[tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
Hello, one of my middle relays got auto limited by the ISP because of "outgooing UDP flooding ". The VPS is pure debian8, fail2ban, pub key and nothing else installed - so I highly doubt the give reason for the traffic limitation. Also I cant find anything in the log files. Anybody having experi

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
t; Markus > > > > 2016-08-01 14:28 GMT+02:00 pa011 : >> Hello, >> >> one of my middle relays got auto limited by the ISP because of >> "outgooing UDP flooding ". >> >> The VPS is pure debian8, fail2ban, pub key and nothing else installed - >>

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
; > 2016-08-01 14:44 GMT+02:00 pa011 : >> The ISP didn’t mention - I would have to ask. >> >> What I saw was that the traffic was up about linear from usually 30Mbits >> to above 100 Mbits over about 6 hours, bringing the CPU to 100% and >> dropping. >> >&g

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
; available in the Tor consensus. >> Then they can attack the relay from the Internet. >> >> There's no need to use Tor to tunnel the (D)DOS. In this case, Tor doesn't >> tunnel UDP, so it's unlikely to be the culprit. >> >> Tim >> >>>

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
the relay from the Internet. >> >> There's no need to use Tor to tunnel the (D)DOS. In this case, Tor doesn't >> tunnel UDP, so it's unlikely to be the culprit. >> >> Tim >> >>> >>> >>> 2016-08-01 15:04 GMT+02:00 pa01

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-06 Thread pa011
I am inexperienced an have probably the same problem after upgrading to 0.2.8.6. Even after reboot my second instance Tor-tor2 is running while the default service is exiting - syslog looks like this: Aug 6 12:11:33 tor[542]: Aug 06 12:11:33.744 [notice] Tor v0.2.8.6 (git-b88847615faea7c8) ru

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-06 Thread pa011
a colon, not a slash. The slash is there to block a > specific address *range*. You can read more about subnets and the > calculation for a bitmask here: https://en.wikipedia.org/wiki/Subnetwork > > Best, > Michael > > On 2016-08-06 at 13:30, pa011 wrote: >> I am inexpe

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-06 Thread pa011
est regards, > Alexander > --- > PGP Key: https://dietrich.cx/pgp | 0x52FA4EE1722D54EB > > On 2016-08-06 14:56, pa011 wrote: >> Thank you Michael for your hint - corrected that, but still having >> that problem with main instance not running: >> >> Aug 6 14

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-06 Thread pa011
The only instance in /etc/tor/instances/ is tor2 There is no tor and nothing else in that directory And I do have a torrc file in /etc/tor/ Best Regards Paul Am 06.08.2016 um 22:30 schrieb Peter Palfrader: > On Sat, 06 Aug 2016, pa011 wrote: > >> Actually not - you are rig

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-15 Thread pa011
Hi Peter, sorry was off a week and couldn’t answer: /run/systemd/generator/tor.service.wants/tor@tor2.service /run/systemd/generator/tor.service.wants/tor@default.service Anyway with "steady hand" the system seems to have repaired itself in between. I updated my other multi-instance exits toda

[tor-relays] [WARN] Remote server sent bogus reason code 65021

2016-08-16 Thread pa011
Just established a new Exit with two instances on (Linux 3.16.0-4-amd64) ,Tor 0.2.8.6 On the second instance I get these warnings: [WARN] Remote server sent bogus reason code 65021 [21 duplicates hidden] [WARN] Remote server sent bogus reason code 65023 [95 duplicates hidden] [NOTICE] Have tr

Re: [tor-relays] [WARN] Remote server sent bogus reason code 65021

2016-08-16 Thread pa011
Looks like this is solved and belonged to not open ports Sorry for the hassle Paul Am 16.08.2016 um 18:34 schrieb pa011: > Just established a new Exit with two instances on (Linux 3.16.0-4-amd64) ,Tor > 0.2.8.6 > > On the second instance I get these warnings: > > [WARN]

Re: [tor-relays] Useful metrics for relay operators

2016-09-04 Thread pa011
Am 01.09.2016 um 05:39 schrieb teor: > >> On 1 Sep 2016, at 13:36, I wrote: >> >> Did someone mention t-shirts? >> >> >> When is the last time anyone got a t-shirt? > > I'm pretty sure Jon has been sending them out on a regular basis. > (We're trying to automate the process a bit more.) > > I

[tor-relays] Moving multiple instances to another VPS

2016-09-11 Thread pa011
I have to move a multiple instances Exit from one VPS to another. Apart from creating the same instances on the new machine with **tor-instance-create** I would then just copy the whole directory /var/lib/tor/keys to the new VPS - or should I copy all /var/lib/tor/ to not miss anything from the

Re: [tor-relays] Moving multiple instances to another VPS

2016-09-12 Thread pa011
Thank you both. @Tim: You would kind of argue, that the advantage of carrying the old keys to the new machine is not that important (to keep old level of traffic from start) and that it might be even better to start from scratch? Paul Am 12.09.2016 um 03:53 schrieb teor: > In Debian, using t

[tor-relays] Strange difference between rx and tx traffic

2016-09-27 Thread pa011
On one of my recently started Exits I do see a rather huge and increasing difference between in and out traffic that I don see on any other Exit so far. The rise doesn’t seem to be linear.. Any explanation for that - or can it just be on the back of a not fixed repetitive warning? Sep 27 06:42:

Re: [tor-relays] Strange difference between rx and tx traffic

2016-09-27 Thread pa011
nstead of Google DNS. Google DNS sees almost 50% of all > Tor traffic, and could potentially link people across exits. > > > On Sep 27, 2016 8:48 AM, "pa011" mailto:pa...@web.de>> wrote: > > On one of my recently started Exits I do see a rather huge and inc

Re: [tor-relays] [OrNetRadar] niftybunny Digital Ocean 2016-09-22

2016-09-27 Thread pa011
Hi nusenu, there is that list of "potentially_dangerous_relaygroups" you published. Could yo please emphasize a bit more on what brings a relay on that list, apart from incorrect given MyFamily which doesnt seem to be always the case. I mean I see quite a few well respected names on that list ?

Re: [tor-relays] "Potentially dangerous relay groups"

2016-09-28 Thread pa011
Am 27.09.2016 um 19:37 schrieb nusenu: > pa...@web.de wrote: >> there is that list of "potentially_dangerous_relaygroups" you published. >> Could yo please emphasize a bit more on what brings a relay on that list, >> apart from incorrect given MyFamily which doesnt seem to be always the case. >>

[tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
One of my main ISP is going mad with the number of abuses he gets from my Exits (currently most on port 80). He asks me to install "Intrusion Prevention System Software" or shutting down the servers. He personally recommends Snort or Suricata. As far as I understand implementing such a software

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
Am 04.10.2016 um 16:48 schrieb krishna e bera: > On 04/10/16 08:48 AM, pa011 wrote: >> One of my main ISP is going mad with the number of abuses he gets from my >> Exits (currently most on port 80). >> He asks me to install "Intrusion Prevention System Software" o

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
.103 # TAX SPAM > ExitPolicy reject 147.67.136.21 # TAX SPAM > ExitPolicy reject 147.67.119.103 # TAX SPAM > ExitPolicy reject 147.67.119.3 # TAX SPAM > ExitPolicy reject 147.67.136.3 # TAX SPAM > ExitPolicy reject 147.67.119.21 # TAX SPAM > > Thats going on for months now and by

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
nly got 2 complaints in >> the last 2 months, and that was for SSH and SQL stuff. >> >> >> On Oct 4, 2016 11:01 AM, "pa011" wrote: >>> >>> Me too Markus -could fill a folder with that tax issue :-(( >>> Costing a lot of time to answer and re

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
do other people here handle this? Obviously the attacked target needs an other explanation as the ISP. > > > On 04/10/16 12:01 PM, pa011 wrote: >> Me too Markus -could fill a folder with that tax issue :-(( >> Costing a lot of time to answer and restrict the IPs >> &

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
Am 04.10.2016 um 18:46 schrieb Moritz Bartl: > Still, this will not help in this (and related) cases: I have not yet > seen proven cases where the reputation of the netblock was endangered, > but if an ISP is afraid of that, there's no good way to cooperate. An > IDS is their obvious suggestion,

Re: [tor-relays] new warn message: Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS.

2016-10-07 Thread pa011
Am 07.10.2016 um 20:20 schrieb Green Dream: > One of my guard relays has a few entries on Oct 06 also: > > Oct 06 09:04:00.000 [warn] Duplicate rendezvous cookie in > ESTABLISH_RENDEZVOUS. > Oct 06 09:04:00.000 [warn] Duplicate rendezvous cookie in > ESTABLISH_RENDEZVOUS. > Oct 06 10:17:30.

[tor-relays] Digital Ocean - running Exit node locked

2016-10-07 Thread pa011
Seems like even DO is not very much in favour of running Exits any more ? Anybody made the same experience - how to handle this please ? Thanks and Regards Paul "Hello -Although we do not specifically disallow TOR exit nodes, as the account holder you are responsible for all the traffic going

Re: [tor-relays] Digital Ocean - running Exit node locked

2016-10-07 Thread pa011
ccount, make new account. > They will kick you after 2-3 months. Delete account, make new account. > They will kick you after 2-3 months. Delete account, make new account. > Welcome to DigitalOcean! > > Markus > > > 2016-10-07 23:23 GMT+02:00 pa011 : >> Seems like e

Re: [tor-relays] Digital Ocean - running Exit node locked

2016-10-09 Thread pa011
OK further bad news, Exit shut down by DO yesterday. Here the latest statement from them: "Additionally, we are not allowing further TOR exit nodes on our infrastructure - they generate a large amount of abuse, are used for various illegal activities, and attract a large number of DDoS attacks.

Re: [tor-relays] Digital Ocean - running Exit node locked

2016-10-09 Thread pa011
> 2016-10-09 11:44 GMT+02:00 pa011 : >> OK further bad news, Exit shut down by DO yesterday. >> Here the latest statement from them: >> >> "Additionally, we are not allowing further TOR exit nodes on our >> infrastructure - they generate a large amount of abuse

[tor-relays] ISP, Abuses , Intrusion Prevention etc.

2016-10-09 Thread pa011
My personal efforts over the last months as well as the recent discussion about Intrusion prevention showed, there are more and more ISP's not giving support any more for running Tor exits, either in not allowing new ones or even shutting down existing ones. Sure there are still chances to find

Re: [tor-relays] TOR Services on Microsoft Azure

2016-10-12 Thread pa011
I do see kind of stagnation compared to other Exits in the same time frame. So I wondered what the connectivity is ? Its hard to find information about bandwidth and monthly traffic volume in regard to prices and location regarding Azure? Am 12.10.2016 um 18:15 schrieb nusenu: >> Update on my

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?

2016-10-17 Thread pa011
Thank you Toralf for you instructions and kick again. Following those > [2] https://zwiebeltoralf.de/torserver.html instruction do work but leave me with several unresolved queries: »deb.torproject.org« »archive.ubuntu.com« »security.debian.org« »ftp.de.debian.org« and a few more. What serve

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?

2016-10-17 Thread pa011
These errors do only get up when starting "apt-get update" not when "dig ftp.de.debian.org" - this gets solved well. Am 17.10.2016 um 19:00 schrieb pa011: > Thank you Toralf for you instructions and kick again. > > > Following those > >> [2

[tor-relays] DNS resolving -problem?

2016-10-18 Thread pa011
Got problems overnight. On all servers traffic died down and looks like below - what went wrong please? Here is what I did: apt-get install dnsmasq /etc/resolv.conf nameserver 127.0.0.1 /etc/dnsmasq.conf server=216.87.84.211 #open.nic us server=84.200.69.80 #dns.watch

[tor-relays] 33C3 Voucher

2016-10-25 Thread pa011
Anybody holding a Voucher for 33C3 in Hamburg at the End of December? More than happy to get hold of it :-) Paul ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] Abuses: Suspicious botnet ramnit attack

2016-10-27 Thread pa011
Hi, got the abuse below on three different exits. Anybody having any idea what to do and how to possibly to stop this in the future? Thanks Paul CERT-EU has received information regarding an infected IP belonging to your network, which may have security problems. The information regarding the

[tor-relays] 33C3 Ticket

2016-11-07 Thread pa011
First poor round of selling is over - anybody holding more tickets than he needs already? Would still take one :-) Paul ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Is my relay affected by cve-2016-8860?

2016-11-15 Thread pa011
Thank you Nusenu for your list. Maybe you can add a Nickname column next time for all those, who have more than one hamster in the race. Rgds Paul Am 15.11.2016 um 22:17 schrieb nusenu: > > https://blog.torproject.org/blog/tor-0289-released-important-fixes > > > If you are unsure whether yo

[tor-relays] 33C3 Ticket

2016-11-21 Thread pa011
Looking to meet other Exits in Hamburg - just need a ticket :-) Paul ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Blocking PSN

2016-11-29 Thread pa011
You can contact them on the given snei-noc-ab...@am.sony.com and they will give you a list of attacked IPs. Paul Am 29.11.2016 um 14:48 schrieb SuperSluether: > I keep getting Account Takeover Attempt abuses on my Tor exit, and I'm not > sure how to handle them: > > It is most likely the attac

[tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
There were some talks about network diversity recently, so I made up my mind and started a freeBSD server. On advice from here https://gist.github.com/teor2345/c6e2890c44097fd6aaceeedec08c6431 I placed a line in the torrc file "Log notice file /var/log/tor/log" Following these instructions fr

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
I saw that and tried "touch /var/log/tor" - didn’t help .. Am 01.12.2016 um 23:57 schrieb Marcel Krzystek: > It appears you have a space in "touch /var/log tor" that should not be there. > Try "touch /var/log/tor" instead. > > On Thu, Dec 1,

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
> > On Thu, Dec 1, 2016 at 4:01 PM, pa011 mailto:pa...@web.de>> > wrote: > > I saw that and tried "touch /var/log/tor" - didn’t help .. > > > Am 01.12.2016 um 23:57 schrieb Marcel Krzystek: > > It appears you have a space in "touc

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
Am 02.12.2016 um 00:19 schrieb diffusae: > Hi! > > On 02.12.2016 00:04, George wrote: >> Installing security/arm is simple enough. >> >> pkg install arm > > Yes, that normally should solve your problem. > > I've recognized that the dependencies are on Tor v0.2.8.9. > You can't install it with

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
Am 02.12.2016 um 00:21 schrieb Michael Armbruster: > On 2016-12-01 at 23:54, pa011 wrote: >> There were some talks about network diversity recently, so I made up my mind >> and started a freeBSD server. >> >> On advice from here >>

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
Am 02.12.2016 um 00:32 schrieb George: > On 12/01/16 18:25, pa011 wrote: >> >> >> Am 02.12.2016 um 00:19 schrieb diffusae: >>> Hi! >>> >>> On 02.12.2016 00:04, George wrote: >>>> Installing security/arm is simple enough. >>&g

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
solved, as far as I can see now - maybe more tomorrow.. Thank you very much gentlemen for your help :-) !!! Am 02.12.2016 um 00:51 schrieb diffusae: > ln -s /usr/local/bin/python2.7 /usr/local/bin/python ___ tor-relays mailing list tor-relays@lists.to

Re: [tor-relays] network diversity with freeBSD

2016-12-03 Thread pa011
n 02.12.2016 00:57, pa011 wrote: >> solved, as far as I can see now - maybe more tomorrow.. >> >> Thank you very much gentlemen for your help :-) !!! >> ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.t

Re: [tor-relays] security/tor ignores torrc Log setting?

2016-12-03 Thread pa011
Am 03.12.2016 um 17:13 schrieb nusenu: > >> By default, FreeBSD's tor and tor-devel port want to store logs inside >> /var/log/tor/ regardless of what you put in the /usr/local/etc/tor/torrc >> file last I looked. > > Are you sure? What security/tor package version was this? > This never happen

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-04 Thread pa011
Rana, I don’t think ""submit a patch" needs any clarification. Maybe you are a little bit to aggressive in your wording :-) ? I do have a dynamic IP as well on one relay and do know that frustration. Relax Paul Am 04.12.2016 um 19:23 schrieb Rana: > Please clarify what you mean by "submit a p

Re: [tor-relays] network diversity with freeBSD - solved

2016-12-05 Thread pa011
Working :-) It looks like it was missing the Address in torrc. I added up some RAM before- that didn’t help. Ok, now I have time to follow up all your other recommendations in the coming days. Thank you all very much for your help! Best Regards Paul p.s. as it is finally that easy to get BS

Re: [tor-relays] network diversity with freeBSD - solved

2016-12-05 Thread pa011
.9.5.a, if you > don't done this already (e. g. portsnap fetch update && portmaster > security/tor-devel). > > Regards, > > > On 05.12.2016 18:32, pa011 wrote: >> Working :-) >> >> It looks like it was missing the Address in torrc. >

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-05 Thread pa011
> I would like to hear about ONE Raspi Tor operator who was allowed by DirAuths > (or bwauths or whatever) to come even near 1 mbit/s bandwidth utilization > let me tell: https://atlas.torproject.org/#details/AA44C4BE3C90DCAAC09E5CD26150710AAA80D58B https://atlas.torproject.org/#details/CA9A

Re: [tor-relays] relays with dynamic IP - here Rasp2

2016-12-06 Thread pa011
Am 06.12.2016 um 18:16 schrieb Rana: > -Original Message- > From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf > Of pa011 > Sent: Tuesday, December 06, 2016 1:24 AM > To: tor-relays@lists.torproject.org > Subject: Re: [tor-relays] Unwarranted

Re: [tor-relays] torworld relays in entry and exit position

2016-12-10 Thread pa011
Very good Nusenu - I like your insistent dialogue and asking in this case :-) You are quite often referring to Ansible which is new to me. Is there a permanent free version around to let your https://github.com/nusenu/ansible-relayor run on it? Isn’t it somehow dangerous in the area we operate,

Re: [tor-relays] Network scan results for CVE-2016-5696 / RFC5961

2016-12-10 Thread pa011
> I would however be very interested to hear back from tor-relay operators > if any of them have found Challenge ACK counter values higher than > a million... which would indicate some kind of funny business. > Thanky you for your work. I know of 3 relays with ACK above 1 million: TCPChall

Re: [tor-relays] Network scan results for CVE-2016-5696 / RFC5961

2016-12-10 Thread pa011
Am 10.12.2016 um 21:12 schrieb Ivan Markin: > pa011: >> What about relays not on the list at all? > > You mean that are not subscribed for tor-relays@? No, forget that one - was my mistakable in the spreadsheet > > btw, it would be awesome to give away t-shirts or

Re: [tor-relays] ansible for tor relay ops

2016-12-11 Thread pa011
> >> Isn’t it somehow dangerous in the area we operate, to rely on a piece >> of software created more or less by a single person? > > Thanks for this question. Can you give a few examples for "dangerous" in > the context of your question so I might be able to address your concerns > more specif

Re: [tor-relays] The t-shirt organization thingy

2016-12-11 Thread pa011
> Hi Moritz, > > I do understand that it's hard to run an organization with too few > people, it's my daily life working for staff at my university (I am the > only administrator for 16 tablets, 34 laptops, 3 servers and 7 > thinclients, and we are not allowed to use centralized tools, I have to

[tor-relays] "Up-and-coming" Ticket - 33C3

2016-12-17 Thread pa011
Have Juniors interested in our work, likely to follow our steps or build new ones...need tickets for Hamburg 33C3 "Up-and-coming" would be great, but would consider "Standard" as well... Hopefully :-) Thanks and regards Paul ___ tor-relays mailing

Re: [tor-relays] MyFamily update required

2016-12-22 Thread pa011
Hi nusenu, thanks for your great work - lets assume for a second I would be with several relays on both of you lists: https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_operators.txt https://raw.githubusercontent.com/ornetstats/stats/master/o/potentially_dangerous_relaygroups

Re: [tor-relays] Tor Relay on ARM server Marvell Armada 370/XP

2016-12-23 Thread pa011
Am 20.12.2016 um 14:40 schrieb Volker Mink: > Is it OK with their TOS to run a TOR Relay7Exit? > If so, i really consider getting a VPS there! Volker - apart from not putting all eggs in the same basket (France as country and Online.net as ISP), but if you really wanna go there scaleway opened

[tor-relays] "[warn] Cannot make an outgoing connection without a DirPort" under BSD

2016-12-24 Thread pa011
I am running (FreeBSD 11.0-RELEASE-p2) Tor 0.2.8.11 getting following warnings while Self-testing indicates that DirPort is reachable from the outside? Can these warnings be ignored, while Tor is running properly afterwards ? Merry Christmas! Paul Dec 24 13:20:57.000 [notice] Bootstrapped 8

[tor-relays] MyFamily updated

2016-12-26 Thread pa011
Am 26.12.2016 um 14:53 schrieb nusenu: > > > Thanks for fixing it! > > +---++ > | nickname | eMyFamilyCount | > +---++ > | NeelTorRelay1 | 4. | > | NeelTorExitUSWest | 4. | > | NeelTorExitCZ

[tor-relays] 'MyFamily' .... torworld.org

2017-01-10 Thread pa011
Hi nusenu, thank you for your daily work about "MyFamily". Could you explain please why names like torworld.org, torservers.net, online de, etc. are not aggregated in one position on https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_operators.txt Would you judge torworld.or

Re: [tor-relays] 'MyFamily' .... torworld.org

2017-01-10 Thread pa011
Am 10.01.2017 um 21:01 schrieb nusenu: > > > pa011: >> Could you explain please why names like torworld.org, torservers.net, >> online de, etc. are not aggregated in one position on >> https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_

Re: [tor-relays] How to update tor on my raspberry

2016-01-10 Thread pa011
Hallo Volker, that looks strange. I do run a middle relay on raspian jessie and got it weeks ago by running your commands... /etc/apt/sources.list does have the following entries: deb http://archive.raspbian.org/raspbian jessie main contrib non-free deb-src http://archive.raspbian.org/raspbian j

[tor-relays] Traffic on a small Middle Relay, Advertised Bandwidth 1 MB/s

2016-01-12 Thread pa011
Since about 3 months i am running a small middle relay with Advertised Bandwidth of 1 MB/s. The ISP cuts the line every night as its common on most German private DSL. The relay therefore doesn't get a stable-flag :-( What is the amount of traffic i could/should possibly generate? Is a utilizati

[tor-relays] [warn] Bad password or authentication cookie on controller.

2016-01-21 Thread pa011
Hello, yesterday I got within a minute three times the above warning in my log file on Tor 0.2.7.6. Could somebody please explain to me what it means and how to solve? Is there a source where I can possibly find answers on this and other warnings? Thanks in advance Paul ___

Re: [tor-relays] Relays by AS Names

2016-04-08 Thread pa011
Two amendments at the moment from me: https://verelox.com does only offer a 1024 GB/month Transfer - unmetered is at about 60€/month hukot.net - is promising 100Mbits/s - reality after a month of testing at the cheapest rate shows sometimes only 10Mibts/s if at all Paul Am 06.04.2016 um 19:55

Re: [tor-relays] First Relay

2016-04-10 Thread pa011
Congratulation - I know that feeling very well ...one after another :-) Am 10.04.2016 um 21:08 schrieb KAW: > Got my first relay running for 4 days now :D > > > -KAW > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lis

[tor-relays] MaxMemInQueues is set to 256 MB

2016-04-27 Thread pa011
One of my small servers is running on Debian8 for weeks now. The memory is 256MB only. Arm is showing (Linux 3.16.0-4-a...) Tor 0.2.7.6 (recommended) cpu: 20.0% tor, 5.7% arm mem: 136 MB (56.5%) pid: 560 while some 20-40 Mbit/s are running through. The relay is connected to some 100Mbits/s

[tor-relays] Handling possible abuse requests

2016-05-18 Thread pa011
I am running some pretty good developing relays which I would like to change into exit-nodes over time. As I have no experience how to handle possible abuses I would need some help please? Is there anybody out there who can give me some advice, or even help me doing (answering) these? How many of

Re: [tor-relays] Handling possible abuse requests

2016-05-19 Thread pa011
19.05.2016 um 13:56 schrieb Moritz Bartl: > On 05/18/2016 10:13 PM, pa011 wrote: >> Is there anybody out there who can give me some advice, or even help me >> doing (answering) these? > > I think it is pretty much straightforward. You can explain what Tor is, > why you a

Re: [tor-relays] VPS for Exits

2016-05-21 Thread pa011
I contacted ITL (https://itldc.com/) as well two weeks ago. To me they refused opening an exit: "We decide to do not allow new public tor exit nodes in our network. Existing public tor exit nodes we be kept." Paul Am 21.05.2016 um 14:37 schrieb Neel Chauhan: >>Do you know of a VPS for an exit?

[tor-relays] tips-running-exit-node-minimal-harassment

2016-05-21 Thread pa011
This page https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment cant be found at the moment - anybody holding a copy of it please? There is something similar 6 years old: https://www.facebook.com/notes/tor-project/tips-for-running-an-exit-node-with-minimal-harassment/407918266

Re: [tor-relays] TOR router install without access to root

2016-05-25 Thread pa011
Hi Markus, on your hint I was just checking feralhosting.com. They are quoting: "We do not allow Tor exit nodes to be run on our servers. They're open invitations for trouble, and while Tor serves a useful purpose our network is not the place for it. Tor relays are fine provided they strictly onl

Re: [tor-relays] TOR router install without access to root

2016-05-25 Thread pa011
@Green Could please explain a bit more what you mean by "Avoiding using two nodes from the same AS would seemingly go a long way toward mitigating the attack vector you mentioned though." Thanks Paul Am 25.05.2016 um 21:22 schrieb Green Dream: > @Nils > > Tor path selection avoids using relays

Re: [tor-relays] TOR router install without access to root

2016-05-25 Thread pa011
@Green Thank you - couldn’t handle 'attack vector' as a synonym for ""method or type of attack" :-) Additional to that is it clever for a supporter of TOR to to run more than one Relay (Exit) with a single ISP or even AS https://en.wikipedia.org/wiki/Autonomous_system_(Internet) or does this build

[tor-relays] Questions on traffic differences between two Exit relays in two different locations

2016-06-02 Thread pa011
I would like to understand the working of two exit relays, one is about 7 days old -the other worked as a middle relay before and is an exit now for about two weeks. The second one has a higher potential connection up to 250 Mbit/s while the first is supposed to be limited on 100 Mbit/s. They both

Re: [tor-relays] Tor is Interrupting (?) OpenSSL Version Mismatch

2016-06-11 Thread pa011
Same problem here today after several updates... rpi-update doesn’t solve the issue unfortunately log-file looks like this: Jun 11 13:20:50.000 [notice] Clean shutdown finished. Exiting. Jun 11 13:20:53.000 [notice] Tor 0.2.7.6 (git-605ae665009853bd) opening log file. Jun 11 13:20:52.462 [warn] Op

Re: [tor-relays] Tor is Interrupting (?) OpenSSL Version Mismatch

2016-06-11 Thread pa011
as I guess ? and Raspbian 8 jessie ? > > Raspbian repo are ok, not as updated as the Tor repo, but it's working ;) > > > > Le 11/06/2016 à 13:32, pa011 a écrit : >> Same problem here today after several updates... >> rpi-update doesn’t solve the issue unfortu

Re: [tor-relays] Tor is Interrupting (?) OpenSSL Version Mismatch

2016-06-11 Thread pa011
I like to try this chnage as well - where do I find this file/parameter exactly? Thanks Am 11.06.2016 um 20:11 schrieb SuperSluether: > Fixed it! And I feel like I'm going crazy. If I'm reading the logs > correctly, Tor is signaling readiness to systemd /1 hundredth of a > second (0.01)/ past th

Re: [tor-relays] Tor Weather has been discontinued

2016-06-13 Thread pa011
I would offer 2 helping hands and possibly more as well to get this and my own shirt out - please contact me Paul Am 08.06.2016 um 18:05 schrieb l3thal.inject...@gmail.com: > If tor weather isn't running, and tshirt emails aren't being sent out, > is someone doing this manually then? How can I he

[tor-relays] Handling abuse - like to get your help please

2016-06-17 Thread pa011
As I am new to this business could somebody please give me a hint how to best handle such an abuse complain - possibly stop it? Thanks, Regards and a nice weekend. we have detected abuse from the IP address xxx.xxx.xxx,xxx, which according to a whois lookup is on your network. We would appreciat

Re: [tor-relays] Handling abuse - like to get your help please

2016-06-17 Thread pa011
gh ? Am 17.06.2016 um 21:42 schrieb Moritz Bartl: > On 06/17/2016 09:35 PM, pa011 wrote: >> As I am new to this business could somebody please give me a hint how to >> best handle such an abuse complain - possibly stop it? > > You can explain Tor, offer to block that destination f

Re: [tor-relays] Handling abuse - like to get your help please

2016-06-17 Thread pa011
Thank you Michael, solving that obviously easy question :-) So what was this "attac" then about, on which way, how can I see that ? Nice weekend to all Paul Am 17.06.2016 um 21:53 schrieb Michael Armbruster: > On 2016-06-17 at 21:51, pa011 wrote: >> Thank you both ! >

[tor-relays] [warn] eventdns: All nameservers have failed

2016-06-19 Thread pa011
Jun 19 20:24:38.000 [warn] eventdns: All nameservers have failed Jun 19 20:24:38.000 [notice] eventdns: Nameserver 8.8.4.4:53 is back up I do get this in my logs on an exit (Tor 0.2.7.6) several times every hour. The /etc/resolv.conf contains # Generated by SolusVM nameserver 8.8.8.8 nameserver

Re: [tor-relays] Handling abuse - like to get your help please

2016-06-20 Thread pa011
gt; whatever you want, this is just my advice and purely informational. I > run quite a bunch of exits. > > On 6/17/2016 11:12 PM, pa011 wrote: >> Thank you Michael, solving that obviously easy question :-) >> >> So what was this "attac" then about, on which way, how c

Re: [tor-relays] Handling abuse - like to get your help please

2016-06-21 Thread pa011
f so which ones? - are ISP's treated different in different parts of the world? Answers here might help me and others in bringing forward the discussion with them. Paul Am 21.06.2016 um 15:38 schrieb BlinkTor: > On Jun 20, 2016, at 4:19 AM, pa011 wrote: >> >> Hi all, >

[tor-relays] If you get weird crashes, that might be why

2016-06-26 Thread pa011
On start-up my Exit (Linux 3.16.0-4-amd64) Tor 0.2.7.6 creates this log message: [warn] OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 100010bf: Op$bf: OpenSSL 1.0.1k 8 Jan 2015; running with 1000114f: OpenSS

Re: [tor-relays] If you get weird crashes, that might be why

2016-06-26 Thread pa011
d about 50 percent -disk space more than enough. Am 26.06.2016 um 19:39 schrieb Yuriy M. Kaminskiy: > On 26.06.2016 16:22, pa011 wrote: >> On start-up my Exit (Linux 3.16.0-4-amd64) Tor 0.2.7.6 creates this log >> message: >> >> [warn] OpenSSL version from headers does n

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-01 Thread pa011
Hi Patrick, I do have the same issue with Debian, but didn’t find any documentation that worked really. Could you please let me know in detail what you did, if it is going well with you? Thank you -best regards Paul Am 28.06.2016 um 10:37 schrieb Patrick ZAJDA: > Hi Peter, > > I strangely didn

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-01 Thread pa011
Hi, thank you for that link. Unfortunately I have to out myself as I am a newbe and don’t know how to get it working. I can see - the tool https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create . Do I have to download it? If so where to? Sorry cant be more precise with my

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-02 Thread pa011
Ok - I do have it and I installed a second instance called "tor2". I can control the first instance of Tor as usual with arm but how can I now control the running of "tor2" with arm? When calling arm with "sudo -u _tor-tor2 arm" I get asked for a Controller password even while having a HashedCont

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-02 Thread pa011
ID: 710 (code=exited, status=1/FAILURE) Am 02.07.2016 um 16:02 schrieb pa011: > Ok - I do have it and I installed a second instance called "tor2". > > I can control the first instance of Tor as usual with arm but how can I > now control the running of "tor2" wit

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-02 Thread pa011
Ok - "Log notice file /var/log/tor/notices2.log" removed from torrc, but that doesn’t influence the error message from systemctl in no way. Still not working ! Does the machine on which I like to add this second instance have more than one core?? I don’t want to use ansible at the moment - that

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-03 Thread pa011
Am 02.07.2016 um 20:14 schrieb Peter Palfrader: > On Sat, 02 Jul 2016, pa011 wrote: > >> Ok - "Log notice file /var/log/tor/notices2.log" removed from >> torrc, but that doesn’t influence the error message from systemctl >> in no way. >> >> Sti

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-03 Thread pa011
Am 03.07.2016 um 13:03 schrieb Peter Palfrader: > Let me read this for you. > > On Sun, 03 Jul 2016, pa011 wrote: > >> Jul 3 12:09:27 tor[4532]: Jul 03 12:09:27.590 [notice] Opening OR listener >> on 0.0.0.0:443 >> Jul 3 12:09:27 tor[4532]: Jul 03 12:09:2

  1   2   >