Re: [tor-relays] Deploy relays using hidden exit IP's?

2012-11-24 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

 Shouldn't some exit relays (funded or not) be deployed to use an
 exit IP that is different from it's advertised exit IP in order to
 prevent a simplistic form of blocking based on scraping the
 descriptor set? I think this can happen if the default route is out
 another interface or secondary address. Something of that nature.

Actually I think this is a great idea and allows Tor to be used when
it wasn't possible or painful before.

How does the Torproject and the major Tor network operators think
about it?

-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlCws6QACgkQyM26BSNOM7YoUwEAtsrq4+zcKVDMM1mrAz1Up/rC
YH6UhTVI3i2bWUQsRxYA/iMVMYJscqKlQgVVVdJcUkkg5T29yIQCD8CWoLHRlaAG
=89ZU
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Akamai running Tor exit relays

2012-11-24 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi,

I found out about it via Moritz's twitter feed [1] and I think it is
great. Am quite curious about it. Does anyone have some insights on
why Akamai decided to start 10 fast exit relays? (CC'ing the relays
contact address here)

Some compass stats [2]:
bandwith: 2.75% of the Tor network
exit probability: 6.97%


[1] https://twitter.com/torservers/status/29861139255296
[2]
https://compass.torproject.org/?family=C3D1F08204E2BF81C6A426F312AE3A2212C78929ases=country=exits=all_relaystop=-1

-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlCws7EACgkQyM26BSNOM7YTnQD+L6D2fH6T5QmR0MUh4wJAnan2
Aag6ImaavJeFZS+jihwA/2roYnLDlocvfgoHe4cDk7vJvGctTGgylLi/FdH2tf9r
=zf1i
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 'critical' security update: Tor 0.2.2.39

2012-09-23 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

 In the spectrum of critical, I wouldn't put this one towards the
 top. There's no code execution or privacy or anonymity issues. So
 yes, upgrading is definitely a fine idea, but it's not a cancel
 your dinner plans to do it sort of situation.

I probably misinterpreted erinn's posts [1][2].


 Are tor versions 0.2.3.x and 0.2.4.x affected too?
 
 Yes. I haven't put an 0.2.4.3-alpha out yet (it's an alpha after
 all). I should probably do that soon.

Thanks for releasing 0.2.4.3-alpha.



[1] https://trac.torproject.org/projects/tor/ticket/6803#comment:9
[2] https://blog.torproject.org/blog/new-bundles-security-release
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlBfZQgACgkQyM26BSNOM7ZW8AEAigv1cCQDzx3mLpersWRB5Fs7
uJcGbq4/FUp7kD+I2W0A/RTKmjJucP+pphpzZvQ/oD7wASYzd98hEXXy6MqO5CLs
=pblY
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor Weather Statistics

2012-09-23 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi Torproject,

would you mind publishing a few Tor Weather statistics?
(I assume publishing this information is safe)

How many relays have at least one Tor Weather subscription?
How many subscriptions did tick the checkbox for:
'Email me when the router's Tor version is out of date'?
How many 'Node Out of Date!' emails did you send out today? :)

-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlBfZgsACgkQyM26BSNOM7ZmgwD8CEj9H64NF0lePd+Cr65ECcLW
1CvFTbZau/m/3m7Ef9kA/3S+cGJfcS6xPtHcNZbnRa9FC8QXlP6P9QAgkhXhny2b
=3lHr
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] 'critical' security update: Tor 0.2.2.39

2012-09-15 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

It is quite sad that one has to find out about 'critical' security
updates [0] via an unrelated thread on tor-talk [1] or the blog [2]
instead of getting an announcement on tor-announce [3] - where relay
operators are probably expecting such information.

Are tor versions 0.2.3.x and 0.2.4.x affected too?


[0] https://gitweb.torproject.org/tor.git/blob/release-0.2.2:/ReleaseNotes
https://trac.torproject.org/projects/tor/ticket/6811
[1]
https://lists.torproject.org/pipermail/tor-talk/2012-September/025525.html
[2] https://blog.torproject.org/blog/new-bundles-security-release
[3] https://lists.torproject.org/pipermail/tor-announce/
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlBUV7cACgkQyM26BSNOM7ZeyAEArFSwM5Z0fhtXV6q7pdK9CqXV
coEuuHUFrm6gjzkQ+p8A/2z2e+x4sYuJzKhlvFKnwCURw93FSqWEt5MCFRpkd6rV
=FkRi
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] 'critical' security update: Tor 0.2.2.39

2012-09-15 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


 It is quite sad that one has to find out about 'critical' security 
 updates [0] via an unrelated thread on tor-talk [1] or the blog
 [2] instead of getting an announcement on tor-announce [3] - where
 relay operators are probably expecting such information.
 
 Are tor versions 0.2.3.x and 0.2.4.x affected too?

Yes, 0.2.3.x is affected and #6811 is fixed in 0.2.3.22-rc
https://gitweb.torproject.org/tor.git/blob/tor-0.2.3.22-rc:/ChangeLog

0.2.3.22-rc was announced by roger as usual on tor-talk:
https://lists.torproject.org/pipermail/tor-talk/2012-September/025501.html
-BEGIN PGP SIGNATURE-

iF4EAREKAAYFAlBUXHAACgkQyM26BSNOM7ZQ5AD9E8CVhsUV9QBjtw90oQjF9BMd
1YPqUVsFAMdxEAffghEA/i9OtTV4A9k0YkIQtyUzsynxRKuAo3D6k4lXqirQrgRv
=O6+v
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays