Re: [tor-relays] Recent rejection of relays

2021-11-10 Thread Georg Koppen

Georg Koppen:

Jonas via tor-relays:

Where is this criteria documented?


I am not sure what criteria you mean but we have our bad-relay 
criteria[1] documented at our wiki and keep fingerprints we reject due 
to attacks we noticed there as well[2].


It seems the tor project, or its designated volunteers, are increasing 
controlling and managing the network. In the Swiss Federation and EU 
this turns the tor project into an "online service provider" or 
"online platform" and subjects one to all sorts of regulations and 
compliance regimes.


We already get enough requests from the police regarding relays hosted 
in our datacenters. Shall we point them at tor as the network operator?


The Tor Project is not running the network.


There is an additional point that is important here that I forgot (sorry 
for that and thanks to a little bird reminding me): yes, we working on 
hunting malicious relays tracked some of those relays for a while which 
I mentioned in my previous mail and we reached out to some of their 
operators. However, the relays did not got rejected by us at the end of 
the day, but rather by a majority of directory authorities.


Those authorities are a central part of our project, too, but I think 
it's important to point out that the "we" in my original mail was 
supposed to point to different groups within the Tor Project which might 
not have been clear enough.


Georg

It's comprised of relays run 
mostly by volunteers. I am actually not really sure either what you are 
proposing to be honest. Shall we just keep the relays attacking our 
users in the network instead?


Georg

[snip]

[1] 
https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Criteria-for-rejecting-bad-relays 

[2] 
https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Rejected-fingerprints-found-in-attacks 





-- Original Message --
On Wed, November 10, 2021 at 8:59 AM,  Georg Koppen 
wrote:

Hello everyone!

Some of you might have noticed that there is a visible drop of relays on
our consensus-health website.[1] The reason for that is that we kicked
roughly 600 non-exit relays out of the network yesterday. In fact, only
a small fraction of them had the guard flag, so the vast majority were
middle-only relays. We don't have any evidence that these relays were
doing any attack, but there are attacks possible which relays could
perform from the middle position. Therefore, we decided we'd remove
those relays for our users' safety sake.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays





OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] A Simple Web of Trust for Tor Relay Operator IDs

2021-11-10 Thread Jonas via tor-relays
-- Original Message --
On Sat, October 9, 2021 at 7:10 AM,  Georg Koppen wrote:
Thanks for the proposal it provides good food for thought.

You are right there is the MR on Gitlab now but I don't think your
proposal is torspec material. Nor do I think a lot of relay operators
are watching the discussion there. However, as they are the ones who are
most affected by the proposal it's smart to find a better place for
discussing its ideas. Hence this thread on tor-relays@.

---response starts here---

As a bridge operator, I stopped the plan on running relays due to the identity 
requirements. I could easily run thousands of bsd-based (personal choice) 
across many ASes or cause many to appear through steep discounts at my 
employer. However, providing proof of identity or anything which ties to my 
real world identity is a non-starter. Prior conversations with The Tor Project 
Inc have been encouraging about running many relays and/or offer discounts to 
relay operators through my employer. 

I'm greatly concerned with proposals like this. I fully understand the concern 
over "malicious relays". What little I understand of the published literature, 
there are far more accurate, lower resource attacks against tor than running 
many modified relays. This proposal seems to come from a desire of power and 
control over the network, not actually improving "anonymity" for users. Dose 
this run into legal regulations in the EU and other places that will clearly 
demonstrate that "control" means the tor project is actively managing the 
network?

The secondary concern is the safety of that identity data collected by the tor 
project or its designated "authorities". It builds a network graph of relay 
operators and their ties to the tor project. This network graph makes it 
trivial to figure out whom to surveil and where to apply pressure to do actions 
to benefit "the state".

The controlled shutdown of v2 onions raised many eyebrows in our legal dept. It 
de facto states the tor project is controlling the network and operating as an 
online service provider or online platform.

These are my current concerns and thoughts. Feedback and pointers to more 
reading are welcomed.

Merci,

Jonas
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Recent rejection of relays

2021-11-10 Thread Georg Koppen

Jonas via tor-relays:

Where is this criteria documented?


I am not sure what criteria you mean but we have our bad-relay 
criteria[1] documented at our wiki and keep fingerprints we reject due 
to attacks we noticed there as well[2].



It seems the tor project, or its designated volunteers, are increasing controlling and managing the 
network. In the Swiss Federation and EU this turns the tor project into an "online service 
provider" or "online platform" and subjects one to all sorts of regulations and 
compliance regimes.

We already get enough requests from the police regarding relays hosted in our 
datacenters. Shall we point them at tor as the network operator?


The Tor Project is not running the network. It's comprised of relays run 
mostly by volunteers. I am actually not really sure either what you are 
proposing to be honest. Shall we just keep the relays attacking our 
users in the network instead?


Georg

[snip]

[1] 
https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Criteria-for-rejecting-bad-relays
[2] 
https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Rejected-fingerprints-found-in-attacks




-- Original Message --
On Wed, November 10, 2021 at 8:59 AM,  Georg Koppen wrote:
Hello everyone!

Some of you might have noticed that there is a visible drop of relays on
our consensus-health website.[1] The reason for that is that we kicked
roughly 600 non-exit relays out of the network yesterday. In fact, only
a small fraction of them had the guard flag, so the vast majority were
middle-only relays. We don't have any evidence that these relays were
doing any attack, but there are attacks possible which relays could
perform from the middle position. Therefore, we decided we'd remove
those relays for our users' safety sake.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays





OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Recent rejection of relays

2021-11-10 Thread Jonas via tor-relays
Where is this criteria documented? 

It seems the tor project, or its designated volunteers, are increasing 
controlling and managing the network. In the Swiss Federation and EU this turns 
the tor project into an "online service provider" or "online platform" and 
subjects one to all sorts of regulations and compliance regimes.

We already get enough requests from the police regarding relays hosted in our 
datacenters. Shall we point them at tor as the network operator?

Jonas


-- Original Message --
On Wed, November 10, 2021 at 8:59 AM,  Georg Koppen wrote:
Hello everyone!

Some of you might have noticed that there is a visible drop of relays on 
our consensus-health website.[1] The reason for that is that we kicked 
roughly 600 non-exit relays out of the network yesterday. In fact, only 
a small fraction of them had the guard flag, so the vast majority were 
middle-only relays. We don't have any evidence that these relays were 
doing any attack, but there are attacks possible which relays could 
perform from the middle position. Therefore, we decided we'd remove 
those relays for our users' safety sake.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Question about IPv6

2021-11-10 Thread tor-operator--- via tor-relays
> I have three relays running Hardened BSD hosted at Frantech. They do
> not offer support for setting up IPv6.

By Frantech do you mean buyvm.net ?

If it works the same way as buyvm, your VM should have a single public
IPv6 address. You can request a /48 or /56 prefix to be routed to that
public IPv6.

Or do you actually need help to have it setup on Hardened BSD?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Question about IPv6

2021-11-10 Thread Jonas via tor-relays
Does the provider offer IPv6? If not, then there is no further progress 
possible.If they do, this is pretty accurate to get started, 
https://www.vultr.com/docs/configuring-ipv6-on-freebsdJonas--
 Original Message --On Wed, November 10, 2021 at 12:40 AM, xplato via 
tor-relaystor-relays@lists.torproject.org 
wrote:Greetings,I have three relays running Hardened 
BSD hosted at Frantech. They do not offer support for setting up IPv6. I am not 
sure how to accomplish this and wondered if anyone would have insight into 
setting this up? I have not found much in the way of instruction. A resource 
that provides instructions would be much 
appreciated.Kindly,DanSent
 with ProtonMail Secure Email.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Crashed Relay

2021-11-10 Thread David Goulet
On 02 Nov (18:20:31), sysmanager7 via tor-relays wrote:
> I was notified by Uptime Robot that relay 1 of 3 had been shut down. 
> Unfortunately I found this out 12 hours after the fact.
> guard flag is lost.
> 
> journalctl -u tor@default
> 
> Nov 01 01:03:18 ubuntu-s-1vcpu-2gb-nyc1-01 Tor[328387]: I learned some more 
> directory information, but not enough to build a circuit: We need more 
> microdescrors: we have 6178/6618, and can only build 49% of likely paths. (We 
> have 99% of guards bw, 50% of midpoint bw, and 98% of exit bw = 49% of path 
> bw.)
> ptors: we have 6178/6618, and can only build 49% of likely paths. (We have 
> 99% of guards bw, 50% of midpoint bw, and 98% of exit bw = 49% of path bw.)
> ived 4371.61 GB. I've received 7345604 connections on IPv4 and 0 on IPv6. 
> I've made 677780 connections with IPv4 and 0 with IPv6.
> Nov 01 06:47:26 ubuntu-s-1vcpu-2gb-nyc1-01 Tor[328387]: Interrupt: we have 
> stopped accepting new connections, and will shut down in 30 seconds. 
> Interrupt aga>
> Nov 01 06:47:26 ubuntu-s-1vcpu-2gb-nyc1-01 Tor[328387]: Delaying directory 
> fetches: We are hibernating or shutting down.
> Nov 01 06:47:56 ubuntu-s-1vcpu-2gb-nyc1-01 Tor[328387]: Clean shutdown 
> finished. Exiting.
> Nov 01 06:48:04 ubuntu-s-1vcpu-2gb-nyc1-01 systemd[1]: tor@default.service: 
> Succeeded.
> Nov 01 06:48:04 ubuntu-s-1vcpu-2gb-nyc1-01 systemd[1]: Stopped Anonymizing 
> overlay network for TCP.

So this log indicate that your "tor" received a SIGINT and did a clean
shutdown.

Not sure why that happened but it happened... :S

David

-- 
fsQzn9293ONauAEmTyBPCVFpFcCWrEEXYnVe8hcOgOo=


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Questions about my tor node

2021-11-10 Thread Gary C. New via tor-relays
Bobby,
I run a Tor relay on dual core 256MB devices with  a 250Gb fiber connection and 
they are  adequate to operate as a fast middle relay.
Monitor your relay on https://metrics.torproject.org/  to verify.
Respectfully,

Gary—
This Message Originated by the Sun.
iBigBlue 63W Solar Array (~12 Hour Charge)
+ 2 x Charmast 26800mAh Power Banks
= iPhone XS Max 512GB (~2 Weeks Charged) 

On Wednesday, November 10, 2021, 2:40:19 AM MST, Bobby 
 wrote:  
 
 Hello I'm running a tor node and I paid for a VPS for the express 
purposes of running that node. I have configured it to use almost all of 
the bandwidth of the VPS and then to allow bursts to use all of the 
bandwidth I have also set it to serve directory requests. The server 
also has 1GB of ram and 1 CPU core. Is this good enough to be helpful in 
the tor network?

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
  ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Hardware requirements for a fast Tor relay

2021-11-10 Thread Gary C. New via tor-relays

The following are some of the more important config options that I use for such 
a small middle relay:




# Tor: A non-exit relay should be able to handle 7000 concurrent connections    
                                                              



ulimit -n 65535




DirCache 0                                              

ExitRelay 0                     




# Note: The default MaxMeminQueues is 3/4 (i.e., 192MB) of Total System Memory 
(i.e., 256MB)                   

# Uncomment the following line to limit Tor to use less System Memory (i.e., 
128MB)

MaxMemInQueues 192 MB               

                                        

Log notice file /tmp/torlog                             

Log notice syslog

RunAsDaemon 1                                           

DataDirectory /tmp/tor/torrc.d/.tordb                   

AvoidDiskWrites 1

—
This Message Originated by the Sun.
iBigBlue 63W Solar Array (~12 Hour Charge)
+ 2 x Charmast 26800mAh Power Banks
= iPhone XS Max 512GB (~2 Weeks Charged) 

On Wednesday, November 10, 2021, 2:36:13 AM MST, failing.flyaway443--- via 
tor-relays  wrote:  
 
 Hi Gary,
thank you for your response.
I think I just worry too much.
I watched my relay all the time today, I had bandwidth usage of 30MB/s at times 
and HTOP showed me a Load average of 0.29/0.29/0.30. I know that this is 
totally fine for a dual core. 
The relay is up and running for 3 days and 8 hours now and I already moved 
~700GB in each direction (upload/download). I was just concerned because the 
VPS started crashing after 2 weeks solid uptime, but I should have set stricter 
bandwith limits. 
You can't really compare a VM with a root server, I don't think this will 
happen again. 
It's ok for me to invest a little more and have a fast and stable relay this 
way. The traffic was capped with the VPS plan, this was obviously a big 
disadvantage, now I can use as much traffic as I want with a 2,5Gbit link 
(1Gbit guaranteed).
For your info, the most important lines of my config:
SocksPort 0
Log notice file /var/log...
Log debug file /var/log...
ORPort 443
RelayBandwithRate 1000Mbit
RelayBandwithBurst 1000Mbit
Exit policy reject *:*
ContactInfo & Nickname set, of course... ;)

Is there anything I should change?

Thanks for your help!

Best Regards...


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
  ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Hardware requirements for a fast Tor relay

2021-11-10 Thread Elias via tor-relays
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

I'm sorry that I now spam the mailing list, but I made a mistake.
I'm of course NOT logging at debug level, it's just one logfile (notices.log). 
I logged debug when I was running the relay on the VPS because I wanted to know 
why it crashed all the time, but all that happened was that my 20TB SSD was 
maxed out within two hours and I had to reboot to get rid of the old logfiles.
My bad, please don't think I write a debug log, that's completely pointless. 
Why would I. I rented a pretty expensive root server because I think Tor is 
really important and I want to relay as much traffic as possible, not to log 
debug messages.
This was obviously not correct, but the rest of my torrc looks as described 
above.
By the way, my relay has now around 4000 incoming and 4000 outgoing connections 
and a throughput of almost 1TB/day, and the load averages are still below .40. 
Everything looks good. :)
Have a nice day, everyone!

-BEGIN PGP SIGNATURE-
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=s8hY
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Recent rejection of relays

2021-11-10 Thread gus
Hi,

At the end of the year, we will have a Tor relay operator meetup during the 
rC3[1].
It's an online event. Leibi will share the invitation here, when the
date and time are confirmed.

Please also join our matrix/IRC channel:
#tor-relays:matrix.org (or #tor-relays - irc.oftc.net)
And our new Tor Forum: https://forum.torproject.net/

Thanks for running relays!

Gus

[1] https://events.ccc.de/2021/11/08/rc3-2021-nowhere/

On Tue, Nov 09, 2021 at 10:06:28PM +, t...@nullvoid.me wrote:
> What community updates and organizations are there outside this mailing list?
> 
> I operate the small nullvoid family of relays and want to grow it in the near 
> future but not miss out or misconfigure and cause problems for the rest of 
> the team.
> 
> 
> On November 9, 2021 8:09:40 PM UTC, Georg Koppen  wrote:
> >
> >Finally, anyone running relays: try to get connected to the community so we 
> >can build some trust among each other. That seems to be an essential part in 
> >our long-term strategy to fight bad relays trying to enter our network.
> >
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
The Tor Project
Community Team Lead


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] General overload -> DNS timeouts

2021-11-10 Thread Georg Koppen

nusenu:



Anders Trier Olesen:

The Tor relay guide should recommend running your recursive resolver
(unbound) on a different IP than your exit:
https://community.torproject.org/relay/setup/exit/


yes, that is a good idea, here is a PR for it:

https://github.com/torproject/community/pull/169/files


Thanks. I created a ticket[1] for it in our bug tracker, so your PR does 
not fall through the cracks.


Georg

[1] https://gitlab.torproject.org/tpo/web/community/-/issues/239



OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Questions about my tor node

2021-11-10 Thread Bobby
Hello I'm running a tor node and I paid for a VPS for the express 
purposes of running that node. I have configured it to use almost all of 
the bandwidth of the VPS and then to allow bursts to use all of the 
bandwidth I have also set it to serve directory requests. The server 
also has 1GB of ram and 1 CPU core. Is this good enough to be helpful in 
the tor network?


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Question about IPv6

2021-11-10 Thread xplato via tor-relays
Greetings,

I have three relays running Hardened BSD hosted at Frantech. They do not offer 
support for setting up IPv6. I am not sure how to accomplish this and wondered 
if anyone would have insight into setting this up? I have not found much in the 
way of instruction. A resource that provides instructions would be much 
appreciated.

Kindly,
Dan

Sent with [ProtonMail](https://protonmail.com) Secure Email.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Recent rejection of relays

2021-11-10 Thread tor
What community updates and organizations are there outside this mailing list?

I operate the small nullvoid family of relays and want to grow it in the near 
future but not miss out or misconfigure and cause problems for the rest of the 
team.


On November 9, 2021 8:09:40 PM UTC, Georg Koppen  wrote:
>
>Finally, anyone running relays: try to get connected to the community so we 
>can build some trust among each other. That seems to be an essential part in 
>our long-term strategy to fight bad relays trying to enter our network.
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Hardware requirements for a fast Tor relay

2021-11-10 Thread failing.flyaway443--- via tor-relays
I just read this research paper, maybe it's worth thinking about some kind of 
implementation of this approach some time in the future.
It's an interesting read anyway.
uwspace.uwaterloo.ca/bitstream/handle/10012/16108/Engler_Steven.pdf

Regards
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Hardware requirements for a fast Tor relay

2021-11-10 Thread failing.flyaway443--- via tor-relays
Hi Gary,
thank you for your response.
I think I just worry too much.
I watched my relay all the time today, I had bandwidth usage of 30MB/s at times 
and HTOP showed me a Load average of 0.29/0.29/0.30. I know that this is 
totally fine for a dual core.
The relay is up and running for 3 days and 8 hours now and I already moved 
~700GB in each direction (upload/download). I was just concerned because the 
VPS started crashing after 2 weeks solid uptime, but I should have set stricter 
bandwith limits.
You can't really compare a VM with a root server, I don't think this will 
happen again.
It's ok for me to invest a little more and have a fast and stable relay this 
way. The traffic was capped with the VPS plan, this was obviously a big 
disadvantage, now I can use as much traffic as I want with a 2,5Gbit link 
(1Gbit guaranteed).
For your info, the most important lines of my config:
SocksPort 0
Log notice file /var/log...
Log debug file /var/log...
ORPort 443
RelayBandwithRate 1000Mbit
RelayBandwithBurst 1000Mbit
Exit policy reject *:*
ContactInfo & Nickname set, of course... ;)

Is there anything I should change?

Thanks for your help!

Best Regards...
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays