[tor-relays] Re: Adding falgs to new relays

2025-02-10 Thread boldsuck via tor-relays
On Sunday, 9 February 2025 19:35 ZK via tor-relays wrote: > I'm asking the Torpoject to publicly answer the question: why do you add > BadExit and MiddleOnly flags to new relays? The TorProject is an open source project and you can read all the information about what, why, when and how. Instead o

Re: [tor-relays] DDOS mitigation with nftables

2024-10-23 Thread boldsuck via tor-relays
On Wednesday, 23 October 2024 04:49 tor-relays+tor-rel...@queer.cat wrote: > I believe that the mitigations found in the community-maintained > anti-DDoS scripts, such as limiting the number of open connections from > a single IP, are now integrated into tor itself. I think you are confusing the

Re: [tor-relays] DDOS mitigation with nftables

2024-10-22 Thread boldsuck via tor-relays
On Tuesday, 22 October 2024 19:24 Top wrote: > My tor relays[1] traffic decreased a lot and I think this *might* be > connected to some kind of DDOS attack. > So I wanted to use this situation to set up some DDOS protection. > For that I stumbled upon Enkidus tor DDOS mitigation script. [2] > Howe

Re: [tor-relays] Tor-Podcast about Tor-Messaging

2024-10-19 Thread boldsuck via tor-relays
On Saturday, 19 October 2024 20:17 David Adam wrote: People are crying in the Tor forum that you have to register with an (anonymous) email. Expressions are used like: Tor Project is dictatorship. And then redshit links? OPSEC please, use frontents: https://github.com/libreddit/libreddit-instance

Re: [tor-relays] Tor Relay Operator Community Health - Final report (June 2024)

2024-10-17 Thread boldsuck via tor-relays
On Thursday, 17 October 2024 16:17 gus wrote: > - Main report: > https://www.sr2.uk/reports/2024-TorRelayOperatorCommunityHealth.pdf - > Mirror: > https://gitlab.torproject.org/-/project/60/uploads/846d7d1816aee92fd2ee283b6 > a354c7d/2024-TorRelayOperatorCommunityHealth.pdf Wow, I'm only up to 4.

Re: [tor-relays] Botnet targeting Tor relays

2024-10-17 Thread boldsuck via tor-relays
On Thursday, 17 October 2024 13:34 DiffieHellman via tor-relays wrote: > The solution is to disable password auth and use pubkeys only Yes, SSH key auth should be the minimum requirement. 2FA SSH key's the way to go. > You still get logspam, but you can stop that with sshguard or ail2bafn, note

Re: [tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-06 Thread boldsuck via tor-relays
On Saturday, 5 October 2024 00:40 George Hartley via tor-relays wrote: > You should default to full disk / partition encryption. Apart from that FDE is _not_ recommended, especially for Tor exits. What is the point of a 24/7/365 running cloud or KVM server that the admins can copy at any time? I

Re: [tor-relays] Decommissioning a FallbackDir node (punki)

2024-10-03 Thread boldsuck via tor-relays
On Thursday, 3 October 2024 18:59 Osservatorio Nessuno via tor-relays wrote: > We are writing this email in advance, since the node is in > the FallbackDir list and embedded in Tor. The cluster will be powered > off on 25th November. FallbackDir have been selected 'automatically' for some time no

Re: [tor-relays] Exit relay not in consensus

2024-10-03 Thread boldsuck via tor-relays
On Wednesday, 2 October 2024 21:24 Sebastian Hahn wrote: > > On 2. Oct 2024, at 09:05, George Hartley via tor-relays > > wrote: > > > > > > It could be that your provider has throttled you temporarily. > > > > I don't think so, I get that message on a dedicated 10 GbE link with > > little to n

Re: [tor-relays] turning off BridgeDB and the future of moat bridges

2024-10-03 Thread boldsuck via tor-relays
On Wednesday, 2 October 2024 17:07 Toralf Förster via tor-relays wrote: > On 10/2/24 13:03, meskio wrote: > > Not a concrete one. My plan is to review the situation early next month > > and > > depending on the usage bring the conversation on what to do with those > > bridges to our thursdays Anti-

Re: [tor-relays] Exit relay not in consensus

2024-10-01 Thread boldsuck via tor-relays
On Tuesday, 1 October 2024 19:32 denny.obre...@a-n-o-n-y-m-e.net wrote: >After my last restart I have: > >``` > >Read configuration file "/usr/share/tor/tor-service-defaults-torrc". > >Read configuration file "/etc/tor/torrc". > >Based on detected system memory, MaxMemInQue

Re: [tor-relays] Relay disconnect & offline on IP change

2024-09-26 Thread boldsuck via tor-relays
On Thursday, 26 September 2024 08:01 Tor Relay Net Ops via tor-relays wrote: > I think it might have not recognized the address has changed, because it > doesn't recover after a while (I waited around 3~ days) > There are no firewall rules that would intervene with this process, on > the MikroTik

Re: [tor-relays] Relay disconnect & offline on IP change

2024-09-25 Thread boldsuck via tor-relays
On Wednesday, 25 September 2024 22:53 Roger Dingledine wrote: > (C) The old-school way of handling this was to get a dyndns account and > then set your torrc Address to point to your dyndns hostname. That is, > you run a periodic tool that reaches out to the service and it makes > sure to update t

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
Toralf Förster via tor-relays wrote: > On 9/24/24 15:40, boldsuck via tor-relays wrote: > > https://paste.systemli.org/?d3987a7dc4df49fa#7GF2qk8hyTVgkinZshff9Dc9R6ukD > > DZo6BQqwQURzjQy > OT, but useless use of cat ;) Oh, you're right. It's nicer because I have

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
pasture_clubbed242--- via tor-relays wrote: > I could only find this article saying there is a 'cert=' option, which > initially appear useful for Tor. Cert is default in obfs4 bridelines, you can create yours with: ~# cat /var/lib/tor-instances/01/fingerprint nikname fingerprint ~# cat /var/lib

Re: [tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

2024-09-24 Thread boldsuck via tor-relays
On Montag, 23. September 2024 22:27:25 CEST Fran via tor-relays wrote: > Philipp Winter regarding iat mode: > >The feature introduces a substantial performance penalty for a dubious > >and poorly understood privacy gain. If I were to write an algorithm to > >detect obfs4, I wouldn't bother deal

Re: [tor-relays] Looking for a ipv4 block and strategy

2024-09-24 Thread boldsuck via tor-relays
Osservatorio Nessuno via tor-relays wrote: > our organization is working to add more physical nodes, in our little > Italy headquarter[1]. We have reached an agreement with one of the > available fiber reseller there, where we will pay for L2 transport to a > datacenter, where we will buy our upli

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-19 Thread boldsuck via tor-relays
On Mittwoch, 18. September 2024 09:10:31 CEST Florian Kohrt via tor-relays wrote: A few facts from these German films and notes: - "Boystown" was one of the largest pedophile darknet forums of all time. 400.000 User - The administrator's chats played a crucial role in tracking him down. - It fin

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-16 Thread boldsuck via tor-relays
On Montag, 16. September 2024 22:03:02 CEST Toralf Förster via tor-relays wrote: > On 9/16/24 21:13, boldsuck via tor-relays wrote: > > Some court documents are linked here, in the google sheets: > > https://safereddit.com/r/TOR/comments/19benkx/operation_liberty_lane_le_ru >

Re: [tor-relays] [Important] Update on an upcoming German broadcasting story about Tor/Onion Services

2024-09-16 Thread boldsuck via tor-relays
On Montag, 16. September 2024 12:31:24 CEST isabela fernandes wrote: > On September 9, 2024, The Tor Project received a press inquiry from > Norddeutscher Rundfunk (NDR, part of ARD, a German public broadcaster) with > The reporter claims to have "evidence that shows that in several cases > German

Re: [tor-relays] Next Tor Relay Operator Meetup - September 7th, 2024 at 19UTC

2024-09-07 Thread boldsuck via tor-relays
On Samstag, 7. September 2024 20:14:56 CEST gus wrote: > > Some of these topics should be Gitlab tickets, for example, debian > repository key and format. > We can ignore most of it because it is wrong. https://gitlab.torproject.org/tpo/web/support/-/issues/368#note_3072903 -- ╰_╯ Ciao Marco

Re: [tor-relays] Next Tor Relay Operator Meetup - September 7th, 2024 at 19UTC

2024-09-07 Thread boldsuck via tor-relays
On Donnerstag, 5. September 2024 19:53:00 CEST gus wrote: > Just a friendly reminder that we're meeting this Saturday, > September 7th @ 1900 UTC. > > Meeting pad: https://pad.riseup.net/p/tor-relayop-sept7th-meetup-keep > Room link: https://tor.meet.coop/gus-og0-x74-dzn > > > Meetup details: >

Re: [tor-relays] simple instructions to the expiredkey issue, pls.?

2024-09-06 Thread boldsuck via tor-relays
On Freitag, 6. September 2024 08:47:14 CEST eff_03675...@posteo.se wrote: OK, looks like TorProject (Gus) renamed the key and resolved tor-archive-keyring.gpg vs. deb.torproject.org-keyring.gpg mismatch. https://gitlab.torproject.org/tpo/web/support/-/issues/368 Then I can update my sources list

Re: [tor-relays] simple instructions to the expiredkey issue, pls.?

2024-09-03 Thread boldsuck via tor-relays
On Montag, 2. September 2024 19:01:16 CEST code9n via tor-relays wrote: > I know I should have sorted this some weeks ago but can anyone tell me a > simple method of dealing with the: As root, one line: wget -qO- https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89

Re: [tor-relays] Supporting TOR: Seeking Affordable and Reliable Server Providers in Eastern Europe

2024-09-02 Thread boldsuck via tor-relays
On Montag, 2. September 2024 14:54:55 CEST gus wrote: Hello Alex, First of all, it's nice that you're on the list. Maybe you would like to listen in on the meeting on Saturday. (It's anonymous and without a webcam) https://lists.torproject.org/pipermail/tor-relays/2024-August/021814.html I had

Re: [tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-30 Thread boldsuck via tor-relays
On Freitag, 30. August 2024 14:35:26 CEST Alessandro Greco via tor-relays wrote: > I noticed that you have a lot of Bridges active and in this regard I wanted I have different subnets on the servers and each bridge has a different IP+IPv6. Until 3 years ago you could get 1 IP for less than 1,- €

Re: [tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-28 Thread boldsuck via tor-relays
On Mittwoch, 28. August 2024 07:53:21 CEST Alessandro Greco via tor-relays wrote: > > Once your bridge has been running stable for a few weeks, an advanced but > > experimental feature is to hide OrPort. > > So is it possible to remove the ports from the torrc file while keeping them > unchanged?

Re: [tor-relays] Bridge node configurations and where to find them (semi quote)

2024-08-27 Thread boldsuck via tor-relays
On Dienstag, 27. August 2024 00:44:02 CEST Roger Dingledine wrote: > > BridgeRelay 1 > > ORPort > > ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy > > ServerTransportListenAddr obfs4 0.0.0.0: > > ExtORPort auto > > ExitPolicy reject *:* > > ``` > > Looks good. You don't need the ExitPolicy

Re: [tor-relays] 2024 : time to stop using Telegram (e.g. in Bridge line communication.).

2024-08-27 Thread boldsuck via tor-relays
On Montag, 26. August 2024 17:33:22 CEST Marco Predicatori wrote: > All this is pretty scary. Pretty much any exit node manager can be arrested > on the very same basis. No. A Tor router does not host any data, it is a router like any other ISP or backbone router. I am currently updating the ex

Re: [tor-relays] 2024 : time to stop using Telegram (e.g. in Bridge line communication.).

2024-08-26 Thread boldsuck via tor-relays
On Montag, 26. August 2024 00:45:20 CEST eff_03675...@posteo.se wrote: > Telegram is Russian and spying : > > > - creator Pavel Durov was arrested yesterday in France. In general, I would like to point out SimpleX-Chat. https://simplex.chat/ https://github.com/simplex-chat/simplexmq I've been

Re: [tor-relays] DDOS alerts from my provider

2024-08-20 Thread boldsuck via tor-relays
On Donnerstag, 8. August 2024 22:20:35 CEST eff_03675...@posteo.se wrote: > Hi Rafo, > > My apologies for the late reply in your request for the code on banning > tor exits into *GUARDS or middle-relays* Before many people copy this, a note: A relay with exit flag is MOSTLY used for exit traffic

[tor-relays] DMARC helps prevent Tor-exit from being abused for email SPAM.

2024-08-20 Thread boldsuck via tor-relays
Hi @all, I thought DMARC was unimportant for a small domain, but I played around with it a few days ago. There are some DMARC monitor sites that you can use for free & I was surprised when I saw that in 2-3 days about 1500 emails were sent via my exit subdomains. Then I set DKIM and SPF to str

Re: [tor-relays] DDOS alerts from my provider

2024-08-20 Thread boldsuck via tor-relays
On Sonntag, 14. Juli 2024 15:54:45 CEST Toralf Förster via tor-relays wrote: > On 7/12/24 00:14, boldsuck wrote: > > The idea is not bad. But can you simply discard every ≤ 50byte packet? > > Probably not > > > I drop fragments and uncommon TCP MSS values. > > ip frag-off & 0x1fff != 0 counter dr

Re: [tor-relays] An Internet backbone blocklisted my Tor server!

2024-08-20 Thread boldsuck via tor-relays
On Dienstag, 20. August 2024 12:12:22 CEST Tzanca via tor-relays wrote: > > I bet the reason that my server periodically goes offline is because it is > > being blocked and not because it is actually offline! > > It can be the metrics server seeing server down but server actually being > up. Seen

Re: [tor-relays] User advisory to check for xz-utils backdoor

2024-04-02 Thread boldsuck via tor-relays
On Freitag, 29. März 2024 19:39:05 CEST pasture_clubbed242--- via tor-relays wrote: > > The near-universally used 'xz' compression library has been found to contain > a backdoor in certain code branches. This backdoor has made it into some > systems such as Debian Sid. > > Details regarding thi