Re: [tor-relays] Middle relay IP blocking

2023-08-09 Thread torserver
Gus,

thanks for the advices on both subjects, and the links to the recipes for both 
the RPI install including TOR updates, and the Snowflake proxy. I 'll try the 
Snowflake first.

Regards, torserver.

> Op 08-08-2023 22:39 CEST schreef gus :
> 
>  
> >Why is there no perfectly detailed instruction to install a relay on the 
> >Raspberry? 
> 
> There are a few projects like pi-relay[1], but if you're using a
> Debian-like system, the installation is very straight forward. 
> 
> However, the main issue is not the installation. The most significant
> issue involves opening and forwarding ports on your modem. Sometimes
> this process may require contacting your ISP and asking for support.
> 
> > Snowflake almost uses no data with a few occasional users. I 'd like to use 
> > my 100 Megabits more efficient.
> 
> If you're seeing just "a few occasional users", maybe you need to check
> your NAT settings or your proxy installation. All my snowflake
> standalone proxies[2] (NAT type 'unrestricted') are getting more than
> 200 connections per hour and ~7 TiB per month.
> 
> cheers,
> Gus
> 
> [1] https://github.com/scidsg/pi-relay
> [2] https://community.torproject.org/relay/setup/snowflake/standalone/
> 
> On Tue, Aug 08, 2023 at 07:24:12PM +0200, torserver wrote:
> > Roger,
> > 
> > I had the same problem with 3 financial websites blocking my IP address 
> > while running a middle relay. Exactly 5 days after stopping the relay these 
> > sites can be reached again. They probably use the same mechanism, visible 
> > in the TPRB Firefox plug-in.
> > 
> > I run my home relay on a low energy consuming Raspberry Pi. Why is there no 
> > perfectly detailed instruction to install a relay on the Raspberry? With 
> > its built-in VNC it can be managed by SSH and remote desktop perfectly. 
> > Then there is no need for data congestion on a few cheap providers. One 
> > Watt power consumption only costs 3 Euros a year.
> > 
> > Snowflake almost uses no data with a few occasional users. I 'd like to use 
> > my 100 Megabits more efficient.
> > 
> > Regards, me.
> > 
> > > Date: Tue, 8 Aug 2023 02:32:03 -0400
> > > From: Roger Dingledine 
> > > To: tor-relays@lists.torproject.org
> > > Subject: Re: [tor-relays] Middle relay IP blocking
> > > Message-ID: 
> > > Content-Type: text/plain; charset=us-ascii
> > > 
> > > On Mon, Aug 07, 2023 at 11:28:32PM +0300, s7r wrote:
> > > > While all the above is true, a thing to remember is to make sure we 
> > > > don't
> > > > end up all renting too many VPS'es or dedicated servers in the same 
> > > > places /
> > > > same AS numbers - we need network diversity, it is a very important 
> > > > factor,
> > > > more AS numbers, more providers, more physical locations, etc. So, 
> > > > running
> > > > at home is super good and recommended from this perspective, provides us
> > > > with the diversity we need, however not being to login to online 
> > > > banking to
> > > > pay an electricity bill because of a middle relay is also way too 
> > > > annoying..
> > > > however who can afford the hassle should definitely run a middle relay 
> > > > or
> > > > bridge at home
> > > 
> > > Yes, exactly this. If you are interested in running a non-exit relay at
> > > home, and you can tolerate the hassles from occasionally finding that
> > > some service doesn't want to hear from you, then you are definitely
> > > helping the diversity of the Tor network.
> > > 
> > > Having the Tor traffic concentrated at a few cheapo providers like Hetzner
> > > and OVH is not only scary in the sense that too much traffic goes through
> > > too few cables, but it's also scary because it increases the appeal for
> > > somebody to attack those few companies, either by breaking into their
> > > infrastructure to watch traffic or through more traditional insider
> > > threats like getting an employee there to help them monitor traffic.
> > > 
> > > The internet already has uncomfortably many bottlenecks -- too few
> > > undersea cables, too few Content Distribution Networks (CDNs), too few
> > > app stores, etc.
> > > 
> > > > (even Exit relay, I do run an Exit relay at my office place
> > > > and I had one police visit in like 8 years or so).
> > > 
> > > Follow this advice only with great cau

Re: [tor-relays] Middle relay IP blocking

2023-08-08 Thread Gary C. New via tor-relays
On Tuesday, August 8, 2023, 10:24:44 AM MDT,  wrote:
 
 
 On Dienstag, 8. August 2023 00:30:38 CEST Gary C. New via tor-relays wrote:

> > In addition to network diversity, there is the fact that most individuals
> > find it necessary to run an at Home internet connection 24 x 7 x 365. So...
> > Other than for the reasons inspired by the subject of this post, why not
> > just run a low-resource consuming Tor server at home, too,

> Most people definitely have the router on all the time. I saw > this recently 
>> because I wanted to run a bridge for Turkmenistan at home:
> On Ubiquity EdgeOS Router (Vyatta/Debian based) you can > 'apt install tor'> 
>OPNsense (FreeBSD based): https://docs.opnsense.org/manual/how-tos/tor.html
Similarly, Tor can be installed on network devices (i.e., Mikrotik, etc) that 
use OpenWRT or Entware packages with "opkg install tor".
Thanks, again, for dropping some knowledge on us, Marco.  ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-08 Thread gus
>Why is there no perfectly detailed instruction to install a relay on the 
>Raspberry? 

There are a few projects like pi-relay[1], but if you're using a
Debian-like system, the installation is very straight forward. 

However, the main issue is not the installation. The most significant
issue involves opening and forwarding ports on your modem. Sometimes
this process may require contacting your ISP and asking for support.

> Snowflake almost uses no data with a few occasional users. I 'd like to use 
> my 100 Megabits more efficient.

If you're seeing just "a few occasional users", maybe you need to check
your NAT settings or your proxy installation. All my snowflake
standalone proxies[2] (NAT type 'unrestricted') are getting more than
200 connections per hour and ~7 TiB per month.

cheers,
Gus

[1] https://github.com/scidsg/pi-relay
[2] https://community.torproject.org/relay/setup/snowflake/standalone/

On Tue, Aug 08, 2023 at 07:24:12PM +0200, torserver wrote:
> Roger,
> 
> I had the same problem with 3 financial websites blocking my IP address while 
> running a middle relay. Exactly 5 days after stopping the relay these sites 
> can be reached again. They probably use the same mechanism, visible in the 
> TPRB Firefox plug-in.
> 
> I run my home relay on a low energy consuming Raspberry Pi. Why is there no 
> perfectly detailed instruction to install a relay on the Raspberry? With its 
> built-in VNC it can be managed by SSH and remote desktop perfectly. Then 
> there is no need for data congestion on a few cheap providers. One Watt power 
> consumption only costs 3 Euros a year.
> 
> Snowflake almost uses no data with a few occasional users. I 'd like to use 
> my 100 Megabits more efficient.
> 
> Regards, me.
> 
> > Date: Tue, 8 Aug 2023 02:32:03 -0400
> > From: Roger Dingledine 
> > To: tor-relays@lists.torproject.org
> > Subject: Re: [tor-relays] Middle relay IP blocking
> > Message-ID: 
> > Content-Type: text/plain; charset=us-ascii
> > 
> > On Mon, Aug 07, 2023 at 11:28:32PM +0300, s7r wrote:
> > > While all the above is true, a thing to remember is to make sure we don't
> > > end up all renting too many VPS'es or dedicated servers in the same 
> > > places /
> > > same AS numbers - we need network diversity, it is a very important 
> > > factor,
> > > more AS numbers, more providers, more physical locations, etc. So, running
> > > at home is super good and recommended from this perspective, provides us
> > > with the diversity we need, however not being to login to online banking 
> > > to
> > > pay an electricity bill because of a middle relay is also way too 
> > > annoying..
> > > however who can afford the hassle should definitely run a middle relay or
> > > bridge at home
> > 
> > Yes, exactly this. If you are interested in running a non-exit relay at
> > home, and you can tolerate the hassles from occasionally finding that
> > some service doesn't want to hear from you, then you are definitely
> > helping the diversity of the Tor network.
> > 
> > Having the Tor traffic concentrated at a few cheapo providers like Hetzner
> > and OVH is not only scary in the sense that too much traffic goes through
> > too few cables, but it's also scary because it increases the appeal for
> > somebody to attack those few companies, either by breaking into their
> > infrastructure to watch traffic or through more traditional insider
> > threats like getting an employee there to help them monitor traffic.
> > 
> > The internet already has uncomfortably many bottlenecks -- too few
> > undersea cables, too few Content Distribution Networks (CDNs), too few
> > app stores, etc.
> > 
> > > (even Exit relay, I do run an Exit relay at my office place
> > > and I had one police visit in like 8 years or so).
> > 
> > Follow this advice only with great caution. :) Many people happily
> > run their exit relay from their home, but it only takes one fresh new
> > cybercrime detective (trying to make a name for himself by kicking down
> > a door at 7am, and with no idea what Tor is) to ruin your day.
> > 
> > --Roger
> > 
> > 
> > 
> > --
> > 
> > Subject: Digest Footer
> > 
> > ___
> > tor-relays mailing list
> > tor-relays@lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> > 
> > 
> > --
> > 
> > End of tor-relays Digest, Vol 151, Issue 9
> > **
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
The Tor Project
Community Team Lead


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-08 Thread torserver
Roger,

I had the same problem with 3 financial websites blocking my IP address while 
running a middle relay. Exactly 5 days after stopping the relay these sites can 
be reached again. They probably use the same mechanism, visible in the TPRB 
Firefox plug-in.

I run my home relay on a low energy consuming Raspberry Pi. Why is there no 
perfectly detailed instruction to install a relay on the Raspberry? With its 
built-in VNC it can be managed by SSH and remote desktop perfectly. Then there 
is no need for data congestion on a few cheap providers. One Watt power 
consumption only costs 3 Euros a year.

Snowflake almost uses no data with a few occasional users. I 'd like to use my 
100 Megabits more efficient.

Regards, me.

> Date: Tue, 8 Aug 2023 02:32:03 -0400
> From: Roger Dingledine 
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Middle relay IP blocking
> Message-ID: 
> Content-Type: text/plain; charset=us-ascii
> 
> On Mon, Aug 07, 2023 at 11:28:32PM +0300, s7r wrote:
> > While all the above is true, a thing to remember is to make sure we don't
> > end up all renting too many VPS'es or dedicated servers in the same places /
> > same AS numbers - we need network diversity, it is a very important factor,
> > more AS numbers, more providers, more physical locations, etc. So, running
> > at home is super good and recommended from this perspective, provides us
> > with the diversity we need, however not being to login to online banking to
> > pay an electricity bill because of a middle relay is also way too annoying..
> > however who can afford the hassle should definitely run a middle relay or
> > bridge at home
> 
> Yes, exactly this. If you are interested in running a non-exit relay at
> home, and you can tolerate the hassles from occasionally finding that
> some service doesn't want to hear from you, then you are definitely
> helping the diversity of the Tor network.
> 
> Having the Tor traffic concentrated at a few cheapo providers like Hetzner
> and OVH is not only scary in the sense that too much traffic goes through
> too few cables, but it's also scary because it increases the appeal for
> somebody to attack those few companies, either by breaking into their
> infrastructure to watch traffic or through more traditional insider
> threats like getting an employee there to help them monitor traffic.
> 
> The internet already has uncomfortably many bottlenecks -- too few
> undersea cables, too few Content Distribution Networks (CDNs), too few
> app stores, etc.
> 
> > (even Exit relay, I do run an Exit relay at my office place
> > and I had one police visit in like 8 years or so).
> 
> Follow this advice only with great caution. :) Many people happily
> run their exit relay from their home, but it only takes one fresh new
> cybercrime detective (trying to make a name for himself by kicking down
> a door at 7am, and with no idea what Tor is) to ruin your day.
> 
> --Roger
> 
> 
> 
> --
> 
> Subject: Digest Footer
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
> 
> --
> 
> End of tor-relays Digest, Vol 151, Issue 9
> **
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-08 Thread lists
On Dienstag, 8. August 2023 00:30:38 CEST Gary C. New via tor-relays wrote:

> In addition to network diversity, there is the fact that most individuals
> find it necessary to run an at Home internet connection 24 x 7 x 365. So...
> Other than for the reasons inspired by the subject of this post, why not
> just run a low-resource consuming Tor server at home, too,

Most people definitely have the router on all the time. I saw this recently 
because I wanted to run a bridge for Turkmenistan at home:
On Ubiquity EdgeOS Router (Vyatta/Debian based) you can 'apt install tor'
OPNsense (FreeBSD based): https://docs.opnsense.org/manual/how-tos/tor.html



-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-08 Thread Eddie



On 8/7/2023 1:28 PM, s7r wrote:

li...@for-privacy.net wrote:

On Samstag, 5. August 2023 08:40:42 CEST Marco Predicatori wrote:

secureh...@gmail.com wrote on 8/4/23 01:46:
I tried reporting a similar issue a few months ago (post wasn’t 
approved

by
moderator). I was running a relay from my home ISP. After a short 
while

certain websites became inaccessible from other computers in my home
network that shared the same public IP. After trial and error with 
other

IP addresses (non-Tor) I realized commercial gateway services had
blacklisted our IP address.


Same here, middle node. In order to access some sites, I have to 
shut down

briefly my modem in order to obtain a new IP, and for a while all goes
smoothly again.


Hi @all,

Just my 2 cents. Is this worth the hassle?
Calculate your power consumption 24x7x30 @home.

For 1-5$ you can get a VPS.
This exit has 1GB RAM and 1CPU and costs $3.50/month
https://metrics.torproject.org/rs.html#details/376DC7CAD597D3A4CBB651999CFAD0E77DC9AE8C 



Search or ask for offers on LEB & LET:
https://lowendbox.com/
https://lowendtalk.com/discussion/185210/tor-relay-bridge

$websearch: cheap vps unlimited bandwidth
IONOS 1,-EUR/Month - 1GB RAM - 1vCore unlimited bandwidth - prepaid 
(=no contract term)

https://www.ionos.de/server/vps

Dedicated server for $15 per month: 4 Cores/4 threads - 16GB DDR3 - 5 
usable IPv4  :-)

https://www.nocix.net/cart/?id=261


While all the above is true, a thing to remember is to make sure we 
don't end up all renting too many VPS'es or dedicated servers in the 
same places / same AS numbers - we need network diversity, it is a 
very important factor, more AS numbers, more providers, more physical 
locations, etc. So, running at home is super good and recommended from 
this perspective, provides us with the diversity we need, however not 
being to login to online banking to pay an electricity bill because of 
a middle relay is also way too annoying.. however who can afford the 
hassle should definitely run a middle relay or bridge at home (even 
Exit relay, I do run an Exit relay at my office place and I had one 
police visit in like 8 years or so).


The problem here is with the people who treat 1 IP address = 1 person, 
this assumption which is 3 decades old should disappear once and 
forever. I cannot imagine what kind of an IT/security expert would use 
a black list (haha) that contains Tor relays (double haha) and also 
applies same restrictions to *middle* relays (triple haha). There are 
so many ways to properly handle an IP address that sends 
robotic/unrequested traffic which are so obvious I'm not going to spam 
the list to enumerate them.


As much as I would like to laugh along with you, it's clearly the case 
from my experiences, and some of the folks in this thread, that there 
are some major outsourced firewall/protection companies who 
unfortunately do have the IT/security folks you can't imagine.  I've 
spoken to one senior network technician at a major US wide bank because 
after running a middle relay for 5 years with only minor issues, my wife 
who works from home for the bank was suddenly blocked from accessing the 
bank network.  He fully understood what a middle relay was and was quite 
happy for me to run one, but was unable to do anything as they had just 
outsourced the network "protection" and whoever they had outsourced to 
was classing the middle relay as a threat, and so blocking her access.


Cheers.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-08 Thread Roger Dingledine
On Mon, Aug 07, 2023 at 11:28:32PM +0300, s7r wrote:
> While all the above is true, a thing to remember is to make sure we don't
> end up all renting too many VPS'es or dedicated servers in the same places /
> same AS numbers - we need network diversity, it is a very important factor,
> more AS numbers, more providers, more physical locations, etc. So, running
> at home is super good and recommended from this perspective, provides us
> with the diversity we need, however not being to login to online banking to
> pay an electricity bill because of a middle relay is also way too annoying..
> however who can afford the hassle should definitely run a middle relay or
> bridge at home

Yes, exactly this. If you are interested in running a non-exit relay at
home, and you can tolerate the hassles from occasionally finding that
some service doesn't want to hear from you, then you are definitely
helping the diversity of the Tor network.

Having the Tor traffic concentrated at a few cheapo providers like Hetzner
and OVH is not only scary in the sense that too much traffic goes through
too few cables, but it's also scary because it increases the appeal for
somebody to attack those few companies, either by breaking into their
infrastructure to watch traffic or through more traditional insider
threats like getting an employee there to help them monitor traffic.

The internet already has uncomfortably many bottlenecks -- too few
undersea cables, too few Content Distribution Networks (CDNs), too few
app stores, etc.

> (even Exit relay, I do run an Exit relay at my office place
> and I had one police visit in like 8 years or so).

Follow this advice only with great caution. :) Many people happily
run their exit relay from their home, but it only takes one fresh new
cybercrime detective (trying to make a name for himself by kicking down
a door at 7am, and with no idea what Tor is) to ruin your day.

--Roger

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-07 Thread lists
On Montag, 7. August 2023 22:28:32 CEST s7r wrote:

> While all the above is true, a thing to remember is to make sure we 
> don't end up all renting too many VPS'es or dedicated servers in the 
> same places / same AS numbers - we need network diversity,
Especially at the exits, which unfortunately occur in a few places and in 
large heaps. Approx 50%: Berlin Germany, Utrecht Netherlands, Roost 
Luxembourg.

> it is a very 
> important factor, more AS numbers, more providers, more physical 
> locations, etc. So, running at home is super good and recommended from 
> this perspective, provides us with the diversity we need,

You made a good list of underused ISP's on lowendtalk and on nusenu's 
OrNetStat there are over 500 AS where only 1 or 2 relays are running. There 
should be enough data centers in the world to achieve diversity even without 
running at home.
https://nusenu.github.io/OrNetStats/#autonomous-systems-by-cw-fraction

Runnig snowflake @home is a nice option. Many relays @home only have kbit/s of 
bandwidth. In my humble opinion, a Tor relay should offer at least 10 MB/s.

> however who can afford the 
> hassle should definitely run a middle relay or bridge at home
Yes, anyone with a good internet connection at home can do this.
At least in Germany, every ISP offers its customers a http & ftp proxy. Use 
them in your browser or OS. This might have less of a problem running Tor 
relays at home. Because most websites will then see the proxy IP.

> (even Exit 
> relay, I do run an Exit relay at my office place and I had one police 
> visit in like 8 years or so).
@office is different than @home. I wouldn't advise anyone to run an exit at 
home.
It's no fun when the cops ring at 6:00 am and search your whole apartment. And 
if you're unlucky, they take all computers, cell phones and other 'things'.

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-07 Thread Gary C. New via tor-relays
On Monday, August 7, 2023, 2:28:56 PM MDT, s7r  wrote:
 
 
 li...@for-privacy.net wrote:
> On Samstag, 5. August 2023 08:40:42 CEST Marco Predicatori wrote:
>> secureh...@gmail.com wrote on 8/4/23 01:46:
>>> I tried reporting a similar issue a few months ago (post wasn’t approved
>>> by
>>> moderator). I was running a relay from my home ISP. After a short while
>>> certain websites became inaccessible from other computers in my home
>>> network that shared the same public IP. After trial and error with other
>>> IP addresses (non-Tor) I realized commercial gateway services had
>>> blacklisted our IP address.
>>
>> Same here, middle node. In order to access some sites, I have to shut down
>> briefly my modem in order to obtain a new IP, and for a while all goes
>> smoothly again.
> 
> Hi @all,
> 
> Just my 2 cents. Is this worth the hassle?
> Calculate your power consumption 24x7x30 @home.
> 
> For 1-5$ you can get a VPS.
> This exit has 1GB RAM and 1CPU and costs $3.50/month
> https://metrics.torproject.org/rs.html#details/376DC7CAD597D3A4CBB651999CFAD0E77DC9AE8C
> 
> Search or ask for offers on LEB & LET:
> https://lowendbox.com/
> https://lowendtalk.com/discussion/185210/tor-relay-bridge
> 
> $websearch: cheap vps unlimited bandwidth
> IONOS 1,-EUR/Month - 1GB RAM - 1vCore unlimited bandwidth - prepaid (=no 
> contract term)
> https://www.ionos.de/server/vps
> 
> Dedicated server for $15 per month: 4 Cores/4 threads - 16GB DDR3 - 5 usable 
> IPv4  :-)
> https://www.nocix.net/cart/?id=261> 
> 
> While all the above is true, a thing to remember is to make sure we 
> don't end up all renting too many VPS'es or dedicated servers in the 
> same places / same AS numbers - we need network diversity, it is a very 
> important factor, more AS numbers, more providers, more physical 
> locations, etc. So, running at home is super good and recommended from 
> this perspective, provides us with the diversity we need, however not 
> being to login to online banking to pay an electricity bill because of a 
> middle relay is also way too annoying.. however who can afford the 
> hassle should definitely run a middle relay or bridge at home (even Exit 
> relay, I do run an Exit relay at my office place and I had one police 
> visit in like 8 years or so).


Marco... Thanks for the great VPS information.
In addition to network diversity, there is the fact that most individuals find 
it necessary to run an at Home internet connection 24 x 7 x 365. So... Other 
than for the reasons inspired by the subject of this post, why not just run a 
low-resource consuming Tor server at home, too, which meets the requirements 
and continual request for Tor Bridges?
Moreover... In the Tor documentation describing the various relays, it might be 
wise to highly recommend that new at Home operators focus their resources 
toward Tor Bridges (opposed to Relays) to avoid this common pitfall.
Just my 2¢.  ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-07 Thread s7r

li...@for-privacy.net wrote:

On Samstag, 5. August 2023 08:40:42 CEST Marco Predicatori wrote:

secureh...@gmail.com wrote on 8/4/23 01:46:

I tried reporting a similar issue a few months ago (post wasn’t approved
by
moderator). I was running a relay from my home ISP. After a short while
certain websites became inaccessible from other computers in my home
network that shared the same public IP. After trial and error with other
IP addresses (non-Tor) I realized commercial gateway services had
blacklisted our IP address.


Same here, middle node. In order to access some sites, I have to shut down
briefly my modem in order to obtain a new IP, and for a while all goes
smoothly again.


Hi @all,

Just my 2 cents. Is this worth the hassle?
Calculate your power consumption 24x7x30 @home.

For 1-5$ you can get a VPS.
This exit has 1GB RAM and 1CPU and costs $3.50/month
https://metrics.torproject.org/rs.html#details/376DC7CAD597D3A4CBB651999CFAD0E77DC9AE8C

Search or ask for offers on LEB & LET:
https://lowendbox.com/
https://lowendtalk.com/discussion/185210/tor-relay-bridge

$websearch: cheap vps unlimited bandwidth
IONOS 1,-EUR/Month - 1GB RAM - 1vCore unlimited bandwidth - prepaid (=no 
contract term)
https://www.ionos.de/server/vps

Dedicated server for $15 per month: 4 Cores/4 threads - 16GB DDR3 - 5 usable 
IPv4  :-)
https://www.nocix.net/cart/?id=261


While all the above is true, a thing to remember is to make sure we 
don't end up all renting too many VPS'es or dedicated servers in the 
same places / same AS numbers - we need network diversity, it is a very 
important factor, more AS numbers, more providers, more physical 
locations, etc. So, running at home is super good and recommended from 
this perspective, provides us with the diversity we need, however not 
being to login to online banking to pay an electricity bill because of a 
middle relay is also way too annoying.. however who can afford the 
hassle should definitely run a middle relay or bridge at home (even Exit 
relay, I do run an Exit relay at my office place and I had one police 
visit in like 8 years or so).


The problem here is with the people who treat 1 IP address = 1 person, 
this assumption which is 3 decades old should disappear once and 
forever. I cannot imagine what kind of an IT/security expert would use a 
black list (haha) that contains Tor relays (double haha) and also 
applies same restrictions to *middle* relays (triple haha). There are so 
many ways to properly handle an IP address that sends 
robotic/unrequested traffic which are so obvious I'm not going to spam 
the list to enumerate them.




OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-07 Thread lists
On Samstag, 5. August 2023 08:40:42 CEST Marco Predicatori wrote:
> secureh...@gmail.com wrote on 8/4/23 01:46:
> > I tried reporting a similar issue a few months ago (post wasn’t approved
> > by
> > moderator). I was running a relay from my home ISP. After a short while
> > certain websites became inaccessible from other computers in my home
> > network that shared the same public IP. After trial and error with other
> > IP addresses (non-Tor) I realized commercial gateway services had
> > blacklisted our IP address.
> 
> Same here, middle node. In order to access some sites, I have to shut down
> briefly my modem in order to obtain a new IP, and for a while all goes
> smoothly again.

Hi @all,

Just my 2 cents. Is this worth the hassle?
Calculate your power consumption 24x7x30 @home.

For 1-5$ you can get a VPS.
This exit has 1GB RAM and 1CPU and costs $3.50/month
https://metrics.torproject.org/rs.html#details/376DC7CAD597D3A4CBB651999CFAD0E77DC9AE8C

Search or ask for offers on LEB & LET:
https://lowendbox.com/
https://lowendtalk.com/discussion/185210/tor-relay-bridge

$websearch: cheap vps unlimited bandwidth
IONOS 1,-EUR/Month - 1GB RAM - 1vCore unlimited bandwidth - prepaid (=no 
contract term)
https://www.ionos.de/server/vps

Dedicated server for $15 per month: 4 Cores/4 threads - 16GB DDR3 - 5 usable 
IPv4  :-)
https://www.nocix.net/cart/?id=261

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-07 Thread Marco Predicatori

secureh...@gmail.com wrote on 8/4/23 01:46:

I tried reporting a similar issue a few months ago (post wasn’t approved by
moderator). I was running a relay from my home ISP. After a short while
certain websites became inaccessible from other computers in my home network
that shared the same public IP. After trial and error with other IP addresses
(non-Tor) I realized commercial gateway services had blacklisted our IP
address.


Same here, middle node. In order to access some sites, I have to shut down 
briefly my modem in order to obtain a new IP, and for a while all goes smoothly 
again.


--
https://metrics.torproject.org/rs.html#details/A4E74410D83705EEFF24BC265DE2B2FF39BDA56E
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-04 Thread Pascal Terjan
On Thu, 3 Aug 2023, 15:57 Roman Mamedov,  wrote:

> On Tue, 1 Aug 2023 23:14:28 +0200
> Eldalië via tor-relays  wrote:
>
> > Hello there!
> > I've been running for over 1.5 year a middle relay on an IP address I
> also use
> > to browse, withous issues. However it's now some weeks since many
> websites that
> > always refused tor traffic started to also refuse normal traffic from my
> IP. I
> > suppose this is related to the relay, because I don't run any other
> "suspect"
> > service on this IP and when I change it the problem is gone for a few
> hours.
> > My guess is that some widely used black list started including middle
> relay
> > IPs, but I have no proofs.
> > Has anyone had similar experiences? Any thoughts on this?
>
> For me this has always been the case, since many years ago. It is
> surprising
> you did not have issues for 1.5 years.
>
> It is probably this list: https://www.dan.me.uk/tornodes
> It has explanation text in bold, but nobody reads that.
> Or just the Tor relay lists that can be fetched from the Tor project
> directly.
>

I stopped running a relay at home years ago (due to moving home and going
from 1Gbps upload to 10Mbps) but had had the problem with a third party
used by an airline starting to use that list.

It may be better nowadays as most things are available over IPv6 so I
wouldn't care as much if my IPv4 gets blocked and hopefully they wouldn't
block more than a /64 for IPv6.

>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-04 Thread securehell
I tried reporting a similar issue a few months ago (post wasn’t approved by 
moderator). I was running a relay from my home ISP. After a short while certain 
websites became inaccessible from other computers in my home network that 
shared the same public IP. After trial and error with other IP addresses 
(non-Tor) I realized commercial gateway services had blacklisted our IP address.

After several weeks of running a Relay I shut it down and after a few days we 
could access the websites again from our IP.

The ISP didn’t understand when I reported it and just wanted to upsell me a 
business plan.

Live and learn. The Tor network was the victim. You are correct that by 
publishing entry, relay and exit node IP addresses for the Tor network, it’s an 
easy target for commercial services to indiscriminately blacklist any IP 
addresses associated with Tor. Sharing your IP with a relay and your personal 
use might get you blocked.

I hope this post gets approved.

> On Aug 3, 2023, at 7:47 AM, Eldalië via tor-relays 
>  wrote:
> 
> Hello there!
> I've been running for over 1.5 year a middle relay on an IP address I also use
> to browse, withous issues. However it's now some weeks since many websites 
> that
> always refused tor traffic started to also refuse normal traffic from my IP. I
> suppose this is related to the relay, because I don't run any other "suspect"
> service on this IP and when I change it the problem is gone for a few hours.
> My guess is that some widely used black list started including middle relay
> IPs, but I have no proofs.
> Has anyone had similar experiences? Any thoughts on this?
> Thanks,
> 
> Eldalië
> 
> 
> --
> Eldalië
> My private key is attached. Please, use it and provide me yours!
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-03 Thread Gary C. New via tor-relays
As an at-Home, Middle-Relay operator, I experienced similar issues. Initially, 
I attempted to solve the problem by using dnsmasq + nginx to reverse proxy the 
blacklisted sites through a dedicated vpn, which worked... with some issues.
As the issues increased, I decided to secure a new IP Address and pivot to an 
at-Home, Bridge operator, which has been trouble free and much more amenable to 
at-Home operation.
Thanks for running a Tor Relay... or Bridge. 

On Thursday, August 3, 2023, 1:58:08 PM MDT, telekobold 
 wrote:  
 
 Hi,

On 03.08.23 14:22, Logforme wrote:

> My "solution" for now is to use my phone's internet sharing when I have 
> to contact these sites. Since it only is a few sites which I contact 
> rarely this works, but as more and more sites outsource their security 
> to third parties I expect this to be a growing problem. Eventually I 
> might no longer be able to run a relay.

instead of turning down your relay, you could change it to a cloud hoster.

I e.g. would suggest the German provider Hetzner [*] - you have 
20TB/month free traffic for only a few euros. Since the IP address of 
your relay is publicly known anyway, it also doesn't matter as much as 
with a bridge if the relay is running at a cloud provider (e.g. 
regarding the situation in Turkmenistan). The disadvantage is, of 
course, less diversity in the number of networks in which the relays are 
distributed.

