Re: [tor-relays] Tor-Bridge

2023-08-19 Thread Felix

Hi

> Possible compression bomb; abandoning stream. <- Happened to my
> server for 2h straight. Should I take any measures against that?
It seems to be not an issue (yet). Some current discussion was done
on the list in June timeframe.

[tor-relays] «Possible compression bomb» from Authority?

-- 
Cheers, Felix


pgpJNICSpRZmK.pgp
Description: Digitale Signatur von OpenPGP
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor-Bridge

2023-08-14 Thread tor--- via tor-relays

Possible compression bomb; abandoning stream. <- Happened to my server for 2h 
straight.
Should I take any measures against that? Bridge is obsf4 with fingerprint: 
2EA91C1415C421424BB478A55790E655627DE366.

publickey - pqpera@protonmail.com - 0x255EEDE2.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Bridge Question

2021-10-19 Thread meskio
Quoting Suspicious Actions (2021-10-17 12:32:51)
> On 10/17/21 1:59 AM, Josh Lawson via tor-relays wrote:
> > I work for a bank and was informed that when I connect to my employer 
> > network, it shows I am coming from a Tor IP and sets off an alert that then 
> > leads to me being on a call with an investigative team for my employers. I 
> > was running a Tor relay, but had to shut it down because of these alerts. I 
> > am not thinking of running a bridge instead, but I have a question. Are the 
> > bridge IP addresses private enough to not likely trigger an alert by bank 
> > fraud detection software? Please let me know if I am not phrasing this 
> > well. 
> > I would like to donate some bandwidth and was thinking maybe running a 
> > bridge would be less likely to set off alerts.
>
> The bridge IPs should be private enough.

I agree, it should be safe to run a bridge. All the relay IP addresses are 
publicly available, but bridges are not easy to list.

To be fair some entities like China's Great Firewall does manage to get the 
full 
list of IP addresses of bridges. But I will assume your employer doesn't have 
the resources of the GFW just to figure out employees that run bridges.

Thanks for helping the tor network. Bridges are very useful, remember to 
configure it with obfs4 :)

-- 
meskio | https://meskio.net/
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 My contact info: https://meskio.net/crypto.txt
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Nos vamos a Croatan.

signature.asc
Description: signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor Bridge Question

2021-10-18 Thread Suspicious Actions

The bridge IPs should be private enough.

Thanks for your participation!

On 10/17/21 1:59 AM, Josh Lawson via tor-relays wrote:

I work for a bank and was informed that when I connect to my employer network, 
it shows I am coming from a Tor IP and sets off an alert that then leads to me 
being on a call with an investigative team for my employers. I was running a 
Tor relay, but had to shut it down because of these alerts. I am not thinking 
of running a bridge instead, but I have a question. Are the bridge IP addresses 
private enough to not likely trigger an alert by bank fraud detection software? 
Please let me know if I am not phrasing this well. I would like to donate some 
bandwidth and was thinking maybe running a bridge would be less likely to set 
off alerts.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


OpenPGP_0x8CB69B6BD28C3BF7.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor Bridge Question

2021-10-17 Thread Josh Lawson via tor-relays
I work for a bank and was informed that when I connect to my employer network, 
it shows I am coming from a Tor IP and sets off an alert that then leads to me 
being on a call with an investigative team for my employers. I was running a 
Tor relay, but had to shut it down because of these alerts. I am not thinking 
of running a bridge instead, but I have a question. Are the bridge IP addresses 
private enough to not likely trigger an alert by bank fraud detection software? 
Please let me know if I am not phrasing this well. I would like to donate some 
bandwidth and was thinking maybe running a bridge would be less likely to set 
off alerts.

publickey - joshuawlawson@protonmail.ch - 0x4D977914.asc
Description: application/pgp-keys


signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor bridge on FreeBSD silently stops working

2021-05-03 Thread lists

On 28.04.2021 21:00, torbri...@wp1180731.server-he.de wrote:


I am trying to run a bridge with 0.4.5.7 on FreeBSD since a couple of
weeks. Everything seems fine for a few days and then my bridge is
reported offline on metrics.torproject.org. There are only notice
messages in the logs and after a restart everything seems fine again
(for a few days). Attached are the complete logs for a full cycle. Any
ideas? Thanks!



Apr 28 12:58:12.000 [notice] Catching signal TERM, exiting cleanly.

   
Something stopped the tor daemon.
Mostly an error in cron, logrotate or SysV init scripts.
Sometimes just: no new line at end of file or it contains a space.

--
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor bridge on windows?

2020-05-18 Thread Keifer Bly
Here you are:

Nickname torland SOCKSPort 0

# no local SOCKS proxy

ORPort 80

# public bridge must have an open ORPort

 ExtORPort auto

# configure ExtORPort for obfs4proxy

ExitPolicy reject *:*

# no exits allowed BridgeRelay 1

# relay won't show up in the public consensus

PublishServerDescriptor 1

# publish to the bridge authority

 # use obfs4proxy to provide obfs4 on port 9003, 443

#point tor to ofbs 4 directory path ServerTransportPlugin

obfs4 exec
C:\Users\keife\Desktop\TotBrowser\Browser\TorBrowser\Tor\PluggableTransports\obfs4proxy.exe

 # set port for obfs4 to run on ServerTransportListenAddr obfs4 0.0.0.0:443

Contact Info line:

ContactInfo keifer@gmail.com


Try this, let me know if it helps.
--Keifer


On Mon, May 18, 2020 at 1:02 AM eliaz  wrote:

> I’d be much obliged if you could send the torrc.
>  I’m assuming that window implementation of bridges came back with
> Vidalia 2 in 2011. Would a bridge on Win 7x54 work?
>
> Sent from my iPhone
>
> On May 17, 2020, at 10:35 PM, Keifer Bly  wrote:
>
> 
> I run an OBFS4 tore bridge on Windowsm which is called torland.
> https://metrics.torproject.org/rs.html#details/386E99371B8CD938248940B754F16AAC54B5712B
>
>
> You just need to make a self generated torrc.txt file with the bridge
> configuration. I can send you my torrc file if you want an example.
> --Keifer
>
>
> On Sun, May 17, 2020 at 5:55 PM eliaz  wrote:
>
>> Is tor running on windows again? On which win versions? I gave up trying
>> to run a bridge when Vidalia 1 was dropped and tor.exe was integrated into
>> Torbrowser. I was told at the time that windows implementations would no
>> longer be supported.  Thanks, eliaz
>>
>>
>>
>>
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor bridge on windows?

2020-05-18 Thread eliaz
I’d be much obliged if you could send the torrc. 
 I’m assuming that window implementation of bridges came back with Vidalia 
2 in 2011. Would a bridge on Win 7x54 work?

Sent from my iPhone

On May 17, 2020, at 10:35 PM, Keifer Bly  wrote:


I run an OBFS4 tore bridge on Windowsm which is called torland.  
https://metrics.torproject.org/rs.html#details/386E99371B8CD938248940B754F16AAC54B5712B
 

You just need to make a self generated torrc.txt file with the bridge 
configuration. I can send you my torrc file if you want an example. 
--Keifer


> On Sun, May 17, 2020 at 5:55 PM eliaz  wrote:
> Is tor running on windows again? On which win versions? I gave up trying
> to run a bridge when Vidalia 1 was dropped and tor.exe was integrated into
> Torbrowser. I was told at the time that windows implementations would no
> longer be supported.  Thanks, eliaz
> 
> 
> 
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor bridge on windows?

2020-05-17 Thread Keifer Bly
I run an OBFS4 tore bridge on Windowsm which is called torland.
https://metrics.torproject.org/rs.html#details/386E99371B8CD938248940B754F16AAC54B5712B


You just need to make a self generated torrc.txt file with the bridge
configuration. I can send you my torrc file if you want an example.
--Keifer


On Sun, May 17, 2020 at 5:55 PM eliaz  wrote:

> Is tor running on windows again? On which win versions? I gave up trying
> to run a bridge when Vidalia 1 was dropped and tor.exe was integrated into
> Torbrowser. I was told at the time that windows implementations would no
> longer be supported.  Thanks, eliaz
>
>
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] tor bridge on windows?

2020-05-17 Thread eliaz
Is tor running on windows again? On which win versions? I gave up trying
to run a bridge when Vidalia 1 was dropped and tor.exe was integrated into
Torbrowser. I was told at the time that windows implementations would no
longer be supported.  Thanks, eliaz




___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor-bridge list

2019-12-19 Thread lists

On 09.12.2019 22:53, Philipp Winter wrote:


There are two ways of distributing your bridge.  You can do it
automatically by having your bridge announce itself to BridgeDB, our
bridge distribution system.  That's the default behaviour.  BridgeDB
then distributes your bridge over email, HTTPS, and moat.


Yes, I did that and why I'm asking here.
Unfortunately, I fear that the Chinese government will only need a few 
hours or days to close these bridges. (Great Firewall of China)
Or worse: they monitor the connections and arrest the users in China. 
:-(



Alternatively, you can distribute your bridge manually by using the
config option "BridgeDistribution none" to tell BridgeDB that it
shouldn't distribute your bridge.  If you do this, it's your
responsibility to find users and give them your bridge lines.


I was hoping to hear from private distribution lists here.

Then I have to look around among the Chinese students in my city.
Fortunately, I live directly at the student dormitories and 
international guest house.

I will then take new IP's for the private bridges.


--
╰_╯ Ciao Marco!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor-bridge list

2019-12-09 Thread Philipp Winter
On Sun, Dec 08, 2019 at 10:13:08PM +0100, li...@for-privacy.net wrote:
> I put a bridge on an unused server. Currently listed on Tor-metrics.
> https://metrics.torproject.org/rs.html#details/48022B9A9402CB6D9918C03B8AFD2A073110B1BD

Thanks for running a bridge!

> But the IP per mail will soon have the "bad guy's". That would be too bad.
> With 2 Tor-instances, the server has reached 80-100 MiB/s
> Does the Tor-project have any other more secret bridge lists?

There are two ways of distributing your bridge.  You can do it
automatically by having your bridge announce itself to BridgeDB, our
bridge distribution system.  That's the default behaviour.  BridgeDB
then distributes your bridge over email, HTTPS, and moat.
Alternatively, you can distribute your bridge manually by using the
config option "BridgeDistribution none" to tell BridgeDB that it
shouldn't distribute your bridge.  If you do this, it's your
responsibility to find users and give them your bridge lines.

> Is it useful to offer other transport protocols than obfs4?

Not at this point.  We're not aware of any government or commercial
firewall being able to block the obfs4 protocol.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor-bridge list

2019-12-08 Thread lists

Hello,

I put a bridge on an unused server. Currently listed on Tor-metrics.
https://metrics.torproject.org/rs.html#details/48022B9A9402CB6D9918C03B8AFD2A073110B1BD

But the IP per mail will soon have the "bad guy's". That would be too 
bad. With 2 Tor-instances, the server has reached 80-100 MiB/s

Does the Tor-project have any other more secret bridge lists?

Another question:
Is it useful to offer other transport protocols than obfs4?

--
╰_╯ Ciao Marco!
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor bridge traffic

2019-03-06 Thread niftybunny
ARM does work on every relay, it doesnt discriminate. So it works just fine. 
Your data center should give you some stats. If not: ifconfig is your new 
friend. 

> On 6. Mar 2019, at 18:59, Volker Mink  wrote:
> 
> Is it really that easy?
> Is there any possibility to monitor this bridge with arm? Or doesnt arm see 
> there anything?
>  
> taken from https://www.torproject.org/docs/bridges.html.en   , added some 
> lines
> [torrc]
> SocksPort 0
> RunAsDaemon 1
> ORPort auto
> DataDirectory /var/lib/tor
> ControlPort 9051
> HashedControlPassword xxx
> CookieAuthentication 1
> Nickname ExoneTORBridge01
> ContactInfo volker 
> DirPortFrontPage /etc/tor/tor-exit-notice.html
> ExitPolicy reject *:* # no exits allowed
> BridgeRelay 1
>  
>  
>  
> Gesendet: Mittwoch, 06. März 2019 um 17:15 Uhr
> Von: "niftybunny" 
> An: tor-relays@lists.torproject.org
> Betreff: Re: [tor-relays] tor bridge traffic
> Yes, but I would not advice it. Just give it a go and take a look after a 
> week how much traffic you pushed. 
> Enjoy your new shiny bridge :)
>  
> On 6. Mar 2019, at 17:14, Volker Mink  <mailto:volker.m...@gmx.de>> wrote:
>  
> Thats enough for me, thanks :)
> If - can i limit the daily quota in the torrc for a bridge?
> 
>  
>  
> Gesendet: Mittwoch, 06. März 2019 um 17:11 Uhr
> Von: "niftybunny"  <mailto:ab...@to-surf-and-protect.net>>
> An: tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
> Betreff: Re: [tor-relays] tor bridge traffic
> Depends … shitty answer I know, but there is no good answer to this. In most 
> cases you are more than fine with a 1 TB VPS. So buy the cheapest you can 
> get, no need for expensive 100 mbit flatrates …
>  
>  
> On 6. Mar 2019, at 16:52, Volker Mink  <mailto:volker.m...@gmx.de>> wrote:
>  
> Hi Folks.
>  
> Short question on TOR Bridges:
> What average traffic runs through a TOR Bridge?
> Can someone give a rough number?
>  
>  
> br,
> volker
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays 
> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>___
>  tor-relays mailing list tor-relays@lists.torproject.org 
> <mailto:tor-relays@lists.torproject.org> 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays 
> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>___
> tor-relays mailing list
> tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays 
> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>___
>  tor-relays mailing list tor-relays@lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays 
> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor bridge traffic

2019-03-06 Thread Volker Mink

Is it really that easy?

Is there any possibility to monitor this bridge with arm? Or doesnt arm see there anything?
 

taken from https://www.torproject.org/docs/bridges.html.en   , added some lines

[torrc]
SocksPort 0
RunAsDaemon 1
ORPort auto
DataDirectory /var/lib/tor

ControlPort 9051
HashedControlPassword xxx
CookieAuthentication 1

Nickname ExoneTORBridge01
ContactInfo volker 
DirPortFrontPage /etc/tor/tor-exit-notice.html
ExitPolicy reject *:* # no exits allowed
BridgeRelay 1

 

 


 

Gesendet: Mittwoch, 06. März 2019 um 17:15 Uhr
Von: "niftybunny" 
An: tor-relays@lists.torproject.org
Betreff: Re: [tor-relays] tor bridge traffic


Yes, but I would not advice it. Just give it a go and take a look after a week how much traffic you pushed. 
Enjoy your new shiny bridge :)
 

On 6. Mar 2019, at 17:14, Volker Mink <volker.m...@gmx.de> wrote:
 




Thats enough for me, thanks :)
If - can i limit the daily quota in the torrc for a bridge?

 
 

Gesendet: Mittwoch, 06. März 2019 um 17:11 Uhr
Von: "niftybunny" <ab...@to-surf-and-protect.net>
An: tor-relays@lists.torproject.org
Betreff: Re: [tor-relays] tor bridge traffic


Depends … shitty answer I know, but there is no good answer to this. In most cases you are more than fine with a 1 TB VPS. So buy the cheapest you can get, no need for expensive 100 mbit flatrates …
 


 

On 6. Mar 2019, at 16:52, Volker Mink <volker.m...@gmx.de> wrote:
 




Hi Folks.

 

Short question on TOR Bridges:
What average traffic runs through a TOR Bridge?
Can someone give a rough number?

 

 

br,

volker


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays






___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor bridge traffic

2019-03-06 Thread niftybunny
Yes, but I would not advice it. Just give it a go and take a look after a week 
how much traffic you pushed. 
Enjoy your new shiny bridge :)

> On 6. Mar 2019, at 17:14, Volker Mink  wrote:
> 
> Thats enough for me, thanks :)
> If - can i limit the daily quota in the torrc for a bridge?
> 
>  
>  
> Gesendet: Mittwoch, 06. März 2019 um 17:11 Uhr
> Von: "niftybunny" 
> An: tor-relays@lists.torproject.org
> Betreff: Re: [tor-relays] tor bridge traffic
> Depends … shitty answer I know, but there is no good answer to this. In most 
> cases you are more than fine with a 1 TB VPS. So buy the cheapest you can 
> get, no need for expensive 100 mbit flatrates …
>  
>  
> On 6. Mar 2019, at 16:52, Volker Mink  <mailto:volker.m...@gmx.de>> wrote:
>  
> Hi Folks.
>  
> Short question on TOR Bridges:
> What average traffic runs through a TOR Bridge?
> Can someone give a rough number?
>  
>  
> br,
> volker
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays 
> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>___
>  tor-relays mailing list tor-relays@lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays 
> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] tor bridge traffic

2019-03-06 Thread Volker Mink
Thats enough for me, thanks :)
If - can i limit the daily quota in the torrc for a bridge?

 
 

Gesendet: Mittwoch, 06. März 2019 um 17:11 Uhr
Von: "niftybunny" 
An: tor-relays@lists.torproject.org
Betreff: Re: [tor-relays] tor bridge traffic


Depends … shitty answer I know, but there is no good answer to this. In most cases you are more than fine with a 1 TB VPS. So buy the cheapest you can get, no need for expensive 100 mbit flatrates …
 


 

On 6. Mar 2019, at 16:52, Volker Mink <volker.m...@gmx.de> wrote:
 




Hi Folks.

 

Short question on TOR Bridges:
What average traffic runs through a TOR Bridge?
Can someone give a rough number?

 

 

br,

volker


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] tor bridge traffic

2019-03-06 Thread Volker Mink
Hi Folks.

 

Short question on TOR Bridges:
What average traffic runs through a TOR Bridge?
Can someone give a rough number?

 

 

br,

volker
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reasonIcannot detect?

2018-10-24 Thread Keifer Bly
UPDATE: When I came home today, tor had been down for 1 hour, when I checked 
the pc the tor software (the tor expert bundle cmd application) had exited, 
which is strange as I never closed it. Perhaps there is something with the 
Windows command line that causes tor to quit?

Your thoughts are appreciated, thank you.

From: Keifer Bly
Sent: Wednesday, October 24, 2018 5:39 PM
To: tor-relays@lists.torproject.org
Subject: RE: [tor-relays] Tor bridge on Windows 10 going down for a 
reasonIcannot detect?


➢ “AT does not like the idea of a part of the I'net they don't control and 
have stated that "Anytime we find a user on a TOR network we will slow down 
their connection" this about 8 years ago. “

The isp is not AT, which I agree would be a bad idea with the profiling 
they’ve been doing on users since at least 2006. The ISP is Charter. I have 
been running a relay for some time without much issue, and tor browser works 
fine on the same PC (it seems to me like the tor browser would not work either 
if it were an issue with tor being frowned upon).
From: niftybunny
Sent: Tuesday, October 23, 2018 2:33 PM
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Tor bridge on Windows 10 going down for a reason 
Icannot detect?



On 23. Oct 2018, at 23:26, Mike Mitch  wrote:

which part?  

All of them. 

Because I cant find (quick duckduckgo search) anything about this. And 
Wireshark would notice some packets on the wire if Windows 10 would copy 
anything back to MS. Also can´t find anything about AT 

MS statement by Bill Gates was a Article published in I think it was '95 or 6.  
The contracts with cable companies are published via trades over the last 
several years (6-7)  AT does not like the idea of a part of the I'net they 
don't control and have stated that "Anytime we find a user on a TOR network we 
will slow down their connection" this about 8 years ago.  Access with DHS and 
NSA are strictly participatory and like with "Facebook in 2016" questionably 
illegal based on "FISA" warrants and your 6th amendment right to face your 
accuser.  All this, of course is the reason Julian Asange and Edward Snowden 
have been forced to flee the country.  But then again, I am no one...

On Tue, Oct 23, 2018 at 2:15 PM niftybunny  
wrote:
Source?

> On 23. Oct 2018, at 23:13, Mike Mitch  wrote:
>
> I noticed that the system is running Windows10?   If this is the situation 
> then you might want to downgrade the server to anything.  Not knowing the ISP 
> service I cannot say for certain, but, ATT and most of the cable companies 
> have signed agreements with NSA and DHS to interrupt services to the dark 
> web, or at least report and track access.  MS Win10 is actually copying 
> everything back to the MS servers furthering Bill Gates dream of having 
> "Every Computer in the World on a single peer to peer network".  See if there 
> is a "Router" log that might identify an external access problem or "Denial 
> of access" issue.  Good Luck!!!
>

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays





---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reason Icannot detect?

2018-10-24 Thread Keifer Bly

➢ “AT does not like the idea of a part of the I'net they don't control and 
have stated that "Anytime we find a user on a TOR network we will slow down 
their connection" this about 8 years ago. “ 

The isp is not AT, which I agree would be a bad idea with the profiling 
they’ve been doing on users since at least 2006. The ISP is Charter. I have 
been running a relay for some time without much issue, and tor browser works 
fine on the same PC (it seems to me like the tor browser would not work either 
if it were an issue with tor being frowned upon).
From: niftybunny
Sent: Tuesday, October 23, 2018 2:33 PM
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Tor bridge on Windows 10 going down for a reason 
Icannot detect?




On 23. Oct 2018, at 23:26, Mike Mitch  wrote:

which part?  

All of them. 

Because I cant find (quick duckduckgo search) anything about this. And 
Wireshark would notice some packets on the wire if Windows 10 would copy 
anything back to MS. Also can´t find anything about AT 


MS statement by Bill Gates was a Article published in I think it was '95 or 6.  
The contracts with cable companies are published via trades over the last 
several years (6-7)  AT does not like the idea of a part of the I'net they 
don't control and have stated that "Anytime we find a user on a TOR network we 
will slow down their connection" this about 8 years ago.  Access with DHS and 
NSA are strictly participatory and like with "Facebook in 2016" questionably 
illegal based on "FISA" warrants and your 6th amendment right to face your 
accuser.  All this, of course is the reason Julian Asange and Edward Snowden 
have been forced to flee the country.  But then again, I am no one...

On Tue, Oct 23, 2018 at 2:15 PM niftybunny  
wrote:
Source?

> On 23. Oct 2018, at 23:13, Mike Mitch  wrote:
> 
> I noticed that the system is running Windows10?   If this is the situation 
> then you might want to downgrade the server to anything.  Not knowing the ISP 
> service I cannot say for certain, but, ATT and most of the cable companies 
> have signed agreements with NSA and DHS to interrupt services to the dark 
> web, or at least report and track access.  MS Win10 is actually copying 
> everything back to the MS servers furthering Bill Gates dream of having 
> "Every Computer in the World on a single peer to peer network".  See if there 
> is a "Router" log that might identify an external access problem or "Denial 
> of access" issue.  Good Luck!!!
> 

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reason I cannot detect?

2018-10-23 Thread niftybunny


> On 23. Oct 2018, at 23:26, Mike Mitch  wrote:
> 
> which part?  

All of them. 

Because I cant find (quick duckduckgo search) anything about this. And 
Wireshark would notice some packets on the wire if Windows 10 would copy 
anything back to MS. Also can´t find anything about AT 

> MS statement by Bill Gates was a Article published in I think it was '95 or 
> 6.  The contracts with cable companies are published via trades over the last 
> several years (6-7)  AT does not like the idea of a part of the I'net they 
> don't control and have stated that "Anytime we find a user on a TOR network 
> we will slow down their connection" this about 8 years ago.  Access with DHS 
> and NSA are strictly participatory and like with "Facebook in 2016" 
> questionably illegal based on "FISA" warrants and your 6th amendment right to 
> face your accuser.  All this, of course is the reason Julian Asange and 
> Edward Snowden have been forced to flee the country.  But then again, I am no 
> one...
> 
> On Tue, Oct 23, 2018 at 2:15 PM niftybunny  > wrote:
> Source?
> 
> > On 23. Oct 2018, at 23:13, Mike Mitch  > > wrote:
> > 
> > I noticed that the system is running Windows10?   If this is the situation 
> > then you might want to downgrade the server to anything.  Not knowing the 
> > ISP service I cannot say for certain, but, ATT and most of the cable 
> > companies have signed agreements with NSA and DHS to interrupt services to 
> > the dark web, or at least report and track access.  MS Win10 is actually 
> > copying everything back to the MS servers furthering Bill Gates dream of 
> > having "Every Computer in the World on a single peer to peer network".  See 
> > if there is a "Router" log that might identify an external access problem 
> > or "Denial of access" issue.  Good Luck!!!
> > 
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays 
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reason I cannot detect?

2018-10-23 Thread Mike Mitch
which part?
MS statement by Bill Gates was a Article published in I think it was '95 or
6.  The contracts with cable companies are published via trades over the
last several years (6-7)  AT does not like the idea of a part of the
I'net they don't control and have stated that "Anytime we find a user on a
TOR network we will slow down their connection" this about 8 years ago.
Access with DHS and NSA are strictly participatory and like with "Facebook
in 2016" questionably illegal based on "FISA" warrants and your 6th
amendment right to face your accuser.  All this, of course is the reason
Julian Asange and Edward Snowden have been forced to flee the country.  But
then again, I am no one...

On Tue, Oct 23, 2018 at 2:15 PM niftybunny 
wrote:

> Source?
>
> > On 23. Oct 2018, at 23:13, Mike Mitch  wrote:
> >
> > I noticed that the system is running Windows10?   If this is the
> situation then you might want to downgrade the server to anything.  Not
> knowing the ISP service I cannot say for certain, but, ATT and most of the
> cable companies have signed agreements with NSA and DHS to interrupt
> services to the dark web, or at least report and track access.  MS Win10 is
> actually copying everything back to the MS servers furthering Bill Gates
> dream of having "Every Computer in the World on a single peer to peer
> network".  See if there is a "Router" log that might identify an external
> access problem or "Denial of access" issue.  Good Luck!!!
> >
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reason I cannot detect?

2018-10-23 Thread niftybunny
Source?

> On 23. Oct 2018, at 23:13, Mike Mitch  wrote:
> 
> I noticed that the system is running Windows10?   If this is the situation 
> then you might want to downgrade the server to anything.  Not knowing the ISP 
> service I cannot say for certain, but, ATT and most of the cable companies 
> have signed agreements with NSA and DHS to interrupt services to the dark 
> web, or at least report and track access.  MS Win10 is actually copying 
> everything back to the MS servers furthering Bill Gates dream of having 
> "Every Computer in the World on a single peer to peer network".  See if there 
> is a "Router" log that might identify an external access problem or "Denial 
> of access" issue.  Good Luck!!!
> 

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reason I cannot detect?

2018-10-23 Thread Mike Mitch
I noticed that the system is running Windows10?   If this is the situation
then you might want to downgrade the server to anything.  Not knowing the
ISP service I cannot say for certain, but, ATT and most of the cable
companies have signed agreements with NSA and DHS to interrupt services to
the dark web, or at least report and track access.  MS Win10 is actually
copying everything back to the MS servers furthering Bill Gates dream of
having "Every Computer in the World on a single peer to peer network".  See
if there is a "Router" log that might identify an external access problem
or "Denial of access" issue.  Good Luck!!!

On Tue, Oct 23, 2018 at 1:47 PM Keifer Bly  wrote:

> >  Something weird happened here -- it's like the process went to sleep
> for 31 hours. This is the sort of thing that happens when you close your
> laptop and then open it 31 hours later.
>
> Good point out, but that seems very strange as it is a desktop computer my
> relay runs on, which is set (via the Windows sleep settings) to not turn
> fully off and only put the screen to sleep. The relay was online for a few
> days without interruption beforehand. I use Avast as my antivirus software,
> which notifies me if it detects something as a virus which it has not done.
> Strange. I am running the newest version of both tor and obfs4, and I keep
> Windows up to date as well. My web browser was playing a video the whole
> time which did not get interrupted at all, so it doesn't look like my
> internet stopped..?
>
> Thanks for the thoughts and help. Wonder what could have caused it out of
> the blue
>
> > you should've
> redact Tor log to remove external IP address and unhashed fingerprint as
> this mailing list is public and can be read by anyone.
>
> Ahhh... darn that's a good point. The good news is I have a dynamic ip
> (from my ISP) which shouldn't be too difficult to change if needed.
>
> On Tue, Oct 23, 2018 at 1:34 AM Roger Dingledine  wrote:
>
>> On Tue, Oct 23, 2018 at 01:13:53AM -0700, Keifer Bly wrote:
>> > Tonight when I went to check it, tor metrics said it had said it was
>> offline for the last 11 hours.
>>
>> Two thoughts, based on your log:
>>
>> > Oct 19 23:33:16.972 [notice] Opening OR listener on 0.0.0.0:9002
>> > Oct 19 23:35:05.000 [notice] Registered server transport 'obfs4' at
>> '[::]:9002'
>>
>> It looks like your ORPort is 9002, and also your ServerTransportListenAddr
>> is trying to use 9002? That could result in weirdness.
>>
>> > Oct 21 17:35:00.000 [notice] Heartbeat: Tor's uptime is 1 day 17:59
>> hours, with 1 circuits open. I've sent 11.54 MB and received 43.60 MB.
>> > Oct 23 00:47:29.000 [warn] Your system clock just jumped 112349 seconds
>> forward; assuming established circuits no longer work.
>>
>> Something weird happened here -- it's like the process went to sleep
>> for 31 hours. This is the sort of thing that happens when you close your
>> laptop and then open it 31 hours later.
>>
>> There are not many Windows relays (or bridges), so it could be all sorts
>> of things -- a libevent bug? A thing that Microsoft chose to implement in
>> a surprising way that's different from every other platform? An antivirus
>> app that tried to hook the Tor process and ended up wedging it for 31
>> hours? A clock that jumped backwards by 31 hours?
>>
>> I wonder if it's https://trac.torproject.org/26360
>>
>> --Roger
>>
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reason I cannot detect?

2018-10-23 Thread Keifer Bly
>  Something weird happened here -- it's like the process went to sleep
for 31 hours. This is the sort of thing that happens when you close your
laptop and then open it 31 hours later.

Good point out, but that seems very strange as it is a desktop computer my
relay runs on, which is set (via the Windows sleep settings) to not turn
fully off and only put the screen to sleep. The relay was online for a few
days without interruption beforehand. I use Avast as my antivirus software,
which notifies me if it detects something as a virus which it has not done.
Strange. I am running the newest version of both tor and obfs4, and I keep
Windows up to date as well. My web browser was playing a video the whole
time which did not get interrupted at all, so it doesn't look like my
internet stopped..?

Thanks for the thoughts and help. Wonder what could have caused it out of
the blue

> you should've
redact Tor log to remove external IP address and unhashed fingerprint as
this mailing list is public and can be read by anyone.

Ahhh... darn that's a good point. The good news is I have a dynamic ip
(from my ISP) which shouldn't be too difficult to change if needed.

On Tue, Oct 23, 2018 at 1:34 AM Roger Dingledine  wrote:

> On Tue, Oct 23, 2018 at 01:13:53AM -0700, Keifer Bly wrote:
> > Tonight when I went to check it, tor metrics said it had said it was
> offline for the last 11 hours.
>
> Two thoughts, based on your log:
>
> > Oct 19 23:33:16.972 [notice] Opening OR listener on 0.0.0.0:9002
> > Oct 19 23:35:05.000 [notice] Registered server transport 'obfs4' at
> '[::]:9002'
>
> It looks like your ORPort is 9002, and also your ServerTransportListenAddr
> is trying to use 9002? That could result in weirdness.
>
> > Oct 21 17:35:00.000 [notice] Heartbeat: Tor's uptime is 1 day 17:59
> hours, with 1 circuits open. I've sent 11.54 MB and received 43.60 MB.
> > Oct 23 00:47:29.000 [warn] Your system clock just jumped 112349 seconds
> forward; assuming established circuits no longer work.
>
> Something weird happened here -- it's like the process went to sleep
> for 31 hours. This is the sort of thing that happens when you close your
> laptop and then open it 31 hours later.
>
> There are not many Windows relays (or bridges), so it could be all sorts
> of things -- a libevent bug? A thing that Microsoft chose to implement in
> a surprising way that's different from every other platform? An antivirus
> app that tried to hook the Tor process and ended up wedging it for 31
> hours? A clock that jumped backwards by 31 hours?
>
> I wonder if it's https://trac.torproject.org/26360
>
> --Roger
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reason I cannot detect?

2018-10-23 Thread Dmitrii Tcvetkov
On Tue, 23 Oct 2018 01:13:53 -0700
Keifer Bly  wrote:

> Hello all, for some reason my tor bridge at
> https://metrics.torproject.org/rs.html#details/148BD64BED9F2C27637D986DE032ECF14E5B9E9A
> is randomly removed from the network. Tonight when I went to check
> it, tor metrics said it had said it was offline for the last 11
> hours. This is very strange as I had not closed the tor software and
> my internet had not disconnected at all. Below is the tor log file,
> it is tor 0.3.4.8 on Windows 10, any thoughts would be great. Thanks.
> 
> 

Giving metrics link with hashed fingerprint is fine, but you should've
redact Tor log to remove external IP address and unhashed fingerprint as
this mailing list is public and can be read by anyone.


pgpitmu9B6izW.pgp
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Windows 10 going down for a reason I cannot detect?

2018-10-23 Thread Roger Dingledine
On Tue, Oct 23, 2018 at 01:13:53AM -0700, Keifer Bly wrote:
> Tonight when I went to check it, tor metrics said it had said it was offline 
> for the last 11 hours.

Two thoughts, based on your log:

> Oct 19 23:33:16.972 [notice] Opening OR listener on 0.0.0.0:9002
> Oct 19 23:35:05.000 [notice] Registered server transport 'obfs4' at 
> '[::]:9002'

It looks like your ORPort is 9002, and also your ServerTransportListenAddr
is trying to use 9002? That could result in weirdness.

> Oct 21 17:35:00.000 [notice] Heartbeat: Tor's uptime is 1 day 17:59 hours, 
> with 1 circuits open. I've sent 11.54 MB and received 43.60 MB.
> Oct 23 00:47:29.000 [warn] Your system clock just jumped 112349 seconds 
> forward; assuming established circuits no longer work.

Something weird happened here -- it's like the process went to sleep
for 31 hours. This is the sort of thing that happens when you close your
laptop and then open it 31 hours later.

There are not many Windows relays (or bridges), so it could be all sorts
of things -- a libevent bug? A thing that Microsoft chose to implement in
a surprising way that's different from every other platform? An antivirus
app that tried to hook the Tor process and ended up wedging it for 31
hours? A clock that jumped backwards by 31 hours?

I wonder if it's https://trac.torproject.org/26360

--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor bridge on Windows 10 going down for a reason I cannot detect?

2018-10-23 Thread Keifer Bly
Hello all, for some reason my tor bridge at 
https://metrics.torproject.org/rs.html#details/148BD64BED9F2C27637D986DE032ECF14E5B9E9A
 is randomly removed from the network. Tonight when I went to check it, tor 
metrics said it had said it was offline for the last 11 hours. This is very 
strange as I had not closed the tor software and my internet had not 
disconnected at all. Below is the tor log file, it is tor 0.3.4.8 on Windows 
10, any thoughts would be great. Thanks.




Oct 19 23:33:16.910 [notice] Tor 0.3.4.8 (git-da95b91355248ad8) running on 
Windows 8 with Libevent 2.1.8-stable, OpenSSL 1.0.2p, Zlib 1.2.11, Liblzma N/A, 
and Libzstd N/A.
Oct 19 23:33:16.910 [notice] Tor can't help you if you use it wrong! Learn how 
to be safe at https://www.torproject.org/download/download#warning
Oct 19 23:33:16.957 [notice] Read configuration file 
"C:\Users\keife\AppData\Roaming\tor\torrc.txt".
Oct 19 23:33:16.972 [warn] Path for GeoIPFile () is relative and will 
resolve to C:\Users\keife\AppData\Roaming\tor\. Is this what you 
wanted?
Oct 19 23:33:16.972 [warn] Path for GeoIPv6File () is relative and 
will resolve to C:\Users\keife\AppData\Roaming\tor\. Is this what you 
wanted?
Oct 19 23:33:16.972 [notice] Based on detected system memory, MaxMemInQueues is 
set to 2048 MB. You can override this by setting MaxMemInQueues by hand.
Oct 19 23:33:16.972 [notice] Scheduler type KISTLite has been enabled.
Oct 19 23:33:16.972 [notice] Opening OR listener on 0.0.0.0:9002
Oct 19 23:33:16.972 [notice] Opening Extended OR listener on 127.0.0.1:0
Oct 19 23:33:16.972 [notice] Extended OR listener listening on port 56515.
Oct 19 23:33:57.000 [notice] Parsing GEOIP IPv4 file 
C:\Users\keife\AppData\Roaming\tor\geoip.
Oct 19 23:33:57.000 [notice] Parsing GEOIP IPv6 file 
C:\Users\keife\AppData\Roaming\tor\geoip6.
Oct 19 23:33:57.000 [notice] Configured to measure statistics. Look for the 
*-stats files that will first be written to the data directory in 24 hours from 
now.
Oct 19 23:33:58.000 [notice] Your Tor server's identity key fingerprint is 
'torland 8C6C18F8D95918F9DC90A09827DAD285064F8872'
Oct 19 23:33:58.000 [notice] Your Tor bridge's hashed identity key fingerprint 
is 'torland 148BD64BED9F2C27637D986DE032ECF14E5B9E9A'
Oct 19 23:33:58.000 [notice] Bootstrapped 0%: Starting
Oct 19 23:35:03.000 [notice] Starting with guard context "default"
Oct 19 23:35:03.000 [notice] Bootstrapped 5%: Connecting to directory server
Oct 19 23:35:05.000 [notice] Bootstrapped 10%: Finishing handshake with 
directory server
Oct 19 23:35:05.000 [notice] Bootstrapped 15%: Establishing an encrypted 
directory connection
Oct 19 23:35:05.000 [notice] Registered server transport 'obfs4' at '[::]:9002'
Oct 19 23:35:05.000 [notice] Bootstrapped 20%: Asking for networkstatus 
consensus
Oct 19 23:35:06.000 [notice] Bootstrapped 50%: Loading relay descriptors
Oct 19 23:35:06.000 [notice] Guessed our IP address as 174.87.240.59 (source: 
136.243.176.148).
Oct 19 23:35:15.000 [notice] Bootstrapped 80%: Connecting to the Tor network
Oct 19 23:35:15.000 [notice] Bootstrapped 90%: Establishing a Tor circuit
Oct 19 23:35:18.000 [notice] Tor has successfully opened a circuit. Looks like 
client functionality is working.
Oct 19 23:35:18.000 [notice] Bootstrapped 100%: Done
Oct 19 23:35:18.000 [notice] Now checking whether ORPort 174.87.240.59:9002 is 
reachable... (this may take up to 20 minutes -- look for log messages 
indicating success)
Oct 19 23:35:21.000 [notice] Self-testing indicates your ORPort is reachable 
from the outside. Excellent. Publishing server descriptor.
Oct 19 23:36:44.000 [notice] Your network connection speed appears to have 
changed. Resetting timeout to 60s after 18 timeouts and 1000 buildtimes.
Oct 19 23:36:45.000 [notice] Performing bandwidth self-test...done.
Oct 20 05:35:00.000 [notice] Heartbeat: Tor's uptime is 5:59 hours, with 0 
circuits open. I've sent 3.08 MB and received 14.49 MB.
Oct 20 05:35:00.000 [notice] Heartbeat: In the last 6 hours, I have seen 0 
unique clients.
Oct 20 11:35:00.000 [notice] Heartbeat: Tor's uptime is 11:59 hours, with 1 
circuits open. I've sent 4.38 MB and received 19.35 MB.
Oct 20 11:35:00.000 [notice] Heartbeat: In the last 6 hours, I have seen 0 
unique clients.
Oct 20 17:35:00.000 [notice] Heartbeat: Tor's uptime is 17:59 hours, with 0 
circuits open. I've sent 5.74 MB and received 23.84 MB.
Oct 20 17:35:00.000 [notice] Heartbeat: In the last 6 hours, I have seen 0 
unique clients.
Oct 20 20:49:17.000 [notice] Channel padding timeout scheduled 180307ms in the 
past.
Oct 20 23:35:00.000 [notice] Heartbeat: Tor's uptime is 23:59 hours, with 1 
circuits open. I've sent 7.19 MB and received 28.20 MB.
Oct 20 23:35:00.000 [notice] Heartbeat: In the last 6 hours, I have seen 0 
unique clients.
Oct 21 05:35:00.000 [notice] Heartbeat: Tor's uptime is 1 day 5:59 hours, with 
0 circuits open. I've sent 8.77 MB and received 34.02 MB.
Oct 21 05:35:00.000 [notice] Heartbeat: In the last 6 hours, I 

Re: [tor-relays] Tor bridge and obfs4proxy

2016-09-05 Thread Arisbe

  
  
Thank you Tim and Christian,
A little type that didn't reveal itself.  I'm going now.
Thanks again, Arisbe


On 9/4/2016 7:18 PM, teor wrote:


  

  
On 5 Sep 2016, at 11:49, Arisbe  wrote:

I need someone's bridge experience.  I had an HD crash and lost one of my Tor bridges.  So, I'm rebuilding on a leased VPS.  First I tried with Debian 8 and then with ubuntu 16.04 when Debian didn't work.  With both operating systems I get a warning message when I start Tor.  Tor is the latest version as is obfs4proxy:

Sep 04 13:39:41.641 [warn] Strange ServerTransportPlugin type 'obfs4'
Sep 04 13:39:41.641 [warn] Failed to parse/validate config: Invalid server transport line. See logs for details.

There are no log entries.  Apparently Tor starts without the proxy.  I have configured torrc as follows:

ServerTransportPlugin obfs3 obfs4 exec /usr/bin/obfs4proxy

ExtORPort auto

/usr/bin/ does contain the obfs4proxy file.

Does anyone know my problem?  Is there a 'tell-all' explanation of obfs4proxy?

  
  
>From the tor manual page:

ServerTransportPlugin transport exec path-to-binary [options]
   The Tor relay launches the pluggable transport proxy in
   path-to-binary using options as its command-line options, and
   expects to receive proxied client traffic from it.

You're only allowed one space-separated transport name for "transport", you have two: "obfs3" and "obfs4".

Tim


  

Thanks, Arisbe


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

  
  
Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org







  
  
  
  ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



  

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge and obfs4proxy

2016-09-04 Thread teor

> On 5 Sep 2016, at 11:49, Arisbe  wrote:
> 
> I need someone's bridge experience.  I had an HD crash and lost one of my Tor 
> bridges.  So, I'm rebuilding on a leased VPS.  First I tried with Debian 8 
> and then with ubuntu 16.04 when Debian didn't work.  With both operating 
> systems I get a warning message when I start Tor.  Tor is the latest version 
> as is obfs4proxy:
> 
> Sep 04 13:39:41.641 [warn] Strange ServerTransportPlugin type 'obfs4'
> Sep 04 13:39:41.641 [warn] Failed to parse/validate config: Invalid server 
> transport line. See logs for details.
> 
> There are no log entries.  Apparently Tor starts without the proxy.  I have 
> configured torrc as follows:
> 
> ServerTransportPlugin obfs3 obfs4 exec /usr/bin/obfs4proxy
> 
> ExtORPort auto
> 
> /usr/bin/ does contain the obfs4proxy file.
> 
> Does anyone know my problem?  Is there a 'tell-all' explanation of obfs4proxy?

From the tor manual page:

ServerTransportPlugin transport exec path-to-binary [options]
   The Tor relay launches the pluggable transport proxy in
   path-to-binary using options as its command-line options, and
   expects to receive proxied client traffic from it.

You're only allowed one space-separated transport name for "transport", you 
have two: "obfs3" and "obfs4".

Tim

> 
> Thanks, Arisbe
> 
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org








signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Tor bridge and obfs4proxy

2016-09-04 Thread Arisbe
I need someone's bridge experience.  I had an HD crash and lost one of 
my Tor bridges.  So, I'm rebuilding on a leased VPS.  First I tried with 
Debian 8 and then with ubuntu 16.04 when Debian didn't work.  With both 
operating systems I get a warning message when I start Tor.  Tor is the 
latest version as is obfs4proxy:


Sep 04 13:39:41.641 [warn] Strange ServerTransportPlugin type 'obfs4'
Sep 04 13:39:41.641 [warn] Failed to parse/validate config: Invalid 
server transport line. See logs for details.


There are no log entries.  Apparently Tor starts without the proxy.  I 
have configured torrc as follows:


ServerTransportPlugin obfs3 obfs4 exec /usr/bin/obfs4proxy

ExtORPort auto

/usr/bin/ does contain the obfs4proxy file.

Does anyone know my problem?  Is there a 'tell-all' explanation of 
obfs4proxy?


Thanks, Arisbe


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] tor bridge

2013-09-15 Thread 封添
i'm tian.please give me list of tor bridge .
  ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] tor-bridge life cycle

2013-08-28 Thread Trigger Happy
Hi list,

Greetings from Poland, i have a question about tor bridge  life cycle.

1) I'm running a bridge
2) Someone from china gets bridge id
3) Bridge gets banned
4) what now ? do i receive an email about it , so i could change
tor-bridge to tor-relay ? or change tor-bride ip ?

Thanks in advance
-- 
Trigger Happy   
jabber: triggerha...@jabber.ccc.de
otr:  BD0E1860 569B3888 657BC5C1 517532A3 A83EA214

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-02 Thread Karsten Loesing
On 8/2/13 4:37 AM, Andrew Lewman wrote:
 On Thu, 1 Aug 2013 14:11:38 -0700
 Shawn A. Miller salexandermil...@gmail.com wrote:
 
 I've been running a Tor bridge on the Amazon EC2 cloud computing
 platform (per instructions at https://cloud.torproject.org/) since
 July 27, and while the bridge is up and running according to the logs,
 there doesn't seem to be much traffic running through it, i.e., latest
 logs indicate Tor uptime is 2 days 12 hours with 2 circuits open; 6.6
 MB sent and 45.75 MB received. Have I somehow managed to misconfigure
 the bridge or is this normal?
 
 First, thanks for running a bridge.  Second, this is normal. The
 determining factor of how much traffic you receive as a bridge is
 simply which bucket your bridge is placed in the BridgeDB. There are
 multiple buckets, some served via HTTPS, SMTPS, XMPP, and reserve
 buckets of bridges handed out by hand to trusted activists, or simply
 kept in reserve in case of emergency.
 
 There's no way a bridge operator knows which bucket you're in.

Actually, there is (finally) a way to find out:

http://globe.rndm.de

Search for bridge nickname or fingerprint and look for the bridge's pool
assignment information.  (Note that this information may not be entirely
correct until we resolve #9264.)


However, a bridge's usefulness isn't determined by the number of bytes
it pushes.  We're currently working on resuming to hand out bridges in
the reserved bucket to activists.  So it's a good thing to have bridges
in the reserved pool which do not push much traffic yet.

Best,
Karsten

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-02 Thread Andrew Lewman
On Fri, 02 Aug 2013 08:46:19 +0200
Karsten Loesing kars...@torproject.org wrote:
  There's no way a bridge operator knows which bucket you're in.
 
 Actually, there is (finally) a way to find out:
 
 http://globe.rndm.de

This tells me there isn't an official way to find out. It's a work a
progress. great.

-- 
Andrew
http://tpo.is/contact
pgp 0x6B4D6475
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-01 Thread Tyler Durden
Well you are just a bridge.. Don't expect tons of traffic.

P.s: For a bridge this is already a lot of traffic.


Greetings


Am 01.08.2013 23:11, schrieb Shawn A. Miller:
 I've been running a Tor bridge on the Amazon EC2 cloud computing
 platform (per instructions at https://cloud.torproject.org/) since
 July 27, and while the bridge is up and running according to the logs,
 there doesn't seem to be much traffic running through it, i.e., latest
 logs indicate Tor uptime is 2 days 12 hours with 2 circuits open; 6.6
 MB sent and 45.75 MB received. Have I somehow managed to misconfigure
 the bridge or is this normal?

 Best,
 Shawn
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-01 Thread Matthias Redies
There are a few talks on youtube that explain this a little. The Chinese
are pretty successful  blocking bridges. The last thing I heard was that
they will send every server which creates a SSL connection so someone in
China a Tor-Handshake and block it if it responds.

In other countries bridges aren't needed this might explain the little use.


Am 01.08.13 23:32, schrieb Tyler Durden:
 Well you are just a bridge.. Don't expect tons of traffic.

 P.s: For a bridge this is already a lot of traffic.


 Greetings


 Am 01.08.2013 23:11, schrieb Shawn A. Miller:
 I've been running a Tor bridge on the Amazon EC2 cloud computing
 platform (per instructions at https://cloud.torproject.org/) since
 July 27, and while the bridge is up and running according to the logs,
 there doesn't seem to be much traffic running through it, i.e., latest
 logs indicate Tor uptime is 2 days 12 hours with 2 circuits open; 6.6
 MB sent and 45.75 MB received. Have I somehow managed to misconfigure
 the bridge or is this normal?

 Best,
 Shawn
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


-- 
Matthias Redies
Helene-Mayer-Ring 12
80809 München

PGP-Key: http://homepages.physik.uni-muenchen.de/~m.redies/EA97E71E.asc
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-01 Thread Gordon Morehouse
Matthias Redies:
 There are a few talks on youtube that explain this a little. The Chinese
 are pretty successful  blocking bridges. The last thing I heard was that
 they will send every server which creates a SSL connection so someone in
 China a Tor-Handshake and block it if it responds.
 
 In other countries bridges aren't needed this might explain the little use.
 
 
 Am 01.08.13 23:32, schrieb Tyler Durden:
 Well you are just a bridge.. Don't expect tons of traffic.

 P.s: For a bridge this is already a lot of traffic.


 Greetings


 Am 01.08.2013 23:11, schrieb Shawn A. Miller:
 I've been running a Tor bridge on the Amazon EC2 cloud computing
 platform (per instructions at https://cloud.torproject.org/) since
 July 27, and while the bridge is up and running according to the logs,
 there doesn't seem to be much traffic running through it, i.e., latest
 logs indicate Tor uptime is 2 days 12 hours with 2 circuits open; 6.6
 MB sent and 45.75 MB received. Have I somehow managed to misconfigure
 the bridge or is this normal?

 Best,
 Shawn
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
 
 
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-01 Thread Gordon Morehouse
Shawn:

Set up an obfsproxy3 bridge (you can do obfs2 and regular on different
ports, as last I knew China only blocked IP:port combos, not entire IPs)
- there is a big need for obfsproxy bridges.

Here are my stats for a brand new bridge I set up recently:

Tor's uptime is [about 2.5 weeks, redacting due to paranoia], with 2
circuits open. I've sent 114.38 MB and received 699.14 MB.

-Gordon


Matthias Redies:
 There are a few talks on youtube that explain this a little. The Chinese
 are pretty successful  blocking bridges. The last thing I heard was that
 they will send every server which creates a SSL connection so someone in
 China a Tor-Handshake and block it if it responds.
 
 In other countries bridges aren't needed this might explain the little use.
 
 
 Am 01.08.13 23:32, schrieb Tyler Durden:
 Well you are just a bridge.. Don't expect tons of traffic.

 P.s: For a bridge this is already a lot of traffic.


 Greetings


 Am 01.08.2013 23:11, schrieb Shawn A. Miller:
 I've been running a Tor bridge on the Amazon EC2 cloud computing
 platform (per instructions at https://cloud.torproject.org/) since
 July 27, and while the bridge is up and running according to the logs,
 there doesn't seem to be much traffic running through it, i.e., latest
 logs indicate Tor uptime is 2 days 12 hours with 2 circuits open; 6.6
 MB sent and 45.75 MB received. Have I somehow managed to misconfigure
 the bridge or is this normal?

 Best,
 Shawn
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 
 
 
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor bridge on Amazon not doing much

2013-08-01 Thread Andrew Lewman
On Thu, 1 Aug 2013 14:11:38 -0700
Shawn A. Miller salexandermil...@gmail.com wrote:

 I've been running a Tor bridge on the Amazon EC2 cloud computing
 platform (per instructions at https://cloud.torproject.org/) since
 July 27, and while the bridge is up and running according to the logs,
 there doesn't seem to be much traffic running through it, i.e., latest
 logs indicate Tor uptime is 2 days 12 hours with 2 circuits open; 6.6
 MB sent and 45.75 MB received. Have I somehow managed to misconfigure
 the bridge or is this normal?

First, thanks for running a bridge.  Second, this is normal. The
determining factor of how much traffic you receive as a bridge is
simply which bucket your bridge is placed in the BridgeDB. There are
multiple buckets, some served via HTTPS, SMTPS, XMPP, and reserve
buckets of bridges handed out by hand to trusted activists, or simply
kept in reserve in case of emergency.

There's no way a bridge operator knows which bucket you're in.


-- 
Andrew
http://tpo.is/contact
pgp 0x6B4D6475
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays