Hi all,
some weeks ago, my relay JPsi2
(F6EC46933CE8D4FAD5CCDAA8B1C5A377685FC521) started experiencing moderate
stability problems. It would freeze after a few hours or days. The
provider said it was due to Spectre mitigations and the only way for me
to fix this would be to switch to a newer (more expensive) plan...
Some time later I did so and reinstalled it with Ubuntu 18.04 and placed
the old keys into the new installation. It seems they are now expected
to be in /var/lib/tor/.tor/keys, as opposed to /var/lib/tor/keys as I
was used to in Ubuntu 16.04.
However, it does not seem to be making it into the consensus anymore.
Only the authority nodes moria1, dizum, and longclaw vote for Running.
The others don't.
So far I haven't been able to figure out the reason for that, so any
help is appreciated.
Here is part of the output of journalctl -u tor and the torrc file:
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] Heartbeat: It seems like we are not in the cached
consensus.
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] Heartbeat: Tor's uptime is 8 days 0:00 hours, with
0 circuits open. I've sent 54.04 MB and received 163.30 MB.
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] While bootstrapping, fetched this many bytes:
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 9368438 (server descriptor fetch)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 1060775 (consensus network-status fetch)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 13332 (authority cert fetch)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 2762395 (microdescriptor fetch)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] While not bootstrapping, fetched this many bytes:
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 111548029 (server descriptor fetch)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 100899 (server descriptor upload)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 15307429 (consensus network-status fetch)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 1785 (authority cert fetch)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] 942746 (microdescriptor fetch)
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] Average packaged cell fullness: 96.710%. TLS write
overhead: 31%
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] Circuit handshake stats since last time: 1/1 TAP,
0/0 NTor.
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] Since startup we initiated 0 and received 0 v1
connections; initiated 0 and received 2 v2 connections; initiated 0 and
received 114 v3 connections; initiated 0 and received 1899 v4
connections; initiated 46 and received 5694 v5 connections.
Oct 11 15:04:32 j60204.servers.jiffybox.net tor[11183]: Oct 11
15:04:32.000 [notice] DoS mitigation since startup: 0 circuits killed
with too many cells. 0 circuits rejected, 0 marked addresses. 0
connections closed. 0 single hop clients refused. 0 INTRODUCE2 rejected.
Oct 11 18:14:03 j60204.servers.
# cat /etc/tor/torrc
OfflineMasterKey 1
SOCKSPort 0
SOCKSPolicy reject *
RunAsDaemon 1
ControlPort 9051
HashedControlPassword
16:28CD63819CB35660601EB9CED4BC2A4252D3DB80488DFD4F22CA4AE930
ORPort 9001
ORPort [2a00:1158:3::1ba]:9001
Nickname JPsi2
RelayBandwidthRate 12500 KB
RelayBandwidthBurst 12500 KB
ContactInfo 0xF1ADC390 Random Tor Node Operator <tor at unterderbruecke
(dot) de> bitcoin:1LBoEppezy2HauE957HzfFn9UGywK6aboB
DirPort 9030
MyFamily $B198C0B4B8C551F174FBB841A172616E3DB3124D,
$F6EC46933CE8D4FAD5CCDAA8B1C5A377685FC521
IPv6Exit 0
ExitPolicy reject *:*
ExitPolicy reject6 *:*
Hiho rise up members,
I would like to receive the mails for my hosted Tor relays, such as
support tickets from my provider, via Riseup.
Can one of the Riseup.net users on this list send me an invite code?
Right on me, not in the list ;-)
mailto:admin@for-privacy.net or my lists address
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
Hello,
This summer Nusenu shared his posts about malicious relays [1][2] and it was followed by many answers.
A very important is Roger's one [3] explaining that the malicious relays have been kicked out of the network and that any new one should be reported.
I was wondering if, with some distance with this summer situation / discussion :
* new malicious relays have been reported in any way ?
* vigilance / watchfulness is still needed ? if yes :
* is there specific cases to share (e.g. nodes that block HTTPS on a site or redirect to HTTP ?)
* any concern to have on other protocols that use SSL (imaps, smtps, ssh) ?
* is there / will there be things implemented as a conclusion of the "call for support for proposal to limit large scale attacks" ?
* has it been possible to prepare / set up precautions to avoid this king of situation or it is a too long shot for such a problem ?
These questions come with a lot of respect for the project, its teams and the work done. No critics, it is just made to update the knowloedge on the subject as these questions came back with other friends and relay operators.
And perhaps a last one, perhaps specific for Nusenu : how do you define a malicious relay ? Sorry but I did not get that precisely, moreover in big group analysis.
All answers will be read with care and gratitude !
---
Corl3ss
2042 5D39 E7C1 E657 025E A28F 937D 8A90 FCB0 E24A
[1] https://lists.torproject.org/pipermail/tor-relays/2020-July/018643.html
[2] https://lists.torproject.org/pipermail/tor-relays/2020-August/018817.html
[3] https://lists.torproject.org/pipermail/tor-relays/2020-August/018845.html