[tor-relays] Grizzly Steppe

2017-01-02 Thread Dr Gerard Bulger
I ran an exit node, but gave up after too many abuse reports that annoyed my ISP. So I turned al exit ports off, and reports stopped as a rely.After months and many terabytes of data I get an abuse complaint that my tor IP has been used for espionage. "NCSC have been made aware of a repor

Re: [tor-relays] Grizzly Steppe

2017-01-02 Thread Rana
My bet is that the recorded IP address dates back to the days when your node was an exit. Naturally the Russian hackers have used Tor, probably in tandem with a VPN - it would have been stupid of them not to, and stupid they are not. And you are right - now the US government will blame Tor exit

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Mirimir
On 01/02/2017 12:53 AM, Rana wrote: > @Mirimir >>> This is not Blockchain where hundreds of thousands of greedy selfish >>> genes are working together for non-collusion. A practically zero- >>> effort collusion of already fully cooperating FIVE EYE agencies (US, >>> UK, Canada, Australia, New Z

Re: [tor-relays] Grizzly Steppe

2017-01-02 Thread rush23
that. >Or is it that my relay was being used to transfer the data? > >I assume my IP was found by way of a DNS leak which I need to look >into. >There is nothing else I can do as a relay to stop this or is there? > >Gerry > > > >-- next part -- >An H

Re: [tor-relays] Grizzly Steppe

2017-01-02 Thread Jim
Dr Gerard Bulger wrote: I ran an exit node, but gave up after too many abuse reports that annoyed my ISP. So I turned al exit ports off, and reports stopped as a rely.After months and many terabytes of data I get an abuse complaint that my tor IP has been used for espionage. “NCSC have

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Aeris
> > Tor model breaks down when facing a modest government adversary for the > > simple reason that having only 7000 relays total, with a minority of > > them carrying most of the traffic, invites cheap infiltration and > > takeover by state adversaries. > > Yeah, that's a problem :( That’s a theo

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Zwiebel
> Currently, most of the major guard operators are well known people are you sure? - Zwiebel, 33rd on that list ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Rana
Sorry -Original Message- From: tor-relays [mailto:tor-relays-boun...@lists.torproject.org] On Behalf Of Aeris Sent: Monday, January 02, 2017 3:56 PM >Currently, most of the major guard operators are well known people and no >doubt they’re not engaged with three-letter agencies. >https:/

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Rana
Known to whom? Is there a Tor police that researches "unknown" guards? How do you measure "known"? How do they become "known"? Something akin to key signing parties? Secret meetings in Munich biergartens? Conversely, if someone installs a high performance relay, during the first 70 days is ther

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Aeris
> I do not know how to interpret this table. How many guards are there at any > given time? Currently, we have 2442 guards. This number is not fix but vary each days depending of community efforts to maintain stable nodes with enough bandwidth. > Known to whom? Is there a Tor police that researc

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Toralf Förster
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 01/02/2017 04:32 PM, Aeris wrote: > Tor node selection for circuits will address this trouble and avoid you to > use > more than 1 of their nodes in the same circuit, preventing any anonymity > problem. *any* sounds a little bit too optimistic

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Aeris
> *any* sounds a little bit too optimistic IMO, but it reduces the risk of > being deanonymized (always under the assumption of the threat model). If family name is correctly defined, Tor ensure you will only use one of those nodes on your circuits. If family name not correctly defined, Tor proj

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Andreas Krey
On Mon, 02 Jan 2017 08:28:52 +, Rana wrote: ... > That US agencies are actively working to destroy anonymity of (hopefully only > selected, but who knows?) Tor users is an undisputable fact. Your implicit > assumption that Russia is also attacking Tor is, however, unfounded. Now, what is the

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Gumby TORZone
Just to play devils advocate here - when a single hacker can control tens of thousands of devices in a botnet - just how easy would it be for a "state" agency to control a few hundred tor nodes? We can always assume, possibly to our own demise, that they utilize it to some degree themselves, and le

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Mirimir
On 01/02/2017 06:56 AM, Aeris wrote: >>> Tor model breaks down when facing a modest government adversary for the >>> simple reason that having only 7000 relays total, with a minority of >>> them carrying most of the traffic, invites cheap infiltration and >>> takeover by state adversaries. >> >> Ye

Re: [tor-relays] zwieb...@online.de relays: MyFamily update required (new relay added)

2017-01-02 Thread nusenu
Hi zwiebeln, thanks for adding your 31. relay nicknamed 'hecker' ! Please do not forget to update your MyFamily on all relays. Tipp: If you are planing to grow beyond your 31 relays I recommend you preemptively generate the keys for your upcoming relays so you don't have to touch all other relay

[tor-relays] _AceLewis tor relays: please specify 'MyFamily' in your torrc

2017-01-02 Thread nusenu
Hi Lewis, thanks for adding your 6 tor relays to the network! Please do not forget to set the MyFamily parameter in your torrc configuration to tell clients your relays belong to a single operator. If you need help with the MyFamily option let us know. thanks, nusenu ++--

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Mirimir
On 01/01/2017 11:28 PM, Rana wrote: > I believe that what is needed is changing Tor to accommodate a > lot of small relays running by a very large number of volunteers, > and to push real traffic through them. Alternately, you need lots of small relays, running (with plausible deniability) on I

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread teor
> On 3 Jan 2017, at 11:46, Mirimir wrote: > >> I believe that what is needed is changing Tor to accommodate a >> lot of small relays running by a very large number of volunteers, >> and to push real traffic through them. > > Alternately, you need lots of small relays, running (with plausible >

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Mirimir
On 01/02/2017 06:08 PM, teor wrote: > >> On 3 Jan 2017, at 11:46, Mirimir wrote: >> >>> I believe that what is needed is changing Tor to accommodate a >>> lot of small relays running by a very large number of volunteers, >>> and to push real traffic through them. >> >> Alternately, you need lot

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2017-01-02 Thread teor
> On 28 Dec 2016, at 02:50, Rana wrote: > > Speaking of guards, could someone come with a theory pf what happened here? > The IP is static, the relay exists for 18 days and has Stable flag since > maybe 2 weeks, the measured bandwidth -153 KB/s - exactly equals the > bandwidth limit in torrc

Re: [tor-relays] Disparity between download and upload traffic

2017-01-02 Thread teor
> On 27 Dec 2016, at 03:47, Gage Parrott wrote: > > Morning, everyone, > > I recently migrated my bridge relay over to a VM and everything seems to be > working fine except for one oddity. I consistently see lines like this in > tor's log file on the new machine: > > Dec 25 23:48:14.000 [no

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2017-01-02 Thread Rana
To recap, we are talking about https://atlas.torproject.org/#details/707A9A3358E0D8653089AF32A097570A96400C C6 Thanks but your explanation does not seem to apply here. The measured BW is equal to the limit and has been the same rock solid number (153.6 KB/s) for weeks. As you see on the graph, the

Re: [tor-relays] What's a "useful" relay?

2017-01-02 Thread teor
> On 24 Dec 2016, at 18:56, Rana wrote: > > ... > > What is needed is a standardized feedback on WHY the relay has such a low > rating. This could cause at least part of the operators to take care of the > bottleneck (eg moving the relay to another location, or abandoning the home > relay an

Re: [tor-relays] How can we trust the guards?

2017-01-02 Thread Rana
@teor >I think you are talking about a different network, which is not Tor as currently designed, implemented, and deployed. >In particular, how do you get decent throughput, reliability, and low- latency out of tens of thousands of devices? >This is an open research problem, which the Tor design d

Re: [tor-relays] Unwarranted discrimination of relays with dynamic IP

2017-01-02 Thread teor
> On 3 Jan 2017, at 17:21, Rana wrote: > > To recap, we are talking about > https://atlas.torproject.org/#details/707A9A3358E0D8653089AF32A097570A96400C > C6 > > Thanks but your explanation does not seem to apply here. The measured BW is > equal to the limit and has been the same rock solid num

Re: [tor-relays] What's a "useful" relay?

2017-01-02 Thread Rana
@teor I hereby volunteer to maintain a FAQ for operators of small relays (or noob operators). Which means I would be watching this list, generating the Q&A and from time to time alerting this list to the appearance of new questions and answers, to allow knowledgeable people to do quality control. A

Re: [tor-relays] Speed up of reconnections after IP Address change

2017-01-02 Thread teor
> On 22 Dec 2016, at 18:19, balbea16 wrote: > > Hi There, > I only have a dynamic IP address and my ISP changes it almost every time > after 24 hours. It is somehow sad to see 1.400 connections drop to almost > none. After the change it takes 20 minutes until my OR notices this (our IP > Addr