On Thu, Nov 11, 2021 at 03:35:26PM +0000, Gary C. New via tor-relays wrote:
> Gus,
> I have to agree with z-relay on these points.
> I won't even provide an obfuscated contact email in my torrc to avoid spam. I 
> could setup a dedicated email for Tor operation, but I'd likely find my 
> relays down prior to checking it.
> Case in point... When registering a domain name, I've gotten to the point 
> where I use a disposable phone number and email address, due to the amount of 
> spam generated from such a transaction.
> Presently, I like how Tor notifies me of any issues with my configuration in 
> the torlog and provides recommendations on how to remedy them.
> I believe you will find that asking for operators to provide contact address 
> information for an anonymizing service will always be a struggle–it's the 
> nature of the service and those that subscribe to it.
> BTW... My ISP does have my contact/billing information, but doesn't require 
> it be publish publicly.
> Respectfully,
> 

What exactly is stopping you to use this email address as your relay 
contact_info? 
This is a *public* mailing list.

cheers,
Gus

> Gary—
> This Message Originated by the Sun.
> iBigBlue 63W Solar Array (~12 Hour Charge)
> + 2 x Charmast 26800mAh Power Banks
> = iPhone XS Max 512GB (~2 Weeks Charged) 
> 
>     On Thursday, November 11, 2021, 5:59:45 AM PST, gus <g...@torproject.org> 
> wrote:  
>  
>  Hi,
> 
> On Wed, Nov 10, 2021 at 09:14:58PM +0000, z-relay--- via tor-relays wrote:
> > I'll throw in my 2 cents.
> > 
> > Limitations with current approach:
> > 
> > 1. Asking all relay operators to list their email addresses in the public 
> > relay list is largely equivalent to asking them to invite tens of thousands 
> > of spam emails into their inboxes and having to either ignore most of them 
> > or set up aggressive filtering rules which can easily bounce legitimate 
> > messages. 
> 
> 
> I'm running relays and spam is not an issue. It's a pain if you're
> running exit nodes, then you will get abuse notifications from your ISP.
> 
> And if spam is an issue for you, you could manage that using GitLab
> Service Desk feature, for example:
> https://docs.gitlab.com/ee/user/project/service_desk.html
> 
> >This also opens up a convenient channel for "adversaries" to harass or even 
> >coerce the relay operators.
> 
> Actually, that would be quite stupid from their part to do that... by
> email. Anyway, if that happens, contact us.
> 
> Anyway, my question is:
> 
> Why your ISP can contact you, but the Tor Community can't have
> an easy way to reach out to an operator?
> 
> > 2. Middle relays can be used for attacking and the only defense being "list 
> > your email addresses or else we'll kick you out" throws a sizable wretch 
> > into the credibility and technical soundness of the whole project. If the 
> > "adversaries" are capable of de-anonymize tor users by simply running a 
> > middle relay that by design knows neither the real sources nor the real 
> > destinations of the traffic through it, I wonder how hard would it be for 
> > them to set up an email address?
> > 
> > Some suggestions to consider:
> > 
> > 1. Since the DAs and the relays already know each others' IP addresses and 
> > public ID keys. Perhaps tor can add a feature where the DAs can send 
> > authenticated and encrypted short messages to the relays, which can then 
> > verify the messages and log them in syslog or log files as configured in 
> > torrc.
> > 
> > The messages can be something along the lines of "Your relay is 
> > misconfigured in ABC ways, please do XYZ to fix it. Contact our help desk 
> > at ***@torproject.org if you have questions or need further assistance.".
> > 
> > 2. As a stop term solution before this feature can be implemented would be 
> > listing all the misconfigured relays on a page hosted by torproject.org, 
> > and make the page easy to discover by linking to it on relay help pages. 
> > Same idea here, I'm sure many are happy to reach out for instructions to 
> > correct any misconfigurations, but that does not mean all of us are excited 
> > about publishing an email address in a public list, nor it is technically 
> > necessary.
> > 
> 
> Thanks for your suggestion. But, in my experience, unrecommended relays
> are already listed on Metrics page and operators didn't act/notice until
> we got in touch and asked them to upgrade.
> 
> Gus
> 
> 
> > ________________________________
> > From: Georg Koppen 'gk at torproject.org' 
> > <z-relay+tor-relays=lists.torproject....@zestypucker.anonaddy.me>
> > Sent: Wednesday, November 10, 2021 6:40 PM
> > To: z-re...@zestypucker.anonaddy.me <z-re...@zestypucker.anonaddy.me>
> > Subject: Re: [tor-relays] Recent rejection of relays
> > 
> > 
> > Jonas via tor-relays:
> > > Where is this criteria documented?
> > 
> > I am not sure what criteria you mean but we have our bad-relay
> > criteria[1] documented at our wiki and keep fingerprints we reject due
> > to attacks we noticed there as well[2].
> > 
> > > It seems the tor project, or its designated volunteers, are increasing 
> > > controlling and managing the network. In the Swiss Federation and EU this 
> > > turns the tor project into an "online service provider" or "online 
> > > platform" and subjects one to all sorts of regulations and compliance 
> > > regimes.
> > >
> > > We already get enough requests from the police regarding relays hosted in 
> > > our datacenters. Shall we point them at tor as the network operator?
> > 
> > The Tor Project is not running the network. It's comprised of relays run
> > mostly by volunteers. I am actually not really sure either what you are
> > proposing to be honest. Shall we just keep the relays attacking our
> > users in the network instead?
> > 
> > Georg
> > 
> > [snip]
> > 
> > [1]
> > https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Criteria-for-rejecting-bad-relays
> > [2]
> > https://gitlab.torproject.org/tpo/network-health/team/-/wikis/Rejected-fingerprints-found-in-attacks
> > 
> > >
> > > ---------- Original Message ----------
> > > On Wed, November 10, 2021 at 8:59 AM,  Georg Koppen<g...@torproject.org> 
> > > wrote:
> > > Hello everyone!
> > >
> > > Some of you might have noticed that there is a visible drop of relays on
> > > our consensus-health website.[1] The reason for that is that we kicked
> > > roughly 600 non-exit relays out of the network yesterday. In fact, only
> > > a small fraction of them had the guard flag, so the vast majority were
> > > middle-only relays. We don't have any evidence that these relays were
> > > doing any attack, but there are attacks possible which relays could
> > > perform from the middle position. Therefore, we decided we'd remove
> > > those relays for our users' safety sake.
> > > _______________________________________________
> > > tor-relays mailing list
> > > tor-relays@lists.torproject.org
> > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> > >
> > 
> > 
> > 
> > 
> 
> > _______________________________________________
> > tor-relays mailing list
> > tor-relays@lists.torproject.org
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 
> 
> -- 
> The Tor Project
> Community Team Lead
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>   

> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


-- 
The Tor Project
Community Team Lead

Attachment: signature.asc
Description: PGP signature

_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to