[tor-relays] Bridge not used

2022-05-10 Thread Arnim Wiezer via tor-relays
Hi Tor-Operators,
 
I have installed a bridge according to the official how-to. The config is as 
follows:
 
Log notice file /var/log/tor/notices.log
DataDirectory /var/lib/tor
Address bridge.xxx.de
BridgeRelay 1
ORPort 1044
ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
ServerTransportListenAddr obfs4 0.0.0.0:9043
ExtORPort auto
ContactInfo arn...@mailbox.org
Nickname lunabridge
PublishServerDescriptor 1
BridgeDistribution any
 
Under 
https://metrics.torproject.org/rs.html#details/4DD98FB1959065309FD4A183530BC915A689E493
 
I see basically no usage, the logs are fine - as far as I can tell.
 
Any help appreciated!
 
Best,
Arnim
 
 ___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Bridge not used

2022-05-10 Thread gus
Hi,

It's because your bridge is not being distributed ("Bridge distribution
mechanism reserved"). 

Change to another bridge distribution method: https, email...
See this Support article:
https://support.torproject.org/relay-operators/change-bridge-distribution/

Thanks for running bridges!

Gus

On Tue, May 10, 2022 at 02:40:14PM +0200, Arnim Wiezer via tor-relays wrote:
> Hi Tor-Operators,
>  
> I have installed a bridge according to the official how-to. The config is as 
> follows:
>  
> Log notice file /var/log/tor/notices.log
> DataDirectory /var/lib/tor
> Address bridge.xxx.de
> BridgeRelay 1
> ORPort 1044
> ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
> ServerTransportListenAddr obfs4 0.0.0.0:9043
> ExtORPort auto
> ContactInfo arn...@mailbox.org
> Nickname lunabridge
> PublishServerDescriptor 1
> BridgeDistribution any
>  
> Under 
> https://metrics.torproject.org/rs.html#details/4DD98FB1959065309FD4A183530BC915A689E493
>  
> I see basically no usage, the logs are fine - as far as I can tell.
>  
> Any help appreciated!
>  
> Best,
> Arnim
>  
>  

> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


-- 
The Tor Project
Community Team Lead


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Bridge not used

2022-05-10 Thread yl



On 5/10/22 14:57, gus wrote:

It's because your bridge is not being distributed ("Bridge distribution
mechanism reserved").

Change to another bridge distribution method: https, email...
See this Support article:
https://support.torproject.org/relay-operators/change-bridge-distribution/


I think this line can be removed from your torrc "BridgeDistribution 
any", I guess then it defaults to something, I assume to https.


Is that correct?

Regards
yl
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Ext Relay Operators: Please Upgrade to 0.4.7.7!

2022-05-10 Thread Ladar Levison via tor-relays
On 5/4/22 4:31 PM, Mike Perry wrote:
> Tor 0.4.7.7-stable contains a very important performance improvement,
> called Congestion Control. 

> We have packages in available for Debian, Ubuntu, Fedora, CentOS, and
> BSD:
>   - Debian: https://support.torproject.org/apt/tor-deb-repo/
>   - Ubuntu: https://support.torproject.org/relay-operators/operators-4/
>   - Fedora/CentOS: https://support.torproject.org/rpm/tor-rpm-install/
>   - BSD:
> https://lists.torproject.org/pipermail/tor-relays/2022-May/020528.html

Anyone know when the EPEL TOR packages will updated? The EL 8 repos only
offer 0.4.5.11. EL 9 is only a little newer with RPMs for TOR 0.4.6.8.
Fedora 35 and 36 (with the latter launching today) have only been
updated to 0.4.6.9. As of now, it appears that only Fedora 37 has been
updated to 0.4.7.7.

Yes, I know, there is a 0.4.7.7 RPM for EL 8 inside the TOR repo, but
I'm wondering if anyone knows when the Fedora/EPEL repos will be
updated? Anu more importantly why they haven't been updated already?
When I compared the packages from EPEL and TOR a couple of years ago
(both offered the sane TOR release at that point) I discovered the TOR
package was built differently - assuming thta is still the case, it
means the RPMs aren't interchangeable for someone with a torrc file that
has evolved beyond the default.

Fedora repo for the TOR package:

https://src.fedoraproject.org/rpms/tor

Drect download Link for the TOR repo RPM in case anyone wants it:

https://rpm.torproject.org/centos/8/x86_64/tor-0.4.7.7-1.el8.x86_64.rpm

L~


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Ext Relay Operators: Please Upgrade to 0.4.7.7!

2022-05-10 Thread lists
On Tuesday, May 10, 2022 4:55:57 PM CEST Ladar Levison via tor-relays wrote:

> Anyone know when the EPEL TOR packages will updated? The EL 8 repos only
> offer 0.4.5.11. EL 9 is only a little newer with RPMs for TOR 0.4.6.8.
> Fedora 35 and 36 (with the latter launching today) have only been
> updated to 0.4.6.9. As of now, it appears that only Fedora 37 has been
> updated to 0.4.7.7.

I don't know the philosophy of Fedora/EPEL (CentOS/RHEL). In general, no 
configuration-breaking software is installed on productive systems.
With debian, once the release is frozen and stable, there are _no_ upgrades. 
This is the main reason for the stable archive! There are only updates, 
security updates in the 'stable main' archive
Some new features are offered in backports if they don't break configs of 
stable packages. There are very few upgrades (virus scanners and timezone 
data) in stable-updates, formerly volatile.

Therefore, Tor upgrades with new features must be installed from the Tor 
project repro.
EPEL (CentOS/RHEL) may have a similar policy and you must grab packages from 
the Tor project if you want to upgrade.

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Debian is not allowing tor to update despite it being listed as a trusted respritory

2022-05-10 Thread lists
On Saturday, May 7, 2022 6:50:43 PM CEST Keifer Bly wrote:
> Ok will try these things. Does that it's an ovh debain have anything to do
> with it? Hosted by them and they may frown on tor.

No, there are a lot (actually too many) Tor relays at OVH.
https://nusenu.github.io/OrNetStats/#autonomous-systems-by-cw-fraction

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Debian is not allowing tor to update despite it being listed as a trusted respritory

2022-05-10 Thread lists
On Monday, May 9, 2022 9:40:12 AM CEST ben wrote:

Hi, I think this mail should reach Keifer.

@ Keifer please post the output of:
cat /etc/issue

It should be 'Debian GNU/Linux 10'

apt update && sudo apt full-upgrade
would install missing packages.

Then read what Ben wrote about 'update-ca-certificates'.

--  Forwarded Message  --

Subject: Re: [tor-relays] Debian is not allowing tor to update despite it 
being listed as a trusted respritory
Date: Donnerstag, 5. Mai 2022, 15:09:07 CEST
From: ben 
To: tor-relays 
CC: lists 

> Simply displays a message "no valid openpgp data found". My sources file



You'll see this because your system doesn't trust the cert chain.



You're not seeing a certificate warning because you've got output suppressed 
(the -q in wget's arguments)



If you run



wget https://deb.torproject.org/torproject.org/
A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc



I suspect you'll see the certificate warning.



You need to fix that before anything suggested here is going to work - if the 
cert chain isn't trusted then apt isn't going to access the repository's 
indexes, and so won't even see what packages are there, much less install 
them.



As apt didn't grab an updated version for you (which may be due to other repo 
misconfigurations) you probably want to grab and install the cert manually




# Verify that this gives a cert warning

curl https://deb.torproject.org/torproject.org/ 



curl -k --output "/tmp/ISRG_Root_X1.crt"  "https://letsencrypt.org/certs/
isrgrootx1.pem.txt"

sudo mv /tmp/ISRG_Root_X1.crt /usr/local/share/ca-certificates/

sudo update-ca-certificates



# Now try again

curl https://deb.torproject.org/torproject.org/ 



If that final curl now works, run apt-get update and you should find apt no 
longer complains about the tor repo



-- 
Ben Tasker
https://www.bentasker.co.uk


-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

signature.asc
Description: This is a digitally signed message part.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Bridge not used

2022-05-10 Thread gus
On Tue, May 10, 2022 at 03:08:16PM +0200, yl wrote:
> 
> On 5/10/22 14:57, gus wrote:
> > It's because your bridge is not being distributed ("Bridge distribution
> > mechanism reserved").
> > 
> > Change to another bridge distribution method: https, email...
> > See this Support article:
> > https://support.torproject.org/relay-operators/change-bridge-distribution/
> 
> I think this line can be removed from your torrc "BridgeDistribution any", I
> guess then it defaults to something, I assume to https.
> 
> Is that correct?
> 

No, the distribution method is assigned by bridgeDB/rdsys and there isn't a
default method.

> Regards
> yl
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
The Tor Project
Community Team Lead


signature.asc
Description: PGP signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] OpenBSD -stable net/tor and 0.4.7.7

2022-05-10 Thread George
The OpenBSD net/tor -current port is correctly on 0.4.7.7, but the 
-stable port is still on 0.4.6.10.


I submitted a diff to update -stable port to 0.4.7.7 last week, but it 
has not been committed yet.


https://marc.info/?l=openbsd-ports&m=165179875418235&w=2

It's attached and should work fine.

In order to update the OpenBSD -stable port you need an updated -stable 
7.1 ports tree, then you apply the patch within the /usr/ports/net/tor 
port, and build from there.


I can provide more guidance if necessary, but in order to not bore 
everyone else, maybe the Tor-BSD list is more appropriate?


https://lists.nycbug.org:8443/mailman/listinfo/tor-bsd

I can send out an amd64 -stable package, but then you'd have to trust me.

gIndex: tor/Makefile
===
RCS file: /cvs/ports/net/tor/Makefile,v
retrieving revision 1.143
diff -u -p -r1.143 Makefile
--- tor/Makefile	11 Mar 2022 19:47:52 -	1.143
+++ tor/Makefile	6 May 2022 00:52:06 -
@@ -1,6 +1,6 @@
 COMMENT=	anonymity service using onion routing
 
-DISTNAME=	tor-0.4.6.10
+DISTNAME=	tor-0.4.7.7
 CATEGORIES=	net
 HOMEPAGE=	https://www.torproject.org/
 
Index: tor/distinfo
===
RCS file: /cvs/ports/net/tor/distinfo,v
retrieving revision 1.116
diff -u -p -r1.116 distinfo
--- tor/distinfo	1 Mar 2022 10:29:07 -	1.116
+++ tor/distinfo	6 May 2022 00:52:06 -
@@ -1,2 +1,2 @@
-SHA256 (tor-0.4.6.10.tar.gz) = lMzWDgTlWPM75zAyvITqJBZg+S9Yz7iHib2miTc54xw=
-SIZE (tor-0.4.6.10.tar.gz) = 7811644
+SHA256 (tor-0.4.7.7.tar.gz) = PhMRWLUrlDXX5D0cR+8oi5bQBTQsxEuMlQu0A4UaW0Q=
+SIZE (tor-0.4.7.7.tar.gz) = 7895089
Index: tor/patches/patch-configure_ac
===
RCS file: /cvs/ports/net/tor/patches/patch-configure_ac,v
retrieving revision 1.18
diff -u -p -r1.18 patch-configure_ac
--- tor/patches/patch-configure_ac	11 Mar 2022 19:47:53 -	1.18
+++ tor/patches/patch-configure_ac	6 May 2022 00:52:06 -
@@ -2,7 +2,7 @@ disable -fasynchronous-unwind-tables as 
 Index: configure.ac
 --- configure.ac.orig
 +++ configure.ac
-@@ -1567,13 +1567,6 @@ fi
+@@ -1435,13 +1435,6 @@ fi
  CFLAGS="$saved_CFLAGS"
  AC_SUBST(F_OMIT_FRAME_POINTER)
  
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays