On 03/02/2014 04:06 PM, Tobias Markus wrote:
I've been running a new tor relay for about a week now
Great. Thank you!
- I plan on running other services than tor on my server, including a
(private) mail system. Other than the general possibility of tor having security holes and my server (and its IP address) being public and thus possibly target of attacks, are there security implications I should consider?
Unfortunately, many sites block Tor relay IPs regardless of their exit policy. So, if you share one IP between the relay and other services, your might be impacted. This is especially true for exit relays.
- I would be interested to eventually run a directory/bandwith
authority, so I read about them in [1] and [2], but the places seemed a bit odd (hidserv-perf branch in tor svn/torflow repo) so I thought I better ask here: Would I really just have to follow the steps in [1] to become a dirauth? Is there currently a need for auths, would contribution be welcomed?
The offer is well appreciated. In the current design, directory authorities and bandwidth authorities play a very special role. There are several ideas on how to improve the situation and then open participation to the broader community, but for the time being, authorities can only be run by people very close to the core dev team.