Re: [tor-relays] Relay in Japan being marked as a US relay?

2024-01-19 Thread Neel Chauhan
The reality is that there's multiple IP databases, and each operates 
differently.


198.0.0.0/8 is an ARIN IP allocation, and even though the server's in 
Japan, the IP addresses are allocated to a US company, in this case 
Choopa/Vultr.


This is why some databases show the IP in the USA: they might look at 
the first allocation after the RIR, which says "USA".


When I ran Tor exit relays on leased IP space, some abuse reports went 
directly to me, but some went to the IP lessors, not realizing IP 
leasing and reallocations are now commonplace.


-Neel

On Thu, Jan 18 2024 at 12:50:22 PM -0600, NodNet  
wrote:
I think tor and Tor Project use IPFire's DB for GeoIP lookups, and 
198.13.48.219 shows the following:


NETWORK: 198.13.48.0/20
AUTONOMOUS SYSTEM: AS20473 - AS-CHOOPA
COUNTRY: United States of America

https://www.ipfire.org/projects/location/lookup/198.13.48.219

On 1/18/2024 11:22 AM, Jag Talon wrote:

Hello,

I have a relay in Japan with the IP of 198.13.48.219, but it's being 
marked as being in the US. I've tried using different websites like 
www.iplocation.net, iplocation.io, and www.wolframalpha.com and 
they're all telling me that the IP is in Japan.


I'm wondering if perhaps there's an issue with the GeoIP lookup? Or 
perhaps an outdated database?


Thanks!


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Short heads up

2023-01-09 Thread Neel Chauhan

On 2022-12-25 00:27, Frank Steinborn via tor-relays wrote:

Hi friends,

I made some smaller tweaks over the last few hours which should 
especially help relays on nearly OOM or thrashing situations (making 
use of Zswap + MGLRU if available).


The rules themselves are just the same, so no changes there.


I had an exit relay which was constantly DDoSed. Instance CPU usage was 
40%.


Had the IP change (for another reason tho) and it didn't go away, the 
DDoS targeted that particular fingerprint. That server had two relays, 
one fortunately unaffected.


I ended up just changing the fingerprint for the affected one. Now I 
have to wait for the ramp-up phase, yay!



Merry christmas,
Frank


Best,

Neel






--- Original Message ---
On Sunday, December 4th, 2022 at 11:25 PM, Frank Steinborn 
 wrote:






Hi,

I want to show you my anti DDoS solution for my relays (aswell ;-). It 
works without ipset, but with a mix of the recent and hashlimit 
iptables modules.


What is does:
* If one IP address tries to make 7 SYN connection attempts per 
second, they are locked out for 300 seconds. If they try another 
connection in that timeframe, the timer is reset and they are locked 
out for another 300 seconds.
* Threre are no more SYNs allowed if 4 connections are already in use 
to the ORPort.


It works very well for me. Other solutons are far more aggressive but 
I feel my solution works perfectly against the attacks, even if they 
are not that aggresive.


On top of that, I feel its more easy to implement into ones existing 
firewall solution.


You can find the repo here: https://github.com/steinex/tor-ddos

Feel free to give it a shot and feedback would be much appreciated!

Greetings,
steinex

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Exit: Complaints of IP being used for "spam" despite exit policy

2022-05-04 Thread Neel Chauhan

Hi,

On 2022-05-04 12:31, li...@for-privacy.net wrote:
Yes, unfortunately you get this SPAM abuse, although it is clear that 
the mail

was submitted via a webmailer :-(


Probably true.

Sometimes I think "is my FreeBSD exploited and being used to send 
spam",

but then I also see Linux relays on other ISPs also on the blocklists.


It's actually very unlikely that a longer running exit can send mails. 
;-)
I can't even send myself log mails from my exit IP's because all IP's 
are

blacklisted. On abusix.com and similar.


If you need to send emails, you could:

a. use Sendgrid or Mailgun or whatever to send emails if they don't 
block exit IPs from connecting to their SMTP relays


b. Run your own SMTP relay on a $3.5 VPS to forward emails


If possible, try to get an ARIN SWIP record:
https://blog.torproject.org/tips-running-exit-node/
5. Get ARIN registration


I could look into that. I do have a LLC that I could use for the SWIP 
record if needed.


99% of the abuse is f*cking auto-generated stuff from tools like 
fail2ban. If
you reply, you will not get an answer or 'message is undeliverable' 
back.


Probably true.

Psychz is still more automated but not so much, but I do know some hosts 
where abuse is very automated to the extent that they ignore automated 
complaints. Think AWS, Azure, OVH, or DigitalOcean, or a Big Telecom 
provider like Comcast, AT, Deutsche Telekom, Telefonica, etc.


On the opposite end of the spectrum, some hosts such as GTHost and 
Primcast both asked me to turn off my exit relay due to "too much abuse" 
because their abuse departments are very manual.



BuyVM is similarly priced (although my Psychz is an special offer) and
solid but has too many exits. OVH and TerraHost only allow exits on 
much
more expensive dedicated servers. Prgmr and HostMaze allow exits but 
has

so-so peering.

https://rdp.sh/ is not overcrowded yet.


Thanks for the suggestion.

I prefer to run my exits on FreeBSD (well, I am a FreeBSD committer), 
but I will keep rdp.sh in mind in case I need a new host.



We all hope with you.
As I've mentioned here before, IPv6 only relays are important. An AS 
with
IPv6/48 is affordable. Then it's much easier to set up your own 
bulletproof

ISP.


That sounds good :-). I'd love to have my own ASN, but don't have the 
mental or financial bandwidth to do this right now.


Fortunately Psychz got off my case, for now at least :-).

-Neel
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor Exit: Complaints of IP being used for "spam" despite exit policy

2022-05-04 Thread Neel Chauhan

Hi,

A day or two ago, my Tor exit host, Psychz Networks, has sent me 
complaints about my IPs being used to send "spam" despite me having 
blocked Port 25 (and 465/587) in the exit policy.


Psychz threatened to block Port 25 even when my exit policy explicitly 
blocks 25/465/587.


The URLs I got were from Cisco Talos:

 * 
https://talosintelligence.com/reputation_center/lookup?search=104.149.136.246#email-history
 * 
https://talosintelligence.com/reputation_center/lookup?search=104.149.133.54#email-history


Sometimes I think "is my FreeBSD exploited and being used to send spam", 
but then I also see Linux relays on other ISPs also on the blocklists.


Yes, I am aware Tor exit relays will land on blacklists. But getting 
complaints from spam is new, especially when my relays are blocking 
SMTP.


I am worried I would have to find a new host if they continue 
complaining. Darn, Psychz has been one of the more reliable exit hosts 
(on-and-off) for many years, although they are more vigilant on abuse 
than say BuyVM.


BuyVM is similarly priced (although my Psychz is an special offer) and 
solid but has too many exits. OVH and TerraHost only allow exits on much 
more expensive dedicated servers. Prgmr and HostMaze allow exits but has 
so-so peering.


I just hope Psychz doesn't continue to complain.

-Neel
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] OVHcloud does not allow Tor exit relays on VPS/cloud services

2022-01-31 Thread Neel Chauhan

Hi,

I was running a pair of Tor exit relays on OVH, and when I sent an 
response, I got this as a reply:


===
As provided in our Service Specific Terms, Anonymization services, such 
as TOR, are not permitted on OVHcloud's VPS or Public Cloud services. We 
request that you immediately cease utilizing your current subscriptions 
as a TOR exit node. Failure to comply with this request may result in 
the suspension and/or termination of your servers and/or account in 
accordance with our Terms of Service.


https://us.ovhcloud.com/legal/service-specific-terms
===

It seems OVH does not allow Tor exit relays on "cloud" or "VPS" 
subscriptions anymore. In the past when I used OVH for exits I had no 
issues, so they must have changed their TOS.


I am assuming OVH dedicated servers are fine.

I guess I'm moving the two exit relays to Terrahost. Terrahost is more 
expensive but I already have exits there and they are excellent.


I never had a great experience with OVH.

-Neel
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] [Censorship in Russia] Make HTTPS/Moat captcha more complex?

2021-12-25 Thread Neel Chauhan

On 2021-12-22 22:42, Gary C. New via tor-relays wrote:

I know it might be a fundamental change to the Tor network, but would
it be possible to obfuscate the Tor bridge/relay addresses with their
respective fingerprints; similar, to the I2P network? I've often
thought that this aspect of the I2P network is one that is implemented
well. Perhaps Directory Authorities could preform fingerprint to
address resolution? I think it would be extremely beneficial if
neither bridge or relay addresses were published in the wild. It would
make great strides in further buffering the Tor network from various
black-listing/censorship techniques.


The thing is, while Tor itself is decentralized, the directory 
authorities and fallback directories are not.


For a Tor client to bootstrap, you need a list of relays to be able to 
connect to. And in turn you have to contact the dirauths or the 
fallbacks.


While you could use an I2P-style or more recently blockchain-style 
setup, I believe there was a reason for Tor to use centralized dirauths.


I can't seem to find the article/FAQ right now, even though I had it a 
few years ago. I'm guessing it's to prevent malicious dirauths, unlike 
how Bitcoin could get manipulated by bad actors with a decentralized 
authority system.



Respectfully,

Gary


-Neel
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Is Tor Actually "Blocked" In Russia, or Are Some Users Unblocked for now?

2021-12-06 Thread Neel Chauhan

Hi tor-relays@,

While I don't live in Russia, nor are my parents from Russia (they're 
from India), today, I noticed these articles that some people noticed 
Tor is blocked in Russia (sorry for being late):


https://ntc.party/t/ooni-reports-of-tor-blocking-in-certain-isps-since-2021-12-01/1477
https://forum.torproject.net/t/tor-blocked-in-russia-how-to-circumvent-censorship/982

Yet, when I look at Tor Relay Status, I noticed many relays hosted on 
Russian residential ISPs are still online, and only a few aren't:


Moscow City Telephone:
 *https://metrics.torproject.org/rs.html#search/as:AS25513

Rostelecom:
 * https://metrics.torproject.org/rs.html#search/as:AS12389
 * https://metrics.torproject.org/rs.html#search/as:AS42610
 * https://metrics.torproject.org/rs.html#search/as:AS34168

Vimpelcom:
 * https://metrics.torproject.org/rs.html#search/as:AS8371
 * https://metrics.torproject.org/rs.html#search/as:AS8402

MTS:
 * https://metrics.torproject.org/rs.html#search/as:AS60496

I didn't notice a big reduction in "relay" users on Metrics: 
https://metrics.torproject.org/userstats-relay-country.html?start=2021-09-06=2021-12-05=ru=off


But did see an increase in "bridge" users: 
https://metrics.torproject.org/userstats-bridge-country.html?start=2021-09-06=2021-12-05=ru


And most Ooni results still show Tor can connect fine: 
https://explorer.ooni.org/search?until=2021-12-06=2021-11-29_cc=RU_name=tor


I feel it could be possible it's one of the two:

 * Most likely, the censorship rollout is in stages. Some users are 
blocked but other's aren't, where it wasn't rolled out is still 
unblocked.


 * Less likely, but Russia found people could use pluggable transports, 
like HTTPS obfs4 bridges and maybe they found blocking Tor itself is 
ineffective, or trying to block "meek" users ended up blocking Microsoft 
and ASP.NET/Azure-based webapps.


Disclaimer: I work at Microsoft, but not on Azure as of now. I did 
however interview for a position in the Azure umbrella (not on the CDN 
however).


-Neel Chauhan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] IPv6 reachability tests fail on CenturyLink IPv6 6rd - reachability broken?

2021-08-27 Thread Neel Chauhan

Hi,

I recently moved into a home with CenturyLink Fiber and moved my FreeBSD 
relays to the said home.


Fingerprints:

https://metrics.torproject.org/rs.html#details/B0F9BA27944FA59E3B1A182208FF7C0CFF5497B2
https://metrics.torproject.org/rs.html#details/DB710B14D7329B7289CFCC547F48EF53F812C40D

In my relay logs, while IPv4 works fine, I get these IPv6 errors:

Aug 26 18:47:01.000 [notice] Auto-discovered IPv6 address [REDACTED]:143 
has not been found reachable. However, IPv4 address is reachable. 
Publishing server descriptor without IPv6 address.
Aug 26 19:47:01.000 [notice] Auto-discovered IPv6 address [REDACTED]:143 
has not been found reachable. However, IPv4 address is reachable. 
Publishing server descriptor without IPv6 address. [2 similar message(s) 
suppressed in last 2400 seconds]


CenturyLink does use 6rd for IPv6 in case that matters, however I can 
telnet the relay ORPort via IPv6 from a VPS. My firewall is an OPNsense 
box which terminates PPPoE/6rd.


I am running tor-0.4.6.4-rc. Yes I know it's not the "latest", but I 
usually run the "beta" versions on my relays from FreeBSD pkg.


Rebooting both my OPNsense box and my server doesn't work.

The same relay fingerprints/torrcs/keys worked fine on Google 
Fiber/Webpass native IPv6 in another address.


I'm guessing IPv6 reachability tests aren't working right now since it 
worked with CL 6rd earlier today, or maybe CL misconfigured their 
network.


It's not a biggie for me, but while I could go Comcast with better IPv6, 
I'd rather have a high bandwidth relay than an IPv6 one with Comcast's 
slow uploads/caps. Other Seattle ISPs like Webpass, Wave, and Atlas 
aren't in my new home.


-Neel Chauhan

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay on CentOS8

2021-08-25 Thread Neel Chauhan

On 2021-08-20 05:08, Totor be wrote:

Hi all

As you might be aware, CentOS is switching from CentOS Linux to CentOS
Stream
https://www.centos.org/cl-vs-cs/

They provides a straightfowrarw way to migrate from Lunix to Stream:
#dnf swap centos-linux-repos centos-stream-repos
#dnf distro-sync

I have migrated a relay running in a small VM and everything seems to
run fine

Before migrating my production relay, I would appreciate any feedback
from other CentOS users on this migration: disk space required,
eventual issues envountered and more generally do's & don'ts


I'm a FreeBSD user, but if you don't want CentOS Stream, there are 
AlmaLinux and Rocky Linux, both which focus on being a spiritual 
successor to pre-Stream CentOS.


For you, I'd recommend looking at Alma/Rocky as opposed to CentOS 
Stream, but IMHO you should compare all three. However I have never run 
RHEL-based distros as a "server" (I've always run FreeBSD there) so I 
can't tell you my experiences.



Thanks a lot!


-Neel

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor non-exit relays and Hulu in 2021

2021-08-18 Thread Neel Chauhan

Hi tor-relays@,

Long time no see. Lately I'm more involved with the FreeBSD community, 
but I still run Tor relays though!


I'm moving into a new house in Seattle, WA which has CenturyLink Fiber. 
However, I'm moving in with people who watch Hulu.


I remember Hulu blocked Tor middle relay IPs back in 2016-7, but haven't 
seen recent information on this. Does Hulu still block Tor middle relay 
IPs in 2021?


I'm also considering adding a static IP block but not sure if 
CenturyLink is willing to give static IPs to me. I signed up for a 
"business" account but since it's a "residential" address CL's systems 
may not 'allow' this [1], so that's why I'm asking.


Comcast is not an option for me despite technically being "available" 
for obvious well-documented reasons. After all, CenturyLink is giving me 
1 Gbps Fiber, not 1.5 Mbps DSL.


-Neel Chauhan

=== FOOTNOTES ===

[1] - 
https://www.reddit.com/r/centurylink/comments/p6cs1t/cbrasstatic_ip_block_wanpppoe_ip_dynamic_or_static/h9d0q6n?utm_source=share_medium=web2x=3

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bandwidth scanner "longclaw" slow to the US West Coast

2020-08-23 Thread Neel Chauhan

Hi juga,

Sorry for the delayed response.

On 2020-08-18 10:05, juga wrote:


thanks for reporting this issue. Replying inline:


No problem.


Tor bandwidth scanners and directory authorities not necessarily run in
the same machine/IP and it's the case of longclaw's bandwidth scanner,
which is located in the US East Coast.


Good to know.

If the reason for lower bandwidth measurements is the location -it 
could
be other reasons- then it's weird that it would affect the US West 
Coast

and not Europe, given it's located in the US East Coast.


Thanks for telling me. It seems weird, West Coast congestion maybe?


To understand why this is happening, it's very helpful that you give us
this information.
I personally suspect it might not be related to the scanner location.
We'll investigate this as part of the issue you opened at
https://gitlab.torproject.org/tpo/network-health/sbws/-/issues/40014.

It might take some weeks, since a lot of the work done on this topic is
volunteer work. Apologies in advance about it.


Understood.

I don't mind helping if you need help. I am a Core Tor contributor, but 
am also open to working with sbws.



Is anyone else hosting West Coast relays having this issue?


Good question.

Is

"longclaw" actually measuring bandwidth from Europe? If so, WHY?


No, it's not measuring bandwidth from Europe.


Good to hear.



I got in contact with "longclaw"'s admin and he wasn't too helpful.


It looks to me that the longclaw's admin has been helpful if they have
suggested you to write to this mailing list, so that more people can
check this issue and/or they have suggested you to report an issue in
gitlab so that the bandwidth scanner developers won't forget about it 
:)


Also, not all directory authorities run bandwidth scanners and not all
of them know about the complexity on how bandwidth is determined.

Hope it helps.


I guess it's really easy to complain and blame longclaw's admin.

It could also be peering, but I am not sure. Wave does have congestion 
issues from time to time, but this affects more than Tor.


Sometimes, faravahar also may have this issue, but not to the same 
extent, and I can't confirm if this is true.


Thank you for responding.


Best,
juga


-Neel
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bandwidth scanner "longclaw" slow to the US West Coast

2020-08-20 Thread Neel Chauhan
Surprisingly, longclaw stopped measuring and the consensus weights shot 
up.


My home ISP, "Wave G" has shitty peering so it didn't shot up as much. 
But my Psychz dedicated server fortunately did see a solid increase.


-Neel

On 2020-08-19 16:02, i...@backplanedns.org wrote:

Same here

https://metrics.torproject.org/rs.html#details/29BBD80A1702C7FDEF6557C492F44E9EBAB2854A

_Sent from my T-Mobile 4G LTE device_

-- Original message--
From: Eddie
Date: Wed, Aug 19, 2020 6:40 PM
To: tor-relays@lists.torproject.org;
Cc:
Subject:Re: [tor-relays] Tor bandwidth scanner "longclaw" slow to the
US West Coast

Not sure if my relay is similar, but I've been seeing a slow fall in
consensus weight and advertised bandwidth over the past few months
even
though absolutely nothing has changed at my end.  Well, apart from me
*increasing* the RelayBandwidth settings.

Also before I shut my relay down for a couple of weeks late last year,

it had, and maintained guard status for about 6 months.  Now it yo-yos

in and out of guard on a regular basis.

https://metrics.torproject.org/rs.html#details/D195E5CE8AE77BAC91673E6CFB7BD0AF57281646

Cheers.

On 8/15/2020 5:41 PM, Neel Chauhan wrote:

Hi,

Is anyone else hosting West Coast relays having this issue? Is
"longclaw" actually measuring bandwidth from Europe? If so, WHY?



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor bandwidth scanner "longclaw" slow to the US West Coast

2020-08-15 Thread Neel Chauhan

Hi,

I believe the Tor bandwidth scanner nicknamed "longclaw" is measuring 
relays in the US West Coast worse than other bandwidth scanners in North 
America. This happens on multiple ISPs, both ones I have and ones I 
don't.


This includes two Tor exit instances on a dedicated server hosted in Los 
Angeles on Psychz Networks (AS40676):


https://metrics.torproject.org/rs.html#details/156AAC3FAD1ACC8906316519DCB444B8C77E4EBF
https://metrics.torproject.org/rs.html#details/A69CEB30328B1E85C6B167FECAF2F509CBD9517F

And two Tor non-exit instances on a home server in Seattle on Wave 
Broadband (AS11404), using a symmetrical Gigabit link:


https://metrics.torproject.org/rs.html#details/B0F9BA27944FA59E3B1A182208FF7C0CFF5497B2
https://metrics.torproject.org/rs.html#details/DB710B14D7329B7289CFCC547F48EF53F812C40D

The consensus weight values from longclaw are much lower than other 
North American bandwidth scanners, according to 
https://consensus-health.torproject.org/.


This also affects other relays/ISPs on the West Coast US/Canada, such as 
Emerald Onion, AT U-verse, Sonic.net, and QuadraNet. The same 
ISPs/hosts in the East Coast aren't affected.


This discrepancy in the measurement disproportionately favors European 
and East Coast US/Canada relays at the expense of West Coast relays, 
centralizing the Tor network even further than it already was. This 
wasn't an issue in the past, even as early as a few months ago. It only 
started appearing around June.


Is anyone else hosting West Coast relays having this issue? Is 
"longclaw" actually measuring bandwidth from Europe? If so, WHY?


I got in contact with "longclaw"'s admin and he wasn't too helpful.

Best,

Neel Chauhan

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] West Coast US Tor Relays Slow - Low Consensus Weight versus East Coast

2020-08-06 Thread Neel Chauhan

Hi network-health@/tor-relays@ mailing lists,

I noticed one thing: Tor relays on the West Coast US (and Canada) are 
generally slower than those on say the East Coast and in Europe.


I moved to the West Coast this January, but this was not an issue in the 
past when looking at dedicated servers I had from the West Coast prior 
to this year.


These are two middle relay instances on an Gigabit FTTH connection (Wave 
G in Redmond, WA):


https://metrics.torproject.org/rs.html#details/B0F9BA27944FA59E3B1A182208FF7C0CFF5497B2
https://metrics.torproject.org/rs.html#details/DB710B14D7329B7289CFCC547F48EF53F812C40D

The Consensus Weight often is slower than the Advertised Bandwidth, and 
isn't ramping up despite having lots of bandwidth. I set 
RelayBandwidthRate to about 500 Mbps on each instance.


This isn't just a Wave G problem, this affects almost every relay in the 
West Coast including other Gigabit ISPs such as AT (AS7018) and Sonic 
(AS46375), as well as hosting companies and colocation facilities.


For instance, my Los Angeles-based Exit relays at Psychz Networks 
(AS40676) show this issue (however they are new):


https://metrics.torproject.org/rs.html#details/156AAC3FAD1ACC8906316519DCB444B8C77E4EBF
https://metrics.torproject.org/rs.html#details/A69CEB30328B1E85C6B167FECAF2F509CBD9517F

Even Emerald Onion has this issue:

https://metrics.torproject.org/rs.html#details/09DCA3360179C6C8A5A20DDDE1C54662965EF1BA

What is causing this issue and is there a solution? Is it backbone 
congestion due to COVID-19? The high load on dirauths? sbws regressions?


Can I help fix this issue? I am a Core Tor contributor and am open to 
also working on sbws.


Is there a way to optimize my relays (they run FreeBSD).

-Neel

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Directory Authority servers still using excessive bandwidth

2020-07-20 Thread Neel Chauhan

Hi tor-relays@,

I have noticed that despite fixing bugs in the past, the directory 
authority relays are still using excessively high amounts of bandwidth, 
when looking at Relay Search:


Examples:

 * 
https://metrics.torproject.org/rs.html#details/7EA6EAD6FD83083C538F44038BBFA077587DD755


 * 
https://metrics.torproject.org/rs.html#details/9695DFC35FFEB861329B9F1AB04C46397020CE31


 * 
https://metrics.torproject.org/rs.html#details/BD6A829255CB08E66FBE7D3748363586E46B3810


And many more.

I'm asking since I'm having an issue with low consensus weights on a 
symmetrical "Gigabit" pipe, and I am suspecting the overloaded authority 
servers are a factor. Are they?


It could also be my current ISP's (Wave Broadband) crap peering, but 
would I really want to use Comcast?


-Neel

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Consensus weight/Advertised bandwidth low on "Gigabit" ISP, despite ISP equipment upgrades

2020-06-12 Thread Neel Chauhan

Hi tor-relays@,

I run a FreeBSD-based Tor relay across two instances on "Wave G", a 
Gigabit ISP in the Seattle metro. You may also know them as 
CondoInternet or CascadeLink, but I joined only this year on a 
Wave-branded service.


These relays have had low consensus weights since I got the service in 
January.


The instances are below:

 * 
https://metrics.torproject.org/rs.html#details/8FABF4D266DF95216F6C646C6D6D4611D3DCF484


 * 
https://metrics.torproject.org/rs.html#details/CE06BA1EA45FD32A79EAF7FE6A3B1919E7FE585B


My server and router are fine, I am in the single digits in terms of CPU 
use on both. The same exact server and router on Verizon FiOS in New 
York never gave me this issue.


There was an underlying ISP performance issue impacting me which led 
consensus weight values to be low, but my ISP has since upgraded their 
equipment in my building. In general, my Internet performance has 
improved by magnitudes.


However, my consensus weight has stayed more or less flat since the 
equipment upgrade, instead of jumping higher. What gives?


How long would it usually take for the bandwidth scanners to measure the 
higher bandwidths?


Should I re-key my relays and start from scratch?

About switching ISPs, I'm not switching to Comcast for obvious 
well-documented reasons, and neither CenturyLink nor Frontier/Ziply 
Fiber serve me, not even copper.


Best,

Neel Chauhan

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Consensus Weight low when compared to Advertised Bandwidth

2019-12-16 Thread Neel Chauhan

Hi,

After having my Primcast.com dedicated server suspended, I signed up for 
a dedicated server from Psychz Networks in their Dallas location to run 
a FreeBSD-powered Tor exit relay.


https://metrics.torproject.org/rs.html#details/9B6672E247BC4656915DF03A470D4B5BC2E7601F

While Psychz is a bit more expensive than Primcast/ServerRoom (and that 
is with an special offer), I get a slightly faster server and far better 
customer support.


One problem is that the consensus weight value is rather low in 
proportion to the advertised bandwidth value, when they should be 
approximately similar.


In fact, my server's CPU usage never goes beyond 1%.

Is this normal now that sbws is being deployed? Or is it bad peering on 
my relay?


-Neel

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Windows Relay Setup

2019-10-19 Thread Neel Chauhan
Tor 0.2.4.23 is EOLed and is blacklisted from the network. Vidalia is 
also EOL and unmaintained.


Also see: https://blog.torproject.org/removing-end-life-relays-network

If you want a Windows relay, you'll have to configure manually whether 
you like it or not. It's hard (Tor is Unix-native), and performance 
sucks when compared to Linux/BSD/macOS, but on the positive Windows is 
still better for relay diversity than Linux.


If there is Linux malware hurting the Tor network, we shouldn't just 
hope for BSD variants to keep us alive. Closed source or not, we should 
also consider Windows as an alternative relay OS (if you have a license 
or are willing to buy one). And I'm saying this as someone who runs 
FreeBSD relays and a FreeBSD desktop myself.


You can also use a VM, and it may be easier, but if I were you, just use 
the expert bundle and try to configure Tor as a NT service. You won't 
have to worry about a hypervisor and will help relay diversity along the 
way.


-Neel

===

https://www.neelc.org/

On 2019-10-17 15:20, William Pate wrote:

I finally got around to playing with this some more.

Thank you for your message, Bruce. I searched for Vidalia and found an
old bundle that appears to work perfectly on my Windows 10 machine.

Steps I took:

1. Download Vidalia Bundle 0.2.4.23 from 
http://vidalia-bundle.en.lo4d.com/

2. Extract
3. Install
4. Start
5. The Vidalia Control Panel will pop-up
6. In settings, I changed the Tor executable from the one included
with the Vidalia Bundle to the current version of Tor elsewhere on my
system.

Like I said, it *appears* to be working. Can't find it in relay search
yet, but I only set it up moments ago.

Nickname is inadequate
Contact is willp...@disroot.org


William Pate
willp...@pm.me
512-947-3311
inadequate.net

‐‐‐ Original Message ‐‐‐
On Sunday, July 14, 2019 1:44 AM, Barton Bruce  
wrote:





William,

On 7/11/2019 6:58 PM, William Pate wrote:

> I'm interested in hosting a Windows-based relay, if anyone can point me to a 
good tutorial. I've tried the most common ones.
>
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

There used to be a VIDALIA (sp?) kit that could simply be downloaded 
and
run on a windows machine. I then worked for an ISP/CLEC and had lots 
of

bandwidth so ran Vidaalia on a 64 bit Windows 7 Ultimate machine on my
desk at work.

I never did hear why something had changed at the tor project so that
stopped working, but do remember a rude snippy condescending reply 
from

someone on the mailing list so I lost interest.

I did get the head Tor guy from the Central Square Cambridge office of
TOR to come speak at a local networking group's monthly meeting we 
held
at a MicroSlush faclity in Burlington, MA and it was well received by 
a

packed audience. I think he now has left TOR and works for some ISP.



This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Cherryservers (formerly balticservers) account terminated for exit relay

2019-07-30 Thread Neel Chauhan
If you want an alternative exit relay host (other than the common ones 
like OVH, Scaleway, or Hetzner), one option is Server Room/Primcast 
(same company). I use Primcast for a 300 Mbps FreeBSD exit and have been 
happy with them.


Server Room/Primcast is not the "best" provider, but they are good 
enough for the purpose of an exit and being less popular (as of now) 
helps with relay diversity.


However, you will need a reduced exit policy with SR/Primcast. I have a 
**very** restrictive exit policy only allowing Ports 53, 80, 443, and 
8080 (so I get less complaints). If you want a custom OS, you will need 
iLO (HP/HPE's remote management, Primcast uses HP/HPE servers). An older 
server (pre-2011) may mean you'll need Windows and Internet Explorer 
(NOT MS Edge) to use the console, while a newer server will work with 
HTML5 on Windows/Mac/Linux/BSD/etc.


-Neel

===

https://www.neelc.org/

On 2019-07-30 02:15, Chris Kerr wrote:

I just heard from the hosting provider cherryservers.com that they are
terminating my account (after 2.5 years) where I run the exit relay
"ostwaldripening" (46.166.162.53), because they no longer wish to host 
tor

exit nodes.

I tried to create an account on trac.torproject.org to edit the 
"GoodBadISPs"

wiki page, but the spam blocking stopped me from doing so.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running gigabit relay

2019-07-27 Thread Neel Chauhan
By "NUC" I was meaning the low-end Celeron boxes. A NUC with a i7-8650U 
should work for Tor and a dedicated AP. It won't be as good as a desktop 
or server CPU, but for your use case it's fine as a relay and AP/router.


However, the built-in Wi-Fi is usually only a single band at once.

-Neel

On 2019-07-27 01:38, Mitar wrote:

Hi!

On Fri, Jul 26, 2019 at 12:08 PM Neel Chauhan  wrote:

About the server, I have a powerful HPE ProLiant as mentioned earlier,
but like other said at minimum you need a i5/i7 CPU, or an equivalent
Xeon or AMD CPU. So this means no NUCs or HPE MicroServers.


Hm, why not NUCs? There are NUCs with 8th Generation Intel CPUs:

https://ark.intel.com/content/www/us/en/ark/products/series/129705/intel-nuc-kit-with-8th-generation-intel-core-processors.html

For example, this one uses i7-8650U Processor:

https://ark.intel.com/content/www/us/en/ark/products/130392/intel-nuc-kit-nuc7i7dnke.html

Based on what I read in all the replies (thank you all!) this should
be more than enough?

I was thinking of not really using a dedicated router, but hopefully
configure NUC's WiFi into an AP. This is all I really need. I just
hope I can configure it as a dual-band AP. I am not yet clear about
that part.


Mitar

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running gigabit relay

2019-07-26 Thread Neel Chauhan
About having a relay on gigabit symmetrical FTTH, you don't just need a 
good server, you also need a good NAT router unless you want to use your 
server as a NAT router as well.


I don't have Sonic or Gigabit Fiber (from any ISP), but I have 300mbps 
symmetrical Verizon FiOS in Brooklyn, NY running a Tor middle relay. A 
Linksys running OpenWrt and many low-power Mini PC "firewall" boxes were 
a bottleneck even on 300 Mbps for Tor, despite having a powerful Xeon 
4108 HPE ProLiant ML110 Gen10 and having no Verizon router in my setup. 
I dabbled with using my ML110 as a PF firewall (I run FreeBSD), but 
yesterday, I installed a HP ProDesk 400 G4 as an OPNsense firewall 
(because I didn't want a single point of failure, and so I can remotely 
access iLO).


So your firewall needs to be more powerful than an average one because 
at least for me Tor has ~1 connections at once, and that is with Tor 
only measuring half my 300Mbps. Your Gigabit will mean far more than 
that running Tor. So a low power HP T620 Plus or Qotom box won't work as 
a firewall in this case.


My "bottleneck" could also be Verizon's peering that Sonic may not have. 
After all, Sonic supports Net Neutrality and Verizon opposes NN.


About the server, I have a powerful HPE ProLiant as mentioned earlier, 
but like other said at minimum you need a i5/i7 CPU, or an equivalent 
Xeon or AMD CPU. So this means no NUCs or HPE MicroServers.


-Neel

===

https://www.neelc.org/

On 2019-07-26 01:31, Mitar wrote:

Hi!

I have Sonic Fiber which offers gigabit symmetric connection. I am
thinking of using it for gigabit Tor relay, but I wonder what would be
good hardware to use for something like that. Information I have found
[1] is from 2010 so I wonder if there are any updates? Is there any
simple small box I could use? Like Intel NUC? Information here [2]
says that one can get 400 Mbps with AES-NI. And so with two processes
limit per my public IP this would be around 800 Mbps then. Is this
still a reasonable expectation? Do I have to care about the network
card to serve gigabit (besides its being nominally gigabit)? What
would be memory requirements for such a device?

[1] https://www.mail-archive.com/or-talk@freehaven.net/msg14159.html
[2] https://www.torservers.net/wiki/setup/server


Mitar

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Verizon.com blocked on Tor Middle Relay on FiOS

2019-05-30 Thread Neel Chauhan

Hi,

I have a Tor middle relay on Verizon FiOS.

If I try to access Verizon.com on the FiOS connection running a Tor 
middle relay, I get this error:



Access denied, in accordance with Verizon Information Security Policy


Please contact us if there is a legitimate business need to access this 
content.


They gave an email address to the EdgeCast NOC that I contacted, but the 
EdgeCast support said I should contact FiOS and not EdgeCast, even 
though I think the blocking is on EdgeCast's side (if it was on FiOS 
then I would get a "Hmm. We’re having trouble finding that site" error 
from Firefox).


Other Verizon sites such as Verizon Wireless and Verizon Media/Oath 
properties like AOL/Yahoo/Tumblr/HuffPost/etc. are not blocked on FiOS 
running Tor (heck, I can even sign up for Tumblr on exit relays), even 
though these other Verizon sites also use EdgeCast.


For those who have middle relays on their home broadband connection (not 
bridge or exit), both on Verizon FiOS and other ISPs regardless of 
country or technology, please test for if Verizon.com is blocked.


Thank You,

Neel Chauhan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Email Blocked by ISP

2019-05-17 Thread Neel Chauhan
Looking at your email address, you have an ISP assigned email. Unless 
you work for Spectrum, you shouldn't use an ISP email account. I'd 
advise you either:


 * Sign up for a third-party email service like Gmail, Outlook, 
ProtonMail, or Tutanota


 * If you can maintain one, run your own email server (I do this myself 
but many don't recommend it as email servers are complex)


Assuming you have a middle relay, I don't think the relay caused the 
email problems. I believe someone hacked your email, whether through a 
hacker attacking the Spectrum email server or a virus/malware gaining 
access to your email via a browser exploit. Check for this first.


-Neel

On 2019-05-16 13:31, K. Besig wrote:

I've run a home  relay on and off for several years and recently, for
the first time, had my email blocked by the ISP rendering it
impossible to login into my 3rd party mail sever.

When I contacted support I was informed my email password had been
reset due to activity that resembled e-bombing/mass mailing. Only
after submitting to a system scan while the rep waited on the
phone,was I able to reset my password.

I moved several months ago and went from a TWC legacy account to a
Spectrum account.

Wondering if anything other than lowering my tor bandwidth would keep
them off my back...

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Trouble Running Middle Relay On Google Cloud Debian VBS

2019-05-17 Thread Neel Chauhan

Keifer,

I think your Cron script is problematic.

The script:

0 0 1 * * apt-get update apt update && apt install -y --only-upgrade tor 
killall tor tor


Would kill Tor and since you don't have "&& tor" after the "killall 
tor", it is not restarting it.


But I'd advise just giving up on cron. For automatic updates, you should 
look into unattended-upgrades instead of using cron.


Also, forcefully killing Tor using cron isn't a good idea because it 
would terminate circuits using your relay instead of gracefully stopping 
them.


Disclaimer: I don't run Debian on my relays. I run FreeBSD relays. I 
have used Debian on my desktop briefly in 2012 before switching to 
FreeBSD as a desktop. I have never **really** run Debian as a server so 
I can't help you further with unattended-upgrades.


-Neel

===

https://www.neelc.org/

On 2019-05-16 01:26, Keifer Bly wrote:

Hi all,

So I am starting a new middle relay using a VPS hosted on Google Cloud
running Debian. though the relay is running, it is not appearing in
the consensus after 10 hours. Here is the tor log, any thoughts on
what is going on would be greatly appreciated thank you.

May 15 18:23:47.096 [notice] Opening OR listener on 0.0.0.0:65534 [1]
May 15 18:23:47.000 [notice] Parsing GEOIP IPv4 file
/usr/share/tor/geoip.
May 15 18:23:47.000 [notice] Parsing GEOIP IPv6 file
/usr/share/tor/geoip6.
May 15 18:23:47.000 [notice] Configured to measure statistics. Look
for the *-stats files that will first be written to the data directory
in 24 hours from now.
May 15 18:23:47.000 [warn] You are running Tor as root. You don't need
to, and you probably shouldn't.
May 15 18:23:47.000 [notice] Your Tor server's identity key
fingerprint is 'torworld 3A4E582092E7C6B822EC01F4D76F680F6C65B0A2'
May 15 18:23:47.000 [notice] Bootstrapped 0%: Starting
May 15 18:23:50.000 [notice] Bootstrapped 80%: Connecting to the Tor
network
May 15 18:23:51.000 [notice] Guessed our IP address as 35.238.140.120
(source: 193.23.244.244).
May 15 18:23:52.000 [notice] Bootstrapped 85%: Finishing handshake
with first hop
May 15 18:23:52.000 [notice] Bootstrapped 90%: Establishing a Tor
circuit
May 15 18:23:53.000 [notice] Tor has successfully opened a circuit.
Looks like client functionality is working.
May 15 18:23:53.000 [notice] Bootstrapped 100%: Done
May 15 18:23:53.000 [notice] Now checking whether ORPort
35.238.140.120:65534 [2] is reachable... (this may take up to 20
minutes -- look for log messages indicating success)
May 15 18:23:54.000 [notice] Self-testing indicates your ORPort is
reachable from the outside. Excellent.
May 15 18:23:56.000 [notice] Performing bandwidth self-test...done.
May 16 00:23:50.000 [notice] Heartbeat: It seems like we are not in
the cached consensus.
May 16 00:23:50.000 [notice] Heartbeat: Tor's uptime is 5:59 hours,
with 0 circuits open. I've sent 789 kB and received 7.41 MB.
May 16 00:23:50.000 [notice] Average packaged cell fullness: 100.000%.
TLS write overhead: 27%
May 16 00:23:50.000 [notice] Circuit handshake stats since last time:
0/0 TAP, 6/6 NTor.
May 16 00:23:50.000 [notice] Since startup, we have initiated 0 v1
connections, 0 v2 connections, 0 v3 connections, and 8 v4 connections;
and received 1 v1 connections, 0 v2 connections, 0 v3 connections, and
6 v4 connections.
May 16 00:23:50.000 [notice] DoS mitigation since startup: 0 circuits
rejected, 0 marked addresses. 0 connections closed. 0 single hop
clients refused.
May 16 00:58:51.000 [warn] Received http status code 404 ("Not found")
from server '45.62.242.212:9030 [3]' while fetching consensus
directory.

I also had another thing I wanted to ask. I am working on a crontab
script to automatically update and restart the tor relay once a month
automatically, as I am already running a bridge on another network
that needs to be updated manually.

Does this script look like it would get the job done? I don't have
much experience with crontab.

# m h  dom mon dow   command

0 0 1 * * apt-get update apt update && apt install -y --only-upgrade
tor killall tor tor
root@instance-1:/home/keifer_bly#

Thank you very much.

--Keifer

Links:
--
[1] http://0.0.0.0:65534
[2] http://35.238.140.120:65534
[3] http://45.62.242.212:9030
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] firewall ports needed to run a middle relay

2019-04-25 Thread Neel Chauhan
If you have fiber to the home or another symmetrical speed broadband 
connection (like some wireless ISPs like Webpass), you may have a lot of 
upstream speed. In this case it's perfect for Tor relays. If you do, 
invest in a good router with a big enough NAT table if you don't have 
one, flash custom firmware if your router supports it and is powerful 
enough, or reuse your old desktop as a pfSense box. I have Verizon FiOS 
FTTH and use a Linksys WRT1900AC running OpenWRT instead of a Verizon 
gateway.


Some ISPs may force you to use their router, like AT in some parts of 
the US who forces 802.X authentication to use VDSL/FTTH that is only 
spoken on their router.


But your uplink probably is crappy if you have cable, DSL, or fixed 
wireless.


-Neel

===

https://www.neelc.org/

On 2019-04-25 17:48, nusenu wrote:

to...@protonmail.com:

I need to move to a new router, which, unlike the old Verizon home
router, doesn't have a quick DMZ host to which I attach the tor
telay's local ip address.  So I think I need to do port forwarding,
and for that what rules do I need? My torrc config has: ControlPort
9052 ORPort 8443 DirPort 8080

So I forwarded 8443 and just in case, 8080. But the number of my
connexions kept dropping, so I put it back in the DMZ and it started
getting new ones again.  Trying to figure out if I screwed up the
config gui, or if I need to add other ports.  Did I miss a port?


Forwarding the ORPort and DirPort (if you set one) is all you need
but home broadband uplinks frequently are not made for the amount of
concurrent sessions a tor relay usually has to handle.
So failures might still happen even if you setup the port-forwarding
part correctly.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Advertised Bandwidth/Consensus Weight Dropping: Is Verizon FiOS throttling Tor Relays?

2019-04-09 Thread Neel Chauhan

Hi tor-relays@ mailing list,

I run the following Tor middle relay on a 300 Mbps symmetrical Verizon 
FiOS connection:


https://metrics.torproject.org/rs.html#details/2A65713649C1FD68764DBF43C46363168BE8C942

My setup is as follows:

 * HPE MicroServer Gen10 (AMD X3421) running FreeBSD 12.0

 * Tor relay in FreeBSD 12.0 jail, with "RelayBandwidthRate 0"

 * Linksys WRT1900AC running OpenWrt

The Linksys is connected directly to Verizon's ONT (which converts 
fiber/GPON to Ethernet) and no Verizon-branded router is used in my 
setup.


The problem is that after setting up my relay, I had my Tor Advertised 
Bandwidth and Consensus Weight values trend downwards for the past week. 
Sometimes, I have occasional spikes in consensus weight.


This relay has a new fingerprint, but used this server with another 
fingerprint as well. On the previous fingerprint, I reached a peak of 
19.5 MB/s (~160 Mbps) for the Advertised Bandwidth but has dropped to 
~10 MB/s (~80 Mbps). The previous fingerprint also had the same server 
and router.


I am thinking the issue is one of the two:

 1. Tor bandwidth authority nodes are overloaded or have bad 
connectivity to Verizon


 2. Verizon is intentionally throttling Tor on FiOS

 3. The relay ramp-up phase is still in action for my relay and I need 
to wait


I am suspecting reason 2, as I had seen my bandwidth values drop, and 
unable to reach higher values.


For some reason, other relays on AS701 (Verizon's AS Number) have higher 
Advertised Bandwidth/Consensus Weight values than me (around ~18.7MB/s 
on the fastest relay): 
https://metrics.torproject.org/rs.html#search/as:AS701


Sometimes, the other FiOS relays can go up to ~23 MB/s (~184 Mbps).

Is Verizon throttling Tor or are Tor bandwidth authority nodes just 
overloaded (or have bad peering with Verizon)? Or is it just the relay 
ramp-up phase in action?


Thank You,

Neel Chauhan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay C19B33758B3A5144894233EC4C95D7985B9FD101

2019-04-05 Thread Neel Chauhan

On 2019-04-05 11:31, li...@for-privacy.net wrote:

Am 05.04.2019 10:58, schrieb ylms:


can someone point me at some information about this warning?

"[WARN] Error binding network socket: Address already in use  [991
duplicates hidden]"


Log message is clear:
You have assigned a port number twice.
Either two Tor-instances run on the same (TCP) port numbers or you
have given Tor a port number, which already has another system
process.

'netstat -lptu' or successor 'ss -lptu' gives you an overview.


One thing that could happen (but may not apply to you) is your 
SOCKSPort. Set it to 0 to not listen, or to a random number if you have 
to listen for SOCKS connections.


-Neel

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor Exit Relay CPU Usage Running at 100% for 1 MB/s on FreeBSD

2019-03-11 Thread Neel Chauhan

Hi tor-relays@ mailing list,

I have set up two exit relays on a FreeBSD 12.0 dedicated server:

https://metrics.torproject.org/rs.html#details/1CD029594B08E07F29B9420410C2E34DB71FBB28
https://metrics.torproject.org/rs.html#details/A0EB2BD840838FAD51BDAD86B0BA3908FADFAE05

Looking at my top stats, I get CPU usage of 100% most of the time 
(meaning 95% of the time) on both instances pushing around ~1 MB/s with 
both instances.


The server is a HP Blade server and has a single Intel Xeon L5520 CPU 
with 16GB of RAM.


Tor is configured to have 150 Mbps per instance, with a total of two 
instances.


Why am I getting this abnormal CPU usage? What's the solution? I don't 
want to use Linux but can use another *BSD or Solaris/Illumos if I must.


-Neel

===

https://www.neelc.org
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay on Verizon FiOS/FTTH: Advertised Bandwidth capped at ~19.5MiB/s

2019-02-19 Thread Neel Chauhan

Hi Roger,



The very short answer is that this could all be normal.

You might find some of the ideas in this wiki page useful:
https://trac.torproject.org/projects/tor/wiki/doc/MyRelayIsSlow

Among the most important points:

* It's actually bad for the network for relays to be hitting their
capacity -- since it means user traffic is intentionally delayed at
that relay.


Good to know.

I know my relay can't hit 100% of its capacity 24/7. I want the 
"consensus weight" and the "advertised bandwidth" to see my bandwidth.


* Exit relays tend to attract as much traffic as they can provide, 
since
exit capacity is scarce in the network right now. But for non-exit 
relays,
you shouldn't be surprised if they don't fill their available 
bandwidth.

The traffic your relay receives has to do with how the load balancing
works, and actual total traffic from clients varies over time.


Understood.

* The "torflow" bandwidth authority measurement system is pretty 
clearly

broken, in that it measures relays badly. This is known, and we've been
working to fix it, but "how come I have this weird bandwidth weight"
is a common question over the past few years. :(


Makes sense. I hope torflow gets replaced soon.


So in summary, it might be that something on your side is unnecessarily
limiting your relay performance, but it could also just be that the 
"luck

of the draw" from the load balancing system is what gave you this load.


I thought of many reasons: my router, Verizon's backbone, Verizon's FiOS 
edge network, or just Tor's crappy load balancing system (which I hopes 
gets fixed soon).



If you want to use more of your bandwidth, consider running two relays
as somebody suggested in this thread. Or just sit back and be happy at
your nice relay contribution. :)


I set up another relay to increase my bandwidth. If that doesn't help, I 
will look into replacing my WRT1900AC with a pfSense or Ubiquiti box.



(Another option is that you could open up your exit policy, but that's
probably a poor idea for a relay running at home.)


I probably won't. Aside from the obvious reasons, I won't run an exit 
from home because:


 * I would get blacklisted from too many websites
 * Most ISPs don't want to give you you more than one IPv4 address to 
separate Tor traffic from everything else unless you go business class
 * Verizon would probably notice my "exit" relay from abuse complaints 
and then would say "you can't do this on FiOS" unless I go business 
class


I run an exit from a dedicated server (not a 
OVH/Online.net/Scaleway/Hetzner, but one from a host called GTHost).



Thanks!
--Roger


You're welcome.

-Neel

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relay on Verizon FiOS/FTTH: Advertised Bandwidth capped at ~19.5MiB/s

2019-02-18 Thread Neel Chauhan

Roman,

But then again the upload will be barely utilized by typical 
residential

Internet users.


True.

Still my recommendation is to test your bandwidth in multiple ways 
first,
be it speedtest.net, or (better yet) 
https://github.com/sivel/speedtest-cli,

or iperf3 servers, if you can find any near your location.


I am getting 300 Mbps in both directions.

If tests show that you do get near 300 Mbit both directions, the next 
step
would be to just set up two instances of Tor, as I suggested before in 
your

thread[1]. Actually fun to see my prediction from back then coming true
precisely (with regard to getting only 200 Mbit).

[1] 
https://www.mail-archive.com/tor-relays@lists.torproject.org/msg15819.html


Being capped at 200 Mbps was because `powerd` wasn't enabled on my 
FreeBSD, and "turbo" frequencies weren't being used. Enabling `powerd` 
means I feel my relay can handle 300 Mbps (and CPU usage dropped because 
the clock speed increased). Previously 10 MB/s (80 Mbps) took 30% of 
CPU, now the same amount of bandwidth takes 20%.


Running two instances is the universal solution which should improve 
Tor's

bandwidth utilization on almost any connection.


I'll look at this.

I feel it's my Linksys WRT1900AC because consumer routers aren't 
designed for the traffic high-bandwidth Tor relays handle, even after 
flashing things like OpenWrt.


Also see: 
https://arstechnica.com/gadgets/2016/09/the-router-rumble-ars-diy-build-faces-better-tests-tougher-competition/


Would running two instances help with a consumer router's limited NAT 
Table?


-Neel

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Bandwidth limiting at relay or network?

2019-01-17 Thread Neel Chauhan
I usually do it in torrc, but am experimenting with letting my ISP/host 
(Verizon FiOS and GTHost.com) traffic shaping do this on unmetered connections.

The reason for this is because I learned about bandwidth accounting as 
mentioned on an earlier post here:

https://lists.torproject.org/pipermail/tor-relays/2018-December/016780.html 
(https://lists.torproject.org/pipermail/tor-relays/2018-December/016780.html)

Tor spends resources doing bandwidth accounting if you set RelayBandwidthRate 
and RelayBandwidthBurst.

So the runoff is: torrc is convenient, but doing it externally can offload the 
shaping and free the Tor process to do other things (after all, Tor is still 
singlethreaded) but adds complexity to your OS/network setup.

-Neel

===

https://www.neelc.org/

January 14, 2019 10:09 PM, "Isaac Grover, Aileron I.T." mailto:igro...@aileronit.com?to=%22Isaac%20Grover,%20Aileron%20I.T.%22%20)>
 wrote:
Good evening fellow relay operators, 

I haven’t ever taken the time to configure bandwidth limits in torrc, 
always preferring to manage it at the firewall as we have other bandwidth 
limits set there as well. However, I’m curious - what do other relay operators 
prefer? 

Make your day great,
Isaac Grover, Senior I.T. Consultant
Aileron I.T. – “ Because #ProactiveIsBetter ” 

O: 715-377-0440 (javascript:false), F:715-690-1029 (javascript:false), 
W: www.aileronit.com (http://www.aileronit.com/)  

LinkedIn:  https://www.linkedin.com/in/IsaacGrover/ 
(https://www.linkedin.com/in/IsaacGrover/)   

YouTube:  https://www.youtube.com/channel/UCqrwZNFKdR-guKtuQzFPObQ 
(https://www.youtube.com/channel/UCqrwZNFKdR-guKtuQzFPObQ)
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 300mbps FreeBSD Tor relay on HPE MicroServer Gen10 (AMD X3421)

2018-12-28 Thread Neel Chauhan
Hi George,

> At some point, I want to get a few network-heavy FreeBSD involved in
> optimizing Tor on FreeBSD. It should not take a lot to do, since the
> networking stack is optimized out of the box, but my FreeBSD nodes never
> hit much more than 10mbps.

I hope you get to optimize high-bandwidth Tor on FreeBSD as well. I would love 
to have this as well.
I can also help as well.

About the slow relays, looking at your company website 
(http://queair.net/hardware.html), you
appear to be a fan of low-power hardware like Alix or ARM boards (RPI, 
BeagleBone) and believe you
run relays on these. I could be wrong, as it could also be your ISP. If the 
cause is low-power
hardware, I'm not against low power development boards, I just feel that for 
Tor they're more for
low-bandwidth relays (e.g. bridges or relays on slower connections).

> One of those devs lives close to both you and I :)

Sounds great.

> Keep us in the loop on the relay and any customizations you're doing.

OK, I will. When I get to setting up the server, I will post an article to my 
website
(https://www.neelc.org) and a copy of the article here (@tor-relays).

Thanks,

Neel Chauhan

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] 300mbps FreeBSD Tor relay on HPE MicroServer Gen10 (AMD X3421)

2018-12-28 Thread Neel Chauhan
Hi tor-relays@,

I have a Tor middle relay NeelTorRelay2 hosted on a 50 megabit symmetrical 
Verizon FiOS (FTTH/GPON) connection. The server used is a HPE MicroServer Gen10 
(AMD X3421 quad-core version, 8GB DDR4 RAM). This relay can be seen here:

https://metrics.torproject.org/rs.html#details/D5B8C38539C509380767D4DE20DE84CF84EE8299

My relay runs FreeBSD 11.2 and Tor runs in a "jail". I am using AESNI and Tor 
is configured to use OpenSSL cryptodev.

Here's the situation: I will be moving apartments in a few days, and Verizon is 
upgrading my broadband speed to 300 megabits symmetrical. I plan to use this 
extra bandwidth for Tor. Right now, I set my RelayBandwidthRate to my line 
speed (yes really!), and plan to increase this setting according to my new 
speed.

I know that Tor is not optimized for multicore CPUs, and that's the reason why 
I am posting here.

My question is that can Tor work on the HPE MicroServer Gen10 with the AMD 
X3421 (or one with a similar computer of any brand with a similar performance 
CPU, whether desktop or server, Intel or AMD) with all 300 megabits to a single 
instance or would I need two instances (each at 150 megabits each)? Looking at 
my top usage, I average at about 20-30% CPU usage on my 50 megabit relay.

Also keep in mind that:

 * I am using my own router instead of Verizon's and I plan to keep doing so
 * I want to keep using FreeBSD on my server and do not want to run Linux
 * I would prefer to have a single instance, but can use multiple if I have to
 * When I move, I will upgrade my server to FreeBSD 12.0
 * My server supports hardware accelerated AES and SHA. I am using this on 
FreeBSD with the aesni kernel module and Tor with "HardwareAccel 1" and 
"AccelName cryptodev"

Thank You,

Neel Chauhan

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] FamilyGenerator: Tor MyFamily Generator

2018-07-22 Thread Neel Chauhan


nonetheless I find it positive that Neel now finally has a (proper?) 
MyFamily

config probably because of this non-perfect way of collecting FPs.


Well, my relays don't use FamilyGenerator.

I still hope no one is using onionoo query results to alter their 
config *automatically*


I guess then I realized that generating MyFamily from Onionoo output is 
not such a good idea after all. I updated my GitHub page for 
"FamilyGenerator" to reflect these issues and put a link to this thread 
(so random people don't just use my software).


-Neel Chauhan

On 2018-07-22 12:01, nusenu wrote:
- you run your own AS and all servers in that AS are under your 
control (parameter: as)

https://metrics.torproject.org/onionoo.html#parameters_as


This effectively puts MaxMind in charge of MyFamily.


good point and I guess there is only a handful of operators with their
own AS anyway

- all your relays are under your own DNS domain and only you can 
generate DNS A records for that domain

and [1] is implemented
(note: these onionoo fields appear currently somewhat broken)


There is no attempt currently to perform any DNSSEC or other 
validation.


I was about to make a ticket for that when I wrote the last mail,
since using a DNSSEC validating resolver should not be a whole lot of 
effort.


https://trac.torproject.org/projects/tor/ticket/26901


Onionoo is useful for many things, but I don't think this is one of
them. Instead, you can use Ansible/Salt/Puppet/whatever to configure
MyFamily and there are plenty of ways out there to do this.


+1

nonetheless I find it positive that Neel now finally has a (proper?) 
MyFamily

config probably because of this non-perfect way of collecting FPs.

I still hope no one is using onionoo query results to alter their
config *automatically*

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] [Software Announcement] FamilyGenerator: Tor MyFamily Generator

2018-07-21 Thread Neel Chauhan

Hi tor-relays mailing list,

I have created a tool called FamilyGenerator. FamilyGenerator is a tool 
to automatically construct a Tor MyFamily line based on Onionoo 
parameters.


Why? If you run multiple relays, it can become hard to keep your 
MyFamily line updated if you add or remove relays. FamilyGenerator makes 
it easier (and automated if you use cron, or maybe without it in a 
future version if it ever comes).


Does it integrate with Tor directly? As of now, no. If you want to 
automatically load FamilyGenerator outputs to Tor, you can:


 1. Make sure all your relays has something in common in the Nickname or 
ContactInfo lines
 2. Use a shell script to generate the MyFamily line with 
FamilyGenerator

 3. Use a cron job to reload Tor after FamilyGenerator runs
 4. Include the output in a Include line in your torrc

Hopefully, a future version can avoid cron (that is, if it comes).

FamilyGenerator is available on GitHub at:

https://github.com/neelchauhan/FamilyGenerator

You can install it from PyPI with:

pip install FamilyGenerator

A FreeBSD port is underway. For Debian users, sorry, but there's no 
Debian package in the pipeline as I don't use Debian.


That's it.

Thank You,

Neel Chauhan
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Turning down my relay from DigitalOcean

2018-07-02 Thread Neel Chauhan
If you want an alternative to DigitalOcean for a Tor relay, two good 
alternatives include BuyVM and ITL. I use them both for two exit relays 
each. Both providers are unmetered in terms of bandwidth, have good 
support, allow exits, and support both Linux and *BSD. If you need to 
choose one of the two, I would choose BuyVM (both their servers and 
network seem to be faster).


If you want an alternative to ITL and BuyVM, search online for an 
"unmetered VPS" and if you find a provider check ther TOS to see whether 
they allow the type of relay you want to run (many allow middle relays, 
but only a few allow exits).


Hope this helps.

Best,

Neel Chauhan

===

https://www.neelc.org/

On 2018-07-02 09:27, Guillermo Narvaez wrote:

Hello everyone,

Sadly I'm stoping the tor daemon in my relay due high cost of
bandwidth ($100), in the meantime I start to search an optional
hosting.

My apologies!
-Guillermo
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] how to set-up multiple debian relays at once

2018-06-16 Thread Neel Chauhan
Are you talking about multiple instances on one VPS, or multiple VPS 
instances?


If you have multiple VPS instances, and your VPS provider supports 
imaging, you can just copy the images to as many relays as you want. If 
you go this route, just make sure that you haven't let Tor generate a 
relay private key yet (so don't run Tor with ORPort before creating your 
image)


You can also use scripts for setting up Tor relays with tools like 
Ansible, Docker, etc. For instance, an Ansible role:


https://github.com/nusenu/ansible-relayor

If you want multiple instances on a single VPS, Debian has something 
handy called tor-instance-create:


http://manpages.ubuntu.com/manpages/bionic/man8/tor-instance-create.8.html

I don't know enough about Debian (I run FreeBSD). If you don't like 
tor-instance-create and are willing to use FreeBSD, they also make it 
easy to have multiple instances on a single computer:


https://svnweb.freebsd.org/ports/head/security/tor/files/pkg-message.in?revision=425102=markup=472266

-Neel Chauhan

===

https://www.neelc.org/

On 2018-06-16 07:18, I wrote:

Is there a way to collectively install and manage multiple VPS relays?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Spam Emails Received From This Mailing List

2018-06-11 Thread Neel Chauhan
It seems that I am getting spam from a new email address: 
camrynbentley870...@ao.ovsum.com


The pattern is that the emails are from *@*.ovsum.com addresses. Just 
block this pattern as well, and report your emails to SpamCop.


-Neel Chauhan

===

https://www.neelc.org/

On 2018-06-08 20:24, Keifer Bly wrote:

Hello fellow relay operators,

My apologies as this is not related to tor relays, however, there
seems to be several spammers subscribed to the relay list. Every time
I am involved in a discussion on this list, I receive 3-5 emails
supposedly from girls wanting to meet up (for sex). The emails in
question claim they are sent from email address
tor-relays@lists.torproject.org (and always have the same email
subject of the discussion I was involved in).

I am somewhat in a trap as blocking them with spam filters would block
all emails sent from the relay lists address. I am wondering what
could be done about this (the email provider in question is Gmail).

Thank you.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Trying to set up a relay at home, but get no connections

2018-06-11 Thread Neel Chauhan
Do you have an alternative choice of ISP? In many countries, you often 
do (e.g. Europe, East Asia). In others, you usually don't (e.g. USA, 
small island nations). If you don't, another option is a VPN with a 
public IP address (that is, if you are willing to pay for one).


Once Verizon FiOS (US FTTH ISP) blocked the consensus node tor26 
(86.59.21.38) and just tor26 and I thought that was absurd, but this is 
on a whole another level. At least Verizon still let me run a Tor relay 
(they technically ban it, but nobody enforces it), and I did get tor26 
unblocked after posting on the NANOG mailing list. At least I still had 
the cable company here as well, but in the US cable usually sucks (some 
have cable as their only option if you don't want 1.5-6mbps DSL).


Maybe your ISP hates Tor and doesn't want you to run a relay. Most 
broadband ISPs in countries which don't block Tor usually let you run a 
relay even if their TOS says it's not allowed, but if you don't have net 
neutrality in your country, an ISP can freely block consensus nodes to 
prevent you from being a relay. Unfortunate, but probably is true in 
your case. If you are willing to get political, you should push for net 
neutrality in your country.


-Neel Chauhan

===

https://www.neelc.org/

On 2018-06-11 14:29, Gunnar Wolf wrote:

Graeme Neilson dijo [Sat, Jun 09, 2018 at 11:53:20AM +1200]:

See if you can route to all the authorities.
Tor requires that all relays are able to contact all directory 
authorities.


In my case tcptraceroute would not get to all the authorities. For 
some

authorities my ISP was not routing to them.


This seems to be the issue - I'm attaching a screenshot of «mtr»
trying to reach all of the directory authorities from said server.

So, it seems my ISP does not want us to run relays ☹ Can you think of
any way my connection (oversized for my regular uses) can be put to
use for Tor? I guess it would not work as a bridge either, would it?

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Spam Emails Received From This Mailing List

2018-06-09 Thread Neel Chauhan
I've gotten these emails as well. Since I have my own email server, I 
configured Postfix to block the spam address. For me, the address was 
consistently the same. I thought that it was just a problem with my spam 
filter, but looking here even Gmail users got these messages.


I also uploaded a few of these messages to SpamCop (and if you still 
have your emails, you should also).


IMHO we should just block emails from *.mexyst.com domains (it seems 
everyone got a different sending address), no matter what email we use. 
Gmail, Outlook, ProtonMail, Riseup, or even your own server if you're 
like me.


-Neel Chauhan

===

https://www.neelc.org/

On 2018-06-09 00:08, Mirimir wrote:

On 06/08/2018 04:06 PM, Keifer Bly wrote:
I receive them whenever I send a note to this address, starting with 
the first time I participated in a conversation with this thread. 
Thank you.


Wow, that's bizarre! I thought that you meant occasionally, not after
every post. But still, someone could be watching for your posts, and
then sending spam to you with tor-relays@lists.torproject.org as a
spoofed from header.

I get that this is off-topic, and that most of you are rolling your
eyes. But if anyone else has seen this, I'd like to know.

And as I've said, I'm happy to review some source, and see if some
header could be used to block.


From: Mirimir
Sent: Friday, June 8, 2018 8:05 PM
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Spam Emails Received From This Mailing List

On 06/08/2018 03:48 PM, Keifer Bly wrote:
Yes, but the emails are saying that they are from the 
tor-rel...@lists.tororoject.org email address. They must be spoofing 
the email address it’s coming from somehow. I just thought that I’d 
say something as given that they are making their emails come from 
that email address could mean that these spammers could have somehow 
gotten who is subscribed to the relay mailing list as this is my 
personal email and not a school or company owned google account, no 
one else has access to this email account but me so not sure how they 
would have known I am subscribed. I would supply a copy of the email 
but that may be tough as they contain nudity and graphically 
intensive language.


How long have you been receiving them? I see that your first post to 
the
list was on 2018-04-10. Anyone, whether subscribed or not, can get 
that

from http://lists.torproject.org/pipermail/tor-relays/.

Please feel comfortable sending message source for one of them to me.
Not just forwarding. Get the source text (in Thunderbird, it's just
"View Source") and email as an attachment.


Sent from my iPhone


On Jun 8, 2018, at 6:18 PM, Mirimir  wrote:


On 06/08/2018 01:24 PM, Keifer Bly wrote:
Hello fellow relay operators,

My apologies as this is not related to tor relays, however, there 
seems to be several spammers subscribed to the relay list. Every 
time I am involved in a discussion on this list, I receive 3-5 
emails supposedly from girls wanting to meet up (for sex). The 
emails in question claim they are sent from email address 
tor-relays@lists.torproject.org (and always have the same email 
subject of the discussion I was involved in).


I don't recall seeing such messages. So they must be spoofing the 
from

address.

I am somewhat in a trap as blocking them with spam filters would 
block all emails sent from the relay lists address. I am wondering 
what could be done about this (the email provider in question is 
Gmail).


Maybe there's something in the headers that could be filtered on.

Also, I recall reading that Gmail doesn't actually parse headers
properly. If from address is spoofed to your address, it goes in 
your

outbox :) So maybe you need to use an old-school email client.


Thank you.



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Guard Relay

2018-06-07 Thread Neel Chauhan

On 2018-06-07 14:08, Keifer Bly wrote:
Thanks. How much bandwidth and uptime do I need to become a guard 
relay?


Sent from my iPhone


Bandwidth requirments:

A guard is the first relay in the chain of 3 relays building a Tor 
circuit.
A middle relay is neither a guard nor an exit, but acts as the second 
hop
between the two. To become a guard, a relay has to be stable and fast 
(at

least 2MByte/s) otherwise it will remain a middle relay.


Source: https://trac.torproject.org/projects/tor/wiki/TorRelayGuide

For the "Stable" flag:

  "Stable" -- A router is 'Stable' if it is active, and either its 
Weighted
  MTBF is at least the median for known active routers or its Weighted 
MTBF
  corresponds to at least 7 days. Routers are never called Stable if 
they are
  running a version of Tor known to drop circuits stupidly.  
(0.1.1.10-alpha

  through 0.1.1.16-rc are stupid this way.)


Source: https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt

Looking that you have Charter as your ISP, and Charter is a cable ISP, 
upstream speeds are usually limited. This means that unless your cable 
company gives at least 16 megabits of upload speed, you cannot become a 
guard. Also, many parts of the US have cable broadband, but not fiber, 
so they're stuck with slow upload speeds for now, and if they want to be 
a Tor relay, may not have the Guard flag unless they have a higher speed 
package hopefully with enough upload bandwidth (and it may only be 
between 16-35 mbps upload).


CableLabs (who maintains DOCSIS, the standard for cable modems) is 
working on a new technology called Full Duplex DOCSIS 3.1 which 
supposedly makes cable broadband have similar upload speeds to fiber 
connections.


Source: https://www.cablelabs.com/full-duplex-docsis/

Sadly, it's not a reality yet, so for a few more years you'll probably 
have to live with slow upload speeds until it comes (provided that cable 
companies deploy full duplex tech).


If you really want the Guard flag right now, another option is to get an 
unmetered VPS. Some networks like OVH, Online.net/Scaleway, Hetzner, and 
Digital Ocean are very popular for relays and many in the Tor community 
consider that new relays should avoid "popular" networks.


Two good VPS providers to consider include ITL and BuyVM (I have two 
VPSes each with both for exits). You could also look at other unmeterd 
providers like Contabo and Trabia as well.


You could also check if your phone company or another provider (like 
Google) has fiber in your area, but considering that you're in the US, 
many Americans have cable as their only high speed option (because most 
telcos refuse to deploy fiber).


Hope this helps.

-Neel Chauhan

===

https://www.neelc.org/


On Jun 7, 2018, at 5:39 AM, Neel Chauhan  wrote:

The guard flag gets automatically assigned to you if you have enough 
bandwidth and uptime. You usually don't get to choose. You can still 
influence it by inducing downtime or limiting bandwidth (but both will 
be counterproductive). There are no risks in being a guard node, 
unlike being an exit. That's why web hosts are okay with guard nodes 
but not exits, and also why you can be a guard node on a broadband 
connection without getting complaints from your ISP. Abuse complaints 
don't go to a guard node, it goes to exits as exits connect directly 
to requested non-onion websites and guards don't.


-Neel Chauhan

===

https://www.neelc.org/


On 2018-06-06 14:42, Keifer Bly wrote:
Hello, I have one question.
I have been running my relay “torland” at
http://torstatus.blutmagie.de/router_detail.php?FP=db1af6477bb276b6ea5e72132684096eee779d30
For roughly 3 months now (I am unsure exactly how many days). While 
my

relay is marked “fast” and “stable” currently, it has never
been marked as a “guard” relay. I believe being a “guard”
relay requires at least 10mb/s for relay speed, but am wondering, do 
I

need to configure my torrc file to allow it to be used as a guard
relay and are there any risks for doing this (like there are in
running in exit relay)? Thank you.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Guard Relay

2018-06-07 Thread Neel Chauhan
The guard flag gets automatically assigned to you if you have enough 
bandwidth and uptime. You usually don't get to choose. You can still 
influence it by inducing downtime or limiting bandwidth (but both will 
be counterproductive). There are no risks in being a guard node, unlike 
being an exit. That's why web hosts are okay with guard nodes but not 
exits, and also why you can be a guard node on a broadband connection 
without getting complaints from your ISP. Abuse complaints don't go to a 
guard node, it goes to exits as exits connect directly to requested 
non-onion websites and guards don't.


-Neel Chauhan

===

https://www.neelc.org/

On 2018-06-06 14:42, Keifer Bly wrote:

Hello, I have one question.

I have been running my relay “torland” at

http://torstatus.blutmagie.de/router_detail.php?FP=db1af6477bb276b6ea5e72132684096eee779d30

For roughly 3 months now (I am unsure exactly how many days). While my
relay is marked “fast” and “stable” currently, it has never
been marked as a “guard” relay. I believe being a “guard”
relay requires at least 10mb/s for relay speed, but am wondering, do I
need to configure my torrc file to allow it to be used as a guard
relay and are there any risks for doing this (like there are in
running in exit relay)? Thank you.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Running A Bridge Alongside My Relay

2018-05-26 Thread Neel Chauhan
You normally can't run a server through a regular "proxy" as you would 
need to be able to advertise an open port for the bridge and regular 
proxy servers won't let you do that. You can do it if you use a VPN with 
a public IP address for the bridge however, or a second IP address, but 
you would need to pay $$$ for this.


-Neel Chauhan

===

https://www.neelc.org/

On 2018-05-26 16:19, Keifer Bly wrote:

Yes but I would run it through the proxy so it would have the proxy IP
address. I just noticed tor could use more bridges as there are four
times as many public relays as their are bridges.

Sent from my iPhone

On May 26, 2018, at 12:44 PM, Logforme <m7...@abc.se> wrote:


So I am considering running a bridge alongside my relay gotland

Would the bridge use the same public IP address as the relay?
Since you already run a relay, that IP address is public. The point of 
bridges is that they are not public so they are harder to block.
A government that censors the internet would surely block access to 
all Tor relay IP addresses.


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Verizon AS701 blocking Tor consensus server tor26 (86.59.21.38)

2018-05-24 Thread Neel Chauhan

Hi tor-relays mailing list,

Good news! Verizon unblocked tor26 (86.59.21.38).

I posted something similar on NANOG (with modifications for network 
people) here: 
https://mailman.nanog.org/pipermail/nanog/2018-May/095386.html


Someone nice at Verizon must have read NANOG (VZ NOC people probably do 
read NANOG) and unblocked tor26. Here is a (successful) traceroute:


neel@flex:~ % traceroute  86.59.21.38
traceroute to 86.59.21.38 (86.59.21.38), 64 hops max, 40 byte packets
 1  unknown (192.168.1.1)  0.886 ms  0.567 ms  0.460 ms
 2  lo0-100.NYCMNY-VFTTP-401.verizon-gni.net (173.68.77.1)  2.437 ms  
2.129 ms  1.127 ms
 3  B3401.NYCMNY-LCR-21.verizon-gni.net (100.41.137.94)  3.957 ms  5.827 
ms

B3401.NYCMNY-LCR-22.verizon-gni.net (100.41.137.96)  5.022 ms
 4  * * *
 5  0.et-11-1-5.BR3.NYC4.ALTER.NET (140.222.2.131)  3.527 ms
0.et-5-0-2.BR3.NYC4.ALTER.NET (140.222.239.37)  4.578 ms
0.et-11-1-5.BR3.NYC4.ALTER.NET (140.222.2.131)  18.629 ms
 6  204.255.168.118 (204.255.168.118)  4.764 ms  8.144 ms  7.132 ms
 7  sl-crs3-lon-0-6-3-0.sprintlink.net (144.232.9.165)  70.718 ms
sl-crs1-lon-0-6-2-0.sprintlink.net (144.232.13.44)  79.200 ms
144.232.13.112 (144.232.13.112)  78.583 ms
 8  144.232.13.108 (144.232.13.108)  83.652 ms
213.206.129.100 (213.206.129.100)  86.477 ms  83.988 ms
 9  217.149.32.65 (217.149.32.65)  100.367 ms  95.808 ms
sl-crs4-ams-0-7-0-3.sprintlink.net (213.206.129.139)  85.614 ms
10  217.149.47.46 (217.149.47.46)  84.036 ms  84.193 ms  83.651 ms
11  ams5-core-1.bundle-ether1.tele2.net (130.244.82.54)  79.584 ms  
79.037 ms  78.659 ms
12  ams-core-2.bundle-ether9.tele2.net (130.244.82.57)  91.635 ms  
94.684 ms  93.261 ms
13  wen3-core-2.bundle-ether15.tele2.net (130.244.71.47)  105.583 ms  
105.421 ms  105.308 ms
14  tele2at-bundle2-vie3.net.uta.at (212.152.189.65)  112.490 ms  
105.685 ms  111.003 ms

15  86.59.118.145 (86.59.118.145)  130.001 ms  138.869 ms  106.799 ms
16  tor.noreply.org (86.59.21.38)  106.681 ms  105.468 ms  105.891 ms
neel@flex:~ %

(it's on a different laptop, my 'xb2' refuses to charge now, still same 
connection however).


Now no consensus relays are blocked on FiOS!

Although **most** Verizon NOC people probably don't read tor-relays 
(unlike NANOG's mailing lists), but to the person who read my NANOG post 
and unblocked tor26 (86.59.21.38), thank you so much!


Thank You,

Neel Chauhan

===

https://www.neelc.org/

On 2018-05-15 20:12, Neel Chauhan wrote:

Hi tor-relays mailing list,

I have noticed that the Tor consensus server tor26
(https://metrics.torproject.org/rs.html#details/847B1F850344D7876491A54892F904934E4EB85D)
is blocked on Verizon's UUNET (AS701) backbone, and therefore,
Verizon's retail services like FiOS and Wireless. I can confirm this
on FiOS, but I don't use Verizon Wireless (my smartphone uses Sprint)
so I can't test it there.

A traceroute to tor26's IP address 86.59.21.38 from a Brooklyn
apartment shows this is filtered on Verizon's backbone:

neel@xb2:~ % traceroute 86.59.21.38
traceroute to 86.59.21.38 (86.59.21.38), 64 hops max, 40 byte packets
 1  unknown (192.168.1.1)  1.128 ms  0.780 ms  0.613 ms
 2  lo0-100.NYCMNY-VFTTP-401.verizon-gni.net (173.68.77.1)  1.001 ms
3.632 ms  0.900 ms
 3  B3401.NYCMNY-LCR-22.verizon-gni.net (100.41.137.96)  2.291 ms
B3401.NYCMNY-LCR-21.verizon-gni.net (100.41.137.94)  3.172 ms  
4.046 ms

 4  * * *
 5  * * *
 6  * * *
 7  * * *
 8  * * *
 9  * * *
^C
neel@xb2:~ %

In a normal traceroute, you will see ALTER.NET at hop 5. Also, the
subnet 86.59.21.0/24 is not filtered on UUNET. A traceroute to
86.59.21.1 works:

neel@xb2:~ % traceroute 86.59.21.1
traceroute to 86.59.21.1 (86.59.21.1), 64 hops max, 40 byte packets
 1  unknown (192.168.1.1)  0.863 ms  0.757 ms  0.579 ms
 2  lo0-100.NYCMNY-VFTTP-401.verizon-gni.net (173.68.77.1)  1.010 ms
1.545 ms  1.034 ms
 3  B3401.NYCMNY-LCR-22.verizon-gni.net (100.41.137.96)  3.616 ms
B3401.NYCMNY-LCR-21.verizon-gni.net (100.41.137.94)  5.696 ms  
10.062 ms

 4  * * *
 5  0.et-5-1-5.BR3.NYC4.ALTER.NET (140.222.2.127)  3.492 ms  3.506 ms  
2.996 ms

 6  204.255.168.118 (204.255.168.118)  8.462 ms  7.479 ms  7.252 ms
 7  144.232.4.84 (144.232.4.84)  5.041 ms  4.688 ms
sl-crs3-lon-0-6-3-0.sprintlink.net (144.232.9.165)  71.865 ms
 8  sl-crs2-lon-0-0-3-0.sprintlink.net (213.206.128.181)  72.214 ms
73.579 ms  72.339 ms
 9  213.206.129.142 (213.206.129.142)  81.390 ms
sl-crs4-ams-0-7-0-3.sprintlink.net (213.206.129.139)  85.854 ms  
93.238 ms

10  217.149.47.46 (217.149.47.46)  79.004 ms  85.669 ms  79.392 ms
11  ams5-core-1.bundle-ether1.tele2.net (130.244.82.54)  86.507 ms
78.374 ms  77.740 ms
12  ams-core-2.bundle-ether9.tele2.net (130.244.82.57)  79.642 ms
77.926 ms  81.515 ms
13  wen3-core-2.bundle-ether15.tele2.net (130.244.71.47)  105.400 ms
105.089 ms  109.751 ms
14  tele2at-bundle2-vie3.net.uta.at (212.152.189.65)  122.716 ms
110.820 ms  114.354 ms
15  86.59.21.1 (86.59.21.1)  106.389 ms *  105.379 ms
neel@xb2:~ %

I got

[tor-relays] Verizon AS701 blocking Tor consensus server tor26 (86.59.21.38)

2018-05-15 Thread Neel Chauhan
 using anything Verizon at all 
costs (I certainly wouldn't want to go to the local cable company), I 
just want to point out a blocked consensus server.


Thank You,

Neel Chauhan

===

https://www.neelc.org/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Smallest, cheapest, lightest computer for tor relay

2016-10-17 Thread Neel Chauhan
>Yes it does make a real big difference. Get the Pi 3, the 1st Pi is 
an order of magnitude slower.


If you don't want to spend your money on a RPI 3, you can also look at 
a used RPI 2.


If you are willing to have a computer that is a bit larger, you can 
also use a smaller desktop PC, like a Mac Mini, or a SFF Dell or HP.


I have a Raspberry Pi 2, but use a homebuilt Pentium 4 desktop on a 
60/25 cable connection (Optimum Online), and a Dell Optiplex 755 (Core 
2 Duo) on a 50/50 FTTH connection (Verizon FiOS). I don't use the RPI 
because I want my Tor nodes to use FreeBSD instead of Linux, and am not 
sure if RPI has the best FreeBSD support (I'm even a FreeBSD 
contributor, but my laptop which I typed this from unfortunately runs 
Arch).


The disadvantage of the PC approach is space and higher power 
consumption, but the advantage is that you can use *BSD and Windows, 
and can possibly take advantage of faster speeds. But if you are fine 
with Linux, and, the RPI 2/3 is a good choice. There are also other SBC 
computers like the BeagleBone. SBC computers are great if they have 
ADSL/Cable, but if they have fiber to the home (Verizon FiOS, Google 
Fiber, etc.), a used desktop (or a higher end SBC) may be better (in my 
opinion) as they usually have a faster upstream and a desktop may take 
better advantage of the speed.


My atlas entries are below (for the two nodes from my two homes, not my 
exits):


https://atlas.torproject.org/#details/AED76373324653A0522DF30550BA31902B2CFA44
https://atlas.torproject.org/#details/D5B8C38539C509380767D4DE20DE84CF84EE8299



Thanks,
Neel Chauhan
===
https://www.neelc.org/



___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] VPS for Exits

2016-05-24 Thread Neel Chauhan

> An exit node could be expensive ...

Well, I'm still sticking with CoolHousing/Virtual Server Lite because I 
hardly ever get abuse complaints. For ITL, I may leave after my term 
expires.


But a few other companies I found were:

https://hostmaze.com/
https://www.lcsnet.eu/index.php
https://serverastra.com/
https://blazingfast.io/

Thanks,
Neel Chauhan
https://www.neelc.org/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] VPS for Exits

2016-05-21 Thread Neel Chauhan



I contacted ITL (https://itldc.com/) as well two weeks ago. To me they
refused opening an exit: "We decide to do not allow new public tor 
exit

nodes in our network. Existing public tor exit nodes we be kept."


Well that's unfortunate. I guess I'll have to hold on to my VPS for a 
long time. No wonder why someone on this mailing list had trouble with 
ITL earlier this month. They no longer want exit nodes.


-Neel Chauhan
https://www.neelc.org/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] VPS for Exits

2016-05-21 Thread Neel Chauhan

>Do you know of a VPS for an exit?
I have two exits on VPS servers. One is on ITL (https://itldc.com/), 
and the other one is on CoolHousing using their Virtual Server Lite 
brand (http://virtualniserverlite.cz/en/). My experience with both 
hosts has been very good. For the latter, you WILL need a Reduced Exit 
Policy, and have to remove IRC ports.


I also previously had a VPS with Verelox (https://verelox.com/) when 
they had unlimited bandwidth, and they allow Tor exit nodes as well.


I don't know about other providers, but a good place to ask for a Tor 
friendly VPS is vpsBoard (https://vpsboard.com/).


-Neel Chauhan
https://www.neelc.org/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] https://itldc.com/

2016-05-02 Thread Neel Chauhan
>Perhaps you could answer that with clear steps to put a restricted 
port list which blocks the known offenders and web page explaining that 
it is only a proxy and complaints should be directed at you?

>One VPS business accepted those from me and offered to help as well.
>Others did as you found and cut ten VPS off just after I paid while 
the policy on their site allowed exits.


Second this.

I host a Tor exit node on ITL and still have my Tor exit node after a 
year with them, just because I am willing to block IP addresses I get 
complaints from. I also have another VPS with CoolHousing (through 
their Virtual Server Lite brand) and I do the same (block IP addresses 
I get complaints from).


-Neel Chauhan
https://www.neelc.org/

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor Consensus Weight Stuck at 20 (Even on Relay with Stable Flag)

2015-05-09 Thread Neel Chauhan
Hi,
I have a Tor relay
(https://atlas.torproject.org/#details/342587A287603040A49BB364D72EAC0B6BC3D71A)
running from a FreeBSD server at my house on with a 5 megabit upstream
connection.

I have seen that lately, Tor's Consensus Weight value on this relay has
not been going anywhere above (or below) 20. My relay has gotten the
Stable flag, but yet didn't see it's consensus weight value rise.

I decided to look at https://consensus-health.torproject.org/, and saw
that two of the four bandwidth consensus servers, namely tor26
(86.59.21.38) and longclaw (199.254.238.52) don't seem to be calculating
any consensus value for Tor relays in the last few days.

Has anyone else been having this problem? And if the Tor consensus
operators are reading this, (approximately) when would this problem get
resolved?

Thanks,
Neel Chauhan

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays