Re: [tor-relays] which DirPort should be advertised ?

2016-07-05 Thread Toralf Förster
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/05/2016 04:01 AM, Tim Wilson-Brown - teor wrote:
> In 0.2.8.3-aplha, "clients, onion services, and bridge relays always use an 
> encrypted begindir connection for directory requests".
> Encrypted beginner connections are made over the ORPort.
> This means that in 0.2.8 clients no longer use any DirPort, and relays only 
> use the IPv4 DirPort.
> IPv6 clients and bridge clients use the IPv6 ORPort.
> 
> In 0.2.7 and before, clients and relays only use the IPv4 DirPort.
> IPv6 bridge clients use the IPv6 ORPort.

Understood - so in the long run a DirPort is only used to serve the 
DirPortFrontPage

- -- 
Toralf
PGP: C4EACDDE 0076E94E, OTR: 420E74C8 30246EE7
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iF4EAREIAAYFAld7fHoACgkQxOrN3gB26U5PwgD/ckqsFJksXLfBHlEtcEMgHizG
MIbwXnbSdKOrV4i7DyQA/1Z9dQkMybP3GBuFOZUEOiA92nR4I3417415eYWrEnOc
=mMXm
-END PGP SIGNATURE-
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] which DirPort should be advertised ?

2016-07-05 Thread Tim Wilson-Brown - teor

> On 5 Jul 2016, at 19:23, Toralf Förster  wrote:
> 
> Signed PGP part
> On 07/05/2016 04:01 AM, Tim Wilson-Brown - teor wrote:
> > In 0.2.8.3-aplha, "clients, onion services, and bridge relays always use an 
> > encrypted begindir connection for directory requests".
> > Encrypted beginner connections are made over the ORPort.
> > This means that in 0.2.8 clients no longer use any DirPort, and relays only 
> > use the IPv4 DirPort.
> > IPv6 clients and bridge clients use the IPv6 ORPort.
> >
> > In 0.2.7 and before, clients and relays only use the IPv4 DirPort.
> > IPv6 bridge clients use the IPv6 ORPort.
> 
> Understood - so in the long run a DirPort is only used to serve the 
> DirPortFrontPage

The IPv4 DirPort is used by relays and authorities. This isn't going to change 
any time soon.

> 
> --
> Toralf
> PGP: C4EACDDE 0076E94E, OTR: 420E74C8 30246EE7
> 
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP 968F094B
ricochet:ekmygaiu4rzgsk6n





signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] suspicious "Relay127001" relays

2016-07-05 Thread Xza
91 at the moment and they will soon gain more flags.
https://sourceforge.net/p/nepenthes/wiki/Home/
Seems like some sort of honeypot.
Most seem to be from AWS & Linode & Leaseweb USA.

On July 3, 2016 10:59:00 AM GMT+02:00, nusenu  wrote:
>some new ones:
>http://article.gmane.org/gmane.network.onion-routing.ornetradar/1468
>
>
>
>
>
>
>___
>tor-relays mailing list
>tor-relays@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
PGP : 29A4CE52___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] suspicious "Relay127001" relays

2016-07-05 Thread simon
On 05.07.2016 13:31, Xza wrote:
> 91 at the moment and they will soon gain more flags.
> https://sourceforge.net/p/nepenthes/wiki/Home/
> Seems like some sort of honeypot.
> Most seem to be from AWS & Linode & Leaseweb USA.

How does the process work to exclude nodes from the network?

If I understood the documentation correctly, as a node operator I can't
blacklist hosts individually (unless I'm putting them into MyFamily,
which I don't want to).
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] suspicious "Relay127001" relays

2016-07-05 Thread Niklas K.
It's up to directory authority operators to deal with 
suspicious/rogue/misconfigured relays by marking them as 
invalid/rejected/badexit.

Relay operators are not supposed to decide what other relays they may be put in 
a circuit with (apart from notifying the network which nodes belong to the same 
operator using MyFamily as you mention).

FYI, *clients* do have the ability to exclude nodes using the ExcludeNodes 
directive.

On 5 July 2016 16:46:18 CEST, simon  wrote:
>On 05.07.2016 13:31, Xza wrote:
>> 91 at the moment and they will soon gain more flags.
>> https://sourceforge.net/p/nepenthes/wiki/Home/
>> Seems like some sort of honeypot.
>> Most seem to be from AWS & Linode & Leaseweb USA.
>
>How does the process work to exclude nodes from the network?
>
>If I understood the documentation correctly, as a node operator I can't
>blacklist hosts individually (unless I'm putting them into MyFamily,
>which I don't want to).
>___
>tor-relays mailing list
>tor-relays@lists.torproject.org
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] suspicious "Relay127001" relays

2016-07-05 Thread Zenaan Harkness
On Tue, Jul 05, 2016 at 05:10:49PM +0200, Niklas K. wrote:
> It's up to directory authority operators to deal with 
> suspicious/rogue/misconfigured relays by marking them as 
> invalid/rejected/badexit.
> 
> Relay operators are not supposed to decide what other relays they may be put 
> in a circuit with (apart from notifying the network which nodes belong to the 
> same operator using MyFamily as you mention).
> 
> FYI, *clients* do have the ability to exclude nodes using the ExcludeNodes 
> directive.

In good news, 91 new high speed exits means Tor network should be
truly blazing for a while :)

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] suspicious "Relay127001" relays

2016-07-05 Thread nusenu
> In good news, 91 new high speed exits means Tor network should be
> truly blazing for a while :)

these are non-exits relays (currently)

currently 93 relays (89 running):
https://gist.githubusercontent.com/nusenu/0478362226f1b74744bec8700c4a3732/raw/e8a5ed82061a2b6a83f982964794ef79c067f005/Relay127001_93-relays_2016-07.txt


a few total stats for these relays:

58 unique /16 netblocks
26 unique ASes (20 unique organizations)

aggregated CW fraction: 0.1529% (as of 2016-07-05 22:00)

(if that doesn't tell you much, that is about at the 99th position of
the current CW ranking list but that is anything but static

https://raw.githubusercontent.com/ornetstats/stats/master/o/main_operators_by_cw.txt
)



signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] suspicious "Relay127001" relays

2016-07-05 Thread Green Dream
> It's up to directory authority operators to deal with
> suspicious/rogue/misconfigured relays by marking them as
> invalid/rejected/badexit.

So... what's going on in this particular case and what are the directory
authorities going to do, if anything?

As a relay operator near the top of the CW list, I continue to be somewhat
uncomfortable with the lack of transparency regarding the directory
authority decisions. It would be nice if the decision making process around
these types of events was a bit more transparent.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays