Re: [tor-relays] Flags gone after restart

2022-08-11 Thread Scott Bennett
andrew reid  wrote:

> Hey there, I am running a tor relay off an old samsung phone. When I first
> started the relay, my observed bandwidth was around 4.5MB/s. It was running
> for around 7 days and had the stable and HSdir flag. After a few problems
> with IP6 and being overloaded (thought this was a problem on my end, not a
> DDoS attack) I restarted the phone and edited the config file to take away
> IPv6. It has now been running for 7 days again but my observed bandwidth is
> only 1.6MB/s now and I still haven't gotten the stable and HSdir flag back.
> How long would this take or is it just a problem on my end ? and for the
> bandwidth, my connection is still the same and hasn't changed. Is this just
> something that takes time to come back like the flags. This is my first
> relay so I would like to understand a bit more. Thank you

 Stable, AFAIK, still depends upon something like the average uptime of
the current instance and the previous instance relative to the corresponding
averages among all other relays.  Assignment of the Stable flag is made to
relays above a certain percentile rank of those averages.
 Fast used to depend upon the maximum throughput speed allowed by the
Bandwidth* and RelayBandwith* entries in the torrc file.  More than some
minimum bandwidth was required for assignment of the flag to a relay.
 HSDir used to depend upon its torrc option not being set to 0.  That
option was removed some time ago and is now apparently solely under the
control of the Authority relays.
 *HOWEVER*, both a randomization factor appears to have been added three
or four years ago to the Authority relays' algorithm used to decide whether to
award Fast and to award HSDir.  Now either flag comes and goes like birds
landing on tree limbs and later departing, often for no reason obvious to
humans.  My relay has many times been up for one or more months.  During those
times Fast and HSDir have been repeatedly assigned to it and lifted from it
and perhaps reassigned to it, often only a few hours apart.  The only
consistencies I have seen are that 1) the first time a tor relay is assigned
the HSDir flag is after at least 96 hours of uptime in the current instance,
though it may not happen until much later than 96 hours and 2) HSDir does not
appear ever to be assigned unless Fast is also assigned.  AFAIK, the tor
project has never offered an explanation for the addition/intrusion of this
randomization factor.  Frankly, I think it is a destabilizing factor to the
tor relay network and doubly so for hidden services activities, and it must
add to overall tor traffic to have to restock the hidden service directory
servers so often.


  Scott Bennett, Comm. ASMELG, CFIAG
**
* Internet:   bennett at sdf.org   *xor*   bennett at freeshell.org  *
**
* "A well regulated and disciplined militia, is at all times a good  *
* objection to the introduction of that bane of all free governments *
* -- a standing army."   *
*-- Gov. John Hancock, New York Journal, 28 January 1790 *
**

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Refuse Guard flag

2022-08-11 Thread Toralf Förster

On 8/2/22 20:58, Eldalië via tor-relays wrote:

Recently I noticed that my ISP started to reset my IP a few
hours after the node gets the Guard flag,


The Guard flag is given after a more or less constant time (or?) - so
I'd not see a conincidence here.

--
Toralf
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] recommended way to run 0.4.7 on armhf?

2022-08-11 Thread Georg Koppen

ilf:
Thanks. I thought about doing that, but I would rather not like to mix 
Raspian bullseye and Debian bullseye-backports.


Is there a good reason against building armhf on deb.torproject.org?


Just resource constraints. We have a ticket for that work[1] but 
de-prioritized it even further given that we have a good workaround and 
a lot of affected users are happy with it.


Patches (still) welcome! :)

Georg

[1] https://gitlab.torproject.org/tpo/core/tor/-/issues/40347



Georg Koppen:
Right. One thing we recommended when talking to relay operators during 
earlier EOL upgrade periods is adding the debian -backports repository 
to the Raspberry Pi. It worked well according to the feedback we got. 
We linked to

https://marksrpicluster.blogspot.com/2019/12/add-buster-backports-to-raspberry-pi.html
for general steps (you need to adapt them for bullseye, though).






OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Flags gone after restart

2022-08-11 Thread andrew reid
Hey there, I am running a tor relay off an old samsung phone. When I first
started the relay, my observed bandwidth was around 4.5MB/s. It was running
for around 7 days and had the stable and HSdir flag. After a few problems
with IP6 and being overloaded (thought this was a problem on my end, not a
DDoS attack) I restarted the phone and edited the config file to take away
IPv6. It has now been running for 7 days again but my observed bandwidth is
only 1.6MB/s now and I still haven't gotten the stable and HSdir flag back.
How long would this take or is it just a problem on my end ? and for the
bandwidth, my connection is still the same and hasn't changed. Is this just
something that takes time to come back like the flags. This is my first
relay so I would like to understand a bit more. Thank you
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] How useful are bridges on ports other than 80 and 443

2022-08-11 Thread Eddie
Unfortunately I've had to shut down my home based tor relay because my 
wife's employer is mis-categorising it as an exit node, instead of the 
middle/guard that it really is.  So, until she retires, in a few months, 
that relay will now be silent after about 5-years running (all of which 
her having the same employer.  Go figure).


So, I thought in the meantime I'd run a couple of tor bridges, as my IP 
should now be clear of any published tor node lists.


But I do need to leave ports 80 and 443 open for "normal" HTTP(S) 
traffic, which I know are the recommended bridge ports as they raise the 
least suspicion.


Are there any other ports that folks might suggest I use that would get 
enough traffic and not be blocked by a simple firewall.  I also run an 
internal mail server, so all those ports are off limits as well.


Cheers.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] recommended way to run 0.4.7 on armhf?

2022-08-11 Thread ilf
Thanks. I thought about doing that, but I would rather not like to mix 
Raspian bullseye and Debian bullseye-backports.


Is there a good reason against building armhf on deb.torproject.org?


Georg Koppen:
Right. One thing we recommended when talking to relay operators during 
earlier EOL upgrade periods is adding the debian -backports repository 
to the Raspberry Pi. It worked well according to the feedback we got. 
We linked to

https://marksrpicluster.blogspot.com/2019/12/add-buster-backports-to-raspberry-pi.html
for general steps (you need to adapt them for bullseye, though).


--
ilf

If you upload your address book to "the cloud", I don't want to be in it.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Refuse Guard flag

2022-08-11 Thread Georg Koppen

Eldalië via tor-relays:

Hello there.
I have been running my (non-exit) relay without issues for some
months. Recently I noticed that my ISP started to reset my IP a few
hours after the node gets the Guard flag, thus making it lose such a
flag (as well as Stable and HSDir). I am not sure if the Guard
flag is the real cause, but it is the only condition that is verified
always and only right before I get a new IP. Is there a way I can keep
my node running with the same settings but preventing it from becoming
a guard, to investigate if the flag is the real cause?


Hrm, what about just asking the ISP why they are doing the reset instead 
(I don't think what you want is easily possible)


Georg


Thanks,

Eldalië



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays