Dear Tor friends,
the NGO I am volunteering for (Digitalcourage e.V.) has been running
modest Tor exits for many years. Now we finally have the opportunity
to run a high-bandwidth exit relay because we found a data center with
a nice internet connection (20 Gbit/s) we may use.
My question is: What kind of hardware should we buy to utilize this
bandwith? I am told that we need an SFP+ networking card to connect to
the fibre optics cable, but what CPU and mainboard would you recommend
nowadays? It should fit into a 1 height unit 19" enclosure.
If you prefer to tell me in person: I will attend the Tor meetup in
Brussels on Friday <https://blog.torproject.org/events/tor-meetup-brussels>
and the subsequent Freedom Not Fear event <https://www.freedomnotfear.org/>.
Cheers,
Christian
--
Christian Pietsch | volunteering for Digitalcourage e.V., Germany
Digitalcourage e.V.: https://digitalcourage.de/
BigBrotherAwards Germany: https://bigbrotherawards.de/
Betting living without Google: https://pad.foebud.org/google-alternatives
Hi,
How long is it supposed to take to get the stable and fast flags?
My bridge is up since 13 days. At the beginning I had both flags then I lost them because of a reboot I think. Since, they never came back.
Envoyé depuis ProtonMail mobile
On Thursday, November 21, 2019 at 7:29 PM, Mario Costa
<mario.costa(a)icloud.com> wrote:
>
>> Il giorno 21 nov 2019, alle ore 15:49, Matt Traudt
>> <pastly(a)torproject.org> ha scritto:
>>
>> Thanks for running a bridge.
>>
>> Check Tor's logs to make sure it is actually running and doesn't
>> report
>> issues. Search its hashed fingerprint on
>> https://metrics.torproject.org/rs.html and make sure it is listed as
>> up.
>> Verify you did *not* set 'PublishServerDescriptor 0'. Verify you can
>> use
>> your bridge from outside your home. I once had a residential ISP
>> that
>> blocked inbound port 80 but not 443.
> This actually made me realize that my home router would not properly
> forward ports 80 and 443 from outside. I could connect to my bridge
> from the LAN (even using my external IP) but not from outside. I had
> to change to a non-standard port, unfortunately, because apparently
> 80 and 443 are used by the router’s web GUI even if I disabled
> external access to it. That’s a shame because I understand that ports
> 80 and 443 are less likely to be blocked by censors.
>
> However, it’s still not clear to me how I can confirm anyone is using
> the bridge.
In the nyx log you see messages like
'In the last X hours we have seen X unique clients' (I don't remember
the exact wording)
Those are the clients that did use your bridge.
> When I connect to it, all I see in nyx are OUTBOUND connections and
> not even one inbound connection (maybe that’s by design in order to
> protect connecting users' privacy, I don’t know).
You are probably right.
In the past you could see connecting users in nyx as inbound
connections without visible IP-address. Now they are not displayed as
inbound connections any more. The outbound connections that are needed
for these users are still displayed.
What do guard, middle and exit probabilities mean?
Say, for example, that the middle probability for a certain relay is 0.15%
and the guard probability for the same relay is 0.20%. What does that mean?
Thanks
We recently released version 0.3 of our obfs4 bridge docker image. To
upgrade to the new image or deploy a new container from scratch, please
take a look at our instructions:
<https://community.torproject.org/relay/setup/bridge/docker/>
Here's what changed in our new version:
* We added a new script, 'get-bridge-line', which prints your bridge
line. Run it as follows:
docker exec CONTAINER_ID get-bridge-line
* We improved our setup instructions. As part of this, we added a
Makefile that facilitates the process of deploying a container. Here
are the new instructions:
<https://community.torproject.org/relay/setup/bridge/docker/>
* Our new Makefile uses docker volumes to persistently store tor's data
directory. This means that you can now upgrade to future docker
images (which involves deleting your existing container) while keeping
your bridge's identity.
* We made tor log to stdout in addition to its log file, so the
following command now shows tor's entire log output, and not just
the first few lines.
docker logs $CONTAINER_ID
* The bridge can now bind to obfs4 ports < 1024.
* One can now run multiple bridge containers on a single machine.
Thanks to thymbahutymba for providing a great template for our
Makefile and for suggesting docker volumes.
Cheers,
Philipp
Hi,
when i comment out the MyFamily line with an # in the torrc on one relay it
seems to be still handled like before.
Hitting x in nyx or waiting a few days or rebooting does not make any
change.
Is this expected?
I expected that relay to show as part of no family now and listed as
"Alleged Family Member" on all other relays which still list that
fingerprint in their torrc.
Hi,
I might switch my ISP soon-ish from XS4ALL to Freedom Internet so my
relay [1] will get a new AS number and IPv4/IPv6 address, how does this
impact being listed as a fallback candidate? I'm currently not selected
as a fallback. (And yes, I know about fallback needing to be long-term
reliable, but this event was caused by the big corporate powers :( )
Thanks,
René
[1]
https://metrics.torproject.org/rs.html#details/4E8CE6F5651E7342C1E7E5ED031E…
Hi,
My bridge appears down when checking "tor relay search" on smartphone and up when checking the site from a laptop.
Is there a reason? does someone already had the same issue?
Sent with [ProtonMail](https://protonmail.com) Secure Email.
Hi, all
I configure a bridge on October the 31th. On the first days I had to reboot it multiple times but few days later I had all the necessary flags, fast and stable include.
Now I'm at 9+ days of uptime, I lost the fast and stable flags and the advertised bandwidth is at 792 KiB/s when my bandwidth is configured at 3 MB/s with burst at 6 MB. Of course I haven't seen a single client.
My question is: is it normal and part of a relay/bridge lifecycle or is there something wrong?
Ps: on metrics.torproject.org, everything is fine. Nothing wrong in my logs either and I can use it when configuring my it in a tor browser.
Any opinions or advices would be welcome.
David.
Envoyé depuis ProtonMail mobile