Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-07 Thread Tristan
You're seriously going to play the "be polite" card after this entire thread happened? I give up. Fuck this, unsubscribed. If you need me, I'll be hiding in my cold dark corner. On Dec 7, 2016 10:02 AM, "Ralph Seichter" wrote: On 07.12.16 15:44, Tristan wrote: &

Re: [tor-relays] Is there a reason for all exit nodes being public?

2016-12-07 Thread Tristan
This is exactly why I use Tor. I imagine a lot of people use Tor to bypass network restrictions, like school/University firewalls or counties like China and Pakistan. On Dec 7, 2016 9:11 AM, "heartsucker" wrote: > As one of the Tor users who connects to services where I have to use my > real na

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-07 Thread Tristan
Stop it, both of you. This is not the place for a flame war. If this were a forum, the topic would be locked. Can we just have a normal conversation and get back to what this mailing list is actually used for? On Dec 7, 2016 5:29 AM, "Rana" wrote: There's an alternative interpretation but ment

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-06 Thread Tristan
Again, bits or bytes. I can't believe I'm repeating myself, don't you people read? The ORIGINAL (version 1) Raspberry Pi had a max of 1 MegaBYTE. 1 MegaBYTE = 8 megaBITS Obviously other factors limit performance, but looking at just the maximum network capacity of a Raspberry Pi 1, it could hand

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-05 Thread Tristan
Again, bits or bytes? If the original Raspberry Pi can push 1MByte, that's 8Mbits, so you could get 4Mbits both ways. On Dec 5, 2016 9:08 AM, "Duncan Guthrie" wrote: > On 04.12.2016 22:35, Tristan wrote: > >> Perhaps this IS in fact normal. I ran a Tor relay on a Rasp

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-04 Thread Tristan
Perhaps this IS in fact normal. I ran a Tor relay on a Raspberry Pi for a while. My speed was about 1Mbps max, similar to your 1.5Mbps. I saw minimal traffic, and the consensus weight never went above 20. I'm not running a relay at home anymore because of the slow speeds. The configuration guide m

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-04 Thread Tristan
There isn't. On Dec 4, 2016 12:50 PM, "Rana" wrote: Since when is there a requirement for a relay operator to have "programming skills"? -Original Message- From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf Of Ralph Seichter Sent: Sunday, December 04, 2016 8:40

Re: [tor-relays] is it possible to relay using ipv6?

2016-11-27 Thread Tristan
If that happens, many people won't be able to run a middle relay at home. Nobody in my neighborhood has an IPV6 address, and none of the WiFi spots in town have one either. IPV6 just isn't used wisely enough. If any change happens, it should be *can* have just IPV6, and *can* have IPV4. On Nov 27

Re: [tor-relays] Vodafone Italia blocking traffic from IPs that belong to Tor relays

2016-11-26 Thread Tristan
They obviously don't know what they're doing since they "aren't checking the reject policy" on your non-exit relay. Hopefully they'll sort it out. Netflix had the same thing for a while. On Nov 26, 2016 2:55 PM, "fr33d0m4all" wrote: > Hi, > I just want to share my recent time experience with Vod

Re: [tor-relays] Problem with sendmail on relay

2016-11-23 Thread Tristan
Relay=smtpin.rzone.de Client CN is *.smtp.rzone.de Maybe just a syntax error using smtpin instead of smtp? On Nov 23, 2016 2:06 AM, "teor" wrote: > > > On 23 Nov. 2016, at 18:25, Berta Gieselbusch > wrote: > > > > Good morning, > > > > > > I've setup my first relay. Until now everything seems

Re: [tor-relays] is it possible to relay using ipv6?

2016-11-21 Thread Tristan
Unfortunately, only a small portion of the world is IPV6 capable: https://www.google.com/intl/en/ipv6/statistics.html IPV6 isn't backwards compatible, so literally every hop, skip, and jump on the Internet would need to be upgraded to support it. Many ISPs find it much easier and cheaper to just r

Re: [tor-relays] proper way to insert PGP key in torrc?

2016-11-04 Thread Tristan
It's still valid for a learning experience. Plus if you mess up the configuration or something, you won't disrupt as many users. On Nov 4, 2016 2:29 AM, "Univibe" wrote: > > He's running a relay because what he believe and it's fun > > without hurting nobody. > > Until some poor sap actually get

Re: [tor-relays] Blocking Domains

2016-11-01 Thread Tristan
Wow this is confusing. If I'm understanding this correctly, 0.0.0.0/24 would mean any address from 0.0.0.0 to 0.0.0.255, correct? On Nov 1, 2016 10:01 AM, "Tristan" wrote: > So what mask would I use then? I've been trying to wrap my head around it, > but I just don&#

Re: [tor-relays] Blocking Domains

2016-11-01 Thread Tristan
So what mask would I use then? I've been trying to wrap my head around it, but I just don't understand what /24 means, or how it's different from /27 or any other number. On Nov 1, 2016 9:58 AM, "teor" wrote: > > > On 2 Nov. 2016, at 01:54, SuperSluether wrote: > > > > So, I tried putting the I

[tor-relays] Blocking Domains

2016-10-31 Thread Tristan
Is it possible to block domain names in Tor's ExitPolicy? I've been getting abuses on *.panelboxmanager.com, and I'd like to be proactive about this if possible. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-

Re: [tor-relays] Linux kernel vulnerability

2016-10-23 Thread Tristan
Rebooting also makes sure updates are applied correctly. If a shared library updates, the old version is still in use until whatever program using it stops, and the new version is loaded on the next run. On Oct 23, 2016 10:07 PM, "Duncan Guthrie" wrote: > Hi folks, > > I think this is a very ext

Re: [tor-relays] Linux kernel vulnerability

2016-10-22 Thread Tristan
ct 22, 2016 8:26 PM, "Jesse V" wrote: > On 10/22/2016 08:02 PM, Tristan wrote: > > Would it be acceptable to configure unattended-upgrades to automatically > > reboot the system when required? I already have it configured to check > > for and install all updates

Re: [tor-relays] Linux kernel vulnerability

2016-10-22 Thread Tristan
Would it be acceptable to configure unattended-upgrades to automatically reboot the system when required? I already have it configured to check for and install all updates to Ubuntu and Tor once a day, but I still need to manually reboot to apply kernel upgrades. On Sat, Oct 22, 2016 at 6:26 PM, P

Re: [tor-relays] Linux kernel vulnerability

2016-10-21 Thread Tristan
And? Honestly, the way people create names and websites for these things, you'd think it's a fund-raiser for something, not a critical security bug. On Fri, Oct 21, 2016 at 5:22 PM, I wrote: > Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the > Linux Kernel > > http://dir

Re: [tor-relays] Recommendation for DUMB COMPUTING devices for Tor Relays

2016-10-21 Thread Tristan
Wouldn't it just be easier to use Tails? On Oct 21, 2016 7:08 AM, "Dan Michaels" wrote: > The Tor Project website recommends various security setups for people > running Tor relays. > > Such as, don't run a web browser on the same machine as your Tor relay, > otherwise the browser could get hack

Re: [tor-relays] You dont love me anymore :(

2016-10-18 Thread Tristan
k you very much for helping me out. It was confusing without end because this server was up for 10 months and high traffic. Markus 2016-10-18 20:30 GMT+02:00 Tristan : > According to this page: > https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays > > Looks like yo

Re: [tor-relays] You dont love me anymore :(

2016-10-18 Thread Tristan
uot;Markus Koch" wrote: > Thank you very much. How do I dispute this? > > > 2016-10-18 20:20 GMT+02:00 Tristan : > > I don't know why or how, but you've got the BadExit flag from moria1: > > https://consensus-health.torproject.org/consensus-health.html

Re: [tor-relays] You dont love me anymore :(

2016-10-18 Thread Tristan
atlas.torproject.org/#details/B771AA877687F88E6F1CA5354756DF > 6C8A7B6B24 > > and I have never ever seen this before. > > Markus > > > 2016-10-18 20:13 GMT+02:00 Tristan : > > I've seen 404s from time to time, but this is new. Did you get a bad > relay > > flag somehow??? > &g

Re: [tor-relays] You dont love me anymore :(

2016-10-18 Thread Tristan
I've seen 404s from time to time, but this is new. Did you get a bad relay flag somehow??? On Oct 18, 2016 1:12 PM, "Markus Koch" wrote: > 20:08:18 [WARN] Received http status code 404 ("Not found") from > server '86.59.21.38:80' while fetching > "/tor/keys/fp-sk/14C131DFC5C6F93646BE72FA1401C02

Re: [tor-relays] Smallest, cheapest, lightest computer for tor relay

2016-10-17 Thread Tristan
"Windows" and "Tor relay" don't really go together. On Oct 17, 2016 8:47 AM, "Petrusko" wrote: > RPi 2/3 if I'm not wrong are around 3 Watts (fanless) > An old P4... For sure it's not lower than 60 Watts power consumption > > And if he wants to run only a Tor relay, advantage to have Windows OS

Re: [tor-relays] Smallest, cheapest, lightest computer for tor relay

2016-10-16 Thread Tristan
I believe the 2 and 3 are the same price as the 1 though. At any rate, you should probably compile the latest Tor from source if you can't use the official repository. On Oct 16, 2016 5:12 PM, "diffusae" wrote: > The RPi is good to use as relay with your requirement. You can expect a > total tra

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?

2016-10-16 Thread Tristan
ho" has made those DNS queries looks > like difficult ? (I'm not an expert on hacking :p ) > > > 16/10/2016 21:28, Tristan : > > Unbound does cache DNS entries, but there was also serious discussion > > about whether or not the cache is a privacy risk/anonymity leak,

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?

2016-10-16 Thread Tristan
Unbound does cache DNS entries, but there was also serious discussion about whether or not the cache is a privacy risk/anonymity leak, but I feel it's worth the trade-off since public DNS servers do the same thing. On Sun, Oct 16, 2016 at 2:23 PM, Petrusko wrote: > Humm, I've not checked on the

Re: [tor-relays] Smallest, cheapest, lightest computer for tor relay

2016-10-16 Thread Tristan
The Raspberry Pi 2 runs Tor just fine, but I have no idea what speeds you can expect since my upload is only 1Mbps. I was using Raspbian Jessie with the official Tor repos. Once everything was installed and set up, the system could literally just sit on a shelf with power and ethernet and be comple

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?

2016-10-16 Thread Tristan
Maybe Tor could at least warn you when you're not using a local resolver? On Oct 16, 2016 7:50 AM, "Ralph Seichter" wrote: > On 16.10.16 14:33, Tom van der Woerdt wrote: > > > Why doesn't Tor just link with a dns recursor, instead of relying on > > the user to get the configuration right? > > It

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?

2016-10-16 Thread Tristan
It's not technically required when setting up Tor, so I think a lot of people just forget about it. When I set up an exit relay, I knew I was supposed to run a local DNS server, but I completely forgot to install it until about a month later when the topic appeared in this list. The other problem

Re: [tor-relays] RPi Relay Maximum Speed

2016-10-12 Thread Tristan
> > So he has 200 mbit on a fast ethernet port. > > Sent from my iPad > > On 12 Oct 2016, at 14:20, Tristan wrote: > > Remember, a relay has to download and upload as well, so your 100Mbps link > would really only be able to _relay_ at 50Mbps anyway. > > On Oct 12,

Re: [tor-relays] RPi Relay Maximum Speed

2016-10-12 Thread Tristan
Remember, a relay has to download and upload as well, so your 100Mbps link would really only be able to _relay_ at 50Mbps anyway. On Oct 12, 2016 4:17 AM, "Farid Joubbi" wrote: > The hardware in your raspberry is way too weak to be able to push 100 > Mbit/s. > > My guess is that Atlas will show

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-08 Thread Tristan
True, but slowing them down could still be useful. At any rate, Suricata is a no-go for low-end relays that only have 500MB of RAM. It just hammers the pagefile. On Sat, Oct 8, 2016 at 7:00 PM, Markus Koch wrote: > Would not help. These are bots, you can slow them down but this will > not stop

Re: [tor-relays] Relay uptime after restarting Tor service

2016-10-08 Thread Tristan
I can't believe people are still whining about t-shirts. It's a freaking t-shirt. On Sat, Oct 8, 2016 at 6:16 PM, teor wrote: > > > On 8 Oct 2016, at 06:15, I wrote: > > > > Nothing you do actually gets you a tshirt. > > The knowledge that you qualified for a tshirt is your only badge of > hono

Re: [tor-relays] Digital Ocean - running Exit node locked

2016-10-07 Thread Tristan
This page has 3 policies: Reduce exit policy, reduced-reduced exit policy, and a lightweight example policy. https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy On Oct 7, 2016 5:01 PM, "Markus Koch" wrote: > reduced-reduced exit policy. ? > > Illuminate me, pls. > > Markus > ___

Re: [tor-relays] Digital Ocean - running Exit node locked

2016-10-07 Thread Tristan
Guess I'm next. My relay has been running for 3 months now. I'm doing my best to be a good neighbor though. After the first month, I got an SSH abuse, so now I reject SSH traffic. A month later I got an SQL hack attempt, and I switched to the reduced-reduced exit policy. Haven't gotten anything els

Re: [tor-relays] Middle Relay changed to Exit Relay Bandwidth Change

2016-10-07 Thread Tristan
It's very normal for exit relays to pick up *much *more traffic than middle or guard. Because exit relays have to deal with the abuse complaints of Tor users, there are much fewer exit relays than middle and guard: http://rougmnvswfsmd4dq.onion/relayflags.html Even though there is plenty of bandwi

Re: [tor-relays] new warn message: Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS.

2016-10-07 Thread Tristan
I just checked the logs on my exit, the only warnings I have are the usual " 127.0.0.1:53 is down, All DNS servers are back up" messages. On Fri, Oct 7, 2016 at 2:00 PM, pa011 wrote: > > Am 07.10.2016 um 20:20 schrieb Green Dream: > > One of my guard relays has a few entries on Oct 06 also: > >

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata or no IPS at all

2016-10-06 Thread Tristan
can access Suricata, I'm just trying to figure out how all this works before I actually start to mess around with it on a server. On Thu, Oct 6, 2016 at 10:09 AM, wrote: > You can't access suricata directly? > > -- Původní zpráva -- > Od: Tristan > Komu: tor-

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata or no IPS at all

2016-10-06 Thread Tristan
s) and second as IDS (all rules (block of rules) are switched > on). In the log of IDS we determine which chains should be filtered and > then we filter them one by one on IPS. The main thing is to not to cut of > any of the customers (in our case). > > > -- Původní zp

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata or no IPS at all

2016-10-06 Thread Tristan
Suricata allows direct access via the Tor network, Snort's website gave me multiple failed Captchas before I could access anything. I'm going to do some further research before I even think about implementing anything. How does one detect false positives when running an IPS? Do you just frequently

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-05 Thread Tristan
Well, this sentence from the EFF gives me some peace of mind: "You are not helping criminals by using Tor any more than you are helping criminals by using the Internet." I still wish there was a better way to handle things, but at this point I'm just begging the question. On Wed, Oct 5, 2016 at 5

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-05 Thread Tristan
Then what _can_ we do? Because as it stands, Tor is the perfect tool for criminals, and your stand is "do nothing." An ISP can trace illegal activity to a user, we can't. Even if Tor is considered an ISP in that sense, the rules vary by country, maybe even by provider. I'm being to think there is

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-05 Thread Tristan
Be that as it may, there must be *something* we can do about this as relay operators. If you get caught doing something illegal on your home Internet connection, there are warnings, and eventually consequences (like being disconnected). Just because you run a Tor relay doesn't mean the rules don't

Re: [tor-relays] Dealing with OVH Abuse Complaints

2016-10-05 Thread Tristan
Interesting seeing as how OVH is one of the biggest VPS services running Tor exits. On Oct 5, 2016 3:10 AM, "Roman Mamedov" wrote: > On Wed, 5 Oct 2016 18:55:26 +1100 > teor wrote: > > > Does anyone have experience running a long-lived Exit on OVH / So You > Start? > > > > We've just received a

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread Tristan
3a5f3faac > - Bot Information: > https://www.webiron.com/bot_lookup/d5930168c39511ee975f5943a5f3faac > - Bot Node Feed: > https://www.webiron.com/bot_feed/d5930168c39511ee975f5943a5f3faac > - Abused Range: 45.79.79.0/24 > - Requested URI: / > -

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread Tristan
mass reports from DigitalOcean. > > And the thing that pisses me off is: Its all bots or Tax spam or other > > stuff I got weeks/months ago. Different day, same shitty abuse mail. > > > > Markus > > > > > > 2016-10-04 18:03 GMT+02:00 Tristan : > >> I

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread Tristan
I don't know what I'm doing different, because I only got 2 complaints in the last 2 months, and that was for SSH and SQL stuff. On Oct 4, 2016 11:01 AM, "pa011" wrote: > Me too Markus -could fill a folder with that tax issue :-(( > Costing a lot of time to answer and restrict the IPs > > Plus m

Re: [tor-relays] Question about relay speed + quick question about IPV6

2016-10-02 Thread Tristan
Um, yes it will. I don't have ExitRelay in my torrc file at all, and it exits just fine. On Sun, Oct 2, 2016 at 9:03 PM, teor wrote: > > And your relay won't exit on IPv4 unless you set ExitRelay to 1 > > -- > Tim Wilson-Brown (teor) > > teor2345 at gmail dot com > PGP C855 6CED 5D90 A0C5 29F6 4

Re: [tor-relays] Request for Tor abuse complaints - Question regarding Bittorrent

2016-09-29 Thread Tristan
wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > On 09/29/2016 04:30 PM, Tristan wrote: > > if it fails > > so if it doesn't fail it does go through the proxy right? > -BEGIN PGP SIGNATURE- > > i

Re: [tor-relays] Request for Tor abuse complaints - Question regarding Bittorrent

2016-09-29 Thread Tristan
I've tested many torrent clients with Tor's proxy. Vuze is the only one that strictly follows the settings, every other client ignores the proxy if it fails. In Vuze, most trackers failed to connect, but with DHT (not sure if DHT goes through the proxy) the actual torrent still goes through Tor.

Re: [tor-relays] "Potentially dangerous relay groups"

2016-09-27 Thread Tristan
Sounds like CloudFlare's threat policy. On Sep 27, 2016 2:36 PM, "Tim Semeijn" wrote: > Always watching my ass to be a good old Tor operator, I got my nodes on > the list. Always fun to see how one time not updating all your > MyFamily's gets you marked for life xD > > Time for some conf-updatin

Re: [tor-relays] Strange difference between rx and tx traffic

2016-09-27 Thread Tristan
Just so you know, you should be using a local DNS server, or one from the OpenNIC project, instead of Google DNS. Google DNS sees almost 50% of all Tor traffic, and could potentially link people across exits. On Sep 27, 2016 8:48 AM, "pa011" wrote: > On one of my recently started Exits I do see

Re: [tor-relays] Caching new entry debian-tor...

2016-09-21 Thread Tristan
Well, until someone decides to update Orbot, Android users are still on 0.2.7.5. On Sep 21, 2016 8:30 AM, "teor" wrote: > > > On 21 Sep 2016, at 22:46, Tristan wrote: > > > > Well, according to this question I asked on Tor's StackExchange, version &g

Re: [tor-relays] Caching new entry debian-tor...

2016-09-21 Thread Tristan
Whoops, forgot to paste the link: https://tor.stackexchange.com/questions/12638/how-old-is-too-old-tor-versions On Sep 21, 2016 7:46 AM, "Tristan" wrote: > Well, according to this question I asked on Tor's StackExchange, version > 0.2.4.26 is still technically in the

Re: [tor-relays] Caching new entry debian-tor...

2016-09-21 Thread Tristan
Well, according to this question I asked on Tor's StackExchange, version 0.2.4.26 is still technically in the recommended consensus. At any rate, running an older version is better for diversity, isn't it? On Sep 21, 2016 2:13 AM, "shraptor" wrote: > On 2016-09-20 20:58, Roger Dingledine wrote:

Re: [tor-relays] Rampup speed of Exit relay

2016-09-21 Thread Tristan
In short, yes. On Sep 21, 2016 5:02 AM, "D.S. Ljungmark" wrote: > Hi all, > > I'm looking at some traffic patterns for my Exit relay, and I'm frankly > a bit disappointed with the utilization. > > Currently it's running at a load average of 0.3-0.5, and CPU idle at > 70-80%. > > > We're not li

Re: [tor-relays] Middle relay

2016-09-16 Thread Tristan
It takes time to get the guard flag. See the relay life cycle for more details: https://blog.torproject.org/blog/lifecycle-of-a-new-relay On Sep 16, 2016 9:29 AM, "Jim Electro House" wrote: > I saw one relay not being a guard one, only middle.. :/ > > On Fri, Sep 16, 2016 at 5:27 PM, Matt Traudt

Re: [tor-relays] Guard/Middle/Exit Hosting

2016-09-15 Thread Tristan
your account. Most promos are valid for new > customers only." > > Tristan: > > It's in the billing settings after you log in. > > > > On Sep 15, 2016 3:28 PM, "Ralph Seichter" > wrote: > > > >> On 15.09.16 21:43, Markus Koch wrote: >

Re: [tor-relays] Guard/Middle/Exit Hosting

2016-09-15 Thread Tristan
It's in the billing settings after you log in. On Sep 15, 2016 3:28 PM, "Ralph Seichter" wrote: > On 15.09.16 21:43, Markus Koch wrote: > > > DigitalOcean has a new Promo: $15 free aka 3 months free droplet. > > I have tried creating an additional Droplet, but it seems that promo codes > cannot

Re: [tor-relays] Guard/Middle/Exit Hosting

2016-09-15 Thread Tristan
Thanks! Going on 2 months with an exit node. I had to disable SSH after about a month, but that's the only complaint I've gotten. On Sep 15, 2016 2:43 PM, "Markus Koch" wrote: Just 2 let you know, DigitalOcean has a new Promo: $15 free aka 3 months free droplet. Guard/Middle is no problem at al

Re: [tor-relays] DigitalOcean pricing (Re: tomhek - the (new) biggest guard relay operator)

2016-09-13 Thread Tristan
Well, if $5 a month is high for you, I don't know what to say. On Sep 13, 2016 4:01 AM, "Admin Kode-IT" wrote: > Is there something special about D.O.? The server prices are quite high > in my opinion. > > ___ > tor-relays mailing list > tor-relays@lis

Re: [tor-relays] DigitalOcean pricing (Re: tomhek - the (new) biggest guard relay operator)

2016-09-11 Thread Tristan
I asked this question as well. Currently, they don't have a way to monitor bandwidth, so they don't charge for usage. However, they ask that continuous transfer be limited to 300 Mbps. On Sep 11, 2016 5:46 AM, "Markus Koch" wrote: > They do not bill traffic at the moment, this can change at will

Re: [tor-relays] Guard vs Exit Bandwidth

2016-09-02 Thread Tristan
But hidden service traffic makes up about 0.01% of Tor traffic. Total is about 75Gb/s: http://rougmnvswfsmd4dq.onion/bandwidth.html Hidden services are about 900Mb/s: http://rougmnvswfsmd4dq.onion/hidserv-rend-relayed-cells.html On Fri, Sep 2, 2016 at 12:51 PM, Green Dream wrote: > Don't forge

[tor-relays] Guard vs Exit Bandwidth

2016-09-02 Thread Tristan
Looking at the advertised bandwidth vs bandwidth history from Tor Metrics[1], it appears that guard relays see much more traffic than exit relays. I think it might be partially because guard-only, guard-middle and guard-exits aren't separated, but would it really skew the numbers that much? [1]htt

Re: [tor-relays] #torstrike

2016-09-01 Thread Tristan
Is the Tor strike today? Because I just set up a second instance on my relay to get the most out of its bandwidth. Oops 😏 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] newer version of tor

2016-08-31 Thread Tristan
16 4:14 PM, "shraptor" wrote: > n 2016-08-31 15:06, Tristan wrote: > >> The Tor Repository works fine on a Raspberry Pi 2, so I'm guessing >> it'll work on a 3. >> > > yep how right you are, I tested it but it pulled in libsystemd for some > reason

Re: [tor-relays] newer version of tor

2016-08-31 Thread Tristan
The Tor Repository works fine on a Raspberry Pi 2, so I'm guessing it'll work on a 3. On Aug 31, 2016 4:38 AM, "shraptor" wrote: > I am running an rpi3 with devuan. > > How to I get a more recent tor package on there? > > > Could I use https://deb.torproject.org or do I have to > setup a tool ch

Re: [tor-relays] new relay package for Ubuntu 16.04+

2016-08-24 Thread Tristan
Ubuntu/Debian doesn't have the latest version of Tor. You should use the official repository: https://www.torproject.org/docs/debian.html.en On Aug 24, 2016 12:50 PM, "Aeris" wrote: > > Aeris, I should be worried if any of those matched. Did you know 0.2.8 is > > out? > > Currently not on Xenial

Re: [tor-relays] GeoIP

2016-08-23 Thread Tristan
Well, as canonizing ironize says on Tor's StackExchange, "GeoIP is bullshit." https://github.com/epidemics-scepticism/tor-misconception/blob/master/README.md On Aug 23, 2016 10:10 AM, "Fred Rauch" wrote: Hi, I just started up another relay, and atlas' GeoIP data on it is incorrect (says it is i

Re: [tor-relays] relay on a vps not exclusively used for tor?

2016-08-21 Thread Tristan
Honestly I have no idea how provides would enforce that rule anyway for that very reason. My guess is that it's a technicality, since Tor _can_ but isn't specifically _designed_ to max CPU usage. On Aug 21, 2016 10:47 PM, "Green Dream" wrote: >> > Most AUPs ban the use of programs designed to us

Re: [tor-relays] #torstrike

2016-08-21 Thread Tristan
I read some tweets and found some articles. Jake Applegate stepped down from the project, and Sheri replaced the board of directors. But this strike wants to replace all Tor project members because of Applegate. I'm not connecting the dots, and the response on Twitter seems to be mostly against th

Re: [tor-relays] #torstrike

2016-08-21 Thread Tristan
I've never believed in strikes. They never seem to really do anything, other than make something unaccessible for a day or 2 (just like the Wikipedia blackout a few years ago). I don't understand any of the demands on the page, or why they matter. Tor does its job, whether an ex-CIA agent helps de

Re: [tor-relays] relay on a vps not exclusively used for tor?

2016-08-21 Thread Tristan
Mine hasn't. It peaks at about 30%. It can't even hit the 150Mbps limit I set. On Aug 21, 2016 8:33 PM, "Green Dream" wrote: > > Most AUPs ban the use of programs designed to use 100% CPU > > A well-utilized Tor node will max out CPU... > > > > ___ > t

Re: [tor-relays] relay on a vps not exclusively used for tor?

2016-08-21 Thread Tristan
I wouldn't run BOINC on a VPS. Most AUPs ban the use of programs designed to use 100% CPU (a.k.a. programs like BOINC). You should probably double-check if your VPS is ok with that. On Sun, Aug 21, 2016 at 2:33 PM, Petrusko wrote: > Hey! > Thx for adding a relay ;) > About my vps relay, there's

Re: [tor-relays] Tiny computers (RPi-like) for exit nodes?

2016-08-18 Thread Tristan
I think you mean "if" it goes live. That ticket has been open for 4 years, and originally had a milestone for 0.2.4. On Aug 18, 2016 12:36 PM, "Pi3" wrote: > Im running 5 Mbits mid node on Pi3. Cpu load is 25-30% on 1 core with full > steady traffic - no aes-ni here. > Things should improve grea

Re: [tor-relays] Local DNS on Exit logs failed user queries

2016-08-17 Thread Tristan
I couldn't find the default config for Unbound when I installed it, so I just used the example file. Logging is disabled by default in this file. Unbound has a setting for "log-queries" which will print a line with time, IP, name, type, and class for each query. Not sure if setting this to "no" wil

Re: [tor-relays] A question about transfer - any advice?

2016-08-16 Thread Tristan
Well, to spread out 1TB over a month, 1,000,000÷30 days÷24 hours÷60 minutes÷60 seconds÷2 for in/out x 8 to convert to bits equals... 1.54 Mbps, give or take. It's not exact math since a byte is 1024 instead of 1000. Either way, 1TB gets used pretty quickly. My exit transfers 1TB in just a few hour

Re: [tor-relays] Pi3 mid relay dropping lil bit of packets

2016-08-15 Thread Tristan
Personal opinion here: 11 packets dropped on 20GB of data sounds pretty small, and these packets might not even be from Tor. Literally any network service could have dropped those packets (ntp, ssh, updates, etc.) I wouldn't worry about it unless it starts to dramatically increase. On Aug 15, 201

Re: [tor-relays] High speed Tor relay advice

2016-08-14 Thread Tristan
On Aug 14, 2016 9:28 AM, "s7r" wrote: > > Currently it's complicated for a single Tor process to saturate a 10Gb/s > line, because it's not yet able to use all CPU cores. > Out of curiosity, what is the maximum speed a single Tor instance can achieve? Are there any plans for multi-core support? _

Re: [tor-relays] 90% of exits vulnerable to TCP off-path attack

2016-08-12 Thread Tristan
According to Ark Technica ( http://arstechnica.com/security/2016/08/linux-bug-leaves-usa-today-other-top-sites-vulnerable-to-serious-hijacking-attacks/) encrypted communications can only be blocked, meaning that exit servers could still be targeted. However, the bug only has to affect 1 side in or

[tor-relays] Out of memory: Kill process (tor)

2016-08-12 Thread Tristan
Last night I received my first abuse complaint on DigitalOcean. When I logged in, I saw Tor was no longer running because the system ran out of memory. Is it possible the system ran out of memory because of the abuse? My relay has 512MB of RAM running Tor and Unbound, and it's been running fine al

Re: [tor-relays] Unsubscribe

2016-08-09 Thread Tristan
I don't think that's how it works. You need to go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays and unsubscribe there. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/

Re: [tor-relays] Syslog: Kernel TCP: Too many orphaned sockets

2016-08-05 Thread Tristan
in Torservers' config will eat up to 16 GiB. I am not > sure if overriding Debian's setting is a good idea. Any advice? Is this > warning more than an annoyance? > > Cheers, > Christian > > > On Mon, Aug 01, 2016 at 09:12:12PM -0500, Tristan wrote: > > My defaul

Re: [tor-relays] Any security tips on running a TOR relay?

2016-08-04 Thread Tristan
quot;Green Dream" wrote: > P.S. Tristan, here's the explanation from that mailing list... just in > case people can't access the link or it goes away: > > "Yes, it has everything to do with those flag bits. For TCP connections, > Linux tends to use a "ha

Re: [tor-relays] Any security tips on running a TOR relay?

2016-08-04 Thread Tristan
I didn't look at all of them, but I've been tracing some of the IPs that have been blocked. Each one I've traced goes back to *.in-addr.arp. Even more interesting is that some of these connections get blocked, even though they're incoming on port 443, which allows traffic from anywhere! Any ideas

Re: [tor-relays] Any security tips on running a TOR relay?

2016-08-04 Thread Tristan
wrong? Tor should only be using OrPort and DirPort, so I'm not sure where all this other traffic is coming from. On Thu, Aug 4, 2016 at 12:52 PM, Green Dream wrote: > Tristan: yep, I was assuming a non-exit. Although sure, you can block > incoming traffic without affecting outboun

Re: [tor-relays] Any security tips on running a TOR relay?

2016-08-04 Thread Tristan
I'm assuming this doesn't apply to exit relays? Or is there a way to block incoming while allowing outgoing? On Aug 4, 2016 12:27 PM, "Green Dream" wrote: > - firewall off (deny) everything except DirPort/ORPort/ssh ___ tor-relays mailing list tor-relay

Re: [tor-relays] is explicit DirPort needed anymore under Tor 0.2.8.6?

2016-08-03 Thread Tristan
I'd like to peep in here and say that Orbot (Tor on Android) is still using version 2.7.5. Until someone updates the app to 2.8.6, those users will still need a DirPort. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.

Re: [tor-relays] Exit relay funding

2016-08-03 Thread Tristan
If you were running relays just to get recognized, you were probably doing it did the wrong reason. ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Syslog: Kernel TCP: Too many orphaned sockets

2016-08-01 Thread Tristan
My default setting was 2048. I changed it to 200,000 for now. I haven't really played with sysctl at all. The only change I've ever made in there was for swappiness. On Mon, Aug 1, 2016 at 8:04 PM, Green Dream wrote: > It's related to /proc/sys/net/ipv4/tcp_max_orphans > > "Maximal number of TCP

[tor-relays] Syslog: Kernel TCP: Too many orphaned sockets

2016-08-01 Thread Tristan
I looked at my exit relay's syslog for no specific reason, and saw that it was flooded with the following message: kernel: [1736405.162223] TCP: too many orphaned sockets These messages occur multiple times per second, but they only flood the log every couple of hours. What is this, and what does

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread Tristan
How can a Tor relay flood UDP? I thought everything was TCP? ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Got a visit from the police this morning..

2016-07-31 Thread Tristan
Except that if you do it right, you get a high speed unlimited bandwidth relay. On Jul 31, 2016 9:03 AM, "Jonathan Baker-Bates" wrote: > I think this issue has been discussed here before. > > The general opinion on the list is that it's not a good idea to run an > exit at home. It's probably not

Re: [tor-relays] Don't use Google's DNS server

2016-07-29 Thread Tristan
#x27;ll go before they terminate you. On Fri, Jul 29, 2016 at 11:04 AM, Sean Greenslade wrote: > On July 28, 2016 2:50:40 PM EDT, ITechGeek wrote: > >On Thu, Jul 28, 2016 at 2:34 PM, Tristan > >wrote: > > > >> I really wish VPS services wouldn't use Google D

Re: [tor-relays] Don't use Google's DNS server

2016-07-28 Thread Tristan
Right now I'm using Digital Ocean, but my previous provider experiences Hostwinds and Pulse (OVH) also have Google DNS as the default. On Thu, Jul 28, 2016 at 1:50 PM, ITechGeek wrote: > > On Thu, Jul 28, 2016 at 2:34 PM, Tristan wrote: > >> I really wish VPS services wou

Re: [tor-relays] Don't use Google's DNS server

2016-07-28 Thread Tristan
I really wish VPS services wouldn't use Google DNS by default. If not for this e-mail, I would have been on Google's DNS for a while before I found out. Maybe the Tor devs could add a warning if an exit is using Google DNS? Would that be acceptable? On Thu, Jul 28, 2016 at 12:59 PM, Toralf Förste

Re: [tor-relays] AWS abuse handling

2016-07-27 Thread Tristan
If Tor exits are against the AUP, you shouldn't be running one. On Jul 27, 2016 1:24 PM, "Snehan Kekre" wrote: > Hi All, > > I have a *free* membership for a year on Amazon's AWS (*capped* at > 15GB/month of traffic each way). > > I've been running an exit node with a reduced exit policy on an e

Re: [tor-relays] switching between exit and guard

2016-07-26 Thread Tristan
Oh dear, I'll take this as a warning since I just spun up a Tor droplet with DO not too long ago. On Jul 26, 2016 4:48 PM, "Markus Koch" wrote: > Hi there, > > now I am getting abuse mails nearly every day and digital ocean looks > like getting pissed off. Is it technical possible to switch betw

  1   2   >