Re: [tor-relays] How does CERT-FI know my SOCKS4 port?

2013-07-10 Thread Logforme
I assume the ISP did a port scan. Do you have port 9050 open in your firewall? On 2013-07-10 15:57, Steve Snyder wrote: My ISP recently sent to me a CERT-FI auto-report on malware-infected servers in my ISP's address space. I was send this report because my IP address was among those

Re: [tor-relays] Yet another underpowered relay?

2013-07-23 Thread Logforme
Thanks for all the input guys. See some advice here: http://archives.seul.org/or/relays/Aug-2010/msg00034.html Found that before and I have followed it to the letter when I set up the relay Also are you running with a lot of iptables/ip6tables rules active (or any at all)? If you do,

Re: [tor-relays] huge increase in relay traffic

2013-08-30 Thread Logforme
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'm currently seeing more than a doubling of connections (from a mean of c. 2000 established connections to just over 5000) on my relay at 0xbaddad. The log is full of the (expected) messages: Your computer is too slow to handle this many

Re: [tor-relays] Upgrade your relay to 0.2.4.17-rc?

2013-09-05 Thread Logforme
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Upgraded to 0.2.4.17-rc and almost immediately got the following in my syslog: debian kernel: [5000394.949751] TCP: Possible SYN flooding on port 443. Sending cookies. Check SNMP counters. No idea what it means. 443 is my or port. Tor is running

Re: [tor-relays] Upgrade your relay to 0.2.4.17-rc?

2013-09-06 Thread Logforme
Don't know if it's of interest but here's my log for the first 24 hours with 0.2.4.17-rc: Sep 05 17:23:59.000 [notice] Circuit handshake stats since last time: 435758/1722581 TAP, 1503/1503 NTor. Sep 05 18:23:59.000 [notice] Circuit handshake stats since last time: 167983/1616396 TAP, 1427/1427

Re: [tor-relays] Too little traffic on my #2 non-exit relay

2013-09-18 Thread Logforme
Weird that #1 has the stable flag and #2 don't then. Stable -- A router is 'Stable' if it is active, and either its Weighted MTBF is at least the median for known active routers or its Weighted MTBF corresponds to at least 7 days. The above suggests that #1 has been known to the dirauths for a

Re: [tor-relays] Botnet issues and upgrading to 0.2.4.x

2013-10-14 Thread Logforme
On 2013-10-14 22:01, Chris Whittleston wrote: I see - so I'll probably still see the problem with a huge number of circuits being created after I've finished building 0.2.4. Is there any way to limit this, I'm guessing reducing the bandwidth wouldn't actually help? I guess I'll look into how

[tor-relays] Hash of session info was not as expected

2014-06-14 Thread Logforme
My tor log file is usually quite boring but today it looks like this: Jun 14 13:42:46.000 [warn] Hash of session info was not as expected. Jun 14 13:57:56.000 [warn] Hash of session info was not as expected. Jun 14 14:11:58.000 [warn] Hash of session info was not as expected. A new line about

Re: [tor-relays] Windows Tor Server Guide

2014-10-31 Thread Logforme
Click on the Download button on torproject.org. This brings you to the easy download page with just the browser bundle. Click on the View All Downloads link to get all available options: https://www.torproject.org/download/download.html.en On 2014-10-31 09:18, Rafael Rodriguez wrote: Hello

Re: [tor-relays] Bwauths Measures question, friends.

2014-11-01 Thread Logforme
The relay is reported as having Advertised Bandwidth: 60.55 kB/s (about 480 kbits/s): https://globe-node.herokuapp.com/relay/48ADFCC561402D7EBB1CDE233F206B01D8FA0765 What does your bandwidth rate values in torrc say? On 2014-11-01 10:46, Rafael Rodriguez wrote: Anyone knows how often bwauths

Re: [tor-relays] Unexpected sendme cell from client. Closing circ (window 1000). error message.

2014-11-06 Thread Logforme
Update to the latest version of tor: 0.2.5.10 I believe that resolution was clearly stated here. And also mentioned in the announcement of 0.2.5.10 https://blog.torproject.org/blog/tor-02510-released-and-tor-023x-deprecated Downgrade the severity of the 'unexpected sendme cell from client' from

[tor-relays] Out of memory message

2014-12-07 Thread Logforme
I run the relay Logforme (855BC2DABE24C861CD887DB9B2E950424B49FC3). Yesterday I saw new messages in the log file: Dec 06 09:28:13.000 [notice] We're low on memory. Killing circuits with over-long queues. (This behavior is controlled by MaxMemInQueues.) Dec 06 09:28:16.000 [notice] Removed

Re: [tor-relays] Out of memory message

2014-12-07 Thread Logforme
On 2014-12-07 12:20, Roger Dingledine wrote: Has anybody else here seen messages like this? I looked through the old log files and found the following memory messages: Dec 06 03:33:06.000 [notice] Removed 334229280 bytes by killing 1 circuits; 16401 circuits remain alive. Dec 06 05:27:25.000

Re: [tor-relays] Out of memory message

2014-12-10 Thread Logforme
On 2014-12-10 08:31, Roger Dingledine wrote: Careful with your conclusion there -- because of memory fragmentation, the process can still hold the memory even when Tor has freed the memory. htop currently shows 3622/3858 Mem used and 1545/3136 Swap used. (if I remember correctly it's usually

Re: [tor-relays] Out of memory message

2014-12-15 Thread Logforme
On 2014-12-15 19:43, Nick Mathewson wrote: On Wed, Dec 10, 2014 at 2:31 AM, Roger Dingledine a...@mit.edu wrote: On Sun, Dec 07, 2014 at 01:43:46PM +0100, Logforme wrote: To me it looks like an attacker that ramped up over a 6 hour period and then stopped building new circuits. Since the tor

[tor-relays] circuit_unlink_all_from_channel

2015-06-26 Thread Logforme
FYI I run the relay 855BC2DABE24C861CD887DB9B2E950424B49FC34. Today I found a message in the log file I have not seen before: Jun 26 18:05:20.000 [warn] circuit_unlink_all_from_channel(): Bug: Circuit on detached list which I had no reason to mark Relay continues to run fine with 30 days uptime.

[tor-relays] Faravahar messing with my IP address

2015-10-22 Thread Logforme
I run the relay Logforme (855BC2DABE24C861CD887DB9B2E950424B49FC34) Saw this in yesterday's log file: Oct 22 03:17:55.000 [notice] Our IP Address has changed from 84.219.173.60 to 154.35.32.5; rebuilding descriptor (source: 154.35.175.225). Oct 22 03:17:55.000 [notice] Self-testing indicates your

Re: [tor-relays] Faravahar messing with my IP address

2015-11-03 Thread Logforme
Happened again tonight: Nov 04 05:23:43.000 [notice] Our IP Address has changed from 84.219.173.60 to 185.99.185.61; rebuilding descriptor (source: 154.35.175.225). Nov 04 05:23:43.000 [notice] Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server

Re: [tor-relays] Opt-In Trial: Fallback Directory Mirrors

2015-12-17 Thread Logforme
My relay, Logforme (855BC2DABE24C861CD887DB9B2E950424B49FC34), is not on the list even though it fits all the criteria, except the HSDir flag which I lost when I upgraded to the latest version. Hint, hint, Mr Roger "We should somehow teach everybody that losing their flags for a few

Re: [tor-relays] uptime "algorithm"

2015-12-14 Thread Logforme
On 2015-12-14 19:12, Dr. Who wrote: > Wouldn't it be better to monitor the reason for a drop in uptime? In > case at the same time a restart occurs the version increases it might be > given the HSdir flag again? > Can't see why, for example the Debian /etc/init.d/tor script, couldn't send tor a

Re: [tor-relays] Why can't I see more traffic? (is my banana too weak?)

2016-09-03 Thread Logforme
Looking at Atlas your relay advertises 2.45 MB/s which is quite low for a 100Mbit connection: 2.45 MByte x 8 = 19.6 MbitWhat value do you have in your torrc? For a 100mbit connection it should be at least: BandwidthRate 12 MB -- Originalmeddelande -- Från: "Roman Mamedov"

Re: [tor-relays] new warn message: Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS.

2016-10-06 Thread Logforme
I had 3 today on my non-exit relay. Can't remember seeing them before. Maybe they are new in 0.2.8.8? Times are UTC+2 Oct 06 09:14:03.000 [warn] Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS. Oct 06 14:08:13.000 [warn] Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS. Oct 06

[tor-relays] 0.2.9.10 dir port warning

2017-03-13 Thread Logforme
Just upgraded my relay 855BC2DABE24C861CD887DB9B2E950424B49FC34 to 0.2.9.10 and now I get a new warning in the log file: Mar 13 12:02:22.000 [notice] Bootstrapped 100%: Done Mar 13 12:03:20.000 [warn] Cannot make an outgoing connection without a DirPort. Mar 13 12:03:21.000 [notice]

[tor-relays] prop224 warning

2017-08-01 Thread Logforme
Saw a new thing in my tor log today: Aug 01 11:07:27.000 [warn] Established prop224 intro point on circuit 799774346 According to google, prop224 is a new hidden service protocol? https://trac.torproject.org/projects/tor/ticket/12424 Which sounds like a great thing. But why do I get a warning

Re: [tor-relays] Exit / Bad Gateway

2017-06-27 Thread Logforme
On 2017-06-27 12:35:21, "Sebastian Urbach" wrote: Dear list, My Exit: https://atlas.torproject.org/#details/4198BD138E5E11B15B05C826B427148CED7D99FE My Consendus Weight dropped to 20 today and i found the following in notices.log: Jun 27 12:03:35.000 [warn] http

Re: [tor-relays] botnet? abusing/attacking guard nodes

2017-12-17 Thread Logforme
My relay ran out of connections once and also crashed once so I followed the suggestions in the "DoS attacks are real (probably)" thread and implemented connection limits in my firewall. Everything have run smoothly since. My only concern is how low I can set the number of connections per IP

[tor-relays] Too many connections warning

2017-12-07 Thread Logforme
I run the non-exit relay Logforme (855BC2DABE24C861CD887DB9B2E950424B49FC34). Today I saw a new warning in my tor log file: Dec 07 09:48:12.000 [warn] Failing because we have 32735 connections already. Please read doc/TUNING for guidance. The relay runs on an old Debian Wheezy machine. Me

Re: [tor-relays] DirPort DOS activity against Fallback Directories

2018-05-21 Thread Logforme
Just looked over a sample of FallBackDir relays in Relay Search and it appears this excess-load abuse is directed at them in particular. Some fall-back directories show more than a month of excess request traffic, presumably on the DirPort. Logs here indicate six weeks of abuse escalating in

Re: [tor-relays] Running A Bridge Alongside My Relay

2018-05-26 Thread Logforme
So I am considering running a bridge alongside my relay gotland Would the bridge use the same public IP address as the relay? Since you already run a relay, that IP address is public. The point of bridges is that they are not public so they are harder to block. A government that censors the

[tor-relays] Number of connections on dir port

2018-05-27 Thread Logforme
After reading this post https://lists.torproject.org/pipermail/tor-relays/2018-May/015277.html I started looking into what is happening on the dir port on my relay (855BC2DABE24C861CD887DB9B2E950424B49FC34) The bandwidth ratio of dir/or traffic is around 3% to 4%. Not excessive according to

[tor-relays] Refusing to apply consensus diff

2018-06-05 Thread Logforme
I run the non-exit relay 855BC2DABE24C861CD887DB9B2E950424B49FC34 Two days now I've seen this in my log file: Jun 05 06:25:02.000 [warn] Refusing to apply consensus diff because the base consensus doesn't match the digest as found in the consensus diff header. Jun 05 06:25:02.000 [warn]

Re: [tor-relays] Is Tor-network protected from using one hop?

2018-06-26 Thread Logforme
On 2018-06-26 16:16:46, "dave levi" wrote: I'm testing few things in Tor and I noticed that if im changing(from the source code) the number of hop's(nodes) to be more then 3 hop's it work's fine(slowly, but still working) and if im sting only 2 hop's its still works great. but, when i'm

Re: [tor-relays] Circuit padding timeouts

2018-01-04 Thread Logforme
No clue what it means and why it's necessary to spam the log file with it. I did report my situation in the only ticket I could find that seems even vaguely appropriate: https://trac.torproject.org/projects/tor/ticket/22212 ___ tor-relays mailing

Re: [tor-relays] scale_active_circuits assertion fail

2018-02-20 Thread Logforme
On 2018-02-20 22:37:42, "teor" wrote: Please open a ticket with the full stack trace, and your OS. I opened a ticket: https://trac.torproject.org/projects/tor/ticket/25316#ticket Please let me know if there is anything more you need to know

[tor-relays] scale_active_circuits assertion fail

2018-02-20 Thread Logforme
My relay (855BC2DABE24C861CD887DB9B2E950424B49FC34) just crashed with the following error: Feb 20 14:33:40.000 [err] tor_assertion_failed_(): Bug: ../src/or/circuitmux_ewma.c:711: scale_active_circuits: Assertion e->last_adjusted_tick == pol->active_circuit_pqueue_last_recalibrated failed;

[tor-relays] Guard node suddenly sending twice what it receives

2017-12-20 Thread Logforme
My little guard node (855BC2DABE24C861CD887DB9B2E950424B49FC34) have suddenly started to behave strangely. iftop (my "bandwidth monitor"), shows twice as much sent traffic as received traffic. The traffic seems to be distributed to a lot of ip addresses. No ip address stands out as receiving

Re: [tor-relays] Guard node suddenly sending twice what it receives

2017-12-20 Thread Logforme
Check the logs, but they won't tell you much, and that's deliberate. So I checked the tor log. First part is before the "weirdness": Dec 20 16:00:08.000 [notice] Heartbeat: Tor's uptime is 4 days 23:59 hours, with 36191 circuits open. I've sent 3686.92 GB and received 3646.75 GB. Dec 20

Re: [tor-relays] torrelay on wan

2018-07-28 Thread Logforme
Hi to all, is it a god ide to setup torrelays directly on WAN port ? Yes there are an firewall, but direkt in the torserver. So no extern firwall. I run my relay on my firewall machine. I have a headless debian server box set up to be firewall/router between the WAN and LAN NICs. It's also

Re: [tor-relays] log "Is your outbound address the same as your relay address?"

2018-08-30 Thread Logforme
"Your relay has a very large number of connections to other relays. Is your outbound address the same as your relay address? Found 12 connections to 8 relays. Found 12 current canonical connections, in 0 of which we were a non-canonical peer. 4 relays had more than 1 connection, 0 had more than

Re: [tor-relays] New releases today: please consider upgrading.

2018-03-05 Thread Logforme
There are new security releases today. The official announcement just went to tor-announce, but I want to make sure that people on this list see it too. The debian package showed up today. I upgraded from 3.2.9 to 3.2.10 and removed my firewall connection limits. My early first impressions

Re: [tor-relays] searching the tor-relays archives

2018-10-30 Thread Logforme
On 2018-10-30 16:51:42, to...@protonmail.com wrote: Before I download months of gzipped archives and zgrep them myself, is there a way to search the messages themselves? I'm looking at: https://lists.torproject.org/pipermail/tor-relays/ but maybe there as another setup somewhere else. I use

Re: [tor-relays] Making use of new bandwidth

2019-04-08 Thread Logforme
On 2019-04-07 23:57:58, "teor" wrote: It looks like your relay could be CPU-core-limited, or limited by some other local resource, or limited by its location. Currently the CPU is only using 40% of 1 core (out of 4). All of it from Tor when BW is close to 250Mbps When routing from the LAN

[tor-relays] Making use of new bandwidth

2019-04-06 Thread Logforme
I run the non-exit relay: https://metrics.torproject.org/rs.html#details/855BC2DABE24C861CD887DB9B2E950424B49FC34 The relay run on a debian stretch machine with an i5-4670 at 3.8GHz with 4GB memory. CPU usage at 250Mbps traffic is around 40% of 1 core out of 4. On April 1st my ISP doubled my

Re: [tor-relays] Circuit storms

2019-01-31 Thread Logforme
On 2019-01-31 14:19:31, "Felix" wrote: Hi everybody Circuit storms observed of up to 100k and 250k per relay for over hours. Consumed BW rises by about 10%. Number of stateful server connections is higher. Using Tor 356 to 401. Anybody else observes that? Only way I know to check circuits is

Re: [tor-relays] dhcp lease question

2019-05-05 Thread Logforme
On 2019-05-05 14:32:52, to...@protonmail.com wrote: Though I realize that my vision of the local "mom and pop" relays has gotten more and more outdated. I think it's more important than ever. In my mind diversity is more important than throughput. If everyone ran GBit relays at a few

Re: [tor-relays] Measuring the Accuracy of Tor Relays' Advertised Bandwidths

2019-08-07 Thread Logforme
On 2019-08-06 23:31:39, "Rob Jansen" wrote: Today, I started running the speedtest on all relays in the network. So far, I have finished about 100 relays (and counting). I expect that the advertised bandwidths reported by metrics will increase over the next few days. For this to happen, the

[tor-relays] Assertion pol->magic failed

2019-11-21 Thread Logforme
Tonight my relay 855BC2DABE24C861CD887DB9B2E950424B49FC34 restarted with the following in the log file: Nov 20 19:08:07.000 [notice] Heartbeat: Tor's uptime is 20 days 12:00 hours, with 29939 circuits open. I've sent 46193.23 GB and received 45940.92 GB. Nov 20 19:08:07.000 [notice] Circuit

Re: [tor-relays] Improving Relay IPv6 - RIPE Grant

2019-12-12 Thread Logforme
On 2019-12-12 17:49:22, "NOC" wrote: than lets drop all IPv4 only relays from consensus 2020 finally. I would be sad to no longer be able to contribute to the Tor network. My ISP, Telenor Sweden, does not provide IPv6 and have no (public) roadmap for supporting IPv6. I can't switch ISP since

Re: [tor-relays] Recommended router for 200+ Mb/s relay

2020-04-30 Thread Logforme
On 2020-04-29 17:13:49, "Secure Node" wrote: I'm looking for new router for good price which can handle more connections and traffic ;-) Can you recommend any specific models? Should I avoid some products lines or companies? If you have an old PC with 2 ethernet ports laying around or you

Re: [tor-relays] SSH

2020-09-21 Thread Logforme
On 2020-09-21 11:19:20, "Андрей Гвоздев" wrote: Hello I'm running a TOR relay, every time I SSH to my server I see a message that there were thousands of failed login attempts Do you see this message too? Exposing a SSH server to the internet will get you lots of login attempts. Here are

Re: [tor-relays] Become a Fallback Directory Mirror (deadline: July 23)

2020-07-11 Thread Logforme
My relay Logforme (855BC2DABE24C861CD887DB9B2E950424B49FC34) is currently flagged as fallback dir. The relay runs on a dynamic ip address that will change rarely. I have over the years tried multiple times to get the relay excluded from the fallback dir list but it keeps popping back

Re: [tor-relays] Become a Fallback Directory Mirror (deadline: July 23)

2020-07-26 Thread Logforme
want to whitelist changes.# Assume details update is permanent85.230.184.93:9030 orport=443 id=855BC2DABE24C861CD887DB9B2E950424B49FC34 # Logforme Logforme is my relay. I've repeatedly asked for it to be blacklisted. Does "Now we want to whitelist changes" mean you want to whitelist

Re: [tor-relays] current HSDir flag requirements

2021-05-26 Thread Logforme
On 2021-05-26 08:18:32, "Scott Bennett" wrote: I interpret that as meaning that one or more criteria being used by one or more authorities has changed, What I have noticed on my relay is that the "Consensus Weight" is fluctuating. CW is too complicated for my tiny brain but I believe the

Re: [tor-relays] current HSDir flag requirements

2021-05-25 Thread Logforme
On 2021-05-25 12:08:34, "John Csuti" wrote: I second this. We are in 2021 and a relay is considered fast if it is above 100KB/s...? I don’t think a later dialup service should be considered a fast relay. 100KB/s is about 800Kb/s (https://en.wikipedia.org/wiki/Data-rate_units). I envy the

Re: [tor-relays] current HSDir flag requirements

2021-05-24 Thread Logforme
On 2021-05-22 11:31:12, "Scott Bennett" wrote: What are all the current requirements for a relay to get a HSDir flag? 96 (97?) hours of uptime and what else? Can someone tell me what my relay, MYCROFTsOtherChild, is missing for a HSDir flag? From the spec:

Re: [tor-relays] Huge increase in bridge connections

2021-02-12 Thread Logforme
On 2021-02-12 07:20:02, "Eddie" wrote: Just trying to understand if this is normal or if something else is going on. I have 2 bridges on a VPS. One is designated as "moat", the other "email". Until earlier today, for over a year, both averaged under 10 unique clients, per 6-hour reporting

[tor-relays] Compression bomb from dizum

2021-11-07 Thread Logforme
Got the following in my log today: Nov 06 18:19:01.000 [warn] Possible compression bomb; abandoning stream. Nov 06 18:19:01.000 [warn] Unable to decompress HTTP body (tried Zstandard compressed, on Directory connection (client reading) with 45.66.33.45:80). 45.66.33.45 is tor.dizum.com, a Tor

Re: [tor-relays] Unexpected classification with my guard relay

2022-02-22 Thread Logforme
I am contacting you because I don't understand why my relay is not considered as a guard relay (entry relay), since I already have the following flags: Fast, HSDir, Running, Stable, V2Dir, Valid. The dir-spec.txt document (https://github.com/torproject/torspec/blob/main/dir-spec.txt)

Re: [tor-relays] We're trying out guard-n-primary-guards-to-use=2

2022-07-11 Thread Logforme
On 2022-07-06 21:19, Roger Dingledine wrote: But it was replaced with a new overload (boo), from way too many Tor clients running at a few cloud providers. The main result for relay operators is greatly increased file descriptor use, with a few IP addresses or /24's generating the majority of

Re: [tor-relays] a characteristic of recent attacks?

2022-09-01 Thread Logforme
On 2022-09-01 06:53, Scott Bennett wrote: My question is, do other relay operators whose relays are being attacked see the same phenomenon? My relay's (8F6A78B1EA917F2BF221E87D14361C050A70CCC3) heartbeat messages show a steady increase. This could be because I only get HB every 6 hours.

[tor-relays] List number of circuits per connection

2022-10-19 Thread Logforme
I run the relay 8F6A78B1EA917F2BF221E87D14361C050A70CCC3 Like most relays mine has been targeted by the DoS attack. Hundreds of VPS IPs creating millions of IP connections. This I mitigated with rules in my firewall. Looking at the firewall counters it looks like that attack has now stopped.

Re: [tor-relays] List number of circuits per connection

2022-10-20 Thread Logforme
On 2022-10-19 17:10, Chris wrote: You may want to check these links: https://gitlab.torproject.org/tpo/community/support/-/issues/40093 https://github.com/Enkidu-6/tor-ddos https://github.com/toralf/torutils Thank you for the reply and the links. From what I can understand those links

Re: [tor-relays] List number of circuits per connection

2022-10-20 Thread Logforme
On 2022-10-20 03:35, Alex Xu (Hello71) via tor-relays wrote: for these reasons, I haven't aggressively pursued this plan. I have some more ideas based on intra-family correlation, but they also have similar problems as well as more implementation problems. in the long term, our best hope is

[tor-relays] Relays spamming my OR port

2022-08-18 Thread Logforme
I run the relay 8F6A78B1EA917F2BF221E87D14361C050A70CCC3 I have tried to mitigate the current DoS by implemented connection limits in my iptables using Toralf's template: More than 25 connection during 10 mins and you end up on my naughty list. Lots of connection attempts from the naughty list

Re: [tor-relays] Middle relay IP blocking

2023-08-03 Thread Logforme
On 2023-08-01 23:14, Eldalië via tor-relays wrote: My guess is that some widely used black list started including middle relay IPs, but I have no proofs. Has anyone had similar experiences? Any thoughts on this? I run a non-exit relay at home and have run into the same issue. Some Swedish