>
>
> On Wed, Sep 19, 2018, 04:56 Ben Riley  wrote:
>
>> First off, will outline that I am very much a newbie, but was able to get
>> a relay up and running on a Ubuntu machine.  It was running fine for maybe
>> 12 months (MelbTorBox), with a few resets and software updates along the
>> way.
>>
>> Just doing my bit to help the network.
>>
>> Anyway, after the Ubuntu upgrade, I had to re-install TOR and I believed
>> I did it basically the same way.
>>
>> Unfortunately, that appears not to be the case.
>> I've posted the error messages on the Ubuntu forum hoping to get
>> assistance, but no joy:
>>
>> https://askubuntu.com/questions/1070469/18-04-tor-relay-error-could-not-bind-to-0-0-0-09050-address-already-in-use-i
>>
>> I'm now coming to the experts to see if I can resurrect relay before I
>> pull the pin on the idea.
>>
>> I have BASIC Unix knowledge (I can type commands and that's about it). I
>> think I might have a couple of copies installed in different places and I
>> know I have the TOR browser installed (it works fine).
>>
>> When I type 'nyx' it replies with:
>> Unable to connect to tor. Maybe it's running without a ControlPort?
>>
>> So I type 'tor' and get
>> Sep 19 21:34:24.819 [notice] Tor 0.3.4.8 (git-5da0e95e4871a0a1) running
>> on Linux with Libevent 2.1.8-stable, OpenSSL 1.1.0g, Zlib 1.2.11, Liblzma
>> 5.2.2, and Libzstd 1.3.3.
>> Sep 19 21:34:24.819 [notice] Tor can't help you if you use it wrong!
>> Learn how to be safe at
>> https://www.torproject.org/download/download#warning
>> Sep 19 21:34:24.819 [notice] Read configuration file "/etc/tor/torrc".
>> Sep 19 21:34:24.823 [notice] Based on detected system memory,
>> MaxMemInQueues is set to 2862 MB. You can override this by setting
>> MaxMemInQueues by hand.
>> Sep 19 21:34:24.824 [notice] Scheduler type KIST has been enabled.
>> Sep 19 21:34:24.824 [notice] Opening Socks listener on 127.0.0.1:9050
>> Sep 19 21:34:24.824 [notice] Opening Control listener on 127.0.0.1:9051
>> Sep 19 21:34:24.824 [notice] Opening OR listener on 0.0.0.0:9001
>> Sep 19 21:34:24.824 [notice] Opening Directory listener on 0.0.0.0:9050
>> Sep 19 21:34:24.824 [warn] Could not bind to 0.0.0.0:9050: Address
>> already in use. Is Tor already running?
>> Sep 19 21:34:24.824 [notice] Closing partially-constructed Socks listener
>> on 127.0.0.1:9050
>> Sep 19 21:34:24.824 [notice] Closing partially-constructed Control
>> listener on 127.0.0.1:9051
>> Sep 19 21:34:24.824 [notice] Closing partially-constructed OR listener on
>> 0.0.0.0:9001
>> Sep 19 21:34:24.824 [warn] Failed to parse/validate config: Failed to
>> bind one of the listener ports.
>> Sep 19 21:34:24.824 [err] Reading config failed--see warnings above.
>>
>> I 'think' my original torrc file may have somehow survived the Ubuntu
>> upgrade, but I don't know how as  I did a wipe and re-install of Ubuntu.
>> But when I edited it, there were my contact details sitting there.
>>
>> Very appreciative of any help!
>>
>> Thanks
>> Ben.
>>
> _