--Original Message-
From: Marco Predicatori via tor-relays
Sent: 28 March 2025 08:02
To: tor-relays@lists.torproject.org
Subject: [tor-relays] Re: Self hosting bridge at home - de-anonymization
risk?
bjewrn2a--- via tor-relays wrote on 3/26/25 22:48:
>> I have a non-exit node at home,
eferred setup I would have expected it to be more popular?
>I would host a tor exit at home if I could get extra IPv4 addresses
Interesting, I haven't thought about that._______
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe s
but what if you used tor normally, not through your own bridge, but through
"regular" randomly chosen 3-hop circuits and at the same time run a tor relay
(entry/middle)
This wouldn't require weakening the tor circuit model
anymore. Yes, this is correct. The more Tor traffic g
On 3/26/25 11:56, bjewrn2a--- via tor-relays wrote:
That would incentivize users to also become
relays - why isn't it recommended more often?
All Tor relays -- even non-exit relays -- are in a public list. Many
sites and services block access to all traffic coming from a Tor relay
IP ad
bjewrn2a--- via tor-relays wrote on 3/26/25 22:48:
I have a non-exit node at home, and (...) I use Torbrowser that connects with
the usual 3 hops.
Thanks Marco, yes, that's what I'm hoping to setup now, as well, however I
haven't seen this setup recommended on the official torp
Very helpful!
Some clarification questions:
How best to find out these 20% and 10% values at any point, especially as they
fluctuate?
Seems a waste to negotiate a five year financial colo or server contract when
the Tor network doesn't want it due to lack of sufficient diversity?
I
On Thursday, 27 March 2025 08:23 tempemailoNiceRelays wrote:
> We can ignore him but we are still curious why our relays have these flags?
>
> We have read this:
> https://lists.torproject.org/mailman3/hyperkitty/list/tor-rel...@lists.torp
> roject.org/message/OJ3MR3ODRV6TPRAEE
On Sun, Mar 23, 2025 at 6:11 AM Toralf Förster via tor-relays
wrote:
>
> On 3/22/25 10:55 PM, boldsuck via tor-relays wrote:
> > Copy the MyFamilyKey.secret_family_key file into the KeyDir of _every_
> > _one_ of your relay.
>
> FWIW:
>
> Twe identifier "My
> > but what if you used tor normally, not through your own bridge, but through
> > "regular" randomly chosen 3-hop circuits and at the same time run a tor
> > relay
> > (entry/middle)
> This wouldn't require weakening the tor circuit model
> anymor
published studies or anything mentioned at conferences, please
let me know. Tor network is a complex subject and although it makes sense to me
it doesn't mean that a professional would take the same approach.
_______
tor-relays mailing list -- tor-rela
ut it seems changing the default configuration to exclude your
own relay is more of a deanoymisation risk.
Running a middle instead of a bridge will make extra work for any ISP or NSA
snoop to determine which tor traffic is yours, as most of the tor traffic won't
be yours and even some t
On Tuesday, 25 March 2025 19:02 tempemailoNiceRelays via tor-relays wrote:
> We were contacted by another relay operator (Zakwan Kalb z...@onionmail.org).
> He told us that Torproject intentionally added two new flags to our relays
> (BadExit, MiddleOnly) and our relays cannot be used a
ially relevant. The entry node itself is the identity.
but what if you used tor normally, not through your own bridge, but through
"regular" randomly chosen 3-hop circuits and at the same time run a tor relay
(entry/middle) that regularly hosts tor traffic of other users
is it incorrect
bjewrn2a--- via tor-relays wrote on 3/25/25 16:23:
Thank you mpan, I agree, is the problem that I am using:
1. the same entry node for every circuit?
2. entry node can be traced to me directly, because it's hosted in my geographic
location (at home)?
I agree that blending your traffic
ll). Also a vanguards guide mentioned that you could reuse tcp
connections of other users:
https://github.com/mikeperry-tor/vanguards/blob/master/README_SECURITY.md#the-best-way-to-run-tor-relays-or-bridges-with-your-service
> If you use a bridge hosted on the same machine, or same LAN, it will
> c
asked and
found that these flags really exist and our relays only used as middle. Has
anyone faced the same problem?___
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
not worth the cost of weakening tor network model
but what if you used tor normally, not through your own bridge, but through
"regular" randomly chosen 3-hop circuits and at the same time run a tor relay
(entry/middle) that regularly hosts tor traffic of other users
is it incorrect to as
bjewrn2a--- via tor-relays wrote:
is there any documentation on self-hosting a bridge at home and using it for
your own connections?
I am trying to understand why this isn't a recommended setup, would it lead to
de-anonymization? Why/how much?
your traffic blends with other users directl
On 24/03/2025 16:48, bjewrn2a--- via tor-relays wrote:
is there any documentation on self-hosting a bridge at home and using it for
your own connections?
I am trying to understand why this isn't a recommended setup, would it lead to
de-anonymization? Why/how much?
your traffic blends
op is from your own IP address if the other two
hops are external?
were there any studies or similar questions asked before? I couldn't find
anything
I can't find help anywhere, so would appreciate any advice
___
tor-relays mailin
can not see an image here):
These stats are from my personal workstation, which is also running a Snowflake
proxy, with about 3-10 Tor users connecting per day.
Best wishes,
-GH
On Friday, March 21st, 2025 at 1:24 PM, Tor at 1AEO via tor-relays
tor-relays@lists.torproject.org wrote
Hi,
Mar 24, 2025, 10:53 by tor-relays@lists.torproject.org:
> Great list of parameters to modify!
>
> Before starting this journey, looking for more guidance on 1) when to make
> changes in relay lifecycle and 2) how to measure the impact of the changes
>
> 1) When is the rig
stics page. I'll keep working on the AROI support.
On Saturday, March 22nd, 2025 at 12:29 PM, boldsuck via tor-relays
wrote:
>
>
> On Friday, 21 March 2025 14:54 m...@nothingtohide.nl wrote:
>
> > Mar 21, 2025, 14:10 by Tor at 1AEO t...@1aeo.com:
> >
> > &g
nd
grafana, after getting everything else set up and running.
On Saturday, March 22nd, 2025 at 11:52 AM, boldsuck via tor-relays
wrote:
>
>
> On Tuesday, 18 March 2025 18:31 Tor at 1AEO via tor-relays wrote:
>
> > Listed general information below. What other information is help
I really hope I don't have to copy paste it all given the amount of relays that
I am currently running. Hopefully, nusenu will update the ansible repo to
support it.
On Sat, Mar 22, 2025, at 2:55 PM, boldsuck via tor-relays wrote:
> Yay, family key's are live:
> Implemented
impact?
Is it premature to change these values when a relay is less than 2 weeks old or
less than a few months old as a guard relay because the load can vary very
significantly?
Is it a good assumption that Tor on Ubuntu ships with the best defaults to get
started or does everybody modify some set
On Sunday, 23 March 2025 10:37 nusenu via tor-relays wrote:
> >> On Sat, Mar 22, 2025, at 2:55 PM, boldsuck via tor-relays wrote:
> >>> Yay, family key's are live:
> >>> Implemented-In: Tor 0.4.9.1-alpha
>
> Note that the version number given there is
On Sat, Mar 22, 2025, at 2:55 PM, boldsuck via tor-relays wrote:
Yay, family key's are live:
Implemented-In: Tor 0.4.9.1-alpha
Note that the version number given there is wrong.
tor 0.4.9.1-alpha does not include support for the new happy families feature.
0.4.9.2-alpha will probably b
On 3/22/25 10:55 PM, boldsuck via tor-relays wrote:
Copy the MyFamilyKey.secret_family_key file into the KeyDir of _every_ _one_ of
your relay.
FWIW:
Twe identifier "MyFamilyKey" is free of choice.
But once it is choosen it must not be ommitted from the filename b/c it
is part
, but has also
given hints during development:
https://gitlab.torproject.org/tpo/core/tor/-/merge_requests/857#note_3164207
> On Sat, Mar 22, 2025, at 2:55 PM, boldsuck via tor-relays wrote:
> > Yay, family key's are live:
> > Implemented-In: Tor 0.4.9.1-alpha, Arti 1.4.1
>
Yay, family key's are live:
Implemented-In: Tor 0.4.9.1-alpha, Arti 1.4.1
https://gitlab.torproject.org/tpo/core/torspec/-/blob/main/proposals/321-happy-families.md
https://community.torproject.org/relay/setup/post-install/family-ids/
Copy the MyFamilyKey.secret_family_key file into the KeyD
On Friday, 21 March 2025 13:53 Tor at 1AEO wrote:
> Some clarification questions:
>
> How best to find out these 20% and 10% values at any point, especially as
> they fluctuate?
https://nusenu.github.io/OrNetStats
> Can you say more about the expected "big issue"
On Friday, 21 March 2025 14:54 m...@nothingtohide.nl wrote:
> Mar 21, 2025, 14:10 by Tor at 1AEO :
> > How best to find out these 20% and 10% values at any point, especially as
> > they fluctuate?
> Nusenu's OrNetStats is the best source I have found to check on
On Tuesday, 18 March 2025 18:31 Tor at 1AEO via tor-relays wrote:
> Listed general information below. What other information is helpful?
>
> Didn't want to log but seems will need something to troubleshoot issues.
> Will work on metricsport, prometheus and grafana. From a quick
r time and
aggregate at a point in time
I get the overall point that things change dynamically so maybe these were much
more different at a different point in time?
On Monday, March 10th, 2025 at 10:32 AM, boldsuck via tor-relays
wrote:
>
>
> On Monday, 10 March 2025 15:34 boldsuck v
Hi, I don't have much time but..
Try to use zwap / compressed swap, and lower your MaxMemInQueues setting as I
recommended already.
Regards,
-GH
On Tuesday, March 18th, 2025 at 9:30 AM, Tor at 1AEO via tor-relays
wrote:
> Somewhat of a surprise based on the 2-4x RAM to core/threa
f RAM frees up (3 in RAM and 1 in Swap) per relay.
66 Tor relays (all middle/guard). All less than 40 days old.
General Setup:
EPYC 7702P.
256GB RAM
Software Versions:
Tor version 0.4.8.14
Ubuntu OS 24.04.2
Tor configuration:
SOCKSPort 0
ControlPort xxx.xxx.xxx.xxx:xxx
HashedControlPasswor
, but our relays use
*significantly* less memory. You shouldn't need more than 128 GB of memory for
~10 Gb/s of Tor traffic, although 256 GB is recommended for some headroom for
attacks and spikes and such.
Could you share your general setup, software versions and Tor configuration?
Perhaps
Somewhat of a surprise based on the 2-4x RAM to core/threads/relay ratio in
this email thread, ran out of 256GB RAM with 66 Tor relays (roughly ~4x ratio).
Something misconfigured or this expected as part of the relay ramping up
behavior or just regular relay behavior?
Summary: 64 cores / 128
Am 14.03.2025 um 09:03:13 Uhr schrieb - - via tor-relays:
> Hello. How can I limit the number of transmitted packets to 190,000?
> The VPS server constantly turns on the network limitation due to the
> large number of transmitted packets.
You can limit the bandwidth. Use the max MTU (mo
Hello. How can I limit the number of transmitted packets to 190,000? The VPS
server constantly turns on the network limitation due to the large number of
transmitted packets.
--- Forwarded Message ---
От: borisic...@protonmail.com
Дата: пятница, 14 марта 2025 г., 11:44
Тема: tor-relay
If you are going to run that many relays on the same machine, I'd do the
following:
1.) For each relay, take parallelizable Tor operations into account and set
"NumCPUs" to at least 2, so that compression/decompression as well as onionskin
decryption won't hog the ma
On Monday, 10 March 2025 15:34 boldsuck via tor-relays wrote:
> The Tor network is a dynamic massive network and bandwidth contributions and
> overall consensus weight are constantly changing. When a larger operator
> (like NTH or RWTH Aachen) goes up or down everything changes.
>
On Sunday, 9 March 2025 22:59 Tor at 1AEO via tor-relays wrote:
> New constraint - any guidance? Math seem right?
> All relay operators / families are limited to a maximum of ~360 Tor relays:
> https://gitlab.torproject.org/tpo/core/tor/-/issues/40837 I'll likely
> create an ac
New constraint - any guidance? Math seem right?
All relay operators / families are limited to a maximum of ~360 Tor relays:
https://gitlab.torproject.org/tpo/core/tor/-/issues/40837
I'll likely create an account to reply on the gitlab ticket too since looks
like different audience than
I have three 1tb running in EU, Australia and USA. Only USA one attracts any
traffic.
I can connect to all three so I know they are working.
Gerry
On 6 Mar 2025, 13:13, at 13:13, gus via tor-relays
wrote:
>Hello,
>
>We've reached our goal of 200 new WebTunnel bridges! But mo
Hello,
We've reached our goal of 200 new WebTunnel bridges! But more bridges is
always better, and there's still time to join the campaign and help Tor
users bypass censorship. As a thank you, you'll also get a Tor t-shirt!
Read our blog post & bridge campaign rules for p
50
MBit/s.
I assume the higher clocked Xeon that I mentioned could easily do 500 MBit/s
per core and relay when using hardware AES acceleration.
https://2019.www.torproject.org/docs/tor-manual.html.en#HardwareAccel
So, 16 x 500 MBit/s = 8GBit/s.
If you were to deploy this exact machine, I would
1.)
To not exceed 30GB per month, as we have to pay for every TB ourselves, since
the dedicated server the VM runs on is colocated.
2.)
The VM simply had 4 cores, and really, you only need 2-4, beyond that you get
diminishing returns as the Tor main loop is still single threaded.
3.) 1024MB
On Tue, Feb 25, 2025 at 01:50:26AM +0100, nusenu via tor-relays wrote:
> Will this become an official torproject product which will be maintained long
> term?
I have talked with the team about this yesterday.
It will be an official Tor product, but the software is still considered
experi
Okay - makes sense on up to 2 Tor relays per physical core with the goal of not
wasting CPU cycles, given the fluctuations of Tor and the expensive hardware.
No, don't have all the network capacity covered and agree everything is costly.
For 10 Gbps unmetered, not many options under $6
Yes, that's a great suggestion! I've adjusted the subject line to match new
topic.
If anybody is interested in sharing, please reach out. I should have a few IPv4
/24 coming online over the next few weeks.
On Monday, February 24th, 2025 at 4:26 AM, boldsuck via tor-relays
wrote:
Hey folks,
We are aware of two issues related to deb.torproject.org that we are
working on fixing:
The first issue is the Ubuntu packages are missing when using apt. Tor
has, for a while, had flaky CI across our entire infrastructure due to
Docker upstream adding rate-limiting for their
On Monday, 24 February 2025 15:32 Clara Engler via tor-relays wrote:
> This made me think about how we could solve that issue by storing the
> Ed25519 identity key on a Yubikey and let it sign the relevant
> certificates.
Nice feature, has been requested by some in recent years.
&g
is a show stopper.
Will this limit likely be (significantly) increased in future yubikey releases?
kind regards,
nusenu
[1] https://github.com/nusenu/ansible-relayor
--
https://nusenu.github.io
_______
tor-relays mailing list -- tor-relays@lists.torprojec
Hi tor-relays@,
I am Clara and work for The Tor Project, Inc. as part of the network team.
As some of you may know, Tor supports a feature called "OfflineMasterKey"[1],
which allows you to store the long-term Ed25519 identity key of a relay
on a cold device, from which you will generate
On Saturday, 22 February 2025 06:49 Tor at 1AEO via tor-relays wrote:
> >> https://metrics.torproject.org/rs.html#search/185.220.101.
> >> We are 5 relay orgs sharing a /24. would be nice if you share the subnet
> >> with 1-2 other relay operators.
> Logisticall
0. Juli 2024 00:32:04 CEST Osservatorio Nessuno via tor-relays
> wrote:
>
> > we are planning to get some hardware to run a physical Tor exit node,
> > starting with a 1Gbps dedicated, unmetered uplink (10Gbps downlink). We
> > will also route a /24 on it, so we will have l
On Wednesday, 19 February 2025 06:35 Tor at 1AEO wrote:
Already replied via PM.
> Can you say more on why you say this, "You can't fully utilize a /24 with 6x
> 64 core servers on a 100G Router."?
6x 64c/128t = 768
DirAuth's allow 8 relays/IP
A routed /24 256x8 =
On Friday, 21 February 2025 11:40 mail--- via tor-relays wrote:
> > Are the clock speeds you listed base or turbo numbers (3.4, 2.25 and 2.0
> > Ghz)?
CPU Data sheets provide more details.
> Base indeed. No CPU is able to consistently maintain their turbo speed on
> this ma
her
operating system may impact the performance/overhead (either positively or
negatively). Also your RAM budget of 4 GB per relay may be a bit on the safe
side, I don't think it would hurt to lower this.
> What are the primary factors that justify running up to two Tor relays per
>
Also interested in this thread and efforts.
Plan to do your suggestion on 80 core and 128 core Tor server node tests. Will
work on posting back here too.
BGP plan to keep separate on router to avoid using Tor server resources.
Does DNS have similar resource concerns as BGP tables? If so
Hi,
Many people already replied, but here are my (late) two cents.
> 1) If a full IPv4 /24 Class C was available to host Tor relays, what are some
>optimal ways to allocate bandwidth, CPU cores and RAM to maximize utilization
>of the IPv4 /24 for Tor?
"Optimal" depends on y
11 ? your luck. keep posted
On Wed, 19 Feb 2025, 03:48 Gurpinder, wrote:
> cores how many 8
> where are you getting them from ?
>
> On Wed, 19 Feb 2025, 03:47 boldsuck via tor-relays, <
> tor-relays@lists.torproject.org> wrote:
>
>> On Tuesday, 18 February 2025 1
cores how many 8
where are you getting them from ?
On Wed, 19 Feb 2025, 03:47 boldsuck via tor-relays, <
tor-relays@lists.torproject.org> wrote:
> On Tuesday, 18 February 2025 17:00 usetor.wtf via tor-relays wrote:
> > Another question - what's the most optimal count of Tor
On Tuesday, 18 February 2025 17:00 usetor.wtf via tor-relays wrote:
> Another question - what's the most optimal count of Tor relays per IP when
> using an IPv4 /24, i.e. roughly 256 IPs? Looking for thoughts / guidance as
> this can quickly be a costly endeavor with slow turn a
Am 13.02.2025 um 07:54:18 Uhr schrieb ZK via tor-relays:
> I already asked people who know why it happens. BadExit flag was
> added manually
Then check if exit traffic can go out and verify that it works.
--
Gruß
Marco
Send unsolicited bulk mail to 1739429658mu...@cartooni
I already asked people who know why it happens. BadExit flag was added manually
> On Wednesday, 12. February 2025 6:12, Marco Moock via tor-relays
> [/webmail/send?to=tor-relays@lists.torproject.org] wrote:
>
>
>
> Am Wed, 12 Feb 2025 04:46:14 +
> schrieb ZK :
>
ck the logs for outgoing rejected packets.
BadExit indicates that outgoing connections are not possible.
_______
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
ettings to
give proper ICMP error messages to make diagnosing more easy.
_______
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
Am 10.02.2025 um 11:35:42 Uhr schrieb Azraxiel via tor-relays:
> I followed every step in the Documention for setting up a Relay but
> it doesn't work and the opnsense community can't help either.
You have to allow all incoming TCP traffic on the listening port and
all outgoin
Hello,
does anybody use the Opensense Plugin for Tor?
I followed every step in the Documention for setting up a Relay but it doesn't
work and the opnsense community can't help either.
Best regards
Azra
Sent from Proton Mail Android
publickey - azraxiel@proton.me - 0x2AAAF94E.asc
D
Hello!
A couple of days ago, on 2025-02-06, an unknown family with 24 exit
relays showed up in the Tor network. We followed our usual approach[1]
in those cases: reaching out to the operator welcoming them in our
community while at the same time being cautious and keeping the relays
in a
On Sunday, 9 February 2025 19:35 ZK via tor-relays wrote:
> I'm asking the Torpoject to publicly answer the question: why do you add
> BadExit and MiddleOnly flags to new relays?
The TorProject is an open source project and you can read all the information
about
what, why, when and h
seems that the person harvested emails and indiscriminately
spammed everybody: the recipients list contains @torproject.org too.
I agree regarding this not being malicious. However. If we’re wrong,
I see two options to be cautious about. It may be FUD against Tor: the
network or the project. W
Am 09.02.2025 um 18:35:51 Uhr schrieb ZK via tor-relays:
> I'm asking the Torpoject to publicly answer the question: why do you
> add BadExit and MiddleOnly flags to new relays?
Please give the Nickname for the affected relay.
> Please don't lie as you did before and lis
I'm asking the Torpoject to publicly answer the question: why do you add BadExit
and MiddleOnly flags to new relays?
Please don't lie as you did before and list the criteria here
_______
tor-relays mailing list -- tor-relays@lists.torproj
ongoing attack
I have some evidence of the attack: the Torproject doesn't allow people to run
relays by removing them from the network or making them unusable as Guard or
Exit for no known reason for years. A random person cannot run a Guard or Exit
relay. Thus the Tor network is entirely r
Appreciate the details!
Some questions to better understand:
1) Why did you limit relay bandwidth? How did you calculate the values to use
for the limits?
"BandwidthRate 75 MBits
BandwidthBurst 100 MBits"
2) CPU - how did you decide to only use 4 out of 6 cores?
Why use 4 cores to 1
On Friday, February 7th, 2025 at 12:22 PM, George Hartley via tor-relays
wrote:
> Hi there "usetor",
>
> I am going to answer a few of your questions:
>
>
> 1. "If a full IPv4 /24 Class C was available to host Tor relays, what are
> some optimal ways
15 min from htop
RAM Capacity: 64GB + 64GB Swap
RAM Usage: 55G + 14G Swap (previously maxed out 64G and needed swap added)
Tor Relays: 30, 2 per IPv4
IPv4 Addresses: 15
Time: 45 days, 9/15/2022 - 10/30/2022
Traffic: 2 PB total. Max In: 2.15 gbps, Max Out: 2.15 gbps
Per Day: 40TB, (0.04 PB) = 2 PB /
Hi there "usetor",
I am going to answer a few of your questions:
1. "If a full IPv4 /24 Class C was available to host Tor relays, what are some
optimal ways to allocate bandwidth, CPU cores and RAM to maximize utilization
of the IPv4 /24 for Tor?"
With 2 IPv4 addreses
we wrote down some notes on our experiece:
https://osservatorionessuno.org/blog/2025/02/how-to-configure-multiple-tor-relays-on-the-same-interface-with-different-ips/
On 2/4/25 9:41 AM, bic wrote:
hello
I have a configuration quite similar[1] to yours and previously posted a
similar question
can
have from 6 to 40MBs
2. Run a separate tor instance for every physical core that you have
3. Allocation ~500MB of memory for every instance, this is quite
empirical for my experience
5. Try to use a different ip for every instance, this is not mandatory
but if you share multiple relay on the
Hi All,
Looking for guidance around running high performance Tor relays on Ubuntu.
Few questions:
1) If a full IPv4 /24 Class C was available to host Tor relays, what are some
optimal ways to allocate bandwidth, CPU cores and RAM to maximize utilization
of the IPv4 /24 for Tor?
2) If a full
Web tunnel bridges Port 443, https
I set up three of these. One in UK, one in Australia and one in USA.
Only the USA service is attracting traffic. This might be normal.
The others are very quiet.
Then I look at it on Tor Relay metric it reports Running
<ht
002
This will do nothing, unless you actually configure the relay to be a bridge.
Try to comment both HashedControlPassword and the obfs4 settings, and restart
the relay.
nyx should now work - additionally, you might want to check the log using
journalctl -u tor.
There should be a line st
Hello,
Thank you. I have read all of it.
I have also re-sent my Email, please let me know if you see it now.
Thank you.
___
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
Hello!
petition_tricky750--- via tor-relays:
Hello,
What are some of the most common reasons for relays and exits to be banned from
Tor?
Had it happen to all of my 5 nodes and I'm currently awaiting response from
bad-relays list.
I don't see an email from you there yet. You mig
Hello,
What are some of the most common reasons for relays and exits to be banned from
Tor?
Had it happen to all of my 5 nodes and I'm currently awaiting response from
bad-relays list.
They all present this in logs
Jan 18 20:41:40 example.com Tor[2439671]: http status 400 ("Fingerpr
On Wed, Jan 15, 2025 at 12:06:09PM -0300, x9p via tor-relays wrote:
> I am running a relay and other servers. Sometimes doing SSHD over Tor via a
> hidden service in a VPS in openbsd.amsterdam. In all my other setups, in
> other providers, I do not see this problem happening.
>
>
> Possible attack on servers via Tor Guard relays
With the written above, the Tor node attributes should not play
a role.
> the connection is terminated. (MSG1) Upon connecting for
> the second time, everything goes smooth. (MSG2)
Starting with MSG2 the ssh connection seems to work.
be first fixed.
--
Gruß
Marco
Send unsolicited bulk mail to 1736954742mu...@cartoonies.org
_______
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
Am Wed, 15 Jan 2025 16:01:44 +
schrieb nyyymi :
> Nickname is nyymi. It doesn't show up on the relay search
That is an indicator that something isn't working.
Please post your torrc (without comments).
and the IP addresses of the machine.
______
Am 14.01.2025 um 19:50:19 Uhr schrieb nyyymi via tor-relays:
> For the past few days I've been trying to open a tor-relay on
> my old laptop running arch. The tor service starts fine but when I
> check nyx no traffic goes through me, both download and upload is 0.
New relays p
Hi,
I am running a relay and other servers. Sometimes doing SSHD over Tor
via a hidden service in a VPS in openbsd.amsterdam. In all my other
setups, in other providers, I do not see this problem happening.
Upon connecting for the first time, I do get a "banner line contains
in
indeed is new, it might take a while for it to pick up
speed.. for Guard relays, this can take longer than 8 weeks, for exit relays it
is usually around 1-2 weeks.
On Tuesday, January 14th, 2025 at 4:59 PM, s7r via tor-relays
wrote:
> The VPS does not provide the advertised speed, the ne
Hey there,
to efficiently help you, could you please post your /etc/tor/torrc?
Otherwise, the relays that you see in Russia are likely on a host that does not
enforce the ban of the Tor Project.
However, your nyx data is quite weird.
Did you run it as the Tor user?
- sudo -u tor nyx
Hello. For the past few days I've been trying to open a tor-relay on my old
laptop running arch. The tor service starts fine but when I check nyx no
traffic goes through me, both download and upload is 0. Nyx shows
Unknown:portnumber. I doubt that the port is closed or somehow unavai
Carlo P. via tor-relays wrote:
Hello experts,
I have, from the same provider, two VPS with same specs (also same port
speed of 200MBit/s, verified via speedtest-cli) - one in Germany, one in
South Africa.
Whilst the German one behaves as expected (two fast relays on it), the
two relays in
1 - 100 of 1267 matches
Mail list logo