Kind regards
telekobold

[*] https://www.hetzner.com/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
  ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-03 Thread telekobold

Hi,

On 03.08.23 14:22, Logforme wrote:

My "solution" for now is to use my phone's internet sharing when I have 
to contact these sites. Since it only is a few sites which I contact 
rarely this works, but as more and more sites outsource their security 
to third parties I expect this to be a growing problem. Eventually I 
might no longer be able to run a relay.


instead of turning down your relay, you could change it to a cloud hoster.

I e.g. would suggest the German provider Hetzner [*] - you have 
20TB/month free traffic for only a few euros. Since the IP address of 
your relay is publicly known anyway, it also doesn't matter as much as 
with a bridge if the relay is running at a cloud provider (e.g. 
regarding the situation in Turkmenistan). The disadvantage is, of 
course, less diversity in the number of networks in which the relays are 
distributed.


Kind regards
telekobold

[*] https://www.hetzner.com/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-03 Thread Logforme

On 2023-08-01 23:14, Eldalië via tor-relays wrote:

My guess is that some widely used black list started including middle relay
IPs, but I have no proofs.
Has anyone had similar experiences? Any thoughts on this?


I run a non-exit relay at home and have run into the same issue.
Some Swedish government sites use a third party for handling log ins. A 
few months ago this third party started blocking non-exit relays. I 
tried to contact the government sites and explain the issue (exit vs 
non-exit IP lists etc). None of them said it was their policy to block 
non-exits but naturally pointed at the third party. I tried to contact 
them but got nowhere, maybe they outsource in their turn.


Since sites these days outsource so much it is hopeless to get through 
to anyone able or willing to fix an issue. I gave up after many emails.


My "solution" for now is to use my phone's internet sharing when I have 
to contact these sites. Since it only is a few sites which I contact 
rarely this works, but as more and more sites outsource their security 
to third parties I expect this to be a growing problem. Eventually I 
might no longer be able to run a relay.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay IP blocking

2023-08-03 Thread Roman Mamedov
On Tue, 1 Aug 2023 23:14:28 +0200
Eldalië via tor-relays  wrote:

> Hello there!
> I've been running for over 1.5 year a middle relay on an IP address I also use
> to browse, withous issues. However it's now some weeks since many websites 
> that
> always refused tor traffic started to also refuse normal traffic from my IP. I
> suppose this is related to the relay, because I don't run any other "suspect"
> service on this IP and when I change it the problem is gone for a few hours.
> My guess is that some widely used black list started including middle relay
> IPs, but I have no proofs.
> Has anyone had similar experiences? Any thoughts on this?

For me this has always been the case, since many years ago. It is surprising
you did not have issues for 1.5 years.

It is probably this list: https://www.dan.me.uk/tornodes
It has explanation text in bold, but nobody reads that.
Or just the Tor relay lists that can be fetched from the Tor project directly.

-- 
With respect,
Roman
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle relay IP blocking

2023-08-03 Thread Eldalië via tor-relays
Hello there!
I've been running for over 1.5 year a middle relay on an IP address I also use
to browse, withous issues. However it's now some weeks since many websites that
always refused tor traffic started to also refuse normal traffic from my IP. I
suppose this is related to the relay, because I don't run any other "suspect"
service on this IP and when I change it the problem is gone for a few hours.
My guess is that some widely used black list started including middle relay
IPs, but I have no proofs.
Has anyone had similar experiences? Any thoughts on this?
Thanks,

Eldalië


--
Eldalië
My private key is attached. Please, use it and provide me yours!


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle relay and snowflake

2022-11-09 Thread andrew reid
Is it possible to run a tor relay and a snowflake on the same IP. I have
had the snowflake add on installed on my browser for a few months and
noticed it has never gotten any traffic. Is this because of the tor relay
on the same IP ?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle Relay shows Adv. Bandwidth of 0 B on Tor-Metrics

2021-12-19 Thread petrarca--- via tor-relays
My middle relay 605EE4375EE4C38215C8949F5808863749FD4F4A crashed and I had to 
set it up from scratch. It's up again for over 14 hours now, and all logs and 
other checks I did look fine - the only thing which is strange is on the 
Tor-Metrics page showing "Advertised Bandwidth" as zero (0 B). Any idea what I 
might have missed or overlooked?___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] middle relay connexions dropped in half

2018-03-15 Thread torix
Thanks; this was a really helpful reply; when the electricity goes off, one 
tends to check one's own plug rather than think the main transformer just died. 
 
Especially the capacity/latency part; I would never have gotten that by myself.


​Sent with ProtonMail Secure Email.​

‐‐‐ Original Message ‐‐‐

On March 13, 2018 10:56 PM, teor  wrote:

> > On 13 Mar 2018, at 20:51, mytormail mytorm...@posteo.net wrote:
> > 
> > I just doesn't feel right if donated capacity isn't used.
> 
> Oh, but your relay's spare capacityis used.
> 
> Just not the way you think.
> 
> A congested relay is a slow and unstable relay.
> 
> A relay with extra capacity has lower latency, and can deal with
> 
> unexpected traffic peaks.
> 
> We expect relays to use 30% - 60% of their capacity.
> 
> But I think we'd like 10% - 20% for the best latency.
> 
> Also, the network is still adjusting after the bandwidth authorities
> 
> being down for a few days, and a million extra clients leaving the
> 
> network. So it might take a few weeks for bandwidth to balance
> 
> out.
> 
> T
> 
> tor-relays mailing list
> 
> tor-relays@lists.torproject.org
> 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] middle relay connexions dropped in half

2018-03-14 Thread Edwin



On 14.03.2018 03:56, teor wrote:

On 13 Mar 2018, at 20:51, mytormail  wrote:

I just doesn't feel right if donated capacity isn't used.


Oh, but your relay's spare capacity *is* used.
Just not the way you think.


Hi teor,

Thanks for your reassuring words. :)
I just wait a few weeks and see what happens. DoS mitigation will have 
it's impact I guess.
One of my relays has a lot circuits rejected compared to my other 
relays:


"DoS mitigation since startup: 79258 circuits rejected, 14 marked 
addresses. 701 connections closed. 1287 single hop clients refused."

Six hours after the upgrade it rejected 56722 circuits already..
So it seems to have a big impact indeed.

Regards,

Edwin.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] middle relay connexions dropped in half

2018-03-13 Thread teor

> On 13 Mar 2018, at 20:51, mytormail  wrote:
> 
> I just doesn't feel right if donated capacity isn't used.

Oh, but your relay's spare capacity *is* used.
Just not the way you think.

A congested relay is a slow and unstable relay.

A relay with extra capacity has lower latency, and can deal with
unexpected traffic peaks.

We expect relays to use 30% - 60% of their capacity.
But I think we'd like 10% - 20% for the best latency.

Also, the network is still adjusting after the bandwidth authorities
being down for a few days, and a million extra clients leaving the
network. So it might take a few weeks for bandwidth to balance
out.

T
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] middle relay connexions dropped in half

2018-03-13 Thread torix
Yes, I have experienced the same thing; my throughput is slower as well.  Not 
only have I dropped from about 2,000 connexions to 1, 000; my rate has gone 
down as well:
 #vnstat -d
 02/21/201816.83 GiB |   16.59 GiB |   33.42 GiB |3.24 Mbit/s
 02/22/201818.73 GiB |   18.49 GiB |   37.21 GiB |3.61 Mbit/s
 02/23/201817.38 GiB |   17.20 GiB |   34.58 GiB |3.36 Mbit/s
 02/24/201819.16 GiB |   18.94 GiB |   38.11 GiB |3.70 Mbit/s
 02/25/201815.63 GiB |   15.48 GiB |   31.11 GiB |3.02 Mbit/s
 02/26/201818.69 GiB |   18.49 GiB |   37.18 GiB |3.61 Mbit/s
 02/27/201819.28 GiB |   19.07 GiB |   38.35 GiB |3.72 Mbit/s
 02/28/201819.12 GiB |   18.92 GiB |   38.03 GiB |3.69 Mbit/s
 03/01/201819.07 GiB |   18.92 GiB |   37.99 GiB |3.69 Mbit/s
 03/02/201819.04 GiB |   18.89 GiB |   37.93 GiB |3.68 Mbit/s
 03/03/201817.46 GiB |   17.22 GiB |   34.68 GiB |3.37 Mbit/s
 03/04/201818.39 GiB |   18.16 GiB |   36.55 GiB |3.55 Mbit/s
 03/05/201815.90 GiB |   15.82 GiB |   31.72 GiB |3.08 Mbit/s
 03/06/201813.82 GiB |   13.83 GiB |   27.64 GiB |2.68 Mbit/s
 03/07/201818.25 GiB |   18.09 GiB |   36.34 GiB |3.53 Mbit/s
 03/08/201812.66 GiB |   12.64 GiB |   25.30 GiB |2.46 Mbit/s
 03/09/201811.74 GiB |   11.74 GiB |   23.48 GiB |2.28 Mbit/s
 03/10/201813.31 GiB |   13.32 GiB |   26.63 GiB |2.59 Mbit/s

 03/12/201813.59 GiB |   13.64 GiB |   27.24 GiB |2.64 Mbit/s

I switched to the newest dos mitigation version 0.3.2.10 on 03/05.
I also had an internet outage of about 10 hours 03/11, and got a new ip 
address, so this relay is not a good example, perhaps.
My thought was to leave things for another 2 weeks, and if I still have this 
lower throughput, then I will up the RelayBandwidthRate and RelayBandwidthBurst 
settings, which has been my very rough way to attract more or fewer connexions. 
 I try to keep it under my ISP's radar at 1 T a month.

--Torix  

​Sent with ProtonMail Secure Email.​

‐‐‐ Original Message ‐‐‐

On March 13, 2018 3:51 PM, mytormail  wrote:

> Hi,
> 
> I am curious if your relay is back on speed now.
> 
> I experience the same thing. Since the latest update my two "fast"
> 
> relay's (around 5100KB) have now dropped to half the speed and seem to
> 
> go slower as time goes by. Processor is hardly used, memory is no issue,
> 
> logs seem okay. My other two relay's where a bit slower already and
> 
> didn't change much in that regard.
> 
> I just doesn't feel right if donated capacity isn't used. Maybe I have
> 
> to wait it out a bit longer, hence my question.
> 
> Edwin.
> 
> On 11.03.2018 03:50, to...@protonmail.com wrote:
> 
> > Dear All,
> > 
> > On March 5 I changed to the newest version 3.2.10 on a middle relay I
> > 
> > run. I went away for a few days, checked today, and found that my
> > 
> > traffic is down, and my connexions, which were around 2,000 since
> > 
> > December, are now about 1,000. Consensus weight is still the same
> > 
> > (about 450) as it has been before. And my throughput is down from
> > 
> > 35G/day, hitting that max most days to about 23-26G/day.
> > 
> > Don't know if this is because it is a better Tor and is filtering out
> > 
> > extra crap now or not, but just thought I'd mention it, as the Tor
> > 
> > version is the only thing that changed.
> > 
> > --Torix
> > 
> > Sent with ProtonMail \[1\] Secure Email.
> > 
> > Links:
> > --
> > 
> > \[1\] https://protonmail.com
> > 
> > tor-relays mailing list
> > 
> > tor-relays@lists.torproject.org
> > 
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
> tor-relays mailing list
> 
> tor-relays@lists.torproject.org
> 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] middle relay connexions dropped in half

2018-03-13 Thread mytormail

Hi,

I am curious if your relay is back on speed now.
I experience the same thing. Since the latest update my two "fast" 
relay's (around 5100KB) have now dropped to half the speed and seem to 
go slower as time goes by. Processor is hardly used, memory is no issue, 
logs seem okay. My other two relay's where a bit slower already and 
didn't change much in that regard.
I just doesn't feel right if donated capacity isn't used. Maybe I have 
to wait it out a bit longer, hence my question.


Edwin.



On 11.03.2018 03:50, to...@protonmail.com wrote:

Dear All,

On March 5 I changed to the newest version 3.2.10 on a middle relay I
run. I went away for a few days, checked today, and found that my
traffic is down, and my connexions, which were around 2,000 since
December, are now about 1,000. Consensus weight is still the same
(about 450) as it has been before. And my throughput is down from
35G/day, hitting that max most days to about 23-26G/day.

Don't know if this is because it is a better Tor and is filtering out
extra crap now or not, but just thought I'd mention it, as the Tor
version is the only thing that changed.

--Torix

Sent with ProtonMail [1] Secure Email.



Links:
--
[1] https://protonmail.com

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] middle relay connexions dropped in half

2018-03-12 Thread Gary
Hello,

On 11 March 2018 at 22:02,  wrote:

> Thanks, Gary; I was just wondering, since I think of mine as a typical
> small relay, and wondered if others had noticed the same differences.
>
>
Before December, my accountingmax was 3GB, I had to increase it to 8GB stop
it from hibernating midday. Now it probably only uses about 3 or 4GB a day.

Again, I am not an expert, but I looked in to this on Relay Search. On the
2018-02-10 Tor version 3.3.2-alpha was released containing important DoS
mitigation features and the number of users actually went up, then settled
down a bit (under the 4 million mark it was earlier in the month). It
wasn't until 2018-03-03 that several versions of Tor were released
containing DoS mitigation back ports that the user numbers really lowered,
now under the 3 million mark.

Of course I could be wrong and there could be other factors in play. Also
for some unknown reason, when I checked yesterday Relay Search had no user
data for 2018-02-28.

Thanks,

Gary


toruser-vs-relayversions.csv
Description: Binary data
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] middle relay connexions dropped in half

2018-03-11 Thread torix
Thanks, Gary; I was just wondering, since I think of mine as a typical small 
relay, and wondered if others had noticed the same differences.

Sent with [ProtonMail](https://protonmail.com) Secure Email.

‐‐‐ Original Message ‐‐‐
On March 11, 2018 6:52 AM, Gary  wrote:

> Hello
>
> On 11 March 2018 at 02:50,  wrote:
>
>> Dear All,
>> On March 5 I changed to the newest version 3.2.10 on a middle relay I run.  
>> I went away for a few days, checked today, and found that my traffic is 
>> down, and my connexions, which were around 2,000 since December, are now 
>> about 1,000.  Consensus weight is still the same (about 450) as it has been 
>> before.  And my throughput is down from 35G/day, hitting that max most days 
>> to about 23-26G/day.
>> Don't know if this is because it is a better Tor and is filtering out extra 
>> crap now or not, but just thought I'd mention it, as the Tor version is the 
>> only thing that changed.
>
> I have noticed this too, my connections and daily traffic have also dropped 
> by about half, I dont pay attention to consensus though.
>
> I am not an expert on the subject, I too was wondering if it was the DoS 
> mitigation's???
>
> Thanks.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] middle relay connexions dropped in half

2018-03-11 Thread Gary
Hello

On 11 March 2018 at 02:50,  wrote:

> Dear All,
> On March 5 I changed to the newest version 3.2.10 on a middle relay I
> run.  I went away for a few days, checked today, and found that my traffic
> is down, and my connexions, which were around 2,000 since December, are now
> about 1,000.  Consensus weight is still the same (about 450) as it has been
> before.  And my throughput is down from 35G/day, hitting that max most days
> to about 23-26G/day.
> Don't know if this is because it is a better Tor and is filtering out
> extra crap now or not, but just thought I'd mention it, as the Tor version
> is the only thing that changed.
>

I have noticed this too, my connections and daily traffic have also dropped
by about half, I dont pay attention to consensus though.

I am not an expert on the subject, I too was wondering if it was the DoS
mitigation's???

Thanks.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] middle relay connexions dropped in half

2018-03-10 Thread torix
Dear All,
On March 5 I changed to the newest version 3.2.10 on a middle relay I run.  I 
went away for a few days, checked today, and found that my traffic is down, and 
my connexions, which were around 2,000 since December, are now about 1,000.  
Consensus weight is still the same (about 450) as it has been before.  And my 
throughput is down from 35G/day, hitting that max most days to about 23-26G/day.
Don't know if this is because it is a better Tor and is filtering out extra 
crap now or not, but just thought I'd mention it, as the Tor version is the 
only thing that changed.\

--Torix

Sent with [ProtonMail](https://protonmail.com) Secure Email.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay still an useful contribution?

2017-01-18 Thread teor

> On 18 Jan 2017, at 09:14, Steve Snyder  wrote:
> 
> Note that a bridge is not guaranteed to be used. I've seen plenty of bridges, 
> both plain-vanilla and obfs4, with or without IPv6, regardless of geography, 
> that use only a few megabytes of bandwidth per month. Everything seems good 
> in terms of connectivity yet there is basically just housekeeping traffic. 
> Some bridges just seem to go ignored as entry points into the Tor network.
> 
> Not trying to dissuade you from running a bridge, just pointing out that that 
> the bandwidth you want to donate to the Tor network may not be utilized. In 
> contrast, I haven't seen a mature middle node that went unused.

Bridges are allocated to users at random (and some are randomly chosen
to be reserved). So they might not be used. You can set up 2 bridges per
IPv4 address, and you can give them an IPv6 address, too.

In contrast, all Tor clients see all tor relays, and choose paths at
random. So all tor relays are used according to their bandwidth weights.

Tim

> On 01/17/2017 02:59 PM, Olaf Grimm wrote:
>> I thinking about a bridge too. But which port is not censored in China?
>> I have read an article about the firewall of China. They doing DPI and
>> filtering all encrypted traffic. Obfsproxy should be a good choice. A
>> short test give me some experience for tor connections, but more traffic
>> inside as outside (asymmetric). I'm not sure that will work right.
>> 
>> A middle node need some days to get some traffic. An exit node is at
>> full power in some hours. The guard flag for the middle nodes came after
>> 2 weeks, I think.
>> 
>> Can someone give me a proposal for a bridge port that is usefull for
>> censored countries?
>> 
>> Olaf
>> 
>> 
>> On 17.01.2017 17:29, Christian Pietsch wrote:
>>> Hi Ortez,
>>> 
>>> On Tue, Jan 17, 2017 at 10:32:44AM -0500, Ortez wrote:
 Not right now. I know bridges are needed for users in countries like china 
 and so on, but are they used much?
>>> Yes. A bridge will utilize your server's bandwidth just as nicely as
>>> an exit relay would. Someone recently posted impressive diagrams to
>>> illustrate this, but I cannot find them now. In addition, please try
>>> to install a pluggable transport such as obfs4 to make your bridge
>>> more censorship-resistant!
>>> 
>>> Thanks for asking!
>>> C:
>>> 
>>> 
>>> 
>>> ___
>>> tor-relays mailing list
>>> tor-relays@lists.torproject.org
>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> 
>> 
>> 
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

T

--
Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org






signature.asc
Description: Message signed with OpenPGP
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay changed to Exit Relay Bandwidth Change

2016-10-07 Thread Tristan
It's very normal for exit relays to pick up *much *more traffic than middle
or guard. Because exit relays have to deal with the abuse complaints of Tor
users, there are much fewer exit relays than middle and guard:
http://rougmnvswfsmd4dq.onion/relayflags.html

Even though there is plenty of bandwidth in the Tor network (
http://rougmnvswfsmd4dq.onion/bandwidth-flags.html), the sheer amount of
exit vs non-exit relays causes exit relays to have much more traffic.

On Fri, Oct 7, 2016 at 3:23 PM, tmbates12  wrote:

> Recently I enable exits on my relay and traffic seemed to jump very high
> compared to the almost stagnant bandwidth increase wen it was just running
> as a guard middle relay. I was wondering if this was normal for the traffic
> to jump this much.
>  Here's the Atlas link for my relay: https://atlas.
> torproject.org/#details/ABF5C38A93F2D7E77A226871AB0ADB052279B48F
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>


-- 
Finding information, passing it along. ~SuperSluether
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle Relay changed to Exit Relay Bandwidth Change

2016-10-07 Thread tmbates12
Recently I enable exits on my relay and traffic seemed to jump very high
compared to the almost stagnant bandwidth increase wen it was just running
as a guard middle relay. I was wondering if this was normal for the traffic
to jump this much.
 Here's the Atlas link for my relay:
https://atlas.torproject.org/#details/ABF5C38A93F2D7E77A226871AB0ADB052279B48F
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-20 Thread Andrea
Jep. Give it a try - only the fastest relays get a guard flag.

~Andrea

On 9/20/2016 1:15 PM, Jim Electro House wrote:
> So it is only a matter of speed?
> 
> On Fri, Sep 16, 2016 at 5:59 PM, Andrea  > wrote:
> 
> 
> 
> On 9/16/2016 4:22 PM, Jim Electro House wrote:
> > Hi to all!
> > I'm running a non-exit relay and I'd like to configure it to run
> _only_
> > as a middle relay. Do you know which conf should I add on my torrc file?
> 
> My relay never got the guard flag. Usually fast relays only get that
> flag. I donate a part of my internet connection to tor but not much.
> This seems to be the solution why mine never became a guard.
> 
> If you are limiting the bandwidth it should never get the guard flag.
> 
> ~Andrea



smime.p7s
Description: S/MIME Cryptographic Signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-20 Thread Ralph Seichter
On 20.09.2016 13:15, Jim Electro House wrote:

> So it is only a matter of speed?

If you have 1 Gbit/s bandwidth on offer but configure Tor accounting to
only let 100 MB of data pass per day, I doubt your relay will receive a
guard flag, no matter the "speed". The same goes for relays that are only
available every fortnight, as stability is likely an issue.

-Ralph
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-20 Thread Jim Electro House
So it is only a matter of speed?

On Fri, Sep 16, 2016 at 5:59 PM, Andrea  wrote:

>
>
> On 9/16/2016 4:22 PM, Jim Electro House wrote:
> > Hi to all!
> > I'm running a non-exit relay and I'd like to configure it to run _only_
> > as a middle relay. Do you know which conf should I add on my torrc file?
>
> My relay never got the guard flag. Usually fast relays only get that
> flag. I donate a part of my internet connection to tor but not much.
> This seems to be the solution why mine never became a guard.
>
> If you are limiting the bandwidth it should never get the guard flag.
>
> ~Andrea
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-16 Thread Andrea


On 9/16/2016 4:22 PM, Jim Electro House wrote:
> Hi to all!
> I'm running a non-exit relay and I'd like to configure it to run _only_
> as a middle relay. Do you know which conf should I add on my torrc file?

My relay never got the guard flag. Usually fast relays only get that
flag. I donate a part of my internet connection to tor but not much.
This seems to be the solution why mine never became a guard.

If you are limiting the bandwidth it should never get the guard flag.

~Andrea



smime.p7s
Description: S/MIME Cryptographic Signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-16 Thread Ivan Markin
Marcel Krzystek:
> Add the following to your .torrc file:
> 
> ExitPolicy reject *:*

It's non-exit, not a "middle-only" relay. Jim probably doesn't want to
become a Guard. I'm not aware of such option.

btw, we've recently discussed in #19625 [1] possibility of setting
"peering policy". If this would be implemented one can restrict
connections only to relays in consensus (but not bridges?).

[1] https://trac.torproject.org/projects/tor/ticket/19625
--
Ivan Markin
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-16 Thread Tristan
It takes time to get the guard flag. See the relay life cycle for more
details: https://blog.torproject.org/blog/lifecycle-of-a-new-relay

On Sep 16, 2016 9:29 AM, "Jim Electro House" 
wrote:

> I saw one relay not being a guard one, only middle.. :/
>
> On Fri, Sep 16, 2016 at 5:27 PM, Matt Traudt  wrote:
>
>> ExitRelay 0
>> and/or
>> ExitPolicy reject *:*
>>
>> to prevent being an exit.
>>
>> I don't know that you can prevent yourself from getting the Guard flag
>> and being a guard.
>>
>> https://www.torproject.org/docs/tor-manual.html.en
>> https://www.torproject.org/docs/tor-relay-debian.html.en
>>
>> Matt
>>
>> On 9/16/16 10:22, Jim Electro House wrote:
>> > Hi to all!
>> > I'm running a non-exit relay and I'd like to configure it to run *only*
>> as
>> > a middle relay. Do you know which conf should I add on my torrc file?
>> >
>> >
>> >
>> > ___
>> > tor-relays mailing list
>> > tor-relays@lists.torproject.org
>> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> >
>>
>>
>> ___
>> tor-relays mailing list
>> tor-relays@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
>>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-16 Thread Jim Electro House
I saw one relay not being a guard one, only middle.. :/

On Fri, Sep 16, 2016 at 5:27 PM, Matt Traudt  wrote:

> ExitRelay 0
> and/or
> ExitPolicy reject *:*
>
> to prevent being an exit.
>
> I don't know that you can prevent yourself from getting the Guard flag
> and being a guard.
>
> https://www.torproject.org/docs/tor-manual.html.en
> https://www.torproject.org/docs/tor-relay-debian.html.en
>
> Matt
>
> On 9/16/16 10:22, Jim Electro House wrote:
> > Hi to all!
> > I'm running a non-exit relay and I'd like to configure it to run *only*
> as
> > a middle relay. Do you know which conf should I add on my torrc file?
> >
> >
> >
> > ___
> > tor-relays mailing list
> > tor-relays@lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> >
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-16 Thread Matt Traudt
ExitRelay 0
and/or
ExitPolicy reject *:*

to prevent being an exit.

I don't know that you can prevent yourself from getting the Guard flag
and being a guard.

https://www.torproject.org/docs/tor-manual.html.en
https://www.torproject.org/docs/tor-relay-debian.html.en

Matt

On 9/16/16 10:22, Jim Electro House wrote:
> Hi to all!
> I'm running a non-exit relay and I'd like to configure it to run *only* as
> a middle relay. Do you know which conf should I add on my torrc file?
> 
> 
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2016-09-16 Thread Marcel Krzystek
Add the following to your .torrc file:

ExitPolicy reject *:*



On Fri, Sep 16, 2016 at 8:22 AM, Jim Electro House <
torelectroho...@gmail.com> wrote:

> Hi to all!
> I'm running a non-exit relay and I'd like to configure it to run *only*
> as a middle relay. Do you know which conf should I add on my torrc file?
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-15 Thread torrry
As starlight said, you are getting the appropriate amount of traffic according 
to the bandwidth authority measurements for your relay.

Right now, the middle/entry nodes are relatively lightly utilized. This is a 
good thing, since it makes for a much better user experience. With high 
utilization, the web browsing experience deteriorates dramatically as network 
request latency goes up.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-15 Thread Billy Humphreys
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

I've checked the Atlas page - you ave ~235.82KB/s.
However, you may not get AS MUCH traffic in the beginning, because you
are a non-exit relay, and you have to wait for your Tor Relay to be
added to the network. Publish the directory aswell if you can - that
normally gets some more people :p
- --Poke

___
My GPG keyID is 0x6DEF6C26 - the key is avaliable on all big keyservers.

On 14/09/2015 18:26, Greg Moss wrote:
> Comcast modem is in bridge mode with ASA doing the NAT (showing at
> times upwards to 6,000 connections. Believe the ASA is rated to
> 10,000 + currently showing 220 connections). It's a Comcast
> business line with relay having its own static IP. I will have a
> look at the link provided.
> 
> gm
> 
> -Original Message- From: tor-relays
> [mailto:tor-relays-boun...@lists.torproject.org] On Behalf Of
> starlight.201...@binnacle.cx Sent: Monday, September 14, 2015 10:00
> AM To: tor-relays@lists.torproject.org;
> gmos...@binnacle.cx.at.gmail.com Subject: [tor-relays] Middle Relay
> has no traffic
> 
>> My middle relay seems to have minimal traffic. Is there something
>> I need to do or is my damn IPS (Comcast) blocking me.
>> 
>> Node name is gmojo02
>> 
>> gm
> 
> 
> Possibly the Comcast gateway NAT is unable to deal with lots of
> connections andj/or it may be an older, slow model that can't
> handle much traffic.  Or possibly your connection is just at the
> low end of the bandwidth spectrum. You can see all the Comcast
> relays ranked by traffic by going to
> 
> https: // torstatus dot blutemagie dot de
> 
> and at the bottom of the page selecting
> 
> Advanced Search:
> 
> hostname contains comcast
> 
> Some options:
> 
> 1) have a new gateway swapped in 2) upgrade to faster service 3)
> switch to a static IP (an option for business customers) and
> configure the relay on the static IP so it bypasses the Comcast
> device's NAT 4) switch to Verizon FiOS, which is 5x better than
> Comcast for the same money 5) make sure the system running the 
> relay is reasonably fast, i.e. 1.8GHz or better and had a decent 
> quality NIC; run speedtest_cli.py and it should match your
> ostensible Comcast bandwidth
> 
> w/r/t (4) check out what happened to my relay after switching from
> 3up/18down Comcast to 75up/75down FiOS
> 
> https://atlas.torproject.org/#details/4F0DB7E687FC7C0AE55C8F243DA8B0EB
27FBF1
>
> 
F2
> 
> (keeping in mind the relay is well tuned) You can see all the FiOS
> relays on Blutmagie with
> 
> hostname contains comcast
> 
> 
> ___ tor-relays mailing
> list tor-relays@lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
> ___ tor-relays mailing
> list tor-relays@lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBCAAGBQJV+DAxAAoJEHukJMVt72wmEKUP/0oNlZsrgbPkDn0JeFX6zmPb
QXkWJk+kEle18G5Iz0BFt0gKPzNef6YA7CVoqlWGMGTtGcsoU6MTHHKAyhmeVtOk
VEp50R37F7Js7to7rkqCb1Iv1nfvsS67Y0UHIKfdSaCax5wywxIsGGNacYPBYLhs
NA07pYuKPvhAp/aifiWpGI9gBpO5HikWf2AMRJiQgThZU2/sARY38q+M6bEZiW3F
X2ZQsQp566K2buIRzxrfE65fCPDToQUf47myeKqvj7qD8Njq1WeP+OCGW77GNbGM
3BOUZsJ2fWCJemWgRFvfburDaM5eBeqSW8EOytWFxGiq4j/c3vNXUE0b3YYTBolq
0DxU3VdqLdTHG6yBbLZmRYZ55OJ9LOA5cSJ3joms4gjnWQ0KvupLWaiws2r7tQHA
LjUAPLE4/2tDlsENoqL7fZSAJz+LBrN6WWRzL6cffZxTZf2mbbQozLE01PIjRyXH
Ecr3gHf2xsR03Io7kKwg2XvvOyK9twU0LRN4JVGEW6BIzhEAKnY5bsM0G72C8OdE
oyHfQtaq4kJ5E8LbaBwraJ5jp3V9su5kG4n0jOGjf2/j3VZEdoX4J5SxTmtQr4ow
egQVs6/A648IwfTy1PDucHiXSsNlQwmjoJH/S+zqu27f2qbdTWkUuWapFMeEgUt5
k/UxUKu2dLpi5Jp5a/WB
=penS
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-14 Thread Billy Humphreys
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

What's the fingerprint?
Have you tried using arm for Linux (tor-arm package on debian and
probably other distros) - it can tell you exactly :p

On 14/09/2015 01:34, Greg Moss wrote:
> 
> My middle relay seems to have minimal traffic. Is there something I
> need to do or is my damn IPS (Comcast) blocking me.
> 
> Node name is gmojo02
> 
> gm
> 
> 
> ___ tor-relays mailing
> list tor-relays@lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=OQuL
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-14 Thread 9fb299478a6d0cca
This informative article explains why relays might be "slow" in the beginning:

https://blog.torproject.org/blog/lifecycle-of-a-new-relay 
<https://blog.torproject.org/blog/lifecycle-of-a-new-relay>

Use the arm command to monitor your relay traffic and to check for error 
messages.
Errors can sometimes arise from typos in your torrc file or local issues on 
your machine.

> On 14 Sep 2015, at 18:51, Greg Moss <gmos...@gmail.com> wrote:
> 
> The fingerprint is
> 
> 1D232E4B51D4266539893E1896C1560E61F20ADE
> Gmojo02
> 
> I am not familiar with the Tor arm package but will have a look at it.
> 
> -Original Message-
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
> Of Billy Humphreys
> Sent: Monday, September 14, 2015 7:43 AM
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Middle Relay has no traffic
> 
> Signed PGP part
> What's the fingerprint?
> Have you tried using arm for Linux (tor-arm package on debian and probably
> other distros) - it can tell you exactly :p
> 
> On 14/09/2015 01:34, Greg Moss wrote:
> >
> > My middle relay seems to have minimal traffic. Is there something I
> > need to do or is my damn IPS (Comcast) blocking me.
> >
> > Node name is gmojo02
> >
> > gm
> >
> >
> > ___ tor-relays mailing
> > list tor-relays@lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> >
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-14 Thread Greg Moss
Thanks reply - I have had the damn thing running for close to a year now or
more.  I have installed ARM and will see what it shows.   Advertised
Bandwidth is set to 204.8KB but I am lucky to push 50Kb as globe shows. 

 

gm

From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of 9fb299478a6d0cca
Sent: Monday, September 14, 2015 10:00 AM
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Middle Relay has no traffic

 

This informative article explains why relays might be "slow" in the
beginning:

 

https://blog.torproject.org/blog/lifecycle-of-a-new-relay

 

Use the arm command to monitor your relay traffic and to check for error
messages. 

Errors can sometimes arise from typos in your torrc file or local issues on
your machine.

 

On 14 Sep 2015, at 18:51, Greg Moss <gmos...@gmail.com
<mailto:gmos...@gmail.com> > wrote:

 

The fingerprint is

1D232E4B51D4266539893E1896C1560E61F20ADE
Gmojo02

I am not familiar with the Tor arm package but will have a look at it.

-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of Billy Humphreys
Sent: Monday, September 14, 2015 7:43 AM
To: tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>

Subject: Re: [tor-relays] Middle Relay has no traffic

Signed PGP part

What's the fingerprint?
Have you tried using arm for Linux (tor-arm package on debian and probably
other distros) - it can tell you exactly :p

On 14/09/2015 01:34, Greg Moss wrote:
>
> My middle relay seems to have minimal traffic. Is there something I
> need to do or is my damn IPS (Comcast) blocking me.
>
> Node name is gmojo02
>
> gm
>
>
> ___ tor-relays mailing
> list tor-relays@lists.torproject.org
<mailto:tor-relays@lists.torproject.org> 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>


___
tor-relays mailing list
tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org> 
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org> 
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

 

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle Relay has no traffic

2015-09-14 Thread starlight . 2015q3
>My middle relay seems to have minimal traffic.
>Is there something I need to do or is my damn
>IPS (Comcast) blocking me.
>
>Node name is gmojo02
>
>gm


Possibly the Comcast gateway NAT is unable
to deal with lots of connections andj/or it
may be an older, slow model that can't
handle much traffic.  Or possibly your
connection is just at the low end
of the bandwidth spectrum.  You can
see all the Comcast relays ranked by
traffic by going to

https: // torstatus dot blutemagie dot de

and at the bottom of the page selecting

Advanced Search:

   hostname contains comcast

Some options:

1) have a new gateway swapped in
2) upgrade to faster service
3) switch to a static IP
   (an option for business customers)
   and configure the relay on the
   static IP so it bypasses the
   Comcast device's NAT
4) switch to Verizon FiOS, which
   is 5x better than Comcast
   for the same money
5) make sure the system running the
   relay is reasonably fast, i.e.
   1.8GHz or better and had a decent
   quality NIC; run speedtest_cli.py
   and it should match your ostensible
   Comcast bandwidth

w/r/t (4) check out what happened to my
relay after switching from 3up/18down
Comcast to 75up/75down FiOS

https://atlas.torproject.org/#details/4F0DB7E687FC7C0AE55C8F243DA8B0EB27FBF1F2

(keeping in mind the relay is well tuned)
You can see all the FiOS relays on
Blutmagie with 

   hostname contains comcast

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-14 Thread Greg Moss
Comcast modem is in bridge mode with ASA doing the NAT (showing at times
upwards to 6,000 connections. Believe the ASA is rated to 10,000 + currently
showing 220 connections). It's a Comcast business line with relay having its
own static IP. I will have a look at the link provided.

gm

-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of starlight.201...@binnacle.cx
Sent: Monday, September 14, 2015 10:00 AM
To: tor-relays@lists.torproject.org; gmos...@binnacle.cx.at.gmail.com
Subject: [tor-relays] Middle Relay has no traffic

>My middle relay seems to have minimal traffic.
>Is there something I need to do or is my damn IPS (Comcast) blocking 
>me.
>
>Node name is gmojo02
>
>gm


Possibly the Comcast gateway NAT is unable to deal with lots of connections
andj/or it may be an older, slow model that can't handle much traffic.  Or
possibly your connection is just at the low end of the bandwidth spectrum.
You can see all the Comcast relays ranked by traffic by going to

https: // torstatus dot blutemagie dot de

and at the bottom of the page selecting

Advanced Search:

   hostname contains comcast

Some options:

1) have a new gateway swapped in
2) upgrade to faster service
3) switch to a static IP
   (an option for business customers)
   and configure the relay on the
   static IP so it bypasses the
   Comcast device's NAT
4) switch to Verizon FiOS, which
   is 5x better than Comcast
   for the same money
5) make sure the system running the
   relay is reasonably fast, i.e.
   1.8GHz or better and had a decent
   quality NIC; run speedtest_cli.py
   and it should match your ostensible
   Comcast bandwidth

w/r/t (4) check out what happened to my
relay after switching from 3up/18down
Comcast to 75up/75down FiOS

https://atlas.torproject.org/#details/4F0DB7E687FC7C0AE55C8F243DA8B0EB27FBF1
F2

(keeping in mind the relay is well tuned) You can see all the FiOS relays on
Blutmagie with 

   hostname contains comcast


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-14 Thread Greg Moss
Starlight - I see your advertised BW is 7.26MB =  58.08 Mb with globe
showing 2 to 4 Mb traffic. Maybe I will up the advertised BW on the relay
and see if that helps.

gm

-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of starlight.201...@binnacle.cx
Sent: Monday, September 14, 2015 10:00 AM
To: tor-relays@lists.torproject.org; gmos...@binnacle.cx.at.gmail.com
Subject: [tor-relays] Middle Relay has no traffic

>My middle relay seems to have minimal traffic.
>Is there something I need to do or is my damn IPS (Comcast) blocking 
>me.
>
>Node name is gmojo02
>
>gm


Possibly the Comcast gateway NAT is unable to deal with lots of connections
andj/or it may be an older, slow model that can't handle much traffic.  Or
possibly your connection is just at the low end of the bandwidth spectrum.
You can see all the Comcast relays ranked by traffic by going to

https: // torstatus dot blutemagie dot de

and at the bottom of the page selecting

Advanced Search:

   hostname contains comcast

Some options:

1) have a new gateway swapped in
2) upgrade to faster service
3) switch to a static IP
   (an option for business customers)
   and configure the relay on the
   static IP so it bypasses the
   Comcast device's NAT
4) switch to Verizon FiOS, which
   is 5x better than Comcast
   for the same money
5) make sure the system running the
   relay is reasonably fast, i.e.
   1.8GHz or better and had a decent
   quality NIC; run speedtest_cli.py
   and it should match your ostensible
   Comcast bandwidth

w/r/t (4) check out what happened to my
relay after switching from 3up/18down
Comcast to 75up/75down FiOS

https://atlas.torproject.org/#details/4F0DB7E687FC7C0AE55C8F243DA8B0EB27FBF1
F2

(keeping in mind the relay is well tuned) You can see all the FiOS relays on
Blutmagie with 

   hostname contains comcast


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle Relay has no traffic

2015-09-14 Thread starlight . 2015q3
>My middle relay seems to have minimal traffic.
>Is there something I need to do or is my damn
>IPS (Comcast) blocking me.
>
>Node name is gmojo02
>
>gm


Possibly the Comcast gateway NAT is unable
to deal with lots of connections andj/or it
may be an older, slow model that can't
handle much traffic.  Or possibly your
connection is just at the low end
of the bandwidth spectrum.  You can
see all the Comcast relays ranked by
traffic by going to

https: // torstatus dot blutemagie dot de

and at the bottom of the page selecting

Advanced Search:

   hostname contains comcast

Some options:

1) have a new gateway swapped in
2) upgrade to faster service
3) switch to a static IP
   (an option for business customers)
   and configure the relay on the
   static IP so it bypasses the
   Comcast device's NAT
4) switch to Verizon FiOS, which
   is 5x better than Comcast
   for the same money
5) make sure the system running the
   relay is reasonably fast, i.e.
   1.8GHz or better and had a decent
   quality NIC; run speedtest_cli.py
   and it should match your ostensible
   Comcast bandwidth

w/r/t (4) check out what happened to my
relay after switching from 3up/18down
Comcast to 75up/75down FiOS

https://atlas.torproject.org/#details/4F0DB7E687FC7C0AE55C8F243DA8B0EB27FBF1F2

(keeping in mind the relay is well tuned)
You can see all the FiOS relays on
Blutmagie with 

   hostname contains comcast


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle Relay has no traffic

2015-09-14 Thread starlight . 2015q3
[know I'm breaking the thread--sorry about that]

>Starlight - I see your advertised BW is
>7.26MB =  58.08 Mb with globe showing 2
>to 4 Mb traffic. Maybe I will up the
>advertised BW on the relay and see if
>that helps.

That's not "advertised" bandwidth in the
sense of something that can be adjusted
by the operator.  It's the relay self-
measurement and is the fastest sustained
speed the relay has observed in the last
24 hours.  You can see this information
in the 'state' file on the BW...Max lines.
Verizon recently took down the connection
here for 18 hours (central-office upgrade
work for their new 100/100 promotion;
they will not admit it and gave no warning
--Verizon is not a perfect company either).
Normally the self-measure peaks at around
80-90% or so of actual bandwidth and the
7256KB value is on the low side of it's
range.  Self-measure for GMOJO02 is 204KB
or 1.6Mbits/second.  The BWauths have the
relay as:

2-gablemoo--w Bandwidth=204 Measured=33
5-moria1w Bandwidth=204 Measured=59
3-maatuska--w Bandwidth=204 Measured=82 -- median
1-longclaw--w Bandwidth=204 Measured=131
4-Faravahar-w Bandwidth=204 Measured=185

I see this configured for GMOJO02:

BandwidthBurst 307200
BandwidthRate  204800

The self-measure shows this relay is getting
exactly what it should based on the settings.
If you want more you must increase these
values.  This is what I ran with before
the switch:

BandwidthBurst 120
BandwidthRate 325000

Where the 325KB average-max is 85%
of the 3MBit maximum capacity of the
Comcast link (375KB) and is intended
to prevent Comcast's aggressive and
problematic traffic shaping from
kicking in.

The BWauth/Torflow system presently targets
25-35% available bandwidth utilization
and the latter settings above will cause
the relay to obtain something like the
consensus 0.015934% value show by 
Globe for the relay here back just before
the switch to FiOS, while the relay
you have is presently at 0.000232%.

Keep in mind the percentages fall steadily
due to overall bandwidth of the Tor
network increasing.  The BWauth value
for the relay here was something like
230k if I recall correctly.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-14 Thread Dedalo
You should see ToS of Comcast, maybe It could be making Tor Slow.
http://business.comcast.com/customer-notifications/acceptable-use-policy
in technical restrictions, they say something about encryption
circumvention devices.


D.

El 14/09/15 a las 12:26, Greg Moss escibió:
> Comcast modem is in bridge mode with ASA doing the NAT (showing at times
> upwards to 6,000 connections. Believe the ASA is rated to 10,000 + currently
> showing 220 connections). It's a Comcast business line with relay having its
> own static IP. I will have a look at the link provided.
>
> gm
>
> -Original Message-
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
> Of starlight.201...@binnacle.cx
> Sent: Monday, September 14, 2015 10:00 AM
> To: tor-relays@lists.torproject.org; gmos...@binnacle.cx.at.gmail.com
> Subject: [tor-relays] Middle Relay has no traffic
>
>> My middle relay seems to have minimal traffic.
>> Is there something I need to do or is my damn IPS (Comcast) blocking 
>> me.
>>
>> Node name is gmojo02
>>
>> gm
>
> Possibly the Comcast gateway NAT is unable to deal with lots of connections
> andj/or it may be an older, slow model that can't handle much traffic.  Or
> possibly your connection is just at the low end of the bandwidth spectrum.
> You can see all the Comcast relays ranked by traffic by going to
>
> https: // torstatus dot blutemagie dot de
>
> and at the bottom of the page selecting
>
> Advanced Search:
>
>hostname contains comcast
>
> Some options:
>
> 1) have a new gateway swapped in
> 2) upgrade to faster service
> 3) switch to a static IP
>(an option for business customers)
>and configure the relay on the
>static IP so it bypasses the
>Comcast device's NAT
> 4) switch to Verizon FiOS, which
>is 5x better than Comcast
>for the same money
> 5) make sure the system running the
>relay is reasonably fast, i.e.
>1.8GHz or better and had a decent
>quality NIC; run speedtest_cli.py
>and it should match your ostensible
>Comcast bandwidth
>
> w/r/t (4) check out what happened to my
> relay after switching from 3up/18down
> Comcast to 75up/75down FiOS
>
> https://atlas.torproject.org/#details/4F0DB7E687FC7C0AE55C8F243DA8B0EB27FBF1
> F2
>
> (keeping in mind the relay is well tuned) You can see all the FiOS relays on
> Blutmagie with 
>
>hostname contains comcast
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle Relay has no traffic

2015-09-14 Thread Greg Moss
It wouldn’t surprise me. I hping3 syn half open attack to one of MY IP
address to see how my router tcp intercept tunings would handle this and
THEIR IPS or something blocked my connection for upwards of 4 hours..  I
called and they said they were looking into the issue and it magically came
back up. I did it again just confirm and the same shit happened.

gm

-Original Message-
From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf
Of Dedalo
Sent: Monday, September 14, 2015 11:05 AM
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Middle Relay has no traffic

You should see ToS of Comcast, maybe It could be making Tor Slow.
http://business.comcast.com/customer-notifications/acceptable-use-policy
in technical restrictions, they say something about encryption circumvention
devices.


D.

El 14/09/15 a las 12:26, Greg Moss escibió:
> Comcast modem is in bridge mode with ASA doing the NAT (showing at 
> times upwards to 6,000 connections. Believe the ASA is rated to 10,000 
> + currently showing 220 connections). It's a Comcast business line 
> with relay having its own static IP. I will have a look at the link
provided.
>
> gm
>
> -Original Message-
> From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On 
> Behalf Of starlight.201...@binnacle.cx
> Sent: Monday, September 14, 2015 10:00 AM
> To: tor-relays@lists.torproject.org; gmos...@binnacle.cx.at.gmail.com
> Subject: [tor-relays] Middle Relay has no traffic
>
>> My middle relay seems to have minimal traffic.
>> Is there something I need to do or is my damn IPS (Comcast) blocking 
>> me.
>>
>> Node name is gmojo02
>>
>> gm
>
> Possibly the Comcast gateway NAT is unable to deal with lots of 
> connections andj/or it may be an older, slow model that can't handle 
> much traffic.  Or possibly your connection is just at the low end of the
bandwidth spectrum.
> You can see all the Comcast relays ranked by traffic by going to
>
> https: // torstatus dot blutemagie dot de
>
> and at the bottom of the page selecting
>
> Advanced Search:
>
>hostname contains comcast
>
> Some options:
>
> 1) have a new gateway swapped in
> 2) upgrade to faster service
> 3) switch to a static IP
>(an option for business customers)
>and configure the relay on the
>static IP so it bypasses the
>Comcast device's NAT
> 4) switch to Verizon FiOS, which
>is 5x better than Comcast
>for the same money
> 5) make sure the system running the
>relay is reasonably fast, i.e.
>1.8GHz or better and had a decent
>quality NIC; run speedtest_cli.py
>and it should match your ostensible
>Comcast bandwidth
>
> w/r/t (4) check out what happened to my relay after switching from 
> 3up/18down Comcast to 75up/75down FiOS
>
> https://atlas.torproject.org/#details/4F0DB7E687FC7C0AE55C8F243DA8B0EB
> 27FBF1
> F2
>
> (keeping in mind the relay is well tuned) You can see all the FiOS 
> relays on Blutmagie with
>
>hostname contains comcast
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle Relay has no traffic

2015-09-13 Thread Greg Moss

My middle relay seems to have minimal traffic. Is there something I need to
do or is my damn IPS (Comcast) blocking me.

Node name is gmojo02

gm


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2014-02-05 Thread Moritz Bartl
On 02/04/2014 09:31 PM, Tora Tora Tora wrote:
 Is it correct to assume that if I am running a locked-down IP address
 behind the firewall, it means my relay would connect to a very limited
 number of other relays that also run standard ports? Would that would
 affect anonymity?
 A relay *must* be able to reach all other relays.
 OK, I got it. So open outgoing connections, but restrict incoming
 connections to my ports, e.g, 9001 and 9030, correct?

Yes.

-- 
Moritz Bartl
https://www.torservers.net/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Middle relay

2014-02-04 Thread Tora Tora Tora
I am trying to run a middle relay with no-exit policy. It was my
assumption that a middle relay would only communicate with other relays
on 9001 port. Yet I see my relay IP address attempting connections to
other IP address on ports that are non-9001 (or 9030).
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2014-02-04 Thread D.S. Ljungmark
That depends on what the other relay operators have configured their hosts
to talk to.  It's a common thing to set relays on other ports to obscure
the kind of traffic, and to work around certain firewall rules.




On Tue, Feb 4, 2014 at 6:16 PM, Tora Tora Tora t...@allthatnet.com wrote:

 I am trying to run a middle relay with no-exit policy. It was my
 assumption that a middle relay would only communicate with other relays
 on 9001 port. Yet I see my relay IP address attempting connections to
 other IP address on ports that are non-9001 (or 9030).
 ___
 tor-relays mailing list
 tor-relays@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2014-02-04 Thread Tora Tora Tora
Is it correct to assume that if I am running a locked-down IP address
behind the firewall, it means my relay would connect to a very limited
number of other relays that also run standard ports? Would that would
affect anonymity?

Also, what is the right to deal with this issue without compromising
security?


On 02/04/2014 12:37 PM, D.S. Ljungmark wrote:
 That depends on what the other relay operators have configured their
 hosts to talk to.  It's a common thing to set relays on other ports to
 obscure the kind of traffic, and to work around certain firewall rules.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2014-02-04 Thread Moritz Bartl
On 02/04/2014 07:20 PM, Tora Tora Tora wrote:
 Is it correct to assume that if I am running a locked-down IP address
 behind the firewall, it means my relay would connect to a very limited
 number of other relays that also run standard ports? Would that would
 affect anonymity?

A relay *must* be able to reach all other relays.

-- 
Moritz Bartl
https://www.torservers.net/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Middle relay

2014-02-04 Thread Tora Tora Tora
OK, I got it. So open outgoing connections, but restrict incoming
connections to my ports, e.g, 9001 and 9030, correct?


On 02/04/2014 02:00 PM, Moritz Bartl wrote:
 On 02/04/2014 07:20 PM, Tora Tora Tora wrote:
 Is it correct to assume that if I am running a locked-down IP address
 behind the firewall, it means my relay would connect to a very limited
 number of other relays that also run standard ports? Would that would
 affect anonymity?
 
 A relay *must* be able to reach all other relays.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays