Re: [tor-relays] DOS Protection mini RFC

2024-08-14 Thread George Hartley via tor-relays
If there is DoS on bridges on domestic connections, or connections with very low throughput, then handling (D)DoS at an application layer becomes futile - it will simply overload the NIC. But for bridges on at least 100MbE ports, this would be a nice addition. On Sunday, August 11th, 2024 at 9:

Re: [tor-relays] [tor-dev] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-08-14 Thread George Hartley via tor-relays
Hello, > Similar to Briar, even developers of such clients above tell the loss of > messages and low reliability of the hidden to hidden path. Some of you might > know, that there were use cases with missing messages in a range of 35-45 %. Sorry, but this is just not the case from my experie

Re: [tor-relays] Archive key from deb.torproject.org was renewed - mind the * deb * !

2024-08-14 Thread boldsuck
On Sonntag, 11. August 2024 15:20:01 CEST eff_03675...@posteo.se wrote: > Question is: how many relays are now running an out-dated gpg keyring? I don't see any problem: If you do 'apt upgrade' via commandline, you will get an ERROR output. If you have 'unattended upgrades' enabled, you will get

Re: [tor-relays] Archive key from deb.torproject.org was renewed - mind the * deb * !

2024-08-14 Thread Toralf Förster via tor-relays
On 8/14/24 16:13, boldsuck wrote: If you have 'unattended upgrades' enabled, you will get an ERROR email. Highly depends on a configured mailer IMO. -- Toralf ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/c

Re: [tor-relays] Archive key from deb.torproject.org was renewed - mind the * deb * !

2024-08-14 Thread boldsuck
On Mittwoch, 14. August 2024 18:20:43 CEST Toralf Förster via tor-relays wrote: > On 8/14/24 16:13, boldsuck wrote: > > If you have 'unattended upgrades' enabled, you will get an ERROR email. > > Highly depends on a configured mailer IMO. ;-) That's clear. But without mailout I don't even know w

Re: [tor-relays] Archive key from deb.torproject.org was renewed - mind the * deb * !

2024-08-14 Thread Toralf Förster via tor-relays
On 8/14/24 19:44, boldsuck wrote: upgrades are running or not. And that I have to reboot because of the kernel upgrade or similar. (I don't like auto reboots) Ah, ok. I like it and have therefore unattended upgrade configured unconditionally for all packages [1]. Furthermore I do use needresta

Re: [tor-relays] [tor-dev] Fwd: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes

2024-08-14 Thread Sam
Hello, many thanks, George, for your response, feedback and sharing experience with servers within Tor. Sharing experiences and measuring might be individual cases and conditions. After it has been reported, we all need to make up our mind to find solutions. So one result as a contribution is the R

Re: [tor-relays] DOS Protection mini RFC

2024-08-14 Thread George Hartley via tor-relays
Sorry, slight correction, instead of NIC / network card, I meant the internet connection established by the modem itself. Same for cable and fiber, but those usually have higher download speed, and that's what it comes down to when facing DoS attacks, how many megabytes an attacker needs to put

Re: [tor-relays] Archive key from deb.torproject.org was renewed - mind the * deb * !

2024-08-14 Thread Louis-Philippe Véronneau
On 2024-08-14 1 h 44 p.m., boldsuck wrote: On Mittwoch, 14. August 2024 18:20:43 CEST Toralf Förster via tor-relays wrote: On 8/14/24 16:13, boldsuck wrote: If you have 'unattended upgrades' enabled, you will get an ERROR email. Highly depends on a configured mailer IMO. ;-) That's clear. B