Re: [tor-relays] A new kind of attack?

2024-01-15 Thread Jordan Savoca via tor-relays

On 1/15/24 3:19 PM, Chris Enkidu-6 wrote:

I've noticed a new kind of possible attack on some of my relays, as
early as Dec.23 which causes huge spikes of outbound traffic that
eventually maxes out RAM and crashes Tor. The newest one today lasted
for 5 hours switching between two of the three relays on the same IP.

I have included charts and excerpts from the log in my post in Tor forum
at below link:

https://forum.torproject.org/t/new-kind-of-attack/11122


I've noticed this as well, on 0.4.8.10 across FreeBSD and Alpine 
platforms, against relays too new to receive any meaningful traffic from 
regular clients. MaxMemInQueues does not prevent the relay's eventual 
saturation of available memory on the system. The relays operated as 
exit nodes.


We're low on memory (cell queues total alloc: 6336 buffer total alloc: 
1556480, tor compress total alloc: 1073827425 (zlib: 0, zstd: 0, lzma: 
1073827249), rendezvous cache total alloc: 0). Killing 
circuits│withover-long queues. (This behavior is controlled by 
MaxMemInQueues.)


--
Jordan Savoca
https://jordan.im/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Dutch Relays

2023-12-19 Thread Jordan Savoca via tor-relays

On 12/18/23 6:59 AM, ab...@relayon.org 2023 wrote:

These are complete and utter shit.

avoid like the plague!

nifty


Oh? I'm curious to hear more about your reasons/experience, if you're 
open to sharing. They're pretty well-regarded in networking spaces.


--
Jordan Savoca
https://jordan.im/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Dutch Relays

2023-12-10 Thread Jordan Savoca via tor-relays

On 12/10/23 2:41 PM, Christopher Sheats wrote:
Emerald Onion is looking for co-location and IP transit opportunities in 
the Netherlands for deploying new exit relays. We have our own ASN, v4 
and v6 IP space.


Hi yawnbox,

You may want to check out ColoClue[1], they're a volunteer-based 
not-for-profit association operated by folks in the commercial ISP space 
who needed a way to host their own systems. Today they support ~200 
engineering hobbyists with low-cost infrastructure.


They have cross-connects to AMS-IX and NL-IX[2] and diverse transit 
connectivity[3] in their racks. Job Snijders has given a couple talks at 
NLNOG and NANOG about operations-related things, like effective DDoS 
mitigation[4] with fastnetmon and automated peering solutions[5].


I'm not a member personally, but if I lived in the area I'd definitely 
include them in my list of potential options. ^^


[1]: https://coloclue.net/en/
[2]: https://github.com/coloclue/peering/blob/master/peers.yaml
[3]: https://bgp.tools/as/8283#connectivity
[4]: https://www.youtube.com/watch?v=0ahdxp_btHY
[5]: https://www.youtube.com/watch?v=C7pkab8n7ys

--
Jordan Savoca
https://jordan.im/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] WebTunnel: What ASNs/networks work best?

2023-08-16 Thread Jordan Hillis
Can I get a copy of the webtunnel-bridge Docker image and
documentation? Thanks

On Mon, Aug 14, 2023 at 6:43 AM tor-home at encryptfirst.com <
tor-h...@encryptfirst.com> wrote:

> When running a WebTunnel bridge, what types of IPs are better for
> serving requests? My background is with self-hosted home-lab type of
> setups. There are a number of different ways for homelabs to accept
> inbound https connections. A few examples:
>
> - Forward a port on a home router.
> - Rent a cloud VM/VPS and tunnel a port from the VPS's IP.
> - Have a CDN tunnel/forward requests.
> - VPN hybrid solutions like Tailscale Funnel.
>
> Are any of these better than others for hosting a WebTunnel bridge?
> Should cloud provider IPs be preferred over residential IPs, for
> example, considering that is where most web servers are hosted? Are
> large CDNs preferred over individual cloud VMs? Is it better to use a
> different IP for WebTunnel than the IP that runs the OR port (i.e.
> host OR port on home IP and WebTunnel from a cloud-based IP)?
>
> I'm mainly asking to determine which way helps the broadest number of
> Tor users. And which is less likely to be blocked in the future. What
> are the best practices?
>
> PS: Thanks for the webtunnel-bridge Docker image and the documentation
> on how to run it. It was very helpful and made setup easy.
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] OrNetStats: Operator Level Graphs added

2021-01-10 Thread Jordan
On 1/9/21 2:42 PM, nusenu wrote:
> Toralf Förster:
>> cool idea,
>>
>> canthose graphs being linked from eg
>> https://yui.cat/relay/63BF46A63F9C21FD315CD061B3EAA3EB05283A0A.html ?
> 
> Yes, that should be easy.
> The best way to get that done is to either submit a patch or feature
> request here:
> https://github.com/tempname1024/allium/issues
> 
> kind regards,
> nusenu
> 

Sweet graphs, thanks Nusenu!

I opened an issue[1] to address support for the
ContactInfo-Information-Sharing-Specification which includes outbound
links to graphs of verified operators/domains at OrNetStats, and
rendering of provided attributes on per-relay pages.

[1] https://github.com/tempname1024/allium/issues/9

-- 
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Become a Fallback Directory Mirror (deadline: July 23)

2020-09-20 Thread Jordan

On 9/17/20 11:51 AM, Toralf Förster wrote:

On 9/16/20 1:05 AM, Michael Gerstacker wrote:

the only relay i don't want to be a fallback anymore is a fallback now


Maybe OT but I'm just curious about the reason to want a relay being not a 
fallback.


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



If the operator intends on changing addresses or disabling the relay it 
probably shouldn't be added to the fallback set.


--
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Onionoo and ASN Number/AS Name

2019-06-01 Thread Jordan

On 6/1/19 10:14 PM, Conrad Rockenhaus wrote:

Onionoo returns “unknown” for my ASN for some reason (should return 63080) and 
returns “unknown” for AS Name (Should be GreyPony Consultants - as named in 
ARIN). I’m trying to find out where things might be potentially breaking here 
before I start connecting to the route servers at DE-CIX next week. Has anyone 
seen this type of issue before?


As far as I'm aware onionoo uses maxmind's database [1] for AS-related 
information and it looks like your ASN hasn't made it into the database yet.


[1] https://dev.maxmind.com/geoip/geoip2/geolite2/

--
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Scanning relays looking for onions

2019-05-23 Thread Jordan
Looks like someone is making HTTP requests to known relays with a host 
header of an onion address.


I have a webserver that returns 200 OK to all requests for 
honeypot-related fun and well... I can only imagine what they think my 
relay hosts as a result.


Stay safe out there friends.

2019-05-23T02:43:58Z5.8.10.[snip]  200 
jg4rli4xoagvvmw47fr2bnnf[snip].onion  /


--
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor website overhaul

2019-03-27 Thread Jordan
On Wed, Mar 27, 2019 at 05:13:00PM +, nusenu wrote:
> Matthew Finkel:
> > Please be respectful. The tone of this message is disrespectful
> 
> Thank you Matthew for spelling that out, I found this email 
> and in particular "who deserves punishment?" rather harsh.
> 
> 
> 
> -- 
> https://twitter.com/nusenu_
> https://mastodon.social/@nusenu
> 

Seconded... It's one thing to provide constructive feedback in 
the *correct* venue, but far from what happened here.

Have some empathy, Ralph.


> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 4 of Conrad Rockenhaus trial servers are in the top ten exit relays for Canada

2018-08-27 Thread Jordan
Tor will already avoid making circuits where two IP Addresses in the 
same /24 are involved. The research in this paper 
(https://www.freehaven.net/anonbib/cache/DBLP:conf/ccs/EdmanS09.pdf) is 
becoming more relevent and is worth discussing as more ISPs come out 
with the goal of hosting lots and lots of exit relays.


A valid point, thanks for linking the paper. I have the utmost belief 
your intentions are good, but the concentration of exits under a 
non-advertised central control warrants conversation, at least.


If the end goal is turning $ into relays, not all paths are paved with 
equal mind to security and it might be worth considering donation-backed 
alternatives.


Have a good one,

--
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 4 of Conrad Rockenhaus trial servers are in the top ten exit relays for Canada

2018-08-27 Thread Jordan

No, because Digital Ocean doesn't market itself as a relay hoster-- the
percentage of relay-hosting clients wouldn't even near 0.1%.


What difference does that make? 


You quoted it, you can read it again if you'd like.

There is little administrative overhead for Conrad to distribute a 
MyFamily directive for use with relays hosted on his systems.


I care not for petty back-and-forth's when lives are at stake, sorry.

--
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 4 of Conrad Rockenhaus trial servers are in the top ten exit relays for Canada

2018-08-27 Thread Jordan

That is an interesting question. Conrad's hosting operation is an
extreme case, certainly. But consider two independently operated VPS
relays in the same Digital Ocean data center, with arbitrarily similar
IP addresses. And consider that both are vulnerable to compromise by
Digital Ocean staff. Should they be part of the same family?


No, because Digital Ocean doesn't market itself as a relay hoster-- the 
percentage of relay-hosting clients wouldn't even near 0.1%.


On the other hand, if all (or the majority) of your operation contends 
on your customers hosting relays, I recommend they exist under the same 
family.


--
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 4 of Conrad Rockenhaus trial servers are in the top ten exit relays for Canada

2018-08-27 Thread Jordan
I'd be much more supportive of the typical "donate x to have a relay 
hosted for you" [1][2] rather than "host a relay with us" without 
maintaining them under the same family.


If relays are running on his machines and he has access to relay keys, 
the person who installs Tor via pkg and starts it is hardly considered 
an operator.


If 100% if your clients are hosting relays, you are the operator.

Just my two cents.

[1] https://emeraldonion.org/donate/
[2] https://www.torservers.net/donate.html

On 8/27/2018 10:11 AM, zimmer linux wrote:

Hi,

Just to let you know that following on with the one month trial with tor 
exit relays that Conrad kindly offered, at least four of his exit relays 
are now in the top 10 listing for Canada, out of 68 Canadian exit relays.


https://metrics.torproject.org/rs.html#search/country:ca%20flag:exit

Well done to Conrad - I say. The more, the merrier.

If you want any help with setting up your own FreeBSD tor exit relay, 
feel free to contact me off list.


Zim



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



--
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running relays in universities? Exit nodes, perhaps? Please share your experience!

2018-04-18 Thread Jordan
I've had a similar experience at my university in the states. While they 
acknowledge overall public benefit, I was denied, citing the overhead of 
abuse complaints and "potential for subverting university firewalls" 
(their words...) as justification for rejection.


They did, however, note if I were to bring my own addresses, they might 
be able to convince the board of regents network administrators to 
announce my prefix and allow me to handle complaints on my own. They 
perceived my potential leveraging of university transit as exclusive and 
distinct (and more secure?) than polluting their precious (and largely 
unused) /16, and had no interest in granting a lowly undergrad access to 
their beloved sanctuary.


Best of luck!

On 04/17/2018 10:36 AM, Gunnar Wolf wrote:

TL;DR - Have you got official permission to operate Tor exit nodes
within an university campus/network? Relay nodes, even? Please
share me how this permission was achieved! (or even if it was
denied, please tell me!)

Hi,

I know this list is mostly technical in nature, so sorry for
presenting a very different kind of topic here; I will send a very
similar message to the tor-teachers list, but I believe the population
of this list to be interesting..

I am trying to get my university's (Universidad Nacional Autónoma de
México) OK to run an exit node from our campus' network. I currently
operate one relay, am willing to set up some extra relays, and have at
least one colleague in a different research institute with a relay of
his own, but I believe we should aim for exit nodes.

Now, I don't want to set it up in a rogue fashion, as I'm sure that
the university's NOC or CERT would not take long to get complaints and
require me to shut it down. I have already made an official request
for the permission to run an exit node and (as expected) it was turned
down. Quoting (translation mine) the reasons for rejection,

1. This assignation is not factible because the Tor network is not
   compatible with the Acceptable Usage Policies of RedUNAM, being
   this infrastructure oriented to the service of institutional
   goals.

2. While the Tor network can have reseearch purposes, due to its
   nature and the hiding of IPv4 addresses and anonymous
   connectivity, it is susceptible to be used by third parties from
   outside the University with purposes conflicting with those
   specified in item 1, without any possibility of control or
   regulation from the University's part or from your project.

3. Even more so: The Tor network, due to its definition and
   structure, can potentially incorporate third people with
   malicious or even delictive intentions, which would affect not
   only the computers or networks in your Institute or all of the
   University, but also networks outside the institution's control

So, I want to gather experiences from operators in different
universities or research institutions. Which way did you have to
argue? How hard was to get this OK? Did you ask a permission for a
specific project, or as part of your networking infrastructure in
general? Did you ask this before setting up the exit node, or as a
"fait accompli" gathering not-too-ill results for a given time period?

Any help and pointers are welcome!



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



--
Jordan
https://yui.cat/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] new Tor exit

2018-03-14 Thread Jordan

Hi Arisbe,

Thanks for running relays! If you're running multiple relays (as you've 
suggested) it's important to run then under the same family, see 
https://www.torproject.org/docs/faq.html.en#MultipleRelays.


In regards to new relay usage, see 
https://blog.torproject.org/lifecycle-new-relay



On 03/14/2018 11:03 PM, Arisbe wrote:

Hello all,

I rolled out a new Tor exit [0] this morning West Coast U.S. time.  
It's special to me because I've negotiated the trust of a host company 
in Albania.  I was the first Tor relay in that country and now I'm the 
first exit relay there.  This trust took me a year to establish.  I 
run a number of relays-both exit and non-exit.  I run a dozen bridges 
for  people that need the ISP connectivity.  I host classes in 
Southwest Washington State to teach ordinary people how to be safe 
while they're on the internet.  I teach high-school pupils how to set 
up and operate Tor relays.


Here is my problem:  The aforementioned relay has been on for nearly 
24-hours and not a single user has frequented my doorsteps.  I have 
had seven of the nine authorities parked in this node for most of the 
time but no inbound connections (except for those referenced and two 
hackers)  and no outbound or exit connections.  There is nothing 
technically wrong with the installation so what gives.  I this an 
issue of administrative paperwork?  While I am very supportive of Tor, 
I am not with unlimited patience.  I have a job, wife and kids and 
money pit house to maintain.


Thanks for giving me a bit of advice to make this guy blossom. If I 
don't understand, I apologize to all.


Arisbe

[0]  516D1B9E22484202322828D8CAC30325030017E2

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


--
Jordan
https://yui.cat/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] FreeBSD 11.1 ZFS Tor Image

2018-02-25 Thread Jordan



Another issue is that OVH is over relied upon for public nodes. It's the
leading ASN with almost 15%.

They're one of the few providers out there that allow exits. That's why 15% of
our exits are on OVH.

For what it's worth, my entire OVH account was terminated as a result of 
hosting an exit on their VPS line, citing "hosting a proxy" as grounds 
for termination. They're slow to act on abuse (if you reply with *any* 
response it satisfies their automated system until a human looks at it), 
but they do not explicitly support Tor when it comes to VPS's.


--
Jordan
https://yui.cat/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Feedback wanted: letter to my university's library

2017-10-01 Thread AJ Jordan
On Mon, Oct 02, 2017 at 07:08:35AM +0200, Moritz Bartl wrote:

> On 01.10.2017 22:52, teor wrote:
> > AWS is an expensive way to run a relay, because they charge per GB.
> > Capped providers can cost less, and you can use AccountingMax to
> > limit your usage.
> > 
> > Here's a list of providers that allow tor: 
> > https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs
> 
> For non-exit relays, you actually don't have to limit yourself to ISPs
> that "allow Tor". Be careful with "unmetered/unlimited" offers. I would
> be honest up front in terms of data usage, and find out what kind of
> "fair use policy" the ISP has. Often, the customer support can give you
> an exact number, even if it's not stated anywhere on their website.

Thanks (to both you and Tim); this is really good advice. I'll look
into it... assuming I can find the time, of course :/

> I hope Alison can help you with the uni library. That's a really good
> idea. Internet and policies can be hugely different between different
> universities, so at least for non-exit relays, it should be pretty
> straightforward: Here also, I would suggest to first (without making a
> lot of noise about it) to find out what the rules around Internet usage
> are, and just set one up.

