Re: [tor-relays] Relay disconnect & offline on IP change

2024-09-26 Thread Tor Relay Net Ops via tor-relays
ations. But also, maybe people just quietly stopped trying and left, who knows. I run my tor relay inside a Debian KVM on a ProxMox (2C, 8G ram); Ryzen 5 5500 CPU. No weird setups here. (C) The old-school way of handling this was to get a dyndns account and then set your torrc Address

[tor-relays] Relay disconnect & offline on IP change

2024-09-25 Thread Tor Relay Net Ops via tor-relays
Greetings fellow relay operators! I'm currently running a tor relay on a dynamic IP Address connection, usually my ISP gives me a new address every day or so- Lately [for the past like week or so- /can't remember when it started happening/], I have to manually restart it when

Re: [tor-relays] tor relay + sslh

2021-06-14 Thread tor-relay
figure and deploy > sslh on large scale. > > If tor handshake can be handled by sslh, could the process (of the tor > relay) be listening on 127.0.0.1:12345 and publish good relay > descriptor as well ? > > Currently, in my relay config, I have the following: > > &quo

Re: [tor-relays] tor crash on HUP only when SANDBOX is 1

2020-01-05 Thread tor-relay
just a little update: I've reproduced this bug on my laptop with Debian Buster. I've noticed that this problem occurs only with tor 0.4.2.5.  Tor 0.4.1.6, from Debian buster backports repository, works properly. Il 05/01/20 07:43, tor-re...@riseup.net ha scritto: Hi, I'm running an exit re

[tor-relays] tor crash on HUP only when SANDBOX is 1

2020-01-05 Thread tor-relay
Hi, I'm running an exit relay on a Debian Buster. I installed libseccomp and I've built tor 0.4.2.5 using debuild, like the wiki says. Today I noticed that tor crashes on HUP signal, only when the Sandbox option is on. I never had this problem. This is what my log says: an 05 08:23:10.000

Re: [tor-relays] forward relay connections

2019-05-23 Thread tor-relay
I think that a network based to much on remotes VMs, with closed source software running on the most deep machine level, is not very resilient and secure. So the reason why I was thinking to do so is that I wanted to run a small exit relay on a device running only open source software, like O

[tor-relays] forward relay connections

2019-05-22 Thread tor-relay
Hello dear friends I'm running a non exit relay on a debian machine (in the next few months I will switch to *BSD) on a Lime2. I'm running an exit relay too on a remote VM. I would turn my non-exit relay in an exit one, but for obvious reasons, I don't want to run It from my shitty ISP IP. I

Re: [tor-relays] Become a Fallback Directory Mirror

2019-05-21 Thread tor-relay
2206C72ECC0D55593BC7B698F982533F1E141DD2 Il 21 maggio 2019 15:32:57 CEST, gus ha scritto: >Dear Relay Operators, > >Do you want your relay to be a Tor fallback directory mirror? >Will it have the same address and port for the next 2 years? >Just reply to this email with your relay's fingerprint

Re: [tor-relays] Blocking outbound 22 or no?

2017-10-05 Thread tor-relay . dirk
Hello AMuse, we faced the same about 1-2 month ago. Actuall people use fail2ban which creates abuse mails to you provider. Thats not new. But recently the abuse mails have risen to numbers which lead us to believe there are acutally more people abusing ssh via tor than people really using it. In

Re: [tor-relays] Two-step abuse management?

2017-09-14 Thread tor-relay . dirk
Hello Moritz, we run such an setting since several years. Whois records show our ripe object with abuse-r...@...as abuse-mailbox address. This is connected to an auto-responder. In auto-responder mail we explain what is going on and offer to write to our abuse@ email address. This really is

Re: [tor-relays] Memory Problems with tor releay

2017-05-24 Thread tor-relay . dirk
Hello Roger, I updated the ticket. You will find the output of the valgrind there as well: https://trac.torproject.org/projects/tor/attachment/ticket/22255/valgrind.txt best regards Dirk On 23.05.2017 06:00, Roger Dingledine wrote: > On Tue, May 23, 2017 at 03:01:10AM +, John Ricketts wrote

[tor-relays] Memory Problems with tor releay

2017-05-22 Thread tor-relay . dirk
Dear all, we are operating two exit nodes with each two tor processes out of Switzerland. The nodes worked quite stable until about 2-3 weeks ago. Since then we experience frequent disruptions (Up to several times a day). This is caused by a significant rise in memory consumption by the tor proce

Re: [tor-relays] tornull

2017-05-01 Thread tor-relay . dirk
It was two days ago. Today I can not reach it as well. best regards Dirk On 01.05.2017 08:08, scar wrote: > I was unable to reach the site, is it still in operation? > > ___ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.t

Re: [tor-relays] Updating our IP Address

2016-12-20 Thread tor-relay . dirk
Hello, I'm part of the abuse team of the mentioned Tor Exit. Also I follow this mailing list. I read you post several times but I'm not sure what you where doing. It looks to me like you running a tor node and have also a dyndns update process running. Is this correct ? Please provide some more

Re: [tor-relays] minor typos in tor-instance-create

2016-08-06 Thread tor relay
> fixed, thanks. https://gitweb.torproject.org/debian/tor.git/commit/?id=040fffc07b430d825e5acc88e6d2085a17b718fa There is a little typo in the fix tor@$name " vs tor@$name" ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torpr

[tor-relays] tor-instance-create users: beware all your instances are always started

2016-08-06 Thread tor relay
This is only relevant for debian users. If you assume you can manage your instances with the usual systemctl commands like systemctl disable/enable tor@myinstance beware that they have no effect. Note: systemctl start/stop works as expected. This is important to know especially if you have mult

[tor-relays] minor typos in tor-instance-create

2016-08-06 Thread tor relay
https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create#n89 is: systemctl tor@$name start should be: systemctl start tor@$name mailto:tor@$name https://gitweb.torproject.org/debian/tor.git/tree/debian/tor-instance-create.8.txt#n18 brdige -> bridge __

[tor-relays] debian: log messages when upgrading tor package

2016-08-05 Thread tor relay
When upgrading the tor package on debian I get the following syslog messages: systemd[1]: Failed to reset devices.list on /system.slice: Invalid argument systemd[1]: Failed to reset devices.list on /system.slice/system-tor.slice: Invalid argument Should I be concerned?

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
made a ticket: https://trac.torproject.org/projects/tor/ticket/19847 ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> So there is no way to disable the default instance using systemctl after all? To answer my own question: systemctl mask tor@default disables the default instance for real. ..but I'm still curious why tor@default is a static unit (without [Install] section) https://bbs.archlinux.org/viewtopic.p

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> > > > Also: you can not start/stop/restart tor.service separately without > > > > leaving all other tor instances untouched. > > > > > > tor.service is *not* the default service. tor.service is the collection > > > of all service instances. > > > > > > Gosh, you are right there is tor@defaul

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> On August 5, 2016 at 1:24 PM Peter Palfrader wrote: > > > On Fri, 05 Aug 2016, tor relay wrote: > > > Also: you can not start/stop/restart tor.service separately without leaving > > all other tor instances untouched. > > tor.service is *not* the def

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> > Why this hack (disable a service by moving away its config) and not the > more clean approach like the one take by the RPM maintainer? > ..that allows one to manage (start/stop/enable/disable) each service separately using standard tools and methodologies (and not service specific wa

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-05 Thread tor relay
> > On August 4, 2016 at 10:23 AM Peter Palfrader > wrote: > > On Thu, 04 Aug 2016, tor relay wrote: > > > > > > > > > > > > On August 3, 2016 at 11:51 PM Green Dream > > > wrote: > >

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-03 Thread tor relay
https://trac.torproject.org/projects/tor/ticket/19825___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-03 Thread tor relay
> On August 3, 2016 at 11:51 PM Green Dream wrote: > > Sorry, I didn't understand that your daemon didn't restart after the > upgrade. I ran through the upgrade on 2 relays, and apt started the service > post-upgrade on both. > > > Since it is reproducible in my case as well I assume y

Re: [tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-03 Thread tor relay
> On August 3, 2016 at 11:04 PM Green Dream wrote: > > > > When upgrading, all running tor instances are stopped (not restarted, > as expected) > > > syslog shows: > > > Interrupt: we have stopped accepting new connections, and will shut > down in 30 seconds. Interrupt again to

[tor-relays] experiences with debian tor 0.2.8.6 package from deb.torproject.org

2016-08-03 Thread tor relay
Hi, I'm running a relay on debian jessie using packages from deb.torproject.org. I want to share the problems I had so others are aware of them when upgrading their relays. While upgrading from 0.2.7.6 to 0.2.8.6 via apt-get, I did a tail -f syslog to make sure I notice problems during the up

Re: [tor-relays] cheap unmetered non-exit VPS offers

2016-07-28 Thread tor relay
> On July 28, 2016 at 8:13 PM "Tor-Node.net" wrote: > > > Markus Koch mailto:niftybu...@googlemail.com > > wrote: > > > exit allowed? > > I can vouch forhttp://www.stayon.no > > > " We are also changing the direction of our business, and becoming a hosting provider for IT c

Re: [tor-relays] cheap unmetered non-exit VPS offers

2016-07-28 Thread tor relay
> On July 28, 2016 at 2:48 PM Markus Koch wrote: > > > exit allowed? no, that is why I put "non-exit" in the subject of my email. https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs#Italy1 And yes, their support is poor, but as long as your servers run you won't need them. Anothe

Re: [tor-relays] cheap unmetered non-exit VPS offers

2016-07-28 Thread tor relay
> > On July 28, 2016 at 9:11 AM Roman Mamedov wrote: > > On Thu, 28 Jul 2016 08:09:12 +0100 > "Louie Cardone-Noott" wrote: > > > > > > Am I right in thinking that even 2 TByte/month is fairly low? That's > > only 6 Mbit/s average (whether that's 6/6 or 3/3

Re: [tor-relays] VPS for Exits and non-Exits

2016-07-06 Thread tor relay
> On July 6, 2016 at 6:16 PM Jean-Philippe Décarie-Mathieu > wrote: > > I've been running an exit node for over a year on OVH now, no problems so > far. Highly recommended (especially since they give me 10TB of traffic for > about 10$USD/month; considering I use about 7-8TB of that per mo

Re: [tor-relays] VPS for Exits

2016-07-06 Thread tor relay
> Well, I'm still sticking with CoolHousing/Virtual Server Lite because I > hardly ever get abuse > complaints. For ITL, I may leave after my term expires. > But a few other companies I found were: > https://hostmaze.com/ tested it, made really bad experience with them, network performance was

[tor-relays] First Tech CU apparently blocking all Tor nodes

2015-09-12 Thread Tor Relay @ WeFu.Org
It appears that First Tech Federal Credit Union is blocking all Tor nodes (including non-exit nodes) from connecting to their website, http://www.firsttechfed.com This seems ... misguided on their part. Blocking exit nodes is one thing, but preventing random people who happen to run a Tor middle

Re: [tor-relays] NHS UK blocking Tor?

2014-04-14 Thread Tor Relay
an I via mobile internet so I'm down to suspecting that they are blocking all Tor relay IPs. This is the exact error I get: Access DeniedYou don't have permission to access "http://www.nhs.uk/"; on this server. Reference #18.1f7f1002.1397514736.1fe2170c The reference seems to change e

[tor-relays] Atlas Entry

2014-04-09 Thread Tor Relay
My several attempts to update to TBB 3.5.4 (XP)unsuccessfully made Tor exit upon starting, so I fell back to 3.5.3. Atlas shows that my efforts hadn't gone unnoticed; OnionTorte now appears four times w/ my IP address. 0D50D43BAA728D6E0C4EB181AB79E5C1D7036D08 is the correct one but it somehow

Re: [tor-relays] Lots of tor relays send out sequential IP IDs; please fix that!

2014-03-31 Thread Tor Relay
t increments by one every time; that probably means that the relay uses per-IP counters or so, and as far as I know, that should be fine. After a bit of testing, I think that this issue is present on a lot of Tor relay nodes. Here are the first few in the alphabet that look suspicious (didn

Re: [tor-relays] Best price/efficiency ratio

2014-03-22 Thread Tor Relay
wrote: Question how long you'll stay in the Top 50. Maybe you are lucky but probably the ISP will end your contract for "abusing" fair use policies/TOS. Best case they'll throttle you down. Let us know in 30 days :) Am 22.03.14 21:51, schrieb Trigger Happy: Hi list, I'm run

[tor-relays] Effects of Rebooting?

2014-02-28 Thread Tor Relay
I am a n00b relay (OnionTorte) operator, and, as such, know lamentably little of what I'm doing. (Yes, I'm one of *those* relay operators.) When I went to bed last night I had an HSDir flag, but it has since disappeared. And since this A.M. my consensus was halved. A bit of promiscuous pokin