Re: [tor-relays] Good vsp providers

2018-01-18 Thread I
Seriously! Just run the relay and don't worry. And don't listen to the nongs. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Good vsp providers

2018-01-18 Thread Mirimir
On 01/18/2018 01:13 PM, I wrote: > They mean that what you are intending to do on their servers should be within > the law. > > Rob "Do what thou wilt shall be the whole of the Law. Love is the law, love under will." >> I asked online.net about their cloud ssd vps service and tor and have the >

Re: [tor-relays] Good vsp providers

2018-01-18 Thread Fabian A. Santiago
On January 18, 2018 7:13:42 PM EST, I wrote: >They mean that what you are intending to do on their servers should be >within the law. > >Rob > >> >> I asked online.net about their cloud ssd vps service and tor and have >the >> following dialog going: >> >> " >> Hello. I'm interested in running a

Re: [tor-relays] Good vsp providers

2018-01-18 Thread Fabian A. Santiago
On January 18, 2018 6:26:40 PM EST, Mirimir wrote: >On 01/18/2018 11:54 AM, niftybunny wrote: >> You will held responsible to your actions (traffic). So worst case >scenario is: They give your personal data to a LEA and you are now in >charge to explain to a LEO that this is a Tor Exit. >> Depend

Re: [tor-relays] Good vsp providers

2018-01-18 Thread I
They mean that what you are intending to do on their servers should be within the law. Rob > > I asked online.net about their cloud ssd vps service and tor and have the > following dialog going: > > " > Hello. I'm interested in running a Tor relay exit node on your cloud SSD > vps product. Is

Re: [tor-relays] Good vsp providers

2018-01-18 Thread Mirimir
On 01/18/2018 11:54 AM, niftybunny wrote: > You will held responsible to your actions (traffic). So worst case scenario > is: They give your personal data to a LEA and you are now in charge to > explain to a LEO that this is a Tor Exit. > Depends on your country if this is a good idea. If you do

Re: [tor-relays] Good vsp providers

2018-01-18 Thread niftybunny
You will held responsible to your actions (traffic). So worst case scenario is: They give your personal data to a LEA and you are now in charge to explain to a LEO that this is a Tor Exit. Depends on your country if this is a good idea. If you dont want any personal data with your VPS, get a bu

Re: [tor-relays] Good vsp providers

2018-01-18 Thread Fabian A. Santiago
January 18, 2018 4:50 PM, "George" wrote: > niftybunny: > >> online.net >> trabia.com (ask first) >> >> both offer 100mbit for less than 5 euros > > This is a CSV file that TDP is slowly tinkering with. While it's focused > on BSD-providing VPSs, most of

Re: [tor-relays] Good vsp providers

2018-01-18 Thread George
niftybunny: > online.net > trabia.com (ask first) > > both offer 100mbit for less than 5 euros > This is a CSV file that TDP is slowly tinkering with. While it's focused on BSD-providing VPSs, most offer more. https://github.com/torbsd/torbsd.github.io

Re: [tor-relays] Good vsp providers

2018-01-18 Thread niftybunny
online.net trabia.com (ask first) both offer 100mbit for less than 5 euros > On 18. Jan 2018, at 21:46, Fabian A. Santiago > wrote: > > On January 18, 2018 3:39:22 PM EST, niftybunny > wrote: >> exit or guard? >> >>> On 18. Jan 2018, at 21:37, Fabia

Re: [tor-relays] Good vsp providers

2018-01-18 Thread Fabian A. Santiago
On January 18, 2018 3:39:22 PM EST, niftybunny wrote: >exit or guard? > >> On 18. Jan 2018, at 21:37, Fabian A. Santiago > wrote: >> >> Does anyone here use a vsp hosting provider which offers unlimited >bandwidth usage at a reasonable cost monthly? >> >> Would need to run / offer Ubuntu. >>

Re: [tor-relays] debugging unbound on 'torexit' failing DNS queries

2018-01-18 Thread nusenu
Quintin: >> Do you reach your server's conntrack limit? > > The word conntrack never appears in my logs, so I don't think it's that. > The ISP also requires this from tor exits: net.netfilter.nf_conntrack_max = > 1 How many conntrack entries do you actually have when you get sendto failed:

Re: [tor-relays] Good vsp providers

2018-01-18 Thread niftybunny
exit or guard? > On 18. Jan 2018, at 21:37, Fabian A. Santiago > wrote: > > Does anyone here use a vsp hosting provider which offers unlimited bandwidth > usage at a reasonable cost monthly? > > Would need to run / offer Ubuntu. > > Country is of little importance. > > Thanks. > -- > >

[tor-relays] Good vsp providers

2018-01-18 Thread Fabian A. Santiago
Does anyone here use a vsp hosting provider which offers unlimited bandwidth usage at a reasonable cost monthly? Would need to run / offer Ubuntu. Country is of little importance. Thanks. -- Thanks, Fabian S. OpenPGP: 3C3FA072ACCB7AC5DB0F723455502B0EEB9070FC __

Re: [tor-relays] debugging unbound on 'torexit' failing DNS queries

2018-01-18 Thread Quintin
> Do you reach your server's conntrack limit? The word conntrack never appears in my logs, so I don't think it's that. The ISP also requires this from tor exits: net.netfilter.nf_conntrack_max = 1 > Try setting RelayBandwidthRate to 95% of your link capacity. Why 95%? Are you thinking to giv

Re: [tor-relays] debugging unbound on 'torexit' failing DNS queries

2018-01-18 Thread nusenu
Quintin: > No outbound filters, this is my config: > > If I stop tor then "dig @127.0.0.1 google.com" works 100%. It's seems like > the pattern is that when tor traffic builds up so do DNS failures. And then > my dig @127.0.0.1 only succeeds about 0.1% of the time. At this stage large > amounts th

Re: [tor-relays] debugging unbound on 'torexit' failing DNS queries

2018-01-18 Thread teor
> On 19 Jan 2018, at 06:06, Quintin wrote: > > No outbound filters, this is my config: > > *filter > :INPUT ACCEPT [0:0] > :FORWARD ACCEPT [0:0] > :OUTPUT ACCEPT [0:0] > -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT > -A INPUT -p icmp -j ACCEPT > -A INPUT -i lo -j ACCEPT > -A INPUT -p

Re: [tor-relays] debugging unbound on 'torexit' failing DNS queries

2018-01-18 Thread Quintin
No outbound filters, this is my config: **filter* *:INPUT ACCEPT [0:0]* *:FORWARD ACCEPT [0:0]* *:OUTPUT ACCEPT [0:0]* *-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT* *-A INPUT -p icmp -j ACCEPT* *-A INPUT -i lo -j ACCEPT* *-A INPUT -p tcp -m comment --comment "SSH" -s x.x.x.x -m state -

Re: [tor-relays] Tor 0.3.2.9 Linux - too slow to handle this many circuit creation requests - Freebsd 0328r

2018-01-18 Thread teor
> On 19 Jan 2018, at 04:59, Felix wrote: > > Hi everybody > >> Am 18-Jan-18 um 11:44 schrieb Stijn Jonker: >> First message is at Jan 18 07:17:13, last just Jan 18 11:37:44, when >> adding the # of circuits up, total in ~4 hours: 18033820 being 18 Million > > > The same here: > 7993419 circui

Re: [tor-relays] The Onion Box v4.1

2018-01-18 Thread Ralph Wetzel
Hi Kenneth, hi Olaf! Thanks for providing that feedback. I have to apologize: I failed to put the correct path into the documentation. It should read './bin/theonionbox' rather than the './lib/theonionbox' shown in the ReadMe.   I'll update the files tonight.   Blushing, Ralph   Gesende

Re: [tor-relays] The Onion Box v4.1

2018-01-18 Thread Ralph Wetzel
Thanks, Damian! I'll check how to display that in the Onion Box. Greetings, Ralph   Gesendet: Dienstag, 16. Januar 2018 um 23:52 Uhr Von: "Damian Johnson" An: tor-relays@lists.torproject.org Betreff: Re: [tor-relays] The Onion Box v4.1 >> Hi is there an option to show connections in theonion

Re: [tor-relays] Tor 0.3.2.9 Linux - too slow to handle this many circuit creation requests - Freebsd 0328r

2018-01-18 Thread Felix
Hi everybody Am 18-Jan-18 um 11:44 schrieb Stijn Jonker: > First message is at Jan 18 07:17:13, last just Jan 18 11:37:44, when > adding the # of circuits up, total in ~4 hours: 18033820 being 18 Million The same here: 7993419 circuits and 64009930 NTor in 4 hours (Freebsd, Jan 9th, Tor 0.3.2.8-

Re: [tor-relays] Tor 0.3.2.9 Linux - first period fine, since today lots of: Your computer is too slow to handle this many circuit creation requests!

2018-01-18 Thread Marcel Krzystek
I am seeing the same issue, also for the first time, despite having run a relay for over three years. I'm willing to adjust the MaxAdvertisedBandwidth, but I'm waiting to see if this is bug that will be addressed first. On Thu, Jan 18, 2018 at 3:44 AM, Stijn Jonker wrote: > Hi All, > > Is this a

Re: [tor-relays] [OrNetRadar] AS: "DigitalOcean, LLC" - 2018-01-16

2018-01-18 Thread x9p
On Wed, January 17, 2018 5:45 pm, nusenu wrote: >>> x9p: +1 blacklisted. >>> >>> >>> can you elaborate on what you mean with that? >> >> >> sorry. blocked on my relays. > > > If you mean "dropping all packets coming from and to these IP addresses > to your relays" by that, please don't do tha

[tor-relays] Tor 0.3.2.9 Linux - first period fine, since today lots of: Your computer is too slow to handle this many circuit creation requests!

2018-01-18 Thread Stijn Jonker
Hi All, Is this a "known" issue, my non-exit relay has been running for over a year, and although with the recent issues (attack / network issue or the likes) with some ipfilter kunfu it managed to get through the storm pretty well. Now all of a sudden since early today my logs are flooded wi

[tor-relays] debugging unbound on 'torexit' failing DNS queries

2018-01-18 Thread nusenu
wrote: > Resent under the correct alias. > > I'm having high amounts of failures on this VPS (PulseServers). I run a > local unbound instance, and see an incredible amount of: > Jan 17 19:27:33 torexit unbound: [559:0] notice: sendto failed: Operation > not permitted > Jan 17 19:27:33 torexit unb

Re: [tor-relays] Increased cpu usage

2018-01-18 Thread Gisle Vanem
Alexander Kührmann wrote: Not any noticable difference in CPU usage for me: https://kuehrmann.de/privateshare/20180117_tah6Eig8/cpu_usage.png Not really related, but I see Tor.exe CPU usage on Win-10 jumps to 80% CPU for approx a minute when running this netstat-clone: https://github.com/gi