Re: [tor-relays] OrNetStats: Operator Level Graphs added

2021-01-11 Thread nusenu
> Maybe nitpicking but IMO It is irritating, that the 0% value (zero)
> of the left y-axis doesn't match the 0 GBit/s at the right y-axis
> (per default).

I find it actually useful to have distinct scaling and offsets
for the two y axis, because this way the available space is used 
more efficiently, no?
After learning that these are not starting at 0, things should
be clear.

What doesn't make sense for me: negative ranges, which I'll
try to address soon.

thanks for your input,
nusenu
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Introducing new bridge status page

2021-01-11 Thread Toralf Förster

On 1/11/21 9:03 PM, Philipp Winter wrote:

FINGERPRINT is your bridge's fingerprint or its hashed fingerprint --
either works.


for public bridges ;-)

--
Toralf
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Introducing new bridge status page

2021-01-11 Thread Philipp Winter
As part of our ongoing effort to reimplement BridgeDB, we now have a
bridge status page that shows if a bridge's pluggable transports work:

  https://bridges.torproject.org/status?id=FINGERPRINT

FINGERPRINT is your bridge's fingerprint or its hashed fingerprint --
either works.

The backend tests bridges every 18 hours by making a tor process fetch
the bridge's descriptor.  Tor bridges will soon log a URL pointing to
this status page:
https://gitlab.torproject.org/tpo/core/tor/-/issues/30477

As of today, 89% of all pluggable transports work.

Cheers,
Philipp
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] OrNetStats: Operator Level Graphs added

2021-01-11 Thread nusenu


Toralf Förster:
> (BTW that doesn't work at all with the current ciissversion if relays
> are hosted at different hoster at all, or?)

I didn't understand you there, would you like to elaborate?

Using multiple hosters is good and recommended and CIISS does not limit that,
it supports as many hosters as you like.


kind regards,
nusenu

-- 
https://nusenu.github.io



OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] OrNetStats: Operator Level Graphs added

2021-01-11 Thread nusenu
> - Can I leave my email address as it is [...]?

The use of "[]" is optional ("SHOULD"), 
so this is valid:

email:cont...@example.com

Also the example you mentioned is valid.


> I wanted to set up a httpd first. Luckily I left that. I wrote the
> fingerprints in the DNS. Would like to have as little software or
> services as possible on the relays.

just to clarify: there is no requirement to run additional software
on the relay. the url can point to an arbitrary domain that you manage.

kind regards,
nusenu



OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] My relay software gets hung up on OVH

2021-01-11 Thread lists

On 10.01.2021 22:23, Keifer Bly wrote:


Sometimes gets hung up. About every two weeks or so, the relay
software gets hung up, causing the relay to go offline. I notice when
this happens, the tor log file becomes unreadable, making it difficult


Try:
journalctl -xe
journalctl -u tor.service

What means unreadable? Then something is wrong with logrotate or 
/etc/logrotate.d/tor.



to tell what was happening with the tor process when this occurs. It
is only when the relay is restarted by running “killall tor” in
terminal and then restarting the relay.


Don't you run Tor as a normal systemd service?
systemctl status tor.service -> shows last errors
systemctl reload tor -> 'killall' is only the last resort


By the way, don't be surprised if your server is under DDoS.
You allow SSH password login for all users!

Allow only one or a group. Example:
/etc/ssh/sshd_config -> AllowUsers Keifer user2 ...
or AllowGroups ssh-users

Login is only recommended via ssh key auth, not with a password!
Or you only allow access via VPN or certain IP's.

Why do you have 'accept 6660-6667' in the torrc?
TCP 6660-6667 and 6697 are well known DDoS ports.
Even if you don't allow exit traffic, I don't know whether that can be 
exploited.


--
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Exit node in spain

2021-01-11 Thread n1ngu
Hi irr4z,

Spaniard relay operator here, sorry I missed the thread until now.

El 9/12/20 a les 21:04, li...@for-privacy.net ha escrit:

> Catalonia and Basque Country are the most liberal in Spain. Find a
> hosting company in Barcelona.

Regardless of this assumptions note that: both regions are under the
same regulations as the rest of the country AND usually suffer the
harshest treatment by Spain's law enforcement system (district
attorneys, courts, police forces, etc).

I think the key to success is in this previous email:

El 2/12/20 a les 22:07, Paul Templeton ha escrit:

> I will say I have never had a problem running an exit in Spain. I get 5 to 7 
> abuse emails a year. I respond to the complaints within 24 hours and have had 
> no recourse.
>
> I'm a resident of Australia and run it in Spain as it is cost effective 
> compared to here.

I think this is it: if you don't live in Spain, feel welcome to safely
host your relays in Spain data centers. But regarding the initial message

El 2/12/20 a les 9:25, irr4z ha escrit:

> Quickly, I write from Barcelona, I am interested in contributing to
> tor with exit nodes, but I am concerned about legal issues.
>
> I see that there is only 1 active exit node in Spain, and I wonder if
> it is so dangerous in my country  

While I think it isn't inherently dangerous to run exit relays in Spain
(you won't be severely prosecuted because of some abuse complaints,
etc)  Spain has an established authoritarian trend specially careless
about digital freedoms.

This turned out pretty clear at the end of 2017 with the arrest of a
sysadmin working at the foundation that manages the .cat TLD, the raid
of Catalonia's InfoTech & Telecom Center, the prosecution of random
people for forking a website backup in github (not to mention the folk
who uploaded it first), the overall censorship conducted by major ISPs, etc.

I apology for this rant, there is a ton more info for those who are
interested about it, but this facts lead me to this advice: keep a low
profile. Don't participate in demonstrations, don't take side in
political arguments (very publicly, like in twitter or alike), don't
make activism other than the tor relay, don't rant on the king,
specially don't join labor or any kind of syndicates nor political
parties. Neither run for president. Those are the things you will
prosecuted for, the relay will only be a pretext to raid you or arrest
you or turn the public against you and probably start a shaming campaign
against the Tor network.

Rephrased: censorship yourself. So you could argue this is an overall
stupid advice. And I wish it was. That said,

El 9/12/20 a les 21:23, irr4z ha escrit:

> Finally these are my new exit nodes

I celebrate your courage and I look forward the day the global pandemic
softens so the community can meet again (I missed last Barcelona
relay-operator meetup). I'm very much interested in your experiences.
I'll try to stay tuned but don't hesitate to update any incident in this
list or in private.

Salut

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] OrNetStats: Operator Level Graphs added

2021-01-11 Thread lists

On 10.01.2021 21:37, Felix wrote:


Am 10.01.2021 um 19:08 schrieb li...@for-privacy.net:

- Shall we also add the fingerprints from the bridges in 'proof'?


https://gitlab.torproject.org/tpo/core/torspec/-/blob/master/proposals/326-tor-relay-well-known-uri-rfc8615.md



:: No bridge fingerprints ::


OK thanks.

Possibly @nusenu can mention that here:
https://nusenu.github.io/ContactInfo-Information-Sharing-Specification/
at 'dns-rsa'

--
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] OrNetStats: Operator Level Graphs added

2021-01-11 Thread lists

On 10.01.2021 19:19, Toralf Förster wrote:


(BTW that doesn't work at all with the current ciissversion if relays
are hosted at different hoster at all, or?)


I wanted to set up a httpd first. Luckily I left that. I wrote the 
fingerprints in the DNS.
Would like to have as little software or services as possible on the 
relays.


--
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Config question

2021-01-11 Thread r1610091651
Hi

Recently upgraded to 4.4.6 and noticed new (for me) entry in tor logs:
Jan 11 09:24:28.000 [notice] While bootstrapping, fetched this many bytes:

This message gets repeated every 6 hours, while there is little extra info
added, as it relates to bootstrap / start-up process. I already have
"AvoidDiskWrites 1" active in torrc.

Is there a way to disable this extra logging?

Thanks
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays