Re: [tor-relays] Relay MIGHTYWANG consensus issues and loss of STABLE flag

2021-11-01 Thread Mighty Wang

Hi Eddie

Yes I saw your post on the day it happened and guessed that we are 
suffering from exactly the same issue that started at exactly the same 
time.


I couldn't correlate the loss of stable flag with anything in recent Tor 
server releases but I am going to recheck those; I am currently working 
my way back through the consensus voting lists in the run-up to the 14th 
October to try and understand where the problem started,


I'll report back here.

thanks


W



On 29/10/21 18:57, Eddie wrote:
Welcome to the club: 
https://gitlab.torproject.org/tpo/network-health/team/-/issues/128


Since Georg opened that (on my behalf) I too have lost the Stable flag.

Cheers.


On 10/29/2021 9:10 AM, Mighty Wang wrote:


Hello fellow operators


I have one pretty large relay, MIGHTYWANG which is an IP4/6 guard, 
dedicated hardware running on a 1Gb line uncontended. It is usually 
one of the top 5 relays by consensus weight but on the morning of 
14th October it lost Guard status on account of losing the stable flag.


I checked logs, connectivity and server health - nothing unusual, 
everything is generally pretty bullet proof in and around the relay 
and it had been running for well over a year without a reboot - just 
the very occasional Tor daemon restart following upgrades but no such 
activity prior to the 14th.


So next I checked the consensus and I see that around half of the 
directory authorities seem to be not assigning the stable flag. See 
attached screenshot showing current consensus.


The peering to each of those relays seems OK from what I can see (IP4 
and IP6) so any idea what gives?


I've got a MIGHTYWANG sitting here twiddling it's thumbs because have 
the directory authorities don't want to use it. Bit of a waste.


I had similar things happen a few years ago with one of my old 
relays; again no obvious reason, just seemed to be the a random whim 
of the directory authorities.


I've noticed a couple of other long term relays are in a similar 
position - is this some time of attack, deliberate action or just Tor 
magic?



Wang


--
MIGHTYWANG 9B2BC7EFD661072AFADC533BE8DCF1C19D8C2DCC

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


--
MIGHTYWANG 9B2BC7EFD661072AFADC533BE8DCF1C19D8C2DCC

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay MIGHTYWANG consensus issues and loss of STABLE flag

2021-11-01 Thread Mighty Wang

Thanks Sebastian


On 29/10/21 19:04, Sebastian Hahn wrote:

Hi Wang,


On 29. Oct 2021, at 18:10, Mighty Wang  wrote:

I have one pretty large relay, MIGHTYWANG which is an IP4/6 guard, dedicated 
hardware running on a 1Gb line uncontended. It is usually one of the top 5 
relays by consensus weight but on the morning of 14th October it lost Guard 
status on account of losing the stable flag.

I checked logs, connectivity and server health - nothing unusual, everything is 
generally pretty bullet proof in and around the relay and it had been running 
for well over a year without a reboot - just the very occasional Tor daemon 
restart following upgrades but no such activity prior to the 14th.

So next I checked the consensus and I see that around half of the directory 
authorities seem to be not assigning the stable flag. See attached screenshot 
showing current consensus.

The peering to each of those relays seems OK from what I can see (IP4 and IP6) 
so any idea what gives?

I've got a MIGHTYWANG sitting here twiddling it's thumbs because have the 
directory authorities don't want to use it. Bit of a waste.

I had similar things happen a few years ago with one of my old relays; again no 
obvious reason, just seemed to be the a random whim of the directory 
authorities.

I've noticed a couple of other long term relays are in a similar position - is 
this some time of attack, deliberate action or just Tor magic?



Wang

I operate gabelmoo and your relay seems to be unreachable via IPv6 from here. 
Here's a traceroute:

traceroute to 2a02:29d0:8008:c0de:bad:beef:: (2a02:29d0:8008:c0de:bad:beef::), 
30 hops max, 80 byte packets
  1  informatik.gate.uni-erlangen.de (2001:638:a000:4140::1)  1.966 ms  2.037 
ms  2.214 ms
  2  constellation.gate.uni-erlangen.de (2001:638:a000::3341:33)  0.718 ms  
0.770 ms  0.831 ms
  3  yamato.gate.uni-erlangen.de (2001:638:a000::3033:30)  0.829 ms  1.122 ms  
1.234 ms
  4  * * *
  5  * * *
  6  * * *
  7  ffm-bb1-v6.ip.twelve99.net (2001:2034:1:6b::1)  19.795 ms  19.786 ms  
19.779 ms
  8  prs-bb1-v6.ip.twelve99.net (2001:2034:1:be::1)  20.489 ms 
prs-bb2-v6.ip.twelve99.net (2001:2034:1:c1::1)  20.931 ms 
prs-bb1-v6.ip.twelve99.net (2001:2034:1:be::1)  20.509 ms
  9  ldn-bb4-v6.ip.twelve99.net (2001:2034:1:7b::1)  19.517 ms 
ldn-bb1-v6.ip.twelve99.net (2001:2034:1:7a::1)  19.390 ms  19.334 ms
10  * * *
11  vaioni-ic326121-ldn-b2.ip.twelve99-cust.net (2001:2000:3080:937::2)  20.387 
ms  19.464 ms  20.446 ms
12  2a02:29d0:0:1:: (2a02:29d0:0:1::)  39.577 ms  39.414 ms  39.363 ms
13  2a02:29d0:3:1003::1 (2a02:29d0:3:1003::1)  20.520 ms  20.514 ms *
14  * * *
15  * * *
16  * * *
17  * * *
18  * * *
19  * * *
20  * * *
21  * * *
22  * * *
23  * * *
24  * * *
25  * * *
26  * * *
27  * * *
28  * * *
29  * * *
30  * * *

Perhaps this helps analyze the problem?

Cheers
Sebastian


Strangely your relay gabelmoo  is one of the relays I checked IP4/IP6 
connectivity to and I can hit your IP6 OK from MIGHTYWANG so there is a 
route,


traceroute to 2001:638:a000:4140:::189 
(2001:638:a000:4140:::189), 30 hops max, 80 byte packets

 1  beijing.dsd-labs.com (2a02:29d0:8008::1)  0.091 ms  0.076 ms 0.088 ms
 2  2a02:29d0:3:1003:: (2a02:29d0:3:1003::)  1.367 ms  1.378 ms 1.364 ms
 3  2a02:29d0:0:1::1 (2a02:29d0:0:1::1)  1.487 ms  1.443 ms  1.458 ms
 4  * * *
 5  ldn-bb4-v6.ip.twelve99.net (2001:2034:1:7b::1)  1.839 ms 
ldn-bb1-v6.ip.twelve99.net (2001:2034:1:7a::1)  17.684 ms  17.402 ms
 6  prs-bb1-v6.ip.twelve99.net (2001:2034:1:be::1)  17.454 ms 
prs-bb2-v6.ip.twelve99.net (2001:2034:1:c1::1)  18.639 ms  18.623 ms
 7  ffm-bb1-v6.ip.twelve99.net (2001:2034:1:6b::1)  18.859 ms 17.696 ms 
ffm-bb2-v6.ip.twelve99.net (2001:2034:1:6c::1)  18.092 ms
 8  kr-erl156-0.x-win.dfn.de (2001:638:c:a039::2)  21.150 ms 20.963 ms  
21.541 ms
 9  constellation.gate.uni-erlangen.de (2001:638:a000::3033:33) 21.509 
ms  21.291 ms  22.232 ms
10  * informatik.gate.uni-erlangen.de (2001:638:a000::3341:41) 20.767 
ms  21.339 ms
11  despari.informatik.uni-erlangen.de (2001:638:a000:4140:::189)  
21.215 ms  20.971 ms  20.725 ms


I think your UDP based traceroute is hitting my firewall and getting 
dropped but you do have  a route to me - in fact your relay has a long 
term active connection to mine via IP6 right now:


tcp6   0  0 2a02:29d0:8008:c0de:bad:beef:::443 
2001:638:a000:4140:::189:41011  ESTABLISHED


So it isn't an IP6 issue from what I can see (although that was an issue 
about 18 months ago as a result of some temporary peering issues).


I checked all the DA relays on IP6 and IP4 and all have active 
connections to me via IP6 (where they support it) or IP4 so if it is a 
connectivity issue it must be transient and so far undetectable.


There is something else happening here but I don't know what yet.

thanks

Wang


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor

[tor-relays] Relay MIGHTYWANG consensus issues and loss of STABLE flag

2021-10-29 Thread Mighty Wang

Hello fellow operators


I have one pretty large relay, MIGHTYWANG which is an IP4/6 guard, 
dedicated hardware running on a 1Gb line uncontended. It is usually one 
of the top 5 relays by consensus weight but on the morning of 14th 
October it lost Guard status on account of losing the stable flag.


I checked logs, connectivity and server health - nothing unusual, 
everything is generally pretty bullet proof in and around the relay and 
it had been running for well over a year without a reboot - just the 
very occasional Tor daemon restart following upgrades but no such 
activity prior to the 14th.


So next I checked the consensus and I see that around half of the 
directory authorities seem to be not assigning the stable flag. See 
attached screenshot showing current consensus.


The peering to each of those relays seems OK from what I can see (IP4 
and IP6) so any idea what gives?


I've got a MIGHTYWANG sitting here twiddling it's thumbs because have 
the directory authorities don't want to use it. Bit of a waste.


I had similar things happen a few years ago with one of my old relays; 
again no obvious reason, just seemed to be the a random whim of the 
directory authorities.


I've noticed a couple of other long term relays are in a similar 
position - is this some time of attack, deliberate action or just Tor 
magic?



Wang


--
MIGHTYWANG 9B2BC7EFD661072AFADC533BE8DCF1C19D8C2DCC

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] ContactInfo Information Sharing Specification Version 1 released

2020-07-24 Thread Mighty Wang

On 21/07/20 18:16, nusenu wrote:

Hi,

I'm happy to finally announce version 1 of the ContactInfo Information Sharing 
Specification:

https://github.com/nusenu/ContactInfo-Information-Sharing-Specification
This is an effort that started in 2017 as you can see on github.

...

regards,
nusenu




Hi Nunsenu

Firstly, thank you for taking the time to look at the issue of malicious 
relay operators and come up with some potential approaches for 
addressing it.


If I understand correctly your objective is to increase the level of 
effort required to run a relay, at least when it comes to the larger 
relays. I assume that you assume that if more effort is required then 
malicious relay operators will shut down and go elsewhere?


I do not feel the proposed verification measures will make a malicious 
relay operators life sufficiently more difficult unfortunately.


Malicious relay operators already expend relatively large amounts of 
money and presumably effort to do their thing; the example you gave 
initially talked about a potentially malicious operator providing up to 
23% of exit capacity - that must be a very expensive already surely?


I can't help but feel that the issue of malicious operators could 
perhaps be better addressed by


1) Having a valid email contact address for any given relay as you 
already suggest; and


2) Having each operator join this mailing-list (using the above email 
address) and introduce, anonymously or otherwise, themselves and their 
relay(s).


To have either the guard or exit flags on your relay you would need to 
complete the aforementioned 2 steps. In cases where there are concerns 
over a relay or set of relays then there would be a transparent and 
public forum where those concerns can be both raised and (hopefully) 
addressed, i.e. this mailing list.


I get that it is not as interesting as a more technical approach but 
IMHO it would be more effective and could be implemented almost 
immediately and is actually not that easy to game compared to technical 
solutions.


Anyway these are just my thoughts.

Thanks again for taking the time to look at the problem.


yours


M Wang


--
MIGHTYWANG 9B2BC7EFD661072AFADC533BE8DCF1C19D8C2DCC

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Become a Fallback Directory Mirror (deadline: July 23)

2020-07-09 Thread Mighty Wang

9B2BC7EFD661072AFADC533BE8DCF1C19D8C2DCC   MIGHTYWANG

Viva la Wang!



On 08/07/20 18:36, gus wrote:

Dear Relay Operators,

Do you want your relay to be a Tor fallback directory mirror?
Will it have the same address and port for the next 2 years?

Just reply to this email with your relay's fingerprint.

Important: you have until July 23 2020 to reply to this message to get
in the fallback directory mirror list.

If your relay is on the current fallback list, you don't need to do
anything.

If you're asking:

Q: What's a fallback directory mirror?

Fallback directory mirrors help Tor clients connect to the network. For
more details, see [1].

Q: Is my relay on the current list?

Search [2] and [3] for your relay fingerprint or IP address and port.
[2] is the current list of fallbacks in Tor.
[3] is used to create the next list of fallbacks.

Q: What do I need to do if my relay is on the list?

Keep the same IP address, keys, and ports. Email tor-relays if the
relay's details change.

Q: Can my relay be on the list next time?

We need fast relays that will be on the same IP address and port for 2
years. Reply to this email to get on the list, or to update the details
of your relay.

Once or twice a year, we run a script to choose about 150-200 relays
from the potential list [3] for the list in Tor [2].

Q: Why didn't my relay get on the list last time?

We check a relay's uptime, flags, and speed [4]. Sometimes, a relay
might be down when we check. That's ok, we will check it again next
time.

It's good to have some new relays on the list every release. That helps
tor clients, because blocking a changing list is harder.

cheers,
Gus

[1]
https://gitlab.torproject.org/tpo/core/tor/-/wikis/NetworkTeam/FallbackDirectoryMirrors
[2]
https://gitweb.torproject.org/tor.git/tree/src/app/config/fallback_dirs.inc
[3]
https://gitweb.torproject.org/fallback-scripts.git/tree/fallback_offer_list
[4]
https://trac.torproject.org/projects/tor/attachment/ticket/21564/fallbacks_2017-05-16-0815-09cd78886.log


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


--
MIGHTYWANG 9B2BC7EFD661072AFADC533BE8DCF1C19D8C2DCC

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Debian-tor Vs User

2020-04-19 Thread Mighty Wang

Switch from root to user = su usrname >Password. The problems start
when I try and su to debian-tor. First I get a query for a password which
it doesn't have. So I make a pass for debian-tor and enter it when I su to
debian-tor. I enter whoami and the response is: user and not debian-tor.
With or without a password it doesn't work. Secondly, if I su debia-tor >
passwrd - sudo -u debian-tor nyx it produces a page and a half of pure
gibberish. Sudo -i to root and enter nyx, it operates perfectly; and yes
I understand I shouldn't run nyx as root.

How do I become debian-tor so I can operate my bridge correctly? Adriann

--
It can't be, so therefore it isn't - stanton Friedman

Hello Kathi

You need to add your standard user to the debian-tor group. it is not 
necessary to set a password for the debian-tor user or to try to su to 
that debian-tor.


If your username is kathi then as the following one-liner should do what 
you need on debian:


"sudo adduser kathi debian-tor"

Then arm/nyx should fire up as the kathi user...

regards

Wang


--

MIGHTYWANG 9B2BC7EFD661072AFADC533BE8DCF1C19D8C2DCC

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays