Re: [tor-relays] 36C3 voucher

2019-10-28 Thread pa011
> While still running several Exits I would be more than happy to meet others > there > > Thanks Me too :-) So a voucher would be highly welcome Greetings Paul ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org

Re: [tor-relays] 'MyFamily' .... torworld.org

2017-01-10 Thread pa011
Am 10.01.2017 um 21:01 schrieb nusenu: > > > pa011: >> Could you explain please why names like torworld.org, torservers.net, >> online de, etc. are not aggregated in one position on >> https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_

[tor-relays] 'MyFamily' .... torworld.org

2017-01-10 Thread pa011
Hi nusenu, thank you for your daily work about "MyFamily". Could you explain please why names like torworld.org, torservers.net, online de, etc. are not aggregated in one position on https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_operators.txt Would you judge torworld.or

[tor-relays] MyFamily updated

2016-12-26 Thread pa011
Am 26.12.2016 um 14:53 schrieb nusenu: > > > Thanks for fixing it! > > +---++ > | nickname | eMyFamilyCount | > +---++ > | NeelTorRelay1 | 4. | > | NeelTorExitUSWest | 4. | > | NeelTorExitCZ

[tor-relays] "[warn] Cannot make an outgoing connection without a DirPort" under BSD

2016-12-24 Thread pa011
I am running (FreeBSD 11.0-RELEASE-p2) Tor 0.2.8.11 getting following warnings while Self-testing indicates that DirPort is reachable from the outside? Can these warnings be ignored, while Tor is running properly afterwards ? Merry Christmas! Paul Dec 24 13:20:57.000 [notice] Bootstrapped 8

Re: [tor-relays] Tor Relay on ARM server Marvell Armada 370/XP

2016-12-23 Thread pa011
Am 20.12.2016 um 14:40 schrieb Volker Mink: > Is it OK with their TOS to run a TOR Relay7Exit? > If so, i really consider getting a VPS there! Volker - apart from not putting all eggs in the same basket (France as country and Online.net as ISP), but if you really wanna go there scaleway opened

Re: [tor-relays] MyFamily update required

2016-12-22 Thread pa011
Hi nusenu, thanks for your great work - lets assume for a second I would be with several relays on both of you lists: https://raw.githubusercontent.com/ornetstats/stats/master/o/main_exit_operators.txt https://raw.githubusercontent.com/ornetstats/stats/master/o/potentially_dangerous_relaygroups

[tor-relays] "Up-and-coming" Ticket - 33C3

2016-12-17 Thread pa011
Have Juniors interested in our work, likely to follow our steps or build new ones...need tickets for Hamburg 33C3 "Up-and-coming" would be great, but would consider "Standard" as well... Hopefully :-) Thanks and regards Paul ___ tor-relays mailing

Re: [tor-relays] The t-shirt organization thingy

2016-12-11 Thread pa011
> Hi Moritz, > > I do understand that it's hard to run an organization with too few > people, it's my daily life working for staff at my university (I am the > only administrator for 16 tablets, 34 laptops, 3 servers and 7 > thinclients, and we are not allowed to use centralized tools, I have to

Re: [tor-relays] ansible for tor relay ops

2016-12-11 Thread pa011
> >> Isn’t it somehow dangerous in the area we operate, to rely on a piece >> of software created more or less by a single person? > > Thanks for this question. Can you give a few examples for "dangerous" in > the context of your question so I might be able to address your concerns > more specif

Re: [tor-relays] Network scan results for CVE-2016-5696 / RFC5961

2016-12-10 Thread pa011
Am 10.12.2016 um 21:12 schrieb Ivan Markin: > pa011: >> What about relays not on the list at all? > > You mean that are not subscribed for tor-relays@? No, forget that one - was my mistakable in the spreadsheet > > btw, it would be awesome to give away t-shirts or

Re: [tor-relays] Network scan results for CVE-2016-5696 / RFC5961

2016-12-10 Thread pa011
> I would however be very interested to hear back from tor-relay operators > if any of them have found Challenge ACK counter values higher than > a million... which would indicate some kind of funny business. > Thanky you for your work. I know of 3 relays with ACK above 1 million: TCPChall

Re: [tor-relays] torworld relays in entry and exit position

2016-12-10 Thread pa011
Very good Nusenu - I like your insistent dialogue and asking in this case :-) You are quite often referring to Ansible which is new to me. Is there a permanent free version around to let your https://github.com/nusenu/ansible-relayor run on it? Isn’t it somehow dangerous in the area we operate,

Re: [tor-relays] relays with dynamic IP - here Rasp2

2016-12-06 Thread pa011
Am 06.12.2016 um 18:16 schrieb Rana: > -Original Message- > From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf > Of pa011 > Sent: Tuesday, December 06, 2016 1:24 AM > To: tor-relays@lists.torproject.org > Subject: Re: [tor-relays] Unwarranted

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-05 Thread pa011
> I would like to hear about ONE Raspi Tor operator who was allowed by DirAuths > (or bwauths or whatever) to come even near 1 mbit/s bandwidth utilization > let me tell: https://atlas.torproject.org/#details/AA44C4BE3C90DCAAC09E5CD26150710AAA80D58B https://atlas.torproject.org/#details/CA9A

Re: [tor-relays] network diversity with freeBSD - solved

2016-12-05 Thread pa011
.9.5.a, if you > don't done this already (e. g. portsnap fetch update && portmaster > security/tor-devel). > > Regards, > > > On 05.12.2016 18:32, pa011 wrote: >> Working :-) >> >> It looks like it was missing the Address in torrc. >

Re: [tor-relays] network diversity with freeBSD - solved

2016-12-05 Thread pa011
Working :-) It looks like it was missing the Address in torrc. I added up some RAM before- that didn’t help. Ok, now I have time to follow up all your other recommendations in the coming days. Thank you all very much for your help! Best Regards Paul p.s. as it is finally that easy to get BS

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2016-12-04 Thread pa011
Rana, I don’t think ""submit a patch" needs any clarification. Maybe you are a little bit to aggressive in your wording :-) ? I do have a dynamic IP as well on one relay and do know that frustration. Relax Paul Am 04.12.2016 um 19:23 schrieb Rana: > Please clarify what you mean by "submit a p

Re: [tor-relays] security/tor ignores torrc Log setting?

2016-12-03 Thread pa011
Am 03.12.2016 um 17:13 schrieb nusenu: > >> By default, FreeBSD's tor and tor-devel port want to store logs inside >> /var/log/tor/ regardless of what you put in the /usr/local/etc/tor/torrc >> file last I looked. > > Are you sure? What security/tor package version was this? > This never happen

Re: [tor-relays] network diversity with freeBSD

2016-12-03 Thread pa011
n 02.12.2016 00:57, pa011 wrote: >> solved, as far as I can see now - maybe more tomorrow.. >> >> Thank you very much gentlemen for your help :-) !!! >> ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.t

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
solved, as far as I can see now - maybe more tomorrow.. Thank you very much gentlemen for your help :-) !!! Am 02.12.2016 um 00:51 schrieb diffusae: > ln -s /usr/local/bin/python2.7 /usr/local/bin/python ___ tor-relays mailing list tor-relays@lists.to

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
Am 02.12.2016 um 00:32 schrieb George: > On 12/01/16 18:25, pa011 wrote: >> >> >> Am 02.12.2016 um 00:19 schrieb diffusae: >>> Hi! >>> >>> On 02.12.2016 00:04, George wrote: >>>> Installing security/arm is simple enough. >>&g

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
Am 02.12.2016 um 00:21 schrieb Michael Armbruster: > On 2016-12-01 at 23:54, pa011 wrote: >> There were some talks about network diversity recently, so I made up my mind >> and started a freeBSD server. >> >> On advice from here >>

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
Am 02.12.2016 um 00:19 schrieb diffusae: > Hi! > > On 02.12.2016 00:04, George wrote: >> Installing security/arm is simple enough. >> >> pkg install arm > > Yes, that normally should solve your problem. > > I've recognized that the dependencies are on Tor v0.2.8.9. > You can't install it with

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
> > On Thu, Dec 1, 2016 at 4:01 PM, pa011 mailto:pa...@web.de>> > wrote: > > I saw that and tried "touch /var/log/tor" - didn’t help .. > > > Am 01.12.2016 um 23:57 schrieb Marcel Krzystek: > > It appears you have a space in "touc

Re: [tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
I saw that and tried "touch /var/log/tor" - didn’t help .. Am 01.12.2016 um 23:57 schrieb Marcel Krzystek: > It appears you have a space in "touch /var/log tor" that should not be there. > Try "touch /var/log/tor" instead. > > On Thu, Dec 1,

[tor-relays] network diversity with freeBSD

2016-12-01 Thread pa011
There were some talks about network diversity recently, so I made up my mind and started a freeBSD server. On advice from here https://gist.github.com/teor2345/c6e2890c44097fd6aaceeedec08c6431 I placed a line in the torrc file "Log notice file /var/log/tor/log" Following these instructions fr

Re: [tor-relays] Blocking PSN

2016-11-29 Thread pa011
You can contact them on the given snei-noc-ab...@am.sony.com and they will give you a list of attacked IPs. Paul Am 29.11.2016 um 14:48 schrieb SuperSluether: > I keep getting Account Takeover Attempt abuses on my Tor exit, and I'm not > sure how to handle them: > > It is most likely the attac

[tor-relays] 33C3 Ticket

2016-11-21 Thread pa011
Looking to meet other Exits in Hamburg - just need a ticket :-) Paul ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Is my relay affected by cve-2016-8860?

2016-11-15 Thread pa011
Thank you Nusenu for your list. Maybe you can add a Nickname column next time for all those, who have more than one hamster in the race. Rgds Paul Am 15.11.2016 um 22:17 schrieb nusenu: > > https://blog.torproject.org/blog/tor-0289-released-important-fixes > > > If you are unsure whether yo

[tor-relays] 33C3 Ticket

2016-11-07 Thread pa011
First poor round of selling is over - anybody holding more tickets than he needs already? Would still take one :-) Paul ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] Abuses: Suspicious botnet ramnit attack

2016-10-27 Thread pa011
Hi, got the abuse below on three different exits. Anybody having any idea what to do and how to possibly to stop this in the future? Thanks Paul CERT-EU has received information regarding an infected IP belonging to your network, which may have security problems. The information regarding the

[tor-relays] 33C3 Voucher

2016-10-25 Thread pa011
Anybody holding a Voucher for 33C3 in Hamburg at the End of December? More than happy to get hold of it :-) Paul ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

[tor-relays] DNS resolving -problem?

2016-10-18 Thread pa011
Got problems overnight. On all servers traffic died down and looks like below - what went wrong please? Here is what I did: apt-get install dnsmasq /etc/resolv.conf nameserver 127.0.0.1 /etc/dnsmasq.conf server=216.87.84.211 #open.nic us server=84.200.69.80 #dns.watch

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?

2016-10-17 Thread pa011
These errors do only get up when starting "apt-get update" not when "dig ftp.de.debian.org" - this gets solved well. Am 17.10.2016 um 19:00 schrieb pa011: > Thank you Toralf for you instructions and kick again. > > > Following those > >> [2

Re: [tor-relays] Why do 40% of Tor exits uses 8.8.8.8 for DNS resolving ?

2016-10-17 Thread pa011
Thank you Toralf for you instructions and kick again. Following those > [2] https://zwiebeltoralf.de/torserver.html instruction do work but leave me with several unresolved queries: »deb.torproject.org« »archive.ubuntu.com« »security.debian.org« »ftp.de.debian.org« and a few more. What serve

Re: [tor-relays] TOR Services on Microsoft Azure

2016-10-12 Thread pa011
I do see kind of stagnation compared to other Exits in the same time frame. So I wondered what the connectivity is ? Its hard to find information about bandwidth and monthly traffic volume in regard to prices and location regarding Azure? Am 12.10.2016 um 18:15 schrieb nusenu: >> Update on my

[tor-relays] ISP, Abuses , Intrusion Prevention etc.

2016-10-09 Thread pa011
My personal efforts over the last months as well as the recent discussion about Intrusion prevention showed, there are more and more ISP's not giving support any more for running Tor exits, either in not allowing new ones or even shutting down existing ones. Sure there are still chances to find

Re: [tor-relays] Digital Ocean - running Exit node locked

2016-10-09 Thread pa011
> 2016-10-09 11:44 GMT+02:00 pa011 : >> OK further bad news, Exit shut down by DO yesterday. >> Here the latest statement from them: >> >> "Additionally, we are not allowing further TOR exit nodes on our >> infrastructure - they generate a large amount of abuse

Re: [tor-relays] Digital Ocean - running Exit node locked

2016-10-09 Thread pa011
OK further bad news, Exit shut down by DO yesterday. Here the latest statement from them: "Additionally, we are not allowing further TOR exit nodes on our infrastructure - they generate a large amount of abuse, are used for various illegal activities, and attract a large number of DDoS attacks.

Re: [tor-relays] Digital Ocean - running Exit node locked

2016-10-07 Thread pa011
ccount, make new account. > They will kick you after 2-3 months. Delete account, make new account. > They will kick you after 2-3 months. Delete account, make new account. > Welcome to DigitalOcean! > > Markus > > > 2016-10-07 23:23 GMT+02:00 pa011 : >> Seems like e

[tor-relays] Digital Ocean - running Exit node locked

2016-10-07 Thread pa011
Seems like even DO is not very much in favour of running Exits any more ? Anybody made the same experience - how to handle this please ? Thanks and Regards Paul "Hello -Although we do not specifically disallow TOR exit nodes, as the account holder you are responsible for all the traffic going

Re: [tor-relays] new warn message: Duplicate rendezvous cookie in ESTABLISH_RENDEZVOUS.

2016-10-07 Thread pa011
Am 07.10.2016 um 20:20 schrieb Green Dream: > One of my guard relays has a few entries on Oct 06 also: > > Oct 06 09:04:00.000 [warn] Duplicate rendezvous cookie in > ESTABLISH_RENDEZVOUS. > Oct 06 09:04:00.000 [warn] Duplicate rendezvous cookie in > ESTABLISH_RENDEZVOUS. > Oct 06 10:17:30.

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
Am 04.10.2016 um 18:46 schrieb Moritz Bartl: > Still, this will not help in this (and related) cases: I have not yet > seen proven cases where the reputation of the netblock was endangered, > but if an ISP is afraid of that, there's no good way to cooperate. An > IDS is their obvious suggestion,

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
do other people here handle this? Obviously the attacked target needs an other explanation as the ISP. > > > On 04/10/16 12:01 PM, pa011 wrote: >> Me too Markus -could fill a folder with that tax issue :-(( >> Costing a lot of time to answer and restrict the IPs >> &

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
nly got 2 complaints in >> the last 2 months, and that was for SSH and SQL stuff. >> >> >> On Oct 4, 2016 11:01 AM, "pa011" wrote: >>> >>> Me too Markus -could fill a folder with that tax issue :-(( >>> Costing a lot of time to answer and re

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
.103 # TAX SPAM > ExitPolicy reject 147.67.136.21 # TAX SPAM > ExitPolicy reject 147.67.119.103 # TAX SPAM > ExitPolicy reject 147.67.119.3 # TAX SPAM > ExitPolicy reject 147.67.136.3 # TAX SPAM > ExitPolicy reject 147.67.119.21 # TAX SPAM > > Thats going on for months now and by

Re: [tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
Am 04.10.2016 um 16:48 schrieb krishna e bera: > On 04/10/16 08:48 AM, pa011 wrote: >> One of my main ISP is going mad with the number of abuses he gets from my >> Exits (currently most on port 80). >> He asks me to install "Intrusion Prevention System Software" o

[tor-relays] Intrusion Prevention System Software - Snort or Suricata

2016-10-04 Thread pa011
One of my main ISP is going mad with the number of abuses he gets from my Exits (currently most on port 80). He asks me to install "Intrusion Prevention System Software" or shutting down the servers. He personally recommends Snort or Suricata. As far as I understand implementing such a software

Re: [tor-relays] "Potentially dangerous relay groups"

2016-09-28 Thread pa011
Am 27.09.2016 um 19:37 schrieb nusenu: > pa...@web.de wrote: >> there is that list of "potentially_dangerous_relaygroups" you published. >> Could yo please emphasize a bit more on what brings a relay on that list, >> apart from incorrect given MyFamily which doesnt seem to be always the case. >>

Re: [tor-relays] [OrNetRadar] niftybunny Digital Ocean 2016-09-22

2016-09-27 Thread pa011
Hi nusenu, there is that list of "potentially_dangerous_relaygroups" you published. Could yo please emphasize a bit more on what brings a relay on that list, apart from incorrect given MyFamily which doesnt seem to be always the case. I mean I see quite a few well respected names on that list ?

Re: [tor-relays] Strange difference between rx and tx traffic

2016-09-27 Thread pa011
nstead of Google DNS. Google DNS sees almost 50% of all > Tor traffic, and could potentially link people across exits. > > > On Sep 27, 2016 8:48 AM, "pa011" mailto:pa...@web.de>> wrote: > > On one of my recently started Exits I do see a rather huge and inc

[tor-relays] Strange difference between rx and tx traffic

2016-09-27 Thread pa011
On one of my recently started Exits I do see a rather huge and increasing difference between in and out traffic that I don see on any other Exit so far. The rise doesn’t seem to be linear.. Any explanation for that - or can it just be on the back of a not fixed repetitive warning? Sep 27 06:42:

Re: [tor-relays] Moving multiple instances to another VPS

2016-09-12 Thread pa011
Thank you both. @Tim: You would kind of argue, that the advantage of carrying the old keys to the new machine is not that important (to keep old level of traffic from start) and that it might be even better to start from scratch? Paul Am 12.09.2016 um 03:53 schrieb teor: > In Debian, using t

[tor-relays] Moving multiple instances to another VPS

2016-09-11 Thread pa011
I have to move a multiple instances Exit from one VPS to another. Apart from creating the same instances on the new machine with **tor-instance-create** I would then just copy the whole directory /var/lib/tor/keys to the new VPS - or should I copy all /var/lib/tor/ to not miss anything from the

Re: [tor-relays] Useful metrics for relay operators

2016-09-04 Thread pa011
Am 01.09.2016 um 05:39 schrieb teor: > >> On 1 Sep 2016, at 13:36, I wrote: >> >> Did someone mention t-shirts? >> >> >> When is the last time anyone got a t-shirt? > > I'm pretty sure Jon has been sending them out on a regular basis. > (We're trying to automate the process a bit more.) > > I

Re: [tor-relays] [WARN] Remote server sent bogus reason code 65021

2016-08-16 Thread pa011
Looks like this is solved and belonged to not open ports Sorry for the hassle Paul Am 16.08.2016 um 18:34 schrieb pa011: > Just established a new Exit with two instances on (Linux 3.16.0-4-amd64) ,Tor > 0.2.8.6 > > On the second instance I get these warnings: > > [WARN]

[tor-relays] [WARN] Remote server sent bogus reason code 65021

2016-08-16 Thread pa011
Just established a new Exit with two instances on (Linux 3.16.0-4-amd64) ,Tor 0.2.8.6 On the second instance I get these warnings: [WARN] Remote server sent bogus reason code 65021 [21 duplicates hidden] [WARN] Remote server sent bogus reason code 65023 [95 duplicates hidden] [NOTICE] Have tr

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-15 Thread pa011
Hi Peter, sorry was off a week and couldn’t answer: /run/systemd/generator/tor.service.wants/tor@tor2.service /run/systemd/generator/tor.service.wants/tor@default.service Anyway with "steady hand" the system seems to have repaired itself in between. I updated my other multi-instance exits toda

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-06 Thread pa011
The only instance in /etc/tor/instances/ is tor2 There is no tor and nothing else in that directory And I do have a torrc file in /etc/tor/ Best Regards Paul Am 06.08.2016 um 22:30 schrieb Peter Palfrader: > On Sat, 06 Aug 2016, pa011 wrote: > >> Actually not - you are rig

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-06 Thread pa011
est regards, > Alexander > --- > PGP Key: https://dietrich.cx/pgp | 0x52FA4EE1722D54EB > > On 2016-08-06 14:56, pa011 wrote: >> Thank you Michael for your hint - corrected that, but still having >> that problem with main instance not running: >> >> Aug 6 14

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-06 Thread pa011
a colon, not a slash. The slash is there to block a > specific address *range*. You can read more about subnets and the > calculation for a bitmask here: https://en.wikipedia.org/wiki/Subnetwork > > Best, > Michael > > On 2016-08-06 at 13:30, pa011 wrote: >> I am inexpe

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-06 Thread pa011
I am inexperienced an have probably the same problem after upgrading to 0.2.8.6. Even after reboot my second instance Tor-tor2 is running while the default service is exiting - syslog looks like this: Aug 6 12:11:33 tor[542]: Aug 06 12:11:33.744 [notice] Tor v0.2.8.6 (git-b88847615faea7c8) ru

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
the relay from the Internet. >> >> There's no need to use Tor to tunnel the (D)DOS. In this case, Tor doesn't >> tunnel UDP, so it's unlikely to be the culprit. >> >> Tim >> >>> >>> >>> 2016-08-01 15:04 GMT+02:00 pa01

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
; available in the Tor consensus. >> Then they can attack the relay from the Internet. >> >> There's no need to use Tor to tunnel the (D)DOS. In this case, Tor doesn't >> tunnel UDP, so it's unlikely to be the culprit. >> >> Tim >> >>>

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
; > 2016-08-01 14:44 GMT+02:00 pa011 : >> The ISP didn’t mention - I would have to ask. >> >> What I saw was that the traffic was up about linear from usually 30Mbits >> to above 100 Mbits over about 6 hours, bringing the CPU to 100% and >> dropping. >> >&g

Re: [tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
t; Markus > > > > 2016-08-01 14:28 GMT+02:00 pa011 : >> Hello, >> >> one of my middle relays got auto limited by the ISP because of >> "outgooing UDP flooding ". >> >> The VPS is pure debian8, fail2ban, pub key and nothing else installed - >>

[tor-relays] outgooing UDP flooding on middle relay

2016-08-01 Thread pa011
Hello, one of my middle relays got auto limited by the ISP because of "outgooing UDP flooding ". The VPS is pure debian8, fail2ban, pub key and nothing else installed - so I highly doubt the give reason for the traffic limitation. Also I cant find anything in the log files. Anybody having experi

Re: [tor-relays] VPS for Exits and non-Exits

2016-07-06 Thread pa011
Am 06.07.2016 um 22:09 schrieb Iain R. Learmonth: > Hi, > > On 06/07/16 18:25, tor relay wrote: >>> I've been running an exit node for over a year on OVH now, no problems >>> so far. Highly recommended (especially since they give me 10TB of >>> traffic for about 10$USD/month; considering I use a

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-03 Thread pa011
> Ok - very sorry - I foolished myself -this last issue is solved :-) !! Thank you nusenu for your help !! signature.asc Description: OpenPGP digital signature ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-03 Thread pa011
Am 03.07.2016 um 17:06 schrieb nusenu: >> Still open: >> >> "arm -i 9052" - is asking for a Controller password while I have a >> HashedControlPassword in place ? > > if you configure tor to require a password for controlport access (that > what HashedControlPassword is for), you will be asked

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-03 Thread pa011
Am 03.07.2016 um 14:28 schrieb Peter Palfrader: > On Sun, 03 Jul 2016, pa011 wrote: > >> >> >> Am 03.07.2016 um 13:31 schrieb Peter Palfrader: >>> On Sun, 03 Jul 2016, pa011 wrote: >>> >>>> >>>> Am 03.07.2016 um 13:03 schrieb P

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-03 Thread pa011
Am 03.07.2016 um 13:31 schrieb Peter Palfrader: > On Sun, 03 Jul 2016, pa011 wrote: > >> >> Am 03.07.2016 um 13:03 schrieb Peter Palfrader: >>> Let me read this for you. >>> >>> On Sun, 03 Jul 2016, pa011 wrote: >>> >>>> Jul 3 12

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-03 Thread pa011
Am 03.07.2016 um 13:03 schrieb Peter Palfrader: > Let me read this for you. > > On Sun, 03 Jul 2016, pa011 wrote: > >> Jul 3 12:09:27 tor[4532]: Jul 03 12:09:27.590 [notice] Opening OR listener >> on 0.0.0.0:443 >> Jul 3 12:09:27 tor[4532]: Jul 03 12:09:2

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-03 Thread pa011
Am 02.07.2016 um 20:14 schrieb Peter Palfrader: > On Sat, 02 Jul 2016, pa011 wrote: > >> Ok - "Log notice file /var/log/tor/notices2.log" removed from >> torrc, but that doesn’t influence the error message from systemctl >> in no way. >> >> Sti

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-02 Thread pa011
Ok - "Log notice file /var/log/tor/notices2.log" removed from torrc, but that doesn’t influence the error message from systemctl in no way. Still not working ! Does the machine on which I like to add this second instance have more than one core?? I don’t want to use ansible at the moment - that

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-02 Thread pa011
ID: 710 (code=exited, status=1/FAILURE) Am 02.07.2016 um 16:02 schrieb pa011: > Ok - I do have it and I installed a second instance called "tor2". > > I can control the first instance of Tor as usual with arm but how can I > now control the running of "tor2" wit

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-02 Thread pa011
Ok - I do have it and I installed a second instance called "tor2". I can control the first instance of Tor as usual with arm but how can I now control the running of "tor2" with arm? When calling arm with "sudo -u _tor-tor2 arm" I get asked for a Controller password even while having a HashedCont

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-01 Thread pa011
Hi, thank you for that link. Unfortunately I have to out myself as I am a newbe and don’t know how to get it working. I can see - the tool https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create . Do I have to download it? If so where to? Sorry cant be more precise with my

Re: [tor-relays] More than one instance with Debian Jessie

2016-07-01 Thread pa011
Hi Patrick, I do have the same issue with Debian, but didn’t find any documentation that worked really. Could you please let me know in detail what you did, if it is going well with you? Thank you -best regards Paul Am 28.06.2016 um 10:37 schrieb Patrick ZAJDA: > Hi Peter, > > I strangely didn

Re: [tor-relays] If you get weird crashes, that might be why

2016-06-26 Thread pa011
d about 50 percent -disk space more than enough. Am 26.06.2016 um 19:39 schrieb Yuriy M. Kaminskiy: > On 26.06.2016 16:22, pa011 wrote: >> On start-up my Exit (Linux 3.16.0-4-amd64) Tor 0.2.7.6 creates this log >> message: >> >> [warn] OpenSSL version from headers does n

[tor-relays] If you get weird crashes, that might be why

2016-06-26 Thread pa011
On start-up my Exit (Linux 3.16.0-4-amd64) Tor 0.2.7.6 creates this log message: [warn] OpenSSL version from headers does not match the version we're running with. If you get weird crashes, that might be why. (Compiled with 100010bf: Op$bf: OpenSSL 1.0.1k 8 Jan 2015; running with 1000114f: OpenSS

Re: [tor-relays] Handling abuse - like to get your help please

2016-06-21 Thread pa011
f so which ones? - are ISP's treated different in different parts of the world? Answers here might help me and others in bringing forward the discussion with them. Paul Am 21.06.2016 um 15:38 schrieb BlinkTor: > On Jun 20, 2016, at 4:19 AM, pa011 wrote: >> >> Hi all, >

Re: [tor-relays] Handling abuse - like to get your help please

2016-06-20 Thread pa011
gt; whatever you want, this is just my advice and purely informational. I > run quite a bunch of exits. > > On 6/17/2016 11:12 PM, pa011 wrote: >> Thank you Michael, solving that obviously easy question :-) >> >> So what was this "attac" then about, on which way, how c

[tor-relays] [warn] eventdns: All nameservers have failed

2016-06-19 Thread pa011
Jun 19 20:24:38.000 [warn] eventdns: All nameservers have failed Jun 19 20:24:38.000 [notice] eventdns: Nameserver 8.8.4.4:53 is back up I do get this in my logs on an exit (Tor 0.2.7.6) several times every hour. The /etc/resolv.conf contains # Generated by SolusVM nameserver 8.8.8.8 nameserver

Re: [tor-relays] Handling abuse - like to get your help please

2016-06-17 Thread pa011
Thank you Michael, solving that obviously easy question :-) So what was this "attac" then about, on which way, how can I see that ? Nice weekend to all Paul Am 17.06.2016 um 21:53 schrieb Michael Armbruster: > On 2016-06-17 at 21:51, pa011 wrote: >> Thank you both ! >

Re: [tor-relays] Handling abuse - like to get your help please

2016-06-17 Thread pa011
gh ? Am 17.06.2016 um 21:42 schrieb Moritz Bartl: > On 06/17/2016 09:35 PM, pa011 wrote: >> As I am new to this business could somebody please give me a hint how to >> best handle such an abuse complain - possibly stop it? > > You can explain Tor, offer to block that destination f

[tor-relays] Handling abuse - like to get your help please

2016-06-17 Thread pa011
As I am new to this business could somebody please give me a hint how to best handle such an abuse complain - possibly stop it? Thanks, Regards and a nice weekend. we have detected abuse from the IP address xxx.xxx.xxx,xxx, which according to a whois lookup is on your network. We would appreciat

Re: [tor-relays] Tor Weather has been discontinued

2016-06-13 Thread pa011
I would offer 2 helping hands and possibly more as well to get this and my own shirt out - please contact me Paul Am 08.06.2016 um 18:05 schrieb l3thal.inject...@gmail.com: > If tor weather isn't running, and tshirt emails aren't being sent out, > is someone doing this manually then? How can I he

Re: [tor-relays] Tor is Interrupting (?) OpenSSL Version Mismatch

2016-06-11 Thread pa011
I like to try this chnage as well - where do I find this file/parameter exactly? Thanks Am 11.06.2016 um 20:11 schrieb SuperSluether: > Fixed it! And I feel like I'm going crazy. If I'm reading the logs > correctly, Tor is signaling readiness to systemd /1 hundredth of a > second (0.01)/ past th

Re: [tor-relays] Tor is Interrupting (?) OpenSSL Version Mismatch

2016-06-11 Thread pa011
as I guess ? and Raspbian 8 jessie ? > > Raspbian repo are ok, not as updated as the Tor repo, but it's working ;) > > > > Le 11/06/2016 à 13:32, pa011 a écrit : >> Same problem here today after several updates... >> rpi-update doesn’t solve the issue unfortu

Re: [tor-relays] Tor is Interrupting (?) OpenSSL Version Mismatch

2016-06-11 Thread pa011
Same problem here today after several updates... rpi-update doesn’t solve the issue unfortunately log-file looks like this: Jun 11 13:20:50.000 [notice] Clean shutdown finished. Exiting. Jun 11 13:20:53.000 [notice] Tor 0.2.7.6 (git-605ae665009853bd) opening log file. Jun 11 13:20:52.462 [warn] Op

[tor-relays] Questions on traffic differences between two Exit relays in two different locations

2016-06-02 Thread pa011
I would like to understand the working of two exit relays, one is about 7 days old -the other worked as a middle relay before and is an exit now for about two weeks. The second one has a higher potential connection up to 250 Mbit/s while the first is supposed to be limited on 100 Mbit/s. They both

Re: [tor-relays] TOR router install without access to root

2016-05-25 Thread pa011
@Green Thank you - couldn’t handle 'attack vector' as a synonym for ""method or type of attack" :-) Additional to that is it clever for a supporter of TOR to to run more than one Relay (Exit) with a single ISP or even AS https://en.wikipedia.org/wiki/Autonomous_system_(Internet) or does this build

Re: [tor-relays] TOR router install without access to root

2016-05-25 Thread pa011
@Green Could please explain a bit more what you mean by "Avoiding using two nodes from the same AS would seemingly go a long way toward mitigating the attack vector you mentioned though." Thanks Paul Am 25.05.2016 um 21:22 schrieb Green Dream: > @Nils > > Tor path selection avoids using relays

Re: [tor-relays] TOR router install without access to root

2016-05-25 Thread pa011
Hi Markus, on your hint I was just checking feralhosting.com. They are quoting: "We do not allow Tor exit nodes to be run on our servers. They're open invitations for trouble, and while Tor serves a useful purpose our network is not the place for it. Tor relays are fine provided they strictly onl

[tor-relays] tips-running-exit-node-minimal-harassment

2016-05-21 Thread pa011
This page https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment cant be found at the moment - anybody holding a copy of it please? There is something similar 6 years old: https://www.facebook.com/notes/tor-project/tips-for-running-an-exit-node-with-minimal-harassment/407918266

Re: [tor-relays] VPS for Exits

2016-05-21 Thread pa011
I contacted ITL (https://itldc.com/) as well two weeks ago. To me they refused opening an exit: "We decide to do not allow new public tor exit nodes in our network. Existing public tor exit nodes we be kept." Paul Am 21.05.2016 um 14:37 schrieb Neel Chauhan: >>Do you know of a VPS for an exit?

Re: [tor-relays] Handling possible abuse requests

2016-05-19 Thread pa011
19.05.2016 um 13:56 schrieb Moritz Bartl: > On 05/18/2016 10:13 PM, pa011 wrote: >> Is there anybody out there who can give me some advice, or even help me >> doing (answering) these? > > I think it is pretty much straightforward. You can explain what Tor is, > why you a

[tor-relays] Handling possible abuse requests

2016-05-18 Thread pa011
I am running some pretty good developing relays which I would like to change into exit-nodes over time. As I have no experience how to handle possible abuses I would need some help please? Is there anybody out there who can give me some advice, or even help me doing (answering) these? How many of

  1   2   >