Re: [tor-relays] Help with FreeBSD relays

2021-03-31 Thread xplato
Hi Shawn,

I looked at HardenedBSD and have actually moved to a different VPS so that can 
I use HBSD. FreeBSD was the only option I had at the time but both instances 
crashed repeatedly and it got so frustrating that I gave up on FreeBSD. I will 
give HardenedBSD a go.

Cheers,
Dan

Sent from ProtonMail for iOS

On Wed, Mar 31, 2021 at 10:12 AM, Shawn Webb  wrote:

> On Wed, Mar 31, 2021 at 01:09:45PM +0200, René Ladan wrote:
>> On 30-03-2021 15:47, Shawn Webb wrote:
>> > On Tue, Mar 30, 2021 at 02:36:36AM +, xplato wrote:
>> > > Greetings,
>> > >
>> > > I am a bit of a noob here so please bear with me. I ran a relay using 
>> > > Ubuntu with very few issues however I decide to add an additional relay 
>> > > and decided to use FreeBSD. They will only run for around 18 hours and 
>> > > then they shut down. I have adjust the torrc file every way I know how 
>> > > and increased the Max vnodes thinking this may have been my issue. I can 
>> > > post the sysrc and torrc if needed. Anyone that might help me figure 
>> > > this out I would be grateful otherwise I am going to reluctantly move 
>> > > them both back to Ubuntu.
>> > Emerald Onion runs over twenty Tor exit nodes on HardenedBSD 12 and
>> > 13. Given Tor's need for security, you might want to consider using
>> > HardenedBSD, a derivative of FreeBSD that implements exploit
>> > mitigations and security hardening technologies. FreeBSD's state of
>> > security leaves much to be desired. Tor's relay operators and users
>> > really should at least have exploit mitigations like ASLR and W^X
>> > applied.
>> But it won't fix the problem at hand, unless memory management in
>> HardenedBSD is different than in FreeBSD.
>
> Memory management is indeed different in HardenedBSD than in FreeBSD.
> HardenedBSD implemented a clean-room version of grsecurity's PaX ASLR.
> FreeBSD's version of ASLR, more appropriately called ASR, has known
> issues. HardenedBSD's does not.
>
> Thanks,
>
> --
> Shawn Webb
> Cofounder / Security Engineer
> HardenedBSD
>
> https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] relay impersonation (contactinfo)

2021-03-31 Thread nusenu
Hi,

I'd like to raise your awareness of an ongoing scheme of questionable entities 
that 
make use of your name or relay contactinfo and/or relay nicknames. Those using 
other people's
relay _nicknames_ got and get spotted by multiple people already and are 
somewhat obvious (at least for now), 
but I'd like to highlight those using familiar names in contactInfo
that are likely less frequently uncovered because people lookup their relays by 
searching for
their relay nicknames (and not so often by searching their contactinfo).

So here are two practical things that you can do to help uncover more of them:

- list your relay fingerprints under the well-known tor-relay URI: 
https:///.well-known/tor-relay/rsa-fingerprint.txt
and add "url: proof:uri-rsa ciissversion:2" to your ContactInfo
to allow for automated linkability verification. 
This protects your relays against spoofing of the url field.
A domain is not required: You can use github-pages or similar if you do not 
have a domain.
more details:
https://gitlab.torproject.org/tpo/core/torspec/-/blob/master/proposals/326-tor-relay-well-known-uri-rfc8615.md
https://nusenu.github.io/ContactInfo-Information-Sharing-Specification/
Thanks to the 291 relays, that allow for automated verification already.
Verifiable relay groups also get graphs on OrNetStats, for an example see: 
https://nusenu.github.io/OrNetStats/artikel10.org.html

- search for your names/nicknames/org names/... in the ContactInfo field. On 
Relay Search you can do so using "contact:searchstring"
Be creative in your search terms. This even makes sense if you do not run 
relays at all but your name is somewhat known in this context.


kind regards,
nusenu





 Forwarded Message 
Subject: tor relays rosiwig429(at)lidte(dot)com
Date: Tue, 30 Mar 2021 23:55:01

> 2021-03-29
> 
> |   Up |   Ext | JoinTime   | IP | AS 
>   | CC   |   ORp |   Dirp | OS| Version   | Nickname |   
> eFamMembers | FP   |
> |--+---+++--+--+---++---+---+--+---+--|
> |1 | 1 | 06:25:11   | 103.82.32.14   | CMC Telecom Infrastructure 
> Company   | vn   |  9001 |   9030 | Linux | 0.4.5.7   | coffswifi5   
> | 1 | B8D95BB1AAFB6F234EC50A100F46E4CC8E8E90FB |
> |1 | 1 | 07:34:40   | 78.138.135.110 | Ojsc oao Tattelecom
>   | ru   |  9001 |   9030 | Linux | 0.4.5.7   | artikel5ev3b2|
>  1 | 771C9BC56DF4B29BA97CAA9387FB1FC140CFE3E3 |
> |1 | 1 | 13:43:04   | 103.56.156.143 | VNPT Corp  
>   | vn   |  9001 |   9030 | Linux | 0.4.5.7   | CalyxInstitute18 |
>  1 | 04998AB63A49C4A0B5A5CD2994D95D098D2B5399 |
> |1 | 1 | 14:28:18   | 77.245.158.134 | Niobe Bilisim Teknolojileri 
> Yazilim San. | tr   |  9001 |   9030 | Linux | 0.4.5.7   | Merlin2  | 
> 1 | B4285A497939D190739C976B947053D6CC0AE07C |




OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] bridge static or dynamic ip and multiple bridge config

2021-03-31 Thread Volker Mink
Bridge does not require static ip. You can run one at home. 
More than one —> use different ports 

> Am 31.03.2021 um 22:14 schrieb gi vi an :
> 
> does bridge require static or dynamic ip?
> 
> if more than one bridge can be configured per one isp connection, how do i 
> configure?
> 
> -- 
> who am i ? https://mstdn.social/@gvian
> 
> donate or patron:
> [+]₿ bitcoin (BTC): 3K7Ba2DFyyuGTukNqXEmogG4VgYp2RWnZV
> [×]gridcoin (GRC): SK7A2yq4rsoDSKc592dxSb3JSYeSSopbNB
> [÷]Ᵽ peercoin (PPC): PENnyj6dvEqaAKtqh9tV9KzRKc4N5EWfeH
> [=]pivx (PIVX): DNyihy8xWXkGyaLnipzWUrC3kjrbcvahHJ
> [<]blackcoin (BC): B4pCYCRhS6itEs2rsSAVbRnoKkL6thj3Bt
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Many SSH requests

2021-03-31 Thread William Denton

On 31 March 2021, Cristiano Kubiaki Gomes wrote:


O noticed many ssh requests to my Debian VM running a Relay and I am
wondering if this is normal or if this is happening only with me.


I think that's normal for every host on the internet!  A tool like Fail2ban¹ 
does a good job with those probes;  anything else that's recommended for 
securing a machine will also help.


Bill

¹ https://www.fail2ban.org/wiki/index.php/Main_Page
--
William Denton :: Toronto, Canada   ---   Listening to Art: 
https://listeningtoart.org/
https://www.miskatonic.org/ ---   GHG.EARTH: https://ghg.earth/
Caveat lector.  ---   STAPLR: https://staplr.org/___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Many SSH requests

2021-03-31 Thread Random Tor Node Operator
Happens on all internet-facing ssh daemons.
Independently of tor.


On 3/31/21 6:35 PM, Cristiano Kubiaki Gomes wrote:
> Hi there,
> O noticed many ssh requests to my Debian VM running a Relay and I am
> wondering if this is normal or if this is happening only with me.
>
> Anyone else see this ssh attemptives? Is it normal?
>
> sshd[27004]: Failed password for root from 45.91.226.235 port 41012 ssh2
> sshd[27004]: Received disconnect from 45.91.226.235 port 41012:11: Bye
> Bye [preauth]
> sshd[27004]: Disconnected from authenticating user root 45.91.226.235
> port 41012 [preauth]
> sshd[27006]: pam_unix(sshd:auth): authentication failure; logname= uid=0
> euid=0 tty=ssh ruser= rhost=108.36.253.227  user=root
>
> It's many different ips and trying to access in many different ports.
>
> Thank you!
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Many SSH requests

2021-03-31 Thread Cristiano Kubiaki Gomes
Hi there,
O noticed many ssh requests to my Debian VM running a Relay and I am
wondering if this is normal or if this is happening only with me.

Anyone else see this ssh attemptives? Is it normal?

sshd[27004]: Failed password for root from 45.91.226.235 port 41012 ssh2
sshd[27004]: Received disconnect from 45.91.226.235 port 41012:11: Bye Bye
[preauth]
sshd[27004]: Disconnected from authenticating user root 45.91.226.235 port
41012 [preauth]
sshd[27006]: pam_unix(sshd:auth): authentication failure; logname= uid=0
euid=0 tty=ssh ruser= rhost=108.36.253.227  user=root

It's many different ips and trying to access in many different ports.

Thank you!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] bridge static or dynamic ip and multiple bridge config

2021-03-31 Thread gi vi an

does bridge require static or dynamic ip?

if more than one bridge can be configured per one isp connection, how do 
i configure?


--
who am i ? https://mstdn.social/@gvian

donate or patron:
[+]₿ bitcoin (BTC): 3K7Ba2DFyyuGTukNqXEmogG4VgYp2RWnZV
[×]gridcoin (GRC): SK7A2yq4rsoDSKc592dxSb3JSYeSSopbNB
[÷]Ᵽ peercoin (PPC): PENnyj6dvEqaAKtqh9tV9KzRKc4N5EWfeH
[=]pivx (PIVX): DNyihy8xWXkGyaLnipzWUrC3kjrbcvahHJ
[<]blackcoin (BC): B4pCYCRhS6itEs2rsSAVbRnoKkL6thj3Bt
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Help with FreeBSD relays

2021-03-31 Thread Shawn Webb
On Wed, Mar 31, 2021 at 01:09:45PM +0200, René Ladan wrote:
> On 30-03-2021 15:47, Shawn Webb wrote:
> > On Tue, Mar 30, 2021 at 02:36:36AM +, xplato wrote:
> > > Greetings,
> > > 
> > > I am a bit of a noob here so please bear with me. I ran a relay using 
> > > Ubuntu with very few issues however I decide to add an additional relay 
> > > and decided to use FreeBSD. They will only run for around 18 hours and 
> > > then they shut down. I have adjust the torrc file every way I know how 
> > > and increased the Max vnodes thinking this may have been my issue. I can 
> > > post the sysrc and torrc if needed. Anyone that might help me figure this 
> > > out I would be grateful otherwise I am going to reluctantly move them 
> > > both back to Ubuntu.
> > Emerald Onion runs over twenty Tor exit nodes on HardenedBSD 12 and
> > 13. Given Tor's need for security, you might want to consider using
> > HardenedBSD, a derivative of FreeBSD that implements exploit
> > mitigations and security hardening technologies. FreeBSD's state of
> > security leaves much to be desired. Tor's relay operators and users
> > really should at least have exploit mitigations like ASLR and W^X
> > applied.
> But it won't fix the problem at hand, unless memory management in
> HardenedBSD is different than in FreeBSD.

Memory management is indeed different in HardenedBSD than in FreeBSD.
HardenedBSD implemented a clean-room version of grsecurity's PaX ASLR.
FreeBSD's version of ASLR, more appropriately called ASR, has known
issues. HardenedBSD's does not.

Thanks,

-- 
Shawn Webb
Cofounder / Security Engineer
HardenedBSD

https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Help with FreeBSD relays

2021-03-31 Thread René Ladan

On 30-03-2021 15:47, Shawn Webb wrote:

On Tue, Mar 30, 2021 at 02:36:36AM +, xplato wrote:

Greetings,

I am a bit of a noob here so please bear with me. I ran a relay using Ubuntu 
with very few issues however I decide to add an additional relay and decided to 
use FreeBSD. They will only run for around 18 hours and then they shut down. I 
have adjust the torrc file every way I know how and increased the Max vnodes 
thinking this may have been my issue. I can post the sysrc and torrc if needed. 
Anyone that might help me figure this out I would be grateful otherwise I am 
going to reluctantly move them both back to Ubuntu.

Emerald Onion runs over twenty Tor exit nodes on HardenedBSD 12 and
13. Given Tor's need for security, you might want to consider using
HardenedBSD, a derivative of FreeBSD that implements exploit
mitigations and security hardening technologies. FreeBSD's state of
security leaves much to be desired. Tor's relay operators and users
really should at least have exploit mitigations like ASLR and W^X
applied.
But it won't fix the problem at hand, unless memory management in 
HardenedBSD is different than in FreeBSD.


René

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] ISP

2021-03-31 Thread Daniel
Yes, I had a few exits there for some time. They were quite good and all 
abuse was closed with a comment explaining that you run a tor exit node 
and you are not responsible for the traffic. However, after about a 
year, they closed my account from one day to the next and I had to shut 
down all exit nodes due to too much abuse volume. For non-exit relays 
they are quite popular though.
I had some random downtimes and needed to wait several days for support 
to notice that their router is down, because opening a ticket for that 
will only result in several days back and forth with some stupid tests, 
even though you point out the routers affected when opening the ticket.


On 31.03.21 03:13, Андрей Гвоздев wrote:

Did anyone run relays on Scaleway?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays





OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Help with FreeBSD relays

2021-03-31 Thread René Ladan
xplato  schreef op 30 maart 2021 04:36:36 CEST:
>Greetings,
>
>I am a bit of a noob here so please bear with me. I ran a relay using Ubuntu 
>with very few issues however I decide to add an additional relay and decided 
>to use FreeBSD. They will only run for around 18 hours and then they shut 
>down. I have adjust the torrc file every way I know how and increased the Max 
>vnodes thinking this may have been my issue. I can post the sysrc and torrc if 
>needed. Anyone that might help me figure this out I would be grateful 
>otherwise I am going to reluctantly move them both back to Ubuntu.
>
>Thanks,
>Dan
>
>Sent from ProtonMail for iOS
How many circuits does your relay typically have?

Perhaps memory consumption depends on the amount of circuits, my tiny relay 
typically has 500 to 3000 circuits and uses 800 to 1000 MB of RAM.

René___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] DirPortFrontPage file '.....' not found | Permission denied

2021-03-31 Thread torix
Dear Petrusco,

I have had success putting that file in /etc/tor where the torrc is:
-rw-r--r-- 1 root root 17551 Oct 29 18:03 tor-exit-notice.html

Don't forget to change your line in the torrc to tell it where you moved the 
file. i.e.:
DirPortFrontPage /etc/tor/tor-exit-notice.html

Hope this works for you.

--Torix


‐‐‐ Original Message ‐‐‐
On Tuesday, March 30, 2021 11:53 AM, Petrusko  wrote:

> Hey,
>
> I'm having a little problem with setting up (my be some rights...) the
> html page on the relay DIRPort.
>
> On my logs :
>  00:00:03 [NOTICE] Tor 0.4.5.7 opening new log file.
>  00:00:03 [WARN] Could not open "/var/www/html/tor-relay.html":
> Permission denied
>  00:00:03 [WARN] DirPortFrontPage file '/var/www/html/tor-relay.html'
> not found. Continuing anyway.
>
> I've not found any information about how to set up this correctly.
>
> Many thanks in advance.
>
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] ISP

2021-03-31 Thread Roman Mamedov
On Wed, 31 Mar 2021 01:13:56 +
Андрей Гвоздев  wrote:

> Did anyone run relays on Scaleway?

Scaleway is the new name of Online SAS, a lot of people run relays there
(#3 most popular AS) -- for that reason it is actually kind of discouraged to
add more.

If you already have a server there for some other purposes, sure, add a Tor
relay on the side. But at this point it is not really a good idea to pay for a
server there specifically to run Tor.

I do run a few too, you are unlikely to have any issues with a non-exit relay.
Don't know about exit ones.

-- 
With respect,
Roman
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] ISP (?????? ???????)

2021-03-31 Thread Mark Murray
I used to run a couple of relays on their DEV1-S instances and never had any 
problems. They let you use the advertised bandwidth 24/7 without being 
throttled.



‐‐‐ Original Message ‐‐‐
On Wednesday, March 31, 2021 8:26 AM,  
wrote:

> Send tor-relays mailing list submissions to
> tor-relays@lists.torproject.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> or, via email, send a message with subject or body 'help' to
> tor-relays-requ...@lists.torproject.org
>
> You can reach the person managing the list at
> tor-relays-ow...@lists.torproject.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-relays digest..."
>
> Today's Topics:
>
> 1.  Re: ipv6 ORPort + DIRPort too ? (Petrusko)
> 2.  This is not me (Paul Templeton)
> 3.  Re: syn flood iptables rule (Toralf F?rster)
> 4.  Re: DirPortFrontPage file '.' not found | Permission
> denied (to...@protonmail.com)
>
> 5.  ISP (?? ???)
> 6.  Re: Is OVH a safe vps provider to run an exit relay on?
> (Volker Mink)
>
>
> Message: 1
> Date: Tue, 30 Mar 2021 21:38:59 +0200
> From: Petrusko petru...@riseup.net
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] ipv6 ORPort + DIRPort too ?
> Message-ID: f943db9d-b3c9-e51b-03ea-ac3447f78...@riseup.net
> Content-Type: text/plain; charset="utf-8"
>
> Ouch, this config looks like not so cool...
> I see on Metrics the ipv6 choosen by Tor process, is now on :
> "Unreachable OR Addresses"
>
> I'll write the other solution you given previously... with
> ORPort xxx.xxx.xxx.xxx:9001
> ORPort [::xxx:x::::xxx]:9001
>
> 30/03/2021 ? 20:07, Petrusko :
>
> > Ok !
> > So this only line will serve on both ipv4 and ipv6 together, ok thx ! Cool
> > 30/03/2021 ? 15:51, li...@for-privacy.net :
> >
> > > ORPort 9001
>
> -- next part --
> A non-text attachment was scrubbed...
> Name: OpenPGP_signature
> Type: application/pgp-signature
> Size: 840 bytes
> Desc: OpenPGP digital signature
> URL: 
> http://lists.torproject.org/pipermail/tor-relays/attachments/20210330/31420516/attachment-0001.sig
>
> --
>
> Message: 2
> Date: Wed, 31 Mar 2021 00:09:27 + (UTC)
> From: Paul Templeton p...@coffswifi.net
> To: tor-relays@lists.torproject.org
> Subject: [tor-relays] This is not me
> Message-ID: 617146268.293.1617149367117.javamail.zim...@apawc.com.au
>
> Content-Type: text/plain; charset=utf-8
>
> the relay with fingerprint B8D95BB1AAFB6F234EC50A100F46E4CC8E8E90FB 
> (coffswifi5)is not me...
>
> coffswifi4 is mine so don't ask me to add as a family...
>
> Paul
>
> 137CF322859E400455E457DB920F65FFDD222CDF
>
>
> -
>
> Message: 3
> Date: Tue, 30 Mar 2021 19:46:14 +0200
> From: Toralf F?rster toralf.foers...@gmx.de
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] syn flood iptables rule
> Message-ID: f4b88ab1-edb0-35ba-0382-c34a6a4bc...@gmx.de
> Content-Type: text/plain; charset=utf-8; format=flowed
>
> On 2/22/21 3:27 PM, Toralf F?rster wrote:
>
> > ?#?DDoS
> > ?$IPT?-A?INPUT?-p?tcp?-m?state?--state?NEW?-m?recent?--name?synflood?--set
> > ?$IPT?-A?INPUT?-p?tcp?-m?state?--state?NEW?-m?recent?--name?synflood
> > --update?--seconds?60?--hitcount?10?-j?DROP
>
> just for the record:
>
> In the emanwhile I do think that this idea was BS.
>
> The reason is that if an advisory spoofs the sender address then this
> eventually blocks the (spoofed) sender address thereby.
>
> --
>
> Toralf
>
>
> 
>
> Message: 4
> Date: Tue, 30 Mar 2021 20:57:41 +
> From: to...@protonmail.com
> To: "tor-relays@lists.torproject.org"
> tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] DirPortFrontPage file '.' not found |
> Permission denied
> Message-ID:
> q6NusKkLvXka9JwhiTnLlWZ0Bdp4ZPPo2gu88hO6rq52A9rr6ejOrNxX25zwwAw2PhZHGSRQHrOWjkTWs3-3s7V1doZv54d3Pky7hpl6lVE=@protonmail.com
>
> Content-Type: text/plain; charset=utf-8
>
> Dear Petrusco,
>
> I have had success putting that file in /etc/tor where the torrc is:
> -rw-r--r-- 1 root root 17551 Oct 29 18:03 tor-exit-notice.html
>
> Don't forget to change your line in the torrc to tell it where you moved the 
> file. i.e.:
> DirPortFrontPage /etc/tor/tor-exit-notice.html
>
> Hope this works for you.
>
> --Torix
>
> ??? Original Message ???
> On Tuesday, March 30, 2021 11:53 AM, Petrusko petru...@riseup.net wrote:
>
> > Hey,
> > I'm having a little problem with setting up (my be some rights...) the
> > html page on the relay 

Re: [tor-relays] ISP

2021-03-31 Thread Olaf Grimm
Yes. I have some there. You get abuse messages. Reply fast or your 
accout will be blocked.


Olaf

Am 31.03.2021 03:13 schrieb Андрей Гвоздев:

Did anyone run relays on Scaleway?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] This is not me

2021-03-31 Thread Georg Koppen
Paul Templeton:
> the relay with fingerprint B8D95BB1AAFB6F234EC50A100F46E4CC8E8E90FB 
> (coffswifi5)is not me...
> 
> coffswifi4 is mine so don't ask me to add as a family...

We won't, promised. :) We are aware of that relay and similar ones and
are about to bump them out of the network. Thanks for being vigilant.

Georg

> Paul
> 
> 
> 
> 137CF322859E400455E457DB920F65FFDD222CDF
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 




OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Is OVH a safe vps provider to run an exit relay on?

2021-03-31 Thread Volker Mink
From my point of view - yes :)

> Am 30.03.2021 um 17:48 schrieb Keifer Bly :
> 
> 
> Does that include exits? Thx 
> 
>> On Tue, Mar 30, 2021, 1:59 AM  wrote:
>> Hi Keifer.
>> 
>>  
>> 
>> There are a lots of relays on OVH 
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> Best regards,
>> 
>> volker
>> 
>>  
>> 
>> Von: tor-relays  Im Auftrag von 
>> Keifer Bly
>> Gesendet: Dienstag, 30. März 2021 07:40
>> An: tor-relays@lists.torproject.org
>> Betreff: [tor-relays] Is OVH a safe vps provider to run an exit relay on?
>> 
>>  
>> 
>> Hi,
>> 
>>  
>> 
>> I am wondering if OVH is a safe VPS provider to run an exit relay on? Thank 
>> you.
>> 
>>  
>> 
>> --Keifer
>> 
>>  
>> 
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] ISP

2021-03-31 Thread Андрей Гвоздев
Did anyone run relays on Scaleway?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] syn flood iptables rule

2021-03-31 Thread Toralf Förster

On 2/22/21 3:27 PM, Toralf Förster wrote:


  # DDoS
  $IPT -A INPUT -p tcp -m state --state NEW -m recent --name synflood --set
  $IPT -A INPUT -p tcp -m state --state NEW -m recent --name synflood
--update --seconds 60 --hitcount 10 -j DROP


just for the record:

In the emanwhile I do think that this idea was BS.

The reason is that if an advisory spoofs the sender address then this
eventually blocks the (spoofed) sender address thereby.

--
Toralf
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] This is not me

2021-03-31 Thread Paul Templeton
the relay with fingerprint B8D95BB1AAFB6F234EC50A100F46E4CC8E8E90FB 
(coffswifi5)is not me...

coffswifi4 is mine so don't ask me to add as a family...

Paul



137CF322859E400455E457DB920F65FFDD222CDF

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] ipv6 ORPort + DIRPort too ?

2021-03-31 Thread Petrusko
Ouch, this config looks like not so cool...
I see on Metrics the ipv6 choosen by Tor process, is now on :
"Unreachable OR Addresses"

I'll write the other solution you given previously... with
ORPort xxx.xxx.xxx.xxx:9001
ORPort [::xxx:x::::xxx]:9001


30/03/2021 à 20:07, Petrusko :
> Ok !
>
> So this only line will serve on both ipv4 and ipv6 together, ok thx ! Cool
>
>
>
> 30/03/2021 à 15:51, li...@for-privacy.net :
>> ORPort 9001 
>




OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] ipv6 ORPort + DIRPort too ?

2021-03-31 Thread Petrusko
Ok !

So this only line will serve on both ipv4 and ipv6 together, ok thx ! Cool



30/03/2021 à 15:51, li...@for-privacy.net :
> ORPort 9001 




OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] DirPortFrontPage file '.....' not found | Permission denied

2021-03-31 Thread Olaf Grimm
Place the DirPortFrontPage in the same folder like torrc, not /var/...
Give the path correctly in the torrc.
This is the default in all my relays with Debian and Ubuntu.

Olaf


Am 30.03.21 um 13:53 schrieb Petrusko:
> Hey,
> 
> I'm having a little problem with setting up (my be some rights...) the
> html page on the relay DIRPort.
> 
> On my logs :
>  00:00:03 [NOTICE] Tor 0.4.5.7 opening new log file.
>  00:00:03 [WARN] Could not open "/var/www/html/tor-relay.html":
> Permission denied
>  00:00:03 [WARN] DirPortFrontPage file '/var/www/html/tor-relay.html'
> not found. Continuing anyway.
> 
> I've not found any information about how to set up this correctly.
> 
> Many thanks in advance.
> 
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Help with FreeBSD relays

2021-03-31 Thread Fabian Keil
xplato  wrote on 2021-03-30:

> I am running two relays and the error message is the same for both:
> 
> Mar 30 08:13:01 freebsd kernel: pod 1745 (tor) , jid 0 , uid 256, was killed: 
> out of swap space
> 
> If I run
> # dd if=/dev/zero of=/usr/swap0 bs=1m count=512
> 
> #chmod 0600 /usr/swap0
> 
> #swapon -aL
> 
> Will that fix the error above?

Is /usr/swap0 already referenced in /etc/fstab?

How much RAM and swap space is currently available?
Are both relays running on the same system?

Before adjusting the swap space I'd try experimenting with
MaxMemInQueues. The auto-tuning is based on the system's
memory and may result in a value that is too high if the
system's memory is also needed elsewhere.

If you then still need to increase the swap space you'll
probably have to increase it by more than 512 MB.

On one of my relays where I've set "MaxMemInQueues 300MB"
the tor process currently consumes 870 MB of "real memory"
and the memory usage is still slowly increasing.

Fabian


pgpk_HKWZ5XUK.pgp
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Help with FreeBSD relays

2021-03-31 Thread Scott Bennett
xplato  wrote:

> I am running two relays and the error message is the same for both:
>
> Mar 30 08:13:01 freebsd kernel: pod 1745 (tor) , jid 0 , uid 256, was killed: 
> out of swap space
>
 Oh.  Then Fabian may be right.  Assuming that you already have what
should be an adequate amount of swap space available, then this could be
due to one of the cluster of memory management bugs introduced into the
FreeBSD kernel in 11.2-RELEASE and remains in 12.x and very likely will be
in the upcoming 13.0.

> If I run
> # dd if=/dev/zero of=/usr/swap0 bs=1m count=512
>
 Note that, while once upon a time 512 MB was a large amount of swap
space, in modern times it is almost trivial and inconsequential.

> #chmod 0600 /usr/swap0
>
> #swapon -aL
>
> Will that fix the error above?

 It might alleviate it for a short time, but if the problem is due to
those bugs, it likely will make little or no difference.  The reason for
that is that the message is partly erroneous; i.e., it is correct that the
OOM killer has killed the process, but it is incorrect that it was out of
swap space.  Having watched those bugs in action for several years now,
what I can tell you is that a lot of pagefixing is going on, but very little
pagefreeing happens later.  Processes being killed with that error message
is just one symptom, and it can be a real problem, for example, if xorg is
running and gets killed, leaving the console inaccessible.  Another symptom
is that, one by one, processes stop doing anything because they get swapped
out due to the shortage of page frames on the free list.  The kernel will
not begin to page processes back in unless there is at least ~410 MB on the
free list, so the system ends up with nothing running, not even shells,
because everything is marked as swapped out.  If what is happening to tor
on your system, then increasing swap space likely will have no effect because
swap space is not really where the shortage exists.  The shortage is on the
free list.
 There are some things that you can do in 11.4 that will minimize the
situations where the memory management problems take over the system.  You
can set a sysctl tunable that may help a bit.  Unfortunately, vm.max_wired
no longer does anything and is a red herring.  You can try to limit kernel
memory by setting vm.kmem_size_max to some value considerably less than the
size of real memory on your system.  Although the system does not honor this
limit either, it may still have a minor influence on how much the kernel
uses.  I think I set mine to 4 GB on an 8 GB machine.  This should be set in
/boot/loader.conf.
 In /etc/sysctl.conf there are several variables that should each help
a little more.  If you use ZFS, you can try limiting the size of the ARC by
setting vfs.zfs.arc_max.  After setting that, you may see the ARC grow to
as much as ~200 MB more than the size you set the limit to, but it doesn't
really go beyond that, so it does work after a fashion.  Just allow for that
extra couple of hundred megabytes or so.  Next is vm.v_free_min, which on my
system defaults to 65536, and I have increased that to 98304.  Then there is
this very important one:  vm.pageout_wakeup_thresh=112640.  Its default
value is only 14124, a far cry from the ~410 MB needed on the free list for
the kernel to begin paging a swapped process back into memory.  (112640 pages
are 440 MB, so it gives a tiny bit of leeway to the pagedaemon to get to work
before the free list gets too low.)  Lastly, set vm.pageout_oom_seq=10240
to prevent the OOM killer from killing your processes.  This value is the
number of complete passes through memory the pagedaemon must make in its
attempt to free enough memory to satisfy the current demand for free page
frames before it calls the OOM killer.  Setting the value that high means
that the pagedaemon never will get through that may passes, so the OOM killer
never gets called.  After setting this one you may occasionally see the
pagedaemon using all of one core's CPU time for a while, possibly a *long*
while, but it should protect your processes from being killed due to the
collection of memory management bugs.
 With all of the variables mentioned above set to better values you may
still see the system slowly grind down to an idle state.  This can happen
due to the kernel prioritizing the keeping of unused file system buffers in
memory over swapping processes in to get actual work done.  In such a case,
manual intervention is required to free up page frames.  For example, if you
confine your ccache directory trees to a UFS file system, the system will
quickly accumulate a lot of buffers it doesn't want to let go of.  The same
holds true for portmaster's $WRKDIRPREFIX, where a "portmaster -a" to update
your ports will tie up a large number of buffers.  buildworld and buildkernel
are also culprits.  The file system buffers can be forcibly freed up, thereby
freeing page frames occupied by the file system buffers, by unmounting the