Re: [tor-relays] Prepping bridges for censorship

2018-06-22 Thread Martin Kepplinger
Am 21.06.2018 21:48 schrieb Keifer Bly: Hi, So I had a thought. It seems like a lot of the relays run off of various port numbers (of course). However if all of the relays and bridges are running off of various port numbers (ie 9001, 1, etc.), couldn’t this stop censored users (who’s isp or

Re: [tor-relays] what ip,port combinations do Tor clients need?

2018-05-09 Thread Martin Kepplinger
On 2018-05-08 16:59, Jonathan Marquardt wrote: On Tue, May 08, 2018 at 04:45:58PM +0200, Martin Kepplinger wrote: How does a usable ipset (hash:ip,port) look like, so that it is a whitelist for in/out tcp connections? *Everything* else from/to the outside world is assumed to be dropped. (DNS

[tor-relays] what ip,port combinations do Tor clients need?

2018-05-08 Thread Martin Kepplinger
Hi, How does a usable ipset (hash:ip,port) look like, so that it is a whitelist for in/out tcp connections? *Everything* else from/to the outside world is assumed to be dropped. (DNS too). * dir auths from src/or/auth_dirs.inc * fallback dirs from scripts/maint/fallback.whitelist * current gu

Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread Martin Kepplinger
Am 05.10.2017 19:08 schrieb AMuse: Hi all! I'm getting a number of ISP Abuse complaints around outbound ssh brute-forcing from our exit relay. I'm personally of the opinion that people should run fail2ban (or equiv) and get on with life and I generally ignore the complaints - but wondered, what

Re: [tor-relays] FallbackDirectoryMirrors selection criteria "uptime"

2017-09-22 Thread Martin Kepplinger
Am 22.09.2017 16:07 schrieb nusenu: Martin Kepplinger: That's a contradiction and it might end up in *not* selecting relays, whos operators care a lot about security. If you care a lot about security you can use OfflineMasterKeys and keep your identity for a very long time and have no u

[tor-relays] FallbackDirectoryMirrors selection criteria "uptime"

2017-09-22 Thread Martin Kepplinger
hi, Fallback directory mirrors [1] seem to be selected (if the need should arise, according to release planning and whatnot) with criteria "uptime", among others. And it's only this criteria I'm thinking about here: Now, in the wiki we have advice on how to improve relay security, and among

Re: [tor-relays] Some Dir Authorities blocked

2017-09-17 Thread Martin Kepplinger
Am 17.09.2017 01:56 schrieb Roger Dingledine: On Sat, Sep 16, 2017 at 11:44:41PM +, dawuud wrote: > Your only option would be to ask your ISP to uncensor the internet, > unfortunately. Tor requires that all relays are able to contact all > other relays, and those which cannot participate in

[tor-relays] Tor not running since last Debian update

2016-08-24 Thread Martin Kepplinger
Hi So I think 2 days ago I updated tor on my debian stable machine and since then it's seen as not running anymore. It should be a relay. And locally it doesn't listen on port 9050, so it's not even a client now. My torrc hasn't changed. What's going on? Any config changes I missed? thanks

Re: [tor-relays] Handling possible abuse requests

2016-05-19 Thread Martin Kepplinger
Am 2016-05-18 um 22:13 schrieb pa011: > I am running some pretty good developing relays which I would like to > change into exit-nodes over time. As I have no experience how to handle > possible abuses I would need some help please? > > Is there anybody out there who can give me some advice, or ev

[tor-relays] What IPs does Torbrowser need?

2016-03-15 Thread Martin Kepplinger
Hi Imagine a router that want to only whitelist the IP addresses that Torbrowser needs to work. What IPs would it need (for start up and browsing) ? * Guards * Authorities * HSDir flagged relays (?) and would such a whitelisting of IPs even work? At least I think DNS can be ignored as it is r

Re: [tor-relays] IPv6 Only Exit Node

2015-12-15 Thread Martin Kepplinger
Am 2015-12-15 um 18:23 schrieb Hans Wurscht: > Hi > > I would like to operate an IPv6 only exit node. I.e. it's fine if tor > relays through IPv4, but I want exiting traffic only through IPv6 > (because I don't want my (only) IPv4 to be blocked, abused and such). > > The way I thought this would

Re: [tor-relays] IP-Echelon complains about claimed infringement

2015-11-22 Thread Martin Kepplinger
Those Mails just keep coming. I replied to hundreds of them and never heard back. They're a normal part of maintaining my exit relay :) martin Am 2015-11-21 um 04:34 schrieb Riccardo Mori: > Hi everyone, > It's almost a week that I am receiving dozens of "Notices of Claimed

Re: [tor-relays] FYI: Tor-Ops Meeting in Vienna

2014-07-02 Thread Martin Kepplinger
Am 2014-07-02 21:06, schrieb Elrippo: > Same from here. If I would have known earlier, I would have booked me a > Ticket! > > But I got the fqdn! > Is there a funding also to participate? > If there'll be "too" many people, it'll mainly be get-to-know people. It'll most likely be "off"-topic di

Re: [tor-relays] Rejecting 380 vulnerable guard/exit keys

2014-04-16 Thread Martin Kepplinger
Am 16.04.2014 06:42 schrieb Roger Dingledine: Hi folks, I'm attaching the list of relay identity fingerprints that I'm rejecting on moria1 as of yesterday. I got the list from Sina's scanner: https://encrypted.redteam.net/bleeding_edges/ I thought for a while about taking away their Valid flag

Re: [tor-relays] Raspberry Pi binary .debs - 0.2.4.21

2014-03-23 Thread Martin Kepplinger
Am 2014-03-22 23:33, schrieb Gordon Morehouse: > Hello all, > > I've finally released[1] signed binary .debs for Tor 0.2.4.21 for > Raspberry Pi. All the usual "random dude's binaries" apply, but at > least these are signed with my PGP key and distributed with hashes. > They're really for tempora

Re: [tor-relays] (untrusted) Raspberry Pi binary .deb packages for Tor 0.2.4.18-rc

2014-03-06 Thread Martin Kepplinger
Am 2013-11-22 18:45, schrieb Gordon Morehouse: > I've built Tor 0.2.4.18-rc for the Raspberry Pi and released > unofficial packages[1]. They are signed with my GPG key, but as > always, if you don't trust binary packages from some dude on the > internet, please see the instructions to compile them

Re: [tor-relays] is comcast throttling relays?

2014-02-25 Thread Martin Kepplinger
Am 26.02.2014 06:09 schrieb Andreas Krey: On Tue, 25 Feb 2014 19:43:02 +, Steve Rich wrote: Hey, I am running the following relay, and never see traffic going more than 250k. Is Comcast throttling non-exit tor proxies? Do you have 4Mbit/s uplink? That would be the 250k which is kBytes/s,

Re: [tor-relays] Huge harrassment by Irdeto and IP-Echelon, 83 mails, in 2 weeks, need your help

2013-11-19 Thread Martin Kepplinger
julien.robi...@free.fr: > Hello krishna, > > I agree with you as I also think that the approach you describes (your ISP > transmit to you, almost "don't care" and just want you to do the job and copy > to them) is so much better :) and I really think my ISP is trying to work > like that. > > T

[tor-relays] Running random web services on a bridge-server?

2013-11-16 Thread Martin Kepplinger
Hi, Sorry for being lazy, I'm not sure if I can figure it enirely out myself: Is there _any_ implication on the status of a bridge in the Tor network when I run random web services like an open website, xmpp server, whatever, on the same device/IP? It'll somehow be more exposed that way but I'd be

Re: [tor-relays] Setting UP an Tor exit node with resrictions

2013-11-14 Thread Martin Kepplinger
Anonymous: > 11.11.2013 20:55, Anonymous kirjoitti: >> 11.11.2013 20:08, krishna e bera kirjoitti: >>> On 13-11-11 12:56 PM, Anonymous wrote: How may I create an Tor exit node with some ports and sites blacklisted? > >>> See the Reduced Exit Policy page referred to at >>> https://blog.

Re: [tor-relays] Checking a bridge

2013-11-13 Thread Martin Kepplinger
Lunar: > Martin Kepplinger: >> I will not send my fingerprint to globe over http. I want to keep it >> secret so I can't check my bridge. I hope it works. obfs-ports are >> forwarded and everything else are standard torrc-settings. >> >> But please make globe

Re: [tor-relays] Checking a bridge

2013-11-12 Thread Martin Kepplinger
keep it secret so I can't check my bridge. I hope it works. obfs-ports are forwarded and everything else are standard torrc-settings. But please make globe accessible over https. thanks > > > Lunar : >> Martin Kepplinger: >>> When my bridge uses only the same f

[tor-relays] Checking a bridge

2013-11-12 Thread Martin Kepplinger
When my bridge uses only the same few MBs each day, i guess it isn't used at all right? Is there a simple way to ensure it is in bridgeDB and functioning as it should? thanks, martin ___ tor-relays mailing list tor-relays@lists.torpr

Re: [tor-relays] How to install Tor on Ubunt 12.10?

2013-11-06 Thread Martin Kepplinger
The Maker: > I want to run a relay that starts every time I login to my machine. I > went to the page that discusses how to add the correct PPA to Ubuntu but > it stops at 11.10. Is this also the PPA I should use for 12.04 or is > there another one? > > Many Thanks, > The Maker > > __

Re: [tor-relays] rm /var/lib/tor/keys/* before changing exit policy?

2013-10-21 Thread Martin Kepplinger
Lunar: > Martin Kepplinger: >> Really quick not too important question. When switching a relay to >> become an exit node or the other way round, does it make sense to delete >> /var/lib/tor/keys/* beforehand and start it over this way? > > Why would you want to do that

[tor-relays] rm /var/lib/tor/keys/* before changing exit policy?

2013-10-21 Thread Martin Kepplinger
Really quick not too important question. When switching a relay to become an exit node or the other way round, does it make sense to delete /var/lib/tor/keys/* beforehand and start it over this way? I was thinking, if the relay has the guard flag, it would make sense, but maybe even if it doesn't.

[tor-relays] tor 0.2.4.x on the Raspberry Pi. How to?

2013-09-30 Thread Martin Kepplinger
In order to run an obfsproxy bridge on my Pi, I need tor from git or tor's experimental repos; raspbian's packages are too old right? I got confused with recent discussions on raspberry pi here. What's the simples way to run a obfsproxy bridge on my Pi and keep it up to date as well! thanks!

Re: [tor-relays] Relay security, re: local network

2013-09-27 Thread Martin Kepplinger
Cook: > On 26.9.2013 23:25, Roger Dingledine wrote: >> EFF recommends against it in their Legal FAQ: >> "Should I run an exit relay from my home?" >> https://www.torproject.org/eff/tor-legal-faq >> >> Their recommendation comes from dealing with one too many distraught >> relay operators who had co

Re: [tor-relays] Relay security, re: local network

2013-09-26 Thread Martin Kepplinger
David Carlson: > On 9/25/2013 11:10 AM, Joe wrote: >> Hi, >> >> I'm planning to run a Tor relay on a spare computer at home. Security >> is a concern, and not only regarding the machine running the relay but >> also my other computers. Are there any (theoretical or otherwise) >> known attacks a per