Re: [tor-relays] unflagged BAD EXIT nodes

2015-07-04 Thread nusenu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > But bottom line, the Tor Project apparently did nothing with the > information. Well, they apparently made (according to phw) an informed decision on which attacks they should be spending the little available resources. That is certainly more tha

Re: [tor-relays] Simplifying ExoneraTor

2015-07-04 Thread David Serrano
On 2015-07-02 09:40:31 (+0200), Karsten Loesing wrote: > > Julius and I have been working on a design mockup for the ExoneraTor > service for the past few months and would want to hear what you think > about this: > > https://people.torproject.org/~karsten/volatile/exonerator-mockup/ Good job! T

Re: [tor-relays] Simplifying ExoneraTor

2015-07-04 Thread Magnus Hedemark
t...@dserrano5.es thus spoke: > Results: do we really need the "Exit: yes" column? Seems pretty redundant to > me. How so? All exits are relays, but not all relays are exits. And if a relay is only configured as an exit for part of the time, that's a potentially important part of the historic

Re: [tor-relays] Simplifying ExoneraTor

2015-07-04 Thread David Serrano
On 2015-07-04 11:38:18 (-0400), Magnus Hedemark wrote: > t...@dserrano5.es thus spoke: > > > Results: do we really need the "Exit: yes" column? Seems pretty redundant to > > me. > > How so? All exits are relays, but not all relays are exits. And if a relay > is only configured as an exit for part

Re: [tor-relays] unflagged BAD EXIT nodes

2015-07-04 Thread starlight . 2015q2
At 10:04 7/4/2015 +0200, nusenu wrote: >I find it more worrying that we do not "hear" >about the 'more serious attacks' that keep >them busy and don't allow them to look into >i.e. 'AviatoChortler' (even after a few >weeks). That might mean that there is a >constant stream of 'more serious attacks

Re: [tor-relays] unflagged BAD EXIT nodes

2015-07-04 Thread Damian Johnson
> I find it more worrying that we do not "hear" about the 'more serious > attacks' that keep them busy and don't allow them to look into i.e. > 'AviatoChortler' (even after a few weeks). That might mean that there > is a constant stream of 'more serious attacks' (without information I > can only gu

[tor-relays] OVH: the biggest and fastest growing autonomous system

2015-07-04 Thread nusenu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, OVH is by far the biggest AS on the tor network, in terms of consensus weight (>12%), guard probability (>15%), middle propability (>14%) and in the top 3 by exit probability(>7%). Here are some AS stats for June 2015, that show which ASes adde

Re: [tor-relays] unflagged BAD EXIT nodes

2015-07-04 Thread Damian Busby
Sorry for hijacking, but I wasn't sure where best to put this. As a programmer, where should I start if I am considering lending my time to the tor project? While I feel that the BAD EXIT issue needs some love, I defer to those with more knowledge on the state of things to direct my efforts. Is t

Re: [tor-relays] unflagged BAD EXIT nodes

2015-07-04 Thread Ben Serebin
‎I'll hijack the response I'm a sysadmin, an unloved Windows one. My unwanted $0.02 are: - Windows installer (omg, Windows, the evil one which if you really want greater adoption is the answer! Oh smokes, someone said it! - change the architecture so running behind nat works (this is probab

Re: [tor-relays] unflagged BAD EXIT nodes

2015-07-04 Thread nusenu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > 2. Openness. Traditionally there's been some contention about where > to draw the line between openness and secrecy. Personally this is > what turned me off to this space [3]. Thankfully Philipp's moving > us toward being a little less secretive. [

Re: [tor-relays] unflagged BAD EXIT nodes

2015-07-04 Thread Damian Johnson
> Sorry for hijacking, but I wasn't sure where best to put this... Glad you want to get involved! This would be more suited for its own thread on tor-dev@ but that said, my top suggestion is: pick something that interests you. Enjoying your involvement with open source and, by extension, sticking

Re: [tor-relays] unflagged BAD EXIT nodes

2015-07-04 Thread Damian Busby
Thanks for all the useful links and directions. We now return to our regularly scheduled program: "unflagged BAD EXIT nodes, and the women who love them". The other Damian On Sat, Jul 4, 2015 at 4:59 PM Damian Johnson wrote: > > Sorry for hijacking, but I wasn't sure where best to put this...

[tor-relays] Relays behind NATs (Was Re: unflagged BAD EXIT nodes)

2015-07-04 Thread Yawning Angel
On Sat, 4 Jul 2015 19:34:45 -0400 Ben Serebin wrote: > ‎I'll hijack the response I'm a sysadmin, an unloved Windows one. > My unwanted $0.02 are: > > - Windows installer (omg, Windows, the evil one which if you really > want greater adoption is the answer! Oh smokes, someone said it! Ignorin

[tor-relays] Running a Relay behind a NAT (was Re: unflagged BAD EXIT nodes)

2015-07-04 Thread teor
> Date: Sat, 4 Jul 2015 19:34:45 -0400 > From: Ben Serebin > Subject: Re: [tor-relays] unflagged BAD EXIT nodes > > ?I'll hijack the response I'm a sysadmin, an unloved Windows one. My > unwanted $0.02 are: > > - Windows installer (omg, Windows, the evil one which if you really want > gre

Re: [tor-relays] Running a Relay behind a NAT (was Re: unflagged BAD EXIT nodes)

2015-07-04 Thread teor
> On 5 Jul 2015, at 11:37 , teor wrote: > >> Date: Sat, 4 Jul 2015 19:34:45 -0400 >> From: Ben Serebin >> Subject: Re: [tor-relays] unflagged BAD EXIT nodes >> >> ?I'll hijack the response I'm a sysadmin, an unloved Windows one. My >> unwanted $0.02 are: >> >> - Windows installer (omg, W