Re: [tor-relays] Looking for a ipv4 block and strategy

2024-09-24 Thread Osservatorio Nessuno via tor-relays
Hi, On 24/09/2024 14:32, boldsuck via tor-relays wrote: Some uplink providers offer BGP+IPv6+IPv4 in a bundle. (he.net) sadly we do not have this option at the moment. Since you can operate 32-40 nodes with 4-5 IPs, this would be an option to start with. With fast CPUs (clock speed), you c

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread Toralf Förster via tor-relays
On 9/24/24 20:56, boldsuck via tor-relays wrote: Oh, you're right. It's nicer because I have instance name in front of it. Then "grep -h" is your friend ;) -- Toralf ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torprojec

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
Toralf Förster via tor-relays wrote: > On 9/24/24 15:40, boldsuck via tor-relays wrote: > > https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukD > > DZo6BQqwQURzjQy > OT, but useless use of cat ;) Oh, you're right. It's nicer because I have instance name in front of it. grep

Re: [tor-relays] Why I do have so often an "8" in my bridge stats?

2024-09-24 Thread David Fifield
On Tue, Sep 24, 2024 at 06:48:04PM +0200, Toralf Förster via tor-relays wrote: > On 9/24/24 18:39, David Fifield wrote: > > The numbers are rounded to reduce precision. > > > > https://spec.torproject.org/dir-spec/extra-info-document-format.html > > ah, thx. > > I'm just curious, if 4 is rounded

Re: [tor-relays] Why I do have so often an "8" in my bridge stats?

2024-09-24 Thread Toralf Förster via tor-relays
On 9/24/24 18:39, David Fifield wrote: The numbers are rounded to reduce precision. https://spec.torproject.org/dir-spec/extra-info-document-format.html ah, thx. I'm just curious, if 4 is rounded to 0 or to 8 ? -- Toralf ___ tor-relays mailing lis

Re: [tor-relays] Why I do have so often an "8" in my bridge stats?

2024-09-24 Thread David Fifield
On Tue, Sep 24, 2024 at 04:03:55PM +0200, Toralf Förster via tor-relays wrote: > Never cared about this before, but isn't the "8" too often here? : > > $ cat ~/tmp/tor_bridge_stats > i10 bridge-ips > ru=264,br=16,de=16,us=16,au=8,cl=8,co=8,cz=8,dz=8,eg=8,es=8,fr=8,gb=8,gr=8,hk=8,id=8,in=8,ir=8,it=

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
pasture_clubbed242--- via tor-relays wrote: > I could only find this article saying there is a 'cert=' option, which > initially appear useful for Tor. Cert is default in obfs4 bridelines, you can create yours with: ~# cat /var/lib/tor-instances/01/fingerprint nikname fingerprint ~# cat /var/lib

[tor-relays] Why I do have so often an "8" in my bridge stats?

2024-09-24 Thread Toralf Förster via tor-relays
Never cared about this before, but isn't the "8" too often here? : $ cat ~/tmp/tor_bridge_stats i10 bridge-ips ru=264,br=16,de=16,us=16,au=8,cl=8,co=8,cz=8,dz=8,eg=8,es=8,fr=8,gb=8,gr=8,hk=8,id=8,in=8,ir=8,it=8,kr=8,lt=8,lv=8,nl=8,ph=8,sa=8,sg=8,tw=8,ua=8,ve=8 i11 bridge-ips ru=152,ir=16,cn=8,cz=

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread Toralf Förster via tor-relays
On 9/24/24 15:40, boldsuck via tor-relays wrote: https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukDDZo6BQqwQURzjQy OT, but useless use of cat ;) -- Toralf ___ tor-relays mailing list tor-relays@lists.torproject.org https://lis

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
On Montag, 23. September 2024 22:27:25 CEST Fran via tor-relays wrote: > Philipp Winter regarding iat mode: > >The feature introduces a substantial performance penalty for a dubious > >and poorly understood privacy gain. If I were to write an algorithm to > >detect obfs4, I wouldn't bother deal

Re: [tor-relays] Looking for a ipv4 block and strategy

2024-09-24 Thread boldsuck via tor-relays
Osservatorio Nessuno via tor-relays wrote: > our organization is working to add more physical nodes, in our little > Italy headquarter[1]. We have reached an agreement with one of the > available fiber reseller there, where we will pay for L2 transport to a > datacenter, where we will buy our upli