Re: [tor-relays] I would like to help.

2016-04-02 Thread grarpamp
Many residential and business ISP's are the same dsl/coax/fiber company.
Many of them will provide extra IP's for some tiny fee, so primary clearnet
use can remain unaffected. Or you can route tor over vpn. Some do run
exits at home. In that case consider contact local LEAs enquiring if
they exonorator / informing them your project.
Find your cyber / crime defense attorney to inform.
And at least consider posting tor-exit-notice on your doors and
clearly segregating your project / personal spaces and activities,
encrypt / index what datasets you have, offsite backups.
Exit issues have become very rare as LEAs have become educated
over the years. Preparation is still better.
After that, being a punk is half the fun and point.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] I would like to help.

2016-03-29 Thread brightsidedarkside

Hey Genral G,

as far as I see, you plan to use your home connection for your contribution.
First of all: thanks for volunteering! [Although I'm not Mr Competence 
nor Mr InnerCircleofTrust.]


You should not at all run an exit if you can't, i.e. having a dedicated 
IP with lots of traffic and a provider being fine with Tor exits (which 
is absolutely not easy to find).
Under no circumstances run an exit on your home connection (and not with 
a PI).

Why? An exit always seems to be the origin of all activity running over it.
So, every abuse complaint concerns the exit in question. Your favourite 
law enforcement authority will visit you kindly (based on different values).
Another point is that IPs from exits are often blocked by webmasters, so 
even if you don't use Tor for yourself, you won't be able to access 
certain sites from your home connection any more.

An exit must be a dedicated server with enough power in terms of traffic.
I only have legacy PIs, but I can't imagine a recent PI would do the job 
- at least on my PIs, literally everything including the network is 
USB-bottlenecked, it won't even stream blue ray quality.
Exits are not so widespread which means they see literally all the 
traffic going through the network.


So, you have to decide whether you run a relay or a bridge.
A bridge helps people in censored and/or oppressive areas because a 
bridge's IP is not publicly available and therefore is not so likely 
associated with the Tor network.
Furthermore, you can setup pluggable transports that obfuscate traffic 
so a censor can't easily tell a user connects to the tor network.
All of this is favourable for users in legislations where the sheer use 
of Tor is sufficient for prosecution, be based on laws or by pure 
arbitrary will.
A bridge sees users, but not the huge gigs of traffic, so it suggest it 
to be the choice for a PI on a home connection.
It's not likely ordinary criminals from our own homes use bridges - for 
them, it's legal to use relays that provide the same amount of anonymity 
and, furthermore, are easier (automatically) to connect to.


I run a bridge and it's the time of political change that drives my 
users based on statistics.
A bridges IP is assigned to one of three pools and potential users can 
request up to three bridge IPs at a time.
This makes the overall amount of bridges unknown and prevents blocking 
all of them.


A relay provides the same amount of anonymity, but is aimed at users in 
legislations letting them legally want to seek anonymity.
The IPs are publicly available and therefore the avarage western user 
usually connects automatically, i.e. to a relay.
Relays see more traffic than bridges and a reason might be the often 
found better infrastructure in democratic countries including the 
according offers like high bandwidth streaming.
On a home connection, abuse complaints and prosecutors won't come for 
you running a middle relay.
But, as IPs are public, some webmasters even block all Tor IPs although 
this affects only the relays' operators as no Tor traffic exits a middle 
relay.
This means that you might be restricted from services even if you don't 
use Tor for yourself which could make your home connection partially 
useless for your purposes.


Also, I'm "not quite sure" a PI could stand the traffic and I have no 
experience in setting up a stable relay on a PI without unresponsiveness 
errors appering in the logs.

Search this mailing list for answers, the problem seems to be common.

The next question would be if you want to use Tor for yourself.
I strongly suggest parallel use of Tor Browser Bundle for your own 
purposes as your PI probably isn't your everyday dektop.


If run on a unixoid desktop, you would have the possibility to set up a 
virtual address space and iptables rules to route the whole traffic of a 
given user including DNS queries through Tor although there's a caveat 
in kernel package filter resulting in leaks under certain circumstances. 
Tor wiki addresses this topic.


The third possibility would be to route your whole network including 
smart tv und DVD players through tor.
Apart from increased network latency and a PI being slow, you're not 
anonymous if you send any personal identifiable information over the 
network.

In this scenario, this would affect your whole network.

My personal opinion is to forget about the concept of plug and forget 
and not to be surprised about the concept of ingnorance and surprise.


I would suggest you rely on the wiki.
First, it's very good and second, you can't yet judge information 
provided by people like me doing here.


I can't give you a quick introduction to linux administration.
I don't know if "noob" relates to Tor or to Linux in general.
As for Tor, you find an easy setup for a bridge or relay in the wiki, 
and for heavens sake, the most important option is "Exitpolicy reject 
*:*" in order to prevent obstacles you don't want to face at the 
beginning. Everything else