Hi everybody
This is early.
Yesterday I upgraded Ichotolot60
1AE039EE0B11DB79E4B4B29CBA9F752864A0259E from 4.2.7 to 4.4.5.
Now I see in the consensus health:
moria1 Fast Run Stab V2Dir Valid bw=566
tor26 Fast Guard Stab V2Dir Valid
dizum Fast Guard Stab V2Dir Valid
gabel. Fast Stab V2Dir Valid bw=1130
danne. Fast Guard Run Stab V2Dir Valid
maatu. Fast Stab V2Dir Valid bw=1200
farav. Fast Guard Run Stab V2Dir Valid bw=2970
longc. Fast …
[View More]Stab V2Dir Valid bw=490
bastet Fast Guard Run Stab V2Dir Valid bw=3520
And _no_ Authority "owns" the relay.
Old
Apr 02 21:51:31.872 [notice] Tor 0.4.2.7 running on FreeBSD with
Libevent 2.1.11-stable, OpenSSL LibreSSL 3.0.2, Zlib 1.2.11, Liblzma
5.2.4, and Libzstd 1.4.4.
New
Sep 18 21:00:22.384 [notice] Tor 0.4.4.5 running on FreeBSD with
Libevent 2.1.12-stable, OpenSSL LibreSSL 3.2.1, Zlib 1.2.11, Liblzma
5.2.4, and Libzstd 1.4.5.
(Yeah, some Lib stuff is new too, hehe)
The "Guard !Run Stab" consensus looks quite interesting to me. How can
it be?
Other relays with that nice "Guard !Run Stab" dropped off consensus over
night (or since days) and no authority "owns" them too:
HORUS1 0.4.4.4-rc
norisknofun 0.3.5.10
ULayerKiriakou 0.4.3.5
Stellvia 0.4.3.6
torexit42 (StaleDesc) 0.4.1.6
torpidsDEhetzner1 0.4.3.2-alpha (3 days)
karen (StaleDesc) 0.4.2.7
Stephen304 0.4.2.7 (3 days)
Rigel2020 (StaleDesc) 0.4.3.6
dgplug (FallbackDir, StaleDesc) 0.4.4.5 =?=
May-be the operators updated and are now in the same floating position?
May-be this is super normal and came to my attention by surprise?
Anyways, I let everthing run for a day or so. Time can heal.
--
Cheers, Felix
[View Less]
Hi, I'm looking for help because I can't figure out what's going on.
https://metrics.torproject.org/rs.html#details/11DF0017A43AF1F08825CD5D9732…
- At the beginning of January the relay seems to have lost the guard
flag
- A week ago I checked and noticed that the relay had also lost the
stable flag despite having an uptime of >2 months at that point
- A week ago I rebooted the server but the situations hasn't changed -
flags are still gone
- metrics.torproject graphs show that the …
[View More]server has been transmitting
data the entire time - so it doesn't seem like I missed some downtime
- Serverlogs show no problems
- Relay has been running continuously for almost 4 years and only gets
rebooted for kernel/tor upgrades -> so uptime and MTBF should not be a
problem
Is there a problem on my side?
Is there anything I can do or check?
It is a fallback relay - is it still useful as such?
TY
[View Less]
Hello friendly relay operators,
Another day, another weird thing with the Tor network. This time we
have some jerk bombing the directory authorities with directory fetches,
and doing it via exits:
https://lists.torproject.org/pipermail/network-health/2021-January/000661.h…
The network is mostly holding together, but I wouldn't say it is pretty.
One of the long-term fixes will be ticket #2667:
https://gitlab.torproject.org/tpo/core/tor/-/issues/2667
where exit relays refuse to let users …
[View More]connect back into the Tor network.
David and I made a branch this evening that implements #2667, and it
could use some testing. If you're comfortable building your exit relay
from a git branch, please do, and let us know how it goes. It is the
"ticket2667" branch on either
https://git.torproject.org/user/arma/tor
or
https://gitlab.torproject.org/arma/tor/
And if your relay is currently using 100% cpu and/or way more bandwidth
than usual, you might be especially excited to try out this patch. :)
When the defense triggers, you will see an info-level log line like
"%s tried to connect back to a known relay address. Closing."
(where %s is the destination, so don't get upset at them. :)
You can let us know how it's going either by mail just to me, or by a
reply on the list, whichever you prefer. Once we know that you're running
the branch, we can also probe your relay remotely to verify that it is
correctly refusing those connections.
Thanks!
--Roger
[View Less]
Hi,
I have been using Tor since a decade, always had limited resources and
couldn't give back anything to the community.
Now I wish to run relays in an effort to give back something.
Right now I have a 100 mbps reliable internet connection on a gaming laptop
with windows 10 "HP Envy K204tx", I disabled windows updates, and a good
quality ethernet cable. Even though it's a laptop, I use it like a desktop,
with hdmi out to a TV, ethernet cable, usb hubs and 24x7 electricity with
lots of …
[View More]inverter (home ups) backup.
I keep this laptop always stationary since I have another sleek and
lightweight one which I use for portable purposes.
Earlier my internet plan was limited to 500 gb per month but recently
they upgraded it for free, now it's 3000 gb per month, which is too much
for me and my family, we hardly use 300-400 gb per month.
I was thinking about running a relay for Tor, (maybe a bridge relay) at
night since both my laptop and internet are unused at night.
I have following queries:
1. Can I run relay on my laptop simultaneously while using other internet
services and browsers normally?
2. Is it possible to schedule everything automatically, say to run a relay
from 1 am to 7 am then shut it down automatically after that? I start using
it at 9 am and 2 hours of rest will be enough for the laptop.
3. I have Kaspersky internet security, will it create problems for running
tor relays? Currently when I use tor browser as a client, I don't have any
issues, kaspersky doesn't provide a warning, doesn't block any connections.
4. Do I need to be punctual in running the relay every day at the scheduled
time? Is it okay if I can't run the relay on a few occasional days, for
reasons like power outage, feeling sick, too busy etc?
5. Can I use a Tor browser (client) while running the relay? If yes, will I
get faster browsing speed with that?
>
[View Less]
Hi @ list,
I am operating a relay for several years and I really do like it and
will do it for more years.
My current relay residents on Pi 4. At first I installed it via apt but
now the 32 Bit sources are no longer available. So I thought I could
build the from source.
The building process went well but now I have a problem with the user
permissions. I can't get tor really running.
_My first attempt was:_
To start tor with "systemctl start tor". But tor won't start and "
journalctl -…
[View More]u tor" says only this:
Jan 22 09:06:23 rpi4tor systemd[1]: Starting LSB: Starts The Onion
Router daemon
Jan 22 09:06:23 rpi4tor systemd[1]: Started LSB: Starts The Onion Router
daemon
Jan 22 09:08:32 rpi4tor systemd[1]: Stopping LSB: Starts The Onion
Router daemon
Jan 22 09:08:32 rpi4tor systemd[1]: tor.service: Succeeded.
Jan 22 09:08:32 rpi4tor systemd[1]: Stopped LSB: Starts The Onion Router
daemon
lines 1-6/6 (END)...skipping...
-- Logs begin at Thu 2019-02-14 11:11:59 CET, end at Fri 2021-01-22
11:54:47 CET. --
Jan 22 09:06:23 rpi4tor systemd[1]: Starting LSB: Starts The Onion
Router daemon processes...
Jan 22 09:06:23 rpi4tor systemd[1]: Started LSB: Starts The Onion Router
daemon processes.
Jan 22 09:08:32 rpi4tor systemd[1]: Stopping LSB: Starts The Onion
Router daemon processes...
Jan 22 09:08:32 rpi4tor systemd[1]: tor.service: Succeeded.
Jan 22 09:08:32 rpi4tor systemd[1]: Stopped LSB: Starts The Onion Router
daemon processes.
_My second attempt was:_
I changed the user of all tor files to the current user "pi". After that
I was able to start tor with "tor --quiet" as user "pi". All went fine
until I rebooted the system and all my changes to "pi" where changed to
"debian-tor".
_My third attempt was:_
I did "sudo tor --quiet". It works, but in "notices.log" is the
information that I shouldn't do that.
So, now I am standing here and don't know what to do. I would like to
start tor via systemd but I don't know what's wrong (maybe the
permissions). Does someone has a hint for me?
regards,
Karl
[View Less]
Hello list,
I'm trying to find out why the server
(https://metrics.torproject.org/rs.html#details/11DF0017A43AF1F08825CD5D9732…)
has lost its stable flag.
As far as I can see it is running a recent version of tor and has an
uptime of over 60 days.
Are there other reasons that factor into the Stable flag?
The log file doesn't give my an indication that there is anything wrong,
either.
Any ideas?
Hi folks,
I have a dedicated Server running with the red H in Germany.
https://metrics.torproject.org/rs.html#details/1CD48F4ED0F1821FFBF1940802A1…
Today I received a notification that my server is "under attack" since
my server got over the threshold of 300k packets/s. At the time of the
mail it seems to be about 450k pps .
I checked a couple of IPs and most of them are other TOR-Relays or Exits.
Would you recommend telling my Hoster that everything is all fine?
Cheers