The problem is that logistically I can't without help,
unfortunately. I don't have a spare machine to run it on and more
importantly, I don't have access to a good wired connection. The only
Ethernet jack I know of is in my dorm room and I can't imagine it's
very good compared to a datacenter connection. So there's two things
I'd need from IT.

Cheers,

AJ


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Feedback wanted: letter to my university's library

2017-10-01 Thread AJ Jordan
Hey, all!

I'm AJ; I've been lurking on this list for many years but have never
had cause to post. I've run a Tor relay (`strugees`) on AWS for a
number of years now, but haven't been able to dedicate all that much
bandwidth to it due to cost concerns.

However I've just started college at the University of Rochester,
which obviously presents a great opportunity to set up a relay on a
really great network. I'm planning to reach out to the library with
the following email and would love some feedback:

> Heya!
>
> I'm a new first-year student and I'm active in the technology
> activism community. One of the things I'm very interested in is the
> Tor Project (https://torproject.org), whose mission is to make it
> possible to freely and anonymously use the internet, without fear of
> surveillance or censorship. Tor is used by a wide variety of people
> - activists, journalists, corporations, law enforcement, and
> individuals - to gain free access to information and speak their
> mind. Tor is able to provide this free expression by utilizing a
> worldwide network of relays run by volunteers. A relay can make a
> big difference on the Tor network if it's run on a connection which
> is fast and has lots of bandwidth - like the University's
> connection.
>
> I think it would be really cool if UR would donate part of its
> internet resources to the Tor network. I considered directly
> contacting IT, but I thought it actually made sense to talk to the
> library first since the core values are actually really similar -
> libraries and the Tor project both know the value and power of
> unrestricted access to information and are dedicated to making
> information available to anyone who wants it.
>
> If this is something that sounds interesting, I would love to chat
> about this in person. I would also be willing to invest the time
> needed to administrate the relay - I have several years of
> experience doing this already, but haven't had access to the
> resources the University has.
>
> Thanks very much!
>
> AJ Jordan

Does anyone who's done something like this before have any tips or
suggestions? Am I going about this in the best way?

Cheers!

AJ


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Question on running bridge nodes

2014-10-11 Thread Alex Jordan
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On October 11, 2014 3:25:47 PM PDT, Tor externet co uk  
wrote:

> I wondered whether it was more helpful to the Tor network as a whole to
> have have a very fast node which hibernated every 12-15 hours, or if I
> throttled Tor traffic, so that the node was more stable.

It is better for the network to have a fast but unstable node.

-BEGIN PGP SIGNATURE-
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=1KRo
-END PGP SIGNATURE-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Question on running bridge nodes

2014-10-11 Thread Alex Jordan
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On October 11, 2014 3:25:47 PM PDT, Tor externet co uk  
wrote:

> I wondered whether it was more helpful to the Tor network as a whole to
> have have a very fast node which hibernated every 12-15 hours, or if I
> throttled Tor traffic, so that the node was more stable.

It is better for the network to have a fast but unstable node.

-BEGIN PGP SIGNATURE-
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=ClZV
-END PGP SIGNATURE-

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Help keeping Tor relay up

2014-06-19 Thread Alex Jordan
On Wed, Jun 18, 2014 at 10:11 PM, Evelyne Fong
 wrote:
> I've set up the relay recently, so I'm not expecting a lot of traffic.
> However, I'm confused as to if my relay is suddenly failing for no reason or
> is Atlus saying my relay is no longer running because there's no traffic on
> it.

Do you have hibernation set up?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Debian relay Puppet module

2014-06-16 Thread Alex Jordan
On Sunday, June 15, 2014, Moritz Bartl  wrote:
>
> Personally, I think it would be great to not only have puppet modules
> spread out somewhere across the Internet, but a full-fledged
> guide/wizard that makes it easy for people to locally configure relays
> without knowing anything about Tor configuration options.

+1; this would be great for Tor Cloud users.

>
> In my dream
> world, it would not only support Debian: Right now, most of the Tor
> network runs on Debian, which is not ideal. We need more *BSD and
> Solaris! And FreeDOS! :)

Why is this not ideal? I'm not following.
Also, do you mean Debian or Debian-like? If the latter, Tor
Cloud (Ubuntu) probably accounts for a fair bit of that inbalance.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays