[tor-relays] Re: All of my nodes have been banned

2025-01-20 Thread Georg Koppen via tor-relays
Hello! petition_tricky750--- via tor-relays: Hello, What are some of the most common reasons for relays and exits to be banned from Tor? Had it happen to all of my 5 nodes and I'm currently awaiting response from bad-relays list. I don't see an email from you there yet. You might want to re

[tor-relays] Re: Tor relays source IPs spoofed to mass-scan port 22?

2024-11-09 Thread Georg Koppen
usetor.wtf via tor-relays: Adding another me too. 2 of 5 different ISPs for middle and entry nodes shared same abuse complaints other received. First time in 10 years to receive abuse complaints from middle/entry nodes. Not fun. It'd be great for Tor to publish a blog on what is happening / w

Re: [tor-relays] Way to be notified when relay goes offline?

2024-02-05 Thread Georg Koppen
Josh Lawson via tor-relays: Does Tor Weather work with bridges? I have 2 bridges that have been operating for years and it says the fingerprints do not match any relays. I have been using Uptime Robot, but it would be cool to use Tor Weather. Right now, Tor Weather does not work for bridges.

Re: [tor-relays] Relay first seen reset on Tor metrics

2024-01-30 Thread Georg Koppen
Zachary via tor-relays: The "first seen" date on my relay A00E3AAF5A24DC69740FA7A3A1C4A0ECB7972722 Got reset today while I was at work. It's not a problem and I don't particularly care, but is there anything that would cause this? IP hasn't changed, Tor version hasn't changed, etc. That's

[tor-relays] PSA: Tor 0.4.7 reaches end of life (EOL) on 2024-01-31

2024-01-17 Thread Georg Koppen
Hello! In case it affects you as you are still running your relay or bridge on Tor 0.4.7.x: the 0.4.7 series is going EOL on *2024-01-31* (roughly in 2 weeks from now). That's currently still 1346 relays, which means roughly 15% of the advertised bandwidth of the network (and 964 bridges, wh

Re: [tor-relays] Relay that's been running for a long time suddenly saying it's new?

2024-01-15 Thread Georg Koppen
Keifer Bly: Hi, So my relay at https://metrics.torproject.org/rs.html#details/79E3B585803DE805CCBC00C1EF36B1E74372861D is suddenly saying it's a new relay. Don't know why this would happen as it's been running for a few years, but suddenly saying it's new? Should be fine again right now, no? W

Re: [tor-relays] Issue with Relay Status Discrepancy on Tor Metrics

2023-12-18 Thread Georg Koppen
Jan: Dear Tor Metrics Support Team, I hope this message finds you well. I am writing to report an issue regarding the status of my relay on Tor Metrics. According to Nyx, my relay appears to be running without any problems. However, Tor Metrics indicates that it is offline. Relay Details: Nam

[tor-relays] Exit operators on the 0.4.8.x series, please upgrade to 0.4.8.10 ASAP!

2023-12-08 Thread Georg Koppen
Hello exit node operators! Today (2023-12-08) the Network Team has released a new Tor version, 0.4.8.10[1]. This update contains a fix to a remotely triggerable crash bug (TROVE-2023-007) affecting exit relays on the 0.4.8.x series. Please upgrade as soon as possible to maintain network stabil

Re: [tor-relays] Proposal: Restrict ContactInfo to Mandatory Email Address

2023-10-26 Thread Georg Koppen
rusive than what you have in mind. But I am fine thinking more about it if there is interest from the community. Thanks, Georg -- Danny -- Yours sincerely, Xiaoqi Chen On Sat, Oct 21, 2023 at 3:55 PM Georg Koppen wrote: Hello everyone! As indicated in our bug tracker a while ago[1]

[tor-relays] Proposal: Restrict ContactInfo to Mandatory Email Address

2023-10-21 Thread Georg Koppen
aft[3]). """ ``` Filename: 100-contactinfo-mandatory-email-address.md Title: Restricting ContactInfo to Mandatory Email Address Author: Georg Koppen Created: 2023-10-21 Status: Open ``` ## Overview This document proposes to change the ContactInfo field from a free text field to one that is on

[tor-relays] PSA: Exit nodes on 0.4.7.x might see less traffic

2023-10-17 Thread Georg Koppen
Hello everyone! As you might have noticed, Tor Browser 13 got released last week[1] which ships for the first time a Tor 0.4.8.x version (0.4.8.7) to our stable Tor Browser users. One of the main features in the 0.4.8.x series is Conflux, which allows traffic-splitting to improve Tor performan

Re: [tor-relays] Wrong "first seen" flag for bridges at metrics.torproject.org

2023-08-23 Thread Georg Koppen
Hi! telekobold: Hi together, I have an issue regarding the "first seen" flag at metrics.torproject.org: It is definitely wrong for my two bridges - both dates are much too close in the past. For one of the bridges, it seems to correspond to the last signing key renewal, for the other bridg

[tor-relays] 8 relays pers IP address are allowed from now (end of June 2023) on

2023-06-29 Thread Georg Koppen
Hi! You might recall that Tor has been restricting the possible amount of Tor relays per IP address to 2, mainly for Sybil prevention reasons.[1] We bumped that limit to 4 earlier this year[2] to make better use of available resources and considered back then bumping that limit further to 8 r

[tor-relays] Providing metrics relevant to relay operators

2023-06-07 Thread Georg Koppen
Hello! I got recently pinged by a large exit operator asking whether we had a website with nice graphs and statistics relevant to relay operators on our project infrastructure (showing e.g. the largest exit operators etc.), but that's currently not the case and we should fix that. There are s

Re: [tor-relays] PSA: Tor 0.4.5 reaches end of life (EOL) on 2023-02-15

2023-05-17 Thread Georg Koppen
Georg Koppen: Hello! In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on *2023-02-15* (roughly in 3 weeks from now). That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the ne

Re: [tor-relays] Open call for proposals for improving the health of the Tor relay operator community and the Tor network

2023-05-11 Thread Georg Koppen
gus: On Mon, Mar 06, 2023 at 07:49:47PM +0100, nusenu wrote: gus: On Fri, Mar 03, 2023 at 11:26:07PM +0100, nusenu wrote: I've got some practical experience with how things are (not) handled by the Tor Project in this space which discourages involvement. The past has also shown that proposals

Re: [tor-relays] Open call for proposals for improving the health of the Tor relay operator community and the Tor network

2023-04-04 Thread Georg Koppen
toroperl...@jrobin.ephemeron.org: On Sun, 2 Apr 2023, nusenu wrote: I would actually like to hear the torproject's "self-assessment" on this before I send my opinion on it. I agree: it would be nice to hear about the current (informal) process, flawed as it may be, and the Tor Project's self

Re: [tor-relays] Open call for proposals for improving the health of the Tor relay operator community and the Tor network

2023-04-02 Thread Georg Koppen
nusenu: I've got some practical experience with how things are (not) handled by the Tor Project in this space which discourages involvement. That's unfortunate. What has been the problem with past proposal-handling? And how should it have been done differently? I would actually like to hear t

Re: [tor-relays] Launch of new Tor Weather service

2023-03-31 Thread Georg Koppen
Georg Koppen: Georg Koppen: Hello everyone! As indicated on the last relay operator meetup we were close to re-launching the Tor Weather service. Now, after fixing a bunch of last-minute issues and double-checking everything is working we can finally announce that the newly designed Tor

Re: [tor-relays] Launch of new Tor Weather service

2023-03-30 Thread Georg Koppen
Georg Koppen: Hello everyone! As indicated on the last relay operator meetup we were close to re-launching the Tor Weather service. Now, after fixing a bunch of last-minute issues and double-checking everything is working we can finally announce that the newly designed Tor Weather service is

[tor-relays] Launch of new Tor Weather service

2023-03-30 Thread Georg Koppen
Hello everyone! As indicated on the last relay operator meetup we were close to re-launching the Tor Weather service. Now, after fixing a bunch of last-minute issues and double-checking everything is working we can finally announce that the newly designed Tor Weather service is ready for publ

Re: [tor-relays] Notification when tor relay goes offline

2023-03-24 Thread Georg Koppen
Keifer Bly: Hi, So I am still working on the issues for my relays, but am wondering, is it possible to sign up for email notifications when a relay goes offline? If you can wait another week until we have officially launched our new Tor Weather service then we could offer that one. If you can

Re: [tor-relays] Open call for proposals for improving the health of the Tor relay operator community and the Tor network

2023-03-06 Thread Georg Koppen
nusenu: I've got some practical experience with how things are (not) handled by the Tor Project in this space which discourages involvement. That's unfortunate. What has been the problem with past proposal-handling? And how should it have been done differently? The past has also shown that

Re: [tor-relays] D5A3882CBDBE4CAD2F9DDA2AB80FE761BEDC3F11 is spoofing my contact info

2023-03-06 Thread Georg Koppen
li...@for-privacy.net: This is _not_ my relay: https://metrics.torproject.org/rs.html#details/D5A3882CBDBE4CAD2F9DDA2AB80FE761BEDC3F11 https://nusenu.github.io/OrNetStats/w/relay/D5A3882CBDBE4CAD2F9DDA2AB80FE761BEDC3F11.html Thanks for the report, marked for rejection. Once a majority of dire

Re: [tor-relays] removing tor versions from "recommended versions" before they reach EOL

2023-03-01 Thread Georg Koppen
nusenu: Hi, the tor 0.4.5.x end of live versions are still on the recommended versions list: https://consensus-health.torproject.org/#recommendedversions consensus client-versions 0.4.5.6, 0.4.5.7, 0.4.5.8, 0.4.5.9, 0.4.5.10, 0.4.5.11, 0.4.5.12, 0.4.5.14, 0.4.5.15, 0.4.5.16, 0.4.7.7, 0.

Re: [tor-relays] disable moderation on tor-relays again?

2023-02-14 Thread Georg Koppen
ot as aggressively as we could). Georg This feature could be used more often to avoid those frustrating delays for a growing number of participants. C: Am 14. Februar 2023 09:57:38 MEZ schrieb Georg Koppen : nusenu: Hi, can we try to disable moderation on this list again and see how it goes?

Re: [tor-relays] disable moderation on tor-relays again?

2023-02-14 Thread Georg Koppen
nusenu: Hi, can we try to disable moderation on this list again and see how it goes? If it gets out of hand you can always move back to a moderated mode or a mode where the first email of a sender is moderated. I've no strong opinion but looking over my moderator experience spanning the pa

[tor-relays] 4 relays per IP address are allowed from now (Feb 2023) on

2023-02-02 Thread Georg Koppen
Hello everyone! You might recall that Tor is restricting the possible amount of Tor relays per IP address to 2, mainly for Sybil prevention reasons.[1] Given that Tor on the relay side at least is not multithreaded yet (and will likely not be for the near and medium future) that's wasting a lo

Re: [tor-relays] PSA: Tor 0.4.5 reaches end of life (EOL) on 2023-02-15

2023-01-25 Thread Georg Koppen
t way at least the Debian relays would get a proper update I assume. --- Original Message --- Georg Koppen g...@torproject.org schrieb am Montag, 23. Januar 2023 um 16:59: Hello! In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series i

[tor-relays] PSA: Tor 0.4.5 reaches end of life (EOL) on 2023-02-15

2023-01-23 Thread Georg Koppen
Hello! In case it affects you as you are still running your relay or bridge on Tor 0.4.5.x: the 0.4.5 series is going EOL on *2023-02-15* (roughly in 3 weeks from now). That's currently still 760 relays, which means roughly 7% of the advertised bandwidth of the network (and 387 bridges, whic

Re: [tor-relays] Short heads up

2023-01-09 Thread Georg Koppen
Neel Chauhan: On 2022-12-25 00:27, Frank Steinborn via tor-relays wrote: Hi friends, I made some smaller tweaks over the last few hours which should especially help relays on nearly OOM or thrashing situations (making use of Zswap + MGLRU if available). The rules themselves are just the sam

[tor-relays] DoS attacks -- status update

2022-10-28 Thread Georg Koppen
Hello everyone! It's been a while since we last provided some update on this mailing list about our ongoing work fighting several DoS attacks. We can use the attached graph about detected overload over the last couple of months to show what is going on and what we do/plan to do about it. T

[tor-relays] Upcoming OpenSSL 3 security bugfix release

2022-10-28 Thread Georg Koppen
Hello relay operators! If you are running OpenSSL 3 please be aware that you might need to upgrade it to 3.0.7 as fast as possible on next Tuesday (Nov 1). In an announcement[1] it got said 3.0.7 fixes a CRITICAL security issue. Operators running on the 1.1 series are fine as far as we know s

Re: [tor-relays] Tor 0.4.6.x is unsupported, please upgrade

2022-10-07 Thread Georg Koppen
Georg Koppen: Hello! To repeat what recently[1] got brought up: it's time to get relays upgraded in case they are running the EOL 0.4.6.x Tor series. We'll start reaching out to operators with valid contact information this week and plan to reject relays which are still on 0.4.6.x

Re: [tor-relays] Consensus weight tanking

2022-10-06 Thread Georg Koppen
Me via tor-relays: Good day, Not sure if this would be the proper avenue to pursue this. I operate a couple of middle relays from my home server. All seemed well until this morning. Three days ago one was promoted to guard status while the other lags behind. This morning I check the Tor metric

[tor-relays] Tor 0.4.6.x is unsupported, please upgrade

2022-08-23 Thread Georg Koppen
Hello! To repeat what recently[1] got brought up: it's time to get relays upgraded in case they are running the EOL 0.4.6.x Tor series. We'll start reaching out to operators with valid contact information this week and plan to reject relays which are still on 0.4.6.x in about 5 weeks from now

Re: [tor-relays] Metrics falsely showing my relay as offline

2022-08-19 Thread Georg Koppen
Eddie: I have 1 relay (40D13096BBD11AF198CE61DEE4EAECCE5472F2E7) that according to the metrics is always bouncing between online and offline, sometimes multiple times per day.  The logs show it running the whole time and when the metrics also show it running, the uptime continues to increase c

Re: [tor-relays] recommended way to run 0.4.7 on armhf?

2022-08-11 Thread Georg Koppen
given that we have a good workaround and a lot of affected users are happy with it. Patches (still) welcome! :) Georg [1] https://gitlab.torproject.org/tpo/core/tor/-/issues/40347 Georg Koppen: Right. One thing we recommended when talking to relay operators during earlier EOL upgrade periods

Re: [tor-relays] Refuse Guard flag

2022-08-11 Thread Georg Koppen
Eldalië via tor-relays: Hello there. I have been running my (non-exit) relay without issues for some months. Recently I noticed that my ISP started to reset my IP a few hours after the node gets the Guard flag, thus making it lose such a flag (as well as Stable and HSDir). I am not sure if the Gu

Re: [tor-relays] recommended way to run 0.4.7 on armhf?

2022-08-10 Thread Georg Koppen
ilf: What's the recommended way to run 0.4.7 on armhf? The package repository [deb.torproject.org] does not offer 32-bit ARM architecture (armhf) images (yet). https://support.torproject.org/apt/tor-deb-repo/ Debian has 0.4.7 in bullseye-backports. But Raspbian doesn't have bullseye-backpor

Re: [tor-relays] We're trying out guard-n-primary-guards-to-use=2

2022-07-11 Thread Georg Koppen
Logforme: On 2022-07-06 21:19, Roger Dingledine wrote: But it was replaced with a new overload (boo), from way too many Tor clients running at a few cloud providers. The main result for relay operators is greatly increased file descriptor use, with a few IP addresses or /24's generating the majo

Re: [tor-relays] Is ExoneraTor still alive?

2022-07-07 Thread Georg Koppen
Christian Pietsch: Dear all, ExoneraTor is/was useful for showing law enforcement authorities that a given IP address acted as a Tor exit relay at a given day. Unfortunately, ExoneraTor seems to be offline. This page does not work at all, returning an HTTP 503 error immediately: https://exoner

Re: [tor-relays] Relay "unmeasured" after update to 0.4.7.8

2022-06-27 Thread Georg Koppen
Martin: Hi all! After updatering to the latest version, my relay consensus went down to 20 and was marked unmeasured. However it still serves a couple of thousand connections (capped at 10 MB/s) and all flags are still there, but when I try to use it to build a circuit manually it won't let me..

Re: [tor-relays] Revisit issue on incorrect time stamps on metrics

2022-05-21 Thread Georg Koppen
a tor op via tor-relays: Hi I wrote about incorrect date stamps for relays/bridges on atlas/metrics site in December 2021. This has reappeared since some time (dont know for how long). First seen fullt incorrect by years and all times unlogic, first seen later than last restarted etc. Is th

Re: [tor-relays] Ext Relay Operators: Please Upgrade to 0.4.7.7!

2022-05-04 Thread Georg Koppen
li...@for-privacy.net: On Wednesday, May 4, 2022 11:31:05 PM CEST Mike Perry wrote: Tor 0.4.7.7-stable contains a very important performance improvement, called Congestion Control. You can read more about this improvement here: https://blog.torproject.org/congestion-contrl-047/ The TL;DR is th

Re: [tor-relays] Another error

2022-04-19 Thread Georg Koppen
onion...@riseup.net: Hello, we tried a solution proposed by ad...@for-privacy.net (deleting /var/lib/tor folder) but now we get another error: │ 19:41:54 [WARN] http status 400 ("Suspicious relay address range -- if you think this is a mistake please set a valid email address in ContactInfo a

Re: [tor-relays] Relay question

2022-04-12 Thread Georg Koppen
onion...@riseup.net: I found in syslog file: http status 400 ("Fingerprint and/or ed25519 identity is marked rejected -- if you think this is a mistake please set a valid email address in ContactInfo and send an email to bad-rel...@lists.torproject.org mentioning your fingerprint(s)?") response f

Re: [tor-relays] Next Tor Relay Operator Meetup - April 2 @ 1900 UTC

2022-04-02 Thread Georg Koppen
Stefan Leibfarth: Hello everyone, On March 28, 2022 8:57:51 PM GMT+02:00, gus wrote: The next Tor Relay Operator meetup will happen this Saturday, April 2 @ 1900 UTC / 1500 EDT / 2100 CET. Friendly reminder, today is the day. :-) Right and it is 2100 CE*S*T See you there, Georg OpenPGP_

Re: [tor-relays] Bridges not being distributed

2022-03-25 Thread Georg Koppen
Spydar007 via tor-relays: Hello, I notice (almost) all bridges are showing their distributor mechanism as None on Tor Metrics.[1] There are also hardly any in the latest pool assignments file from CollecTor.[2] Curious as to why? Is this a change that needs fixing on a bridge operators end,

Re: [tor-relays] Tor 0.3.5.x is unsupported, please upgrade

2022-03-21 Thread Georg Koppen
Georg Koppen: Hello! It's time again to get relays upgraded running an EOL Tor series (0.3.5.x). We'll start reaching out to operators with valid contact information this week and plan to start reject relays which are still on 0.3.5.x about 4 weeks from now on at the begin of Marc

Re: [tor-relays] Tor Relay Operator Meetup (Saturday, March 5th @ 2000 UTC)

2022-03-14 Thread Georg Koppen
George: On 3/5/22 13:40, flux via tor-relays wrote: Hi, will there be a recording? Unfortunately I won't be able to attend. Unfortunately not flux. We will catch you next time. Pad notes will be posted after the meeting. Here they come. On March 5, a group of 40-50 operators joined the T

[tor-relays] Flooding of unbound via resolve attempts

2022-03-10 Thread Georg Koppen
Hello! As you might know we are doing regular (at the moment weekly) scans of exit nodes to find and help with misconfigurations or errors that have potentially serious effects for Tor network usability and performance. The results we got so far after over a year of scanning are roughly singl

Re: [tor-relays] How to reduce tor CPU load on a single bridge?

2022-03-07 Thread Georg Koppen
Solar Array (~12 Hour Charge) + 2 x Charmast 26800mAh Power Banks = iPhone XS Max 512GB (~2 Weeks Charged) On Friday, March 4, 2022, 12:22:06 AM MST, Georg Koppen wrote: Gary C. New via tor-relays: Georg, Yes! That is precisely it! Please know that the change appears to be work

Re: [tor-relays] Odd network activity

2022-03-03 Thread Georg Koppen
Eldalië via tor-relays: Hello there. I see on every exit node I check on the metrics page, a massive bump in bandwidth used without a change in exit probability. I just checked the metrics page for the relay I operate (791E637A38C715336290E8AC0EB6C99BD02A5F0E) and I noticed a bump similar to

Re: [tor-relays] How to reduce tor CPU load on a single bridge?

2022-03-03 Thread Georg Koppen
ursday, March 3, 2022, 1:28:12 PM MST, Georg Koppen wrote: Gary C. New via tor-relays: David, Has Tor Metrics implemented your RFC related to Written Bytes per Second and Read Bytes per Second on Onionoo? That's probably https://gitlab.torproject.org/tpo/network-health/metrics/onionoo/

Re: [tor-relays] How to reduce tor CPU load on a single bridge?

2022-03-03 Thread Georg Koppen
Gary C. New via tor-relays: David, Has Tor Metrics implemented your RFC related to Written Bytes per Second and Read Bytes per Second on Onionoo? That's probably https://gitlab.torproject.org/tpo/network-health/metrics/onionoo/-/issues/40022 , no? Georg As of the 27th of February, I've no

Re: [tor-relays] Odd network activity

2022-03-03 Thread Georg Koppen
awffelwaffels via tor-relays: I see on every exit node I check on the metrics page, a massive bump in bandwidth used without a change in exit probability. Is this perhaps an attacker squeezing the bandwidth of the network so people are more likely to use their malicious nodes? You could mail

Re: [tor-relays] TorWeather replacement features

2022-02-09 Thread Georg Koppen
nusenu: Hi, I'm currently working on a TorWeather replacement (mainly using a byproduct of another project) that should be helpful for relay operators to get notifications about their relay downtimes and other issues. I believe such a service will contribute to a more healthy tor network and

[tor-relays] Tor 0.3.5.x is unsupported, please upgrade

2022-02-02 Thread Georg Koppen
Hello! It's time again to get relays upgraded running an EOL Tor series (0.3.5.x). We'll start reaching out to operators with valid contact information this week and plan to start reject relays which are still on 0.3.5.x about 4 weeks from now on at the begin of March. You can follow along th

Re: [tor-relays] Outdated GeoIP DB

2022-01-21 Thread Georg Koppen
Martin Gebhardt (Die LINKE.): Hi, in the past I had already written with someone about it. At that time the entries were not up to date. There was a Gitlab issue about this, but I can't find it now. Anyway, the data is not up to date again. Example: https://apps.db.ripe.net/db-web-ui/query?

Re: [tor-relays] Tor related talks @ rC3

2022-01-17 Thread Georg Koppen
Georg Koppen: > Georg Koppen: >> Hello! >> >> nusenu: >>> in chronological order: >>> >>> -- >>> >>> title: Towards a more Trustworthy Tor Network >>> >&g

Re: [tor-relays] Tor related talks @ rC3

2022-01-07 Thread Georg Koppen
Georg Koppen: Hello! nusenu: in chronological order: -- title: Towards a more Trustworthy Tor Network when: 2021-12-28, 17:00 CET where: https://streaming.media.ccc.de/rc3/csh primary target audience: - Tor user - Tor relay operators

Re: [tor-relays] Tor related talks @ rC3

2021-12-30 Thread Georg Koppen
Hello! nusenu: in chronological order: -- title: Towards a more Trustworthy Tor Network when: 2021-12-28, 17:00 CET where: https://streaming.media.ccc.de/rc3/csh primary target audience: - Tor user - Tor relay operators - onion service oper

Re: [tor-relays] Relay operators meetup @ rC3

2021-12-29 Thread Georg Koppen
ronqtorrel...@risley.net: Hi! I couldn't make the meeting (I retire at the end of January, and should at long last have time to devote to things Tor). Thanks for posting the notes. It prompted me to review the draft "expectations for relay operators" document. It looks very good, though I do

Re: [tor-relays] General overload -> DNS timeouts

2021-12-17 Thread Georg Koppen
nusenu: To stop confusing operators it would make sense to remove the "This relay is overloaded since" banner from Relay Search for all tor versions prior to 0.4.6.9 and 0.4.7.3-alpha, no? Well, not all potential overload is DNS related overload. There are a bunch of different criteria for

Re: [tor-relays] Old question

2021-12-16 Thread Georg Koppen
2021 at 8:16 AM Georg Koppen wrote: Qimam Fellowship: Hello, the Torproject. We launched relays and bridges 3 days ago, today we received a few emails from nore...@torweather.org saying that our relays are down. Your metrics website says our relays are offline, but in fact our VPS are onli

Re: [tor-relays] 122 Qimam Relays and Bridges

2021-12-16 Thread Georg Koppen
nusenu: I was wondering whether this was the first actual case where someone exploited vulnerabilities at a wordpress website to place the CIISS v2 proof file on someone else's webserver. To investigate that suspicion I reached out to the Qimam organization (not using the gmail address) the same

Re: [tor-relays] Old question

2021-12-16 Thread Georg Koppen
Qimam Fellowship: Hello, the Torproject. We launched relays and bridges 3 days ago, today we received a few emails from nore...@torweather.org saying that our relays are down. Your metrics website says our relays are offline, but in fact our VPS are online and tor daemon is running. The status of

Re: [tor-relays] Rejected-fingerprints-found-in-attacks wiki page

2021-12-10 Thread Georg Koppen
nusenu: Georg Koppen: suggestion for an improvement to this process so it will become more accurate/complete (example: May 2021 is incomplete) Could you elaborate on why you think May 2021 is incomplete and how to fix that? I believe DAs rejected >1000 relays, but instead of listing th

Re: [tor-relays] Rejected-fingerprints-found-in-attacks wiki page

2021-12-10 Thread Georg Koppen
nusenu: Georg Koppen: Here we go. I added the list of fingerprints for April 2021. I plan to keep adding fingerprints monthly on the same wiki page[3], as we find them in attacks. Georg [3] https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Rejected-fingerprints-found-in-attacks

Re: [tor-relays] Recent rejection of relays

2021-12-02 Thread Georg Koppen
th your question, but I hope the above helps a bit at least. Georg [1] https://lists.torproject.org/pipermail/tor-relays/2021-May/019647.html [2] https://lists.torproject.org/pipermail/tor-relays/2021-May/019644.html On 1. Dec 2021, at 14:32, Georg Koppen wrote: We have not finished our analysis f

Re: [tor-relays] Relays running an unsupported (EOL) Tor version

2021-12-01 Thread Georg Koppen
Georg Koppen: Hello! Relays running unsupported Tor versions is a problem we have never really dealt with in a systematic way in the way. Some of you might recall that we (with the help of volunteers) tried back in 2019/2020 to get operators, running an unsupported Tor version, to upgrade[1

Re: [tor-relays] Recent rejection of relays

2021-12-01 Thread Georg Koppen
Georg Koppen: Hello everyone! Some of you might have noticed that there is a visible drop of relays on our consensus-health website.[1] The reason for that is that we kicked roughly 600 non-exit relays out of the network yesterday. In fact, only a small fraction of them had the guard flag

Re: [tor-relays] Bridge showing offline

2021-11-24 Thread Georg Koppen
Eddie: On 10/14/2021 2:44 AM, Bleedangel Tor Admin wrote: You are running 0.4.5.8, maybe updating to a newer version of tor will help? Sent from ProtonMail for iOS On Thu, Oct 14, 2021 at 03:02, Georg Koppen <mailto:g...@torproject.org>> wrote: Eddie: > Looking at tor metric

Re: [tor-relays] Rerouting exit relays detected - EXNODE35037

2021-11-23 Thread Georg Koppen
nusenu: BadExit: Rerouting exit relays detected (1) The following exit relays are routing their traffic back into the tor network: nickname: EXNODE35037 First seen: 2021-11-22 15:00:00 Consensus weight: 1 AS: ITL LLC OR IP address: 195.123.220.84 Exit addresses: 185.220.101.138 195.123.220.84

Re: [tor-relays] General overload -> DNS timeouts

2021-11-18 Thread Georg Koppen
Imre Jonk: On Tue, Nov 09, 2021 at 06:25:31AM -0500, John Csuti via tor-relays wrote: Hello all, I would have to agree on this it appears that the DNS failure timeout is too low. I have more then enough bandwidth to host tor exit nodes, and my own unbound full recursive relay and yet i still ge

Re: [tor-relays] General overload -> DNS timeouts

2021-11-18 Thread Georg Koppen
bobby stickel: I get that too I've noticed that Tor makes a lot of quest to non-existent domains. I run a pihole DNS without the ad blocking. I think this is a bug. They should at least give us the ability to control the warning level It seems only one of your exit relays is affected by a gener

Re: [tor-relays] Questions about my tor node

2021-11-14 Thread Georg Koppen
bobby stickel: Okay thanks for the response. I see that I have the not recommended flag. I try to update my node but it says that it's up to date I don't understand what else I can do https://metrics.torproject.org/rs.html#details/50C590A57693085D9601371666B389152B011FF5 Ubuntu ships an outdat

Re: [tor-relays] Recent rejection of relays

2021-11-11 Thread Georg Koppen
Tor Relays: Georg Koppen : Hello everyone! Some of you might have noticed that there is a visible drop of relays on our consensus-health website.[1] The reason for that is that we kicked roughly 600 non-exit relays out of the network yesterday. In fact, only a small fraction of them had the

Re: [tor-relays] Recent rejection of relays

2021-11-10 Thread Georg Koppen
Georg Koppen: Jonas via tor-relays: Where is this criteria documented? I am not sure what criteria you mean but we have our bad-relay criteria[1] documented at our wiki and keep fingerprints we reject due to attacks we noticed there as well[2]. It seems the tor project, or its designated

Re: [tor-relays] Recent rejection of relays

2021-11-10 Thread Georg Koppen
nal Message -- On Wed, November 10, 2021 at 8:59 AM, Georg Koppen wrote: Hello everyone! Some of you might have noticed that there is a visible drop of relays on our consensus-health website.[1] The reason for that is that we kicked roughly 600 non-exit relays out of the network yesterd

Re: [tor-relays] General overload -> DNS timeouts

2021-11-10 Thread Georg Koppen
nusenu: Anders Trier Olesen: The Tor relay guide should recommend running your recursive resolver (unbound) on a different IP than your exit: https://community.torproject.org/relay/setup/exit/ yes, that is a good idea, here is a PR for it: https://github.com/torproject/community/pull/169/fi

[tor-relays] Recent rejection of relays

2021-11-09 Thread Georg Koppen
Hello everyone! Some of you might have noticed that there is a visible drop of relays on our consensus-health website.[1] The reason for that is that we kicked roughly 600 non-exit relays out of the network yesterday. In fact, only a small fraction of them had the guard flag, so the vast major

Re: [tor-relays] A Simple Web of Trust for Tor Relay Operator IDs

2021-11-07 Thread Georg Koppen
nusenu: I think I have some general questions to begin with: 1) What part should the proposal you brought up play in the overall goal of limiting impact of malicious relays? You write """ Therefore we propose to publish relay operator trust information to limit the fraction and impact of malici

Re: [tor-relays] bridge question

2021-10-28 Thread Georg Koppen
potlatch via tor-relays: > Should torrc for bridges list MyFamily?  I run several of both. This feature is not supported. You even get a warning when doing that: if (options->MyFamily_lines && options->BridgeRelay) { log_warn(LD_CONFIG, "Listing a family for a bridge relay is not "

Re: [tor-relays] Relays running an unsupported (EOL) Tor version

2021-10-28 Thread Georg Koppen
mpan: >>> Relays running unsupported Tor versions is a problem we have never >>> really dealt with in a systematic way in the way. Some of you might >>> recall that we (with the help of volunteers) tried back in 2019/2020 to >>> get operators, running an unsupported Tor version, to upgrade[1] but >

Re: [tor-relays] Relays running an unsupported (EOL) Tor version

2021-10-28 Thread Georg Koppen
Georg Koppen: > Hello! > > Relays running unsupported Tor versions is a problem we have never > really dealt with in a systematic way in the way. Some of you might > recall that we (with the help of volunteers) tried back in 2019/2020 to > get operators, running an unsupport

[tor-relays] Relay operator section in our forum

2021-10-27 Thread Georg Koppen
Hello! Some of you might already have seen that we have a shiny new forum now.[1] And, of course, there is a part of it dedicated to providing support for relay operators as well.[2] Check it out and feel free to contribute! Thanks, Georg [1] https://forum.torproject.net/ [2] https://forum.torpr

Re: [tor-relays] Overloaded state indicator on relay-search

2021-10-19 Thread Georg Koppen
David Goulet: > On 17 Oct (13:54:22), Arlen Yaroslav via tor-relays wrote: >> Hi, > > Hi Arlen! > >> >> I've done some further analysis on this. The reason my relay is being marked >> as overloaded is because of DNS timeout errors. I had to dive into the >> source code to figure this out. >> >> I

Re: [tor-relays] Loss of Guard and HS Dir flags

2021-10-18 Thread Georg Koppen
Eddie: > On 10/13/2021 11:29 PM, Eddie wrote: >> I currently run 3 relays, across different servers and today I noticed >> that one has now lost it's Guard and HS Dir flags.  What's surprising >> is that this particular relay has the highest Bandwidth and Consensus >> Weight of all 3 and has not be

Re: [tor-relays] Overloaded state indicator on relay-search

2021-10-15 Thread Georg Koppen
Arlen Yaroslav via tor-relays: >> The problem is that it’s *not* currently overloaded, there’s nothing to see. >> Maybe you can check your syslogs for anything out of the ordinary >> system-wide? > > I've checked dmesg. Nothing that stands out as being problematic. Even if > there was something

Re: [tor-relays] Overloaded state indicator on relay-search

2021-10-14 Thread Georg Koppen
Arlen Yaroslav via tor-relays: >> Did you use a lot of ram or cpu power recently? I got flagged as overloaded >> when I was compiling something and used a lot of cpu. > > Nothing out of the ordinary. The server is a virtual machine which is > dedicated to running a Tor relay. I don't use it for

Re: [tor-relays] Bridge showing offline

2021-10-14 Thread Georg Koppen
Eddie: > Looking at tor metrics, one of my bridges is showing as off-line: > B080140DC1BAB5B86D1CE5A4CA2EF64F20282440 > > However, the log isn't showing any issues: > > Oct 14 00:00:28.000 [notice] Tor 0.4.5.8 opening new log file. > Oct 14 00:00:28.000 [notice] Configured hibernation.  This inte

Re: [tor-relays] A Simple Web of Trust for Tor Relay Operator IDs

2021-10-09 Thread Georg Koppen
nusenu: >> Thanks! You don't have an email-friendly version of that proposal by >> chance, which one could reply to inline? > > there is just the .md file. > > You can also comment inline on the md file on gitlab. > > Due to David's comment on tor-dev there is a merge request on gitlab: > https

Re: [tor-relays] Overloaded state indicator on relay-search

2021-10-07 Thread Georg Koppen
Bleedangel Tor Admin: > Can you link to where I can edit the torproject.org documentation? I cannot > find > this feature. This is nowadays tracked in our Gitlab instance.[1] Thus, you could fork the respective project and make a merge request. We'd be happy to review it and improve our document

Re: [tor-relays] Unreachable DirPorts

2021-10-07 Thread Georg Koppen
Arlen Yaroslav via tor-relays: > Hi to all relay operators! > > I run two Tor relays: > > 77D08850C1EE8587451F838D3F49874F75B0B1AC > 09A70E396DE93F54D4541BBB0EC8E2B23761F34F > > They both have DirPorts configured on port 80. I can connect to this port on > both hosts externally. However, Relay

[tor-relays] Relays running an unsupported (EOL) Tor version

2021-10-05 Thread Georg Koppen
Hello! Relays running unsupported Tor versions is a problem we have never really dealt with in a systematic way in the way. Some of you might recall that we (with the help of volunteers) tried back in 2019/2020 to get operators, running an unsupported Tor version, to upgrade[1] but then we dropped

Re: [tor-relays] A Simple Web of Trust for Tor Relay Operator IDs

2021-10-05 Thread Georg Koppen
nusenu: > Hi, > > I wrote down a spec for a simple web of trust > for relay operator IDs: > > https://gitlab.torproject.org/nusenu/torspec/-/blob/simple-wot-for-relay-operator-ids/proposals/ideas/xxx-simple-relay-operator-wot.md#a-simple-web-of-trust-for-tor-relay-operator-ids Thanks! You don't

Re: [tor-relays] Overloaded state indicator on relay-search

2021-10-05 Thread Georg Koppen
Gary C. New via tor-relays: > > David Goulet: > > > > > Will you confirm whether the Advertised Bandwidth metric is also client > initiated (I'm assuming to the Directory Authority)? > > > > > I have a 250Mb pipe and have seen a maximum Advertised Bandwidth rate of > 4MB/s with my Tor re

Re: [tor-relays] Overloaded state indicator on relay-search

2021-09-29 Thread Georg Koppen
David Goulet: [snip] > There are two other overload lines that tor relay report: > "overload-ratelimits" and "overload-fd-exhausted" but they are not used yet > for the overload status on Metrics. But you can find them in your relay > descriptor[0] if you are curious. Small correction here: thos

  1   2   >