For those who may skip emails by the subject line, I resend my own email.
There is a sinking feel in general over here, where a bunch of us learn more
about Tor. We learnt we cannot run our own relays because here censorship is
very strong; at the same time, we realize we have many relay operators in other
countries to thank, for giving us a window into the world.
Thank you. And I write this email over Tor.
- Jack
Date: 4. Apr 2018 03:55
From: jackoream...@tutanota.com <mailto:jackoream...@tutanota.com>
To: tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
Cc: tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
Subject: Re: [tor-relays] tor-relays Digest, Vol 87, Issue 4
> We had some more discussions over here, and someone pointed out a key
> fact which we novices did not get at first - the Tor network does not REALLY
> trust the relay operators until the directory authorities DAs (whose IPs are
> hardcoded into the source code) can check them out and then vote about what
> they have learnt about these relays. If relays pass that test, they get onto
> a live document called the "Consensus" (between the DAs). So new clients to
> the network trust these DAs and they trust the consensus reached by the DAs.
> That is how new clients learn the network topology and find relays to connect
> to.
>
> So we were wrong on a few points:
> (1) we thought we can contribute to the relay networks without being
> detected, but basically no - you cannot contribute to the relay network
> unless you are in the consensus, and if you are in the consensus, your IP
> address is world readable.
> (2) a private bridge is providing relay WITHOUT publishing descriptors to the
> consensus, so it is a hybrid creature: (a) it appears as a client to the Tor
> network proper, being hidden from the consensus, and therefore cannot help
> relay traffic; (b) it appears as a relay server to connecting clients but
> unlike relays already on the consensus certain clients trust it because they
> know about the private bridge from channels they trust outside the Tor
> consensus; and these clients gain a extra measure of security from whatever
> obfuscation the bridge can offer.
>
> So by design, Tor does not trust and cannot completely trust a relay that
> just pops up one day. There is no way for Tor DAs to work with a relay node
> that hides itself behind a VPN.
>
> So in the area where we live, if we run a relay, we will be caught, plain and
> simple. No way around it. No way for us to contribute by running a relay.
> Zero, nada. We utterly depend on bridges hosted outside our geography, to
> have any hope of accessing Tor. Some of us who have facilities in another
> country might help, but for us that is comparatively difficult and expensive.
>
> The only reason I can access the "outside world" is due to people who hosts
> bridges for us. If you guys pack and go home, nothing we can do. Zero,
> nada. I am writing this email over Tor.
>
> - Jack
>
> 3. Apr 2018 16:02 by > developm...@jivanamara.net
> <mailto:developm...@jivanamara.net>> :
>
>
>> Hey Jack,
>>
>> Here's my understanding of your concerns, anyone else please chime in if
>> I'm mistaken anywhere.
>>
>> For running a normal relay compared to a client connecting to a relay
>> via obfs4, it's less likely to be discovered by examining the content of
>> traffic. The obfs4 protocol is designed to disguise the connection
>> between a client (i.e. torbrowser). Once the traffic hits a relay, the
>> interaction between relays contains less opportunities to identify it as
>> tor traffic as opposed to any other encrypted traffic.
>>
>> That being said, there are a couple of other things that would make it
>> very easy to identify a TOR relay. First, by default, relays are listed
>> for anyone to examine.
>>
>> Second, if the authorities are watching, the change in traffic to/from
>> your home computer will be pretty obvious.
>>
>> Regarding your concerns about children being inappropriately exposed to
>> the dark web, running a relay will make very little difference compared
>> to not running one. For your children to see the content of the dark
>> web they'll need to install torbrowser (or equivalent) and that's going
>> to be the same whether or not you're running a relay. The only
>> potential difference is that if in your area it's very difficult to
>> connect to the tor network and your children know you're running a
>> relay, with some knowledge they could configure torbrowser to connect
>> first to your relay. In some sense, if the authorities are successful
>> in blocking access to the tor network, you could be enabling their romps
>> on the dark web.
>>
>> HTH
>>
>> Jivan
>>
>>
>> On 04/03/2018 02:38 AM, >> tor-relays-requ...@lists.torproject.org
>> <mailto:tor-relays-requ...@lists.torproject.org>>> wrote:
>>> Send tor-relays mailing list submissions to
>>> >>> tor-relays@lists.torproject.org
>>> <mailto:tor-relays@lists.torproject.org>
>>>
>>> To subscribe or unsubscribe via the World Wide Web, visit
>>> >>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
>>> or, via email, send a message with subject or body 'help' to
>>> >>> tor-relays-requ...@lists.torproject.org
>>> <mailto:tor-relays-requ...@lists.torproject.org>
>>>
>>> You can reach the person managing the list at
>>> >>> tor-relays-ow...@lists.torproject.org
>>> <mailto:tor-relays-ow...@lists.torproject.org>
>>>
>>> When replying, please edit your Subject line so it is more specific
>>> than "Re: Contents of tor-relays digest..."
>>>
>>>
>>> Today's Topics:
>>>
>>> 1. Re: failed setup of obfs4 on relay (>>> jackoream...@tutanota.com
>>> <mailto:jackoream...@tutanota.com>>>> )
>>> 2. Re: failed setup of obfs4 on relay (>>> jackoream...@tutanota.com
>>> <mailto:jackoream...@tutanota.com>>>> )
>>> 3. Re: Estimation of bridge traffic / Bridge or relay needed?
>>> (>>> jackoream...@tutanota.com <mailto:jackoream...@tutanota.com>>>> )
>>>
>>>
>>> ----------------------------------------------------------------------
>>>
>>> Message: 1
>>> Date: Tue, 3 Apr 2018 05:00:18 +0200 (CEST)
>>> From: <>>> jackoream...@tutanota.com <mailto:jackoream...@tutanota.com>>>> >
>>> To: <>>> tor-relays@lists.torproject.org
>>> <mailto:tor-relays@lists.torproject.org>>>> >
>>> Cc: <>>> tor-relays@lists.torproject.org
>>> <mailto:tor-relays@lists.torproject.org>>>> >
>>> Subject: Re: [tor-relays] failed setup of obfs4 on relay
>>> Message-ID: <>>> l98ret7--...@tutanota.com
>>> <mailto:l98ret7--...@tutanota.com>>>> >
>>> Content-Type: text/plain; charset="utf-8"
>>>
>>> Thank you all, that was very helpful. - Jack
>>>
>>> 30. Mar 2018 20:53 by >>> a...@mit.edu <mailto:a...@mit.edu>>>> <>>>
>>> mailto:a...@mit.edu <mailto:mailto:a...@mit.edu>>>> >:
>>>
>>>
>>>> On Fri, Mar 30, 2018 at 04:52:23PM -0400, Roger Dingledine wrote:
>>>>> For obfs4, the active prober doesn't know the secret "cert" parameter,
>>>> For far far more detail on the various pluggable transports and how
>>>> they look on the wire, check out this awesome page that David Fifield
>>>> put together:
>>>>
>>>> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
>>>>
>>>> <https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports>>>>>
>>>> <>>>>
>>>> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
>>>>
>>>> <https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports>>>>>
>>>> >
>>>>
>>>> --Roger
>>>>
>>>> _______________________________________________
>>>> tor-relays mailing list
>>>> tor-relays@lists.torproject.org
>>>> <mailto:tor-relays@lists.torproject.org>>>>> <>>>>
>>>> mailto:tor-relays@lists.torproject.org
>>>> <mailto:mailto:tor-relays@lists.torproject.org>>>>> >
>>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>>>>>
>>>> <>>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>>>>> >
>>> -------------- next part --------------
>>> An HTML attachment was scrubbed...
>>> URL: <>>>
>>> http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/1e860483/attachment-0002.html
>>>
>>> <http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/1e860483/attachment-0002.html>>>>
>>> >
>>>
>>> ------------------------------
>>>
>>> Message: 2
>>> Date: Tue, 3 Apr 2018 05:00:18 +0200 (CEST)
>>> From: <>>> jackoream...@tutanota.com <mailto:jackoream...@tutanota.com>>>> >
>>> To: <>>> tor-relays@lists.torproject.org
>>> <mailto:tor-relays@lists.torproject.org>>>> >
>>> Cc: <>>> tor-relays@lists.torproject.org
>>> <mailto:tor-relays@lists.torproject.org>>>> >
>>> Subject: Re: [tor-relays] failed setup of obfs4 on relay
>>> Message-ID: <>>> l98ret7--...@tutanota.com
>>> <mailto:l98ret7--...@tutanota.com>>>> >
>>> Content-Type: text/plain; charset="utf-8"
>>>
>>> Thank you all, that was very helpful. - Jack
>>>
>>> 30. Mar 2018 20:53 by >>> a...@mit.edu <mailto:a...@mit.edu>>>> <>>>
>>> mailto:a...@mit.edu <mailto:mailto:a...@mit.edu>>>> >:
>>>
>>>
>>>> On Fri, Mar 30, 2018 at 04:52:23PM -0400, Roger Dingledine wrote:
>>>>> For obfs4, the active prober doesn't know the secret "cert" parameter,
>>>> For far far more detail on the various pluggable transports and how
>>>> they look on the wire, check out this awesome page that David Fifield
>>>> put together:
>>>>
>>>> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
>>>>
>>>> <https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports>>>>>
>>>> <>>>>
>>>> https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
>>>>
>>>> <https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports>>>>>
>>>> >
>>>>
>>>> --Roger
>>>>
>>>> _______________________________________________
>>>> tor-relays mailing list
>>>> tor-relays@lists.torproject.org
>>>> <mailto:tor-relays@lists.torproject.org>>>>> <>>>>
>>>> mailto:tor-relays@lists.torproject.org
>>>> <mailto:mailto:tor-relays@lists.torproject.org>>>>> >
>>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>>>>>
>>>> <>>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>>>>> >
>>> -------------- next part --------------
>>> An HTML attachment was scrubbed...
>>> URL: <>>>
>>> http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/1e860483/attachment-0003.html
>>>
>>> <http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/1e860483/attachment-0003.html>>>>
>>> >
>>>
>>> ------------------------------
>>>
>>> Message: 3
>>> Date: Tue, 3 Apr 2018 10:38:38 +0200 (CEST)
>>> From: <>>> jackoream...@tutanota.com <mailto:jackoream...@tutanota.com>>>> >
>>> To: <>>> tor-relays@lists.torproject.org
>>> <mailto:tor-relays@lists.torproject.org>>>> >
>>> Cc: <>>> tor-relays@lists.torproject.org
>>> <mailto:tor-relays@lists.torproject.org>>>> >
>>> Subject: Re: [tor-relays] Estimation of bridge traffic / Bridge or
>>> relay needed?
>>> Message-ID: <>>> l99e63k--...@tutanota.com
>>> <mailto:l99e63k--...@tutanota.com>>>> >
>>> Content-Type: text/plain; charset="utf-8"
>>>
>>> Want to follow up the discussion on encouraging people to run relays.
>>>
>>> The powers that be where I live now heavily frowns upon VPN and Tor. And a
>>> fair number in our community is sensing further tightening in the air.
>>>
>>> Today we had a discussion, we had a lot of questions. I try to summarize
>>> below and see if we can fact-check and learn more.
>>>
>>> (1) Advocacy: Background - Someone raised the idea that we should each run
>>> a Tor relay in each of our house. Someone said the powers that be cannot
>>> put all of us in jail if we get enough people to host Tor. A parent among
>>> us said, "I never before had an urge to run a VPN or Tor. But when running
>>> encryption and sharing a VPN tunnel with a criminal on the next packet is
>>> required to ensure your freedom to read BBC, you feel queasy and you worry
>>> what your underage kids might stumble on, things they are too young to deal
>>> with on the dark web. But loosing the freedom to read BBC makes me feel
>>> beyond queasy, beyond nauseated, and bilious, and sick..." He used a few
>>> more adjectives that I cannot spell. There were non technical users who
>>> expressed interest to run a non-exit relay, but only if they will be able
>>> to run an installer and click the next button and only use default options.
>>> And only if they can feel assured they understand the risks.
>>>
>>> (1.a) Their underage kids will not stumble on the dark web before they
>>> are old enough to know they are doing. Underage kids should not be able to
>>> stumble on the dark web on the computer the Tor relay is run (and what must
>>> be done to assure that). And underage kids should not be able to stumble
>>> on the dark web by being on the same WIFI network in the house.
>>>
>>> (1.b) There are different degrees of fear of risks. Some are brave
>>> enough to run a non-relay in the house where they live. We think they need
>>> to assume they can be detected. Some were only willing to consider if the
>>> non-exit Tor cannot be easily detected. The definition of not easily
>>> varies:
>>> - as difficult to detect as the obfs4 bridge protocol (but someone said
>>> the bridge protocol only works between a Tor client and a Tor relay, but
>>> not between a Tor relay and another Tor relay; we have not been able to
>>> confirm this by our own efforts)
>>> - as difficult as the meek protocol (someone said the idea of meek is to
>>> encrypt Tor packets and send it to a unblocked IP/domain, where the traffic
>>> is decrypted and copied to a proper Tor network); someone said he is
>>> willing to run a meek server to accept incoming connections, but only if
>>> the outgoing connections are at least obfs4. Someone said if we have many
>>> thousands of these tiny meek nodes hosted at our home address, we offload
>>> the official meek proxies run on amazon and azure. And even if we
>>> contribute only 1kb/s each, it is going to be more than sharing the cost -
>>> the idea is we want a high level of household penetration so that the
>>> powers that be find it hard to clamp us down.
>>> - as difficult to detect as protected by a VPN. Someone said he would
>>> pay for a VPN package, run a relay on a machine which only talks to the
>>> world through the VPN. But someone said that works for a Tor client, but
>>> not for a relay because a relay would need to have its own IP and listen on
>>> certain ports on that IP, and so because you VPN exit point will not let
>>> you listen on any port numbers, even if he is willing to pay for a
>>> commercial VPN that exits in another country, his tor relay cannot accepts
>>> incoming connections. Some people would give up running a non-exit if this
>>> cannot be done. The only IP they can access is where they sleep, and they
>>> want to be able to sleep well. Not just them, but their wife and their
>>> children needs to sleep well too. Is the ability to accept incoming
>>> connections a requirement to running a non-exit relay?
>>>
>>> (2) There is a sentiment that we should get "every household to run a Tor"
>>> so that the powers that be will find it much harder to clamp down. Someone
>>> said he would install a Tor relay on every single computer he controls, to
>>> support journalism and news reporting, if what he contributes ONLY goes
>>> towards beating censorship against the media. He said he feels it is a
>>> much easier sell if the sole function of that node is to allow people
>>> living under censorship to read newspaper. He said if there is a funding
>>> campaign to deploy the onion enterprise toolkit for news media, he will
>>> want to direct his donation specifically to those. Or if he can run an
>>> exit relay ONLY for for the BBC news domain. He said, then running Tor is
>>> a much easier sell to his family and friends. If the police brings him in,
>>> the back and forth will not be "we observed spams and hacks and viruses and
>>> copyright infringements on your IP", but the back and forth will just be
>>> "you are reading something you should not read on the web" and we can have
>>> a much better chance of advocating for "Tor relay in every home". We know
>>> in general Tor supports more network access than reading the news. But
>>> compared to countries where the freedom to run Tor exits are protected by
>>> law, living where we live we want to make it a much easier sell, and
>>> eventually to get a higher penetration so that the penetration itself
>>> becomes a barrier for the powers that be to clamp us down.
>>>
>>> And as we are not experts, and as we run real risks, and as we want our
>>> family to sleep well, we have framed our "requirements" or "prerequisites"
>>> to run Tor relays almost beyond the reasonable. You might want to call us
>>> paranoid. If there is a way for us paranoid people to run relays and to
>>> advocate, please help us.
>>>
>>> Jack
>>>
>>> 2. Apr 2018 07:36 by >>> a...@mit.edu <mailto:a...@mit.edu>>>> <>>>
>>> mailto:a...@mit.edu <mailto:mailto:a...@mit.edu>>>> >:
>>>
>>> On Mon, Apr 02, 2018 at 03:32:00AM -0400, grarpamp wrote:
>>>
>>> > >>> https://www.torproject.org/docs/faq#RelayOrBridge
>>> <https://www.torproject.org/docs/faq#RelayOrBridge>>>> <>>>
>>> https://www.torproject.org/docs/faq#RelayOrBridge
>>> <https://www.torproject.org/docs/faq#RelayOrBridge>>>> >
>>> >
>>> > "If you have lots of bandwidth, you should definitely run a
>>> normal relay.
>>> > If you're willing to be an exit, you should definitely run a
>>> normal
>>> > relay, since we need more exits. If you can't be an exit and only
>>> have a
>>> > little bit of bandwidth, be a bridge. Thanks for volunteering!"
>>>
>>> The 'normal's above are ambiguous and conflicting.
>>> Replace them with 'non-exit' and 'exit'.
>>>
>>>
>>> Ah, actually no, replace them with "relay" and "relay".
>>>
>>> In that text, "normal relay" is as opposed to "bridge relay".
>>>
>>> The FAQ text sure needs some updating.
>>>
>>> --Roger
>>>
>>> _______________________________________________
>>> tor-relays mailing list
>>> >>> tor-relays@lists.torproject.org
>>> <mailto:tor-relays@lists.torproject.org>>>> <>>>
>>> mailto:tor-relays@lists.torproject.org
>>> <mailto:mailto:tor-relays@lists.torproject.org>>>> >
>>> >>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>>>> <>>>
>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>>>> >
>>>
>>> -------------- next part --------------
>>> An HTML attachment was scrubbed...
>>> URL: <>>>
>>> http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/ead69030/attachment.html
>>>
>>> <http://lists.torproject.org/pipermail/tor-relays/attachments/20180403/ead69030/attachment.html>>>>
>>> >
>>>
>>> ------------------------------
>>>
>>> Subject: Digest Footer
>>>
>>> _______________________________________________
>>> tor-relays mailing list
>>> tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
>>>
>>>
>>> ------------------------------
>>>
>>> End of tor-relays Digest, Vol 87, Issue 4
>>> *****************************************
>>
>>
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays@lists.torproject.org <mailto:tor-relays@lists.torproject.org>
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>> <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays>
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays