Re: [tor-relays] [Censorship in Russia] Make HTTPS/Moat captcha more complex?

2021-12-27 Thread Dave Warren
On 2021-12-22 23:42, Gary C. New via tor-relays wrote: I know it might be a fundamental change to the Tor network, but would it be possible to obfuscate the Tor bridge/relay addresses with their respective fingerprints; similar, to the I2P network? I've often thought that this aspect of the

Re: [tor-relays] OS Upgrade

2021-04-25 Thread Dave Warren
On 2021-04-23 08:49, Toralf Förster wrote: On 4/23/21 2:03 PM, Matt Traudt wrote: Keeping tor up to date, and the OS and all the other things installed on it up to date, is much more important than maintaining your flags. You'll get them back. IMO relays with a way too long uptime should get

Re: [tor-relays] Windows Relay Setup

2019-07-23 Thread Dave Warren
One other possibility if you can't work through any issues, Windows 10 has fairly decent Linux support, and/or consider running a lightweight Linux in a Hyper-V VM (Windows 10 Pro, most flavours of Windows Server). Neither of these are as clean as running natively in Windows, but when a

Re: [tor-relays] High Speed Exit Relay or just a plain Relay?

2019-04-04 Thread Dave Warren
On 2019-04-04 10:02, Conrad Rockenhaus wrote: Hello, I have a FreeBSD box on a 1 Gbit/s connection. I'm trying to determine if we need more high speed relays or high speed exit relays. The AS it's on has no plain relays, just exit relays. That's what has me wondering what to do. So, what is

Re: [tor-relays] Tor website overhaul -- who deserves punishment?

2019-03-29 Thread Dave Warren
On Thu, Mar 28, 2019, at 06:28, Lars Noodén wrote: > On 3/28/19 11:14 AM, Georg Koppen wrote: > > Lars Noodén: > > > > [snip] > > > >> But about the problematic layout that now exists, in general, the CSS > >> media rule mixes all types of screens together regardless of > >> orientation, aspect

Re: [tor-relays] Tor website overhaul -- who deserves punishment?

2019-03-27 Thread Dave Warren
On 2019-03-27 16:34, Mirimir wrote: On 03/27/2019 09:10 AM, Ralph Seichter wrote: Not sure if this is the right place to vent, but here goes: Whoever changed the Tor website's design seems to a) have a serious vision impairment and b) done his utmost to hide access to the Tor source code. I

Re: [tor-relays] plans to require ContactInfo to be non-empty

2019-02-10 Thread Dave Warren
Perhaps it would be better to outright ban these relays with no warning? I'm sure that annoying those donating multiple relays will absolutely be encouraged to continue doing so. (Or to be less sarcastic: I don't operate any tor relays at this time, but I do run public mirrors and a few other

Re: [tor-relays] Jerk spammers on tor-relays

2018-09-23 Thread Dave Warren
On 2018-09-22 06:24, Ralph Seichter wrote: On 22.09.18 05:32, Dave Warren wrote: Send a message through the list's outbound SMTP server that looks like a list message [...] Why this won't work has already been discussed. Please check earlier messages in this thread. Can you point it out? I

Re: [tor-relays] Jerk spammers on tor-relays

2018-09-21 Thread Dave Warren
On 2018-09-21 08:57, Ralph Seichter wrote: On 21.09.18 16:40, Dave Warren wrote: It would be fantastic if the list operators were to track this down and kill it off. Imagine an address A subscribed to this mailing list in a read-only fashion (a.k.a. "lurker"). A uses list posts a

Re: [tor-relays] Jerk spammers on tor-relays (was Re: Fwd: Tor GuardRelay)

2018-09-21 Thread Dave Warren
It would be fantastic if the list operators were to track this down and kill it off. My guess is that there is an address subscribed which receives the list and triggers the spam to be sent (at least based on seeing this type of thing on a few other lists over the years).

Re: [tor-relays] Yay, Complaints

2018-08-24 Thread Dave Warren
On 2018-08-23 17:56, Conrad Rockenhaus wrote: This mainly seemed to be an issue of miscommunication - I had one party that I was in communication with at the beginning who said that this was going to be a perfectly okay endeavor, equipment gets plugged in, day one passes with a couple of

Re: [tor-relays] Cloudflare Onions Beta and Network Stability

2018-08-20 Thread Dave Warren
On 2018-08-20 15:39, DaKnOb wrote: HOWEVER, Cloudflare doesn’t need to hide their location. Everyone knows their servers. So they can use single hop Onion Services, and not the traditional three hop ones. That means that in terms of total traffic, they will use 43 + (3*5) = ~ 60 Gb/s, out of

Re: [tor-relays] Question: systematic hacking on my social media accounts

2018-01-13 Thread Dave Warren
On 2018-01-12 18:07, Paul Templeton wrote: They got into my Facebook page (Haven't used it for years) - Seems that they got access via really old personal questions that family have provided them via their online posts - ie happy birthday now that you are this old... and hows your dog m

Re: [tor-relays] Combined relay and hidden service, good idea or not?

2018-01-10 Thread Dave Warren
On 2018-01-09 13:33, yl wrote: On 08.01.2018 11:21, Florentin Rochet wrote: Yes, if the HS operator does not want to mask the HS location, then it is all good. For that purpose, I agree that the warning message should be changed. So assuming I just want to run SSH on some port on an .onion

Re: [tor-relays] Combined relay and hidden service, good idea or not?

2018-01-09 Thread Dave Warren
On 2018-01-08 16:08, Roger Dingledine wrote: On Mon, Jan 08, 2018 at 03:59:25PM -0700, Dave Warren wrote: Even if Tor didn't supply any relay statistics, a curious and enterprising individual could "explore" by seeing what happens to a particular onion when one launches a DoS atta

Re: [tor-relays] Combined relay and hidden service, good idea or not?

2018-01-09 Thread Dave Warren
On 2018-01-08 19:54, Alain Wolf wrote: I think the real issue here is once more the wording "hidden service" for something which is, in your case, not intended to be hidden. I believe thats why the term "Onion Service" was introduced. Indeed. I use Onion Service when starting a conversation,

Re: [tor-relays] Combined relay and hidden service, good idea or not?

2018-01-08 Thread Dave Warren
On 2018-01-08 14:09, Tortilla wrote: On Mon, January 8, 2018 11:25 am, Dave Warren wrote: On 2018-01-08 03:21, Florentin Rochet wrote: Perhaps in the case that the HS operator is not trying to mask the HS location, the act of mixing public relay traffic can be nothing but a *help* to defeat

Re: [tor-relays] Combined relay and hidden service, good idea or not?

2018-01-08 Thread Dave Warren
On 2018-01-08 03:21, Florentin Rochet wrote: Perhaps in the case that the HS operator is not trying to mask the HS location, the act of mixing public relay traffic can be nothing but a *help* to defeat anyone trying to correlate traffic coming to the HS with traffic emanating from any one

Re: [tor-relays] Please do not use 9.9.9.9 as your DNS on an exit relay

2017-11-22 Thread Dave Warren
On Wed, Nov 22, 2017, at 15:59, tor wrote: > I wouldn't recommend Quad9 (9.9.9.9) for personal use either. > > During some very brief testing I ran into performance issues like 1500 ms > response times and UDP timeouts. > > Also, via the Global Cyber Alliance, there is quite a bit of partnership

Re: [tor-relays] (no subject)

2017-03-29 Thread Dave Warren
Also, unsubscription requests require you to confirm the request, so you can't unsubscribe someone else by entering their address. On Wed, Mar 29, 2017, at 00:34, Dave Warren wrote: > Why not unsubscribe yourself? You figured out how to subscribe, you > can figure out how to unsub

Re: [tor-relays] (no subject)

2017-03-29 Thread Dave Warren
Why not unsubscribe yourself? You figured out how to subscribe, you can figure out how to unsubscribe. The first step is to click the link in the footer of every single message, then look for "To unsubscribe from tor-relays" On Wed, Mar 29, 2017, at 00:31, Nicholas K S Cullen wrote: >

Re: [tor-relays] Recent events in Tor-Relay.

2017-03-29 Thread Dave Warren
On Tue, Mar 28, 2017, at 23:24, John Ricketts wrote: > All, > > Any suggestions short of a restraining order? > > That was one of the most bizarre interactions I have ever had with anyone > on the internet. "If you would like me to block other Tor users from using my exits to contact your

Re: [tor-relays] FW: What's a "useful" mailing list contributor? (was Re: What's a "useful" relay?)

2017-01-10 Thread Dave Warren
On Tue, Jan 10, 2017, at 21:09, Rana wrote: > Wow. I offer to maintain a FAQ for small relays and in return I get this. > Unsubscribed. While the FAQ could have been useful, if being asked to learn how to post properly on a mailing list causes an instant flameout, I wonder whether the FAQ would

Re: [tor-relays] Is there a reason for all exit nodes being public?

2016-12-08 Thread Dave Warren
collecting anything and everything they can. If you have a different threat model, that's fine, use Tor and the internet appropriate to your needs. On Thu, Dec 8, 2016, at 00:22, Duncan Guthrie wrote: > Well, apart from using Facebook... > > On 8 December 2016 7:51:09 am GMT+00:00, Da

Re: [tor-relays] Is there a reason for all exit nodes being public?

2016-12-07 Thread Dave Warren
I agree 100%. And yet, it's still useful for those who don't have anything to fear from using Tor, but still want the privacy and security from the last mile. On Wed, Dec 7, 2016, at 23:45, Duncan Guthrie wrote: > The problem with Facebook is that their policies on real names > somewhat goes

Re: [tor-relays] Is there a reason for all exit nodes being public?

2016-12-07 Thread Dave Warren
On 2016-12-07 05:41, Rana wrote: By the way, I just checked, Gmail works without problems over Tor (both Web and IMAPS). Using Gmail over Tor when they already know who you are is self-defeating. Try to register an anonymous Gmail account using Tor. Doable. They require a phone number for

Re: [tor-relays] Is there a reason for all exit nodes being public?

2016-12-07 Thread Dave Warren
On 2016-12-07 07:20, Rana wrote: We will never know the breakdown of the Facebook users by the reason why they use Tor. However, surely many of them are under repressive regimes and do not want their ass kicked for what they write on Facebook. Protecting them is fine purpose and anyhow, Tor

Re: [tor-relays] Question about relay speed

2016-10-01 Thread Dave Warren
On Sat, Oct 1, 2016, at 04:54, Sheesh wrote: > Hello! > I'm running a non-exit relay on my VPS with small amount of > traffic/month. That means my advertised bandwidth is ~500 KB/s. I got a > new VPS where I want to let a relay run with several MB/s - My question > now is: should I let the slower

Re: [tor-relays] DigitalOcean pricing (Re: tomhek - the (new) biggest guard relay operator)

2016-09-12 Thread Dave Warren
Nope. You get root, so with a bit of creativity you could probably do whatever you want, but I don't think DO officially supports installing your own OS (and they might make assumptions about your OS version that cause you issues later) On Mon, Sep 12, 2016, at 21:20, Petrusko wrote: > No way to

Re: [tor-relays] DigitalOcean pricing (Re: tomhek - the (new) biggest guard relay operator)

2016-09-12 Thread Dave Warren
On Sun, Sep 11, 2016, at 06:53, Ralph Seichter wrote: > On 11.09.2016 14:30, Markus Koch wrote: > > > So around 90 terabyte a month for $5. Seems fair :) > > Yeah, it does, doesn't it... ;-) Leaves me with figuring out what Linux > distro to use, as D.O. does not offer Gentoo. Debian or Ubuntu?

Re: [tor-relays] Tor and Diplomatic Immunity

2016-09-07 Thread Dave Warren
On 2016-09-06 11:29, Green Dream wrote: The whole idea doesn't sit right with me. For one, I'm not sure I'd want any more Five Eyes entities running Exit nodes. Most embassies are already a haven for espionage activity. You'd pretty much have to assume they'd be sniffing the exit traffic. All

Re: [tor-relays] Tor and Diplomatic Immunity

2016-09-05 Thread Dave Warren
On Mon, Sep 5, 2016, at 11:24, Kenneth Freeman wrote: > > > On 09/04/2016 07:31 PM, Mirimir wrote: > > On 09/04/2016 09:11 AM, Kenneth Freeman wrote: > >> Do embassies and consulates run Tor nodes? AFAIK no studies have been > >> done on this, but diplomatic immunity and Tor would seem to be a

Re: [tor-relays] Legal status of operating Tor exit in UK?

2015-09-23 Thread Dave Warren
ementioned gov't agent more than one or more ISPs setting up their own network of high capacity exit nodes. -- Dave Warren http://www.hireahit.com/ http://ca.linkedin.com/in/davejwarren ___ tor-relays mailing list tor-relays@lists.torproject.org https:

Re: [tor-relays] Catch 22 pay, set-up and be banned

2015-07-19 Thread Dave Warren
, which will likely not be possible if they did actually violate the agreement (and it won't be worth their time for a small amount of money anyway) -- Dave Warren http://www.hireahit.com/ http://ca.linkedin.com/in/davejwarren ___ tor-relays mailing list

Re: [tor-relays] Subpoena received

2015-04-20 Thread Dave Warren
or high value target) -- Dave Warren http://www.hireahit.com/ http://ca.linkedin.com/in/davejwarren ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Tor and Freenode

2015-01-24 Thread Dave Warren
up via Tor, abuse the nick until it's burned and move on. -- Dave Warren http://www.hireahit.com/ http://ca.linkedin.com/in/davejwarren ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo

[tor-relays] Linode, DigitalOcean

2015-01-16 Thread Dave Warren
and share some otherwise unused resources, not to buy new servers to dedicate to Tor. While we're also debating sponsoring or operating exit nodes, they will be on dedicated servers in Tor friendly environments. -- Dave Warren http://www.hireahit.com/ http://ca.linkedin.com/in/davejwarren

Re: [tor-relays] Reminder: don't run transparent proxies at exits

2015-01-09 Thread Dave Warren
and/or found a business model that doesn't involve selling their users as product) -- Dave Warren http://www.hireahit.com/ http://ca.linkedin.com/in/davejwarren ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin