Please unsubscribe me -------------------------------------------- On Fri, 4/15/16, [email protected] <[email protected]> wrote:
Subject: tor-relays Digest, Vol 63, Issue 26 To: [email protected] Date: Friday, April 15, 2016, 1:07 AM Send tor-relays mailing list submissions to [email protected] To subscribe or unsubscribe via the World Wide Web, visit https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays or, via email, send a message with subject or body 'help' to [email protected] You can reach the person managing the list at [email protected] When replying, please edit your Subject line so it is more specific than "Re: Contents of tor-relays digest..." Today's Topics: 1. Using your own Relay as Entry Node (fr33d0m4all) 2. Re: Using your own Relay as Entry Node (Yawning Angel) 3. Re: Using your own Relay as Entry Node (Tristan) 4. Re: Using your own Relay as Entry Node ([email protected]) 5. Hiding or masking running tor process.. ([email protected]) 6. Re: Hiding or masking running tor process.. (dawuud) 7. Re: Hiding or masking running tor process.. (k0nsl) ---------------------------------------------------------------------- Message: 1 Date: Thu, 14 Apr 2016 21:38:15 +0000 From: fr33d0m4all <[email protected]> To: [email protected] Subject: [tor-relays] Using your own Relay as Entry Node Message-ID: <[email protected]> Content-Type: text/plain; charset=utf-8 Hi, I've seen some time ago a discussion about using your own Tor Relay as an Entry Node, but I'd like to have your opinion in the following two scenarios (if it makes any difference switching from 1 to 2): 1) You point at your node when you're in the same network where the node resides (I mean always by setting EntryNodes in torrc, not by using it as a SOCKS proxy) 2) You point at your node from a different network than the one in which the relay is I think that if your node is being used by others, you would simply be one of the lots of users passing through it, with the advantage of removing the risk of a bad Entry node, what do you think about that? And about using it as a SOCKS proxy to enter the Tor network? Do the same considerations apply or is it even worse to use a relay as a SOCKS proxy? I'm sure that I've read about reasons to avoid using your own node, but I don't remember the considerations about this argument... Best regards, Fr33d0m4All -- _____________________________________________________________ PGP Key: 0DA8 7293 D561 3AEE A3C0 7F63 101F 316A F30E ECB4 IRC Nick: fr33d0m4all (OFTC & Freenode) _____________________________________________________________ ------------------------------ Message: 2 Date: Thu, 14 Apr 2016 22:24:30 +0000 From: Yawning Angel <[email protected]> To: [email protected] Subject: Re: [tor-relays] Using your own Relay as Entry Node Message-ID: <[email protected]> Content-Type: text/plain; charset="us-ascii" On Thu, 14 Apr 2016 21:38:15 +0000 fr33d0m4all <[email protected]> wrote: > And about using it as a SOCKS proxy to enter the Tor network? Do the > same considerations apply or is it even worse to use a relay as a > SOCKS proxy? This is horrible and should *NEVER* be done, assuming any network not physically controlled by you is between you and the SOCKS proxy server[0], simply based on the request (and authentication if you chose to use such things) being in the clear. Regards, -- Yawning Angel [0]: So, SOCKS over an internal network to a VM/magical anonymity box may be ok (depending on your threat model). SOCKS to a VPS somewhere is essentially always a bad idea. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 819 bytes Desc: OpenPGP digital signature URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160414/20b5b36b/attachment-0001.sig> ------------------------------ Message: 3 Date: Thu, 14 Apr 2016 17:31:13 -0500 From: Tristan <[email protected]> To: [email protected] Subject: Re: [tor-relays] Using your own Relay as Entry Node Message-ID: <cakkv4ffxzeduxoxeyfopayj-krumwwrzoog6_ojxufmnfcp...@mail.gmail.com> Content-Type: text/plain; charset="utf-8" Using a relay as a SOCKS proxy is fine for the local network, just don't open it to the outside world. Using your relay as an entry uses it as part of the circuit. Using your relay as a local proxy creates a new circuit (without using your node in the circuit) On Apr 14, 2016 5:26 PM, "Yawning Angel" <[email protected]> wrote: > On Thu, 14 Apr 2016 21:38:15 +0000 > fr33d0m4all <[email protected]> wrote: > > And about using it as a SOCKS proxy to enter the Tor network? Do the > > same considerations apply or is it even worse to use a relay as a > > SOCKS proxy? > > This is horrible and should *NEVER* be done, assuming any network not > physically controlled by you is between you and the SOCKS proxy > server[0], simply based on the request (and authentication if you > chose to use such things) being in the clear. > > Regards, > > -- > Yawning Angel > > [0]: So, SOCKS over an internal network to a VM/magical anonymity box > may be ok (depending on your threat model). SOCKS to a VPS somewhere > is essentially always a bad idea. > > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > > -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160414/85cea375/attachment-0001.html> ------------------------------ Message: 4 Date: Thu, 14 Apr 2016 21:39:44 -0400 From: [email protected] To: [email protected] Subject: Re: [tor-relays] Using your own Relay as Entry Node Message-ID: <[email protected]> Content-Type: text/plain; charset="us-ascii" You may find the information in this ticket of interest, particularly the cited comment: https://trac.torproject.org/projects/tor/ticket/16824#comment:23 ------------------------------ Message: 5 Date: Fri, 15 Apr 2016 07:48:25 +0200 From: [email protected] To: [email protected] Subject: [tor-relays] Hiding or masking running tor process.. Message-ID: <[email protected]> Content-Type: text/plain; charset=UTF-8 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Hey everybody, is there any way to hide running a tor process on a server?? My vps hoster monitors which processes consume most of the resources, so just hiding would be best especially when it looks like a 'not tor' process..? I appreciate any helpful hints... Cheers 0x23 - -- -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFhwweDIzIDxydXNoMjNAZ214Lm5ldD4FAlcQgJkACgkQOKD1ON7f MNhrpA/+KH3CXchdIH5ZpXsYe4rDUO2bCAo0lAtZHOogzngmqtJg22Tb9aKnSLBQ sLrtRLHgvGS17Ru3bzSqcSh7SE5vlKi3fFuRqB4f7aWHBreBKLCuOXOsp8YLjf2n f/KZxa0h9lATtjvhG8dKNUVZ7pBEX1awQPO56fkapbArqAg/dKPgggAlmcAhLgO+ 4jjPuk8B+fUlgVtRPaK3Igq4YTyRTkrQmiozM0q7A/4Jj1Sw2Bi8QBoUk1vCOR9y CBbrH7t/kkvts7DhmngjJX6Dc1bPCMkHAAisu+NhUXMVH6SMRrfVzJNR1sgD6BYO oq8J35xYQKCmppLrHRCQ/6YMqDnX27rk3z672AD8EiqZz4uynlrljsNnodmzIzbe eFog7KXaOjIcVH+EUpU1wAXIb0klg3mI9GfA6CYq342xPnNXVoyVqZOTdt3BlZpx rbF6M6ihF1YH2/RQluckCyUkxaO6sG9zPbtCY1LVLvppOHCRjNIPVxJ/pWhBbyQz Q4SH7VSJwS8KVtxa/yZe4sX4+h0lY/Opkg0F20Rsmf4522YCsn2rEYk5VveNj1yd NJ7mHqldfghp4IRROhneLX9tXz2S/hZtcibsWpnuaVC6n83yosAiErSEUbCHHmDI ZCFlfCO1UhvFGFiGanpLez62b1GGn/KHq0BeUzuIpHkXVK6mxRg= =Ovl+ -----END PGP SIGNATURE----- ------------------------------ Message: 6 Date: Fri, 15 Apr 2016 09:36:30 +0000 From: dawuud <[email protected]> To: [email protected] Subject: Re: [tor-relays] Hiding or masking running tor process.. Message-ID: <[email protected]> Content-Type: text/plain; charset="utf-8" Dear 0x23, This is a totally rediculous question... but Oh yes you can certainly replace top, ps etc. with your own customized versions that exclude the tor process. You have root access, yes? Why would you even want to do this? I don't understand. Don't you know that society praises tor relay operators for contributing? Sincerely, david On Fri, Apr 15, 2016 at 07:48:25AM +0200, [email protected] wrote: > Hey everybody, > > is there any way to hide running a tor process on a server?? > My vps hoster monitors which processes consume most of the resources, so just hiding would be best especially when it looks like a 'not tor' process..? > > I appreciate any helpful hints... > > Cheers > 0x23 > -- > > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 801 bytes Desc: not available URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160415/4fa155b4/attachment-0001.sig> ------------------------------ Message: 7 Date: Fri, 15 Apr 2016 09:58:49 +0200 From: k0nsl <[email protected]> To: [email protected] Subject: Re: [tor-relays] Hiding or masking running tor process.. Message-ID: <[email protected]> Content-Type: text/plain; charset="utf-8"; Format="flowed" David, I'm assuming he wants to hide the process due to provider killing the tor process. There are hosts whom are using incredibly lame methods for detecting the tor process ? so simply renaming it can often bypass. At any rate, if my assumption is correct, well, I don't suggest engaging in that practice. It's better to find a host which allows one to operate tor. Best wishes, -k0nsl On 2016-04-15 11:36, dawuud wrote: > Dear 0x23, > > This is a totally rediculous question... but Oh yes you can certainly replace top, ps etc. > with your own customized versions that exclude the tor process. You have root access, yes? > > Why would you even want to do this? I don't understand. > Don't you know that society praises tor relay operators for contributing? > > Sincerely, > david > > On Fri, Apr 15, 2016 at 07:48:25AM +0200, [email protected] wrote: >> Hey everybody, >> >> is there any way to hide running a tor process on a server?? >> My vps hoster monitors which processes consume most of the resources, so just hiding would be best especially when it looks like a 'not tor' process..? >> >> I appreciate any helpful hints... >> >> Cheers >> 0x23 >> -- >> >> _______________________________________________ >> tor-relays mailing list >> [email protected] >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays >> >> >> _______________________________________________ >> tor-relays mailing list >> [email protected] >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160415/d735d94c/attachment.html> ------------------------------ Subject: Digest Footer _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays ------------------------------ End of tor-relays Digest, Vol 63, Issue 26 ****************************************** _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
