Re: [tor-relays] AirTor/ATOR continues to pester Tor relay operators, promising donations

2023-03-17 Thread Bauruine
From what I read it looks like they plan to create some blockchain that 
uses "Proof-of-relaying-Tor-traffic" as an alternative to Proof of Work 
or Proof of Stake. From their blog "rather than requiring complex 
off-chain verification or arbitrary computation to prevent bad actors 
receiving fees, Proof-of-Uptime verifies on useful activity." Supposedly 
to give some incentives to run Tor relays because you get "recognition 
rewards" I guess some shitcoin. Not sure what those are for but I'll 
just keep "mining" consensus weight. Because you don't need a modified 
version of Tor and you don't need the blockchain for that. Just download 
the consensus and look at the consensus weight and you have your proof 
of uptime and relaying.


On 17.03.23 15:22, Leon D wrote:

So they’re just a cryptocurrency mining company? I’m not 100% sure how 
they are able to use Tor Relays to mine Cryptocurrency?


On Fri, 17 Mar 2023 at 11:53, Richie  wrote:

ator.org  actually works. They try to get Relay
Operators to mine/receive
their cryptocurrency through uptime, see https://docs.ator.io/ . Also
some hardware plans regarding Wifi routers with preinstalled "ator"
software/routing.

Personally, i'd say "kill it with fire", but well, thats just me :)
Nevertheless, i guess it could be helpful to make it clear also on
behalf of torproject.org , that we're
neither support nor endorse their
plans and disencourage to use this stuff.

greetz
Richie

Am 16.03.23 um 20:25 schrieb Christian Pietsch via tor-relays:
> Dear Tor community,
>
> maybe the notes from the Tor relay operator meetup on March 4 should
> have mentioned that a participant called AirTor was kicked from that
> BBB conference.
>
> This happened because they were using “Tor” in their name and
> continued to make dubious offers like the one below which just
arrived
> in my NGO's inbox. They did not send it to the e-mail address in the
> ContactInfo of our Tor relays but a generic one. In BBB's text chat,
> they offered to change their name “if thats best,” but as you
can see,
> they have not. Instead, the signed as ATOR – but that might be a
typo.
>
> I am writing this to let you know that it's best to ignore e-mails
> like the one below. In the meetup, Roger made it increasingly clear
> that he does not believe that AirTor are acting in good faith.
>
> Cheers,
> Christian
>
>
> - Forwarded message -
>
> From:   AirTor Team 
> Message-ID:   
 <1167510526.29240.1678981005...@eu1.myprofessionalmail.com>
> Subject:        Support for TOR relay associations
> X-Mailer:       Open-Xchange Mailer v8.10.73
> X-Originating-IP:       24.218.88.76
>
> Hello from ATOR!
> We are a community driven initiative that provides recognition
rewards to
> supporters and operators in the TOR ecosystem.
> We would love to recognize your efforts and the efforts of your
relay
> operators, and hear your opinions on the protocol we have in mind.
> Please let us know if this is something of interest to you. We
would also like
> to donate to help your operation grow and remain active.
> Thank you for your time, we hope to hear from you soon!
> Sincerely,
> ATOR team
>
> - End forwarded message -
>
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Launch of new Tor Weather service

2023-03-30 Thread Bauruine

Hi

I've hacked together a little script [0] for those of us with many 
relays that don't want to wait till issue #17 / #55 are resolved. [1]


Bauruine

[0] https://gist.github.com/bauruine/6f333720b50ba6747970a5e6e4b97cb4

[1] 
https://gitlab.torproject.org/tpo/network-health/tor-weather/-/issues/17 
https://gitlab.torproject.org/tpo/network-health/tor-weather/-/issues/55


On 30.03.23 11:01, Georg Koppen wrote:

Hello everyone!

As indicated on the last relay operator meetup we were close to 
re-launching the Tor Weather service. Now, after fixing a bunch of 
last-minute issues and double-checking everything is working we can 
finally announce that the newly designed Tor Weather service is ready 
for public usage.


Feel free to try it out at https://weather.torproject.org and help 
improving it!


For those not knowing what this service is about: Tor Weather is 
offering subscriptions to keep track of the well-being of relays. 
Right now, after registering an account, one can get an e-mail 
notification in case a relay goes down or loses some flags or goes 
below a certain amount of observed bandwidth. The idea is to help 
operators in managing their relays that way and showing them their 
contribution to our project is much appreciated.


There a many more things we can potentially offer subscriptions for, 
like getting notifications for upcoming relay operator meetups, having 
earned a Tor t-shirt, new relay requirements, running outdated Tor 
versions... You can find a current list of ideas in our bug 
tracker[1]; feel free to add missing ones and pick up issues to work 
on. This is a free software project after all. :)


We see Tor Weather as an investment into our relay operator community 
and think it will be useful in the future to help growing and 
strengthening our community, which is very exciting.


Finally, I'd like to give a big shout-out to Sarthik Gupta who did all 
the heavy-lifting and re-wrote Tor Weather during last years' Google 
Summer of Code and keeps improving it. Additionally, kez from our 
sysadmin team was invaluable in getting all the different pieces set 
up and running on our infrastructure.


Thanks as well to all the volunteers, like nusenu, who contributed 
with ideas and feedback over the years which convinced us that Tor 
Weather is a worthwhile tool to invest time and energy in again.


Georg

[1] https://gitlab.torproject.org/tpo/network-health/tor-weather/-/issues

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Relay Bandwidth

2023-04-03 Thread Bauruine

Hi

You can use AccountingMax [0] for this. Note that if you set this to 
2900 Gbytes (You should leave some bandwidth for overhead and OS updates 
etc.) it will use 2900 Gbytes outgoing and 2900 Gbytes incoming. 
Depending on how DO calculates traffic you have do divide it by 2 or set 
AccountingRule to not go over the 3TB limit. "man tor" has a detailed 
descriptions for the possible options.


Bauruine

[0] https://support.torproject.org/relay-operators/limit-total-bandwidth/

On 31.03.23 21:34, sysmanager7 via tor-relays wrote:

Greetings all!

Setting up a new Digital Ocean Tor Relay. DO is giving me 3000 Gig a 
month. Is there a tutorial that I can use to calculate the bandwidth? 
I've searched around the web and for some reason people seem to dance 
around the question.  They give examples not relevant to me and zero 
math showing how the came to their answer.


As usual, any help will be appreciated :-)

Sysmanager7

Sent with Proton Mail <https://proton.me/> secure email.

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] I need a new VPS provider

2024-04-22 Thread Bauruine

Hi Landon

600 users are still a lot. For comparison from the 50+ bridges I'm 
running only one has 300 users all others are in the range of 5-60. I 
think it's not your provider that's throttling but some ISPs / countries 
that have detected your bridge and are blocking it. That's not uncommon 
and getting a new VPS with a new IP will fix that block but keep in mind 
that your current 600 people may lose their ability to connect to the 
Tor network and it's not guaranteed that you will get that many users 
soon, or ever, again.


The link you are looking for is

https://community.torproject.org/relay/community-resources/good-bad-isps/

Bauruine

On 22.04.24 03:02, Landon wrote:


Hello,

I am currently using gcore.com <http://gcore.com> as my VPS hosting 
provider. I have been running a Tor bridge with them for several years 
now. I am supposed to be getting 200 Mbps unmetered bandwidth. 
However, in the past six months, my bandwidth usage has been declining 
a lot. It seems like they might be throttling my server. I was getting 
over 2000 connected clients and now I'm down to less than 600. "iftop" 
shows me about 30 to 60 Mbps bandwidth usage during any time of the 
day. Take a look...


https://metrics.torproject.org/rs.html#details/4A0B065DB3CF807C6910DFEF6D9CCCB95C59C585

So, I am trying to find a Tor friendly VPS provider that offers 1 Gbps 
unmetered bandwidth. I found my current provider in an article 
describing Tor friendly providers, but I cannot locate that link.


I am currently paying about 15 Euros a month for a server with 2 
cores, 4 GB RAM and 100 GB SSD. I would like to pay about the same for 
my new service. In my search, I have found some better providers, but 
they don't seem to be Tor friendly.


Do you have a good provider that you really like that offers 
inexpensive VPS? I would prefer one located in the USA if possible, 
but I guess it doesn't matter if the bandwidth is good.


Landon

___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Webtunnel type bridge Tor Metrics

2024-04-25 Thread Bauruine

On 24.04.24 19:31, tor-home at encryptfirst.com wrote:
Maybe not directly related, but I've seen the same. The webtunnel 
bridge shows as functional on the bridges website and offline on the 
metrics website. It's been that way since I started running a 
webtunnel bridge last year.


Could it be related to these settings?

AssumeReachable 1
ORPort 127.0.0.1:auto


Yes that's the reason. There is an issue that this should be documented 
https://gitlab.torproject.org/tpo/web/community/-/issues/329


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Updating tor issue

2024-05-08 Thread Bauruine
What they told you, maybe a bit harsh, is that you are using a very old 
Debian version that will soon be end of life and won't get updates 
anymore. apt-get upgrade doesn't upgrade to new releases, you have to do 
it "manually". Think like a Windows 7 to Windows 10 upgrade which also 
doesn't happen with the normal Windows updates. You can either upgrade 
from your current version Buster (10 )--> Bullseye (11) --> Bookworm 
(12) or just reinstall it with Bullseye and configure it again.


Bauruine

On 07.05.24 19:50, Keifer Bly wrote:
Right? Why comment if your just going to be such a jerk and not be 
helpful?


I am just unable to figure why this would suddenly happen when the 
relay has been updating without issue and suddenly this happens, have 
been keeping Debian up to date using apt-get update so wondering what 
else needs to be done? Thanks.

--Keifer


On Mon, May 6, 2024 at 4:12 PM Micah Elizabeth Scott 
 wrote:


On 5/6/24 3:19 PM, li...@for-privacy.net wrote:
> Did you even only read 2 sentences from the link?

Can we stop just accepting behavior like this on the tor community's
mailing lists?

Seriously, it makes us all look bad.

I'm sorry folks have to endure so much just to use a computer program
that's intended to be humane and helpful.

--beth
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Updating tor issue

2024-05-08 Thread Bauruine
Sorry I meant reinstall it with Bookworm of course. You can backup and 
restore your keys if you like so you are not loosing your relays 
history. There is some documentation at 
https://community.torproject.org/relay/setup/post-install/ "Backup Tor 
Identity Keys"


On 08.05.24 10:16, Bauruine wrote:


What they told you, maybe a bit harsh, is that you are using a very 
old Debian version that will soon be end of life and won't get updates 
anymore. apt-get upgrade doesn't upgrade to new releases, you have to 
do it "manually". Think like a Windows 7 to Windows 10 upgrade which 
also doesn't happen with the normal Windows updates. You can either 
upgrade from your current version Buster (10 )--> Bullseye (11) --> 
Bookworm (12) or just reinstall it with Bullseye and configure it again.


Bauruine

On 07.05.24 19:50, Keifer Bly wrote:
Right? Why comment if your just going to be such a jerk and not be 
helpful?


I am just unable to figure why this would suddenly happen when the 
relay has been updating without issue and suddenly this happens, have 
been keeping Debian up to date using apt-get update so wondering what 
else needs to be done? Thanks.

--Keifer


On Mon, May 6, 2024 at 4:12 PM Micah Elizabeth Scott 
 wrote:


On 5/6/24 3:19 PM, li...@for-privacy.net wrote:
> Did you even only read 2 sentences from the link?

Can we stop just accepting behavior like this on the tor community's
mailing lists?

Seriously, it makes us all look bad.

I'm sorry folks have to endure so much just to use a computer
program
that's intended to be humane and helpful.

--beth
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor project helping to attempt to cancel Richard Stallman

2021-03-26 Thread Bauruine
It's about https://rms-open-letter.github.io/ a letter that not only 
calls for the cancellation of RMS but also "We are calling for the 
removal of the entire Board of the Free Software Foundation." and 
"Refuse to contribute to projects related to the FSF and RMS." that is 
supported by a lot of projects and individuals.


I'm strongly against the letter, especially because of the citations 
above, but would never stop my relays because of this. But if somebody 
still wants to spawn twice my relays to fight against my opinion I would 
be very happy.


I think that we, as Tor relay operators, are on very thin ice regarding 
"have enabled and empowered" something. I really hope we aren't the next 
target.


___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Does Tor work with Intel QAT acceleration

2022-04-12 Thread Bauruine

Hi Andreas

According to [0] QAT supports:

 * RSA with 2048, 3072, and 4096 bit keys
 * ECDH for the Montgomery Curve X25519 and NIST Prime Curves P-256 and
   P-384
 * ECDSA for the NIST Prime Curves P-256 and P-384
 * AES-GCM with 128, 192, and 256 bit keys

The tor-spec [1] shows that Tor only uses RSA with 1024 Bit Keys and the 
ciphersuits only contain AES CBC and no AES GCM ones. I'm not an expert 
but it looks like it's not that useful for Tor.


Tor doesn't scale well with multiple CPU cores but you can run 2 relays 
per IP to better use your hardware. On Debian / Ubuntu you can use 
tor-instance-create  to create multiple relays on the same host.


[0]: 
https://www.intel.com/content/www/us/en/developer/articles/guide/building-software-acceleration-features-in-the-intel-qat-engine-for-openssl.html 



[1]: https://gitweb.torproject.org/torspec.git/tree/tor-spec.txt


Regards
Stefan

On 11.04.22 21:13, Andreas Bollhalder wrote:

Hello Kevin

Thanks a lot for your response.

1) Regarding the speedtest, my firewall is limiting the speed to 
around 6.5Gbit/s. It's a fanless device and not capable to let me use 
the full 10Gbit/s. I host my hardware in my living room and can't 
install more powerfull, beacuse it would be too noisy and too big... 
My wife and kids will kill me :-)


2) For the NIC currently in use: it's an Intel I219-LM (rev 10). Maybe 
the are better models around. But I don't believe, they would lower 
the CPU usage by magnitude(s). But I let me educate if I'm wrong.


3) The CPU in use has the AES-NI flag set in "/proc/cpuinfo". So a 
litte acceleration is already in use.


In the old days when using pfSense on a PC Engines Alix, I was using a 
mini PCI crypto accelerator card. And it could double or tripple the 
OpenVPN speed. So it seemed to me, that QAT could do the same for Tor.


Andreas

On Monday, April 11, 2022 15:58 CEST, Thoughts 
 wrote:

Two suggestions:

1)  Run speedtest (https://www.speedtest.net) from behind your firewall
and verify your actual bandwidth (or at least get a good approximation
).

2)  Check the brand of NIC in your current machine.  Intel NICs are
reportedly much more efficient than RealTek for handling large number of
packets - which is why they are recommended for most firewall machines.
Suspect that logic would apply for a Tor Relay as well.

Suspect you also want a CPU with AES-NI support.  Check the specs on the
web, AES-NI should be called out.  "cat /proc/cpuinfo | grep aes" will
also tell you if your running some flavor of linux.

Kevin

ps. Dig around on the web for firewall hardware recommendations. I know
I've seen some tables on throughput for pfsense, shouldn't be too hard
to find and might throw some light on the situation.

pps.  Very jealous of your connectivity!

On 4/10/2022 2:32 PM, Andreas Bollhalder wrote:
> Hi all
>
> I have my first Tor relay up und running. It's currently installed on
> a little desktop computer with an Intel i5 9500T CPU. My Internet
> connection is 10Gb/s symetric. From this bandwidth, I would be able to
> spend a good part for supporting the Tor network.
>
> With that little machine, it seems that it would max out at somewhere
> at ~30 MBytes/s. For my definitive Tor relay hardware, I'm currently
> researching some options, which would be capable of handling Tor
> traffic at the rate of 200 to 300MBytes. Even it would be used
> nowadays, but who knows whats coming in the future and I hope this
> relay would last 5 years ore so.
>
> It looks to me, that with a normal CPU, it's impossible to reach my
> goal. But then I encountered, that Intel has the Quick Assist
> Technoloy (QAT) integrated in some of their products (ie. Atom C3xx8).
> This QAT can be used with OpenSSL as a hardware accelerator for
> encryption. There also exist dedicated PCIe cards with QAT (ie.
> Netgate CPIC-8955).
>
> Searching the Internet, I couldn't find any information if QAT would
> be helpful with Tor. But Tor uses the OpenSSL library and this can use
> the QAT acceleration. Is there anyone who has tried this und can share
> his expirience?
>
> Thanks in advance
> Andreas
>
> ___
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays




___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays