Re: [tor-relays] Appropriate questions
Please! I am not participate in this forum anymore! Any e mail that coming after this will be reported to Uk intelligence police (M15) Be aware pls with all posts or e mails here ! Have a nice weekend to all On 18 Jan 2014, at 05:18, I beatthebasta...@inbox.com wrote: Hej, I have found the Tor community to be much less abrasive and hostile to those less technically aware than other FOSS communities but I can understand your reluctance to post. This was asked after an online news item on Tor's new software. What is Tortilla? A poorly named tool with zero ties to Tor. How is this question related to tor relays? [uncharitable thought] If you decide you would like to run a bridge on Amazon and have any difficulties, I would be happy to help. You can email me off list if you prefer. That is the right attitude and what I think would be the best way to expand Tor. Good on you Robert ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Bad experience with hetzner.de and Trusted Tor Traceroutes experiment
Please! I am not participate in this forum anymore! Any e mail that coming after this will be reported to Uk intelligence police (M15) Be aware pls with all posts or e mails here ! Have a nice weekend to all On 15 Jan 2014, at 22:23, Paul Görgen t...@pgoergen.de wrote: Hi, Apparently even with the lowered rate from time to time the abuse system will complain. I just received an abuse message from Hetzner even though now running with the reduced rate. Just so you know. Next time this happens I will try to escalate the problem by not solving it in the framework of the automated abuse reports. Instead I will put the info about what I do into the trouble ticket of the abuse message and put a strong plea to contact me about if and how they can stop flagging it as abuse. Best regards Paul On 15.01.2014 16:41, irregula...@riseup.net wrote: On 01/15/2014 07:00 AM, Anupam Das wrote: Hi Alex, We are very sorry to hear about the problems our measurements caused. Up until yesterday, we had received no reports of them triggering these kinds of responses from providers. However, yesterday we heard a very similar story from another relay operator using Hetzner. Thanks for sharing your experience with the tor-relays community. We have also updated our FAQ to inform contributors about this potential problem. Also, we'd like to help others avoid this while still providing useful measurements, if possible. Have you gotten any feedback from Hetzner about what rule was triggered and maybe how to avoid it? Do you have any ideas about how one might stay below their radar? If it is something simple like reducing the measurement rate that would be a great option to prevent problems while still providing valuable data about the the Tor network. We do still hope that most relay operators will be willing to give this project a shot. We have received data from over 90 separate IP addresses and have gotten 2 negative reports so far, although certainly the issues could be more widespread without us being aware. We don't want to add to the headaches that can result from running a Tor relay, but on the other hand Tor relay operators are probably pretty adept at handling this kind of stuff. Thanks Anupam Hi again, Anupam I wish I knew how to run the script and avoid any complaints from Hetzner. Unfortunately Hetzner didn't give us any helpful info. We even asked them explicitly if rate limiting would be a solution, but there was no answer on that. On 01/15/2014 02:20 PM, Paul Görgen wrote: Finally scamper was defunct, presumably due to being stopped two times, so I restarted the whole Trusted Tor Traceroutes script on monday with PPS=200 (reducing the traceroute rate to 1/5 of the default value). So far I did not receive any machine generated abuse reports. I assume the packet rate is now below the limit of what the monitoring thinks is a netscan. I will report back if I should receive another abuse report connected to the experiment. Paul's answer may indicate that imposing a rate limit to the script's requests might do the trick. Greetings. Alex ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -- Paul Görgen Dieburger Straße 94a,Mobile +4917620181608 64287 Darmstadt http://www.pgoergen.de ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Numbers of circuits are fluctuating
Please! I am not participate in this forum anymore! Any e mail that coming after this will be reported to Uk intelligence police (M15) Be aware pls with all posts or e mails here ! Have a nice weekend to all On 17 Jan 2014, at 13:08, Jens Kubieziel maill...@kubieziel.de wrote: Hi, I found a question at the QA site which deals with circuits: URL:http://tor.stackexchange.com/q/492/88 The guy set up a Tor relay on its DSL connection. According to the Tor logs there are some low numbers of circuits open. From time to time this number jumps up (from 8--1 circuits to 700--850). Do you also see such numbers? What can be the reason for this jump? -- Jens Kubieziel http://www.kubieziel.de ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Tor listenes to UDP ports?
Please! I am not participate in this forum anymore! Any e mail that coming after this will be reported to Uk intelligence police (M15) Be aware pls with all posts or e mails here ! Have a nice weekend to all On 14 Jan 2014, at 00:17, Drake Wilson dr...@dasyatidae.net wrote: Quoth Wollomatic wolloma...@posteo.eu, on 2014-01-14 00:29:39 +0100: Since I thought Tor only uses TCP may this be a security problem with my server? Since UDP is a connectionless datagram protocol, there is no distinguished listening state. It seems more likely that those are sockets for outgoing DNS requests. Have you monitored the traffic on those ports to see what it is? --- Drake Wilson ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] System Time
Please! I am not participate in this forum anymore! Any e mail that coming after this will be reported to Uk intelligence police (M15) Be aware pls with all posts or e mails here ! Have a nice weekend to all On 18 Jan 2014, at 01:30, eliaz el...@riseup.net wrote: On 1/15/2014 8:19 AM, nano wrote: On 15/01/2014 10:29 PM, Sebastian Urbach wrote: I really tried very hard to stay calm but at least someone has to say it. I think operating relays / bridges can be described as a cutting edge job or experience. [snip] If you don't know what you are doing, then be honest to yourself and stop doing it ! [snip] And further, i strongly disagree with the text Robert wrote today that the project should provide more material for newbies because there is already more than enough material. [snip] I would like to propose a new list which may or may not be called tor-relays-new or so. New operators should start there for a certain period of time and if everything seems to be in order they may be transferred to tor-relays. [snip] Sebastian, I respect your opinion and appreciate your frustration borne from the inabilities of less skilled correspondents and their submissions. However, I don't believe running a Tor node, of any kind, requires either it professionals with years and years of experience or serious skills in system administration. [snip] In part, I agree with the sentiment that [if] you don't know what you are doing, then be honest to yourself and stop doing it; however, I would instead change the apodosis to: 'seek assistance'. I would find that outcome preferable to ceasing participation entirely. Correspondingly, I consider this mailing list an excellent resource to facilitate said assistance; subscribers will either choose to contribute, or not. Furthermore, more documentation is rarely a bad idea and while limited resources should be prudently managed, I don't believe requests for assistance from mailing list correspondents consume said resources. [snip] Nevertheless, subscribers are free to acknowledge mailing list correspondence or ignore it [snip] In the interest of full disclosure, I consider myself one of these new relay operators [0] so my opinions are most likely affected by bias. [0] https://atlas.torproject.org/#details/799B025E25850A88CD133276301FAFB731C2EA94 I've been thinking for a while that a separate list for *bridge* operators might be a good idea. I've put effort (and cash) into running a bridge approaching 24/7, at which I was successful with TBB ver 2, but have been frustrated since the advent of browser 3.5 and standalone vidalia. Running the bridge blindly - just loading 3.5 and not trying to assess whether the bridge is working properly, or indeed if it's necessary, hasn't been satisfying. I want to know why/how certain things wok or don't work. I've been conflicted in this; either I run my own experiments, resulting in the bridge being up erratically; or I ask what I can well believe experienced node operators developers might consider dunderheaded questions. And since bridges are supposed to be secret, I'm not even sure what should or should not beasked in a clear list. I've tried asking tor support via encrypted msgs with mixed results: I can understand that support has more important things to do than reassure me that I'm on the right track. If other bridge operators also feel underserved and experienced users feel beleaguered by us, maybe opening a list for bridge operators (or an encrypted support address) might be a good experiment. Even if a dedicated list is populated only amateurs it might help us keep running more consistently intelligently. Yup, my bridge is down for now. Understanding what I'm doing has taken too much time away from other work. I hope to have the bridge up again as soon as I have enough time to work things out on my own or frame intelligent questions. - eliaz gpg 04DEF82B --- This email is free from viruses and malware because avast! Antivirus protection is active. http://www.avast.com ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Irony and inconsistency
Please! I am not participate in this forum anymore! Any e mail that coming after this will be reported to Uk intelligence police (M15) Be aware pls with all posts or e mails here ! Have a nice weekend to all On 12 Jan 2014, at 20:51, I beatthebasta...@inbox.com wrote: It is Crissic I was referring to. I've been caught by several similarly. But I can say that a couple have quietly let it go on after I put some argument taken from Jacob, Roger, and others of the real legal status of nodes and Tor's real value. Some say Tor's good but the business rejects it from its model. If we all keep stating the facts each time individually we must build the collective impression that people using their own money for privacy and against tyranny (Ayatollah/NSA same same) are reliable and a not real problem and to be accomodated. CPU use level is the one I can't control. That may effect the other slices of server but getting them on Tor's side might bring some tolerance. I asked them to limit the resources to my VPS which gained some ground and an offer of further help. Note the second anecdote wherein the VPS business went to the trouble of downloading and installing Tor when I couldn't. I feel Tor is getting to a critical mass not to far away. Angela Merkel might be looking at using it. Robert Same thing here. I had a server from day one with them and was told Sorry you've been with us from the start. But after careful consideration, Crissic Solutions LLC has decided to ban the usage of TOR on the Crissic network. One about three relays paid for a year in advance. “Something Solutions LLC has decided to ban the usage of TOR.“ despite “We DO Allow Tor Relays being in their current AUP. [snip] I see no need to be so solicitous of the vendor's reputation. It is Crissic Solutions ( http://crissic.net/ ) that has changed its policy. When I asked the reason for the policy change I was told Few different reasons, primarily network related. My take is that they didn't like their users actually using all the bandwidth that they paid for. ___ ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] (no subject)
Please! I am not participate in this forum anymore! Any e mail that coming after this will be reported to Uk intelligence police (M15) Be aware pls with all posts or e mails here ! Have a nice weekend to all On 14 Jan 2014, at 20:28, Jeroen Massar jer...@massar.ch wrote: On 2014-01-14 21:05, I wrote: Jeroen, Thank you. It did that but I can't see a change. NTP adjusts slowly, as your clock is 6+ hours off, you should force the timesync first, eg with with rdate (apt-get install rdate): rdate -v ntp.xs4all.nl should do the trick. Then after that make sure that ntpd is running: /etc/init.d/ntp restart The VPS person said it is set to UTC. Previously on another VPS it was another relay in the ?circuit which had the time difference. UTC is a timezone, and having that is great as it avoids all the pitfalls and annoyances with summer/winter time. Note that some VPSs do not allow changing of the time, one will have to ask the host to set the time. Do note that a VPS can be inspected and controlled easily by the Host, as such, make sure that you trust that operator. Greets, Jeroen ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Re: [tor-relays] Relay, bridge, and family members
Please! I am not participate in this forum anymore! Any e mail that coming after this will be reported to Uk intelligence police (M15) Be aware pls with all posts or e mails here ! Have a nice weekend to all On 15 Jan 2014, at 17:29, Patrick ZAJDA patr...@zajda.fr wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Alexander, Yes, I was talking about the MyFamily setting. So I'll only put the relay in the bridge configuration. Thanks, Patrick Le 15/01/2014 17:59, Alexander Dietrich a écrit : If you are talking about the MyFamily setting, the documentation is very clear on this: Do not list any bridge relay as it would compromise its concealment. Best regards, Alexander --- PGP Key: 0xC55A356B | https://dietrich.cx/pgp On 2014-01-15 15:57, Patrick ZAJDA wrote: Hi all, Now I created a bridge, I'd like to create a relay on a dedicated server. I read about the FamilyMembers configuration value, to list all relay which are from the same owner. If I create another relay, do I have to put the bridge fingerprint to the new relay and put the relay fingerprint in the bridge configuration? Thanks, ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays - -- Patrick ZAJDA Skype : gansta93 -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (MingW32) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBAgAGBQJS1sV5AAoJEKPVT2DeSPb46lQH/2p0vtwbiT0QcKap13jW4z5X +Zw0dXBULTlFE2lp6nGDaK2QaxSJMocQc6oztM7vm/k1CObR2lfmZ8dg5tGh6Iar YaIqJ0dn7Znz0NQ6+PUTVHVdOA1aqJRj+CfbYGiw5DDZIUELJxDLT0YhCDujbUDE eTx5PQyEzvXtX7EBIwFZ4GDDUBOZ/JKIDBbDfire5I7HR2BSIg6B8yU+ZYk3laVM EHIQtuWktxQHXpoEgr4cSJL+BQCSBCC4MWwAYqk/bpNDwsNyn8NOB2k00TnS/8p5 zxN2qMCkyAEUE0UGQbciMT36wDuvDeGFifb/nwIRFYMPpbArhQ8pWuXBUG7OeFc= =yn5J -END PGP SIGNATURE- 0xDE48F6F8.asc 0xDE48F6F8.asc.sig ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays