Re: [tor-relays] TorWeather replacement features

2022-02-10 Thread Tom Ritter
Would greatly appreciate relay monitoring. On Thu, 10 Feb 2022 at 01:09, nusenu wrote: > which implies it is public. How important are private (non-public) ways to > subscribe > to notifications for you? (non-public email address) 3 > TorWeather used to have an option where the operator was

Re: [tor-relays] consensus page 'down'

2020-05-18 Thread Tom Ritter
On Sun, 17 May 2020 at 10:02, Roger Dingledine wrote: > > On Sun, May 17, 2020 at 10:01:24AM +0200, Paul Geurts wrote: > > it seems to me that the tor consensus page has not been updated since: > > Consensus was published 2020-05-14 19:00:00 UTC > > You're right! >

Re: [tor-relays] Tor Weather (was: Relay advocate introduction)

2018-05-18 Thread Tom Ritter
I have an email draft about ideas for Colin I haven't finished and Tor Weather was going to be top of the list. So add another voice to the crowd. -tom On 17 May 2018 at 16:48, Matthew Glennon wrote: > I don't know if it's helpful, but I use pulseway.com to monitor my

Re: [tor-relays] collecting info on Wikipedia blocking non-exits

2018-01-04 Thread Tom Ritter
For the benefit of others, to test this from a mac: 1) I ssh-ed to my relay using ssh -D user@relay 2) I opened up Firefox, went to preferences, at the bottom hit Network Proxy Settings 3) I set *only* the socks host to localhost port , Socks %, and set Proxy DNS at the bottom 4) I

Re: [tor-relays] bwauth in testing

2017-08-16 Thread Tom Ritter
D MESSAGE- > Hash: SHA256 > > On 08/14/2017 11:22 PM, Tom Ritter wrote: >> But I wanted to announce it here, both to give an update, and let the >> community take a look at its output and see if anything looks fishy. > > Since few hours the BW is dropped or my exit relay fr

[tor-relays] bwauth in testing

2017-08-14 Thread Tom Ritter
After suffering the loss of maatuska's bwauth several months ago, we have re-provisioned it thanks to the gracious help from https://coldhak.ca/ It has completed an initial scan of the network[0] and is reporting its data here: http://198.51.75.50/bwauth/bwscan.V3BandwidthsFile This week I

Re: [tor-relays] relay lost most of its consensus weight

2016-09-13 Thread Tom Ritter
On 13 September 2016 at 20:34, jensm1 wrote: > Addendum: Did a bit of research (or rather checked some random relays on > Atlas). > > It seems like it's not only my relay that experienced a significant drop at > the same time. I can't find anything obvious these relays have in

Re: [tor-relays] Are BWauths punishing 'bad' relays? (not publishing measurements)

2015-08-18 Thread Tom Ritter
We're not punishing on purpose, that's for sure. DirAuths may not vote on a relay to exclude it from the consensus, or may vote to give it BadExit, but BWAuths have no such mechanism, and I guess you'll just have to take the words of the individual operators to not do something as evil as try and

Re: [tor-relays] relay's count handshake versions, why not TLS handshake types?

2015-08-02 Thread Tom Ritter
I wonder if you could just run sslyze (or another TLS scanning tool) on the OR ports of all the relays, and see what ciphersuites they accept. It won't be exactly symmetric - I'm not sure (one can investigate the code though) if those same ciphersuites will be the ones offered in a relay - relay

Re: [tor-relays] BWauth no-consensus state in effect

2015-07-30 Thread Tom Ritter
On 30 July 2015 at 12:14, Tom Ritter t...@ritter.vg wrote: Thanks for the heads up! A fifth bwauth is expected to start voting real soon now, and I'm not sure why maatuska didn't vote on bwauth data last vote, but I've pinged some folks so hopefully we can get this resolved quickly. Aaaand

Re: [tor-relays] BWauth no-consensus state in effect

2015-07-30 Thread Tom Ritter
Thanks for the heads up! A fifth bwauth is expected to start voting real soon now, and I'm not sure why maatuska didn't vote on bwauth data last vote, but I've pinged some folks so hopefully we can get this resolved quickly. -tom On 30 July 2015 at 12:04, starlight.201...@binnacle.cx wrote:

Re: [tor-relays] More consensus weight problems

2015-07-07 Thread Tom Ritter
On 7 July 2015 at 09:04, Carlin Bingham c...@viennan.net wrote: I just want to chime in with my own consensus weight problem. FF1678164E0FFF1DACA45E3DCDE16E49FF1374BE has been running for over 70 days and still has a consensus of 20, I don't think it has ever changed since it was started.

Re: [tor-relays] How to create HSDir on a private network

2015-07-01 Thread Tom Ritter
On 1 July 2015 at 07:56, Ceysun Sucu ceysuns...@gmail.com wrote: I'm currently trying to simulate a tor network on shadow to test out some properties of hidden service's, i was wondering how could i create a hidden service directory or if someone could point towards an example configuration.

Re: [tor-relays] More consensus weight problems

2015-06-12 Thread Tom Ritter
I looked at https://atlas.torproject.org/#details/D60B02A13F5D9CAFD6EC27A5332C5FEF5B769105 / 4FreeSpeech for the latest vote: moria: w Bandwidth=3012 Measured=1890 maatuska: w Bandwidth=3012 Measured=3820 gabelmoo: w Bandwidth=3012 longclaw: w Bandwidth=3012 consensus: w Bandwidth=20

Re: [tor-relays] tor network loses ~50 relays/day due to bw auth problem

2015-06-01 Thread Tom Ritter
Hrm. So this gets into the inner workings of the bwauth system which is... complicated.[0] Honestly, I'm not actually sure how the individual data from the different bwauths is combined into a single value for the consensus. I'm not sure what the answer is for your problem, but I'm beginning to

Re: [tor-relays] tor network loses ~50 relays/day due to bw auth problem

2015-05-20 Thread Tom Ritter
On Wednesday, 20 May 2015, Speak Freely when2plus2...@riseup.net wrote: To be a bwauth you have to be a dirauth, if the bwauth draft spec I read was correct. But how do you become a dirauth? The addresses are hardcoded into Tor, so it's not like I could just spin up a dirauth in an evening

Re: [tor-relays] tor network loses ~50 relays/day due to bw auth problem

2015-05-20 Thread Tom Ritter
Hi all, Wanted to provide an update (even if it's not as good news as I hoped to give) because I know this is a very frustrating issue for everyone. At a high level, the bwauth scripts segment the network into four segments ranked by relay speed, and measure each of these segments. They are

Re: [tor-relays] Please enable IPv6 on your relay!

2015-05-12 Thread Tom Ritter
If atlas shows an IPv6 ORPort, that means it's working correctly, right? -tom On 12 May 2015 at 17:09, Moritz Bartl mor...@torservers.net wrote: Hi! We still have a depressingly low number of relays that support IPv6 (currently only ~120 of ~1900 relays). If your host supports IPv6, please

Re: [tor-relays] Information leak through WebRTC in FF/Chrome

2015-02-01 Thread Tom Ritter
On 31 January 2015 at 05:44, JusticeRage justicer...@manalyzer.org wrote: Hi everyone, I'm not sure this is the place to share this, but I though some of you might want to know: an information leak has been discovered on Firefox / Chrome, and it can be used to reveal a user's real IP address.

Re: [tor-relays] [tor-talk] Platform diversity in Tor network [was: OpenBSD doc/TUNING]

2014-11-05 Thread Tom Ritter
On 5 November 2014 03:04, grarpamp grarp...@gmail.com wrote: On Tue, Nov 4, 2014 at 12:25 PM, Libertas liber...@mykolab.com wrote: I think it would be a good idea to add OpenBSD to doc/TUNING because [...] promoting OpenBSD relays benefits the Tor network's security. Absolutely. Not just due

Re: [tor-relays] [tor-talk] Platform diversity in Tor network [was: OpenBSD doc/TUNING]

2014-11-05 Thread Tom Ritter
On 5 November 2014 11:55, Libertas liber...@mykolab.com wrote: I hope I don't sound too pompous saying this, but I really don't think relays should run on Windows. Windows is the primary target of weaponized and general exploits, Windows desktops, yes. Where users are browsing websites on IE,

Re: [tor-relays] Anonbox Project

2014-10-15 Thread Tom Ritter
I'm far from being knowledgeable about this project, but since no one else has, I'll point out some controversy around it: https://www.reddit.com/r/privacy/comments/2j9caq/anonabox_tor_router_box_is_false_representation -tom ___ tor-relays mailing list

Re: [tor-relays] Confirm IPv6 Setup as Exit Node

2014-05-25 Thread Tom Ritter
After I added the correct line to my config I waited a bit and it did not show up in https://globe.torproject.org/#/relay/C0EDB08D7540D1DD3CA69809ED17D979F51B66E3 Then I remembered I needed to restart my firewall, waiting a bit, and then it did show up. So I think it's working, and that globe

Re: [tor-relays] Ops request: Deploy OpenVPN terminators

2014-05-13 Thread Tom Ritter
This seems very similar to the idea of having private exit nodes: https://www.torproject.org/docs/faq#HideExits It's also easy to enumerate Exit IPs not by scanning up/down, by just building a circuit through every exit node to a server you control, and looking at the originating IP. -tom

Re: [tor-relays] About running an Exit node

2014-05-07 Thread Tom Ritter
On 7 May 2014 10:09, Pika ohc pikaonthe...@outlook.com wrote: Thanks for your kindly reply. According to [1], i am still wondering if it is possbile to make the minimum route path length as 1 (which default is set to 3) and set Exitnodes to my server as default exit nodes in the clients'

Re: [tor-relays] Any Tor/Linux coaches in Sydney?

2014-01-24 Thread Tom Ritter
What is it you're looking for? I can talk to some Tor stuff (most maybe), but not others and I've never 'coached' anyone formally nor done group user training. I'm going to be passing through Sydney next week, but not for long. -tom On Jan 25, 2014 12:41 PM, I beatthebasta...@inbox.com wrote:

Re: [tor-relays] Amazon abuse report

2013-10-30 Thread Tom Ritter
On 29 October 2013 22:53, Sanjeev Gupta gha...@gmail.com wrote: Yes, to some extent. I edited the config, as I was willing to pay for the extra bandwidth, and enabled an Exit Relay. I was under the impression that this was permitted. Amazon does not like Exit Nodes running in EC2. I'm not

Re: [tor-relays] Reimbursement of Exit Operators

2013-09-18 Thread Tom Ritter
On Sep 18, 2013 7:11 AM, t...@t-3.net wrote: I wonder if I am the only one who finds this creepy, in light of all of the news that has come out lately about the banking systems having been hacked, etc. This kind of thing would draw a direct line of sorts to the bank account of the person/company

Re: [tor-relays] Reimbursement of Exit Operators

2013-09-18 Thread Tom Ritter
On 18 September 2013 08:10, t...@t-3.net wrote: The OP I saw said: The Wau Holland Foundation can currently only reimburse via wire transfer. This seems to be end-of-story in terms of who, in the end, is ultimately getting liability/risk, and points to practically no chance at anonymity

Re: [tor-relays] Is it safe to run an exit node from a VPS provider?

2013-08-13 Thread Tom Ritter
On 13 August 2013 11:51, Steve Snyder swsny...@snydernet.net wrote: Well, any VM host can mount and read an unencrypted disk image. I guess the difference is ease of snooping. While access to disk contents and process info can be gotten by any hypervisor, some platforms make it easier than

[tor-relays] Sitevalley is no longer Tor-friendly

2013-07-18 Thread Tom Ritter
Sending this out, as I suspect I am not the only person running a node on SiteValley, as they have pretty good bandwidth for pretty cheap. I had inquired in the beginning if they allowed Tor, and they said yes, but if we get too many abuse complaints we'll shut it down. So maybe 4 or 5 abuse

Re: [tor-relays] Sitevalley is no longer Tor-friendly

2013-07-18 Thread Tom Ritter
On 18 July 2013 14:10, Roman Mamedov r...@romanrm.ru wrote: Maybe they just realized they can't actually offer unmetered bandwidth as they advertise, and Tor is about the only application that can readily eat all bandwidth you'll give it, no matter what. Tom, out of curiosity how much did you

[tor-relays] SWIPing IPs (Was Re: Final Warning Notice)

2013-07-09 Thread Tom Ritter
On 7/9/2013 9:03 PM, h...@riseup.net wrote: A brief whois on the IP 216.243.58.198 reveals that the abuse address is listed as CondoInternet. Does anybody have experience getting an IP allocation so that the abuse address is listed differently? I have little experience, but perhaps this

Re: [tor-relays] Relay info kit for Tor exits

2012-08-24 Thread Tom Ritter
On 23 August 2012 20:40, Roger Dingledine a...@mit.edu wrote: On Fri, Aug 17, 2012 at 09:15:46AM -0400, Tom Ritter wrote: It would be good to add the exit IP to services that allow Tor Exits to register to proactively stop abuse emails. http://www.blocklist.de is one I had to add mine

Re: [tor-relays] Questions about exit enclaves

2012-03-30 Thread Tom Ritter
It's my understanding that if you put the following Exit Policy in your torrc: ExitPolicyRejectPrivate 0 ExitPolicy accept 97.107.139.108 ExitPolicy reject *:* Where 97.107.139.108 is your IP address (that one's mine), you will Exit Enclave to your site, not allow any other exit traffic, you

Re: [tor-relays] Questions about exit enclaves

2012-03-30 Thread Tom Ritter
On 30 March 2012 10:50, Konstantinos Asimakis insh...@gmail.com wrote: Wouldn't it be safer to accept connections only on port 80? Else he would be exposing the whole machine. Hm. I don't know. If you have a local firewall that blocks access to say, samba, from external addresses, but allows